Search results for "computer.programming_language"
showing 10 items of 986 documents
A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks
2011
Q&A social media has gained a great deal of attention during recent years. People rely on these sites to obtain information due to the number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradictory answers, causing ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. In this work, we propose a novel approach for estimating the reliability and expertise of a user based on human cognitive traits. Every user can individually estimate these values based on local pairwise interactions. We examine…
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment
2017
Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health systems is of paramount importance. As a way of achieving this requirement, more emphasis has been given to anonymous attribute credentials, which allows a user to anonymously prove the ownership of a set of attributes to a verifier and thereby gain access to protected resources. Among the existin…
Approximation-based adaptive tracking control of stochastic nonlinear systems with a general form
2014
In this paper, an approximation-based adaptive tracking control scheme is proposed for a class of stochastic nonlinear systems with a more general structure. Fuzzy logical systems are used to approximate unknown nonlinearities in the controller design procedure and the backstepping technique is utilized to construct a state-feedback adaptive controller. The proposed controller can guarantee that all the signals in the closed-loop system are fourth-moment semi-globally uniformly ultimately bounded and the tracking error eventually converges to a small neighborhood around the origin. Simulation results are used to show the effectiveness of the proposed control scheme.
Sharing Drawings with Smartphones in the Classroom – Art-Based Education in Social Sciences
2020
This article identifies the factors that indicate the opportunity of reviewing the methods in teaching economics in order to overcome the traditional teaching-learning scheme that overvalues rote learning and find formulas that facilitate the development of analytical skills. On the other hand, this work points out the importance of developing creative competences. One way to do this is to introduce artistic practices in the classroom, even in non-artistic subjects. In this work an experience of education based on the arts is presented. Thanks to smartphone cameras, students can share and project drawings in the classroom immediately to facilitate group learning. The proposal is to represen…
Elliptic Curve-Based Secure Multidimensional Aggregation for Smart Grid Communications
2017
In smart grid, data aggregation is considered as an essential paradigm in assessing information about current energy usage. To achieve the privacy-preserving goal, several homomorphic-based solutions have been proposed. However, these solutions either consider one-dimensional information or use costly pairing computation in order to ensure source authentication. In fact, smart grid data are likely to be multidimensional (e.g., time, purpose, and so on) for more accurate control. In addition, the aggregation node in smart grid needs to verify data that come from several smart meters in a residential area; hence, the verification must be cost-efficient. In this paper, we propose a scheme that…
Multi-cloud privacy preserving schemes for linear data mining
2015
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…
A Study on scale factor in distributed differential evolution.
2011
This paper proposes the employment of multiple scale factor values within distributed differential evolution structures. Four different scale factor schemes are proposed, tested, compared and analyzed. Two schemes simply employ multiple scale factor values and two also include an update logic during the evolution. The four schemes have been integrated for comparison within three recently proposed distributed differential evolution structures and tested on several various test problems. Numerical results show that, on average, the employment of multiple scale factors is beneficial since in most cases it leads to significant improvements in performance with respect to standard distributed alg…
Fostering Teacher-Student Interaction and Learner Autonomy by the I-TUTOR Maps
2014
The paper analyses the use of an automatically generated map as a mediator; that map visually represents the study domain of a university course and fosters the co-activity between teachers and stu- dents. In our approach the role of the teacher is meant as a media- tor between the student and knowledge. The mediation (and not the transmission) highlights a process in which theres no deterministic rela- tion between teaching and learning. Learning is affected by the students previous experiences, their own modalities of acquisition and by the in- puts coming from the environment. The learning path develops when the teachers and the students visions approach and, partly, overlap. In this cas…
Generación de fractales a partir del método de Newton
2013
[EN] A large number of fractals known, as Julia fractals and Mandelbrot, can be generated from an iterative method. In this paper we present a virtual laboratory developed as a Graphical User Interface (GUI) of Matlab that allows us to study and visualize in real time the relationship between Newton iterative methods of two variables and the generation of fractals. The main objective is to allow Technical School students in Numerical Computation subjects to acquire the skills to generate fractals and interpret their plots in terms of the convergence or divergence speed of the sequence of iterated.
Multi-Connectivity Management for 5G V2X Communication
2019
With the advent of automated driving functions the need for cooperation among vehicles becomes increasingly necessary. The availability of high quality connectivity is an important factor for successful and uninterrupted cooperative and autonomous services. Flexible selection of available connectivity options, increases the probabilities to achieve and maintain the required Quality of Service (QoS). Future vehicles will support multiple 5G communication interfaces e.g., cellular (Uu), sidelink (PC5). A 5G RAN-based solution is proposed in this paper to dynamically select and change the communication interface that is suitable for a V2X service, considering radio and road conditions. The com…