Human computer Interaction (HCI) based interface modeling techniques can be employed in designing interactions. They provide complete mechanism for the design of an interactive interface in analysis and design phases ...
详细信息
Piezoelectric materials can be used to convert mechanical energy, such as vibration into electrical energy which can be used to power up devices in a smart dust sensing network. This piezoelectric mechanism exhibits g...
详细信息
Context-aware computing is an emerging computing paradigm that provides intelligent context-aware application. Its core idea is to have computers understand the real world so that human-computer interactions can happe...
详细信息
The proceedings contain 98 papers. The topics discussed include: requirements of software quality assurance model;developing a new air pollution dispersion model with chemical reactions based on multiple cell approach...
ISBN:
(纸本)9780769539379
The proceedings contain 98 papers. The topics discussed include: requirements of software quality assurance model;developing a new air pollution dispersion model with chemical reactions based on multiple cell approach;prediction of air pollution of Boushehr city using data mining;research and application of a data-driven platform for sustainable development of energy, economy and environment;air mass factor calculations based on support vector regression machine;urban wetland ecosystem: function, challenge and strategy;simulation and assessment of mine landscape reconstruction using analogue landform and environmental design criteria;analyses of the impact of learning styles and strategies of learners in distance education: educational issues into digital opportunities;rule inducted models for classifying water quality using diatoms as bio-indicators;and computer design and simulation of built environment;application to forest.
With the ever decreasing emissions requirements, constantly increasing fuel economy and drivability demands, we now see the fact that, engine management and control has been a mainstay in engine system design since it...
详细信息
Computing instruction typically lags "state of the art" hardware and software development. With the advent of dual and quad core processors, parallel processing has become common even economy lap top compute...
详细信息
ISBN:
(纸本)9780889868168
Computing instruction typically lags "state of the art" hardware and software development. With the advent of dual and quad core processors, parallel processing has become common even economy lap top computers are dual core. Students need to be instructed on how to take advantage of this processing power. A common and easily developed software tool is the invocation of remote methods communicated via a threaded master. This paper shares the experiences of a project implemented by a student that compares compiled, hybrid, and scripted languages for distributing data among workers. The paper suggests projects of this type are easily within the grasp of students in a Data Structures or more advanced classes.
We developed an instruction analysis tool for acquiring the design skill to think of the specification for implementing the instruction. The instruction is split into semantic divisions and function divisions, and the...
详细信息
ISBN:
(纸本)9789868473539
We developed an instruction analysis tool for acquiring the design skill to think of the specification for implementing the instruction. The instruction is split into semantic divisions and function divisions, and the correspondences of the semantic and functional divisions are visually analyzed. Since each function division indicates each hardware operation, the user can clearly understand the relationship between the instruction specification and the hardware operation that implements it. This instruction analysis tool gives the design skill that thinks of the specification for implementing instructions.
In this paper, we developed, through the scientific and systematic processes, a scale that can measure the computer Ethic Awareness (CEA) of the middle school students. Then, the validity and reliability of the scale ...
详细信息
In this paper, we developed, through the scientific and systematic processes, a scale that can measure the computer Ethic Awareness (CEA) of the middle school students. Then, the validity and reliability of the scale were verified. For this, first, we identified four major indices that consist of the CEA through meta-analysis and then, they are validated by experts. Second, we extracted 22 sub-factors related to the CEA by applying the Delphi technique with public middle school teachers teaching the computer Ethic, university professors, and professional researchers at the computer ethic related institutes in Korea. Third, we identified 33 items reflecting the cognitive and moral development characteristics of the middle school students to measure CEA. Finally, we verified the validity and reliability of the CEA scale items through statistical methods.
Automatic train protection (ATP) system is a safety critical application for railway signaling with high logic complexity, and it is typically embedded and real-time demanded. As the computational complexity of ATP sy...
详细信息
computer Security and Forensics is an emerging academic discipline in which there are many challenges facing educational institutions in teaching, from both an educational and technical perspective. The School of Comp...
详细信息
ISBN:
(纸本)9781424446148
computer Security and Forensics is an emerging academic discipline in which there are many challenges facing educational institutions in teaching, from both an educational and technical perspective. The School of Computing in Dublin Institute of technology offers two Security and Forensic Computing modules, a 4th year BSc (Hons) module and an MSc module. Currently the BSc module requires a practical section to the course while the MSc module does not require practical work. In order to aid teaching during the next semester, both sets of students will be exposed to a Security and Forensics practical laboratory. This series of research proposes a phased approach to design and establish a suitable overall environment to provide a comprehensive computer Security and Forensics practical laboratory. The three identifiable components are (1) an isolated networked environment, (2) an exposed repository to be used to demonstrate vulnerabilities and (3) the formation of a Security and Forensics toolkit to be used in conjunction with the isolated network environment and the exposed repository. This first paper, in a series of three, will introduce the reader to the overall research objective. It will then focus on research and development of the first identified component, namely an isolated network environment.
暂无评论