With the social progress and the continuous development of artificial intelligence, medical diagnosis expert systems have become an indispensable supplementary means of medical. Expert system knowledge acquisition is ...
详细信息
This paper is a survey of the process and technology used in sound design for video games. The first part of the paper addresses the general state of the art in the design of video games: market and technology constra...
详细信息
Previous research in STEM education demonstrates that students are engaged in a continuous process of identity development, trying to integrate their educational experiences with their perception of who they are, and ...
详细信息
ISBN:
(纸本)9781479935918
Previous research in STEM education demonstrates that students are engaged in a continuous process of identity development, trying to integrate their educational experiences with their perception of who they are, and who they wish to become. It appears increasingly apparent from this body of research that students are not well supported in this process by the education they currently receive. The goal of this paper is to analyse a specific aspect of the student experience, participation, in order to gain a better understanding of how computer science (CS) and information technology (IT) students engage with CS prior to and during their studies. Drawing on student interview data we describe and discuss students' qualitatively different ways of experiencing participation in CS and IT. The notion of participation applied here is inspired by Wenger's notion of participation in his social theory of learning. A phenomenographic analysis identifies a spectrum of qualitatively distinct ways in which the students experience participation in CS and IT, ranging from "using", to participation as "continuous development", and "creating new knowledge".
Pediatric skull deformity requires immediate surgery as indicated by increased cranial pressure, mental retardation, impaired or absent vision, cranial deformity, and mental and spiritual defects. This study explores ...
详细信息
Pediatric skull deformity requires immediate surgery as indicated by increased cranial pressure, mental retardation, impaired or absent vision, cranial deformity, and mental and spiritual defects. This study explores the application value of computer aided simulation in treatment of pediatric skull deformity. The application of computer simulation surgery in the treatment of children with pediatric skull deformity allows surgeons to be familiar with the operation process in advance. The use of computer 3D digital technology for preoperative design planning and simulation can reduce surgical difficulty to a certain extent, improve surgical efficiency, significantly increase intraoperative accuracy, and also reduce the risk of intraoperative bleeding and postoperative complications.
In recent years, with the continuous development of data technology, especially with the continuous improvement and research and development of software systems, software development has become a very complex system e...
详细信息
Animal traceability is crucial to human health in food safety. It is one of the most concerned issues in developed countries. Animal backgrounds including feeding, decease, medicine, vaccine, health check, movement, a...
详细信息
ISBN:
(纸本)9781424421015
Animal traceability is crucial to human health in food safety. It is one of the most concerned issues in developed countries. Animal backgrounds including feeding, decease, medicine, vaccine, health check, movement, and so on, are essential information for customers to ensure the safety of the meat they purchased. Thailand exports economic animals, e.g., swine and poultry, to other countries. Therefore, it is needed to prepare the animal traceability system to support such requirements. This paper presents the conceptual framework for the development of Thailand economic animal traceability system to serve as a guideline to the implementation of food safety in meat supply chain.
The author presents a 'how to' approach to producing a technology and development book, which contains a collection of papers by the technical personnel who develop a product. He focuses on the editor's ro...
详细信息
The author presents a 'how to' approach to producing a technology and development book, which contains a collection of papers by the technical personnel who develop a product. He focuses on the editor's role in producing such a book but also provides information for contributing authors. He discusses much of the strategy used to produce the IBM 9370 Enterprise System (ES): technology and development book, which contains 27 papers by 51 authors about such diverse topics as computer architecture design, circuit packaging enhancements, and operating system tools. Although the example focuses on computing systems, the principles elaborated can be used to create a technology book for almost any product.
This paper presents a novel software model for public crisis management system in the modern city. Urban emergency such as various hazards will result in serious casualties and property loss. With the development of i...
详细信息
In the era of big data, artificial intelligence as a new technology is developing rapidly and gradually penetrating into various fields, including computer networks. This paper aims to summarize the development of art...
详细信息
ISBN:
(纸本)9798400716959
In the era of big data, artificial intelligence as a new technology is developing rapidly and gradually penetrating into various fields, including computer networks. This paper aims to summarize the development of artificial intelligence and computer network technology in the era of big data, and explore the advantages and applications of artificial intelligence in computer networks. First of all, this paper summarizes the general characteristics of artificial intelligence and computer network technology in the era of big data. Secondly, the advantages of artificial intelligence in computer networks are discussed. Artificial intelligence can provide intelligent network management and optimization schemes. Ai can also be applied in the field of cyber security to provide better cyber security protection by automatically identifying and blocking malicious attacks. In addition, AI can also be used for network fault diagnosis and prediction, providing more timely and accurate fault handling. Artificial immunity technology can detect and respond to cyber attacks by building a network immune system. Problem solving technology can use machine learning algorithms to solve complex problems in the network, and data mining technology can mine valuable information and patterns from big data to provide support for network decision-making and optimization. Finally, this paper will further elaborate the application of artificial intelligence in computer networks through practical research. Through these studies, the advantages and potential of artificial intelligence in computer networks can be more fully understood.
This paper proposes the use of patterns to be used along with the Component-Based development (CBD) approach. Patterns aim documenting, recovering and, mainly, capturing composition and functionalities of the componen...
详细信息
ISBN:
(纸本)0889865450
This paper proposes the use of patterns to be used along with the Component-Based development (CBD) approach. Patterns aim documenting, recovering and, mainly, capturing composition and functionalities of the components in order to obtain software reuse. Definitions of patterns and examples of applications are presented, as well as the references made to components within some expressive methods concerning patterns. The tailoring and integration of patterns with components is used to conclude that the concepts and structures widely used by patterns are feasible to be applied to model not just objects and classes, but also components as addressed by CBD approaches. As a result, it is proposed that CBD should make use of some pattern methods and techniques to leverage reuse in all stages of the lifecycle, independently from the paradigm being used and component development process and notation adopted.
暂无评论