Learning Object (LO) is one of the main research topics in the E-Learning community in the recent years, and most researchers pay attention to the issue of Learning Object Reusability. The most obvious motivation is t...
详细信息
Learning Object (LO) is one of the main research topics in the E-Learning community in the recent years, and most researchers pay attention to the issue of Learning Object Reusability. The most obvious motivation is the economic interest of reusing learning material instead of repeatedly authoring it. Reusability requires the LO to be in a fine-grain form because raw media elements are often much easier to reuse than aggregate assemblies. In other words, as the LO size decreases (lower granularity), its potential for reuse increases. Therefore, when designing learning objects, reusability must be considered as a key consideration. This paper shows how we adapted and applied some of the metrics from the software engineering field for the purpose of measuring reusability of learning objects.
Paper deals with industrial realization of feedback control of demanding applications on theirs control, control algorithms and visualization together with real time control from MATLAB/Simulink Environment. Paper sho...
详细信息
Paper deals with industrial realization of feedback control of demanding applications on theirs control, control algorithms and visualization together with real time control from MATLAB/Simulink Environment. Paper shows direct connection and implementation way of designed control schemas of prepared applications to an industrial WinPLC. Described is a way to produce a permanent solution in control applications that are fully prepared, designed and implemented directly from MATLAB/Simulink to the target control platform. As a part, the mentioned solution is using a multiplatform control system REX as a bridge between MATLAB and target platforms. These methods allow minimizing costs of development of control of applications, because it produces target permanent realizations in comparison to classical development methods that usually need expensive real time measurement cards and produce only one purpose development solution.
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in...
详细信息
ISBN:
(纸本)9781424451012
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies directed to limited number of threats traced in healthcare system. Thus it introduces bias in threat analysis. This study explored the use of biological computational termed Genetic Algorithm (GAs) combined with Cox regression (CoRGA) in identifying a potential threat for healthcare system. The results show that variable described “misused of e-mail” is the major information security threats for healthcare system. Results were compared with manual analysis using the same data, and it is shows that GAs not just introducing new threats for healthcare system but it was similar with others threats proposed by previous researches.
The 3S (Shrinking-Search-Space) multi-thresholding method which have been used for segmentation of medical images according to their intensities, now have been implemented and compared with FCM method in terms of segm...
详细信息
The 3S (Shrinking-Search-Space) multi-thresholding method which have been used for segmentation of medical images according to their intensities, now have been implemented and compared with FCM method in terms of segmentation quality and segmentation time as a benchmark in thresholding. The results show that 3S method produced almost the same segmentation quality or in some occasions better quality than FCM, and the computation time of 3S method is much lower than FCM. This is another superiority of this method with respect to others. Also, the performance of C-means has been compared with two other methods. This comparison shows that, C-means is not a reliable clustering algorithm and it needs several run to give us a reliable result.
This paper presents a case study of development of a 6-axis robotic arm controller. The robot is powered by a hydraulic pump. The position of each axis can be derived from its potentiometer voltage. At each and every ...
详细信息
This paper presents a case study of development of a 6-axis robotic arm controller. The robot is powered by a hydraulic pump. The position of each axis can be derived from its potentiometer voltage. At each and every axis, a servo-valve is employed to control a servo motor. Its relative velocity is related to the servo-valve input. With 2 nd order PID controller, a micro-controller commands movements of all axes. The PID inputs are the six voltages from potentiometers and its outputs are the six DC voltages, which command the six servo-valves. A trajectory file is generated by solving the inverse kinematics problem with some (angular to digital value) conversions. A special case; closed-form calculation is developed to solve kinematics problem. With some constraints it only yields one solution. Experiments show that robot follow the given trajectory with acceptable errors.
In this review, we have discussed about approaches in pathway based microarray analysis. Commonly, there are two approaches in pathway based analysis, Enrichment Score and Supervised Machine Learning. These pathway ba...
详细信息
ISBN:
(纸本)9781424437740
In this review, we have discussed about approaches in pathway based microarray analysis. Commonly, there are two approaches in pathway based analysis, Enrichment Score and Supervised Machine Learning. These pathway based approaches usually aim to statistically define significant pathways that related to phenotypes of interest. Firstly we discussed an overview of pathway based microarray analysis and its general flow processes in scoring the pathways, the methods applied in both approaches, advantages and limitations based on current researches, and pathways database used in pathway analysis. This review aim to provide better understanding about pathway based microarray analysis and its approaches.
We present a mean-field theory to describe volume phase transitions of side-chain liquid crystalline (LC) gels, accompanied by isotropic-nematic-smectic-A phase transitions. Three different uniaxial nematic phases (N1...
详细信息
We present a mean-field theory to describe volume phase transitions of side-chain liquid crystalline (LC) gels, accompanied by isotropic-nematic-smectic-A phase transitions. Three different uniaxial nematic phases (N1, N2, and N3) and smectic-A phases (S1, S2, and S3) are defined by using orientational order parameter Sm of side-chain liquid crystals (mesogens), Sb of semiflexible backbone chains, and a translational order parameter σ for a smectic-A phase. We derive the free energy for smectic-A phases of side-chain LC gels dissolved in an isotropic solvent and examine the swelling curve of the LC gel, the orientational order parameters, and the deformation of the LC gel as a function of temperature. We find that the LC gel discontinuously changes the volume at an isotropic-nematic, an isotropic-smectic-A, and a nematic-smectic-A phase transition.
Problem-based Learning (PBL) has been widely used in various professional educations. But, why the movement of PBL advances to IT education still far behinds? The reason is very simple - firstly, educators under PBL p...
详细信息
ISBN:
(纸本)9780889867895
Problem-based Learning (PBL) has been widely used in various professional educations. But, why the movement of PBL advances to IT education still far behinds? The reason is very simple - firstly, educators under PBL pedagogy have much more workload and duties than under the traditional IT teaching methods, such as, PBL activities design, students discussion guidance, formative assessments and etc. Secondly, the large student numbers and limited staff in most of the IT undergraduate classrooms hinder interested IT educators to accept PBL. Contrary, to face the new challenges of the e-Learning generation, IT education ought to combine their original teaching method with PBL pedagogy as a result to form an improved bi-directional pedagogy - when technologies are ready to support more problem/solution discussions online. This paper promotes PBL for IT education. The study positions educators at the center role to inspect PBL discipline from four perspectives: (1) problems (2) students (3) tutors and (4) assessments;consequently, suggesting the bottleneck of PBL workload for the interested IT educators. In this paper, to release the IT staff shortage for implementing PBL pedagogy, the conclusion has advised IT developing "computer tutors" from four perspectives, as the paper suggested, to save the workload for educators.
Automatic font-written Optical Character Recognition (OCR) is highly desirable for numerous modern information technology (IT) applications. Reliable font-written OCR's for Latin scripts are readily in use since l...
详细信息
Automatic font-written Optical Character Recognition (OCR) is highly desirable for numerous modern information technology (IT) applications. Reliable font-written OCR's for Latin scripts are readily in use since long. For cursively scripted languages, that are the mother tongues of over one fourth of the world population, such OCR's are however not available at a robust and reliable performance. In this regard, the main challenge is the mandatory connectivity of characters/ligatures (i.e. graphemes) that has to be resolved simultaneously upon the recognition of these graphemes. Among the various approaches tried over decades, Hidden Markov Models (HMM)-based OCR's seem to be the most promising as they capitalize on the ability of HMM decoders to achieve segmentation and recognition simultaneously similar to the widely used HMM-based automatic speech recognition (ASR). Unlike ASR's, what is missing in HMM-based OCR's is the definition of a rigorously founded features vector capable to robustly achieving minimal “font type/size-independent” (omnifont) word error rates comparable to those realized with Latin scripts. Here comes the contribution of this paper that introduces such a sound features vector design, and experimentally shows its superiority in this regard.
For a species to develop in nature basically two things are needed: An enabling technology and a "niche". In spacecraft design the story is the same. Both a suitable technology and a niche application need t...
ISBN:
(纸本)9781615679089
For a species to develop in nature basically two things are needed: An enabling technology and a "niche". In spacecraft design the story is the same. Both a suitable technology and a niche application need to be there before a new generation of spacecraft can be developed. In the last century two technologies have emerged which had and still have a huge impact on the development of technical systems: Micro-Electronics (ME) and Micro-systems Technology (MST). Many different terrestrial systems have changed dramatically since the introduction of ME and MST and many new systems have emerged. In the same period many nano-satellites have been built and launched and shown that they can perform in space. Still it is not clear what the specific role of these small satellites will be. Where will they go? What will they do?.
暂无评论