The rapid progress of computer and network technologies has attracted educational researchers to study the strategies and the effects of applying information technology in learning activities. Although previous resear...
详细信息
The rapid progress of computer and network technologies has attracted educational researchers to study the strategies and the effects of applying information technology in learning activities. Although previous research demonstrated the benefits of applying information technologies to learning process, its difficulty was also reveled. One of the major difficulties is owing to the lack of a learning environment that can record the learning portfolio of using information technologies in education, such that the teacher can analyze and evaluate the learning performance of students, and hence the teaching strategies can be adjusted accordingly. In this paper, we propose a Web-search learning environment based on meta-index approach, which is able to assist the teachers in analyzing student learning behaviors of using search engines for problem solving. An experiment on 161 K4 students has been conducted to evaluate the benefits of this approach. Experimental results showed that the novel approach is able to assist the teachers to acquire more about the learning status of students, and hence more constructive suggestions can be given accordingly.
Standard IP multicast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on th...
详细信息
Standard IP multicast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on the use of an extended version of the Host Identity Protocol. The applicability of the model is demonstrated for peer-to-peer multicasting and for non-shared media access networks. A formal validation of a two-layer peer-to-peer network based on this architecture has been completed.
Local atomic arrangement in heterostructures or disorder due to alloying, surface roughness and impurities strongly influence the bandstructure and charge transport. With decreasing diameters down to nanometer scales,...
Local atomic arrangement in heterostructures or disorder due to alloying, surface roughness and impurities strongly influence the bandstructure and charge transport. With decreasing diameters down to nanometer scales, disorder can no longer be treated in an average manner using the virtual crystal approximation (VCA) and the need for atomistic simulations arises. This work looks at the nanoscale devices from two different perspectives. The materials science perspective in which average bandstructure of the whole nanowire is computed using the nanoelectronic modeling tool (NEMO‐3D) and the zone‐unfolding algorithm. The device physics perspective, where the transmission coefficient is calculated with an atomistic non‐equilibrium Green’s function (NEGF) approach. Both approaches use 20 band sp3d5s* empirical tight‐binding model with spin orbit coupling. The connection between dispersions and transmission coefficients of AlGaAs random alloy nanowires is highlighted. Both, transmission coefficients and average bandstructures show reduced bandgaps and noisy behavior. Their complimentary and mutually supporting nature provides a significant insight into the physics of charge transport through disordered systems.
With the increased penetration of wind power it is important to carefully asses the impact of grid integration of wind turbine generators. Accurate wind turbine generator models are required for this purpose. Variable...
详细信息
With the increased penetration of wind power it is important to carefully asses the impact of grid integration of wind turbine generators. Accurate wind turbine generator models are required for this purpose. Variable speed wind turbine generators are widely being interconnected to the grid to ensure optimum power capture from the wind energy. In this paper, an attempt is made to validate a variable speed doubly fed induction generator model with the field test results. The GE 1.5 MW wind turbine generator is a good example of doubly fed induction generator configuration which is already implemented in PSS/E software. These wind turbine generators are actually installed in the AIM Erie Shore Wind Generating Station of Hydro One network Inc. A series of tests were performed in this wind farm in 2006 winter. A few of the tests are simulated in PSS/E to validate the existing models. Simulation results are found to be in good agreement with the field test results confirming the accuracy of the GE 1.5 MW Wind Turbine Generator (WTG) models of PSS/E wind. The reasons for the mismatch between the simulation and actual results are also pointed out.
Recently, cryptographic applications based on finite fields have attracted much attention. The most demanding finite field arithmetic operation is multiplication. This investigation proposes a new multiplication algor...
详细信息
Recently, cryptographic applications based on finite fields have attracted much attention. The most demanding finite field arithmetic operation is multiplication. This investigation proposes a new multiplication algorithm over GF(2^m) using the dual basis representation. Based on the proposed algorithm, a parallel-in parallel-out systolic multiplier is presented, The architecture is optimized in order to minimize the silicon covered area (transistor count). The experimental results reveal that the proposed bit-parallel multiplier saves about 65% space complexity and 33% time complexity as compared to the traditional multipliers for a general polynomial and dual basis of GF(2^m).
Home services are all kind of services which are provided in home environment. Legacy Researches was focused on controlling home devices and appliances. And recent works focus on the multimedia services. In the future...
详细信息
Home services are all kind of services which are provided in home environment. Legacy Researches was focused on controlling home devices and appliances. And recent works focus on the multimedia services. In the future, devices existing in the home would infer the status and intention of users and provide intelligent home services without much intervention of users. To do this, there must be context-aware technologies [1]. This research focused on the ontology which is the core technology of the context information management [2]. Through developing ontology for the home services, we classified services into several categories and, described requirements for the service execution. And then, we adopted the ontology for the intelligent home service framework called iHSF. Ontology designed for the home services consists of the concept of users, places (semantic locations), environment around the specific places, devices and individual services and subordinate concepts of them, which all concepts have properties and relations among them [2]. Ontology for the iHSF has form of RDF (Resource Description Framework) [3, 4, 5] and OWL (Web Ontology Language) [6, 7] in order to be interpreted by devices. Ontology should mirror the constantly varying environment of the home dynamically. iHSF using well-designed ontology reacts to the constantly varying context on a real time basis.
Because fault-based attacks on cryptosystems have been proven effective, fault diagnosis and tolerance in cryptography have started a new surge of research and development activity in the field of applied cryptography...
详细信息
Because fault-based attacks on cryptosystems have been proven effective, fault diagnosis and tolerance in cryptography have started a new surge of research and development activity in the field of applied cryptography. Without magnitude comparisons, the Montgomery multiplication algorithm is very attractive and popular for Elliptic Curve Cryptosystems. This paper will design a Montgomery multiplier array with a bit-parallel architecture in GF(2(m)) with concurrent error detection capability to protect it against fault-based attacks. The robust Montgomery multiplier array with concurrent error detection requires only about 0.2% extra space overhead (if m = 512 is as an example) and requires four extra clock cycles compared to the original Montgomery multiplier array without concurrent error detection.
In this paper, we propose a novel QoS guaranteed algorithm for real-time applications in IEEE 802.15.4 protocol. The IEEE 802.15.4 standard provides a Guaranteed Time Slot (GTS) mechanism to allocate a specific durati...
详细信息
In this paper, we propose a novel QoS guaranteed algorithm for real-time applications in IEEE 802.15.4 protocol. The IEEE 802.15.4 standard provides a Guaranteed Time Slot (GTS) mechanism to allocate a specific duration within a superframe structure for time-critical transmissions. However, there are many weak points to support real-time applications. We suggest a new slot allocation algorithm that enables guaranteed services to be more efficient. The proposed algorithm also allocates a new guaranteed time slot dynamically to support real-time applications which have periodic messages. We evaluate the delay bounds and the throughput of the proposed scheme compared with original protocol. We then show that our proposal improves the bandwidth utilization and guarantees real-time features more strictly.
Efficient lookup is essential for peer-to-peer networks and Chord is a representative peer-to-peer lookup scheme based on distributed hash table (DHT). In peer-to-peer networks, each node maintains several unidirectio...
详细信息
Efficient lookup is essential for peer-to-peer networks and Chord is a representative peer-to-peer lookup scheme based on distributed hash table (DHT). In peer-to-peer networks, each node maintains several unidirectional application layer links to other nodes and forwards lookup messages through such links. This paper proposes use of bidirectional links to improve the lookup performance in Chord. Every original unidirectional link is replaced by a bidirectional link, and accordingly every node becomes an anti-finger of all its finger nodes. Both theoretical analyses and experimental results indicate that these anti-fingers can help improve the lookup performance greatly with very low overhead.
Semantic Web is a vision for future of the current Web which aims at automation, integration and reuse of data among different Web applications. Access to resources on the Semantic Web can not be controlled in a safe ...
详细信息
Semantic Web is a vision for future of the current Web which aims at automation, integration and reuse of data among different Web applications. Access to resources on the Semantic Web can not be controlled in a safe way unless the access decision takes into account the semantic relationships among entities in the data model under this environment. Decision making for permitting or denying access requests by assuming entities in isolation and not considering their interrelations may result in security violations. In this paper, we present a Semantic Based Access Control model (SBAC) which considers this issue in the decision making process. To facilitate the propagation of policies in these three domains, we show how different semantic interrelations can be reduced to the subsumption problem. This reduction enhances the space and time complexity of the access control mechanisms which are based on SBAC. Our evaluations of the SBAC model along with experimental results on a sample implementation of the access control system show that the proposed model is very promising.
暂无评论