Search results for "ta113"
showing 10 items of 530 documents
On the Students' QoS-Awareness of Video Lectures
2016
Video lectures bring flexibility and enable distance learning in education. With the help of videos, educational organizations are able to serve a wider and more heterogeneous group of students. As streaming videos have become essential part of teaching in higher education, quality of service (QoS) issues should be taken more into consideration. However, systematic quality monitoring of video lecture delivery, to our knowledge, is rarely used in a way that would provide also the student with quality information. This paper describes our ongoing research on developing a streaming video quality evaluation tool integrated in a learning environment that our master’s students use. The tool serve…
Combining PCA and multiset CCA for dimension reduction when group ICA is applied to decompose naturalistic fMRI data
2015
An extension of group independent component analysis (GICA) is introduced, where multi-set canonical correlation analysis (MCCA) is combined with principal component analysis (PCA) for three-stage dimension reduction. The method is applied on naturalistic functional MRI (fMRI) images acquired during task-free continuous music listening experiment, and the results are compared with the outcome of the conventional GICA. The extended GICA resulted slightly faster ICA convergence and, more interestingly, extracted more stimulus-related components than its conventional counterpart. Therefore, we think the extension is beneficial enhancement for GICA, especially when applied to challenging fMRI d…
Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware
2013
Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware strategies can not help to de tect malware unseen previously nor deal with code obfuscation te ch- niques employed by malware designers. In our study, the prob lem of malware detection and classification is solved by applyin g a data-mining-based approach that relies on supervised mach ine- learning. Executable files are presented in the form of byte a nd opcode sequences and n-gram models are employed to extract essential features from these sequences. Feature vectors o btained are…
Potku – New analysis software for heavy ion elastic recoil detection analysis
2014
Time-of-flight elastic recoil detection (ToF-ERD) analysis software has been developed. The software combines a Python-language graphical front-end with a C code computing back-end in a user-friendly way. The software uses a list of coincident time-of- flight–energy (ToF–E) events as an input. The ToF calibration can be determined with a simple graphical procedure. The graphical interface allows the user to select different elements and isotopes from a ToF–E histogram and to convert the selections to individual elemental energy and depth profiles. The resulting sample composition can be presented as relative or absolute concentrations by integrating the depth profiles over user-defined rang…
High speed microfluidic prototyping by programmable proximity aperture MeV ion beam lithography
2013
Abstract Microfluidics refers to the science and technology for controlling and manipulating fluids that flow along microchannels. For the development of complex prototypes, many microfluidic test structures are required first. Normally, these devices are fabricated via photolithography. This technique requires a photomask for transferring a pattern to photoresists by exposing with UV light. However, this method can be slow when a new structure is required to change. This is because a series of photomasks are needed, which is time consuming and costly. Here, we present a programmable proximity aperture lithography (PPAL) technique for the development of microfluidic prototype in poly(methyl…
IMEX schemes for pricing options under jump–diffusion models
2014
We propose families of IMEX time discretization schemes for the partial integro-differential equation derived for the pricing of options under a jump-diffusion process. The schemes include the families of IMEX-midpoint, IMEX-CNAB and IMEX-BDF2 schemes. Each family is defined by a convex combination parameter [email protected]?[0,1], which divides the zeroth-order term due to the jumps between the implicit and explicit parts in the time discretization. These IMEX schemes lead to tridiagonal systems, which can be solved extremely efficiently. The schemes are studied through Fourier stability analysis and numerical experiments. It is found that, under suitable assumptions and time step restric…
Understanding differences among coding club students
2014
Scholars and instructors have been carrying out a multitude of actions to increase students' interest in computer science during the past years. Still, there is a need for knowledge on how these attempts develop student interest. In this qualitative study, we construct illustrative categories out of students who have attended our K-12 coding club and game programming summer course activities. We found four categories: Inactivity, Lack of self-direction, Experimenting, and Professionalism. We also briefly project this abstraction onto a four-phase model of interest development.
A Stochastic Algorithm Based on Fast Marching for Automatic Capacitance Extraction in Non-Manhattan Geometries
2014
WOS:000346854900026 (Nº de Acesso Web of Science) We present an algorithm for two- and three-dimensional capacitance analysis on multidielectric integrated circuits of arbitrary geometry. Our algorithm is stochastic in nature and as such fully parallelizable. It is intended to extract capacitance entries directly from a pixelized representation of the integrated circuit (IC), which can be produced from a scanning electron microscopy image. Preprocessing and monitoring of the capacitance calculation are kept to a minimum, thanks to the use of distance maps automatically generated with a fast marching technique. Numerical validation of the algorithm shows that the systematic error of the algo…
Cluster-Based RF Fingerprint Positioning Using LTE and WLAN Outdoor Signals
2015
In this paper we evaluate user-equipment (UE) positioning performance of three cluster-based RF fingerprinting methods using LTE and WLAN signals. Real-life LTE and WLAN data were collected for the evaluation purpose using consumer cellular-mobile handset utilizing ‘Nemo Handy’ drive test software tool. Test results of cluster-based methods were compared to the conventional grid-based RF fingerprinting. The cluster-based methods do not require grid-cell layout and training signature formation as compared to the gridbased method. They utilize LTE cell-ID searching technique to reduce the search space for clustering operation. Thus UE position estimation is done in short time with less comput…
Smart Educational Process Based on Personal Learning Capabilities
2017
Personalized learning is increasingly gaining popularity, especially with the development of information technology and modern educational resources for learning. Each person is individual and has different knowledge background, different kind of memory, different learning speed. Teacher can adapt learning course, learning instructions or learning material according to the majority of learners in class, but that means that learning process is not adapted to the personality of each individual learner. That is why it is important to have smart educational process based on personal learning capabilities. This paper presents a literature survey on different learning systems which detects learni…