Search results for "Virtual"

showing 10 items of 1485 documents

Immersive Virtual Reality Education Application : Four Development Iterations along Design Science Research Methodology

2022

This study introduces a research and development process of an immersive Virtual Reality (VR) education application. Altogether four application development iterations are showcased along the Design Science Research methodology. The results show how initial problems change and new problems occur during the course of a long-term DSR project with multiple iterations. Moreover, the study results confirm various previous findings, for example, that VR works better on higher learning levels such as application -level and personalization is a way to achieve this. In addition, 360 photos and videos were found to be easy and cost-efficient ways to increase personalization of VR applications. The re…

immersivelong-term studyopetusohjelmat (tietokoneohjelmat)design science researchkehittämistutkimuslearning applicationvirtual reality113 Computer and information sciencesohjelmistokehitysAdvances in Teaching and Learning Technologiesvirtuaalitodellisuus
researchProduct

On the History of Differentiable Manifolds

2012

International audience; We discuss central aspects of history of the concept of an affine dif-ferentiable manifold, as a proposal confirming the need for using some quantitative methods (drawn from elementary Model Theory) in Mathematical Historiography. In particular, we prove that this geometric structure is a syntactic rigid designator in the sense of Kripke-Putnam.

implicit functionWhitney's theoremprinciple of virtual worksMathematics::History and Overviewrigiddifferentiable manifold implicit function semantics Lindenbaum-Tarski algebraLindenbaum-Tarski algebra[MATH.MATH-LO]Mathematics [math]/Logic [math.LO][MATH.MATH-DG]Mathematics [math]/Differential Geometry [math.DG][MATH.MATH-HO]Mathematics [math]/History and Overview [math.HO][MATH.MATH-HO] Mathematics [math]/History and Overview [math.HO][MATH.MATH-LO] Mathematics [math]/Logic [math.LO][MATH.MATH-DG] Mathematics [math]/Differential Geometry [math.DG]semanticssyntaxdesignatordifferentiable manifold
researchProduct

Formaciones sociales y opresión en Marx

2018

The text explains the difference between Marx?s concept of «oppression» and others as «coercion» by Durkheim or «domination» by Weber. The article then establishes, in a methodical way, the centrality of a passage from Capital, in which three different theories on «oppression» appear. It?s explained that two of them are rather a philosophical antinomy. The other, relative to the heteronomy of social time, can be completed by defining the heteronomy of social space, which gives it analytical virtuality. Some examples are given.

in a methodical wayvalorrelative to the heteronomy of social timetiempo de trabajoworking timethe centrality of a passage from Capitalcan be completed by defining the heteronomy of social space:SOCIOLOGÍA [UNESCO]in which three different theories on «oppression» appear. It?s explained that two of them are rather a philosophical antinomy. The othervalueespacio socialopresiónMarxUNESCO::SOCIOLOGÍA1137-7038 8537 Arxius de sociologia 493757 2018 38 6508342 Formaciones sociales y opresión en Marx Hernàndez i DobonFrancesc Jesús The text explains the difference between Marx?s concept of «oppression» and others as «coercion» by Durkheim or «domination» by Weber. The article then establishessocial space. 27 35oppressionwhich gives it analytical virtuality. Some examples are given. Marx
researchProduct

Il metodo PUMA per la stima dell’incertezza

2009

incertezza di misura: strumenti virtualigestione dell'incertezzaSettore ING-INF/07 - Misure Elettriche E Elettroniche
researchProduct

Valori e limiti degli incontri virtuali nella prospettiva di una educazione empatica

2008

incontri virtuali empatia apocalittici integrati educatoriSettore M-PED/01 - Pedagogia Generale E Sociale
researchProduct

Hypervisor-assisted Atomic Memory Acquisition in Modern Systems

2019

Reliable memory acquisition is essential to forensic analysis of a cyber-crime. Various methods of memory acquisition have been proposed, ranging from tools based on a dedicated hardware to software only solutions. Recently, a hypervisor-based method for memory acquisition was proposed (Qi et al., 2017; Martignoni et al., 2010). This method obtains a reliable (atomic) memory image of a running system. The method achieves this by making all memory pages non-writable until they are copied to the memory image, thus preventing uncontrolled modification of these pages. Unfortunately, the proposed method has two deficiencies: (1) the method does not support multiprocessing and (2) the method does…

integrity of a memory snapshotreliabilityvirtualisointiComputer scienceforensic soundnessHypervisormuistit (tietotekniikka)computer.software_genrevirtualizationatomicitymemory forensicsmemory acquisitionOperating systemMemory acquisitionlive forensicstietoturvacomputerProceedings of the 5th International Conference on Information Systems Security and Privacy
researchProduct

Applications of Virtualization in Systems Design

2012

internet streamingQEMUasynchronous mirroringvirtualisointiLLVMcloud computingtrusted computingsysteemityötietotekniikkavirtualizationKVMstorage virtualization
researchProduct

The Blog, the Blogger and the Other on the Net

2008

This work describes a qualitative research, still in progress, about blogging. This experience is fully linked to the concept of "social presence": users feel "to be there" in the virtual environment. From a brief review of researches about blogging, we propose a work that, through a semi-structured interview (submitted on line), could analyze the mental representations of bloggers. Moreover, we have the purpose to read these impressions through a key pattern of interactions between blog, blogger and other users. The primary goal of this study, still preparatory, is to explore the psychological means of blogging.

internet adolescenzavirtual spacepsycological researchSettore M-PSI/08 - Psicologia Clinicablogging
researchProduct

Soluzioni innovative nell’e-learning: l’insegnante “in ruolo” nelle comunità virtuali.

2012

Un settore dinamico nella ricerca educativa è quello relativo alla correlazione tra la formazione degli insegnanti, la progettazione del sillabo e i risultati conseguiti dagli studenti. Alla luce dei recenti comportamenti sociali emergenti, in questo saggio si analizza la figura dell’insegnante nella progettazione degli ambienti di formazione online. Superando i limiti del Virtual Learning Environment (VLE) e le criticità del Personal Learning Environment (PLE) si focalizza l’attenzione sul concetto di person in place, che vive esperienze formative in luoghi densi di relazioni sociali e tecnologicamente arricchiti. Oggi le tecnologie permettono la creazione di ambienti di apprendimento cara…

italiano L2 e-learning virtual worlds CALL
researchProduct

Development of Network Security Education

2021

Distance education has grown tremendously over the last decade. Internet technologies have enabled a large-scale dispensation of lectures, exercises, and training. Virtual Learning Management Systems (LMSs) offer a number of tools to realize distance education and distance learning. In this work, we present a virtual system architecture for training cyber security professionals with hands-on skills. The architecture is based on a VirtualBox virtualization environment. Guest machines are installed on an instance of VirtualBox. The installed environment offers a safe and isolated workbench for experiments. After installation and configuration of the environment, students perform a number of i…

järjestelmäarkkitehtuurioppimisympäristöComputer scienceNetwork securityDistance educationtietotekniikkacomputer.software_genreetäopetusComputingMilieux_COMPUTERSANDEDUCATIONnetwork securityverkko-opetusArchitecturetietoturvakyberturvallisuusMultimediabusiness.industryhallintajärjestelmätVirtualizationverkko-oppiminendistance educationManagement systemSystems architectureVirtual learning environmentThe Internetbusinesscomputerverkkohyökkäykset
researchProduct