WorldWideScience

Sample records for technology keywords computer

  1. An Interval Estimation Method of Patent Keyword Data for Sustainable Technology Forecasting

    Directory of Open Access Journals (Sweden)

    Daiho Uhm

    2017-11-01

    Full Text Available Technology forecasting (TF is forecasting the future state of a technology. It is exciting to know the future of technologies, because technology changes the way we live and enhances the quality of our lives. In particular, TF is an important area in the management of technology (MOT for R&D strategy and new product development. Consequently, there are many studies on TF. Patent analysis is one method of TF because patents contain substantial information regarding developed technology. The conventional methods of patent analysis are based on quantitative approaches such as statistics and machine learning. The most traditional TF methods based on patent analysis have a common problem. It is the sparsity of patent keyword data structured from collected patent documents. After preprocessing with text mining techniques, most frequencies of technological keywords in patent data have values of zero. This problem creates a disadvantage for the performance of TF, and we have trouble analyzing patent keyword data. To solve this problem, we propose an interval estimation method (IEM. Using an adjusted Wald confidence interval called the Agresti–Coull confidence interval, we construct our IEM for efficient TF. In addition, we apply the proposed method to forecast the technology of an innovative company. To show how our work can be applied in the real domain, we conduct a case study using Apple technology.

  2. Technology for All: Turning a Keyword into a School Subject in Post-War Sweden

    Science.gov (United States)

    Hultén, Magnus

    2013-01-01

    The decades following the Second World War saw strong technological development and economic growth. They also saw "the advent of technology education", a period of extensive curriculum development in this field. But what was done and why? In order to obtain a better understanding of the historical roots of technology education, in this…

  3. Technology, Pedagogy and On line materials: Keywords in developing On line Education

    DEFF Research Database (Denmark)

    Georgsen, Marianne; Bennedsen, Jens

    2003-01-01

    Quality techniques to support their efforts. In order to ensure the highest experience has shown that it is useful for teachers to have tools and teaching, lecturers are instrumental in the development process and and mutually interdependent. When it comes to developing flexible ICT-supported one...... flexible ICT-supported and reflective and critical thinking about use of technology. This paper and learning, development must be based on systematic pedagogical reflections a high degree of flexibility in online education....

  4. Brief: Managing computing technology

    International Nuclear Information System (INIS)

    Startzman, R.A.

    1994-01-01

    While computing is applied widely in the production segment of the petroleum industry, its effective application is the primary goal of computing management. Computing technology has changed significantly since the 1950's, when computers first began to influence petroleum technology. The ability to accomplish traditional tasks faster and more economically probably is the most important effect that computing has had on the industry. While speed and lower cost are important, are they enough? Can computing change the basic functions of the industry? When new computing technology is introduced improperly, it can clash with traditional petroleum technology. This paper examines the role of management in merging these technologies

  5. Optimizing Computer Technology Integration

    Science.gov (United States)

    Dillon-Marable, Elizabeth; Valentine, Thomas

    2006-01-01

    The purpose of this study was to better understand what optimal computer technology integration looks like in adult basic skills education (ABSE). One question guided the research: How is computer technology integration best conceptualized and measured? The study used the Delphi method to map the construct of computer technology integration and…

  6. Computer technology and evolution

    OpenAIRE

    Mainzer, Klaus

    1998-01-01

    Computer technology and evolution : from artificial intelligence to artificial life. - In: Advances in the philosophy of technology / ed. by Evandro Agazzi ... - Newark, Del. : Soc. for Philosophy and Technology, 1999. - S. 105-119

  7. Available Computer Technologies.

    Science.gov (United States)

    Hales, H. Lee

    1984-01-01

    As the cost of computing decreases, computer aids are becoming readily available for facility planning, construction, and operation; three important technologies are decision support systems, computer-aided design, and management information systems. This article discusses the applications and availability of these systems, hardware and software…

  8. Computers boost structural technology

    Science.gov (United States)

    Noor, Ahmed K.; Venneri, Samuel L.

    1989-01-01

    Derived from matrix methods of structural analysis and finite element methods developed over the last three decades, computational structures technology (CST) blends computer science, numerical analysis, and approximation theory into structural analysis and synthesis. Recent significant advances in CST include stochastic-based modeling, strategies for performing large-scale structural calculations on new computing systems, and the integration of CST with other disciplinary modules for multidisciplinary analysis and design. New methodologies have been developed at NASA for integrated fluid-thermal structural analysis and integrated aerodynamic-structure-control design. The need for multiple views of data for different modules also led to the development of a number of sophisticated data-base management systems. For CST to play a role in the future development of structures technology and in the multidisciplinary design of future flight vehicles, major advances and computational tools are needed in a number of key areas.

  9. Computer architecture technology trends

    CERN Document Server

    1991-01-01

    Please note this is a Short Discount publication. This year's edition of Computer Architecture Technology Trends analyses the trends which are taking place in the architecture of computing systems today. Due to the sheer number of different applications to which computers are being applied, there seems no end to the different adoptions which proliferate. There are, however, some underlying trends which appear. Decision makers should be aware of these trends when specifying architectures, particularly for future applications. This report is fully revised and updated and provides insight in

  10. Keyword Search in Databases

    CERN Document Server

    Yu, Jeffrey Xu; Chang, Lijun

    2009-01-01

    It has become highly desirable to provide users with flexible ways to query/search information over databases as simple as keyword search like Google search. This book surveys the recent developments on keyword search over databases, and focuses on finding structural information among objects in a database using a set of keywords. Such structural information to be returned can be either trees or subgraphs representing how the objects, that contain the required keywords, are interconnected in a relational database or in an XML database. The structural keyword search is completely different from

  11. CLOUD COMPUTING TECHNOLOGY TRENDS

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-05-01

    Full Text Available Cloud computing has been a tremendous innovation, through which applications became available online, accessible through an Internet connection and using any computing device (computer, smartphone or tablet. According to one of the most recent studies conducted in 2012 by Everest Group and Cloud Connect, 57% of companies said they already use SaaS application (Software as a Service, and 38% reported using standard tools PaaS (Platform as a Service. However, in the most cases, the users of these solutions highlighted the fact that one of the main obstacles in the development of this technology is the fact that, in cloud, the application is not available without an Internet connection. The new challenge of the cloud system has become now the offline, specifically accessing SaaS applications without being connected to the Internet. This topic is directly related to user productivity within companies as productivity growth is one of the key promises of cloud computing system applications transformation. The aim of this paper is the presentation of some important aspects related to the offline cloud system and regulatory trends in the European Union (EU.

  12. Computational technologies advanced topics

    CERN Document Server

    Vabishchevich, Petr N

    2015-01-01

    This book discusses questions of numerical solutions of applied problems on parallel computing systems. Nowadays, engineering and scientific computations are carried out on parallel computing systems, which provide parallel data processing on a few computing nodes. In constructing computational algorithms, mathematical problems are separated in relatively independent subproblems in order to solve them on a single computing node.

  13. Computational technologies a first course

    CERN Document Server

    Borisov, Victor S; Grigoriev, Aleksander V 1; Kolesov, Alexandr E 1; Popov, Petr A 1; Sirditov, Ivan K 1; Vabishchevich, Petr N 1; Vasilieva, Maria V 1; Zakharov, Petr E 1; Vabishchevich, Petr N 0

    2015-01-01

    In this book we describe the basic elements of present computational technologies that use the algorithmic languages C/C++. The emphasis is on GNU compilers and libraries, FOSS for the solution of computational mathematics problems and visualization of the obtained data. Many examples illustrate the basic features of computational technologies.

  14. Computing technology in the 1980's. [computers

    Science.gov (United States)

    Stone, H. S.

    1978-01-01

    Advances in computing technology have been led by consistently improving semiconductor technology. The semiconductor industry has turned out ever faster, smaller, and less expensive devices since transistorized computers were first introduced 20 years ago. For the next decade, there appear to be new advances possible, with the rate of introduction of improved devices at least equal to the historic trends. The implication of these projections is that computers will enter new markets and will truly be pervasive in business, home, and factory as their cost diminishes and their computational power expands to new levels. The computer industry as we know it today will be greatly altered in the next decade, primarily because the raw computer system will give way to computer-based turn-key information and control systems.

  15. Principals' Relationship with Computer Technology

    Science.gov (United States)

    Brockmeier, Lantry L.; Sermon, Janet M.; Hope, Warren C.

    2005-01-01

    This investigation sought information about principals and their relationship with computer technology. Several questions were fundamental to the inquiry. Are principals prepared to facilitate the attainment of technology's promise through the integration of computer technology into the teaching and learning process? Are principals prepared to use…

  16. Collective spatial keyword querying

    DEFF Research Database (Denmark)

    Cao, Xin; Cong, Gao; Jensen, Christian S.

    2011-01-01

    With the proliferation of geo-positioning and geo-tagging, spatial web objects that possess both a geographical location and a textual description are gaining in prevalence, and spatial keyword queries that exploit both location and textual description are gaining in prominence. However, the quer......With the proliferation of geo-positioning and geo-tagging, spatial web objects that possess both a geographical location and a textual description are gaining in prevalence, and spatial keyword queries that exploit both location and textual description are gaining in prominence. However...

  17. Spatial Keyword Querying

    DEFF Research Database (Denmark)

    Cao, Xin; Chen, Lisi; Cong, Gao

    2012-01-01

    The web is increasingly being used by mobile users. In addition, it is increasingly becoming possible to accurately geo-position mobile users and web content. This development gives prominence to spatial web data management. Specifically, a spatial keyword query takes a user location and user...

  18. Cultural Keywords in Discourse

    DEFF Research Database (Denmark)

    . The Natural Semantic Metalanguage (NSM) approach is used as a unifying framework for the studies. This approach offers an attractive methodology for doing explorative discourse analysis on emic and culturally-sensitive grounds. Cultural Keywords in Discourse will be of interest to researchers and students...

  19. Computer Viruses. Technology Update.

    Science.gov (United States)

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  20. Moving Spatial Keyword Queries

    DEFF Research Database (Denmark)

    Wu, Dingming; Yiu, Man Lung; Jensen, Christian S.

    2013-01-01

    propose two algorithms for computing safe zones that guarantee correct results at any time and that aim to optimize the server-side computation as well as the communication between the server and the client. We exploit tight and conservative approximations of safe zones and aggressive computational space...

  1. [Earth Science Technology Office's Computational Technologies Project

    Science.gov (United States)

    Fischer, James (Technical Monitor); Merkey, Phillip

    2005-01-01

    This grant supported the effort to characterize the problem domain of the Earth Science Technology Office's Computational Technologies Project, to engage the Beowulf Cluster Computing Community as well as the High Performance Computing Research Community so that we can predict the applicability of said technologies to the scientific community represented by the CT project and formulate long term strategies to provide the computational resources necessary to attain the anticipated scientific objectives of the CT project. Specifically, the goal of the evaluation effort is to use the information gathered over the course of the Round-3 investigations to quantify the trends in scientific expectations, the algorithmic requirements and capabilities of high-performance computers to satisfy this anticipated need.

  2. Understanding computer and information technology

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-15

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  3. Computers: Educational Technology Paradox?

    Science.gov (United States)

    Hashim, Hajah Rugayah Hj.; Mustapha, Wan Narita

    2005-01-01

    As we move further into the new millennium, the need to involve and adapt learners with new technology have been the main aim of many institutions of higher learning in Malaysia. The involvement of the government in huge technology-based projects like the Multimedia Super Corridor Highway (MSC) and one of its flagships, the Smart Schools have…

  4. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  5. Computer Technology for Industry

    Science.gov (United States)

    1982-01-01

    Shell Oil Company used a COSMIC program, called VISCEL to insure the accuracy of the company's new computer code for analyzing polymers, and chemical compounds. Shell reported that there were no other programs available that could provide the necessary calculations. Shell produces chemicals for plastic products used in the manufacture of automobiles, housewares, appliances, film, textiles, electronic equipment and furniture.

  6. Hybrid keyword search auctions

    KAUST Repository

    Goel, Ashish

    2009-01-01

    Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1. We show that risk-seeking advertisers will choose only a per-impression bid whereas risk-averse advertisers will choose only a per-click bid, and argue that both kind of advertisers arise naturally. Hence, the ability to bid in a hybrid fashion is important to account for the risk characteristics of the advertisers. 2. For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, we show that having the extra information from the advertisers in the form of a per-impression bid can result in significantly higher revenue. 3. An advertiser who believes that its click-probability is much higher than the auctioneer\\'s estimate can use per-impression bids to correct the auctioneer\\'s prior without incurring any extra cost. 4. The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies to deal with the uncertainty in the click-probability using the same basic auction. The per-click and per-impression bidding schemes can only be used to implement two extreme cases of these strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. The

  7. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  8. Computer-generated slide technology.

    Science.gov (United States)

    Palmer, D S

    1994-03-01

    Presentation technology is available, and it does not have to be expensive. This article describes computer hardware and software concepts for graphics use, and recommends principles for making cost-effective buying decisions. Also included is a previously published technique for making custom computer graphic 35-mm slides at minimal expense. This information is vital to anyone lecturing without the support of a custom graphics laboratory.

  9. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  10. Keywords

    African Journals Online (AJOL)

    Femi

    delivery of PHC services in Sub-Sahara African nations. What is Quality of Health Care? The concept of quality in .... difficulty in getting transport to a health facility. He however noted that the unfriendly attitude of the health ... supervision, and financial and logistics management. Thus they view quality more from a population ...

  11. Keywords

    African Journals Online (AJOL)

    Femi

    Pre-tested structured, interviewer-administered questionnaire patterned after the WHO multi-country study questionnaire was the tool for data collection. Data was analyzed using IBM SPSS version 20.0 software. Bivariate analysis between socio-demographic variables and presence of domestic violence was done.

  12. Keywords

    African Journals Online (AJOL)

    Femi

    quitting. History of alcohol consumption and use of other psychoactive substances such as cannabis, cocaine, heroin and amphetamines was also obtained. All participants irrespective of smoking status were also assessed for their knowledge of the harmful health effects of tobacco smoking. “Is cigarette smoking dangerous ...

  13. Keywords

    African Journals Online (AJOL)

    Femi

    system and has the potential to touch the lives of most people, particularly at the grassroots of. Nigerian communities where health needs are most. 3 acute and intense. However, over and over again, this level of health. 4,5 care has been described as the weakest. Recent assessments of our national health indices show.

  14. Keywords:

    African Journals Online (AJOL)

    Femi

    prevalence of diabetes, information concerning. Nigerian physicians' knowledge, attitude and practices regarding diabetes care is scarce. The general medical practitioners are front-line healthcare providers in Nigeria. They, therefore, have an important role to play in the management of diabetes mellitus, particularly in this ...

  15. Keywords

    African Journals Online (AJOL)

    Femi

    tripling since 1990 in Nigeria, the prevalence rate for contraceptive use for any modern method in 2008 and 2013 were 9.7% and 9.8% respectively. Studies ... Family planning. Men. Spousal communication. Reproductive health decision making. Journal of Community Medicine and Primary Health Care. 28(1) 38-44 ...

  16. Keywords

    African Journals Online (AJOL)

    Femi

    management of PHC is still a tall dream and current efforts at making PHC more socially relevant all aim to improve utilization and. 7,8 sustainability of the PHC system. An important component of patients' participation in health care in their evaluation of the care they receive. This form of evaluation which had been. 9.

  17. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  18. Optical Computers and Space Technology

    Science.gov (United States)

    Abdeldayem, Hossin A.; Frazier, Donald O.; Penn, Benjamin; Paley, Mark S.; Witherow, William K.; Banks, Curtis; Hicks, Rosilen; Shields, Angela

    1995-01-01

    The rapidly increasing demand for greater speed and efficiency on the information superhighway requires significant improvements over conventional electronic logic circuits. Optical interconnections and optical integrated circuits are strong candidates to provide the way out of the extreme limitations imposed on the growth of speed and complexity of nowadays computations by the conventional electronic logic circuits. The new optical technology has increased the demand for high quality optical materials. NASA's recent involvement in processing optical materials in space has demonstrated that a new and unique class of high quality optical materials are processible in a microgravity environment. Microgravity processing can induce improved orders in these materials and could have a significant impact on the development of optical computers. We will discuss NASA's role in processing these materials and report on some of the associated nonlinear optical properties which are quite useful for optical computers technology.

  19. Computer technology and computer programming research and strategies

    CERN Document Server

    Antonakos, James L

    2011-01-01

    Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

  20. Top-k Keyword Search Over Graphs Based On Backward Search

    Directory of Open Access Journals (Sweden)

    Zeng Jia-Hui

    2017-01-01

    Full Text Available Keyword search is one of the most friendly and intuitive information retrieval methods. Using the keyword search to get the connected subgraph has a lot of application in the graph-based cognitive computation, and it is a basic technology. This paper focuses on the top-k keyword searching over graphs. We implemented a keyword search algorithm which applies the backward search idea. The algorithm locates the keyword vertices firstly, and then applies backward search to find rooted trees that contain query keywords. The experiment shows that query time is affected by the iteration number of the algorithm.

  1. Computer technology in institutional foodservice.

    Science.gov (United States)

    McCool, A C; Garand, M M

    1986-01-01

    A survey research study profiled foodservices and foodservice managers in health care and educational institutions that applied computer technology to their operations. The survey also examined the extent to which computers were applied to management and client service functions. Both the size and the type of institution were found to be significantly related to computer usage. The larger the institution, the greater the extent of indicated usage. Educational institutions used computers more than all types of health care institutions. Mainframe systems (time shared internally or externally) were the predominant computers used. Internal mainframe systems and minicomputers were used significantly more by educational institutions than by health care institutions. The manager most likely to use computers was a man of any age with at least a bachelor's degree who was employed full-time within the institution. He had taken at least six business management courses and had at least some understanding of and ability to apply systems management concepts to his daily management practices. Applications were categorized into five functional areas: menu, purchasing/storage, production, client service, and managerial information. Managerial information applications were most frequently reported by all respondents, with large institutions and elementary/secondary schools reporting the greatest usage for those applications. Several purchase/storage and production applications were significantly related to type or to size or to both, with large institutions and college/university foodservices reporting the greatest usage. Menu precosting was the only significant menu function, and that was significant only relative to institutional type. No client service functions were significantly related to either type or size.

  2. Computer technologies and institutional memory

    Science.gov (United States)

    Bell, Christopher; Lachman, Roy

    1989-01-01

    NASA programs for manned space flight are in their 27th year. Scientists and engineers who worked continuously on the development of aerospace technology during that period are approaching retirement. The resulting loss to the organization will be considerable. Although this problem is general to the NASA community, the problem was explored in terms of the institutional memory and technical expertise of a single individual in the Man-Systems division. The main domain of the expert was spacecraft lighting, which became the subject area for analysis in these studies. The report starts with an analysis of the cumulative expertise and institutional memory of technical employees of organizations such as NASA. A set of solutions to this problem are examined and found inadequate. Two solutions were investigated at length: hypertext and expert systems. Illustrative examples were provided of hypertext and expert system representation of spacecraft lighting. These computer technologies can be used to ameliorate the problem of the loss of invaluable personnel.

  3. Fast Keyword Spotting in Telephone Speech

    Directory of Open Access Journals (Sweden)

    J. Nouza

    2009-12-01

    Full Text Available In the paper, we present a system designed for detecting keywords in telephone speech. We focus not only on achieving high accuracy but also on very short processing time. The keyword spotting system can run in three modes: a an off-line mode requiring less than 0.1xRT, b an on-line mode with minimum (2 s latency, and c a repeated spotting mode, in which pre-computed values allow for additional acceleration. Its performance is evaluated on recordings of Czech spontaneous telephone speech using rather large and complex keyword lists.

  4. Advanced laptop and small personal computer technology

    Science.gov (United States)

    Johnson, Roger L.

    1991-01-01

    Advanced laptop and small personal computer technology is presented in the form of the viewgraphs. The following areas of hand carried computers and mobile workstation technology are covered: background, applications, high end products, technology trends, requirements for the Control Center application, and recommendations for the future.

  5. Keywords in musical free improvisation

    DEFF Research Database (Denmark)

    Bergstrøm-Nielsen, Carl

    2016-01-01

    This article presents some keywords and concepts concerning free improvised music and its recent developments drawing from ongoing bibliographical research. A radical pluralism stems from musicians' backgrounds and the mixtures and fusions of styles and idioms resulting from these mixtures....... Seemingly very different "performance-driven" and "play-driven" attitudes exist, even among musicians who share the practice of performing at concerts. New models of musical analysis aiming specifically at free improvised music provide strategical observations of interaction and structure....

  6. Moral Responsibility and Computer Technology.

    Science.gov (United States)

    Friedman, Batya

    Noting a recent increase in the number of cases of computer crime and computer piracy, this paper takes up the question, "How can understanding the social context of computing help us--as parents, educators, and members of government and industry--to educate young people to become morally responsible members of an electronic information…

  7. College Students' Attitude towards Computer Technology

    Science.gov (United States)

    Njagi, K. O.; Havice, W. L.

    2011-01-01

    Recent advances in the contemporary world, especially in the area of computer technology, have heralded the development and implementation of new and innovative teaching strategies and particularly with the Internet revolution. This study assessed students' attitude towards computer technology. Specifically, the study assessed differences in…

  8. Computer Technology-Infused Learning Enhancement

    Science.gov (United States)

    Keengwe, Jared; Anyanwu, Longy O.

    2007-01-01

    The purpose of the study was to determine students' perception of instructional integration of computer technology to improve learning. Two key questions were investigated in this study: (a) What is the students' perception of faculty integration of computer technology into classroom instruction? (b) To what extent does the students' perception of…

  9. African Journals Online: Technology, Computer Science ...

    African Journals Online (AJOL)

    Items 1 - 29 of 29 ... The Journal of Applied Science, Engineering and Technology covers research activities and development in the field of Applied Sciences and Technology as it relates to Agricultural Engineering, Biotechnology, Computer Science and Engineering Computations, Civil Engineering, Food Science and ...

  10. Future Computing Technology (2/3)

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the second day of the Future Computing Technology series, we will talk about ubiquitous computing. From smart watches through mobile devices to virtual reality, computing devices surround us, and innovative new technologies are introduces every day. We will briefly explore how this propagation might continue, how computers can take ove...

  11. Trademark Licensing in Keyword Advertising

    OpenAIRE

    Zejda, Maciej

    2016-01-01

    This article examines the use of trademarks as keywords in sponsored links campaigns - in particular the impact of such usage on consumer confusion. It is thus important to highlight that there are a number of reasons why a consumer uses search engines. For example, it may be that a consumer searches for a type of product or service that appeals to them; the consumer may engage in comparison-shopping; or the consumer may already know the specific brand that he or she intends to purchase. Seco...

  12. The Role of Grid Computing Technologies in Cloud Computing

    Science.gov (United States)

    Villegas, David; Rodero, Ivan; Fong, Liana; Bobroff, Norman; Liu, Yanbin; Parashar, Manish; Sadjadi, S. Masoud

    The fields of Grid, Utility and Cloud Computing have a set of common objectives in harnessing shared resources to optimally meet a great variety of demands cost-effectively and in a timely manner Since Grid Computing started its technological journey about a decade earlier than Cloud Computing, the Cloud can benefit from the technologies and experience of the Grid in building an infrastructure for distributed computing. Our comparison of Grid and Cloud starts with their basic characteristics and interaction models with clients, resource consumers and providers. Then the similarities and differences in architectural layers and key usage patterns are examined. This is followed by an in depth look at the technologies and best practices that have applicability from Grid to Cloud computing, including scheduling, service orientation, security, data management, monitoring, interoperability, simulation and autonomic support. Finally, we offer insights on how these techniques will help solve the current challenges faced by Cloud computing.

  13. Education & Technology: Reflections on Computing in Classrooms.

    Science.gov (United States)

    Fisher, Charles, Ed.; Dwyer, David C., Ed.; Yocam, Keith, Ed.

    This volume examines learning in the age of technology, describes changing practices in technology-rich classrooms, and proposes new ways to support teachers as they incorporate technology into their work. It commemorates the eleventh anniversary of the Apple Classrooms of Tomorrow (ACOT) Project, when Apple Computer, Inc., in partnership with a…

  14. Is Computer Science Compatible with Technological Literacy?

    Science.gov (United States)

    Buckler, Chris; Koperski, Kevin; Loveland, Thomas R.

    2018-01-01

    Although technology education evolved over time, and pressure increased to infuse more engineering principles and increase links to STEM (science technology, engineering, and mathematics) initiatives, there has never been an official alignment between technology and engineering education and computer science. There is movement at the federal level…

  15. Lighting Computer Programs in Lighting Technology

    OpenAIRE

    EKREN, Nazmi; DURSUN, Bahtiyar; AYKUT, Ercan

    2010-01-01

    It is well known that the computer in lighting technology is a vital component for lighting designers. Lighting computer programs are preferred in preparing architectural projects in lighting techniques, especially in lighting calculations. Lighting computer programs, which arise with the aim of helping lighting designers, gain more interest day by day. The most important property of lighting computer programs is the ability to enable the simulation of lighting projects without requiring any ...

  16. Five Year Computer Technology Forecast

    Science.gov (United States)

    1972-12-01

    The report delineates the various computer system components and extrapolates past trends in light of industry goals and physical limitations to predict what individual components and entire systems will look like in the second half of this decade. T...

  17. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  18. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  19. Computer technology forecast study for general aviation

    Science.gov (United States)

    Seacord, C. L.; Vaughn, D.

    1976-01-01

    A multi-year, multi-faceted program is underway to investigate and develop potential improvements in airframes, engines, and avionics for general aviation aircraft. The objective of this study was to assemble information that will allow the government to assess the trends in computer and computer/operator interface technology that may have application to general aviation in the 1980's and beyond. The current state of the art of computer hardware is assessed, technical developments in computer hardware are predicted, and nonaviation large volume users of computer hardware are identified.

  20. Philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip A.E.; Soraker, Johnny; Meijers, A.

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions

  1. Computer science research and technology volume 3

    CERN Document Server

    Bauer, Janice P

    2011-01-01

    This book presents leading-edge research from across the globe in the field of computer science research, technology and applications. Each contribution has been carefully selected for inclusion based on the significance of the research to this fast-moving and diverse field. Some topics included are: network topology; agile programming; virtualization; and reconfigurable computing.

  2. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  3. Cloud Computing Technologies and Applications

    Science.gov (United States)

    Zhu, Jinzy

    In a nutshell, the existing Internet provides to us content in the forms of videos, emails and information served up in web pages. With Cloud Computing, the next generation of Internet will allow us to "buy" IT services from a web portal, drastic expanding the types of merchandise available beyond those on e-commerce sites such as eBay and Taobao. We would be able to rent from a virtual storefront the basic necessities to build a virtual data center: such as CPU, memory, storage, and add on top of that the middleware necessary: web application servers, databases, enterprise server bus, etc. as the platform(s) to support the applications we would like to either rent from an Independent Software Vendor (ISV) or develop ourselves. Together this is what we call as "IT as a Service," or ITaaS, bundled to us the end users as a virtual data center.

  4. Future Computing Technology (3/3)

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the third day of the Future Computing Technology series, we will touch on societal aspects of the future of computing. Our perception of computers may at time seem passive, but in reality we are a vital chain of the feedback loop. Human-computer interaction, innovative forms of computers, privacy, process automation, threats and medica...

  5. Computer-Based Technologies in Dentistry: Types and Applications

    Directory of Open Access Journals (Sweden)

    Rajaa Mahdi Musawi

    2016-10-01

    Full Text Available During dental education, dental students learn how to examine patients, make diagnosis, plan treatment and perform dental procedures perfectly and efficiently. However, progresses in computer-based technologies including virtual reality (VR simulators, augmented reality (AR and computer aided design/computer aided manufacturing (CAD/CAM systems have resulted in new modalities for instruction and practice of dentistry. Virtual reality dental simulators enable repeated, objective and assessable practice in various controlled situations. Superimposition of three-dimensional (3D virtual images on actual images in AR allows surgeons to simultaneously visualize the surgical site and superimpose informative 3D images of invisible regions on the surgical site to serve as a guide. The use of CAD/CAM systems for designing and manufacturing of dental appliances and prostheses has been well established.This article reviews computer-based technologies, their application in dentistry and their potentials and limitations in promoting dental education, training and practice. Practitioners will be able to choose from a broader spectrum of options in their field of practice by becoming familiar with new modalities of training and practice.Keywords: Virtual Reality Exposure Therapy; Immersion; Computer-Aided Design; Dentistry; Education

  6. Mathematics for engineering, technology and computing science

    CERN Document Server

    Martin, Hedley G

    1970-01-01

    Mathematics for Engineering, Technology and Computing Science is a text on mathematics for courses in engineering, technology, and computing science. It covers linear algebra, ordinary differential equations, and vector analysis, together with line and multiple integrals. This book consists of eight chapters and begins with a discussion on determinants and linear equations, with emphasis on how the value of a determinant is defined and how it may be obtained. Solution of linear equations and the dependence between linear equations are also considered. The next chapter introduces the reader to

  7. PRIMARY SCHOOL PRINCIPALS’ ATTITUDES TOWARDS COMPUTER TECHNOLOGY IN THE USE OF COMPUTER TECHNOLOGY IN SCHOOL ADMINISTRATION

    OpenAIRE

    GÜNBAYI, İlhan; CANTÜRK, Gökhan

    2011-01-01

    The aim of the study is to determine the usage of computer technology in school administration, primary school administrators’ attitudes towards computer technology, administrators’ and teachers’ computer literacy level. The study was modeled as a survey search. The population of the study consists primary school principals, assistant principals in public primary schools in the center of Antalya. The data were collected from 161 (%51) administrator questionnaires in 68 of 129 public primary s...

  8. Imagined Affordance: Reconstructing a Keyword for Communication Theory

    Directory of Open Access Journals (Sweden)

    Peter Nagy

    2015-09-01

    Full Text Available In this essay, we reconstruct a keyword for communication—affordance. Affordance, adopted from ecological psychology, is now widely used in technology studies, yet the term lacks a clear definition. This is especially problematic for scholars grappling with how to theorize the relationship between technology and sociality for complex socio-technical systems such as machine-learning algorithms, pervasive computing, the Internet of Things, and other such “smart” innovations. Within technology studies, emerging theories of materiality, affect, and mediation all necessitate a richer and more nuanced definition for affordance than the field currently uses. To solve this, we develop the concept of imagined affordance. Imagined affordances emerge between users’ perceptions, attitudes, and expectations; between the materiality and functionality of technologies; and between the intentions and perceptions of designers. We use imagined affordance to evoke the importance of imagination in affordances—expectations for technology that are not fully realized in conscious, rational knowledge. We also use imagined affordance to distinguish our process-oriented, socio-technical definition of affordance from the “imagined” consensus of the field around a flimsier use of the term. We also use it in order to better capture the importance of mediation, materiality, and affect. We suggest that imagined affordance helps to theorize the duality of materiality and communication technology: namely, that people shape their media environments, perceive them, and have agency within them because of imagined affordances.

  9. Cloud Computing and Information Technology Strategy

    Directory of Open Access Journals (Sweden)

    Antonio Mariano Carlos Junior

    2013-04-01

    Full Text Available Cloud computing represents a new paradigm that enables the utility computing model in which computing resources are offered and consumed as a service on demand, pay as you go, in a model similar to that of electricity. The objective of this work is to identify threats and opportunities of the cloud computing model and its influence on the strategy of companies that consume Information Technology. To do so, a survey was conducted with leading IT executives from 64 medium and large companies in Brazil. We noticed the influence of cloud computing in migrating the focus of the corporate IT departments to the management of services and contracts, resulting into the demand for professionals with IT analyst integrated and business profiles.

  10. Computer technology forecasting at the National Laboratories

    International Nuclear Information System (INIS)

    Peskin, A.M.

    1980-01-01

    The DOE Office of ADP Management organized a group of scientists and computer professionals, mostly from their own national laboratories, to prepare an annually updated technology forecast to accompany the Department's five-year ADP Plan. The activities of the task force were originally reported in an informal presentation made at the ACM Conference in 1978. This presentation represents an update of that report. It also deals with the process of applying the results obtained at a particular computing center, Brookhaven National Laboratory. Computer technology forecasting is a difficult and hazardous endeavor, but it can reap considerable advantage. The forecast performed on an industry-wide basis can be applied to the particular needs of a given installation, and thus give installation managers considerable guidance in planning. A beneficial side effect of this process is that it forces installation managers, who might otherwise tend to preoccupy themselves with immediate problems, to focus on longer term goals and means to their ends

  11. Future Computing Technology (1/3)

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. Lecturer's short bio: Andrzej Nowak has 10 years of experience in computing technologies, primarily from CERN openlab and Intel. At CERN, he managed a research lab collaborating with Intel and was part of the openlab Chief Technology Office. Andrzej also worked closely and initiated projects with the private sector (e.g. HP and Go...

  12. Computer based training: Technology and trends

    International Nuclear Information System (INIS)

    O'Neal, A.F.

    1986-01-01

    Computer Based Training (CBT) offers great potential for revolutionizing the training environment. Tremendous advances in computer cost performance, instructional design science, and authoring systems have combined to put CBT within the reach of all. The ability of today's CBT systems to implement powerful training strategies, simulate complex processes and systems, and individualize and control the training process make it certain that CBT will now, at long last, live up to its potential. This paper reviews the major technologies and trends involved and offers some suggestions for getting started in CBT

  13. The role of computer technology in radiosurgery.

    Science.gov (United States)

    Wikler, David; Coussaert, Olivier; Schoovaerts, Frédéric; Joly, Anthony; Levivier, Marc

    2007-01-01

    Stereotactic radiosurgery treatment principles and irradiation techniques have shown little evolution since its introduction in 1968. Conversely, technology progress linked to computers has produced a major impact on the methods used for treatment planning and dose delivery. In order to fully comprehend modern radiosurgery approaches, one has to acquire good insight of the underlying technology, specifically computer software. In this chapter, we describe the evolution from X-ray films to high-resolution digital imaging, the shift from simple trigonometric calculation to highly complex algorithms and new perspectives in patient follow-up. If these changes open new prospects, they also add complexity, which leads to new pitfalls and limits of the stereotactic radiosurgery method.

  14. [Advance in brain-computer interface technology].

    Science.gov (United States)

    Yang, Kunde; Tian, Mengjun; Zhang, Hainan; Zhao, Yamei

    2004-12-01

    This paper introduces one of the young, energetic and rapidly growing research fields in biomedical engineering-Brain-computer interface (BCI) technology, which can provide augmentative communication and control capabilities to patients with severe motor disabilities. We summarize the first two international meetings for BCI, and present the most typical research fruits. The problems in current studies and the direction for future investigation are analyzed.

  15. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  16. Grid computing technology for hydrological applications

    Science.gov (United States)

    Lecca, G.; Petitdidier, M.; Hluchy, L.; Ivanovic, M.; Kussul, N.; Ray, N.; Thieron, V.

    2011-06-01

    SummaryAdvances in e-Infrastructure promise to revolutionize sensing systems and the way in which data are collected and assimilated, and complex water systems are simulated and visualized. According to the EU Infrastructure 2010 work-programme, data and compute infrastructures and their underlying technologies, either oriented to tackle scientific challenges or complex problem solving in engineering, are expected to converge together into the so-called knowledge infrastructures, leading to a more effective research, education and innovation in the next decade and beyond. Grid technology is recognized as a fundamental component of e-Infrastructures. Nevertheless, this emerging paradigm highlights several topics, including data management, algorithm optimization, security, performance (speed, throughput, bandwidth, etc.), and scientific cooperation and collaboration issues that require further examination to fully exploit it and to better inform future research policies. The paper illustrates the results of six different surface and subsurface hydrology applications that have been deployed on the Grid. All the applications aim to answer to strong requirements from the Civil Society at large, relatively to natural and anthropogenic risks. Grid technology has been successfully tested to improve flood prediction, groundwater resources management and Black Sea hydrological survey, by providing large computing resources. It is also shown that Grid technology facilitates e-cooperation among partners by means of services for authentication and authorization, seamless access to distributed data sources, data protection and access right, and standardization.

  17. Computational Support for Technology- Investment Decisions

    Science.gov (United States)

    Adumitroaie, Virgil; Hua, Hook; Lincoln, William; Block, Gary; Mrozinski, Joseph; Shelton, Kacie; Weisbin, Charles; Elfes, Alberto; Smith, Jeffrey

    2007-01-01

    Strategic Assessment of Risk and Technology (START) is a user-friendly computer program that assists human managers in making decisions regarding research-and-development investment portfolios in the presence of uncertainties and of non-technological constraints that include budgetary and time limits, restrictions related to infrastructure, and programmatic and institutional priorities. START facilitates quantitative analysis of technologies, capabilities, missions, scenarios and programs, and thereby enables the selection and scheduling of value-optimal development efforts. START incorporates features that, variously, perform or support a unique combination of functions, most of which are not systematically performed or supported by prior decision- support software. These functions include the following: Optimal portfolio selection using an expected-utility-based assessment of capabilities and technologies; Temporal investment recommendations; Distinctions between enhancing and enabling capabilities; Analysis of partial funding for enhancing capabilities; and Sensitivity and uncertainty analysis. START can run on almost any computing hardware, within Linux and related operating systems that include Mac OS X versions 10.3 and later, and can run in Windows under the Cygwin environment. START can be distributed in binary code form. START calls, as external libraries, several open-source software packages. Output is in Excel (.xls) file format.

  18. Terascale Computing in Accelerator Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Kwok

    2002-08-21

    We have entered the age of ''terascale'' scientific computing. Processors and system architecture both continue to evolve; hundred-teraFLOP computers are expected in the next few years, and petaFLOP computers toward the end of this decade are conceivable. This ever-increasing power to solve previously intractable numerical problems benefits almost every field of science and engineering and is revolutionizing some of them, notably including accelerator physics and technology. At existing accelerators, it will help us optimize performance, expand operational parameter envelopes, and increase reliability. Design decisions for next-generation machines will be informed by unprecedented comprehensive and accurate modeling, as well as computer-aided engineering; all this will increase the likelihood that even their most advanced subsystems can be commissioned on time, within budget, and up to specifications. Advanced computing is also vital to developing new means of acceleration and exploring the behavior of beams under extreme conditions. With continued progress it will someday become reasonable to speak of a complete numerical model of all phenomena important to a particular accelerator.

  19. Applications of computational intelligence in biomedical technology

    CERN Document Server

    Majernik, Jaroslav; Pancerz, Krzysztof; Zaitseva, Elena

    2016-01-01

    This book presents latest results and selected applications of Computational Intelligence in Biomedical Technologies. Most of contributions deal with problems of Biomedical and Medical Informatics, ranging from theoretical considerations to practical applications. Various aspects of development methods and algorithms in Biomedical and Medical Informatics as well as Algorithms for medical image processing, modeling methods are discussed. Individual contributions also cover medical decision making support, estimation of risks of treatments, reliability of medical systems, problems of practical clinical applications and many other topics  This book is intended for scientists interested in problems of Biomedical Technologies, for researchers and academic staff, for all dealing with Biomedical and Medical Informatics, as well as PhD students. Useful information is offered also to IT companies, developers of equipment and/or software for medicine and medical professionals.  .

  20. Computer Education and Instructional Technology Prospective Teachers’ Perceptions of Technology

    Directory of Open Access Journals (Sweden)

    Ümmü Gülsüm DURUKAN

    2016-04-01

    Full Text Available The purpose of this study is to determine the “technology” perception of prospective computer and instructional technologies (CEIT teachers by metaphors. For this purpose the study was carried out with 53 first-year prospective teachers studying in the Department of CEIT in a public university in the fall term of 2014-2015 academic year. The forms consisting of the statement “Technology is like ……………because ………” written few times were used as a data collection tool. Phenomenography design was used in the study and the data were analyzed by content analysis. According to the study's findings, it was found that out of 118 valid metaphors developed by the prospective teachers, 103 of them were included in positive category, 7 were in negative category and 8 were in the neutral category.

  1. International Conference on Computers and Advanced Technology in Education

    CERN Document Server

    Advanced Information Technology in Education

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computers and Advanced Technology in Education. With the development of computers and advanced technology, the human social activities are changing basically. Education, especially the education reforms in different countries, has been experiencing the great help from the computers and advanced technology. Generally speaking, education is a field which needs more information, while the computers, advanced technology and internet are a good information provider. Also, with the aid of the computer and advanced technology, persons can make the education an effective combination. Therefore, computers and advanced technology should be regarded as an important media in the modern education. Volume Advanced Information Technology in Education is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of computers and advanced technology in education to d...

  2. ESIP Documentation Cluster Session: GCMD Keyword Update

    Science.gov (United States)

    Stevens, Tyler

    2018-01-01

    The Global Change Master Directory (GCMD) Keywords are a hierarchical set of controlled Earth Science vocabularies that help ensure Earth science data and services are described in a consistent and comprehensive manner and allow for the precise searching of collection-level metadata and subsequent retrieval of data and services. Initiated over twenty years ago, the GCMD Keywords are periodically analyzed for relevancy and will continue to be refined and expanded in response to user needs. This talk explores the current status of the GCMD keywords, the value and usage that the keywords bring to different tools/agencies as it relates to data discovery, and how the keywords relate to SWEET (Semantic Web for Earth and Environmental Terminology) Ontologies.

  3. Spacecraft computer technology at Southwest Research Institute

    Science.gov (United States)

    Shirley, D. J.

    1993-01-01

    Southwest Research Institute (SwRI) has developed and delivered spacecraft computers for a number of different near-Earth-orbit spacecraft including shuttle experiments and SDIO free-flyer experiments. We describe the evolution of the basic SwRI spacecraft computer design from those weighing in at 20 to 25 lb and using 20 to 30 W to newer models weighing less than 5 lb and using only about 5 W, yet delivering twice the processing throughput. Because of their reduced size, weight, and power, these newer designs are especially applicable to planetary instrument requirements. The basis of our design evolution has been the availability of more powerful processor chip sets and the development of higher density packaging technology, coupled with more aggressive design strategies in incorporating high-density FPGA technology and use of high-density memory chips. In addition to reductions in size, weight, and power, the newer designs also address the necessity of survival in the harsh radiation environment of space. Spurred by participation in such programs as MSTI, LACE, RME, Delta 181, Delta Star, and RADARSAT, our designs have evolved in response to program demands to be small, low-powered units, radiation tolerant enough to be suitable for both Earth-orbit microsats and for planetary instruments. Present designs already include MIL-STD-1750 and Multi-Chip Module (MCM) technology with near-term plans to include RISC processors and higher-density MCM's. Long term plans include development of whole-core processors on one or two MCM's.

  4. Efficient continuously moving top-k spatial keyword query processing

    DEFF Research Database (Denmark)

    Wu, Dingming; Yiu, Man Lung; Jensen, Christian S.

    2011-01-01

    Web users and content are increasingly being geo-positioned. This development gives prominence to spatial keyword queries, which involve both the locations and textual descriptions of content. We study the efficient processing of continuously moving top-k spatial keyword (MkSK) queries over spatial...... keyword data. State-of-the-art solutions for moving queries employ safe zones that guarantee the validity of reported results as long as the user remains within a zone. However, existing safe zone methods focus solely on spatial locations and ignore text relevancy. We propose two algorithms for computing...

  5. Multimedia Image Technology and Computer Aided Manufacturing Engineering Analysis

    Science.gov (United States)

    Nan, Song

    2018-03-01

    Since the reform and opening up, with the continuous development of science and technology in China, more and more advanced science and technology have emerged under the trend of diversification. Multimedia imaging technology, for example, has a significant and positive impact on computer aided manufacturing engineering in China. From the perspective of scientific and technological advancement and development, the multimedia image technology has a very positive influence on the application and development of computer-aided manufacturing engineering, whether in function or function play. Therefore, this paper mainly starts from the concept of multimedia image technology to analyze the application of multimedia image technology in computer aided manufacturing engineering.

  6. Keyword analysis of community planning documents

    Data.gov (United States)

    U.S. Environmental Protection Agency — This file contains total hits per keyword expressed as percentage of total hits for the eight domains of the human well-being index. Additional categorical data is...

  7. A keyword history of Marketing Science

    OpenAIRE

    Mela, Carl; Roos, Jason; Deng, Yanhui

    2013-01-01

    textabstractThis paper considers the history of keywords used in Marketing Science to develop insights on the evolution of marketing science. Several findings emerge. First, "pricing" and "game theory" are the most ubiquitous words. More generally, the three C's and four P's predominate, suggesting that keywords and common practical frameworks align. Various trends exist. Some words, like "pricing," remain popular over time. Others, like "game theory" and "hierarchical Bayes," have become mor...

  8. Computer-aided design and computer science technology

    Science.gov (United States)

    Fulton, R. E.; Voigt, S. J.

    1976-01-01

    A description is presented of computer-aided design requirements and the resulting computer science advances needed to support aerospace design. The aerospace design environment is examined, taking into account problems of data handling and aspects of computer hardware and software. The interactive terminal is normally the primary interface between the computer system and the engineering designer. Attention is given to user aids, interactive design, interactive computations, the characteristics of design information, data management requirements, hardware advancements, and computer science developments.

  9. Attribute-Based Proxy Re-Encryption with Keyword Search

    Science.gov (United States)

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257

  10. Technological Evolution on Computed Tomography and Radioprotection

    International Nuclear Information System (INIS)

    Leite, Bruno Barros; Ribeiro, Nuno Carrilho

    2006-01-01

    Computed Tomography (CT) has been available since the 70s and has experienced a dramatic technical evolution. Multi-detector technology is our current standard, offering capabilities unthinkable only a decade ago. Yet, we must nor forget the ionizing nature of CT's scanning energy (X-rays). It represents the most important cause of medical-associated radiation exposure to the general public, with a trend to increase. It is compulsory to intervene with the objective of dose reduction, following ALARA policies. Currently there are some technical advances that allow dose reduction, without sacrificing diagnostic image capabilities. However, human intervention is also essential. We must keep investment on education so that CT exams are don when they are really useful in clinical decision. Alternative techniques should also be considered. Image quality must not be searched disregarding the biological effects of radiation. Generally, it is possible to obtain clinically acceptable images with lower dose protocols. (author)

  11. Computer Science and Technology Publications. NBS Publications List 84.

    Science.gov (United States)

    National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.

    This bibliography lists publications of the Institute for Computer Sciences and Technology of the National Bureau of Standards. Publications are listed by subject in the areas of computer security, computer networking, and automation technology. Sections list publications of: (1) current Federal Information Processing Standards; (2) computer…

  12. The Invisible Barrier to Integrating Computer Technology in Education

    Science.gov (United States)

    Aflalo, Ester

    2014-01-01

    The article explores contradictions in teachers' perceptions regarding the place of computer technologies in education. The research population included 47 teachers who have incorporated computers in the classroom for several years. The teachers expressed positive attitudes regarding the decisive importance of computer technologies in furthering…

  13. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    Science.gov (United States)

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  14. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  15. The Impact of Cloud Computing Technologies in E-learning

    Directory of Open Access Journals (Sweden)

    Hosam Farouk El-Sofany

    2013-01-01

    Full Text Available Cloud computing is a new computing model which is based on the grid computing, distributed computing, parallel computing and virtualization technologies define the shape of a new technology. It is the core technology of the next generation of network computing platform, especially in the field of education, cloud computing is the basic environment and platform of the future E-learning. It provides secure data storage, convenient internet services and strong computing power. This article mainly focuses on the research of the application of cloud computing in E-learning environment. The research study shows that the cloud platform is valued for both students and instructors to achieve the course objective. The paper presents the nature, benefits and cloud computing services, as a platform for e-learning environment.

  16. DEFACTO: A Design Environment for Adaptive Computing Technology

    National Research Council Canada - National Science Library

    Hall, Mary

    2003-01-01

    This report describes the activities of the DEFACTO project, a Design Environment for Adaptive Computing Technology funded under the DARPA Adaptive Computing Systems and Just-In-Time-Hardware programs...

  17. Railroad Classification Yard Technology Manual: Volume II : Yard Computer Systems

    Science.gov (United States)

    1981-08-01

    This volume (Volume II) of the Railroad Classification Yard Technology Manual documents the railroad classification yard computer systems methodology. The subjects covered are: functional description of process control and inventory computer systems,...

  18. A Financial Technology Entrepreneurship Program for Computer Science Students

    Science.gov (United States)

    Lawler, James P.; Joseph, Anthony

    2011-01-01

    Education in entrepreneurship is becoming a critical area of curricula for computer science students. Few schools of computer science have a concentration in entrepreneurship in the computing curricula. The paper presents Technology Entrepreneurship in the curricula at a leading school of computer science and information systems, in which students…

  19. Cloud Computing. Technology Briefing. Number 1

    Science.gov (United States)

    Alberta Education, 2013

    2013-01-01

    Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…

  20. Social keywords in postcolonial melanesian discourse

    DEFF Research Database (Denmark)

    Levisen, Carsten; Priestley, Carol

    2017-01-01

    In postcolonial Melanesia, cultural discourses are increasingly organised around creole words, i.e. keywords of Bislama (Vanuatu) and Tok Pisin (Papua New Guinea). These words constitute (or represent) important emerging ethnolinguistic worldviews, which are partly borne out of the colonial era...

  1. A keyword history of Marketing Science

    NARCIS (Netherlands)

    C.F. Mela (Carl); J.M.T. Roos (Jason); Y. Deng (Yanhui)

    2013-01-01

    textabstractThis paper considers the history of keywords used in Marketing Science to develop insights on the evolution of marketing science. Several findings emerge. First, "pricing" and "game theory" are the most ubiquitous words. More generally, the three C's and four P's predominate, suggesting

  2. 3rd International Conference on Computer & Communication Technologies

    CERN Document Server

    Bhateja, Vikrant; Raju, K; Janakiramaiah, B

    2017-01-01

    The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

  3. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  4. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITYEvaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  5. Educational Technology -- Computer-Related and People-Related.

    Science.gov (United States)

    Carter, Launor F.

    Two aspects of educational technology are considered. The first involves the development of educational technology highly dependent on computer equipment, and the development of a computer assisted instruction language called Programmed Language for Interactive Teaching (PLANIT). The second aspect involves the development of educational technology…

  6. The importance of the keyword-generation method in keyword mnemonics.

    Science.gov (United States)

    Campos, Alfredo; Amor, Angeles; González, María Angeles

    2004-01-01

    Keyword mnemonics is under certain conditions an effective approach for learning foreign-language vocabulary. It appears to be effective for words with high image vividness but not for words with low image vividness. In this study, two experiments were performed to assess the efficacy of a new keyword-generation procedure (peer generation). In Experiment 1, a sample of 363 high-school students was randomly into four groups. The subjects were required to learn L1 equivalents of a list of 16 Latin words (8 with high image vividness, 8 with low image vividness), using a) the rote method, or the keyword method with b) keywords and images generated and supplied by the experimenter, c) keywords and images generated by themselves, or d) keywords and images previously generated by peers (i.e., subjects with similar sociodemographic characteristics). Recall was tested immediately and one week later. For high-vivideness words, recall was significantly better in the keyword groups than the rote method group. For low-vividness words, learning method had no significant effect. Experiment 2 was basically identical, except that the word lists comprised 32 words (16 high-vividness, 16 low-vividness). In this experiment, the peer-generated-keyword group showed significantly better recall of high-vividness words than the rote method groups and the subject generated keyword group; again, however, learning method had no significant effect on recall of low-vividness words.

  7. CICT Computing, Information, and Communications Technology Program

    Science.gov (United States)

    Laufenberg, Lawrence; Tu, Eugene (Technical Monitor)

    2002-01-01

    The CICT Program is part of the NASA Aerospace Technology Enterprise's fundamental technology thrust to develop tools. processes, and technologies that enable new aerospace system capabilities and missions. The CICT Program's four key objectives are: Provide seamless access to NASA resources- including ground-, air-, and space-based distributed information technology resources-so that NASA scientists and engineers can more easily control missions, make new scientific discoveries, and design the next-generation space vehicles, provide high-data delivery from these assets directly to users for missions, develop goal-oriented human-centered systems, and research, develop and evaluate revolutionary technology.

  8. Social keywords in postcolonial melanesian discourse

    DEFF Research Database (Denmark)

    Levisen, Carsten; Priestley, Carol

    2017-01-01

    , and partly out of postcolonial ethno-rhetoric. This chapter explores the word kastom ‘traditional culture’ in Bislama and pasin bilong tumbuna ‘the ways of the ancestors’ in Tok Pisin. Specific attention is paid to the shift from “negative “ to “positive” semantics, following from the re......In postcolonial Melanesia, cultural discourses are increasingly organised around creole words, i.e. keywords of Bislama (Vanuatu) and Tok Pisin (Papua New Guinea). These words constitute (or represent) important emerging ethnolinguistic worldviews, which are partly borne out of the colonial era...

  9. An answer summarization method based on keyword extraction

    Directory of Open Access Journals (Sweden)

    Fan Qiaoqing

    2017-01-01

    Full Text Available In order to reduce the redundancy of answer summary generated from community q&a dataset without topic tags, we propose an answer summarization algorithm based on keyword extraction. We combine tf-idf with word vector to change the influence transferred ratio equation in TextRank. And then during summarizing, we take the ratio of the number of sentences containing any keyword to the total number of candidate sentences as an adaptive factor for AMMR. Meanwhile we reuse the scores of keywords generated by TextRank as a weight factor for sentence similarity computing. Experimental results show that the proposed answer summarization is better than the traditional MMR and AMMR.

  10. The Adoption of Cloud Computing Technology for Library Services ...

    African Journals Online (AJOL)

    The study investigated the rationales for the adoption of cloud computing technology for library services in NOUN Library. Issues related to the existing computer network available in NOUN library such as LAN, WAN, rationales for the adoption of cloud computing in NOUN library such as the need to disclose their collections ...

  11. Automatic keywording of High Energy Physics

    CERN Document Server

    Dallman, David Peter

    1999-01-01

    Bibliographic databases were developed from the traditional library card catalogue in order to enable users to access library documents via various types of bibliographic information, such as title, author, series or conference date. In addition these catalogues sometimes contained some form of indexation by subject, such as the Universal (or Dewey) Decimal Classification used for books. With the introduction of the eprint archives, set up by the High Energy Physics (HEP) Community in the early 90s, huge collections of documents in several fields have been made available on the World Wide Web. These developments however have not yet been followed up from a keywording point of view. We will see in this paper how important it is to attribute keywords to all documents in the area of HEP Grey Literature. As libraries are facing a future with less and less manpower available and more and more documents, we will explore the possibility of being helped by automatic classification software. We will specifically menti...

  12. Keywords in Context (Using n-grams with Python

    Directory of Open Access Journals (Sweden)

    William J. Turkel

    2012-07-01

    Full Text Available Like in Output Data as HTML File, this lesson takes the frequency pairs collected in Counting Frequencies and outputs them in HTML. This time the focus is on keywords in context (KWIC which creates n-grams from the original document content – in this case a trial transcript from the Old Bailey Online. You can use your program to select a keyword and the computer will output all instances of that keyword, along with the words to the left and right of it, making it easy to see at a glance how the keyword is used. Once the KWICs have been created, they are then wrapped in HTML and sent to the browser where they can be viewed. This reinforces what was learned in Output Data as HTML File, opting for a slightly different output. At the end of this lesson, you will be able to extract all possible n-grams from the text. In the next lesson, you will be learn how to output all of the n-grams of a given keyword in a document downloaded from the Internet, and display them clearly in your browser window.

  13. Impact of Computer Technology on Design and Craft Education

    Science.gov (United States)

    Thorsteinsson, Gisli

    2014-01-01

    This research aims to answer the question, "How has the use of computer technology benefited the compulsory education system, focusing on Design and Technology?" In order to reply this question, it was necessary to focus on interactive whiteboards, e-portfolios and digital projectors as the main technology formats. An initial literature…

  14. Fast magnetic field computation in fusion technology using GPU technology

    Energy Technology Data Exchange (ETDEWEB)

    Chiariello, Andrea Gaetano [Ass. EURATOM/ENEA/CREATE, Dipartimento di Ingegneria Industriale e dell’Informazione, Seconda Università di Napoli, Via Roma 29, Aversa (CE) (Italy); Formisano, Alessandro, E-mail: Alessandro.Formisano@unina2.it [Ass. EURATOM/ENEA/CREATE, Dipartimento di Ingegneria Industriale e dell’Informazione, Seconda Università di Napoli, Via Roma 29, Aversa (CE) (Italy); Martone, Raffaele [Ass. EURATOM/ENEA/CREATE, Dipartimento di Ingegneria Industriale e dell’Informazione, Seconda Università di Napoli, Via Roma 29, Aversa (CE) (Italy)

    2013-10-15

    Highlights: ► The paper deals with high accuracy numerical simulations of high field magnets. ► The porting of existing codes of High Performance Computing architectures allowed to obtain a relevant speedup while not reducing computational accuracy. ► Some examples of applications, referred to ITER-like magnets, are reported. -- Abstract: One of the main issues in the simulation of Tokamaks functioning is the reliable and accurate computation of actual field maps in the plasma chamber. In this paper a tool able to accurately compute magnetic field maps produced by active coils of any 3D shape, wound with high number of conductors, is presented. Under linearity assumption, the coil winding is modeled by means of “sticks”, following each conductor's shape, and the contribution of each stick is computed using high speed Graphic Computing Units (GPU's). Relevant speed enhancements with respect to standard parallel computing environment are achieved in this way.

  15. Reviews of computing technology: Software overview

    Energy Technology Data Exchange (ETDEWEB)

    Hartshorn, W.R.; Johnson, A.L.

    1994-01-05

    The Savannah River Site Computing Architecture states that the site computing environment will be standards-based, data-driven, and workstation-oriented. Larger server systems deliver needed information to users in a client-server relationship. Goals of the Architecture include utilizing computing resources effectively, maintaining a high level of data integrity, developing a robust infrastructure, and storing data in such a way as to promote accessibility and usability. This document describes the current storage environment at Savannah River Site (SRS) and presents some of the problems that will be faced and strategies that are planned over the next few years.

  16. Towards Empowering Hearing Impaired Students' Skills in Computing and Technology

    OpenAIRE

    Nihal Esam Abuzinadah; Areej Abbas Malibari; Paul Krause

    2017-01-01

    Studies have shown that deaf and hearing-impaired students have many difficulties in learning applied disciplines such as Medicine, Engineering, and Computer Programming. This study aims to investigate the readiness of deaf students to pursue higher education in applied sciences, more specifically in computer science. This involves investigating their capabilities in computer skills and applications. Computer programming is an integral component in the technological field that can facilitate ...

  17. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  18. Wearable computer technology for dismounted applications

    Science.gov (United States)

    Daniels, Reginald

    2010-04-01

    Small computing devices which rival the compact size of traditional personal digital assistants (PDA) have recently established a market niche. These computing devices are small enough to be considered unobtrusive for humans to wear. The computing devices are also powerful enough to run full multi-tasking general purpose operating systems. This paper will explore the wearable computer information system for dismounted applications recently fielded for ground-based US Air Force use. The environments that the information systems are used in will be reviewed, as well as a description of the net-centric, ground-based warrior. The paper will conclude with a discussion regarding the importance of intuitive, usable, and unobtrusive operator interfaces for dismounted operators.

  19. Application of advanced computational technology to propulsion CFD

    Science.gov (United States)

    Szuch, John R.

    The Internal Fluid Mechanics Division of the NASA Lewis Research Center is combining the key elements of computational fluid dynamics, aerothermodynamic experiments, and advanced computational technology to bring internal computational fluid dynamics (ICFM) to a state of practical application for aerospace propulsion system design. This paper presents an overview of efforts underway at NASA Lewis to advance and apply computational technology to ICFM. These efforts include the use of modern, software engineering principles for code development, the development of an AI-based user-interface for large codes, the establishment of a high-performance, data communications network to link ICFM researchers and facilities, and the application of parallel processing to speed up computationally intensive and/or time-critical ICFM problems. A multistage compressor flow physics program is cited as an example of efforts to use advanced computational technology to enhance a current NASA Lewis ICFM research program.

  20. Computational methods in molecular imaging technologies

    CERN Document Server

    Gunjan, Vinit Kumar; Venkatesh, C; Amarnath, M

    2017-01-01

    This book highlights the experimental investigations that have been carried out on magnetic resonance imaging and computed tomography (MRI & CT) images using state-of-the-art Computational Image processing techniques, and tabulates the statistical values wherever necessary. In a very simple and straightforward way, it explains how image processing methods are used to improve the quality of medical images and facilitate analysis. It offers a valuable resource for researchers, engineers, medical doctors and bioinformatics experts alike.

  1. Merging Technology and Emotions: Introduction to Affective Computing.

    Science.gov (United States)

    Brigham, Tara J

    2017-01-01

    Affective computing technologies are designed to sense and respond based on human emotions. This technology allows a computer system to process the information gathered from various sensors to assess the emotional state of an individual. The system then offers a distinct response based on what it "felt." While this is completely unlike how most people interact with electronics today, this technology is likely to trickle into future everyday life. This column will explain what affective computing is, some of its benefits, and concerns with its adoption. It will also provide an overview of its implication in the library setting and offer selected examples of how and where it is currently being used.

  2. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  3. Computational intelligence for technology enhanced learning

    Energy Technology Data Exchange (ETDEWEB)

    Xhafa, Fatos [Polytechnic Univ. of Catalonia, Barcelona (Spain). Dept. of Languages and Informatics Systems; Caballe, Santi; Daradoumis, Thanasis [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Computer Sciences Multimedia and Telecommunications; Abraham, Ajith [Machine Intelligence Research Labs (MIR Labs), Auburn, WA (United States). Scientific Network for Innovation and Research Excellence; Juan Perez, Angel Alejandro (eds.) [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Information Sciences

    2010-07-01

    E-Learning has become one of the most wide spread ways of distance teaching and learning. Technologies such as Web, Grid, and Mobile and Wireless networks are pushing teaching and learning communities to find new and intelligent ways of using these technologies to enhance teaching and learning activities. Indeed, these new technologies can play an important role in increasing the support to teachers and learners, to shorten the time to learning and teaching; yet, it is necessary to use intelligent techniques to take advantage of these new technologies to achieve the desired support to teachers and learners and enhance learners' performance in distributed learning environments. The chapters of this volume bring advances in using intelligent techniques for technology enhanced learning as well as development of e-Learning applications based on such techniques and supported by technology. Such intelligent techniques include clustering and classification for personalization of learning, intelligent context-aware techniques, adaptive learning, data mining techniques and ontologies in e-Learning systems, among others. Academics, scientists, software developers, teachers and tutors and students interested in e-Learning will find this book useful for their academic, research and practice activity. (orig.)

  4. Embedded Data Processor and Portable Computer Technology testbeds

    Science.gov (United States)

    Alena, Richard; Liu, Yuan-Kwei; Goforth, Andre; Fernquist, Alan R.

    1993-01-01

    Attention is given to current activities in the Embedded Data Processor and Portable Computer Technology testbed configurations that are part of the Advanced Data Systems Architectures Testbed at the Information Sciences Division at NASA Ames Research Center. The Embedded Data Processor Testbed evaluates advanced microprocessors for potential use in mission and payload applications within the Space Station Freedom Program. The Portable Computer Technology (PCT) Testbed integrates and demonstrates advanced portable computing devices and data system architectures. The PCT Testbed uses both commercial and custom-developed devices to demonstrate the feasibility of functional expansion and networking for portable computers in flight missions.

  5. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The

  6. Cloud Computing Technologies Facilitate Earth Research

    Science.gov (United States)

    2015-01-01

    Under a Space Act Agreement, NASA partnered with Seattle-based Amazon Web Services to make the agency's climate and Earth science satellite data publicly available on the company's servers. Users can access the data for free, but they can also pay to use Amazon's computing services to analyze and visualize information using the same software available to NASA researchers.

  7. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  8. Design Anthropology, Emerging Technologies and Alternative Computational Futures

    DEFF Research Database (Denmark)

    Smith, Rachel Charlotte

    Emerging technologies are providing a new field for design anthropological inquiry that unite experiences, imaginaries and materialities in complex way and demands new approaches to developing sustainable computational futures....

  9. Computer technology applications in surgical implant dentistry: a systematic review

    NARCIS (Netherlands)

    Jung, R.E.; Schneider, D.; Ganeles, J.; Wismeijer, D.; Zwahlen, M.; Hämmerle, C.H.F.; Tahmaseb, A.

    2009-01-01

    Purpose: To assess the literature on accuracy and clinical performance of computer technology applications in surgical implant dentistry. Materials and Methods: Electronic and manual literature searches were conducted to collect information about (1) the accuracy and (2) clinical performance of

  10. DICOM standard in computer-aided medical technologies

    International Nuclear Information System (INIS)

    Plotnikov, A.V.; Prilutskij, D.A.; Selishchev, S.V.

    1997-01-01

    The paper outlines one of the promising standards to transmit images in medicine, in radiology in particular. the essence of the standard DICOM is disclosed and promises of its introduction into computer-aided medical technologies

  11. Cloud manufacturing distributed computing technologies for global and sustainable manufacturing

    CERN Document Server

    Mehnen, Jörn

    2013-01-01

    Global networks, which are the primary pillars of the modern manufacturing industry and supply chains, can only cope with the new challenges, requirements and demands when supported by new computing and Internet-based technologies. Cloud Manufacturing: Distributed Computing Technologies for Global and Sustainable Manufacturing introduces a new paradigm for scalable service-oriented sustainable and globally distributed manufacturing systems.   The eleven chapters in this book provide an updated overview of the latest technological development and applications in relevant research areas.  Following an introduction to the essential features of Cloud Computing, chapters cover a range of methods and applications such as the factors that actually affect adoption of the Cloud Computing technology in manufacturing companies and new geometrical simplification method to stream 3-Dimensional design and manufacturing data via the Internet. This is further supported case studies and real life data for Waste Electrical ...

  12. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  13. Applications of Computer Technology in Complex Craniofacial Reconstruction

    Directory of Open Access Journals (Sweden)

    Kristopher M. Day, MD

    2018-03-01

    Conclusion:. Modern 3D technology allows the surgeon to better analyze complex craniofacial deformities, precisely plan surgical correction with computer simulation of results, customize osteotomies, plan distractions, and print 3DPCI, as needed. The use of advanced 3D computer technology can be applied safely and potentially improve aesthetic and functional outcomes after complex craniofacial reconstruction. These techniques warrant further study and may be reproducible in various centers of care.

  14. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  15. Computer technology: its potential for industrial energy conservation. A technology applications manual

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-01-01

    Today, computer technology is within the reach of practically any industrial corporation regardless of product size. This manual highlights a few of the many applications of computers in the process industry and provides the technical reader with a basic understanding of computer technology, terminology, and the interactions among the various elements of a process computer system. The manual has been organized to separate process applications and economics from computer technology. Chapter 1 introduces the present status of process computer technology and describes the four major applications - monitoring, analysis, control, and optimization. The basic components of a process computer system also are defined. Energy-saving applications in the four major categories defined in Chapter 1 are discussed in Chapter 2. The economics of process computer systems is the topic of Chapter 3, where the historical trend of process computer system costs is presented. Evaluating a process for the possible implementation of a computer system requires a basic understanding of computer technology as well as familiarity with the potential applications; Chapter 4 provides enough technical information for an evaluation. Computer and associated peripheral costs and the logical sequence of steps in the development of a microprocessor-based process control system are covered in Chapter 5.

  16. Designing Pervasive Computing Technology - In a Nomadic Work Perspective

    DEFF Research Database (Denmark)

    Kristensen, Jannie Friis

    2002-01-01

    In my thesis work I am investigating how the design of pervasive/ubiquitous computing technology, relate to the flexible and individual work practice of nomadic workers. Through empirical studies and with an experimental systems development approach, the work is focused on: a) Supporting...... interpretation and inclusion of implicit and invisible as well as explicit and visible characteristics of artifacts, users and use practices. b) Identifying breakdowns in human-computer interaction situations, with particular emphasis on the computation that happens "behind the scenes" in the pervasive computing...... environment, and how that computational process at a sufficient level is made intelligible, visible, accountable and negotiable to the human participant....

  17. MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers

    Directory of Open Access Journals (Sweden)

    Jingsha He

    2018-05-01

    Full Text Available To enhance the efficiency of data searching, most data owners store their data files in different cloud servers in the form of cipher-text. Thus, efficient search using fuzzy keywords becomes a critical issue in such a cloud computing environment. This paper proposes a method that aims at improving the efficiency of cipher-text retrieval and lowering storage overhead for fuzzy keyword search. In contrast to traditional approaches, the proposed method can reduce the complexity of Min-Hash-based fuzzy keyword search by using Min-Hash fingerprints to avoid the need to construct the fuzzy keyword set. The method will utilize Jaccard similarity to rank the results of retrieval, thus reducing the amount of calculation for similarity and saving a lot of time and space overhead. The method will also take consideration of multiple user queries through re-encryption technology and update user permissions dynamically. Security analysis demonstrates that the method can provide better privacy preservation and experimental results show that efficiency of cipher-text using the proposed method can improve the retrieval time and lower storage overhead as well.

  18. Medical imaging technology reviews and computational applications

    CERN Document Server

    Dewi, Dyah

    2015-01-01

    This book presents the latest research findings and reviews in the field of medical imaging technology, covering ultrasound diagnostics approaches for detecting osteoarthritis, breast carcinoma and cardiovascular conditions, image guided biopsy and segmentation techniques for detecting lung cancer, image fusion, and simulating fluid flows for cardiovascular applications. It offers a useful guide for students, lecturers and professional researchers in the fields of biomedical engineering and image processing.

  19. Audio Technology and Mobile Human Computer Interaction

    DEFF Research Database (Denmark)

    Chamberlain, Alan; Bødker, Mads; Hazzard, Adrian

    2017-01-01

    Audio-based mobile technology is opening up a range of new interactive possibilities. This paper brings some of those possibilities to light by offering a range of perspectives based in this area. It is not only the technical systems that are developing, but novel approaches to the design...... and understanding of audio-based mobile systems are evolving to offer new perspectives on interaction and design and support such systems to be applied in areas, such as the humanities....

  20. Use of Computer Technology To Help Students with Special Needs.

    Science.gov (United States)

    Hasselbring, Ted S.; Glaser, Candyce H. Williams

    2000-01-01

    Reviews the role of computer technology in promoting the education of children with special needs within regular classrooms, discussing: technologies for students with mild learning and behavioral disorders, speech and language disorders, hearing impairments, visual impairments, and severe physical disabilities. Examines barriers to effective…

  1. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  2. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  3. Computers Put a Journalism School on Technology's Leading Edge.

    Science.gov (United States)

    Blum, Debra E.

    1992-01-01

    Since 1985, the University of Missouri at Columbia's School of Journalism has been developing a high-technology environment for student work, including word processing, electronic imaging, networked personal computers, and telecommunications. Some faculty worry that the emphasis on technology may overshadow the concepts, principles, and substance…

  4. Building Computer Technology Skills in TESOL Teacher Education

    Science.gov (United States)

    DelliCarpini, Margo

    2012-01-01

    This paper reports on an action research study that investigated factors influencing TESOL (teaching English to speakers of other languages) teacher candidates' (TCs) selection and use of technology in the English as a second language (ESL) classroom and the influence of explicit training in context in the use of computer technology for second…

  5. Space systems computer-aided design technology

    Science.gov (United States)

    Garrett, L. B.

    1984-01-01

    The interactive Design and Evaluation of Advanced Spacecraft (IDEAS) system is described, together with planned capability increases in the IDEAS system. The system's disciplines consist of interactive graphics and interactive computing. A single user at an interactive terminal can create, design, analyze, and conduct parametric studies of earth-orbiting satellites, which represents a timely and cost-effective method during the conceptual design phase where various missions and spacecraft options require evaluation. Spacecraft concepts evaluated include microwave radiometer satellites, communication satellite systems, solar-powered lasers, power platforms, and orbiting space stations.

  6. Computational Fluid Dynamics Technology for Hypersonic Applications

    Science.gov (United States)

    Gnoffo, Peter A.

    2003-01-01

    Several current challenges in computational fluid dynamics and aerothermodynamics for hypersonic vehicle applications are discussed. Example simulations are presented from code validation and code benchmarking efforts to illustrate capabilities and limitations. Opportunities to advance the state-of-art in algorithms, grid generation and adaptation, and code validation are identified. Highlights of diverse efforts to address these challenges are then discussed. One such effort to re-engineer and synthesize the existing analysis capability in LAURA, VULCAN, and FUN3D will provide context for these discussions. The critical (and evolving) role of agile software engineering practice in the capability enhancement process is also noted.

  7. Network Computer Technology. Phase I: Viability and Promise within NASA's Desktop Computing Environment

    Science.gov (United States)

    Paluzzi, Peter; Miller, Rosalind; Kurihara, West; Eskey, Megan

    1998-01-01

    Over the past several months, major industry vendors have made a business case for the network computer as a win-win solution toward lowering total cost of ownership. This report provides results from Phase I of the Ames Research Center network computer evaluation project. It identifies factors to be considered for determining cost of ownership; further, it examines where, when, and how network computer technology might fit in NASA's desktop computing architecture.

  8. Computers and terminals as an aid to international technology transfer

    Science.gov (United States)

    Sweeney, W. T.

    1974-01-01

    As technology transfer becomes more popular and proves to be an economical method for companies of all sizes to take advantage of a tremendous amount of new and available technology from sources all over the world, the introduction of computers and terminals into the international technology transfer process is proving to be a successful method for companies to take part in this beneficial approach to new business opportunities.

  9. The role of computer simulation in nuclear technologies development

    International Nuclear Information System (INIS)

    Tikhonchev, M.Yu.; Shimansky, G.A.; Lebedeva, E.E.; Lichadeev, V. V.; Ryazanov, D.K.; Tellin, A.I.

    2001-01-01

    In the report the role and purposes of computer simulation in nuclear technologies development is discussed. The authors consider such applications of computer simulation as nuclear safety researches, optimization of technical and economic parameters of acting nuclear plant, planning and support of reactor experiments, research and design new devices and technologies, design and development of 'simulators' for operating personnel training. Among marked applications the following aspects of computer simulation are discussed in the report: neutron-physical, thermal and hydrodynamics models, simulation of isotope structure change and damage dose accumulation for materials under irradiation, simulation of reactor control structures. (authors)

  10. Chinese-English Automation and Computer Technology Dictionary, Volume 2.

    Science.gov (United States)

    1980-08-01

    jisuanji numerical integrator and computer ; MANIAC shuxue guanxi " mathenatical relation 02 shuxue guanxishi mathematical relation 03 shuxue gTinafa m...AD-A119 5󈧵 AIR INTELLIGENCE GROUP (7602ND) APO SAN FRANCISCO 96263 F/G 5/2 AUG SoCHINESE-ENGLISH AUTOMATION AND COMPUTER TECHNOLOGY DICTIONARY...Chinese-English Automation and Computer Technology Dictionary VOL 2 ItT: SEP 2LECTE \\This dcuflent h as een c i tsrO tog public te1a sae’ I d~suil to

  11. Near threshold computing technology, methods and applications

    CERN Document Server

    Silvano, Cristina

    2016-01-01

    This book explores near-threshold computing (NTC), a design-space using techniques to run digital chips (processors) near the lowest possible voltage.  Readers will be enabled with specific techniques to design chips that are extremely robust; tolerating variability and resilient against errors.  Variability-aware voltage and frequency allocation schemes will be presented that will provide performance guarantees, when moving toward near-threshold manycore chips.  ·         Provides an introduction to near-threshold computing, enabling reader with a variety of tools to face the challenges of the power/utilization wall; ·         Demonstrates how to design efficient voltage regulation, so that each region of the chip can operate at the most efficient voltage and frequency point; ·         Investigates how performance guarantees can be ensured when moving towards NTC manycores through variability-aware voltage and frequency allocation schemes.  .

  12. 9th International Conference on Advanced Computing & Communication Technologies

    CERN Document Server

    Mandal, Jyotsna; Auluck, Nitin; Nagarajaram, H

    2016-01-01

    This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27–29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.

  13. Rapid automatic keyword extraction for information retrieval and analysis

    Science.gov (United States)

    Rose, Stuart J [Richland, WA; Cowley,; E, Wendy [Richland, WA; Crow, Vernon L [Richland, WA; Cramer, Nicholas O [Richland, WA

    2012-03-06

    Methods and systems for rapid automatic keyword extraction for information retrieval and analysis. Embodiments can include parsing words in an individual document by delimiters, stop words, or both in order to identify candidate keywords. Word scores for each word within the candidate keywords are then calculated based on a function of co-occurrence degree, co-occurrence frequency, or both. Based on a function of the word scores for words within the candidate keyword, a keyword score is calculated for each of the candidate keywords. A portion of the candidate keywords are then extracted as keywords based, at least in part, on the candidate keywords having the highest keyword scores.

  14. Mobile Computing: The Emerging Technology, Sensing, Challenges and Applications

    International Nuclear Information System (INIS)

    Bezboruah, T.

    2010-12-01

    The mobile computing is a computing system in which a computer and all necessary accessories like files and software are taken out to the field. It is a system of computing through which it is being able to use a computing device even when someone being mobile and therefore changing location. The portability is one of the important aspects of mobile computing. The mobile phones are being used to gather scientific data from remote and isolated places that could not be possible to retrieve by other means. The scientists are initiating to use mobile devices and web-based applications to systematically explore interesting scientific aspects of their surroundings, ranging from climate change, environmental pollution to earthquake monitoring. This mobile revolution enables new ideas and innovations to spread out more quickly and efficiently. Here we will discuss in brief about the mobile computing technology, its sensing, challenges and the applications. (author)

  15. AGIS: Integration of new technologies used in ATLAS Distributed Computing

    CERN Document Server

    Anisenkov, Alexey; The ATLAS collaboration; Alandes Pradillo, Maria

    2016-01-01

    AGIS is the information system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing (ADC) applications and services. In this note, we describe the evolution and the recent developments of AGIS functionalities, related to integration of new technologies recently become widely used in ATLAS Computing like flexible computing utilization of opportunistic Cloud and HPC resources, ObjectStore services integration for Distributed Data Management (Rucio) and ATLAS workload management (PanDA) systems, unified storage protocols declaration required for PandDA Pilot site movers and others.

  16. Impact of new computing systems on computational mechanics and flight-vehicle structures technology

    Science.gov (United States)

    Noor, A. K.; Storaasli, O. O.; Fulton, R. E.

    1984-01-01

    Advances in computer technology which may have an impact on computational mechanics and flight vehicle structures technology were reviewed. The characteristics of supersystems, highly parallel systems, and small systems are summarized. The interrelations of numerical algorithms and software with parallel architectures are discussed. A scenario for future hardware/software environment and engineering analysis systems is presented. Research areas with potential for improving the effectiveness of analysis methods in the new environment are identified.

  17. Extending the horizons advances in computing, optimization, and decision technologies

    CERN Document Server

    Joseph, Anito; Mehrotra, Anuj; Trick, Michael

    2007-01-01

    Computer Science and Operations Research continue to have a synergistic relationship and this book represents the results of cross-fertilization between OR/MS and CS/AI. It is this interface of OR/CS that makes possible advances that could not have been achieved in isolation. Taken collectively, these articles are indicative of the state-of-the-art in the interface between OR/MS and CS/AI and of the high caliber of research being conducted by members of the INFORMS Computing Society. EXTENDING THE HORIZONS: Advances in Computing, Optimization, and Decision Technologies is a volume that presents the latest, leading research in the design and analysis of algorithms, computational optimization, heuristic search and learning, modeling languages, parallel and distributed computing, simulation, computational logic and visualization. This volume also emphasizes a variety of novel applications in the interface of CS, AI, and OR/MS.

  18. The Perception of EFL High School Students in Using of Computer Technology in the Process of Learning: Merits and Demerits

    Directory of Open Access Journals (Sweden)

    Siros Izadpanah

    2016-06-01

    Full Text Available Recent developments in the field of computer technology have led to a renewed interest in the process of learning.  In order to investigate EFL learners’ perception of technology use, a mixed method design was used to explore students’ attitude. Quantitative data was collected through questionnaires and qualitative data using open-ended questions.The questionnaire was distributed in two different high schools (one male and one female in Zanjan, 2015. Participants were 340 high school students who filled in CALLAI questionnaire. The data of the questionnaire was analysed using Statistical Packages for Social Sciences (SPSS Version 20. Descriptive statistics including frequencies and percentages were used to analyze questionnaire items. Data gathered from open-ended questions was analysed using qualitative data analysis software NVivo 8.0. It was found that students had positive attitude toward facilitation of English learning in the classroom through computer technology. Our objective was to explore students’ perceptions of technology usage in high schools .The implication of this study was that students, with prior experience in technology, might benefit more from technology use in education. Furthermore, it could be guidance for teachers to better understand world of technology and recognize possible barriers to integration of technology. Keywords: Advantages of Computer Technology, Computer and EFL Teaching, EFL High School Students, English learning, Perceptions of EFL learners

  19. Understanding and enhancing user acceptance of computer technology

    Science.gov (United States)

    Rouse, William B.; Morris, Nancy M.

    1986-01-01

    Technology-driven efforts to implement computer technology often encounter problems due to lack of acceptance or begrudging acceptance of the personnel involved. It is argued that individuals' acceptance of automation, in terms of either computerization or computer aiding, is heavily influenced by their perceptions of the impact of the automation on their discretion in performing their jobs. It is suggested that desired levels of discretion reflect needs to feel in control and achieve self-satisfaction in task performance, as well as perceptions of inadequacies of computer technology. Discussion of these factors leads to a structured set of considerations for performing front-end analysis, deciding what to automate, and implementing the resulting changes.

  20. On the impact of quantum computing technology on future developments in high-performance scientific computing

    NARCIS (Netherlands)

    Möller, M.; Vuik, C.

    2017-01-01

    Quantum computing technologies have become a hot topic in academia and industry receiving much attention and financial support from all sides. Building a quantum computer that can be used practically is in itself an outstanding challenge that has become the ‘new race to the moon’. Next to

  1. Portable Computer Technology (PCT) Research and Development Program Phase 2

    Science.gov (United States)

    Castillo, Michael; McGuire, Kenyon; Sorgi, Alan

    1995-01-01

    The subject of this project report, focused on: (1) Design and development of two Advanced Portable Workstation 2 (APW 2) units. These units incorporate advanced technology features such as a low power Pentium processor, a high resolution color display, National Television Standards Committee (NTSC) video handling capabilities, a Personal Computer Memory Card International Association (PCMCIA) interface, and Small Computer System Interface (SCSI) and ethernet interfaces. (2) Use these units to integrate and demonstrate advanced wireless network and portable video capabilities. (3) Qualification of the APW 2 systems for use in specific experiments aboard the Mir Space Station. A major objective of the PCT Phase 2 program was to help guide future choices in computing platforms and techniques for meeting National Aeronautics and Space Administration (NASA) mission objectives. The focus being on the development of optimal configurations of computing hardware, software applications, and network technologies for use on NASA missions.

  2. Field-programmable custom computing technology architectures, tools, and applications

    CERN Document Server

    Luk, Wayne; Pocek, Ken

    2000-01-01

    Field-Programmable Custom Computing Technology: Architectures, Tools, and Applications brings together in one place important contributions and up-to-date research results in this fast-moving area. In seven selected chapters, the book describes the latest advances in architectures, design methods, and applications of field-programmable devices for high-performance reconfigurable systems. The contributors to this work were selected from the leading researchers and practitioners in the field. It will be valuable to anyone working or researching in the field of custom computing technology. It serves as an excellent reference, providing insight into some of the most challenging issues being examined today.

  3. Application of software technology to a future spacecraft computer design

    Science.gov (United States)

    Labaugh, R. J.

    1980-01-01

    A study was conducted to determine how major improvements in spacecraft computer systems can be obtained from recent advances in hardware and software technology. Investigations into integrated circuit technology indicated that the CMOS/SOS chip set being developed for the Air Force Avionics Laboratory at Wright Patterson had the best potential for improving the performance of spaceborne computer systems. An integral part of the chip set is the bit slice arithmetic and logic unit. The flexibility allowed by microprogramming, combined with the software investigations, led to the specification of a baseline architecture and instruction set.

  4. International Conference on Computer Science and Information Technology

    CERN Document Server

    Li, Xiaolong

    2014-01-01

    The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational Sciences and Information Technology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computer science, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.

  5. Helicopter mission optimization study. [portable computer technology for flight optimization

    Science.gov (United States)

    Olson, J. R.

    1978-01-01

    The feasibility of using low-cost, portable computer technology to help a helicopter pilot optimize flight parameters to minimize fuel consumption and takeoff and landing noise was demonstrated. Eight separate computer programs were developed for use in the helicopter cockpit using a hand-held computer. The programs provide the helicopter pilot with the ability to calculate power required, minimum fuel consumption for both range and endurance, maximum speed and a minimum noise profile for both takeoff and landing. Each program is defined by a maximum of two magnetic cards. The helicopter pilot is required to key in the proper input parameter such as gross weight, outside air temperature or pressure altitude.

  6. Fundamentals of grid computing theory, algorithms and technologies

    CERN Document Server

    2010-01-01

    This volume discusses how the novel technologies of semantic web and workflow have been integrated into the grid and grid services. It focuses on sharing resources, data replication, data management, fault tolerance, scheduling, broadcasting, and load balancing algorithms. The book discusses emerging developments in grid computing, including cloud computing, and explores large-scale computing in high energy physics, weather forecasting, and more. The contributors often use simulations to evaluate the performance of models and algorithms. In the appendices, they present two types of easy-to-use open source software written in Java

  7. 2nd International Conference on Computer and Communication Technologies

    CERN Document Server

    Raju, K; Mandal, Jyotsna; Bhateja, Vikrant

    2016-01-01

    The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the te...

  8. 11th International Conference on Computing and Information Technology

    CERN Document Server

    Meesad, Phayung; Boonkrong, Sirapat

    2015-01-01

    This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.

  9. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  10. What's New in Computers? MMX Technology for Multimedia PCs

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 2; Issue 9. What's New in Computers ? MMX Technology for Multimedia PCs. S Balakrishnan. Feature Article Volume 2 Issue 9 September 1997 pp 48-57. Fulltext. Click here to view fulltext PDF. Permanent link:

  11. Troubling Discourse: Basic Writing and Computer-Mediated Technologies

    Science.gov (United States)

    Jonaitis, Leigh A.

    2012-01-01

    Through an examination of literature in the fields of Basic Writing and developmental education, this essay provides some historical perspective and examines the prevalent discourses on the use of computer-mediated technologies in the basic writing classroom. The author uses Bertram Bruce's (1997) framework of various "stances" on…

  12. NASA CST aids U.S. industry. [computational structures technology

    Science.gov (United States)

    Housner, Jerry M.; Pinson, Larry D.

    1993-01-01

    The effect of NASA's computational structures Technology (CST) research on aerospace vehicle design and operation is discussed. The application of this research to proposed version of a high-speed civil transport, to composite structures in aerospace, to the study of crack growth, and to resolving field problems is addressed.

  13. INFLUENCE OF DEVELOPMENT OF COMPUTER TECHNOLOGIES ON TEACHING

    Directory of Open Access Journals (Sweden)

    Sead Rešić

    2012-09-01

    Full Text Available Our times are characterized by strong changes in technology that have become reality in many areas of society. When compared to production, transport, services, etc education, as a rule, slowly opens to new technologies. However, children at their homes and outside the schools live in a technologically rich environment, and they expect the change in education in accordance with the imperatives of the education for the twenty-first century. In this sense, systems for automated data processing, multimedia systems, then distance learning, virtual schools and other technologies are being introduced into education. They lead to an increase in students' activities, quality evaluation of their knowledge and finally to their progress, all in accordance with individual abilities and knowledge. Mathematics and computers often appear together in the teaching process. Taking into account the teaching of mathematics, computers and software packages have a significant role. The program requirements are not dominant. The emphasis is on mathematical content and the method of presentation. Computers are especially used in solving various mathematical tasks and self-learning of mathematics. Still, many problems that require solutions appear in the process: how to organise lectures, practice, textbooks, collected mathematical problems, written exams, how to assign and check homework. The answers to these questions are not simple and they will probably be sought continuously, with an increasing use of computers in the teaching process. In this paper I have tried to solve some of the questions above.

  14. Information Technology in project-organized electronic and computer technology engineering education

    DEFF Research Database (Denmark)

    Nielsen, Kirsten Mølgaard; Nielsen, Jens Frederik Dalsgaard

    1999-01-01

    This paper describes the integration of IT in the education of electronic and computer technology engineers at Institute of Electronic Systems, Aalborg Uni-versity, Denmark. At the Institute Information Technology is an important tool in the aspects of the education as well as for communication...

  15. Guide to cloud computing for business and technology managers from distributed computing to cloudware applications

    CERN Document Server

    Kale, Vivek

    2014-01-01

    Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book:Introduces the enterprise applications integration (EAI) solutions that were a first ste

  16. Providing Assistive Technology Applications as a Service Through Cloud Computing.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Users with disabilities interact with Personal Computers (PCs) using Assistive Technology (AT) software solutions. Such applications run on a PC that a person with a disability commonly uses. However the configuration of AT applications is not trivial at all, especially whenever the user needs to work on a PC that does not allow him/her to rely on his / her AT tools (e.g., at work, at university, in an Internet point). In this paper, we discuss how cloud computing provides a valid technological solution to enhance such a scenario.With the emergence of cloud computing, many applications are executed on top of virtual machines (VMs). Virtualization allows us to achieve a software implementation of a real computer able to execute a standard operating system and any kind of application. In this paper we propose to build personalized VMs running AT programs and settings. By using the remote desktop technology, our solution enables users to control their customized virtual desktop environment by means of an HTML5-based web interface running on any computer equipped with a browser, whenever they are.

  17. The state of ergonomics for mobile computing technology.

    Science.gov (United States)

    Dennerlein, Jack T

    2015-01-01

    Because mobile computing technologies, such as notebook computers, smart mobile phones, and tablet computers afford users many different configurations through their intended mobility, there is concern about their effects on musculoskeletal pain and a need for usage recommendations. Therefore the main goal of this paper to determine which best practices surrounding the use of mobile computing devices can be gleaned from current field and laboratory studies of mobile computing devices. An expert review was completed. Field studies have documented various user configurations, which often include non-neutral postures, that users adopt when using mobile technology, along with some evidence suggesting that longer duration of use is associated with more discomfort. It is therefore prudent for users to take advantage of their mobility and not get stuck in any given posture for too long. The use of accessories such as appropriate cases or riser stands, as well as external keyboards and pointing devices, can also improve postures and comfort. Overall, the state of ergonomics for mobile technology is a work in progress and there are more research questions to be addressed.

  18. AGIS: Integration of new technologies used in ATLAS Distributed Computing

    Science.gov (United States)

    Anisenkov, Alexey; Di Girolamo, Alessandro; Alandes Pradillo, Maria

    2017-10-01

    The variety of the ATLAS Distributed Computing infrastructure requires a central information system to define the topology of computing resources and to store different parameters and configuration data which are needed by various ATLAS software components. The ATLAS Grid Information System (AGIS) is the system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing applications and services. Being an intermediate middleware system between clients and external information sources (like central BDII, GOCDB, MyOSG), AGIS defines the relations between experiment specific used resources and physical distributed computing capabilities. Being in production during LHC Runl AGIS became the central information system for Distributed Computing in ATLAS and it is continuously evolving to fulfil new user requests, enable enhanced operations and follow the extension of the ATLAS Computing model. The ATLAS Computing model and data structures used by Distributed Computing applications and services are continuously evolving and trend to fit newer requirements from ADC community. In this note, we describe the evolution and the recent developments of AGIS functionalities, related to integration of new technologies recently become widely used in ATLAS Computing, like flexible computing utilization of opportunistic Cloud and HPC resources, ObjectStore services integration for Distributed Data Management (Rucio) and ATLAS workload management (PanDA) systems, unified storage protocols declaration required for PandDA Pilot site movers and others. The improvements of information model and general updates are also shown, in particular we explain how other collaborations outside ATLAS could benefit the system as a computing resources information catalogue. AGIS is evolving towards a common information system, not coupled to a specific experiment.

  19. Overview of European technology in computers, telecommunications, and electronics

    Science.gov (United States)

    Blackburn, J. F.

    1990-05-01

    The emergence of the personal computer, the growing use of distributed systems, and the increasing demand for supercomputers and mini-supercomputers are causing a profound impact on the European computer market. An equally profound development in telecommunications is the integration of voice, data, and images in the public network systems - the Integrated Service Digital Network (ISDN). The programs being mounted in Europe to meet the challenges of these technologies are described. The Europe-wide trends and actions with respect to computers, telecommunications, and microelectronics are discussed, and the major European collaborative programs in these fields are described. Specific attention is given to the European Strategic Programme for Research and Development in Information (ESPRIT); Research in Advanced Communications for Europe (RACE); European Research Coordination Agency (Eureka) programs; Joint European Submicron Silicon Initiative (JESSI); and the recently combined programs Basic Research Industrial Technologies in Europe/European Research in Advanced Materials (BRITE/EURAM).

  20. Leveraging mobile computing and communication technologies in education

    DEFF Research Database (Denmark)

    Annan, Nana Kofi

    these ubiquitous ICTs can be used to facilitate teaching and learning, based on a conceptual framework, which uses mobile learning platform to supplement traditional face-to-face method of education. The study uses both qualitative and quantitative data with action research as the strategy of inquiry. The study......The emergence of mobile computing and communication technologies has come with it, an unprecedented transformation in digitalising every aspect of human activities. This transformation has brought about a high degree of mobility in the way knowledge is constructed, processed, stored...... and disseminated through the use of portable information and communication technologies (ICTs) such as smart phones, tablets, personal computers and laptop computers. These mobile devices use mobile communication infrastructure to promote the mobility affordances for human activities anywhere and anytime. Although...

  1. National Energy Research Scientific Computing Center (NERSC): Advancing the frontiers of computational science and technology

    Energy Technology Data Exchange (ETDEWEB)

    Hules, J. [ed.

    1996-11-01

    National Energy Research Scientific Computing Center (NERSC) provides researchers with high-performance computing tools to tackle science`s biggest and most challenging problems. Founded in 1974 by DOE/ER, the Controlled Thermonuclear Research Computer Center was the first unclassified supercomputer center and was the model for those that followed. Over the years the center`s name was changed to the National Magnetic Fusion Energy Computer Center and then to NERSC; it was relocated to LBNL. NERSC, one of the largest unclassified scientific computing resources in the world, is the principal provider of general-purpose computing services to DOE/ER programs: Magnetic Fusion Energy, High Energy and Nuclear Physics, Basic Energy Sciences, Health and Environmental Research, and the Office of Computational and Technology Research. NERSC users are a diverse community located throughout US and in several foreign countries. This brochure describes: the NERSC advantage, its computational resources and services, future technologies, scientific resources, and computational science of scale (interdisciplinary research over a decade or longer; examples: combustion in engines, waste management chemistry, global climate change modeling).

  2. Technology and society: ideological implications of information and computer technologies in the Soviet Union

    Energy Technology Data Exchange (ETDEWEB)

    Weigle, M.A.

    1988-01-01

    This study examines the impact of technology on the USSR's social system from the perspective of Soviet ideological development. The analysis of information and computer technologies within this framework de-emphasizes both modernization theories and those that assume unchallenged Communist Party control over technological development. Previous studies have examined the level of Soviet technological achievements and the gap between this level and those in the West, many referring to ideological boundaries of Soviet technological development without, however, systematically analyzing the resulting implications for the Soviet ideology of Marxism-Leninism. This study develops a framework for analyzing the impact of new technologies in the USSR in the fields of technology, ideology, and the scientific and technological revolution. On the basis of this framework, examination turns to the relevant Soviet theoretical and technical literature and debates among Soviety elites, concluding that the introduction of information and computer technologies and the organization of computer networks has exacerbated tensions in Soviety Marxism-Leninism.

  3. TX-Kw: An Effective Temporal XML Keyword Search

    OpenAIRE

    Rasha Bin-Thalab; Neamat El-Tazi; Mohamed E.El-Sharkawi

    2013-01-01

    Inspired by the great success of information retrieval (IR) style keyword search on the web, keyword search on XML has emerged recently. Existing methods cannot resolve challenges addressed by using keyword search in Temporal XML documents. We propose a way to evaluate temporal keyword search queries over Temporal XML documents. Moreover, we propose a new ranking method based on the time-aware IR ranking methods to rank temporal keyword search queries results. Extensive experiments have been ...

  4. PKIS: practical keyword index search on cloud datacenter

    Directory of Open Access Journals (Sweden)

    Park Jae Hyun

    2011-01-01

    Full Text Available Abstract This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms under the provable security, they do not focus on the interoperability of the encrypted DB. In order to address this lack of practical aspects, we conduct two practical approaches--efficiency and group search in cloud datacenter. The process of this paper is as follows: first, we create two schemes of efficiency and group search--practical keyword index search--I and II; second, we define and analyze group search secrecy and keyword index search privacy in our schemes; third, we experiment on efficient performances over our proposed encrypted DB. As the result, we summarize two major results: (1our proposed schemes can support a secure group search without re-encrypting all documents under the group-key update and (2our experiments represent that our scheme is approximately 935 times faster than Golle's scheme and about 16 times faster than Song's scheme for 10,000 documents. Based on our experiments and results, this paper has the following contributions: (1 in the current cloud computing environments, our schemes provide practical, realistic, and secure solutions over the encrypted DB and (2 this paper identifies the importance of interoperability with database management system for designing efficient schemes.

  5. Research on application of computer technologies in jewelry process

    Directory of Open Access Journals (Sweden)

    Junbo Xia

    2017-06-01

    Full Text Available Jewelry production is a process of precious raw materials and low losses in processing. The traditional manual mode is unable to meet the needs of enterprises in reality, while the involvement of computer technology can just solve this practical problem. At present, the problem of restricting the application for computer in jewelry production is mainly a failure to find a production model that can serve the whole industry chain with the computer as the core of production. This paper designs a “synchronous and diversified” production model with “computer aided design technology” and “rapid prototyping technology” as the core, and tests with actual production cases, and achieves certain results, which are forward-looking and advanced.

  6. 4th International Conference on Applied Computing and Information Technology

    CERN Document Server

    2017-01-01

    This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12–14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. Th...

  7. Computing, information, and communications: Technologies for the 21. Century

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  8. Survey of computer vision technology for UVA navigation

    Science.gov (United States)

    Xie, Bo; Fan, Xiang; Li, Sijian

    2017-11-01

    Navigation based on computer version technology, which has the characteristics of strong independence, high precision and is not susceptible to electrical interference, has attracted more and more attention in the filed of UAV navigation research. Early navigation project based on computer version technology mainly applied to autonomous ground robot. In recent years, the visual navigation system is widely applied to unmanned machine, deep space detector and underwater robot. That further stimulate the research of integrated navigation algorithm based on computer version technology. In China, with many types of UAV development and two lunar exploration, the three phase of the project started, there has been significant progress in the study of visual navigation. The paper expounds the development of navigation based on computer version technology in the filed of UAV navigation research and draw a conclusion that visual navigation is mainly applied to three aspects as follows.(1) Acquisition of UAV navigation parameters. The parameters, including UAV attitude, position and velocity information could be got according to the relationship between the images from sensors and carrier's attitude, the relationship between instant matching images and the reference images and the relationship between carrier's velocity and characteristics of sequential images.(2) Autonomous obstacle avoidance. There are many ways to achieve obstacle avoidance in UAV navigation. The methods based on computer version technology ,including feature matching, template matching, image frames and so on, are mainly introduced. (3) The target tracking, positioning. Using the obtained images, UAV position is calculated by using optical flow method, MeanShift algorithm, CamShift algorithm, Kalman filtering and particle filter algotithm. The paper expounds three kinds of mainstream visual system. (1) High speed visual system. It uses parallel structure, with which image detection and processing are

  9. Report of the Panel on Computer and Information Technology

    Science.gov (United States)

    Lundstrom, Stephen F.; Larsen, Ronald L.

    1984-01-01

    Aircraft have become more and more dependent on computers (information processing) for improved performance and safety. It is clear that this activity will grow, since information processing technology has advanced by a factor of 10 every 5 years for the past 35 years and will continue to do so. Breakthroughs in device technology, from vacuum tubes through transistors to integrated circuits, contribute to this rapid pace. This progress is nearly matched by similar, though not as dramatic, advances in numerical software and algorithms. Progress has not been easy. Many technical and nontechnical challenges were surmounted. The outlook is for continued growth in capability but will require surmounting new challenges. The technology forecast presented in this report has been developed by extrapolating current trends and assessing the possibilities of several high-risk research topics. In the process, critical problem areas that require research and development emphasis have been identified. The outlook assumes a positive perspective; the projected capabilities are possible by the year 2000, and adequate resources will be made available to achieve them. Computer and information technology forecasts and the potential impacts of this technology on aeronautics are identified. Critical issues and technical challenges underlying the achievement of forecasted performance and benefits are addressed.

  10. Technology computer aided design simulation for VLSI MOSFET

    CERN Document Server

    Sarkar, Chandan Kumar

    2013-01-01

    Responding to recent developments and a growing VLSI circuit manufacturing market, Technology Computer Aided Design: Simulation for VLSI MOSFET examines advanced MOSFET processes and devices through TCAD numerical simulations. The book provides a balanced summary of TCAD and MOSFET basic concepts, equations, physics, and new technologies related to TCAD and MOSFET. A firm grasp of these concepts allows for the design of better models, thus streamlining the design process, saving time and money. This book places emphasis on the importance of modeling and simulations of VLSI MOS transistors and

  11. Cloud computing and patient engagement: leveraging available technology.

    Science.gov (United States)

    Noblin, Alice; Cortelyou-Ward, Kendall; Servan, Rosa M

    2014-01-01

    Cloud computing technology has the potential to transform medical practices and improve patient engagement and quality of care. However, issues such as privacy and security and "fit" can make incorporation of the cloud an intimidating decision for many physicians. This article summarizes the four most common types of clouds and discusses their ideal uses, how they engage patients, and how they improve the quality of care offered. This technology also can be used to meet Meaningful Use requirements 1 and 2; and, if speculation is correct, the cloud will provide the necessary support needed for Meaningful Use 3 as well.

  12. 12th International Conference on Computing and Information Technology

    CERN Document Server

    Boonkrong, Sirapat; Unger, Herwig

    2016-01-01

    This proceedings book presents recent research work and results in the area of communication and information technologies. The chapters of this book contain the main, well-selected and reviewed contributions of scientists who met at the 12th International Conference on Computing and Information Technology (IC2IT) held during 7th - 8th July 2016 in Khon Kaen, Thailand The book is divided into three parts: “User Centric Data Mining and Text Processing”, “Data Mining Algoritms and their Applications” and “Optimization of Complex Networks”.

  13. Earth Science Keyword Stewardship: Access and Management through NASA's Global Change Master Directory (GCMD) Keyword Management System (KMS)

    Science.gov (United States)

    Stevens, T.; Olsen, L. M.; Ritz, S.; Morahan, M.; Aleman, A.; Cepero, L.; Gokey, C.; Holland, M.; Cordova, R.; Areu, S.; Cherry, T.; Tran-Ho, H.

    2012-12-01

    Discovering Earth science data can be complex if the catalog holding the data lacks structure. Controlled keyword vocabularies within metadata catalogues can improve data discovery. NASA's Global Change Master Directory's (GCMD) Keyword Management System (KMS) is a recently released a RESTful web service for managing and providing access to controlled keywords (science keywords, service keywords, platforms, instruments, providers, locations, projects, data resolution, etc.). The KMS introduces a completely new paradigm for the use and management of the keywords and allows access to these keywords as SKOS Concepts (RDF), OWL, standard XML, and CSV. A universally unique identifier (UUID) is automatically assigned to each keyword, which uniquely identifies each concept and its associated information. A component of the KMS is the keyword manager, an internal tool that allows GCMD science coordinators to manage concepts. This includes adding, modifying, and deleting broader, narrower, or related concepts and associated definitions. The controlled keyword vocabulary represents over 20 years of effort and collaboration with the Earth science community. The maintenance, stability, and ongoing vigilance in maintaining mutually exclusive and parallel keyword lists is important for a "normalized" search and discovery, and provides a unique advantage for the science community. Modifications and additions are made based on community suggestions and internal review. To help maintain keyword integrity, science keyword rules and procedures for modification of keywords were developed. This poster will highlight the use of the KMS as a beneficial service for the stewardship and access of the GCMD keywords. Users will learn how to access the KMS and utilize the keywords. Best practices for managing an extensive keyword hierarchy will also be discussed. Participants will learn the process for making keyword suggestions, which subsequently help in building a controlled keyword

  14. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  15. The Application of Computer Music Technology to College Students

    OpenAIRE

    Wang Na

    2016-01-01

    Contemporary music education started late in China on the basis of western teaching theories formed its own unique system, which has a great influence on present computer music technology. This paper explores that contemporary music education is analyzed advantages and disadvantages of the influence on the development of Chinese class music, and the solutions are found out to the existing problems, summed up the reality enlightenment of that the contemporary music on the impact of education.

  16. The Application of Computer Music Technology to College Students

    Directory of Open Access Journals (Sweden)

    Wang Na

    2016-01-01

    Full Text Available Contemporary music education started late in China on the basis of western teaching theories formed its own unique system, which has a great influence on present computer music technology. This paper explores that contemporary music education is analyzed advantages and disadvantages of the influence on the development of Chinese class music, and the solutions are found out to the existing problems, summed up the reality enlightenment of that the contemporary music on the impact of education.

  17. Advanced Technologies for Human-Computer Interfaces in Mixed Reality

    OpenAIRE

    Marchesi, Marco

    2016-01-01

    As human beings, we trust our five senses, that allow us to experience the world and communicate. Since our birth, the amount of data that every day we can acquire is impressive and such a richness reflects the complexity of humankind in arts, technology, etc. The advent of computers and the consequent progress in Data Science and Artificial Intelligence showed how large amounts of data can contain some sort of “intelligence” themselves. Machines learn and create a superimposed layer of reali...

  18. Advanced Computing for 21st Century Accelerator Science and Technology

    International Nuclear Information System (INIS)

    Dragt, Alex J.

    2004-01-01

    Dr. Dragt of the University of Maryland is one of the Institutional Principal Investigators for the SciDAC Accelerator Modeling Project Advanced Computing for 21st Century Accelerator Science and Technology whose principal investigators are Dr. Kwok Ko (Stanford Linear Accelerator Center) and Dr. Robert Ryne (Lawrence Berkeley National Laboratory). This report covers the activities of Dr. Dragt while at Berkeley during spring 2002 and at Maryland during fall 2003

  19. Vector Field Visual Data Analysis Technologies for Petascale Computational Science

    Energy Technology Data Exchange (ETDEWEB)

    Garth, Christoph; Deines, Eduard; Joy, Kenneth I.; Bethel, E. Wes; Childs, Hank; Weber, Gunther; Ahern, Sean; Pugmire, Dave; Sanderson, Allen; Johnson, Chris

    2009-11-13

    State-of-the-art computational science simulations generate large-scale vector field data sets. Visualization and analysis is a key aspect of obtaining insight into these data sets and represents an important challenge. This article discusses possibilities and challenges of modern vector field visualization and focuses on methods and techniques developed in the SciDAC Visualization and Analytics Center for Enabling Technologies (VACET) and deployed in the open-source visualization tool, VisIt.

  20. A Study of Practical Proxy Reencryption with a Keyword Search Scheme considering Cloud Storage Structure

    Directory of Open Access Journals (Sweden)

    Sun-Ho Lee

    2014-01-01

    Full Text Available Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.

  1. A study of practical proxy reencryption with a keyword search scheme considering cloud storage structure.

    Science.gov (United States)

    Lee, Sun-Ho; Lee, Im-Yeong

    2014-01-01

    Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.

  2. Computer-Aided Modeling of Lipid Processing Technology

    DEFF Research Database (Denmark)

    Diaz Tovar, Carlos Axel

    2011-01-01

    increase along with growing interest in biofuels, the oleochemical industry faces in the upcoming years major challenges in terms of design and development of better products and more sustainable processes to make them. Computer-aided methods and tools for process synthesis, modeling and simulation...... are widely used for design, analysis, and optimization of processes in the chemical and petrochemical industries. These computer-aided tools have helped the chemical industry to evolve beyond commodities toward specialty chemicals and ‘consumer oriented chemicals based products’. Unfortunately...... to develop systematic computer-aided methods (property models) and tools (database) related to the prediction of the necessary physical properties suitable for design and analysis of processes employing lipid technologies. The methods and tools include: the development of a lipid-database (CAPEC...

  3. Public-key Encryption with Registered Keyword Search

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is

  4. Campus Computing, 1998. The Ninth National Survey of Desktop Computing and Information Technology in American Higher Education.

    Science.gov (United States)

    Green, Kenneth C.

    This report presents findings of a June 1998 survey of computing officials at 1,623 two- and four-year U.S. colleges and universities concerning the use of computer technology. The survey found that computing and information technology (IT) are now core components of the campus environment and classroom experience. However, key aspects of IT…

  5. Web page sorting algorithm based on query keyword distance relation

    Science.gov (United States)

    Yang, Han; Cui, Hong Gang; Tang, Hao

    2017-08-01

    In order to optimize the problem of page sorting, according to the search keywords in the web page in the relationship between the characteristics of the proposed query keywords clustering ideas. And it is converted into the degree of aggregation of the search keywords in the web page. Based on the PageRank algorithm, the clustering degree factor of the query keyword is added to make it possible to participate in the quantitative calculation. This paper proposes an improved algorithm for PageRank based on the distance relation between search keywords. The experimental results show the feasibility and effectiveness of the method.

  6. Development of superconductor electronics technology for high-end computing

    Science.gov (United States)

    Silver, A.; Kleinsasser, A.; Kerber, G.; Herr, Q.; Dorojevets, M.; Bunyk, P.; Abelson, L.

    2003-12-01

    This paper describes our programme to develop and demonstrate ultra-high performance single flux quantum (SFQ) VLSI technology that will enable superconducting digital processors for petaFLOPS-scale computing. In the hybrid technology, multi-threaded architecture, the computational engine to power a petaFLOPS machine at affordable power will consist of 4096 SFQ multi-chip processors, with 50 to 100 GHz clock frequency and associated cryogenic RAM. We present the superconducting technology requirements, progress to date and our plan to meet these requirements. We improved SFQ Nb VLSI by two generations, to a 8 kA cm-2, 1.25 µm junction process, incorporated new CAD tools into our methodology, demonstrated methods for recycling the bias current and data communication at speeds up to 60 Gb s-1, both on and between chips through passive transmission lines. FLUX-1 is the most ambitious project implemented in SFQ technology to date, a prototype general-purpose 8 bit microprocessor chip. We are testing the FLUX-1 chip (5K gates, 20 GHz clock) and designing a 32 bit floating-point SFQ multiplier with vector-register memory. We report correct operation of the complete stripline-connected gate library with large bias margins, as well as several larger functional units used in FLUX-1. The next stage will be an SFQ multi-processor machine. Important challenges include further reducing chip supply current and on-chip power dissipation, developing at least 64 kbit, sub-nanosecond cryogenic RAM chips, developing thermally and electrically efficient high data rate cryogenic-to-ambient input/output technology and improving Nb VLSI to increase gate density.

  7. Computational Fluid Dynamics (CFD) Technology Programme 1995- 1999

    Energy Technology Data Exchange (ETDEWEB)

    Haekkinen, R.J.; Hirsch, C.; Krause, E.; Kytoemaa, H.K. [eds.

    1997-12-31

    The report is a mid-term evaluation of the Computational Fluid Dynamics (CFD) Technology Programme started by Technology Development Centre Finland (TEKES) in 1995 as a five-year initiative to be concluded in 1999. The main goal of the programme is to increase the know-how and application of CFD in Finnish industry, to coordinate and thus provide a better basis for co-operation between national CFD activities and encouraging research laboratories and industry to establish co-operation with the international CFD community. The projects of the programme focus on the following areas: (1) studies of modeling the physics and dynamics of the behaviour of fluid material, (2) expressing the physical models in a numerical mode and developing a computer codes, (3) evaluating and testing current physical models and developing new ones, (4) developing new numerical algorithms, solvers, and pre- and post-processing software, and (5) applying the new computational tools to problems relevant to their ultimate industrial use. The report consists of two sections. The first considers issues concerning the whole programme and the second reviews each project

  8. Computer technology applications in industrial and organizational psychology.

    Science.gov (United States)

    Crespin, Timothy R; Austin, James T

    2002-08-01

    This article reviews computer applications developed and utilized by industrial-organizational (I-O) psychologists, both in practice and in research. A primary emphasis is on applications developed for Internet usage, because this "network of networks" changes the way I-O psychologists work. The review focuses on traditional and emerging topics in I-O psychology. The first topic involves information technology applications in measurement, defined broadly across levels of analysis (persons, groups, organizations) and domains (abilities, personality, attitudes). Discussion then focuses on individual learning at work, both in formal training and in coping with continual automation of work. A section on job analysis follows, illustrating the role of computers and the Internet in studying jobs. Shifting focus to the group level of analysis, we briefly review how information technology is being used to understand and support cooperative work. Finally, special emphasis is given to the emerging "third discipline" in I-O psychology research-computational modeling of behavioral events in organizations. Throughout this review, themes of innovation and dissemination underlie a continuum between research and practice. The review concludes by setting a framework for I-O psychology in a computerized and networked world.

  9. Use of Soft Computing Technologies For Rocket Engine Control

    Science.gov (United States)

    Trevino, Luis C.; Olcmen, Semih; Polites, Michael

    2003-01-01

    The problem to be addressed in this paper is to explore how the use of Soft Computing Technologies (SCT) could be employed to further improve overall engine system reliability and performance. Specifically, this will be presented by enhancing rocket engine control and engine health management (EHM) using SCT coupled with conventional control technologies, and sound software engineering practices used in Marshall s Flight Software Group. The principle goals are to improve software management, software development time and maintenance, processor execution, fault tolerance and mitigation, and nonlinear control in power level transitions. The intent is not to discuss any shortcomings of existing engine control and EHM methodologies, but to provide alternative design choices for control, EHM, implementation, performance, and sustaining engineering. The approaches outlined in this paper will require knowledge in the fields of rocket engine propulsion, software engineering for embedded systems, and soft computing technologies (i.e., neural networks, fuzzy logic, and Bayesian belief networks), much of which is presented in this paper. The first targeted demonstration rocket engine platform is the MC-1 (formerly FASTRAC Engine) which is simulated with hardware and software in the Marshall Avionics & Software Testbed laboratory that

  10. Condition Monitoring Through Advanced Sensor and Computational Technology

    International Nuclear Information System (INIS)

    Kim, Jung Taek; Park, Won Man; Kim, Jung Soo; Seong, Soeng Hwan; Hur, Sub; Cho, Jae Hwan; Jung, Hyung Gue

    2005-05-01

    The overall goal of this joint research project was to develop and demonstrate advanced sensors and computational technology for continuous monitoring of the condition of components, structures, and systems in advanced and next-generation nuclear power plants (NPPs). This project included investigating and adapting several advanced sensor technologies from Korean and US national laboratory research communities, some of which were developed and applied in non-nuclear industries. The project team investigated and developed sophisticated signal processing, noise reduction, and pattern recognition techniques and algorithms. The researchers installed sensors and conducted condition monitoring tests on two test loops, a check valve (an active component) and a piping elbow (a passive component), to demonstrate the feasibility of using advanced sensors and computational technology to achieve the project goal. Acoustic emission (AE) devices, optical fiber sensors, accelerometers, and ultrasonic transducers (UTs) were used to detect mechanical vibratory response of check valve and piping elbow in normal and degraded configurations. Chemical sensors were also installed to monitor the water chemistry in the piping elbow test loop. Analysis results of processed sensor data indicate that it is feasible to differentiate between the normal and degraded (with selected degradation mechanisms) configurations of these two components from the acquired sensor signals, but it is questionable that these methods can reliably identify the level and type of degradation. Additional research and development efforts are needed to refine the differentiation techniques and to reduce the level of uncertainties

  11. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  12. Advanced intelligent computational technologies and decision support systems

    CERN Document Server

    Kountchev, Roumen

    2014-01-01

    This book offers a state of the art collection covering themes related to Advanced Intelligent Computational Technologies and Decision Support Systems which can be applied to fields like healthcare assisting the humans in solving problems. The book brings forward a wealth of ideas, algorithms and case studies in themes like: intelligent predictive diagnosis; intelligent analyzing of medical images; new format for coding of single and sequences of medical images; Medical Decision Support Systems; diagnosis of Down’s syndrome; computational perspectives for electronic fetal monitoring; efficient compression of CT Images; adaptive interpolation and halftoning for medical images; applications of artificial neural networks for real-life problems solving; present and perspectives for Electronic Healthcare Record Systems; adaptive approaches for noise reduction in sequences of CT images etc.

  13. Technologies for Large Data Management in Scientific Computing

    CERN Document Server

    Pace, A

    2014-01-01

    In recent years, intense usage of computing has been the main strategy of investigations in several scientific research projects. The progress in computing technology has opened unprecedented opportunities for systematic collection of experimental data and the associated analysis that were considered impossible only few years ago. This paper focusses on the strategies in use: it reviews the various components that are necessary for an effective solution that ensures the storage, the long term preservation, and the worldwide distribution of large quantities of data that are necessary in a large scientific research project. The paper also mentions several examples of data management solutions used in High Energy Physics for the CERN Large Hadron Collider (LHC) experiments in Geneva, Switzerland which generate more than 30,000 terabytes of data every year that need to be preserved, analyzed, and made available to a community of several tenth of thousands scientists worldwide.

  14. Application Specific Performance Technology for Productive Parallel Computing

    Energy Technology Data Exchange (ETDEWEB)

    Malony, Allen D. [Univ. of Oregon, Eugene, OR (United States); Shende, Sameer [Univ. of Oregon, Eugene, OR (United States)

    2008-09-30

    Our accomplishments over the last three years of the DOE project Application- Specific Performance Technology for Productive Parallel Computing (DOE Agreement: DE-FG02-05ER25680) are described below. The project will have met all of its objectives by the time of its completion at the end of September, 2008. Two extensive yearly progress reports were produced in in March 2006 and 2007 and were previously submitted to the DOE Office of Advanced Scientific Computing Research (OASCR). Following an overview of the objectives of the project, we summarize for each of the project areas the achievements in the first two years, and then describe in some more detail the project accomplishments this past year. At the end, we discuss the relationship of the proposed renewal application to the work done on the current project.

  15. Neural computation and particle accelerators research, technology and applications

    CERN Document Server

    D'Arras, Horace

    2010-01-01

    This book discusses neural computation, a network or circuit of biological neurons and relatedly, particle accelerators, a scientific instrument which accelerates charged particles such as protons, electrons and deuterons. Accelerators have a very broad range of applications in many industrial fields, from high energy physics to medical isotope production. Nuclear technology is one of the fields discussed in this book. The development that has been reached by particle accelerators in energy and particle intensity has opened the possibility to a wide number of new applications in nuclear technology. This book reviews the applications in the nuclear energy field and the design features of high power neutron sources are explained. Surface treatments of niobium flat samples and superconducting radio frequency cavities by a new technique called gas cluster ion beam are also studied in detail, as well as the process of electropolishing. Furthermore, magnetic devises such as solenoids, dipoles and undulators, which ...

  16. Emerging computer technologies and the news media of the future

    Science.gov (United States)

    Vrabel, Debra A.

    1993-01-01

    The media environment of the future may be dramatically different from what exists today. As new computing and communications technologies evolve and synthesize to form a global, integrated communications system of networks, public domain hardware and software, and consumer products, it will be possible for citizens to fulfill most information needs at any time and from any place, to obtain desired information easily and quickly, to obtain information in a variety of forms, and to experience and interact with information in a variety of ways. This system will transform almost every institution, every profession, and every aspect of human life--including the creation, packaging, and distribution of news and information by media organizations. This paper presents one vision of a 21st century global information system and how it might be used by citizens. It surveys some of the technologies now on the market that are paving the way for new media environment.

  17. Symposium on computational fluid dynamics: technology and applications

    International Nuclear Information System (INIS)

    1988-01-01

    A symposium on the technology and applications of computational fluid dynamics (CFD) was held in Pretoria from 21-23 Nov 1988. The following aspects were covered: multilevel adaptive methods and multigrid solvers in CFD, a symbolic processing approach to CFD, interplay between CFD and analytical approximations, CFD on a transfer array, the application of CFD in high speed aerodynamics, numerical simulation of laminar blood flow, two-phase flow modelling in nuclear accident analysis, and the finite difference scheme for the numerical solution of fluid flow

  18. Soft Computing in Information Communication Technology Volume 2

    CERN Document Server

    2012-01-01

    This book is a collection of the accepted papers concerning soft computing in information communication technology. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Fuzzy Logic, Machine Learning, Cryptography, Pattern Recognition, Bioinformatics, Biomedical Engineering, Advancements in ICT.

  19. The Development of Sociocultural Competence with the Help of Computer Technology

    Science.gov (United States)

    Rakhimova, Alina E.; Yashina, Marianna E.; Mukhamadiarova, Albina F.; Sharipova, Astrid V.

    2017-01-01

    The article deals with the description of the process of development sociocultural knowledge and competences using computer technologies. On the whole the development of modern computer technologies allows teachers to broaden trainees' sociocultural outlook and trace their progress online. Observation of modern computer technologies and estimation…

  20. Proceedings of the 2012 International Conference on Information Technology and Software Engineering : Information Technology & Computing Intelligence

    CERN Document Server

    Cai, Guoqiang; Liu, Weibin; Xing, Weiwei

    2013-01-01

    Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012. This book presents the latest research trends, methods and experimental results in the fields of information technology and software engineering, covering various state-of-the-art research theories and approaches. The subjects range from intelligent computing to information processing, software engineering, Web, unified modeling language (UML), multimedia, communication technologies, system identification, graphics and visualizing, etc. The proceedings provide a major interdisciplinary forum for researchers and engineers to present the most innovative studies and advances, which can serve as an excellent reference work for researchers and graduate students working on information technology and software engineering. Prof. Wei Lu, Dr. Guoqiang Cai, Prof. Weibin Liu and Dr. Weiwei Xing all work at Beijing Jiaotong Uni...

  1. Preservice teachers’ preparedness to integrate computer technology into the curriculum

    Directory of Open Access Journals (Sweden)

    Jelena Magliaro

    2008-05-01

    Full Text Available For Canada to compete effectively in the digital world, beginning teachers need to play an important role in integrating computer technology into the curriculum. Equipment and connectivity do not guarantee successful or productive use of computers in the classroom, but the combination of the teaching style and technology use has the potential to change education. In this research, the computer self-efficacy beliefs of 210 preservice teachers after their first practice teaching placements were examined. First, the quantitative component of the study involved the use of Computer User Self-Efficacy (CUSE scale where students’ previous undergraduate degree, licensure area, experience and familiarity with software packages were found to have statistically significant effects on computer self-efficacy. Second, the qualitative data indicated that society and school were the most positive factors that influenced preservice teachers’ attitudes towards computers, while the family had the highest percentage of negative influence. Findings reveal that although preservice teachers had completed only two months of the program, those with higher CUSE scores were more ready to integrate computers into their lessons than those with lower scores. Résumé: Pour que le Canada puisse entrer en compétition dans le monde numérique, les nouveaux enseignants devront jouer un rôle important d’intégration des technologies informatiques dans le curriculum. Les équipements et la connectivité ne garantissent pas une utilisation gagnante ou productive de l’ordinateur en salle de classe, mais la combinaison de styles d’enseignement et d’usages de la technologie a le potentiel de changer l’éducation. Dans cette étude, les croyances d’auto-efficacité à l’ordinateur de 210 futurs enseignants après leur première affectation ont été examinées. Premièrement, la partie quantitative de l’étude impliquait l’utilisation de l’échelle du Computer

  2. Advances in computer-aided design and computer-aided manufacture technology.

    Science.gov (United States)

    Calamia, J R

    1996-01-01

    Although the development of computer-aided design (CAD) and computer-aided manufacture (CAM) technology and the benefits of increased productivity became obvious in the automobile and aerospace industries in the 1970s, investigations of this technology's application in the field of dentistry did not begin until the 1980s. Only now are we beginning to see the fruits of this work with the commercial availability of some systems; the potential for this technology seems boundless. This article reviews the recent literature with emphasis on the period from June 1992 to May 1993. This review should familiarize the reader with some of the latest developments in this technology, including a brief description of some systems currently available and the clinical and economical rationale for their acceptance into the dental mainstream. This article concentrates on a particular system, the Cerec (Siemens/Pelton and Crane, Charlotte, NC) system, for three reasons: First, this system has been available since 1985 and, as a result, has a track record of almost 7 years of data. Most of the data have just recently been released and consequently, much of this year's literature on CAD-CAM is monopolized by studies using this system. Second, this system was developed as a mobile, affordable, direct chairside CAD-CAM restorative method. As such, it is of special interest to the patient, providing a one-visit restoration. Third, the author is currently engaged in research using this particular system and has a working knowledge of this system's capabilities.

  3. Computing Technologies for Oriented Education: Applications in Biological Sciences

    Directory of Open Access Journals (Sweden)

    Santiago Jaime Reyes

    2005-12-01

    Full Text Available The experience developing modern digital programs with highly qualified profesoors with several years of teaching postgraduate biological sciences matters is described. A small group of selected professors with a minimum knowledged or basic domain in computer software were invited to develop digital programs in the items of their interest,the purpose is to establish the bases for construction of an available digital library. The products to develop are a series of CD-ROM with program source in HTML format. The didactic strategy responds to a personal tutorship, step by step workshop, to build its own project (without programming languages. The workshop begins generating trust in very simple activities. It is designed to learn building and to advance evaluating the progress. It is fulfilled the necessity to put up-to-date the available material that regularly uses to impart the classes (video, slides, pictures, articles, examples etc. The information and computing technologies ICT are a indispensable tool to diffuse the knowledge to a coarser and more diverse public in the topics of their speciality. The obtained products are 8 CD ROM with didactic programs designed with scientific and technological bases.

  4. Output Keywords in Context in an HTML File with Python

    Directory of Open Access Journals (Sweden)

    William J. Turkel

    2012-07-01

    Full Text Available This lesson builds on Keywords in Context (Using N-grams, where n-grams were extracted from a text. Here, you will learn how to output all of the n-grams of a given keyword in a document downloaded from the Internet, and display them clearly in your browser window.

  5. [Efficacy of the keyword mnemonic method in adults].

    Science.gov (United States)

    Campos, Alfredo; Pérez-Fabello, María José; Camino, Estefanía

    2010-11-01

    Two experiments were used to assess the efficacy of the keyword mnemonic method in adults. In Experiment 1, immediate and delayed recall (at a one-day interval) were assessed by comparing the results obtained by a group of adults using the keyword mnemonic method in contrast to a group using the repetition method. The mean age of the sample under study was 59.35 years. Subjects were required to learn a list of 16 words translated from Latin into Spanish. Participants who used keyword mnemonics that had been devised by other experimental participants of the same characteristics, obtained significantly higher immediate and delayed recall scores than participants in the repetition method. In Experiment 2, other participants had to learn a list of 24 Latin words translated into Spanish by using the keyword mnemonic method reinforced with pictures. Immediate and delayed recall were significantly greater in the keyword mnemonic method group than in the repetition method group.

  6. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  7. Campus Computing, 1996. The Seventh National Survey of Desktop Computing and Information Technology in American Higher Education.

    Science.gov (United States)

    Green, Kenneth C.

    This report presents the findings of a June, 1996, survey of computing officials at 660 two- and four-year colleges and universities across the United States concerning the use of computer technology on college campuses. The survey found that instructional integration and user support emerged as the two most important information technology (IT)…

  8. Tag cloud generation for results of multiple keywords queries

    DEFF Research Database (Denmark)

    Leginus, Martin; Dolog, Peter; Lage, Ricardo Gomes

    2013-01-01

    In this paper we study tag cloud generation for retrieved results of multiple keyword queries. It is motivated by many real world scenarios such as personalization tasks, surveillance systems and information retrieval tasks defined with multiple keywords. We adjust the state-of-the-art tag cloud...... generation techniques for multiple keywords query results. Consequently, we conduct the extensive evaluation on top of three distinct collaborative tagging systems. The graph-based methods perform significantly better for the Movielens and Bibsonomy datasets. Tag cloud generation based on maximal coverage...

  9. An approach for discovering keywords from Spanish tweets using Wikipedia

    Directory of Open Access Journals (Sweden)

    Daniel AYALA

    2016-05-01

    Full Text Available Most approaches to keywords discovery when analyzing microblogging messages (among them those from Twitter are based on statistical and lexical information about the words that compose the text. The lack of context in the short messages can be problematic due to the low co-occurrence of words. In this paper, we present a new approach for keywords discovering from Spanish tweets based on the addition of context information using Wikipedia as a knowledge base. We present four different ways to use Wikipedia and two ways to rank the new keywords. We have tested these strategies using more than 60000 Spanish tweets, measuring performance and analyzing particularities of each strategy.

  10. An introduction to XML query processing and keyword search

    CERN Document Server

    Lu, Jiaheng

    2013-01-01

    This book systematically and comprehensively covers the latest advances in XML data searching. It presents an extensive overview of the current query processing and keyword search techniques on XML data.

  11. Missile signal processing common computer architecture for rapid technology upgrade

    Science.gov (United States)

    Rabinkin, Daniel V.; Rutledge, Edward; Monticciolo, Paul

    2004-10-01

    Interceptor missiles process IR images to locate an intended target and guide the interceptor towards it. Signal processing requirements have increased as the sensor bandwidth increases and interceptors operate against more sophisticated targets. A typical interceptor signal processing chain is comprised of two parts. Front-end video processing operates on all pixels of the image and performs such operations as non-uniformity correction (NUC), image stabilization, frame integration and detection. Back-end target processing, which tracks and classifies targets detected in the image, performs such algorithms as Kalman tracking, spectral feature extraction and target discrimination. In the past, video processing was implemented using ASIC components or FPGAs because computation requirements exceeded the throughput of general-purpose processors. Target processing was performed using hybrid architectures that included ASICs, DSPs and general-purpose processors. The resulting systems tended to be function-specific, and required custom software development. They were developed using non-integrated toolsets and test equipment was developed along with the processor platform. The lifespan of a system utilizing the signal processing platform often spans decades, while the specialized nature of processor hardware and software makes it difficult and costly to upgrade. As a result, the signal processing systems often run on outdated technology, algorithms are difficult to update, and system effectiveness is impaired by the inability to rapidly respond to new threats. A new design approach is made possible three developments; Moore's Law - driven improvement in computational throughput; a newly introduced vector computing capability in general purpose processors; and a modern set of open interface software standards. Today's multiprocessor commercial-off-the-shelf (COTS) platforms have sufficient throughput to support interceptor signal processing requirements. This application

  12. Lecture Video Indexing and Retrieval Using Topic Keywords

    OpenAIRE

    B. J. Sandesh; Saurabha Jirgi; S. Vidya; Prakash Eljer; Gowri Srinivasa

    2017-01-01

    In this paper, we propose a framework to help users to search and retrieve the portions in the lecture video of their interest. This is achieved by temporally segmenting and indexing the lecture video using the topic keywords. We use transcribed text from the video and documents relevant to the video topic extracted from the web for this purpose. The keywords for indexing are found by applying the non-negative matrix factorization (NMF) topic modeling techniques on the web documents. Our prop...

  13. Invited Paper --A Keyword History of Marketing Science

    OpenAIRE

    Carl F. Mela; Jason Roos; Yiting Deng

    2013-01-01

    This paper considers the history of keywords used in Marketing Science to develop insights on the evolution of marketing science. Several findings emerge. First, "pricing" and "game theory" are the most ubiquitous words. More generally, the three C's and four P's predominate, suggesting that keywords and common practical frameworks align. Various trends exist. Some words, like "pricing," remain popular over time. Others, like "game theory" and "hierarchical Bayes," have become more popular. F...

  14. Enabling self-directed computer use for individuals with cerebral palsy: a systematic review of assistive devices and technologies.

    Science.gov (United States)

    Davies, T Claire; Mudge, Suzie; Ameratunga, Shanthi; Stott, N Susan

    2010-06-01

    The purpose of this study was to systematically review published evidence on the development, use, and effectiveness of devices and technologies that enable or enhance self-directed computer access by individuals with cerebral palsy (CP). Nine electronic databases were searched using keywords 'computer', 'software', 'spastic', 'athetoid', and 'cerebral palsy'; the reference lists of articles thus identified were also searched. Thirty articles were selected for review, with 23 reports of development and usability testing of devices and seven evaluations of algorithms to increase computer recognition of input and cursor movements. Twenty-four studies had fewer than 10 participants with CP, with a wide age range of 5 to 77 years. Computer task performance was usually tested, but only three groups sought participant feedback on ease and comfort of use. International standards exist to evaluate effectiveness of non-keyboard devices, but only one group undertook this testing. None of the study designs were higher than American Academy for Cerebral Palsy and Developmental Medicine level IV. Access solutions for individuals with CP are in the early stages of development. Future work should include assessment of end-user comfort, effort, and performance as well as design features. Engaging users and therapists when designing and evaluating technologies to enhance computer access may increase acceptance and improve performance.

  15. Japanese technology assessment: Computer science, opto- and microelectronics mechatronics, biotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Brandin, D.; Wieder, H.; Spicer, W.; Nevins, J.; Oxender, D.

    1986-01-01

    The series studies Japanese research and development in four high-technology areas - computer science, opto and microelectronics, mechatronics (a term created by the Japanese to describe the union of mechanical and electronic engineering to produce the next generation of machines, robots, and the like), and biotechnology. The evaluations were conducted by panels of U.S. scientists - chosen from academia, government, and industry - actively involved in research in areas of expertise. The studies were prepared for the purpose of aiding the U.S. response to Japan's technological challenge. The main focus of the assessments is on the current status and long-term direction and emphasis of Japanese research and development. Other aspects covered include evolution of the state of the art; identification of Japanese researchers, R and D organizations, and resources; and comparative U.S. efforts. The general time frame of the studies corresponds to future industrial applications and potential commercial impacts spanning approximately the next two decades.

  16. Computer technologies for industrial risk prevention and emergency management

    International Nuclear Information System (INIS)

    Balduccelli, C.; Bologna, S.; Di Costanzo, G.; Vicoli, G.

    1996-07-01

    This document provides an overview about problems related to the engineering of computer based systems for industrial risk prevention and emergency management. Such systems are rather complex and subject to precise reliability and safety requirements. With the evolution of informatic technologies, such systems are becoming to be the means for building protective barriers for reduction of risk associated with plant operations. For giving more generality to this document, and for not concentrating on only a specific plant, the emergency management systems will be dealt with more details than ones for accident prevention. The document is organized in six chapters. Chapter one is an introduction to the problem and to its state of art, with particular emphasis to the aspects of safety requirements definition. Chapter two is an introduction to the problems related to the emergency management and to the training of operators in charge of this task. Chapter three deals in details the topic of the Training Support Systems, in particular about MUSTER (multi-user system for training and evaluation of environmental emergency response) system. Chapter four deals in details the topic of decision support systems, in particular about ISEM (information technology support for emergency management) system. Chapter five illustrates an application of support to the operators of Civil Protection Department for the management of emergencies in the fields of industrial chemical. Chapter six is about a synthesis of the state of art and the future possibilities, identifying some research and development activities more promising for the future

  17. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  18. The Diffusion of Computer-Based Technology in K-12 Schools: Teachers' Perspectives

    Science.gov (United States)

    Colandrea, John Louis

    2012-01-01

    Because computer technology represents a major financial outlay for school districts and is an efficient method of preparing and delivering lessons, studying the process of teacher adoption of computer use is beneficial and adds to the current body of knowledge. Because the teacher is the ultimate user of computer technology for lesson preparation…

  19. A Detailed Analysis over Some Important Issues towards Using Computer Technology into the EFL Classrooms

    Science.gov (United States)

    Gilakjani, Abbas Pourhosein

    2014-01-01

    Computer technology has changed the ways we work, learn, interact and spend our leisure time. Computer technology has changed every aspect of our daily life--how and where we get our news, how we order goods and services, and how we communicate. This study investigates some of the significant issues concerning the use of computer technology…

  20. Factors Contributing to Teachers' Use of Computer Technology in the Classroom

    Science.gov (United States)

    Gilakjani, Abbas Pourhosein

    2013-01-01

    There are many factors for teachers to use computer technology in their classrooms. The goal of this study is to identify some of the important factors contributing the teachers' use of computer technology. The first goal of this paper is to discuss computer self-efficacy. The second goal is to explain teaching experience. The third goal is to…

  1. USING COMPUTER TECHNOLOGIES IN REALIZATION OF MAIN TARGETS IN MODERN BIOLOGY EDUCATION

    Directory of Open Access Journals (Sweden)

    Iryna Yu. Slipchuk

    2010-08-01

    Full Text Available The main problem of this article is using the computer technologies in the process of biology education. This article contains the results of explorations in computer technologies and the influence of these technologies on the quality of knowledge and level of progress in secondary school.

  2. Technological Metaphors and Moral Education: The Hacker Ethic and the Computational Experience

    Science.gov (United States)

    Warnick, Bryan R.

    2004-01-01

    This essay is an attempt to understand how technological metaphors, particularly computer metaphors, are relevant to moral education. After discussing various types of technological metaphors, it is argued that technological metaphors enter moral thought through their "functional descriptions." The computer metaphor is then explored by turning to…

  3. The Acceptance of Computer Technology by Teachers in Early Childhood Education

    Science.gov (United States)

    Jeong, Hye In; Kim, Yeolib

    2017-01-01

    This study investigated kindergarten teachers' decision-making process regarding the acceptance of computer technology. We incorporated the Technology Acceptance Model framework, in addition to computer self-efficacy, subjective norm, and personal innovativeness in education technology as external variables. The data were obtained from 160…

  4. Prototype Space Technology Hall of Fame exhibit at Technology 2003: Analysis of data from computer-based questionaire

    Science.gov (United States)

    Ewell, Robert N.

    1994-01-01

    The U.S. Space Foundation displayed its prototype Space Technology Hall of Fame exhibit design at the Technology 2003 conference in Anaheim, CA, December 7-9, 1993. In order to sample public opinion on space technology in general and the exhibit in particular, a computer-based survey was set up as a part of the display. The data collected was analyzed.

  5. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  6. Computer architectures for computational physics work done by Computational Research and Technology Branch and Advanced Computational Concepts Group

    Science.gov (United States)

    1985-01-01

    Slides are reproduced that describe the importance of having high performance number crunching and graphics capability. They also indicate the types of research and development underway at Ames Research Center to ensure that, in the near term, Ames is a smart buyer and user, and in the long-term that Ames knows the best possible solutions for number crunching and graphics needs. The drivers for this research are real computational physics applications of interest to Ames and NASA. They are concerned with how to map the applications, and how to maximize the physics learned from the results of the calculations. The computer graphics activities are aimed at getting maximum information from the three-dimensional calculations by using the real time manipulation of three-dimensional data on the Silicon Graphics workstation. Work is underway on new algorithms that will permit the display of experimental results that are sparse and random, the same way that the dense and regular computed results are displayed.

  7. Patent Keyword Extraction Algorithm Based on Distributed Representation for Patent Classification

    Directory of Open Access Journals (Sweden)

    Jie Hu

    2018-02-01

    Full Text Available Many text mining tasks such as text retrieval, text summarization, and text comparisons depend on the extraction of representative keywords from the main text. Most existing keyword extraction algorithms are based on discrete bag-of-words type of word representation of the text. In this paper, we propose a patent keyword extraction algorithm (PKEA based on the distributed Skip-gram model for patent classification. We also develop a set of quantitative performance measures for keyword extraction evaluation based on information gain and cross-validation, based on Support Vector Machine (SVM classification, which are valuable when human-annotated keywords are not available. We used a standard benchmark dataset and a homemade patent dataset to evaluate the performance of PKEA. Our patent dataset includes 2500 patents from five distinct technological fields related to autonomous cars (GPS systems, lidar systems, object recognition systems, radar systems, and vehicle control systems. We compared our method with Frequency, Term Frequency-Inverse Document Frequency (TF-IDF, TextRank and Rapid Automatic Keyword Extraction (RAKE. The experimental results show that our proposed algorithm provides a promising way to extract keywords from patent texts for patent classification.

  8. Application of computational technologies to ribozyme biotechnology products

    Science.gov (United States)

    Christoffersen, Ralph E.; McSwiggen, James; Konings, Danielle

    1994-07-01

    Ribozymes are RNA molecules that act enzymatically to cleave other RNA molecules. The cleavage reaction requires the binding of ribozyme to specific sites on the target RNA through (mostly) Watson-Crick base-pairing interactions. Association of ribozyme with target completes a three-dimensional ribozyme/target complex which results in cleavage of the target RNA. We are employing both computational and experimental approaches to identify sites on target RNA molecules that are open to ribozyme attack and to determine which ribozymes are most active against those sites. Two types of computational technologies are available for aiding in the identification of target sites and design of active ribozymes. First, DNA/RNA sequence analysis software is employed to identify sequence motifs necessary for ribozyme cleavage and to look for sequence conservation between different sources of the target organism so that ribozymes with the broadest possible target range can be designed. Second, RNA folding algorithms are employed to predict the secondary structure of both ribozyme and target RNA in an attempt to identify combinations of ribozyme and target site that will successfully associate prior to ribozyme cleavage. The RNA folding algorithms utilize a set of thermodynamic parameters obtained from measurements on short RNA duplexes; while these rules give reasonable predictions of secondary structure for a small set of highly structured RNAs, they remain largely untested for predicting the structure of messenger RNAs. This paper outlines the current status of designing ribozymes that fold correctly and of locating target sites that are sufficiently unfolded to allow ribozyme cleavage.

  9. FY 1995 Blue Book: High Performance Computing and Communications: Technology for the National Information Infrastructure

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program was created to accelerate the development of future generations of high performance computers...

  10. Assessment of computer dispatch technology in the paratransit industry

    Science.gov (United States)

    Intelligent Vehicle-Highway Systems (IVHS) technologies include a range of communications and control technologies. The U.S. Department of Transportation has applied IVHS technologies, such as electronic payment media, automatic vehicle locator syste...

  11. Interdisciplinarity of Nano Research Fields : A Keyword Mining Approach

    NARCIS (Netherlands)

    Wang, L.; Notten, A.; Surpatean, A.

    2012-01-01

    Using a keyword mining approach, this paper explores the interdisciplinary and integrative dynamics in five nano research fields. We argue that the general trend of integration in nano research fields is converging in the long run, although the degree of this convergence depends greatly on the

  12. Joint Top-K Spatial Keyword Query Processing

    DEFF Research Database (Denmark)

    Wu, Dinming; Yiu, Man Lung; Cong, Gao

    2012-01-01

    keyword queries. Empirical studies show that the proposed solution is efficient on real data sets. We also offer analytical studies on synthetic data sets to demonstrate the efficiency of the proposed solution. Index Terms IEEE Terms Electronic mail , Google , Indexes , Joints , Mobile communication...

  13. Using the Keyword Mnemonics Method among Adult Learners

    Science.gov (United States)

    Campos, Alfredo; Camino, Estefania; Perez-Fabello, Maria Jose

    2011-01-01

    The aim of the present study was to assess the influence of word image vividness on the immediate and long-term recall (one-day interval) of words using either the rote repetition learning method or the keyword mnemonics method in a sample of adults aged 55 to 70 years. Subjects learned a list of concrete and abstract words using either rote…

  14. FY 1998 Blue Book: Computing, Information, and Communications: Technologies for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As the 21st century approaches, the rapid convergence of computing, communications, and information technology promises unprecedented opportunities for scientific...

  15. Computer program for distance learning of pesticide application technology

    Directory of Open Access Journals (Sweden)

    Bruno Maia

    2011-12-01

    Full Text Available Distance learning presents great potential for mitigating field problems on pesticide application technology. Thus, due to the lack of teaching material about pesticide spraying technology in the Portuguese language and the increasing availability of distance learning, this study developed and evaluated a computer program for distance learning about the theory of pesticide spraying technology using the tools of information technology. The modules comprising the course, named Pulverizar, were: (1 Basic concepts, (2 Factors that affect application, (3 Equipments, (4 Spraying nozzles, (5 Sprayer calibration, (6 Aerial application, (7 Chemigation, (8 Physical-chemical properties, (9 Formulations, (10 Adjuvants, (11 Water quality, and (12 Adequate use of pesticides. The program was made available to the public on July 1st, 2008, hosted at the web site www.pulverizar.iciag.ufu.br, and was simple, robust and practical on the complementation of traditional teaching for the education of professionals in Agricultural Sciences. Mastering pesticide spraying technology by people involved in agricultural production can be facilitated by the program Pulverizar, which was well accepted in its initial evaluation.O ensino à distância apresenta grande potencial para minorar os problemas ocorridos no campo na área de tecnologia de aplicação de agroquímicos. Dessa forma, diante da escassez de material instrucional na área de tecnologia de aplicação de agroquímicos em Português e do crescimento elevado da educação à distância, o objetivo deste trabalho foi desenvolver e avaliar um programa computacional para o ensino à distância da parte teórica de tecnologia de aplicação de agroquímicos, utilizando as ferramentas de tecnologia da informação. Os módulos que compuseram o curso, intitulado Pulverizar, foram: (1 Conceitos básicos, (2 Fatores que afetam a aplicação, (3 Equipamentos, (4 Pontas de pulverização, (5 Calibração de pulverizadores

  16. COMPUTER TECHNOLOGIES IN THE FORMATION OF COMPUTED MODELS OF MONOLITHIC REINFORCED CONCRETE STRUCTURES

    Directory of Open Access Journals (Sweden)

    Anatoliy I. Bedov

    2017-12-01

    Full Text Available The areas of application of concrete and reinforcement of higher grades for strength in structural elements of a monolithic reinforced concrete frame are considered. Analytic dependencies, criteria and boundary conditions are proposed that numerically describe the relationship between increasing the strength of concrete and reducing the consumption of reinforcing steel for bent and compressed-bent elements. Calculation-analytical models of the deformation state of overlaps of a monolithic reinforced concrete multi-storey frame have been developed on the basis of multifactor numerical studies carried out for various values of the thicknesses of ceilings, spans, operating loads, classes of concrete and reinforcement. Calculated parameters of slabs are determined, which determine their bearing capacity. On the basis of computer technology, the optimum section of a reinforced concrete element is modeled according to the criterion of reducing the material consumption and rational combination of classes of concrete and reinforcement.

  17. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  18. Campus Computing, 2001: The 12th National Survey of Computing and Information Technology in American Higher Education.

    Science.gov (United States)

    Green, Kenneth C.

    The 2001 Campus Computing Survey, the 12th such survey, is the largest continuing study of the role of computing and information technology in U.S. higher education today. The survey results in this report summarize data from 590 two- and four-year, public and private colleges across the United States, representing a 38.4% response rate. The focus…

  19. Preparing for Further Introduction of Computing Technology in Vancouver Community College Instruction. Report of the Instructional Computing Committee.

    Science.gov (United States)

    Vancouver Community Coll., British Columbia.

    After examining the impact of changing technology on postsecondary instruction and on the tools needed for instruction, this report analyzes the status and offers recommendations concerning the future of instructional computing at Vancouver Community College (VCC) in British Columbia. Section I focuses on the use of computers in community college…

  20. Proceedings of seventh symposium on sharing of computer programs and technology in nuclear medicine, computer assisted data processing

    International Nuclear Information System (INIS)

    Howard, B.Y.; McClain, W.J.; Landay, M.

    1977-01-01

    The Council on Computers (CC) of the Society of Nuclear Medicine (SNM) annually publishes the Proceedings of its Symposium on the Sharing of Computer Programs and Technology in Nuclear Medicine. This is the seventh such volume and has been organized by topic, with the exception of the invited papers and the discussion following them. An index arranged by author and by subject is included

  1. Proceedings of seventh symposium on sharing of computer programs and technology in nuclear medicine, computer assisted data processing

    Energy Technology Data Exchange (ETDEWEB)

    Howard, B.Y.; McClain, W.J.; Landay, M. (comps.)

    1977-01-01

    The Council on Computers (CC) of the Society of Nuclear Medicine (SNM) annually publishes the Proceedings of its Symposium on the Sharing of Computer Programs and Technology in Nuclear Medicine. This is the seventh such volume and has been organized by topic, with the exception of the invited papers and the discussion following them. An index arranged by author and by subject is included.

  2. A study of computer graphics technology in application of communication resource management

    Science.gov (United States)

    Li, Jing; Zhou, Liang; Yang, Fei

    2017-08-01

    With the development of computer technology, computer graphics technology has been widely used. Especially, the success of object-oriented technology and multimedia technology promotes the development of graphics technology in the computer software system. Therefore, the computer graphics theory and application technology have become an important topic in the field of computer, while the computer graphics technology becomes more and more extensive in various fields of application. In recent years, with the development of social economy, especially the rapid development of information technology, the traditional way of communication resource management cannot effectively meet the needs of resource management. In this case, the current communication resource management is still using the original management tools and management methods, resource management equipment management and maintenance, which brought a lot of problems. It is very difficult for non-professionals to understand the equipment and the situation in communication resource management. Resource utilization is relatively low, and managers cannot quickly and accurately understand the resource conditions. Aimed at the above problems, this paper proposes to introduce computer graphics technology into the communication resource management. The introduction of computer graphics not only makes communication resource management more vivid, but also reduces the cost of resource management and improves work efficiency.

  3. Keyword-based Ciphertext Search Algorithm under Cloud Storage

    Directory of Open Access Journals (Sweden)

    Ren Xunyi

    2016-01-01

    Full Text Available With the development of network storage services, cloud storage have the advantage of high scalability , inexpensive, without access limit and easy to manage. These advantages make more and more small or medium enterprises choose to outsource large quantities of data to a third party. This way can make lots of small and medium enterprises get rid of costs of construction and maintenance, so it has broad market prospects. But now lots of cloud storage service providers can not protect data security.This result leakage of user data, so many users have to use traditional storage method.This has become one of the important factors that hinder the development of cloud storage. In this article, establishing keyword index by extracting keywords from ciphertext data. After that, encrypted data and the encrypted index upload cloud server together.User get related ciphertext by searching encrypted index, so it can response data leakage problem.

  4. The Pollution Effect: Optimizing Keyword Auctions by Favoring Relevant Advertising

    OpenAIRE

    Linden, Greg; Meek, Christopher; Chickering, Max

    2011-01-01

    Most search engines sell slots to place advertisements on the search results page through keyword auctions. Advertisers offer bids for how much they are willing to pay when someone enters a search query, sees the search results, and then clicks on one of their ads. Search engines typically order the advertisements for a query by a combination of the bids and expected clickthrough rates for each advertisement. In this paper, we extend a model of Yahoo's and Google's advertising auctions to inc...

  5. Educational Technology Classics: The Computer versus the Clock

    Science.gov (United States)

    Slack, Charles W.

    2010-01-01

    It is no accident that the first use of computers in school systems was to arrange schedules for students and teachers. The proper use of the computer in the classroom is as a replacement for the clock and its strict temporal schedule. By conveying information through self-instructional content, the computer can schedule work for pupils in…

  6. Cloud Computing: A Free Technology Option to Promote Collaborative Learning

    Science.gov (United States)

    Siegle, Del

    2010-01-01

    In a time of budget cuts and limited funding, purchasing and installing the latest software on classroom computers can be prohibitive for schools. Many educators are unaware that a variety of free software options exist, and some of them do not actually require installing software on the user's computer. One such option is cloud computing. This…

  7. Making Advanced Computer Science Topics More Accessible through Interactive Technologies

    Science.gov (United States)

    Shao, Kun; Maher, Peter

    2012-01-01

    Purpose: Teaching advanced technical concepts in a computer science program to students of different technical backgrounds presents many challenges. The purpose of this paper is to present a detailed experimental pedagogy in teaching advanced computer science topics, such as computer networking, telecommunications and data structures using…

  8. Visualization as Seen through its Research Paper Keywords.

    Science.gov (United States)

    Isenberg, Petra; Isenberg, Tobias; Sedlmair, Michael; Chen, Jian; Moller, Torsten

    2017-01-01

    We present the results of a comprehensive multi-pass analysis of visualization paper keywords supplied by authors for their papers published in the IEEE Visualization conference series (now called IEEE VIS) between 1990-2015. From this analysis we derived a set of visualization topics that we discuss in the context of the current taxonomy that is used to categorize papers and assign reviewers in the IEEE VIS reviewing process. We point out missing and overemphasized topics in the current taxonomy and start a discussion on the importance of establishing common visualization terminology. Our analysis of research topics in visualization can, thus, serve as a starting point to (a) help create a common vocabulary to improve communication among different visualization sub-groups, (b) facilitate the process of understanding differences and commonalities of the various research sub-fields in visualization, (c) provide an understanding of emerging new research trends, (d) facilitate the crucial step of finding the right reviewers for research submissions, and (e) it can eventually lead to a comprehensive taxonomy of visualization research. One additional tangible outcome of our work is an online query tool (http://keyvis.org/) that allows visualization researchers to easily browse the 3952 keywords used for IEEE VIS papers since 1990 to find related work or make informed keyword choices.

  9. CISBAT 2007 - Software and new information technologies (computer simulation)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    This is the eleventh and final part of the proceedings of the 2007 CISBAT conference on Renewables in a changing climate, held in Lausanne, Switzerland. On the subject Information technologies and software the following oral contributions are summarised: 'A comparison study of the likely performance of an advanced naturally ventilated building: the relationship between computer simulation analysis and findings from a monitoring exercise', 'PhotonSim: Developing and testing a Monte Carlo ray tracing software for the simulation of planar solar concentrators' and 'Calibration of multiple energy simulations: case study on a Norwegian school building'. Posters summarised include 'Implementing energy building simulation into design studio: lessons learned in Brazil', 'MaterialsDB.org: a Tool for facilitating information exchange between building material providers and building physics softwares', 'Urban built environment climate modification: a modelling approach' and 'An assessment of the Simple Building Energy Model'. Further, the following Software that was presented on stands is summarised: 'Polysun 4: Simulation of solar thermal systems with complex hydraulics', 'Solangles: an internet online service to draw sun rays in plans and sections', 'Daylight 1-2-3: A text guide and a software as integrated tools for initial daylight/energy design', 'Meteonorm Version 5.0' and 'Transol 2.0 - Software for the design of solar thermal systems'. Further groups of presentations at the conference are reported on in separate database records. An index of authors completes the proceedings.

  10. Emerging Computation and Information teChnologies for Education : Proceeding of 2012 International Conference on Emerging Computation and Information teChnologies for Education

    CERN Document Server

    Xu, Linli; Tian, Wenya

    2012-01-01

    The 2012 International Conference on Emerging Computation and Information teChnologies for Education (ECICE 2012) was  held on Jan. 15-16, 2012, Hangzhou, China.  The main results of the conference are presented in this proceedings book of carefully reviewed and accepted paper addressing the hottest issues in emerging computation and information technologies used for education. The volume covers a wide series of topics in the area, including Computer-Assisted Education, Educational Information Systems, Web-based Learning, etc.

  11. Quantum Computers: A New Paradigm in Information Technology

    Directory of Open Access Journals (Sweden)

    Mahesh S. Raisinghani

    2001-01-01

    Full Text Available The word 'quantum' comes from the Latin word quantus meaning 'how much'. Quantum computing is a fundamentally new mode of information processing that can be performed only by harnessing physical phenomena unique to quantum mechanics (especially quantum interference. Paul Benioff of the Argonne National Laboratory first applied quantum theory to computers in 1981 and David Deutsch of Oxford proposed quantum parallel computers in 1985, years before the realization of qubits in 1995. However, it may be well into the 21st century before we see quantum computing used at a commercial level for a variety of reasons discussed in this paper. The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This paper discusses some of the current advances, applications, and chal-lenges of quantum computing as well as its impact on corporate computing and implications for management. It shows how quantum computing can be utilized to process and store information, as well as impact cryptography for perfectly secure communication, algorithmic searching, factorizing large numbers very rapidly, and simulating quantum-mechanical systems efficiently. A broad interdisciplinary effort will be needed if quantum com-puters are to fulfill their destiny as the world's fastest computing devices.

  12. AGIS: Integration of new technologies used in ATLAS Distributed Computing

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00291854; The ATLAS collaboration; Di Girolamo, Alessandro; Alandes Pradillo, Maria

    2017-01-01

    The variety of the ATLAS Distributed Computing infrastructure requires a central information system to define the topology of computing resources and to store different parameters and configuration data which are needed by various ATLAS software components. The ATLAS Grid Information System (AGIS) is the system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing applications and services. Being an intermediate middleware system between clients and external information sources (like central BDII, GOCDB, MyOSG), AGIS defines the relations between experiment specific used resources and physical distributed computing capabilities. Being in production during LHC Runl AGIS became the central information system for Distributed Computing in ATLAS and it is continuously evolving to fulfil new user requests, enable enhanced operations and follow the extension of the ATLAS Computing model. The ATLAS Computin...

  13. Dynamic Capabilities for Managing Emerging Technologies : Organizational and Managerial Antecedents of Effective Adoption of Cloud Computing

    NARCIS (Netherlands)

    S. Khanagha (Saeed)

    2015-01-01

    markdownabstract__Abstract__ The advancement of information and communication technologies has brought a digital age, where massive computing power, high speed and ubiquitous access to internet and more recently Cloud Computing Technology are expected to transform a wide range of organizations,

  14. A Meta-Analysis of Effectiveness Studies on Computer Technology-Supported Language Learning

    Science.gov (United States)

    Grgurovic, Maja; Chapelle, Carol A.; Shelley, Mack C.

    2013-01-01

    With the aim of summarizing years of research comparing pedagogies for second/foreign language teaching supported with computer technology and pedagogy not-supported by computer technology, a meta-analysis was conducted of empirical research investigating language outcomes. Thirty-seven studies yielding 52 effect sizes were included, following a…

  15. University Students and Ethics of Computer Technology Usage: Human Resource Development

    Science.gov (United States)

    Iyadat, Waleed; Iyadat, Yousef; Ashour, Rateb; Khasawneh, Samer

    2012-01-01

    The primary purpose of this study was to determine the level of students' awareness about computer technology ethics at the Hashemite University in Jordan. A total of 180 university students participated in the study by completing the questionnaire designed by the researchers, named the Computer Technology Ethics Questionnaire (CTEQ). Results…

  16. The Role of Computer Technology in Teaching Reading and Writing: Preschool Teachers' Beliefs and Practices

    Science.gov (United States)

    Ihmeideh, Fathi

    2010-01-01

    This study investigated preschool teachers' beliefs and practices regarding the use of computer technology in teaching reading and writing in Jordan. The researcher developed a questionnaire consisting of two scales--Teachers' Beliefs Scale (TB Scale) and Teachers' Practices Scale (TP Scale)--to examine the role of computer technology in teaching…

  17. Computer technologies of future teachers of fine art training as an object of scientific educational research

    Directory of Open Access Journals (Sweden)

    Bohdan Cherniavskyi

    2017-03-01

    Full Text Available The article deals with computer technology training, highlights the current state ofcomputerization of educational process in teacher training colleges, reveals the specifictechniques of professional training of teachers of fine arts to use computer technology inteaching careers.Key words: Methods of professional training, professional activities, computertechnology training future teachers of Fine Arts, the subject of research.

  18. Effect of Physical Education Teachers' Computer Literacy on Technology Use in Physical Education

    Science.gov (United States)

    Kretschmann, Rolf

    2015-01-01

    Teachers' computer literacy has been identified as a factor that determines their technology use in class. The aim of this study was to investigate the relationship between physical education (PE) teachers' computer literacy and their technology use in PE. The study group consisted of 57 high school level in-service PE teachers. A survey was used…

  19. A Quantitative Exploration of Preservice Teachers' Intent to Use Computer-based Technology

    Science.gov (United States)

    Kim, Kioh; Jain, Sachin; Westhoff, Guy; Rezabek, Landra

    2008-01-01

    Based on Bandura's (1977) social learning theory, the purpose of this study is to identify the relationship of preservice teachers' perceptions of faculty modeling of computer-based technology and preservice teachers' intent of using computer-based technology in educational settings. There were 92 participants in this study; they were enrolled in…

  20. Predicting Cloud Computing Technology Adoption by Organizations: An Empirical Integration of Technology Acceptance Model and Theory of Planned Behavior

    Science.gov (United States)

    Ekufu, ThankGod K.

    2012-01-01

    Organizations are finding it difficult in today's economy to implement the vast information technology infrastructure required to effectively conduct their business operations. Despite the fact that some of these organizations are leveraging on the computational powers and the cost-saving benefits of computing on the Internet cloud, others…

  1. APA Summit on Medical Student Education Task Force on Informatics and Technology: learning about computers and applying computer technology to education and practice.

    Science.gov (United States)

    Hilty, Donald M; Hales, Deborah J; Briscoe, Greg; Benjamin, Sheldon; Boland, Robert J; Luo, John S; Chan, Carlyle H; Kennedy, Robert S; Karlinsky, Harry; Gordon, Daniel B; Yager, Joel; Yellowlees, Peter M

    2006-01-01

    This article provides a brief overview of important issues for educators regarding medical education and technology. The literature describes key concepts, prototypical technology tools, and model programs. A work group of psychiatric educators was convened three times by phone conference to discuss the literature. Findings were presented to and input was received from the 2005 Summit on Medical Student Education by APA and the American Directors of Medical Student Education in Psychiatry. Knowledge of, skills in, and attitudes toward medical informatics are important to life-long learning and modern medical practice. A needs assessment is a starting place, since student, faculty, institution, and societal factors bear consideration. Technology needs to "fit" into a curriculum in order to facilitate learning and teaching. Learning about computers and applying computer technology to education and clinical care are key steps in computer literacy for physicians.

  2. Integration of Old and New Technology: Computers, Photography, and Video Technology in an Even Start Family Literacy Project.

    Science.gov (United States)

    Landerholm, Elizabeth

    1999-01-01

    McCosh Even Start, a federally funded family-literacy project located in a Chicago school, used older donated Apple computers, video technology, and photography to develop literacy and also to evaluate parents' and children's literacy progress. Older and newer technologies were successfully combined. (MLH)

  3. Basic Technology Competencies, Attitude towards Computer Assisted Education and Usage of Technologies in Turkish Lesson: A Correlation

    Science.gov (United States)

    Özdemir, Serpil

    2017-01-01

    The present research was done to determine the basic technology competency of Turkish teachers, their attitude towards computer-assisted education, and their technology operation level in Turkish lessons, and to designate the relationship between them. 85 Turkish teachers studying in public schools in Bartin participated in the research. The…

  4. Study of application technology of ultra-high speed computer to the elucidation of complex phenomena

    International Nuclear Information System (INIS)

    Sekiguchi, Tomotsugu

    1996-01-01

    The basic design of numerical information library in the decentralized computer network was explained at the first step of constructing the application technology of ultra-high speed computer to the elucidation of complex phenomena. Establishment of the system makes possible to construct the efficient application environment of ultra-high speed computer system to be scalable with the different computing systems. We named the system Ninf (Network Information Library for High Performance Computing). The summary of application technology of library was described as follows: the application technology of library under the distributed environment, numeric constants, retrieval of value, library of special functions, computing library, Ninf library interface, Ninf remote library and registration. By the system, user is able to use the program concentrating the analyzing technology of numerical value with high precision, reliability and speed. (S.Y.)

  5. Survey of computer technology in foodservice management education.

    Science.gov (United States)

    Miller, J L

    1989-09-01

    The status of the utilization of the computer as a tool in teaching foodservice management concepts in undergraduate dietetic education programs was determined. A questionnaire was administered to directors of Plan IV, V, and coordinated (undergraduate) programs at universities approved or accredited by The American Dietetic Association. Statistical analysis of the 137 usable responses (57%) showed that computers were used as a teaching tool in 85% of the programs surveyed. The majority of programs (58%) utilized microcomputers with floppy disk systems. Teaching laboratories equipped with computers were available in 83% of the programs represented by the respondents. Concepts most often taught with computer assistance included menu and recipe analysis and food cost accounting techniques. Ninety-four percent of the dietetic educators surveyed reported a need for increased utilization of the computer as a tool in teaching foodservice management concepts. Most respondents (92%) indicated that foodservice management educators need additional training in using the computer as a tool.

  6. International Conference on Computer Science and Information Technologies

    CERN Document Server

    2017-01-01

    The book reports on new theories and applications in the field of intelligent systems and computing. It covers computational and artificial intelligence methods, as well as advances in computer vision, current issue in big data and cloud computing, computation linguistics, cyber-physical systems as well as topics in intelligent information management. Written by active researchers, the different chapters are based on contributions presented at the workshop in intelligent systems and computing (ISC), held during CSIT 2016, September 6-9, and jointly organized by the Lviv Polytechnic National University, Ukraine, the Kharkiv National University of RadioElectronics, Ukraine, and the Technical University of Lodz, Poland, under patronage of Ministry of Education and Science of Ukraine. All in all, the book provides academics and professionals with extensive information and a timely snapshot of the field of intelligent systems, and it is expected to foster new discussions and collaborations among different groups. ...

  7. Alternative energy technologies an introduction with computer simulations

    CERN Document Server

    Buxton, Gavin

    2014-01-01

    Introduction to Alternative Energy SourcesGlobal WarmingPollutionSolar CellsWind PowerBiofuelsHydrogen Production and Fuel CellsIntroduction to Computer ModelingBrief History of Computer SimulationsMotivation and Applications of Computer ModelsUsing Spreadsheets for SimulationsTyping Equations into SpreadsheetsFunctions Available in SpreadsheetsRandom NumbersPlotting DataMacros and ScriptsInterpolation and ExtrapolationNumerical Integration and Diffe

  8. Keyword Search over Data Service Integration for Accurate Results

    CERN Document Server

    Zemleris, Vidmantas; Robert Gwadera

    2013-01-01

    Virtual data integration provides a coherent interface for querying heterogeneous data sources (e.g., web services, proprietary systems) with minimum upfront effort. Still, this requires its users to learn the query language and to get acquainted with data organization, which may pose problems even to proficient users. We present a keyword search system, which proposes a ranked list of structured queries along with their explanations. It operates mainly on the metadata, such as the constraints on inputs accepted by services. It was developed as an integral part of the CMS data discovery service, and is currently available as open source.

  9. Corpus analysis and automatic detection of emotion-including keywords

    Science.gov (United States)

    Yuan, Bo; He, Xiangqing; Liu, Ying

    2013-12-01

    Emotion words play a vital role in many sentiment analysis tasks. Previous research uses sentiment dictionary to detect the subjectivity or polarity of words. In this paper, we dive into Emotion-Inducing Keywords (EIK), which refers to the words in use that convey emotion. We first analyze an emotion corpus to explore the pragmatic aspects of EIK. Then we design an effective framework for automatically detecting EIK in sentences by utilizing linguistic features and context information. Our system outperforms traditional dictionary-based methods dramatically in increasing Precision, Recall and F1-score.

  10. Implementation of Water Quality Management by Fish School Detection Based on Computer Vision Technology

    OpenAIRE

    Yan Hou

    2015-01-01

    To solve the detection of abnormal water quality, this study proposed a biological water abnormity detection method based on computer vision technology combined with Support Vector Machine (SVM). First, computer vision is used to acquire the parameters of fish school motion feature which can reflect the water quality and then these parameters were preprocessed. Next, the sample set is established and the water quality abnormity monitoring model based on computer vision technology combined wit...

  11. Examining the Relationship between Technological, Organizational, and Environmental Factors and Cloud Computing Adoption

    Science.gov (United States)

    Tweel, Abdeneaser

    2012-01-01

    High uncertainties related to cloud computing adoption may hinder IT managers from making solid decisions about adopting cloud computing. The problem addressed in this study was the lack of understanding of the relationship between factors related to the adoption of cloud computing and IT managers' interest in adopting this technology. In…

  12. Teacher Perspectives on the Current State of Computer Technology Integration into the Public School Classroom

    Science.gov (United States)

    Zuniga, Ramiro

    2009-01-01

    Since the introduction of computers into the public school arena over forty years ago, educators have been convinced that the integration of computer technology into the public school classroom will transform education. Joining educators are state and federal governments. Public schools and others involved in the process of computer technology…

  13. Technology for computer-stabilized peak of NaI(Tl) gamma spectrum

    International Nuclear Information System (INIS)

    Chen Jianzhen; Guo Lanying; Ling Qiu; Qu Guopu; Zhao Lihong; Hu Chuangye

    2005-01-01

    An improved technology for spectrum stabilization of NaI(Tl) gamma spectrum was introduced. This technology is based on the system using a reference peak, which is equivalent gamma peak of 241 Am source. The computer seeks peak's position deviation and computes adjust value of programmable amplifier and controls programmable amplifier to stabilize spectrum by digital PID. This is a technology of spectrum stabilizing with 'hardware + reference-peak + software' and has high stability and fast speed of spectrum stabilizing. (author)

  14. International Conference on Emerging Research in Electronics, Computer Science and Technology

    CERN Document Server

    Sheshadri, Holalu; Padma, M

    2014-01-01

    PES College of Engineering is organizing an International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-12) in Mandya and merging the event with Golden Jubilee of the Institute. The Proceedings of the Conference presents high quality, peer reviewed articles from the field of Electronics, Computer Science and Technology. The book is a compilation of research papers from the cutting-edge technologies and it is targeted towards the scientific community actively involved in research activities.

  15. Triple Helix Model in Developing Technological Innovation: The Case of Computer Based Interlocking

    Directory of Open Access Journals (Sweden)

    Erry Ricardo Nurzal

    2013-01-01

    Full Text Available Computer Based Interlocking (CBI is the most important part of the electric railway signalingsystem which serves as the “brain” that controls the operation of electrical signaling system thatreplaces the role of the electromagnetic relay which has gradually been abandoned. Developmentof CBI is based on the fact that until recently the signaling system in Indonesia is still reliedheavily on the CBI products from foreign vendors. Therefore, the development of domestic CBIproducts is really necessary in order to decrease the dependence on technology from foreignvendors that at the same time is also be able to support the accelerated development of railwayinfrastructure in Indonesia.The CBI development is conducted in the form of a collaboration involving the government,universities, and industry. This paper explores and analyzes the roles and interactions betweendifferent actors in the triple helix perspective, and identifies how the innovation ecosystemfunctioning with support from the government.Based on the data collected through in-depth interview with the actors involved in the CBI casestudy, this paper gives some key findings. First, government role is very important in establishingan innovation ecosystem for CBI development. Second, the leader in the development of CBItechnological innovation should be the industry supported by governmental R & D institutionsand universities. Third, R & D consortium is an effective vehicle for creating an interactionamong industry, academia, and government.Such findings may provide conceptual direction which is important for the development oftechnological innovation in Indonesia. In addition, in providing support for R&D activities, thegovernment needs to direct its R & D incentives to the industry as a business practitioner with itsown technology roadmap. The possible further research may include some research issues. First,is the pattern occurred in the CBI case also applied in the other cases of

  16. Quicky location determination based on geographic keywords of natural language

    Science.gov (United States)

    Guo, Danhuai; Cui, Weihong

    2007-06-01

    In location determination based on natural language, it is common to find the location by describing relationship between the undetermined position and one or several determined position. That indicates that the uncertainty of location determination processing is derived from the one of natural language procedure, the one of spatial position description and the one of spatial relationship description. Most of current researches and regular GIS software take certainty as prerequisite and try to avoid uncertainty and its influence. The research reported in this paper is an attempt to create a new combing method of Artificial Intelligence (AI), Fuzzy set theory and spatial information science named Quickly Location Determination based on Geographic Keywords (QLDGK) to rise to the challenge of location searching technique based on natural language. QLDGK have two technical gists. The first one is geographic-keywords-library and special natural-language-separation-model-library that increases the language processing efficiency. The second one is fuzzy theory based definition of spatial relationship, spatial metric and spatial orientation that extends the searching scope and defines variant confidences on variant searching outcome. QLDGK takes consideration on both higher query efficiency and the lower omission rate. The above method has been proved workable and efficient by QLDGK prototype system which was tested by about 12000 emergency call reports from K-city, Southwest of China, and achieved the test result with 78% accuracy in highest confidence and 8% omitting ration.

  17. USE OF INFORMATION TECHNOLOGIES IN TEACHING COMPUTER GRAPHICS

    Directory of Open Access Journals (Sweden)

    Tel'noy Viktor Ivanovich

    2012-10-01

    Full Text Available Peculiarities of teaching computer graphics as part of the course of engineering graphics aimed at the mastering of AutoCAD graphic editor are considered by the authors. The objective of the course is to develop the competencies of future professionals, inlcuding their structural design skills. The authors recommend incorporation of mini-lectures and computer workshops into the training process. Computer quizzes are to be held at the beginning of each class to consolidate the material, to ensure preparedness for mastering new information and to stimulate the process of learning. Department of descriptive geometry and engineering graphics developed a special methodology to ensure efficient presentation of theoretical material that incorporates special computer techniques and an original structure and succession of computer slides to improve the information intensity of the computer graphics course that enjoys a small number of lecturing hours allocated within training programmes offered by the University. Well-balanced tests to be performed by students in the course of their computer workshops facilitate their mastering computer graphics techniques that help them make high-quality error-free working drawings.

  18. Quantitative Investigation of the Technologies That Support Cloud Computing

    Science.gov (United States)

    Hu, Wenjin

    2014-01-01

    Cloud computing is dramatically shaping modern IT infrastructure. It virtualizes computing resources, provides elastic scalability, serves as a pay-as-you-use utility, simplifies the IT administrators' daily tasks, enhances the mobility and collaboration of data, and increases user productivity. We focus on providing generalized black-box…

  19. Technology in practice – GP computer use by age.

    Science.gov (United States)

    Henderson, Joan; Pollack, Allan; Gordon, Julie; Miller, Graeme

    2014-12-01

    Since 2005, more than 95% of general practitioners (GPs) have had access to computers in their clinical work. We have analysed the most recent 2 years of BEACH data (April 2012-March 2014) to determine whether GP age affects clinical computer use.

  20. Use of Computer and Mobile Technologies in the Treatment of Depression.

    Science.gov (United States)

    Callan, Judith A; Wright, Jesse; Siegle, Greg J; Howland, Robert H; Kepler, Britney B

    2017-06-01

    Major depression (MDD) is a common and disabling disorder. Research has shown that most people with MDD receive either no treatment or inadequate treatment. Computer and mobile technologies may offer solutions for the delivery of therapies to untreated or inadequately treated individuals with MDD. The authors review currently available technologies and research aimed at relieving symptoms of MDD. These technologies include computer-assisted cognitive-behavior therapy (CCBT), web-based self-help, Internet self-help support groups, mobile psychotherapeutic interventions (i.e., mobile applications or apps), technology enhanced exercise, and biosensing technology. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Green Computing in Local Governments and Information Technology Companies

    Directory of Open Access Journals (Sweden)

    Badar Agung Nugroho

    2013-06-01

    Full Text Available Green computing is a study and practice of designing, manufacturing, using, and disposing of information and communication devices efficiently and effectively with minimum impact on the environment. If the green computing concept was implemented, it will help the agencies or companies to reduce energy and capital cost from their IT infrastructure. The goal from this research is to explore the current condition about the efforts from local governments and IT companies at West Java to implement the green computing concept at their working environment. The primary data were collected by using focus group discussion by inviting the local governments and IT companies representatives who responsible to manage their IT infrastructure. And then, the secondary data were collected by doing brief observation in order to see the real effort of green computing implementation at each institution. The result shows that there are many different perspectives and efforts of green computing implementation between local governments and IT companies.

  2. Computer-Assisted Language Learning : proceedings of the seventh Twente Workshop on Language Technology

    NARCIS (Netherlands)

    Appelo, L.; de Jong, Franciska M.G.

    1994-01-01

    TWLT is an acronym of Twente Workshop(s) on Language Technology. These workshops on natural language theory and technology are organised bij Project Parlevink (sometimes with the help of others) a language theory and technology project conducted at the Department of Computer Science of the

  3. Impact of Collaborative Work on Technology Acceptance: A Case Study from Virtual Computing

    Science.gov (United States)

    Konak, Abdullah; Kulturel-Konak, Sadan; Nasereddin, Mahdi; Bartolacci, Michael R.

    2017-01-01

    Aim/Purpose: This paper utilizes the Technology Acceptance Model (TAM) to examine the extent to which acceptance of Remote Virtual Computer Laboratories (RVCLs) is affected by students' technological backgrounds and the role of collaborative work. Background: RVCLs are widely used in information technology and cyber security education to provide…

  4. Hacking the brain: Brain-computer interfacing technology and the ethics of neurosecurity

    NARCIS (Netherlands)

    Ienca, M.; Haselager, W.F.G.

    2016-01-01

    Brain-computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are

  5. The Effect of Computer Use in Science and Technology Lesson on Success and Attitude Towards

    OpenAIRE

    Cem O. Guzeller; Mustafa Dogru

    2011-01-01

    Problem statement: Computer being indispensable in our daily lives came into use in all fields of education. Use of computer for education activities became mandatory. This research is an experimental research performed by use of computer in science and technology and is important in terms of serving science education. General purpose of this research is to reveal the effect of computer-assisted teaching practice for subject of heat and temperature in primary school grade ...

  6. Spin-transfer torque magnetoresistive random-access memory technologies for normally off computing (invited)

    International Nuclear Information System (INIS)

    Ando, K.; Yuasa, S.; Fujita, S.; Ito, J.; Yoda, H.; Suzuki, Y.; Nakatani, Y.; Miyazaki, T.

    2014-01-01

    Most parts of present computer systems are made of volatile devices, and the power to supply them to avoid information loss causes huge energy losses. We can eliminate this meaningless energy loss by utilizing the non-volatile function of advanced spin-transfer torque magnetoresistive random-access memory (STT-MRAM) technology and create a new type of computer, i.e., normally off computers. Critical tasks to achieve normally off computers are implementations of STT-MRAM technologies in the main memory and low-level cache memories. STT-MRAM technology for applications to the main memory has been successfully developed by using perpendicular STT-MRAMs, and faster STT-MRAM technologies for applications to the cache memory are now being developed. The present status of STT-MRAMs and challenges that remain for normally off computers are discussed

  7. Spin-transfer torque magnetoresistive random-access memory technologies for normally off computing (invited)

    Energy Technology Data Exchange (ETDEWEB)

    Ando, K., E-mail: ando-koji@aist.go.jp; Yuasa, S. [National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba 305-8568 (Japan); Fujita, S.; Ito, J.; Yoda, H. [Toshiba Corporation, Kawasaki 212-8582 (Japan); Suzuki, Y. [Graduate School of Engineering Science, Osaka University, Toyonaka 560-8531 (Japan); Nakatani, Y. [Department of Communication Engineering and Informatics, University of Electro-Communication, Chofu 182-8585 (Japan); Miyazaki, T. [WPI-AIMR, Tohoku University, Sendai 980-8577 (Japan)

    2014-05-07

    Most parts of present computer systems are made of volatile devices, and the power to supply them to avoid information loss causes huge energy losses. We can eliminate this meaningless energy loss by utilizing the non-volatile function of advanced spin-transfer torque magnetoresistive random-access memory (STT-MRAM) technology and create a new type of computer, i.e., normally off computers. Critical tasks to achieve normally off computers are implementations of STT-MRAM technologies in the main memory and low-level cache memories. STT-MRAM technology for applications to the main memory has been successfully developed by using perpendicular STT-MRAMs, and faster STT-MRAM technologies for applications to the cache memory are now being developed. The present status of STT-MRAMs and challenges that remain for normally off computers are discussed.

  8. Teachers' Organization of Participation Structures for Teaching Science with Computer Technology

    Science.gov (United States)

    Subramaniam, Karthigeyan

    2016-08-01

    This paper describes a qualitative study that investigated the nature of the participation structures and how the participation structures were organized by four science teachers when they constructed and communicated science content in their classrooms with computer technology. Participation structures focus on the activity structures and processes in social settings like classrooms thereby providing glimpses into the complex dynamics of teacher-students interactions, configurations, and conventions during collective meaning making and knowledge creation. Data included observations, interviews, and focus group interviews. Analysis revealed that the dominant participation structure evident within participants' instruction with computer technology was ( Teacher) initiation-( Student and Teacher) response sequences-( Teacher) evaluate participation structure. Three key events characterized the how participants organized this participation structure in their classrooms: setting the stage for interactive instruction, the joint activity, and maintaining accountability. Implications include the following: (1) teacher educators need to tap into the knowledge base that underscores science teachers' learning to teach philosophies when computer technology is used in instruction. (2) Teacher educators need to emphasize the essential idea that learning and cognition is not situated within the computer technology but within the pedagogical practices, specifically the participation structures. (3) The pedagogical practices developed with the integration or with the use of computer technology underscored by the teachers' own knowledge of classroom contexts and curriculum needs to be the focus for how students learn science content with computer technology instead of just focusing on how computer technology solely supports students learning of science content.

  9. Saudi high school students' attitudes and barriers toward the use of computer technologies in learning English.

    Science.gov (United States)

    Sabti, Ahmed Abdulateef; Chaichan, Rasha Sami

    2014-01-01

    This study examines the attitudes of Saudi Arabian high school students toward the use of computer technologies in learning English. The study also discusses the possible barriers that affect and limit the actual usage of computers. Quantitative approach is applied in this research, which involved 30 Saudi Arabia students of a high school in Kuala Lumpur, Malaysia. The respondents comprised 15 males and 15 females with ages between 16 years and 18 years. Two instruments, namely, Scale of Attitude toward Computer Technologies (SACT) and Barriers affecting Students' Attitudes and Use (BSAU) were used to collect data. The Technology Acceptance Model (TAM) of Davis (1989) was utilized. The analysis of the study revealed gender differences in attitudes toward the use of computer technologies in learning English. Female students showed high and positive attitudes towards the use of computer technologies in learning English than males. Both male and female participants demonstrated high and positive perception of Usefulness and perceived Ease of Use of computer technologies in learning English. Three barriers that affected and limited the use of computer technologies in learning English were identified by the participants. These barriers are skill, equipment, and motivation. Among these barriers, skill had the highest effect, whereas motivation showed the least effect.

  10. Attitudes of Female Faculty toward the Use of Computer Technologies and the Barriers that Limit Their Use of Technologies in Girls' Colleges in Saudi Arabia

    Science.gov (United States)

    Almuqayteeb, Taghreed Abdulaziz

    2009-01-01

    The purpose of this study was to examine female faculty members' use of computer technologies, their attitudes toward computers, the factors that best predict their attitudes toward computers, and the barriers that limit their use of computer technologies in girls' colleges in Dammam and Jubail, Saudi Arabia. Also, this study examined how female…

  11. Radiotherapy Monte Carlo simulation using cloud computing technology

    International Nuclear Information System (INIS)

    Poole, C.M.; Cornelius, I.; Trapp, J.V.; Langton, C.M.

    2012-01-01

    Cloud computing allows for vast computational resources to be leveraged quickly and easily in bursts as and when required. Here we describe a technique that allows for Monte Carlo radiotherapy dose calculations to be performed using GEANT4 and executed in the cloud, with relative simulation cost and completion time evaluated as a function of machine count. As expected, simulation completion time decreases as 1/n for n parallel machines, and relative simulation cost is found to be optimal where n is a factor of the total simulation time in hours. Using the technique, we demonstrate the potential usefulness of cloud computing as a solution for rapid Monte Carlo simulation for radiotherapy dose calculation without the need for dedicated local computer hardware as a proof of principal.

  12. Future of computing technology in physics - the potentials and pitfalls

    International Nuclear Information System (INIS)

    Brenner, A.E.

    1984-02-01

    The impact of the developments of modern digital computers is discussed, especially with respect to physics research in the future. The effects of large data processing capability and increasing rates at which data can be acquired and processed are considered

  13. Integrated Computational Material Engineering Technologies for Additive Manufacturing, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — QuesTek Innovations, a pioneer in Integrated Computational Materials Engineering (ICME) and a Tibbetts Award recipient, is teaming with University of Pittsburgh,...

  14. Special purpose computer system for flow visualization using holography technology.

    Science.gov (United States)

    Abe, Yukio; Masuda, Nobuyuki; Wakabayashi, Hideaki; Kazo, Yuta; Ito, Tomoyoshi; Satake, Shin-ichi; Kunugi, Tomoaki; Sato, Kazuho

    2008-05-26

    We have designed a special purpose computer system for visualizing fluid flow using digital holographic particle tracking velocimetry (DHPTV). This computer contains an Field Programmble Gate Array (FPGA) chip in which a pipeline for calculating the intensity of an object from a hologram by fast Fourier transform is installed. This system can produce 100 reconstructed images from a 1024 x 1024-grid hologram in 3.3 sec. It is expected that this system will contribute to fluid flow analysis.

  15. Data Mining Based on Cloud-Computing Technology

    Directory of Open Access Journals (Sweden)

    Ren Ying

    2016-01-01

    Full Text Available There are performance bottlenecks and scalability problems when traditional data-mining system is used in cloud computing. In this paper, we present a data-mining platform based on cloud computing. Compared with a traditional data mining system, this platform is highly scalable, has massive data processing capacities, is service-oriented, and has low hardware cost. This platform can support the design and applications of a wide range of distributed data-mining systems.

  16. More than Moore technologies for next generation computer design

    CERN Document Server

    2015-01-01

    This book provides a comprehensive overview of key technologies being used to address challenges raised by continued device scaling and the extending gap between memory and central processing unit performance.  Authors discuss in detail what are known commonly as “More than Moore” (MtM), technologies, which add value to devices by incorporating functionalities that do not necessarily scale according to “Moore's Law”.  Coverage focuses on three key technologies needed for efficient power management and cost per performance: novel memories, 3D integration and photonic on-chip interconnect.

  17. Disclosive Computer Ethics: The Exposure and Evaluation of Embedded Normativity in Computer Technology.

    NARCIS (Netherlands)

    Brey, Philip A.E.

    2000-01-01

    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values

  18. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  19. The relationship between perceived stress and computer technology attitude: an application on health sciences students.

    Science.gov (United States)

    Ozyurek, Pakize; Oztasan, Nuray; Kilic, Ibrahim

    2015-02-01

    The aim of this study is to define attitudes of students in health sciences towards perceived personal stress and computer technologies, and to present the relationship between stress and computer technology attitudes. In this scope, this study has a descriptive nature and thus a questionnaire has been applied on 764 students from Afyon Kocatepe University Health Sciences High School, Turkey for data gathering. Descriptive statistics, independent samples, t test, one way ANOVA, and regression analysis have been used for data analysis. In the study, it is seen that female (=3,78) have a more positive attitude towards computer technology than male students (=3,62). according to the results of regression analysis of the study, the regression model between computer technology attitude (CTA) and perceived stress (PS) has been found meaningful (F=16,291; ptechnology attitude and perceived stress (when computer technology altitude increases, perceived stress decreases), and an increase of one unit in computer attitude results in 0.275 decrease in perceived stress. it can be concluded that correct and proper use of computer technologies can be accepted as a component of overcoming stress methods.

  20. Proceedings of the international conference on advances in computer and communication technology

    International Nuclear Information System (INIS)

    Bakal, J.W.; Kunte, A.S.; Walinjkar, P.B.; Karnani, N.K.

    2012-02-01

    A nation's development is coupled with advancement and adoption of new technologies. During the past decade advancements in computer and communication technologies have grown multi fold. For the growth of any country it is necessary to keep pace with the latest innovations in technology. International Conference on Advances in Computer and Communication Technology organised by Institution of Electronics and Telecommunication Engineers, Mumbai Centre is an attempt to provide a platform for scientists, engineering students, educators and experts to share their knowledge and discuss the efforts put by them in the field of R and D. The papers relevant to INIS are indexed separately

  1. The Impact Of Cloud Computing Technology On The Audit Process And The Audit Profession

    Directory of Open Access Journals (Sweden)

    Yati Nurhajati

    2015-08-01

    Full Text Available In the future cloud computing audits will become increasingly The use of that technology has influenced of the audit process and be a new challenge for both external and the Internal Auditors to understand IT and learn how to use cloud computing and cloud services that hire in cloud service provider CSP and considering the risks of cloud computing and how to audit cloud computing by risk based audit approach. The wide range of unique risks and depend on the type and model of the cloud solution the uniqueness of the client environmentand the specifics of data or an application make this an complicated subject. The internal audit function is well positioned through its role as a guarantor function of the organization to assist management and the board of the Committee to identify and consider the risks in using cloud computing technology for internal audit can help determine whether the risk has been managed appropriately in a cloud computing environment. Assesses the current impact of cloud computing technology on the audit process and discusses the implications of cloud computing future technological trends for the auditing profession . More specifically Provides a summary of how that information technology has impacted the audit framework.

  2. The impact of new computer technology on accelerator control

    International Nuclear Information System (INIS)

    Theil, E.; Jacobson, V.; Paxson, V.

    1987-04-01

    This paper describes some recent developments in computing and stresses their application in accelerator control systems. Among the advances that promise to have a significant impact are (1) low cost scientific workstations; (2) the use of ''windows'', pointing devices and menus in a multi-tasking operating system; (3) high resolution large-screen graphics monitors; (4) new kinds of high bandwidth local area networks. The relevant features are related to a general accelerator control system. For example, this paper examines the implications of a computing environment which permits and encourages graphical manipulation of system components, rather than traditional access through the writing of programs or ''canned'' access via touch panels

  3. Progress in hypersonic combustion technology with computation and experiment

    Science.gov (United States)

    Anderson, Griffin Y.; Kumar, Ajay; Erdos, John I.

    1990-01-01

    Design of successful airbreathing engines for operation at near-orbital speeds presents significant challenges in all the disciplines involved, including propulsion. This paper presents a discussion of the important physics of hypersonic combustion and an assessment of the state of the art of ground simulations with pulse facilities and with computational techniques. Recent examples of experimental and computational simulations are presented and discussed. The need for continued application of these tools to establish the credibility and fidelity of engineering design methods for practical hypersonic combustors is emphasized along with the critical need for improved diagnostic methods for hypervelocity reacting flows.

  4. The impact of new computer technology on accelerator control

    International Nuclear Information System (INIS)

    Theil, E.; Jacobson, V.; Paxson, V.

    1987-01-01

    This paper describes some recent developments in computing and stresses their application to accelerator control systems. Among the advances that promise to have a significant impact are: i) low cost scientific workstations; ii) the use of ''windows'', pointing devices and menus in a multitasking operating system; iii) high resolution large-screen graphics monitors; iv) new kinds of high bandwidth local area networks. The relevant features are related to a general accelerator control system. For example, the authors examine the implications of a computing environment which permits and encourages graphical manipulation of system components, rather than traditional access through the writing of programs or ''canned'' access via touch panels

  5. Defining Smart City. A Conceptual Framework Based on Keyword Analysis

    Directory of Open Access Journals (Sweden)

    Farnaz Mosannenzadeh

    2014-05-01

    Full Text Available “Smart city” is a concept that has been the subject of increasing attention in urban planning and governance during recent years. The first step to create Smart Cities is to understand its concept. However, a brief review of literature shows that the concept of Smart City is the subject of controversy. Thus, the main purpose of this paper is to provide a conceptual framework to define Smart City. To this aim, an extensive literature review was done. Then, a keyword analysis on literature was held against main research questions (why, what, who, when, where, how and based on three main domains involved in the policy decision making process and Smart City plan development: Academic, Industrial and Governmental. This resulted in a conceptual framework for Smart City. The result clarifies the definition of Smart City, while providing a framework to define Smart City’s each sub-system. Moreover, urban authorities can apply this framework in Smart City initiatives in order to recognize their main goals, main components, and key stakeholders.

  6. An effective suggestion method for keyword search of databases

    KAUST Repository

    Huang, Hai

    2016-09-09

    This paper solves the problem of providing high-quality suggestions for user keyword queries over databases. With the assumption that the returned suggestions are independent, existing query suggestion methods over databases score candidate suggestions individually and return the top-k best of them. However, the top-k suggestions have high redundancy with respect to the topics. To provide informative suggestions, the returned k suggestions are expected to be diverse, i.e., maximizing the relevance to the user query and the diversity with respect to topics that the user might be interested in simultaneously. In this paper, an objective function considering both factors is defined for evaluating a suggestion set. We show that maximizing the objective function is a submodular function maximization problem subject to n matroid constraints, which is an NP-hard problem. An greedy approximate algorithm with an approximation ratio O((Formula presented.)) is also proposed. Experimental results show that our suggestion outperforms other methods on providing relevant and diverse suggestions. © 2016 Springer Science+Business Media New York

  7. Cloud Computing : Goals, Issues, SOA, Integrated Technologies and Future -scope

    Directory of Open Access Journals (Sweden)

    V. Madhu Viswanatham

    2016-10-01

    Full Text Available The expansion of networking infrastructure has provided a novel way to store and access resources in a reliable, convenient and affordable means of technology called the Cloud. The cloud has become so popular and established its dominance in many recent world innovations and has highly influenced the trend of the Business process Management with the advantage of shared resources. The ability to remain disaster tolerant, on-demand scalability, flexible deployment and cost effectiveness has made the future world technologies like Internet of Things, to determine the cloud as their data and processing center. However, along with the implementation of cloud based technologies, we must also address the issues involved in its realization. This paper is a review on the advancements, scopes and issues involved in realizing a secured cloud powered environments.

  8. The potential impact of computer-aided assessment technology in ...

    African Journals Online (AJOL)

    Limitations linked to CAA include the possibility that CAA may not be suitable for assessing skills such as constructive argument, writing, presentation and interpersonal skills. Computers and software sometimes crash and boot students offline during testing, and cheating sometimes occurs (Musham 2004; Greenburg 1998).

  9. Teaching, Learning and Inquiry Strategies Using Computer Technology.

    Science.gov (United States)

    Chen, A-Y.; Looi, Chee-K.

    1999-01-01

    Reports a case study in a Singapore school where a group of at-risk secondary students were given a series of linked computer-based projects. Describes the conceptual framework based on constructivism and situated learning and discusses benefits in academic performance, student motivation, language development, cooperation and stress management,…

  10. An overview of flight computer technologies for future NASA

    Science.gov (United States)

    Alkalai, L.

    2001-01-01

    In this paper, we present an overview of current developments by several US Government Agencies and associated programs, towards high-performance single board computers for use in space. Three separate projects will be described; two that are based on the Power PC processor, and one based on the Pentium processor.

  11. Future of computing technology in physics - the potentials and pitfalls

    Energy Technology Data Exchange (ETDEWEB)

    Brenner, A.E.

    1984-02-01

    The impact of the developments of modern digital computers is discussed, especially with respect to physics research in the future. The effects of large data processing capability and increasing rates at which data can be acquired and processed are considered. (GHT)

  12. The Adoption of Cloud Computing Technology for Library Services ...

    African Journals Online (AJOL)

    If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs. Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link ...

  13. Integrating Computational Thinking into Technology and Engineering Education

    Science.gov (United States)

    Hacker, Michael

    2018-01-01

    Computational Thinking (CT) is being promoted as "a fundamental skill used by everyone in the world by the middle of the 21st Century" (Wing, 2006). CT has been effectively integrated into history, ELA, mathematics, art, and science courses (Settle, et al., 2012). However, there has been no analogous effort to integrate CT into…

  14. Managing Technostress: Optimizing the Use of Computer Technology.

    Science.gov (United States)

    Brod, Craig

    1982-01-01

    Afraid of change, many employees refuse to join the computer revolution. The author states that only understanding and proper training can break down such resistance. The term "technostress" is described and the importance of employee self-assessment is examined. (CT)

  15. Computer technology and the surgeon: what the resident needs to ...

    African Journals Online (AJOL)

    Though a compliment to the surgeon, it has its problems including overwhelming information requiring careful scrutiny; computer fraud, hacking and viruses; copyright laws; the 'threat' of a well-informed patient population; and the risk of over dependence. Surgery in Nigeria and most of African is yet to maximize its benefits.

  16. SAMGrid experiences with the Condor technology in Run II computing

    International Nuclear Information System (INIS)

    Baranovski, A.; Loebel-Carpenter, L.; Garzoglio, G.; Herber, R.; Illingworth, R.; Kennedy, R.; Kreymer, A.; Kumar, A.; Lueking, L.; Lyon, A.; Merritt, W.; Terekhov, I.; Trumbo, J.; Veseli, S.; White, S.; St. Denis, R.; Jain, S.; Nishandar, A.

    2004-01-01

    SAMGrid is a globally distributed system for data handling and job management, developed at Fermilab for the D0 and CDF experiments in Run II. The Condor system is being developed at the University of Wisconsin for management of distributed resources, computational and otherwise. We briefly review the SAMGrid architecture and its interaction with Condor, which was presented earlier. We then present our experiences using the system in production, which have two distinct aspects. At the global level, we deployed Condor-G, the Grid-extended Condor, for the resource brokering and global scheduling of our jobs. At the heart of the system is Condor's Matchmaking Service. As a more recent work at the computing element level, we have been benefiting from the large computing cluster at the University of Wisconsin campus. The architecture of the computing facility and the philosophy of Condor's resource management have prompted us to improve the application infrastructure for D0 and CDF, in aspects such as parting with the shared file system or reliance on resources being dedicated. As a result, we have increased productivity and made our applications more portable and Grid-ready. Our fruitful collaboration with the Condor team has been made possible by the Particle Physics Data Grid

  17. FY 1997 Blue Book: High Performance Computing and Communications: Advancing the Frontiers of Information Technology

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  18. FY 2000 Blue Book: High Performance Computing and Communications: Information Technology Frontiers for a New Millennium

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As we near the dawn of a new millennium, advances made possible by computing, information, and communications research and development R and D ? once barely...

  19. Research on the application in disaster reduction for using cloud computing technology

    Science.gov (United States)

    Tao, Liang; Fan, Yida; Wang, Xingling

    Cloud Computing technology has been rapidly applied in different domains recently, promotes the progress of the domain's informatization. Based on the analysis of the state of application requirement in disaster reduction and combining the characteristics of Cloud Computing technology, we present the research on the application of Cloud Computing technology in disaster reduction. First of all, we give the architecture of disaster reduction cloud, which consists of disaster reduction infrastructure as a service (IAAS), disaster reduction cloud application platform as a service (PAAS) and disaster reduction software as a service (SAAS). Secondly, we talk about the standard system of disaster reduction in five aspects. Thirdly, we indicate the security system of disaster reduction cloud. Finally, we draw a conclusion the use of cloud computing technology will help us to solve the problems for disaster reduction and promote the development of disaster reduction.

  20. Computer-Based Resource Accounting Model for Automobile Technology Impact Assessment

    Science.gov (United States)

    1976-10-01

    A computer-implemented resource accounting model has been developed for assessing resource impacts of future automobile technology options. The resources tracked are materials, energy, capital, and labor. The model has been used in support of the Int...

  1. Cloud computing technologies applied in the virtual education of civil servants

    Directory of Open Access Journals (Sweden)

    Teodora GHERMAN

    2016-03-01

    Full Text Available From the perspective of education, e-learning through the use of Cloud Computing technologies represent one of the most important directions of educational software development, because Cloud Computing are in a rapid development and applies to all areas of the Information Society, including education. Systems require resources for virtual education on web platform (e-learning numerous hardware and software. The convenience of Internet learning, creating a learning environment based on web has become one of the strengths in virtual education research, including applied Cloud Computing technologies in virtual education of civil servants. The article presents Cloud Computing technologies as a platform for virtual education on web platforms, their advantages and disadvantages towards other technologies.

  2. Computer technology applications in surgical implant dentistry: a systematic review.

    Science.gov (United States)

    Tahmaseb, Ali; Wismeijer, Daniel; Coucke, Wim; Derksen, Wiebe

    2014-01-01

    To assess the literature on the accuracy and clinical performance of static computer-assisted implant surgery in implant dentistry. Electronic and manual literature searches were applied to collect information about (1) the accuracy and (2) clinical performance of static computer-assisted implant systems. Meta-regression analysis was performed to summarize the accuracy studies. Failure/complication rates were investigated using a generalized linear mixed model for binary outcomes and a logit link to model implant failure rate. From 2,359 articles, 14 survival and 24 accuracy studies were included in this systematic review. Nine different static image guidance systems were involved. The meta-analysis of the accuracy (24 clinical and preclinical studies) revealed a total mean error of 1.12 mm (maximum of 4.5 mm) at the entry point measured in 1,530 implants and 1.39 mm at the apex (maximum of 7.1 mm) measured in 1,465 implants. For the 14 included survival studies (total of 1,941 implants) using static computer-assisted implant dentistry, the mean failure rate was 2.7% (0% to 10%) after an observation period of at least 12 months. In 36.4% of the treated cases, intraoperative or prosthetic complications were reported, which included: template fractures during the surgery, change of plan because of factors such as limited primary implant stability, need for additional grafting procedures, prosthetic screw loosening, prosthetic misfit, and prosthesis fracture. Different levels of quantity and quality of evidence were available for static computer-assisted implant placement, with tight-fitting high implant survival rates after only 12 months of observation in different indications achieving a variable level of accuracy. Future long-term clinical data are necessary to identify clinical indications; detect accuracy; assess risk; and justify additional radiation doses, effort, and costs associated with computer-assisted implant surgery.

  3. Summary of researches being performed in the Institute of Mathematics and Computer Science on computer science and information technologies

    Directory of Open Access Journals (Sweden)

    Artiom Alhazov

    2008-07-01

    Full Text Available Evolution of the informatization notion (which assumes automation of majority of human activities applying computers, computer networks, information technologies towards the notion of {\\it Global Information Society} (GIS challenges the determination of new paradigms of society: automation and intellectualization of production, new level of education and teaching, formation of new styles of work, active participation in decision making, etc. To assure transition to GIS for any society, including that from Republic of Moldova, requires both special training and broad application of progressive technologies and information systems. Methodological aspects concerning impact of GIS creation over the citizen, economic unit, national economy in the aggregate demands a profound study. Without systematic approach to these aspects the GIS creation would have confront great difficulties. Collective of researchers from the Institute of Mathematics and Computer Science (IMCS of Academy of Sciences of Moldova, which work in the field of computer science, constitutes the center of advanced researches and activates in those directions of researches of computer science which facilitate technologies and applications without of which the development of GIS cannot be assured.

  4. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  5. Technical Data Management Center: a focal point for meteorological and other environmental transport computing technology

    International Nuclear Information System (INIS)

    McGill, B.; Maskewitz, B.F.; Trubey, D.K.

    1981-01-01

    The Technical Data Management Center, collecting, packaging, analyzing, and distributing information, computer technology and data which includes meteorological and other environmental transport work is located at the Oak Ridge National Laboratory, within the Engineering Physics Division. Major activities include maintaining a collection of computing technology and associated literature citations to provide capabilities for meteorological and environmental work. Details of the activities on behalf of TDMC's sponsoring agency, the US Nuclear Regulatory Commission, are described

  6. International Conference on Emerging Technologies for Information Systems, Computing, and Management

    CERN Document Server

    Ma, Tinghuai; Emerging Technologies for Information Systems, Computing, and Management

    2013-01-01

    This book aims to examine innovation in the fields of information technology, software engineering, industrial engineering, management engineering. Topics covered in this publication include; Information System Security, Privacy, Quality Assurance, High-Performance Computing and Information System Management and Integration. The book presents papers from The Second International Conference for Emerging Technologies Information Systems, Computing, and Management (ICM2012) which was held on December 1 to 2, 2012 in Hangzhou, China.

  7. Leveraging Bibliographic RDF Data for Keyword Prediction with Association Rule Mining (ARM

    Directory of Open Access Journals (Sweden)

    Nidhi Kushwaha

    2014-11-01

    Full Text Available The Semantic Web (Web 3.0 has been proposed as an efficient way to access the increasingly large amounts of data on the internet. The Linked Open Data Cloud project at present is the major effort to implement the concepts of the Seamtic Web, addressing the problems of inhomogeneity and large data volumes. RKBExplorer is one of many repositories implementing Open Data and contains considerable bibliographic information. This paper discusses bibliographic data, an important part of cloud data. Effective searching of bibiographic datasets can be a challenge as many of the papers residing in these databases do not have sufficient or comprehensive keyword information. In these cases however, a search engine based on RKBExplorer is only able to use information to retrieve papers based on author names and title of papers without keywords. In this paper we attempt to address this problem by using the data mining algorithm Association Rule Mining (ARM to develop keywords based on features retrieved from Resource Description Framework (RDF data within a bibliographic citation. We have demonstrate the applicability of this method for predicting missing keywords for bibliographic entries in several typical databases. −−−−− Paper presented at 1st International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2014 March 27-28, 2014. Organized by VIT University, Chennai, India. Sponsored by BRNS.

  8. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud

    Directory of Open Access Journals (Sweden)

    Shyamala Devi Munisamy

    2015-01-01

    Full Text Available Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider’s premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  9. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud.

    Science.gov (United States)

    Munisamy, Shyamala Devi; Chokkalingam, Arun

    2015-01-01

    Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  10. Computer-to-plate Technology: Violet or Thermo?

    Directory of Open Access Journals (Sweden)

    Michael Mittelhaus

    2004-12-01

    Full Text Available Up to now CtP has been a technology for medium-sized and large companies and their printing presses, and thus predominantly in the 70 x 100 cm format and larger. The CtP technology is and remains divided up between violet and thermo, with the advantages and drawbacks of both imaging systems in a counterbalance. Due to the broad penetration of CtP in many markets, practical questions have now come to the fore, including those of continuous process control and quality assurance; providers and specialist forums on these topics will also hold centre stage at drupa. This applies equally to frequency-modulated screening processes, which are today well known and are viewed as a means for ensuring a competitive edge. The CtP technology is now broader and more diverse than ever, and drupa 2004 will clarify which technology and which imagers best allow economical digital plate production for formats up to 50 x 70 cm.

  11. Secure Semantic Multi-keyword Synonym Ranked Query over Encrypted Cloud Data

    OpenAIRE

    Veerraju Gampala; Sreelatha Malempati

    2016-01-01

    Cloud computing is a new auspicious technology and it greatly accelerates the development of large-scale data storage, computing and distribution. With the benefit of cloud computing, data owners are driven to outsource their penetrating and complex data from local machines to the public cloud due cost, efficiency and less hands on management. However, security and privacy become major security issues when data owners outsource their private data onto untrusted public cloud servers. Hence, to...

  12. FEATURES OF INTRODUCTION OF MODERN COMPUTER TECHNOLOGY IN CLINIC OF ORTHOPEDIC DENTISTRY

    Directory of Open Access Journals (Sweden)

    P. A. Hasiuk

    2015-05-01

    Full Text Available The newest technological developments opened a way for the wideuse of hi-tech materials in stomatology. Guarantees making of dentoprosthetic constructions the method of the computer programmable milling maximal exactness and the greatest quality of implementation ofworks. Process of CAD-CAM (Computer Aided Design-Computer Aided Manufacture contains for itself the receipt of weekend of data by means of digital by volume scan-out, transmission of them on a computer and treatment with the next making of construction on an automatic machine-tool that follows the same computer.

  13. NASA Scientists Push the Limits of Computer Technology

    Science.gov (United States)

    1999-01-01

    NASA researcher Dr. Donald Frazier uses a blue laser shining through a quartz window into a special mix of chemicals to generate a polymer film on the inside quartz surface. As the chemicals respond to the laser light, they adhere to the glass surface, forming optical films. Dr. Frazier and Dr. Mark S. Paley developed the process in the Space Sciences Laboratory at NASA's Marshall Space Flight Center in Huntsville, AL. Working aboard the Space Shuttle, a science team led by Dr. Frazier formed thin-films potentially useful in optical computers with fewer impurities than those formed on Earth. Patterns of these films can be traced onto the quartz surface. In the optical computers of the future, thee films could replace electronic circuits and wires, making the systems more efficient and cost-effective, as well as lighter and more compact. Photo credit: NASA/Marshall Space Flight Center

  14. A Computer Oriented Problem Solving Unit, Consume. Student Guide. Computer Technology Program Environmental Education Units.

    Science.gov (United States)

    Northwest Regional Educational Lab., Portland, OR.

    This is the student guide in a set of five computer-oriented environmental/energy education units. Contents are organized into the following parts or lessons: (1) introduction to power and energy; (2) energy consumption and supply; (3) energy conservation and distribution; (4) energy flow and the question of transportation; and (5) computer models…

  15. 4th International Conference on Computational Collective Intel- ligence Technologies and Applications (ICCCI 2012)

    CERN Document Server

    Trawiński, Bogdan; Katarzyniak, Radosław; Jo, Geun-Sik; Advanced Methods for Computational Collective Intelligence

    2013-01-01

    The book consists of 35 extended chapters which have been selected and invited from the submissions to the 4th International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2012) held on November 28-30, 2012 in Ho Chi Minh City, Vietnam. The book is organized into six parts, which are semantic web and ontologies, social networks and e-learning, agent and multiagent systems, data mining methods and applications, soft computing, and optimization and control, respectively. All chapters in the book discuss theoretical and practical issues connected with computational collective intelligence and related technologies. The editors hope that the book can be useful for graduate and Ph.D. students in Computer Science, in particular participants in courses on Soft Computing, Multiagent Systems, and Data Mining. This book can be also useful for researchers working on the concept of computational collective intelligence in artificial populations. It is the hope of the editors that ...

  16. PRACTICAL APPLICATION OF MULTIMEDIA TECHNOLOGIES IN TEACHING COMPUTER ORIENTATION FOR ENGINEERS- PEDAGOGUES SEWING PROFILE

    Directory of Open Access Journals (Sweden)

    Z.N. Seydametova

    2011-05-01

    Full Text Available In the article possibilities of practical application of multimedia technologies are considered in an educational process on the example of discipline of computer orientation of engineers- pedagogues of sewing type is the «Computer constructing of clothes».

  17. The Advantages and Disadvantages of Computer Technology in Second Language Acquisition

    Science.gov (United States)

    Lai, Cheng-Chieh; Kritsonis, William Allan

    2006-01-01

    The purpose of this article is to discuss the advantages and disadvantages of computer technology and Computer Assisted Language Learning (CALL) programs for current second language learning. According to the National Clearinghouse for English Language Acquisition & Language Instruction Educational Programs' report (2002), more than nine million…

  18. Educational Technology and the Restructuring Movement: Lessons from Research on Computers in Classrooms.

    Science.gov (United States)

    Kell, Diane; And Others

    This paper presents findings from a recently completed study of the use of computers in primary classrooms as one source of evidence concerning the role technology can play in school restructuring efforts. The sites for the study were selected by Apple Computer, Inc. in the spring of 1988 and included 43 classrooms in 10 schools in 6 large, mostly…

  19. Reading Teachers' Beliefs and Utilization of Computer and Technology: A Case Study

    Science.gov (United States)

    Remetio, Jessica Espinas

    2014-01-01

    Many researchers believe that computers have the ability to help improve the reading skills of students. In an effort to improve the poor reading scores of students on state tests, as well as improve students' overall academic performance, computers and other technologies have been installed in Frozen Bay School classrooms. As the success of these…

  20. Computer-Supported Co-operative Learning Systems: Interactive Group Technologies and Open Learning.

    Science.gov (United States)

    Davies, Dick

    1988-01-01

    Discussion of interactive technologies and open learning focuses on computer supported cooperative work (CSCW), especially computer based message systems, and their effects on open learning. Topics discussed include cooperative learning; distance learning; individualized instruction; local area networks; group communication; and design principles…

  1. Visualizing History: Computer Technology and the Graphic Presentation of the Past

    Science.gov (United States)

    Moss, Mark

    2004-01-01

    Computer technology has impacted both the study and idea of history in a number of ways. The Internet has provided numerous web-sites for students to read, see and look into for historical information. Historians, both professional and public have also begun to utilize the computer in a variety of ways, both in academic terms as well as leisure…

  2. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…

  3. A Quantitative Investigation of Cloud Computing Adoption in Nigeria: Testing an Enhanced Technology Acceptance Model

    Science.gov (United States)

    Ishola, Bashiru Abayomi

    2017-01-01

    Cloud computing has recently emerged as a potential alternative to the traditional on-premise computing that businesses can leverage to achieve operational efficiencies. Consequently, technology managers are often tasked with the responsibilities to analyze the barriers and variables critical to organizational cloud adoption decisions. This…

  4. The Effects of Computer-Assisted Feedback Strategies in Technology Education: A Comparison of Learning Outcomes

    Science.gov (United States)

    Adams, Ruifang Hope; Strickland, Jane

    2012-01-01

    This study investigated the effects of computer-assisted feedback strategies that have been utilized by university students in a technology education curriculum. Specifically, the study examined the effectiveness of the computer-assisted feedback strategy "Knowledge of Response feedback" (KOR), and the "Knowledge of Correct Responses feedback"…

  5. Scalable Database Access Technologies for ATLAS Distributed Computing

    CERN Document Server

    Vaniachine, A

    2009-01-01

    ATLAS event data processing requires access to non-event data (detector conditions, calibrations, etc.) stored in relational databases. The database-resident data are crucial for the event data reconstruction processing steps and often required for user analysis. A main focus of ATLAS database operations is on the worldwide distribution of the Conditions DB data, which are necessary for every ATLAS data processing job. Since Conditions DB access is critical for operations with real data, we have developed the system where a different technology can be used as a redundant backup. Redundant database operations infrastructure fully satisfies the requirements of ATLAS reprocessing, which has been proven on a scale of one billion database queries during two reprocessing campaigns of 0.5 PB of single-beam and cosmics data on the Grid. To collect experience and provide input for a best choice of technologies, several promising options for efficient database access in user analysis were evaluated successfully. We pre...

  6. Proceedings of the Twelfth Seminar on Computation in Nuclear Science and Technology

    International Nuclear Information System (INIS)

    Arbie, Bakri; Ardisasmita, Syamsa; Bunyamin, M.; Karsono, M.; Sangadji; Aziz, Ferhat; Marsodi; Su'ud, Zaki; Suhartanto, Heru

    2001-07-01

    The proceedings on Seminar Computation in Nuclear Science and Technologyis routine activity that held on Center for Development of Informatics and Computation Technology. The aims of proceeding is to be able to Exchange Information for interest in computation, Modelling and Simulation. The Seminar is attended by BATAN's on University Research in nuclear science activity. This proceedings used for another research. There are 26 papers which have separated index

  7. An application of interactive computer graphics technology to the design of dispersal mechanisms

    Science.gov (United States)

    Richter, B. J.; Welch, B. H.

    1977-01-01

    Interactive computer graphics technology is combined with a general purpose mechanisms computer code to study the operational behavior of three guided bomb dispersal mechanism designs. These studies illustrate the use of computer graphics techniques to discover operational anomalies, to assess the effectiveness of design improvements, to reduce the time and cost of the modeling effort, and to provide the mechanism designer with a visual understanding of the physical operation of such systems.

  8. How Scholars Define the Field of Computer Education and Instructional Technology?

    Directory of Open Access Journals (Sweden)

    Ömer Faruk İslim

    2016-07-01

    Full Text Available The term Instructional Technology has been used since 1960s and defined differently throughout the time.  Along with the increase in the use of information and communication technology in schools; the need for technologically qualified teachers has been increased. While many of instructional technology programs are at graduate level around the world; Turkey has an undergraduate level instructional technology program, called Computer Education and Instructional Technology (CEIT in addition to graduate level. The department of Computer Education and Instructional Technology was founded in 1998 during the re-construction of Faculties of Education in Turkey. The purpose of this study is to investigate the similarities and differences among how graduate students and faculty members define CEIT department, as well as their opinions on the current situation of the program, and their expectations. A case study has been conducted with 5 faculty members and 5 graduate students from three major universities in Turkey including Anadolu University,  Gazi University , and Middle East Technical University. Semi-structured interviews were used as the data collection tool.  The content analysis was used to analyze the data and results of the study showed that faculty members and graduate students have similar opinions about the scope of the department, expected qualifications and work areas, and challenges affecting academic life.Keywords: Computer education and instructional technology, definition of the field, academic staff, graduate studentsBilgisayar ve Öğretim Teknolojileri Eğitimi Bölümü Akademisyenler Tarafından Nasıl Tanımlanıyor?Öz Öğretim teknolojileri 1960’lı yıllardan beri kullanılmakta olan ve zamanla farklı şekillerde tanımlanmış bir kavramdır. Bilgi ve iletişim teknolojileri okullarda daha yaygın hale geldiğinden dolayı teknoloji konusunda donanımlı öğretmen ihtiyacı da artmıştır. Dünyada

  9. A Research Program in Computer Technology. Volume 1

    Science.gov (United States)

    1981-08-01

    points, and (3) determine the stability of the solution. 9.2.6 The Distributed Algorithm Problem The paradigm for a distributed and decentralized...as debugging technology is for single-language single-machine programs, it is far weaker for multilanguage multimachine situations). Finally...even more important for a multimachine garbage-collection scheme, where the implementation must have a handle on which integers represent external

  10. In the Clouds: The Implications of Cloud Computing for Higher Education Information Technology Governance and Decision Making

    Science.gov (United States)

    Dulaney, Malik H.

    2013-01-01

    Emerging technologies challenge the management of information technology in organizations. Paradigm changing technologies, such as cloud computing, have the ability to reverse the norms in organizational management, decision making, and information technology governance. This study explores the effects of cloud computing on information technology…

  11. A Delphi Study on Technology Enhanced Learning (TEL) Applied on Computer Science (CS) Skills

    Science.gov (United States)

    Porta, Marcela; Mas-Machuca, Marta; Martinez-Costa, Carme; Maillet, Katherine

    2012-01-01

    Technology Enhanced Learning (TEL) is a new pedagogical domain aiming to study the usage of information and communication technologies to support teaching and learning. The following study investigated how this domain is used to increase technical skills in Computer Science (CS). A Delphi method was applied, using three-rounds of online survey…

  12. Technology Readiness, Internet Self-Efficacy and Computing Experience of Professional Accounting Students

    Science.gov (United States)

    Lai, Ming-Ling

    2008-01-01

    Purpose: This study aims to assess the state of technology readiness of professional accounting students in Malaysia, to examine their level of internet self-efficacy, to assess their prior computing experience, and to explore if they are satisfied with the professional course that they are pursuing in improving their technology skills.…

  13. Finding Space for Technology: Pedagogical Observations on the Organization of Computers in School Environments

    Science.gov (United States)

    Jenson, Jennifer; Rose, Chloë Brushwood

    2006-01-01

    With the large-scale acquisition and installation of computer and networking hardware in schools across Canada, a major concern has been where to locate these new technologies and whether and how the structure of the school might itself be made to accommodate these new technologies. In this paper, we suggest that the physical location and…

  14. Investigation of Pre-Service Physical Education Teachers' Attitudes Towards Computer Technologies (Case of Turkey)

    Science.gov (United States)

    Can, Suleyman

    2015-01-01

    Elicitation of pre-service physical education teachers' attitudes towards computer technologies seems to be of great importance to satisfy the conditions to be met for the conscious and effective use of the technologies required by the age to be used in educational settings. In this respect, the purpose of the present study is to investigate…

  15. The Impact of Iranian Teachers Cultural Values on Computer Technology Acceptance

    Science.gov (United States)

    Sadeghi, Karim; Saribagloo, Javad Amani; Aghdam, Samad Hanifepour; Mahmoudi, Hojjat

    2014-01-01

    This study was conducted with the aim of testing the technology acceptance model and the impact of Hofstede cultural values (masculinity/femininity, uncertainty avoidance, individualism/collectivism, and power distance) on computer technology acceptance among teachers at Urmia city (Iran) using the structural equation modeling approach. From among…

  16. From Information to Perception : The new design of the emerging computer technologies and its effects

    NARCIS (Netherlands)

    Liberati, Nicola

    2016-01-01

    The aim of the work is to introduce the elements we need to analyse the new emerging digital technologies, focussing on the novelties they introduce. These new technologies are designed to merge computers into our world by being intertwined with our daily activities and by visualising digital

  17. Factors Impacting Adult Learner Achievement in a Technology Certificate Program on Computer Networks

    Science.gov (United States)

    Delialioglu, Omer; Cakir, Hasan; Bichelmeyer, Barbara A.; Dennis, Alan R.; Duffy, Thomas M.

    2010-01-01

    This study investigates the factors impacting the achievement of adult learners in a technology certificate program on computer networks. We studied 2442 participants in 256 institutions. The participants were older than age 18 and were enrolled in the Cisco Certified Network Associate (CCNA) technology training program as "non-degree" or…

  18. Use of Computer Technology for English Language Learning: Do Learning Styles, Gender, and Age Matter?

    Science.gov (United States)

    Lee, Cynthia; Yeung, Alexander Seeshing; Ip, Tiffany

    2016-01-01

    Computer technology provides spaces and locales for language learning. However, learning style preference and demographic variables may affect the effectiveness of technology use for a desired goal. Adapting Reid's pioneering Perceptual Learning Style Preference Questionnaire (PLSPQ), this study investigated the relations of university students'…

  19. Exploring the experience of clients with tetraplegia utilizing assistive technology for computer access.

    Science.gov (United States)

    Folan, Alyce; Barclay, Linda; Cooper, Cathy; Robinson, Merren

    2015-01-01

    Assistive technology for computer access can be used to facilitate people with a spinal cord injury to utilize mainstream computer applications, thereby enabling participation in a variety of meaningful occupations. The aim of this study was to gain an understanding of the experiences of clients with tetraplegia trialing assistive technologies for computer access during different stages in a public rehabilitation service. In order to explore the experiences of clients with tetraplegia trialing assistive technologies for computer use, qualitative methodology was selected. Data were collected from seven participants using semi-structured interviews, which were audio-taped, transcribed and analyzed thematically. Three main themes were identified. These were: getting back into life, assisting in adjusting to injury and learning new skills. The findings from this study demonstrated that people with tetraplegia can be assisted to return to previous life roles or engage in new roles, through developing skills in the use of assistive technology for computer access. Being able to use computers for meaningful activities contributed to the participants gaining an enhanced sense of self-efficacy, and thereby quality of life. Implications for Rehabilitation Findings from this pilot study indicate that people with tetraplegia can be assisted to return to previous life roles, and develop new roles that have meaning to them through the use of assistive technologies for computer use. Being able to use the internet to socialize, and complete daily tasks, contributed to the participants gaining a sense of control over their lives. Early introduction to assistive technology is important to ensure sufficient time for newly injured people to feel comfortable enough with the assistive technology to use the computers productively by the time of discharge. Further research into this important and expanding area is indicated.

  20. Application of computer virtual simulation technology in 3D animation production

    Science.gov (United States)

    Mo, Can

    2017-11-01

    In the continuous development of computer technology, the application system of virtual simulation technology has been further optimized and improved. It also has been widely used in various fields of social development, such as city construction, interior design, industrial simulation and tourism teaching etc. This paper mainly introduces the virtual simulation technology used in 3D animation. Based on analyzing the characteristics of virtual simulation technology, the application ways and means of this technology in 3D animation are researched. The purpose is to provide certain reference for the 3D effect promotion days after.

  1. Computer Technology Training in the Workplace: A Longitudinal Investigation of the Effect of Mood, ,

    OpenAIRE

    Venkatesh, Viswanath; Speier, Cheri

    1999-01-01

    How does a person's mood during technology training influence motivation, intentions, and, ultimately, usage of the new technology? Do these mood effects dissipate or are they sustainable over time? A repeated-measures field study (n = 316) investigated the effect of mood on employee motivation and intentions toward using a specific computer technology at two points in time: immediately after training and 6 weeks after training. Actual usage behavior was assessed for 12 weeks after training. ...

  2. Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013), v.1

    CERN Document Server

    Kumar, Ashok; Annamalai, Annamalai

    2013-01-01

      This book is the proceedings of Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013) that was held in Konya, Turkey, on June 7-9. CCSEIT-2013 provided an excellent international forum for sharing knowledge and results in theory, methodology and applications of computational science, engineering and information technology. This book contains research results, projects, survey work and industrial experiences representing significant advances in the field. The different contributions collected in this book cover five main areas: algorithms, data structures and applications;  wireless and mobile networks; computer networks and communications; natural language processing and information theory; cryptography and information security.  

  3. High End Computing Technologies for Earth Science Applications: Trends, Challenges, and Innovations

    Science.gov (United States)

    Parks, John (Technical Monitor); Biswas, Rupak; Yan, Jerry C.; Brooks, Walter F.; Sterling, Thomas L.

    2003-01-01

    Earth science applications of the future will stress the capabilities of even the highest performance supercomputers in the areas of raw compute power, mass storage management, and software environments. These NASA mission critical problems demand usable multi-petaflops and exabyte-scale systems to fully realize their science goals. With an exciting vision of the technologies needed, NASA has established a comprehensive program of advanced research in computer architecture, software tools, and device technology to ensure that, in partnership with US industry, it can meet these demanding requirements with reliable, cost effective, and usable ultra-scale systems. NASA will exploit, explore, and influence emerging high end computing architectures and technologies to accelerate the next generation of engineering, operations, and discovery processes for NASA Enterprises. This article captures this vision and describes the concepts, accomplishments, and the potential payoff of the key thrusts that will help meet the computational challenges in Earth science applications.

  4. Technology transfer of brain-computer interfaces as assistive technology: barriers and opportunities.

    Science.gov (United States)

    Nijboer, F

    2015-02-01

    This paper provides an analysis of perspectives from different stakeholders on the state-of-the-art of BCI. Three barriers for technology transfer of BCIs as access technologies are identified. First, BCIs are developed with a narrow focus on creating a reliable technology, while a broader focus on creating a usable technology is needed. Second, the potential target group, which could benefit from BCIs as access technologies is expected to be very small. Development costs are therefore high, while reimbursements are expected to be low, which challenges the commercial viability. Third, potential target users should be much more included in the design process of BCIs to ensure that the end-products meet technical, ethical, legal and social requirements. These three issues need to be urgently addressed so that target users may benefit from this promising technology. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  5. Cogeneration technology alternatives study. Volume 6: Computer data

    Science.gov (United States)

    1980-01-01

    The potential technical capabilities of energy conversion systems in the 1985 - 2000 time period were defined with emphasis on systems using coal, coal-derived fuels or alternate fuels. Industrial process data developed for the large energy consuming industries serve as a framework for the cogeneration applications. Ground rules for the study were established and other necessary equipment (balance-of-plant) was defined. This combination of technical information, energy conversion system data ground rules, industrial process information and balance-of-plant characteristics was analyzed to evaluate energy consumption, capital and operating costs and emissions. Data in the form of computer printouts developed for 3000 energy conversion system-industrial process combinations are presented.

  6. Contagious architecture: computation, aesthetics, and space (technologies of lived abstraction)

    CERN Document Server

    Parisi, Luciana

    2013-01-01

    In Contagious Architecture, Luciana Parisi offers a philosophical inquiry into the status of the algorithm in architectural and interaction design. Her thesis is that algorithmic computation is not simply an abstract mathematical tool but constitutes a mode of thought in its own right, in that its operation extends into forms of abstraction that lie beyond direct human cognition and control. These include modes of infinity, contingency, and indeterminacy, as well as incomputable quantities underlying the iterative process of algorithmic processing. The main philosophical source for the project is Alfred North Whitehead, whose process philosophy is specifically designed to provide a vocabulary for "modes of thought" exhibiting various degrees of autonomy from human agency even as they are mobilized by it. Because algorithmic processing lies at the heart of the design practices now reshaping our world -- from the physical spaces of our built environment to the networked spaces of digital culture -- the nature o...

  7. From computer images to video presentation: Enhancing technology transfer

    Science.gov (United States)

    Beam, Sherilee F.

    1994-01-01

    With NASA placing increased emphasis on transferring technology to outside industry, NASA researchers need to evaluate many aspects of their efforts in this regard. Often it may seem like too much self-promotion to many researchers. However, industry's use of video presentations in sales, advertising, public relations and training should be considered. Today, the most typical presentation at NASA is through the use of vu-graphs (overhead transparencies) which can be effective for text or static presentations. For full blown color and sound presentations, however, the best method is videotape. In fact, it is frequently more convenient due to its portability and the availability of viewing equipment. This talk describes techniques for creating a video presentation through the use of a combined researcher and video professional team.

  8. The Impact Of Cloud Computing Technology On The Audit Process And The Audit Profession

    OpenAIRE

    Yati Nurhajati

    2015-01-01

    In the future cloud computing audits will become increasingly The use of that technology has influenced of the audit process and be a new challenge for both external and the Internal Auditors to understand IT and learn how to use cloud computing and cloud services that hire in cloud service provider CSP and considering the risks of cloud computing and how to audit cloud computing by risk based audit approach. The wide range of unique risks and depend on the type and model of the cloud soluti...

  9. 3rd ACIS International Conference on Applied Computing and Information Technology

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 3nd International Conference on Applied Computing and Information Technology (ACIT 2015) which was held on July 12-16, 2015 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  10. Proceedings of the workshop on molten salts technology and computer simulation

    Energy Technology Data Exchange (ETDEWEB)

    Hayashi, Hirokazu; Minato, Kazuo (eds.) [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2001-12-01

    Applications of molten salts technology to separation and synthesis of materials have been studied eagerly, which would develop new fields of materials science. Research Group for Actinides Science, Department of Materials Science, Japan Atomic Energy Research Institute (JAERI), together with Reprocessing and Recycle Technology Division, Atomic Energy Society of Japan, organized the Workshop on Molten Salts Technology and Computer Simulation at Tokai Research Establishment, JAERI on July 18, 2001. In the workshop eleven lectures were made and lively discussions were there on the fundamentals and applications of the molten salts technology that covered the structure and basic properties of molten salts, the pyrochemical reprocessing technology and the relevant computer simulation. The 10 of the presented papers are indexed individually. (J.P.N.)

  11. Campus Computing, 2000: The 11th National Survey of Computing and Information Technology in American Higher Education.

    Science.gov (United States)

    Green, Kenneth C.

    The 2000 Campus Computing Survey, the 11th such survey, was sent to the chief academic officer at 1,176 two-year and four-year colleges and universities across the United States. By October 2000, 506 responses had been received, a response rate of 43%. New data reveal that the growing demand for technology talent across all sectors of the U.S.…

  12. Computed tomography: acquisition process, technology and current state

    Directory of Open Access Journals (Sweden)

    Óscar Javier Espitia Mendoza

    2016-02-01

    Full Text Available Computed tomography is a noninvasive scan technique widely applied in areas such as medicine, industry, and geology. This technique allows the three-dimensional reconstruction of the internal structure of an object which is lighted with an X-rays source. The reconstruction is formed with two-dimensional cross-sectional images of the object. Each cross-sectional is obtained from measurements of physical phenomena, such as attenuation, dispersion, and diffraction of X-rays, as result of their interaction with the object. In general, measurements acquisition is performed with methods based on any of these phenomena and according to various architectures classified in generations. Furthermore, in response to the need to simulate acquisition systems for CT, software dedicated to this task has been developed. The objective of this research is to determine the current state of CT techniques, for this, a review of methods, different architectures used for the acquisition and some of its applications is presented. Additionally, results of simulations are presented. The main contributions of this work are the detailed description of acquisition methods and the presentation of the possible trends of the technique.

  13. TEACHERS’ COMPUTER SELF-EFFICACY AND THEIR USE OF EDUCATIONAL TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    Vehbi TUREL

    2014-10-01

    Full Text Available This study examined the use of educational technology by primary and subject teachers (i.e. secondary and high school teachers in a small town in the eastern part of Turkey in the spring of 2012. The study examined the primary, secondary and high school teachers’ Ø personal and computer related (demographic characteristics, Ø their computer self-efficacy perceptions, Ø their computer-using level in certain software, Ø their frequency of computer use for teaching, administrative and communication objectives, and Ø their use of educational technology preferences for preparation and teaching purposes. In this study, all primary, secondary and high school teachers in the small town were given the questionnaires to complete. 158 teachers (n=158 completed and returned them. The study was mostly quantitative and partly qualitative. The quantitative results were analysed with SPSS (i.e. mean, Std. Deviation, frequency, percentage, ANOVA. The qualitative data were analysed with examining the participants’ responses gathered from the open-ended questions and focussing on the shared themes among the responses. The results reveal that the teachers think that they have good computer self-efficacy perceptions, their level in certain programs is good, and they often use computers for a wide range of purposes. There are also statistical differences between; Ø their computer self-efficacy perceptions, Ø frequency of computer use for certain purposes, and Ø computer level in certain programs in terms of different independent variables.

  14. Computer-assisted optics teaching at the Moscow Institute of Physics and Technology

    Science.gov (United States)

    Soboleva, Natalia N.; Kozel, Stanislav M.; Lockshin, Gennady R.; Entin, M. A.; Galichsky, K. V.; Lebedinsky, P. L.; Zhdanovich, P. M.

    1995-10-01

    Traditional methods used in optics teaching lack clarity and vividness when illustrating abstract notions such as polarization or interference. Here's where computer models may help, but they usually show only a single phenomenon or process and don't let the student see the entire picture. For this reason at Moscow Institute of Physics and Technology was developed the courseware 'Wave Optics on the Computer' consisting of a number of related simulations. It is intended for students studying optics at the Universities. Recently we have developed different simulations in optics for secondary school level. They are included as part of large computer courseware 'Physics by Pictures'. The courseware 'Wave Optics on the Computer' consists of nine large simulation programs and the textbook. The programs are simulating basic phenomena of wave optics. parameters of optical systems can be varied by the user. The textbook contains theoretical considerations on studied optical phenomena, recommendations concerning work with computer programs, and, especially for those wishing to deeper understand wave optics, original problems for individual solution. At the Moscow Institute of Physics and Technology the course 'Wave Optics on the Computer' is used for teaching optics in the course of general physics. The course provides both the computer assisted teaching for lectures support and computer assisted learning for students during seminars in the computer classroom.

  15. Communication and computer technologies for teaching physics in nuclear reactors

    International Nuclear Information System (INIS)

    Murua, C; Chautemps, A; Odetto, J; Keil, W; Trivino, S; Rossi, F; Perez Lucero, A

    2012-01-01

    In order to train personnel inn order to train personnel in Embalse Nuclear Power Plant, and provided that such training given primarily on the location of such a facility, we designed a pedagogical strategy that combined the use of conventional resources with new information technologies. Since the Nuclear Reactor RA-0 is an ideal tool for teaching Reactor Physics, priority was the use of it, both locally remotely. The teaching strategy is based on four pillar: -Lectures on the Power Plant (using a virtual classroom to support); -Remote monitoring of Ra-0 Nuclear Reactor parameters while operating (RA0REMOTO); -Use, through the Internet, of the Ra-0 Nuclear Reactor Simulator (RA0SIMUL); -Made in the Nuclear Reactor RA-0 of Reactor Physics practical. The work emphasizes RA0REMOTO and RA0SIMUL systems. The RA0REMOTO system is an appendix of the Electronic Data Acquisition System (SEAD) of the Nuclear Reactor RA-0. This system acquires signals from Reactor instrumentation and sends them to a server running the software that 'publish' the reactor parameters on the internet. Students may, during the lectures, monitor any parameter of the reactor while it operates, which allows teachers to compare theory with reality. RA0SIMUL is a simulator on the RA-0, which allows students to 'operate' a reactor analyzing the underlying physics concepts (author)

  16. Feasibility of Virtual Machine and Cloud Computing Technologies for High Performance Computing

    Science.gov (United States)

    2014-05-01

    Hat Enterprise Linux SaaS software as a service VM virtual machine vNUMA virtual non-uniform memory access WRF weather research and forecasting...computing model is composed of three service models: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS

  17. Using Gazetteers to Extract Sets of Keywords from Free-Flowing Texts

    Directory of Open Access Journals (Sweden)

    Adam Crymble

    2015-12-01

    Full Text Available If you have a copy of a text in electronic format stored on your computer, it is relatively easy to keyword search for a single term. Often you can do this by using the built-in search features in your favourite text editor. However, scholars are increasingly needing to find instances of many terms within a text or texts. For example, a scholar may want to use a gazetteer to extract all mentions of English placenames within a collection of texts so that those places can later be plotted on a map. Alternatively, they may want to extract all male given names, all pronouns, stop words, or any other set of words. Using those same built-in search features to achieve this more complex goal is time consuming and clunky. This lesson will teach you how to use Python to extract a set of keywords very quickly and systematically from a set of texts. It is expected that once you have completed this lesson, you will be able to generalise the skills to extract custom sets of keywords from any set of locally saved files.

  18. Optimization of suspension smelting technology by computer simulation

    Energy Technology Data Exchange (ETDEWEB)

    Lilius, K.; Jokilaakso, A.; Ahokainen, T.; Teppo, O.; Yang Yongxiang [Helsinki Univ. of Technology, Otaniemi (Finland). Lab. of Materials Processing and Powder Metallurgy

    1996-12-31

    An industrial-scale flash smelting furnace and waste-heat boilers have been modelled by using commercial Computational-Fluid-Dynamics software. The work has proceeded from cold gas flow to heat transfer, combustion, and two-phase flow simulations. In the present study, the modelling task has been divided into three sub-models: (1) the concentrate burner, (2) the flash smelting furnace (reaction shaft and uptake shaft), and (3) the waste-heat boiler. For the concentrate burner, the flow of the process gas and distribution air together with the concentrate or a feed mixture was simulated. Eulerian - Eulerian approach was used for the carrier gas-phase and the dispersed particle-phase. A large parametric study was carried out by simulating a laboratory scale burner with varying turbulence intensities and then extending the simulations to the industrial scale model. For the flash smelting furnace, the simulation work concentrated on gas and gas-particle two-phase flows, as well as the development of combustion model for sulphide concentrate particles. Both Eulerian and Lagrangian approaches have been utilised in describing the particle phase and the spreading of the concentrate in the reaction shaft as well as the particle tracks have been obtained. Combustion of sulphides was first approximated with gaseous combustion by using a built-in combustion model of the software. The real oxidation reactions of the concentrate particles were then coded as a user-defined sub-routine and that was tested with industrial flash smelting cases. For the waste-heat boiler, both flow and heat transfer calculations have been carried out for an old boiler and a modified boiler SULA 2 Research Programme; 23 refs.

  19. Critical Issues Forum: A multidisciplinary educational program integrating computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, R.J.; Robertson, B.; Jacobs, D. [Los Alamos National Lab., NM (United States)

    1998-09-01

    The Critical Issues Forum (CIF) funded by the US Department of Energy is a collaborative effort between the Science Education Team of Los Alamos National Laboratory (LANL) and New Mexico high schools to improve science education throughout the state of New Mexico as well as nationally. By creating an education relationship between the LANL with its unique scientific resources and New Mexico high schools, students and teachers participate in programs that increase not only their science content knowledge but also their critical thinking and problem-solving skills. The CIF program focuses on current, globally oriented topics crucial to the security of not only the US but to that of all nations. The CIF is an academic-year program that involves both teachers and students in the process of seeking solutions for real world concerns. Built around issues tied to LANL`s mission, participating students and teachers are asked to critically investigate and examine the interactions among the political, social, economic, and scientific domains while considering diversity issues that include geopolitical entities and cultural and ethnic groupings. Participants are expected to collaborate through telecommunications during the research phase and participate in a culminating multimedia activity, where they produce and deliver recommendations for the current issues being studied. The CIF was evaluated and found to be an effective approach for teacher professional training, especially in the development of skills for critical thinking and questioning. The CIF contributed to students` ability to integrate diverse disciplinary content about science-related topics and supported teachers in facilitating the understanding of their students using the CIF approach. Networking technology in CIF has been used as an information repository, resource delivery mechanism, and communication medium.

  20. Global Change Master Directory (GCMD) Keywords and Their Applications in Earth Science Data Discovery

    Science.gov (United States)

    Aleman, A.

    2017-12-01

    This presentation will provide an overview and discussion of the Global Change Master Directory (GCMD) Keywords and their applications in Earth science data discovery. The GCMD Keywords are a hierarchical set of controlled keywords covering the Earth science disciplines, including: science keywords, service keywords, data centers, projects, location, data resolution, instruments and platforms. Controlled vocabularies (keywords) help users accurately, consistently and comprehensively categorize their data and also allow for the precise search and subsequent retrieval of data. The GCMD Keywords are a community resource and are developed collaboratively with input from various stakeholders, including GCMD staff, keyword users and metadata providers. The GCMD Keyword Landing Page and GCMD Keyword Community Forum provide access to keyword resources and an area for discussion of topics related to the GCMD Keywords. See https://earthdata.nasa.gov/about/gcmd/global-change-master-directory-gcmd-keywords

  1. FUNCTIONING FEATURES OF COMPUTER TECHNOLOGY WHILE FORMING PRIMARY SCHOOLCHILDREN’S COMMUNICATIVE COMPETENCE

    Directory of Open Access Journals (Sweden)

    Olena Beskorsa

    2017-04-01

    Full Text Available The article reveals the problem of functioning features of computer technology while forming primary schoolchildren’s communicative competence whose relevance is proved by the increasing role of a foreign language as a means of communication and modernization of foreign language education. There is a great deal of publications devoted to the issue of foreign language learning at primary school by N. Biriukevych, O. Kolominova, O. Metolkina, O. Petrenko, V. Redko, S. Roman. Implementing of innovative technology as well as computer one is to intensify the language learning process and to improve young learners’ communicative skills. The aim of the article is to identify computer technology functioning features while forming primary schoolchildren communicative competence. In this study we follow the definition of the computer technology as an information technology whose implementation may be accompanied with a computer as one of the tools, excluding the use of audio and video equipment, projectors and other technical tools. Using computer technologies is realized due to a number of tools which are divided into two main groups: electronic learning materials; computer testing software. The analysis of current textbooks and learning and methodological complexes shows that teachers prefer authentic electronic materials to the national ones. The most available English learning materials are on the Internet and they are free. The author of the article discloses several on-line English learning tools and depict the opportunities to use them while forming primary schoolchildren’s communicative competence. Special attention is also paid to multimedia technology, its functioning features and multimedia lesson structure. Computer testing software provides tools for current and control assessing results of mastering language material, communicative skills, and self-assessing in an interactive way. For making tests for assessing English skill

  2. TRAINING OF BACHELORS OF COMPUTER SCIENCE USING OPEN SYSTEMS NETWORK TECHNOLOGIES AT PEDAGOGICAL UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    Tetiana Ya. Vdovychyn

    2017-04-01

    Full Text Available The article studies the problem of the use of open systems network technologies (OSNTs in training of future bachelors of computer science. The theoretical principles of the use of OSNTs in higher educational institutions are defined and the basic concepts of the study are analyzed. The procedural model of the use of OSNTs in training of future bachelors of computer science is theoretically grounded and developed. The criteria, indicators and levels of competence of bachelors of computer science concerning the use of OSNTs are defined and the model of its formation is developed. The main components of OSNTs using technique for future bachelors of computer science are described and its effectiveness is experimentally verified. The experimental implementation of the study results showed that the use of OSNTs in training of bachelors of computer science based on the developed technique promotes the competence formation of bachelors of computer science concerning the use of OSNTs.

  3. А History of Computer-Based Instruction and its Effects on Developing Instructional Technologies

    Directory of Open Access Journals (Sweden)

    Ömer Faruk Sözcü

    2013-01-01

    Full Text Available The purpose of the paper is to discuss instructional and technological developments based on the history of computer-based instruction (CBI. Historically, the development of the CBI movement began in earnest at the end of 1960s and in the early 1970s. At that time, computers, for the first time, began to be used in education, basically for teaching language and mathematics. Historically, CBI emerged from the programmed instruction and teaching machines of the middle of the 1950s. Educational computing began with a few large, government-funded projects on mainframe and minicomputers. At this time, several projects were developed to be utilized in instructional processes, such as PLATO and TICCIT. As a result, the developments after the 1970s will be discussed regarding the CBI process so as to indicate new instructional and technological developments as part of new learning technologies from past to present for students and educators in schools.

  4. Changing Conceptions and Uses of Computer Technologies in the Everyday: Literacy Practices of Sixth and Seventh Graders

    Science.gov (United States)

    Agee, Jane; Altarriba, Jeanette

    2009-01-01

    This study focused on 189 sixth and seventh graders in two large suburban schools and their use of computer technologies as part of their everyday literacy practices. The authors were especially interested in the students' conceptions of computer technologies and how computer use varied across grade and reading levels. The study included a survey…

  5. A Study on Attitude and Opinion towards Using Computer Technology in Teaching among B.Ed. Trainees in Tiruchirappalli District

    Science.gov (United States)

    Kumar, C. Ashok

    2015-01-01

    The main aim of the study was to find out whether there was a significant difference in the attitude and opinion towards using Computer Technology in teaching among B.Ed., trainees in terms of select independent variables. Normative survey was the technique employed. Opinion towards Computer Usage and Attitude towards Computer Technology inventory…

  6. Look back and look forward to the future of computer applications in the field of nuclear science and technology

    International Nuclear Information System (INIS)

    Yang Yanming; Dai Guiling

    1988-01-01

    All previous National Conferences on computer application in the field of nuclear science and technology sponsored by the Society of Nuclear Electronics and Detection Technology are reviewed. Surveys are geiven on the basic situations and technique levels of computer applications for each time period. Some points concerning possible developments of computer techniques are given as well

  7. Proceedings of the Sixth Seminar on Computation in Nuclear Science and Technology

    International Nuclear Information System (INIS)

    1997-01-01

    National Atomic Energy Agency (BATAN) had held the Sixth Seminar on Computation in Nuclear Science and Technology on January 16-17, 1996. The seminar is an event for information exchange among interest society in computation, modeling, and simulation. Similar as previous seminar in the past year, there were also non-BATAN and university-bound presenters and participants whose interest are in the field of science and technology. Examining the papers presented in this seminar, it shows that beside digging the so called classical computation methods, some papers brought relatively new topics like the determination and influence of chaos, neural network method, and expert system. Judging from the variety of the topics, one can conclude that interests in computation and its application are growing stronger in Indonesia

  8. Biophysics of the Eye in Computer Vision: Methods and Advanced Technologies

    Science.gov (United States)

    Hammoud, Riad I.; Hansen, Dan Witzner

    The eyes have it! This chapter describes cutting-edge computer vision methods employed in advanced vision sensing technologies for medical, safety, and security applications, where the human eye represents the object of interest for both the imager and the computer. A camera receives light from the real eye to form a sequence of digital images of it. As the eye scans the environment, or focuses on particular objects in the scene, the computer simultaneously localizes the eye position, tracks its movement over time, and infers measures such as the attention level, and the gaze direction in real time and fully automatic. The main focus of this chapter is on computer vision and pattern recognition algorithms for eye appearance variability modeling, automatic eye detection, and robust eye position tracking. This chapter offers good readings and solid methodologies to build the two fundamental low-level building blocks of a vision-based eye tracking technology.

  9. Technology Push, Demand Pull And The Shaping Of Technological Paradigms - Patterns In The Development Of Computing Technology

    NARCIS (Netherlands)

    J.C.M. van den Ende (Jan); W.A. Dolfsma (Wilfred)

    2002-01-01

    textabstractAn assumption generally subscribed in evolutionary economics is that new technological paradigms arise from advances is science and developments in technological knowledge. Demand only influences the selection among competing paradigms, and the course the paradigm after its inception. In

  10. The Challenges and Benefits of Using Computer Technology for Communication and Teaching in the Geosciences

    Science.gov (United States)

    Fairley, J. P.; Hinds, J. J.

    2003-12-01

    The advent of the World Wide Web in the early 1990s not only revolutionized the exchange of ideas and information within the scientific community, but also provided educators with a new array of teaching, informational, and promotional tools. Use of computer graphics and animation to explain concepts and processes can stimulate classroom participation and student interest in the geosciences, which has historically attracted students with strong spatial and visualization skills. In today's job market, graduates are expected to have knowledge of computers and the ability to use them for acquiring, processing, and visually analyzing data. Furthermore, in addition to promoting visibility and communication within the scientific community, computer graphics and the Internet can be informative and educational for the general public. Although computer skills are crucial for earth science students and educators, many pitfalls exist in implementing computer technology and web-based resources into research and classroom activities. Learning to use these new tools effectively requires a significant time commitment and careful attention to the source and reliability of the data presented. Furthermore, educators have a responsibility to ensure that students and the public understand the assumptions and limitations of the materials presented, rather than allowing them to be overwhelmed by "gee-whiz" aspects of the technology. We present three examples of computer technology in the earth sciences classroom: 1) a computer animation of water table response to well pumping, 2) a 3-D fly-through animation of a fault controlled valley, and 3) a virtual field trip for an introductory geology class. These examples demonstrate some of the challenges and benefits of these new tools, and encourage educators to expand the responsible use of computer technology for teaching and communicating scientific results to the general public.

  11. Proceedings of the 1993 Conference on Intelligent Computer-Aided Training and Virtual Environment Technology

    Science.gov (United States)

    Hyde, Patricia R.; Loftin, R. Bowen

    1993-01-01

    The volume 2 proceedings from the 1993 Conference on Intelligent Computer-Aided Training and Virtual Environment Technology are presented. Topics discussed include intelligent computer assisted training (ICAT) systems architectures, ICAT educational and medical applications, virtual environment (VE) training and assessment, human factors engineering and VE, ICAT theory and natural language processing, ICAT military applications, VE engineering applications, ICAT knowledge acquisition processes and applications, and ICAT aerospace applications.

  12. State-of-the-art computer technologies used to train nuclear specialists and to conduct research

    International Nuclear Information System (INIS)

    Korovin, Yu.A.; Tikhonenko, A.V.

    2011-01-01

    The paper discusses innovative methods used in the process of training nuclear specialists and conducting research which are based on state-of-the-art computer technologies. The approach proposed makes wide use of mathematical modeling and state-of-the-art programming techniques. It is based on the development, improvement and application of problem-oriented computer codes to support the teaching process and to solve fundamental and applied problems of nuclear physics and nuclear engineering.

  13. First International Symposium on Applied Computing and Information Technology (ACIT 2013)

    CERN Document Server

    Applied Computing and Information Technology

    2014-01-01

    This book presents the selected results of the 1st International Symposium on Applied Computers and Information Technology (ACIT 2013) held on August 31 – September 4, 2013 in Matsue City, Japan, which brought together researchers, scientists, engineers, industry practitioners, and students to discuss all aspects of  Applied Computers & Information Technology, and its practical challenges. This book includes the best 12 papers presented at the conference, which were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review.  

  14. Model of training of computer science teachers by means of distant education technologies

    Directory of Open Access Journals (Sweden)

    Т А Соловьева

    2009-03-01

    Full Text Available Training of future computer science teachers in conditions of informatization of education is analyzed. Distant educational technologies (DET and traditional process of training, their advantages and disadvantages are considered, active functions of DET as the basis of the model of training by means of DET is stressed. It is shown that mixed education combining both distant ant traditional technologies takes place on the basis of the created model. Practical use of the model is shown on the example of the course «Recursion» for future computer science teachers.

  15. [Clinical application of computer assisted technology based spiral CT scan for locating impacted tooth].

    Science.gov (United States)

    Zhang, Xing; Zhang, Jie-mei; Chen, Song-ling; Chen, Jian-ling

    2009-10-01

    To evaluate clinical value of computer assisted technology for locating the impacted tooth. Thirty-five patients with impacted tooth were received spiral CT scan. The DICOM data were processed by Simplant software for locating the impacted tooth. The reconstruction images clearly showed detail of the impacted teeth, including 3D surface image, eruption orientation, buccal and lingual location, medial and distal location and relationship with dentition and circumambient anatomic structure. The computer assisted technology can localize the impacted tooth precisely and provide valuable information for clinical treatment.

  16. Didactics of Teaching of Histology, Cytology and Embryology: the Role of Computer Technologies

    Directory of Open Access Journals (Sweden)

    Ye.F. Barinov

    2013-10-01

    It must be emphasized that the ability to use computer technology in teaching can be considered to be formed, if they are based on the professional competence of the teacher, knowledge of the main provisions of the cognitive psychology on the cognitive process and the factors affecting its efficiency, and correct use of methods and means of information processing of teaching material. Only in this case we can hope that the use of computer technology in the educational process will be systemic and effective.

  17. US Geological Survey National Computer Technology Meeting; Proceedings, Phoenix, Arizona, November 14-18, 1988

    Science.gov (United States)

    Balthrop, Barbara H.; Terry, J.E.

    1991-01-01

    The U.S. Geological Survey National Computer Technology Meetings (NCTM) are sponsored by the Water Resources Division and provide a forum for the presentation of technical papers and the sharing of ideas or experiences related to computer technology. This report serves as a proceedings of the meeting held in November, 1988 at the Crescent Hotel in Phoenix, Arizona. The meeting was attended by more than 200 technical and managerial people representing all Divisions of the U.S. Geological Survey.Scientists in every Division of the U.S. Geological Survey rely heavily upon state-of-the-art computer technology (both hardware and sofnuare). Today the goals of each Division are pursued in an environment where high speed computers, distributed communications, distributed data bases, high technology input/output devices, and very sophisticated simulation tools are used regularly. Therefore, information transfer and the sharing of advances in technology are very important issues that must be addressed regularly.This report contains complete papers and abstracts of papers that were presented at the 1988 NCTM. The report is divided into topical sections that reflect common areas of interest and application. In each section, papers are presented first followed by abstracts. For these proceedings, the publication of a complete paper or only an abstract was at the discretion of the author, although complete papers were encouraged.Some papers presented at the 1988 NCTM are not published in these proceedings.

  18. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  19. Analysis of Computer-Aided and Artificial Intelligence Technologies and Solutions in Service Industries in Russia

    OpenAIRE

    Rezanov, Vladislav

    2013-01-01

    The primary objective of this research study was to investigate the relationship between Computer-Aided and Artificial Intelligence Technologies and customer satisfaction in the context of businesses in Russia. The research focuses on methods of Artificial Intelligence technology application in business and its effect on customer satisfaction. The researcher introduces Artificial Intelligence and studies the forecasting approaches in relation to business operations. The rese...

  20. The analysis of the computer technologies used during preparation of sportsmen, specializing bodybuilding

    OpenAIRE

    Sedljar J.V.

    2009-01-01

    The generalized data about directions of information technologies use in sports practice are cited in the article. The opportunities of information-methodical system "Athlete" use in system of bodybuilder's preparation are examined in details. Program "Athlete" is a collection of tools, methods of automated data collection, processing, storage and use of information, with access to various information resources, including Internet. The prospects of computer technologies use in educational-tra...

  1. The analysis of the computer technologies used during preparation of sportsmen, specializing bodybuilding

    Directory of Open Access Journals (Sweden)

    Sedljar J.V.

    2009-10-01

    Full Text Available The generalized data about directions of information technologies use in sports practice are cited in the article. The opportunities of information-methodical system "Athlete" use in system of bodybuilder's preparation are examined in details. Program "Athlete" is a collection of tools, methods of automated data collection, processing, storage and use of information, with access to various information resources, including Internet. The prospects of computer technologies use in educational-training process of the sportsmen specializing in bodybuilding are designated.

  2. Computer Infrastructure Facilities and Services at National Institutes of Technology Libraries in India

    OpenAIRE

    Y, Srinivasa Rao; BK, Choudhury

    2010-01-01

    Computer infrastructure plays a critical role in the academic system for meeting teaching, learning and research needs. Libraries are an integral part of academic system. Adequate infrastructure facilities support academic libraries share their resources and services in an effective way. National Institute of Technology, erstwhile regional engineering college, are prime institutions and benchmark for technical education in India in the field of engineering, science and technology. T...

  3. Combining Brain–Computer Interfaces and Assistive Technologies: State-of-the-Art and Challenges

    Science.gov (United States)

    Millán, J. d. R.; Rupp, R.; Müller-Putz, G. R.; Murray-Smith, R.; Giugliemma, C.; Tangermann, M.; Vidaurre, C.; Cincotti, F.; Kübler, A.; Leeb, R.; Neuper, C.; Müller, K.-R.; Mattia, D.

    2010-01-01

    In recent years, new research has brought the field of electroencephalogram (EEG)-based brain–computer interfacing (BCI) out of its infancy and into a phase of relative maturity through many demonstrated prototypes such as brain-controlled wheelchairs, keyboards, and computer games. With this proof-of-concept phase in the past, the time is now ripe to focus on the development of practical BCI technologies that can be brought out of the lab and into real-world applications. In particular, we focus on the prospect of improving the lives of countless disabled individuals through a combination of BCI technology with existing assistive technologies (AT). In pursuit of more practical BCIs for use outside of the lab, in this paper, we identify four application areas where disabled individuals could greatly benefit from advancements in BCI technology, namely, “Communication and Control”, “Motor Substitution”, “Entertainment”, and “Motor Recovery”. We review the current state of the art and possible future developments, while discussing the main research issues in these four areas. In particular, we expect the most progress in the development of technologies such as hybrid BCI architectures, user–machine adaptation algorithms, the exploitation of users’ mental states for BCI reliability and confidence measures, the incorporation of principles in human–computer interaction (HCI) to improve BCI usability, and the development of novel BCI technology including better EEG devices. PMID:20877434

  4. Combining Brain-Computer Interfaces and Assistive Technologies: State-of-the-Art and Challenges.

    Science.gov (United States)

    Millán, J D R; Rupp, R; Müller-Putz, G R; Murray-Smith, R; Giugliemma, C; Tangermann, M; Vidaurre, C; Cincotti, F; Kübler, A; Leeb, R; Neuper, C; Müller, K-R; Mattia, D

    2010-01-01

    In recent years, new research has brought the field of electroencephalogram (EEG)-based brain-computer interfacing (BCI) out of its infancy and into a phase of relative maturity through many demonstrated prototypes such as brain-controlled wheelchairs, keyboards, and computer games. With this proof-of-concept phase in the past, the time is now ripe to focus on the development of practical BCI technologies that can be brought out of the lab and into real-world applications. In particular, we focus on the prospect of improving the lives of countless disabled individuals through a combination of BCI technology with existing assistive technologies (AT). In pursuit of more practical BCIs for use outside of the lab, in this paper, we identify four application areas where disabled individuals could greatly benefit from advancements in BCI technology, namely, "Communication and Control", "Motor Substitution", "Entertainment", and "Motor Recovery". We review the current state of the art and possible future developments, while discussing the main research issues in these four areas. In particular, we expect the most progress in the development of technologies such as hybrid BCI architectures, user-machine adaptation algorithms, the exploitation of users' mental states for BCI reliability and confidence measures, the incorporation of principles in human-computer interaction (HCI) to improve BCI usability, and the development of novel BCI technology including better EEG devices.

  5. The Uses and Impacts of Mobile Computing Technology in Hot Spots Policing.

    Science.gov (United States)

    Koper, Christopher S; Lum, Cynthia; Hibdon, Julie

    2015-12-01

    Recent technological advances have much potential for improving police performance, but there has been little research testing whether they have made police more effective in reducing crime. To study the uses and crime control impacts of mobile computing technology in the context of geographically focused "hot spots" patrols. An experiment was conducted using 18 crime hot spots in a suburban jurisdiction. Nine of these locations were randomly selected to receive additional patrols over 11 weeks. Researchers studied officers' use of mobile information technology (IT) during the patrols using activity logs and interviews. Nonrandomized subgroup and multivariate analyses were employed to determine if and how the effects of the patrols varied based on these patterns. Officers used mobile computing technology primarily for surveillance and enforcement (e.g., checking automobile license plates and running checks on people during traffic stops and field interviews), and they noted both advantages and disadvantages to its use. Officers did not often use technology for strategic problem-solving and crime prevention. Given sufficient (but modest) dosages, the extra patrols reduced crime at the hot spots, but this effect was smaller in places where officers made greater use of technology. Basic applications of mobile computing may have little if any direct, measurable impact on officers' ability to reduce crime in the field. Greater training and emphasis on strategic uses of IT for problem-solving and crime prevention, and greater attention to its behavioral effects on officers, might enhance its application for crime reduction. © The Author(s) 2016.

  6. Towards passive brain-computer interfaces: applying brain-computer interface technology to human-machine systems in general.

    Science.gov (United States)

    Zander, Thorsten O; Kothe, Christian

    2011-04-01

    Cognitive monitoring is an approach utilizing realtime brain signal decoding (RBSD) for gaining information on the ongoing cognitive user state. In recent decades this approach has brought valuable insight into the cognition of an interacting human. Automated RBSD can be used to set up a brain-computer interface (BCI) providing a novel input modality for technical systems solely based on brain activity. In BCIs the user usually sends voluntary and directed commands to control the connected computer system or to communicate through it. In this paper we propose an extension of this approach by fusing BCI technology with cognitive monitoring, providing valuable information about the users' intentions, situational interpretations and emotional states to the technical system. We call this approach passive BCI. In the following we give an overview of studies which utilize passive BCI, as well as other novel types of applications resulting from BCI technology. We especially focus on applications for healthy users, and the specific requirements and demands of this user group. Since the presented approach of combining cognitive monitoring with BCI technology is very similar to the concept of BCIs itself we propose a unifying categorization of BCI-based applications, including the novel approach of passive BCI.

  7. Managing the technological edge: the UNESCO International Computation Centre and the limits to the transfer of computer technology, 1946-61.

    Science.gov (United States)

    Nofre, David

    2014-07-01

    The spread of the modern computer is assumed to have been a smooth process of technology transfer. This view relies on an assessment of the open circulation of knowledge ensured by the US and British governments in the early post-war years. This article presents new historical evidence that question this view. At the centre of the article lies the ill-fated establishment of the UNESCO International Computation Centre. The project was initially conceived in 1946 to provide advanced computation capabilities to scientists of all nations. It soon became a prize sought by Western European countries like The Netherlands and Italy seeking to speed up their own national research programs. Nonetheless, as the article explains, the US government's limitations on the research function of the future centre resulted in the withdrawal of European support for the project. These limitations illustrate the extent to which US foreign science policy could operate as (stealth) industrial policy to secure a competitive technological advantage and the prospects of US manufacturers in a future European market.

  8. Older Adults Perceptions of Technology and Barriers to Interacting with Tablet Computers: A Focus Group Study.

    Science.gov (United States)

    Vaportzis, Eleftheria; Clausen, Maria Giatsi; Gow, Alan J

    2017-10-04

    New technologies provide opportunities for the delivery of broad, flexible interventions with older adults. Focus groups were conducted to: (1) understand older adults' familiarity with, and barriers to, interacting with new technologies and tablets; and (2) utilize user-engagement in refining an intervention protocol. Eighteen older adults (65-76 years old; 83.3% female) who were novice tablet users participated in discussions about their perceptions of and barriers to interacting with tablets. We conducted three separate focus groups and used a generic qualitative design applying thematic analysis to analyse the data. The focus groups explored attitudes toward tablets and technology in general. We also explored the perceived advantages and disadvantages of using tablets, familiarity with, and barriers to interacting with tablets. In two of the focus groups, participants had previous computing experience (e.g., desktop), while in the other, participants had no previous computing experience. None of the participants had any previous experience with tablet computers. The themes that emerged were related to barriers (i.e., lack of instructions and guidance, lack of knowledge and confidence, health-related barriers, cost); disadvantages and concerns (i.e., too much and too complex technology, feelings of inadequacy, and comparison with younger generations, lack of social interaction and communication, negative features of tablets); advantages (i.e., positive features of tablets, accessing information, willingness to adopt technology); and skepticism about using tablets and technology in general. After brief exposure to tablets, participants emphasized the likelihood of using a tablet in the future. Our findings suggest that most of our participants were eager to adopt new technology and willing to learn using a tablet. However, they voiced apprehension about lack of, or lack of clarity in, instructions and support. Understanding older adults' perceptions of technology

  9. Grid computing and collaboration technology in support of fusion energy sciences

    International Nuclear Information System (INIS)

    Schissel, D.P.

    2005-01-01

    Science research in general and magnetic fusion research in particular continue to grow in size and complexity resulting in a concurrent growth in collaborations between experimental sites and laboratories worldwide. The simultaneous increase in wide area network speeds has made it practical to envision distributed working environments that are as productive as traditionally collocated work. In computing power, it has become reasonable to decouple production and consumption resulting in the ability to construct computing grids in a similar manner as the electrical power grid. Grid computing, the secure integration of computer systems over high speed networks to provide on-demand access to data analysis capabilities and related functions, is being deployed as an alternative to traditional resource sharing among institutions. For human interaction, advanced collaborative environments are being researched and deployed to have distributed group work that is as productive as traditional meetings. The DOE Scientific Discovery through Advanced Computing Program initiative has sponsored several collaboratory projects, including the National Fusion Collaboratory Project, to utilize recent advances in grid computing and advanced collaborative environments to further research in several specific scientific domains. For fusion, the collaborative technology being deployed is being used in present day research and is also scalable to future research, in particular, to the International Thermonuclear Experimental Reactor experiment that will require extensive collaboration capability worldwide. This paper briefly reviews the concepts of grid computing and advanced collaborative environments and gives specific examples of how these technologies are being used in fusion research today

  10. Research and development of grid computing technology in center for computational science and e-systems of Japan Atomic Energy Agency

    International Nuclear Information System (INIS)

    Suzuki, Yoshio

    2007-01-01

    Center for Computational Science and E-systems of the Japan Atomic Energy Agency (CCSE/JAEA) has carried out R and D of grid computing technology. Since 1995, R and D to realize computational assistance for researchers called Seamless Thinking Aid (STA) and then to share intellectual resources called Information Technology Based Laboratory (ITBL) have been conducted, leading to construct an intelligent infrastructure for the atomic energy research called Atomic Energy Grid InfraStructure (AEGIS) under the Japanese national project 'Development and Applications of Advanced High-Performance Supercomputer'. It aims to enable synchronization of three themes: 1) Computer-Aided Research and Development (CARD) to realize and environment for STA, 2) Computer-Aided Engineering (CAEN) to establish Multi Experimental Tools (MEXT), and 3) Computer Aided Science (CASC) to promote the Atomic Energy Research and Investigation (AERI). This article reviewed achievements in R and D of grid computing technology so far obtained. (T. Tanaka)

  11. TRANSFORMING RURAL SECONDARY SCHOOLS IN ZIMBABWE THROUGH TECHNOLOGY: LIVED EXPERIENCES OF STUDENT COMPUTER USERS

    Directory of Open Access Journals (Sweden)

    Gomba Clifford

    2016-04-01

    Full Text Available A technological divide exists in Zimbabwe between urban and rural schools that puts rural based students at a disadvantage. In Zimbabwe, the government, through the president donated computers to most rural schools in a bid to bridge the digital divide between rural and urban schools. The purpose of this phenomenological study was to understand the experiences of Advanced Level students using computers at two rural boarding Catholic High Schools in Zimbabwe. The study was guided by two research questions: (1 How do Advanced level students in the rural areas use computers at their school? and (2 What is the experience of using computers for Advanced Level students in the rural areas of Zimbabwe? By performing this study, it was possible to understand from the students’ experiences whether computer usage was for educational learning or not. The results of the phenomenological study showed that students’ experiences can be broadly classified into five themes, namely worthwhile (interesting experience, accessibility issues, teachers’ monopoly, research and social use, and Internet availability. The participants proposed teachers use computers, but not monopolize computer usage. The solution to the computer shortage may be solved by having donors and government help in the acquisitioning of more computers.

  12. Understanding Beliefs, Teachers’ Beliefs and Their Impact on the Use of Computer Technology

    Directory of Open Access Journals (Sweden)

    Héctor Alejandro Galvis

    2012-07-01

    Full Text Available This theoretical review addresses the construct of beliefs in education and English as a foreign language, and their impact when integrating technology. A thorough definition and categorization of teachers’ beliefs will be provided. In addition, studies conducted in various educational settings examining the effects of teachers’ beliefs and the use of technology will be reviewed. Additional information on models attempting to explain human behavior and the use of computers will be presented as well in order to discuss these research results in light of local efforts made to solve the gap of integrating technology through the Computadores para Educar Program in Colombian public schools.

  13. Methods of computer experiment in gamma-radiation technologies using new radiation sources

    CERN Document Server

    Bratchenko, M I; Rozhkov, V V

    2001-01-01

    Presented id the methodology of computer modeling application for physical substantiation of new irradiation technologies and irradiators design work flow. Modeling tasks for irradiation technologies are structured along with computerized methods of their solution and appropriate types of software. Comparative analysis of available packages for Monte-Carlo modeling of electromagnetic processes in media is done concerning their application to irradiation technologies problems. The results of codes approbation and preliminary data on gamma-radiation absorbed dose distributions for nuclides of conventional sources and prospective Europium-based gamma-sources are presented.

  14. EXPERIMENTAL AND THEORETICAL FOUNDATIONS AND PRACTICAL IMPLEMENTATION OF TECHNOLOGY BRAIN-COMPUTER INTERFACE

    Directory of Open Access Journals (Sweden)

    A. Ya. Kaplan

    2013-01-01

    Full Text Available Technology brain-computer interface (BCI allow saperson to learn how to control external devices via thevoluntary regulation of own EEG directly from the brain without the involvement in the process of nerves and muscles. At the beginning the main goal of BCI was to replace or restore motor function to people disabled by neuromuscular disorders. Currently, the task of designing the BCI increased significantly, more capturing different aspects of life a healthy person. This article discusses the theoretical, experimental and technological base of BCI development and systematized critical fields of real implementation of these technologies.

  15. INTEGRATION OF COMPUTER TECHNOLOGIES SMK: AUTOMATION OF THE PRODUCTION CERTIFICA-TION PROCEDURE AND FORMING OF SHIPPING DOCUMENTS

    Directory of Open Access Journals (Sweden)

    S. A. Pavlenko

    2009-01-01

    Full Text Available Integration of informational computer technologies allowed to reorganize and optimize some processes due to decrease of circulation of documents, unification of documentation forms and others.

  16. Utilizing Computer Mediated Technology in the Basic Communication Course: "Organizational Implications."

    Science.gov (United States)

    Bell, J. Derek

    A basic public speaking/communication course at the University of Wisconsin-Stevens Point, a general degree requirement, is using computer mediated technologies to make the class more innovative and applicable. The basic course should provide experiential knowledge of the fundamentals of delivering an effective presentation, and, in a more general…

  17. A Review of Research on Intercultural Learning through Computer-Based Digital Technologies

    Science.gov (United States)

    Çiftçi, Emrullah Yasin

    2016-01-01

    Intercultural communication is now a crucial part of our globalizing lives; however, not everyone has an opportunity to engage in an intercultural interaction with people from different cultures. Computer-based technologies are promising in creating environments for people to communicate with people from diverse cultures. This qualitative…

  18. Computer Technology and Educational Equity. ERIC/CUE Urban Diversity Series, Number 91.

    Science.gov (United States)

    Gordon, Edmund W.; Armour-Thomas, Eleanor

    The impact of the technological revolution on education is examined in this monograph, which focuses primarily on computers. First, the history of the educational uses of a variety of media (film, radio, television, teaching machines, and videodisc systems) is traced and assessed. As instructional aids, it is said, the media economize teachers'…

  19. A Synthesis and Survey of Critical Success Factors for Computer Technology Projects

    Science.gov (United States)

    Baker, Ross A.

    2012-01-01

    The author investigated the existence of critical success factors for computer technology projects. Current research literature and a survey of experienced project managers indicate that there are 23 critical success factors (CSFs) that correlate with project success. The survey gathered an assessment of project success and the degree to which…

  20. Multimodal Learning Analytics and Education Data Mining: Using Computational Technologies to Measure Complex Learning Tasks

    Science.gov (United States)

    Blikstein, Paulo; Worsley, Marcelo

    2016-01-01

    New high-frequency multimodal data collection technologies and machine learning analysis techniques could offer new insights into learning, especially when students have the opportunity to generate unique, personalized artifacts, such as computer programs, robots, and solutions engineering challenges. To date most of the work on learning analytics…

  1. African American Faculty Women Experiences of Underrepresentation in Computer Technology Positions in Higher Education

    Science.gov (United States)

    King, Dolores

    2013-01-01

    African American women are underrepresented in computer technology disciplines in institutions of higher education throughout the United States. Although equitable gender representation is progressing in most fields, much less information is available on why institutions are still lagging in workforce diversity, a problem which can be lessened by…

  2. A City Parking Integration System Combined with Cloud Computing Technologies and Smart Mobile Devices

    Science.gov (United States)

    Yeh, Her-Tyan; Chen, Bing-Chang; Wang, Bo-Xun

    2016-01-01

    The current study applied cloud computing technology and smart mobile devices combined with a streaming server for parking lots to plan a city parking integration system. It is also equipped with a parking search system, parking navigation system, parking reservation service, and car retrieval service. With this system, users can quickly find…

  3. The Role of Computer Technology in Supporting Children's Learning in Jordanian Early Years Education

    Science.gov (United States)

    Alkhawaldeh, Mustafa; Hyassat, Mizyed; Al-Zboon, Eman; Ahmad, Jamal

    2017-01-01

    The current research investigated early years teachers' perspectives regarding the role of computer technology in supporting children's learning in Jordanian kindergartens. Thirty semistructured interviews were conducted with preschool teachers. The sample of kindergartens in this study was purposefully selected from the targeted population of…

  4. Technology at the zoo: the influence of a touchscreen computer on orangutans and zoo visitors.

    Science.gov (United States)

    Perdue, Bonnie M; Clay, Andrea W; Gaalema, Diann E; Maple, Terry L; Stoinski, Tara S

    2012-01-01

    A computer-controlled touchscreen apparatus (hereafter referred to as "touchscreen") in the orangutan exhibit at Zoo Atlanta provides enrichment to the animals and allows cognitive research to take place on exhibit. This study investigated the impact of the touchscreen on orangutan behavior and visibility, as well as its impact on zoo visitors. Despite previous research suggesting that providing a single computer system may negatively affect orangutan behavior, there was not a significant increase in aggression, stereotypic, or distress-related behaviors following the activation of the on-exhibit touchscreen. We also investigated the possibility that zoo visitors may be negatively affected by technology because it deviates from naturalism. However, we did not find a change in stay time or overall experience rating when the computer was turned on. This research was the first to assess visitor attitudes toward technology at the zoo, and we found that visitors report highly positive attitudes about technology for both animals and visitors. If subjects visited the exhibit when the computer was turned on, they more strongly agreed that orangutans benefit from interacting with computerized enrichment. This study is the first investigation of an on-exhibit touchscreen in group-housed apes; our findings of no negative effects on the animals or zoo visitors and positive attitudes toward technology suggest a significant value of this practice. © 2011 Wiley Periodicals, Inc.

  5. The View of Science and Technology Teachers about Computer Assisted Instruction

    Science.gov (United States)

    Toman, Ufuk; Gurbuz, Fatih; Cimer, Sabiha Odabasi

    2013-01-01

    The purpose of the study is to present the views of the teachers of Primary Science and Technology course about computer assisted instruction. Qualitative research was used in the study. In qualitative researches, the sampling group is small in order to examine the sampling in-depth. Semi-structured interviews were used in the study as data…

  6. Computer-based measurement and automatizatio aplication research in nuclear technology fields

    International Nuclear Information System (INIS)

    Jiang Hongfei; Zhang Xiangyang

    2003-01-01

    This paper introduces computer-based measurement and automatization application research in nuclear technology fields. The emphasis of narration are the role of software in the development of system, and the network measurement and control software model which has optimistic application foreground. And presents the application examples of research and development. (authors)

  7. Computer-Controlled 3D Laser Scanning Microscope Based On Optical Disk Technology.

    Science.gov (United States)

    Schweizer, P.; Neveux, L.; Chiaramello, M.; Monteil, P.; Ostrowsky, D. B...

    1987-08-01

    We describe RASCALS* (RAster SCAn Laser System) a 2D and 3D scanning laser microscope and outline it's performance. This system, based on optical disk technology and a PC compatible computer offers an interesting cost/performance ratio compared to existing laser scanning microscopes.

  8. Programmed Instruction to Computer-Based Instruction: The Evolution of an Instructional Technology.

    Science.gov (United States)

    Lamos, Joseph P.

    This review of the evolution of programmed instruction from Pressey and Skinner to the present suggests that current computer technology will be able to free the learner from the limitations of time and place as Pressey originally proposed. It is noted that Skinner provided the necessary foundation for treating the learning process on an…

  9. Computer Technology-Integrated Projects Should Not Supplant Craft Projects in Science Education

    Science.gov (United States)

    Klopp, Tabatha J.; Rule, Audrey C.; Schneider, Jean Suchsland; Boody, Robert M.

    2014-01-01

    The current emphasis on computer technology integration and narrowing of the curriculum has displaced arts and crafts. However, the hands-on, concrete nature of craft work in science modeling enables students to understand difficult concepts and to be engaged and motivated while learning spatial, logical, and sequential thinking skills. Analogy…

  10. Global Journal of Computer Science and Technology. Volume 1.2

    Science.gov (United States)

    Dixit, R. K.

    2009-01-01

    Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…

  11. Global Journal of Computer Science and Technology. Volume 9, Issue 5 (Ver. 2.0)

    Science.gov (United States)

    Dixit, R. K.

    2010-01-01

    This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…

  12. Teachers' Organization of Participation Structures for Teaching Science with Computer Technology

    Science.gov (United States)

    Subramaniam, Karthigeyan

    2016-01-01

    This paper describes a qualitative study that investigated the nature of the participation structures and how the participation structures were organized by four science teachers when they constructed and communicated science content in their classrooms with computer technology. Participation structures focus on the activity structures and…

  13. Teaching Pronunciation with Computer Assisted Pronunciation Instruction in a Technological University

    Science.gov (United States)

    Liu, Sze-Chu; Hung, Po-Yi

    2016-01-01

    The purpose of this study is to evaluate the effectiveness of computer assisted pronunciation instruction in English pronunciation for students in vocational colleges and universities in Taiwan. The participants were fifty-one first-year undergraduate students from a technological university located in central Taiwan. The participants received an…

  14. Cloud Computing Technologies in Writing Class: Factors Influencing Students' Learning Experience

    Science.gov (United States)

    Wang, Jenny

    2017-01-01

    The proposed interactive online group within the cloud computing technologies as a main contribution of this paper provides easy and simple access to the cloud-based Software as a Service (SaaS) system and delivers effective educational tools for students and teacher on after-class group writing assignment activities. Therefore, this study…

  15. Swift Guanxi in online marketplace : The role of computer-mediated-communication technologies

    NARCIS (Netherlands)

    Ou, C.X.J.; Pavlou, P.A.; Davison, R.M.

    2014-01-01

    The concept of guanxi (i.e., a close and pervasive interpersonal relationship) has received little attention in the literature on online marketplaces, perhaps due to their impersonal nature. However, we propose that computer-mediated communication (CMC) technologies can mimic traditional interactive

  16. Measuring and Supporting Pre-Service Teachers' Self-Efficacy towards Computers, Teaching, and Technology Integration

    Science.gov (United States)

    Killi, Carita; Kauppinen, Merja; Coiro, Julie; Utriainen, Jukka

    2016-01-01

    This paper reports on two studies designed to examine pre-service teachers' self-efficacy beliefs. Study I investigated the measurement properties of a self-efficacy beliefs questionnaire comprising scales for computer self-efficacy, teacher self-efficacy, and self-efficacy towards technology integration. In Study I, 200 pre-service teachers…

  17. 6. Seminar of the IIE-ININ-IMP on technological specialties. Topic 8: computation

    International Nuclear Information System (INIS)

    1992-01-01

    The document includes 10 papers presented at the 6. Seminar of the IIE-ININ-IMP (Mexico) on technological specialties in the field of computation. (Topic 8). Three items were in INIS subject scope and a separate abstract was prepared for each of them

  18. The use of computer imaging technology to facilitate the capture of feedlot necropsy information.

    Science.gov (United States)

    Wildman, B K; Schunicht, O C; Jim, G K; Guichon, P T; Booker, C W; Tollens, R A

    2000-02-01

    The collection of necropsy information is an integral component of veterinary feedlot consulting. Computer imaging technology can be employed to facilitate the capture of feedlot necropsy data. A digital camera is used to capture necropsy images. Subsequently, the images are electronically transferred to a central site for veterinary interpretation and diagnosis.

  19. Dynamics of Reverse Salience as Technological Performance Gap: An Empirical Study of the Personal Computer Technology System

    Directory of Open Access Journals (Sweden)

    Ozgur Dedehayir

    2008-08-01

    Full Text Available The evolution of technological systems is hindered by systemic components, referred to as reverse salients, which fail to deliver the necessary level of technological performance thereby inhibiting the performance delivery of the system as a whole. This paper develops a performance gap measure of reverse salience and applies this measurement in the study of the PC (personal computer technological system, focusing on the evolutions of firstly the CPU (central processing unit and PC game sub-systems, and secondly the GPU (graphics processing unit and PC game sub-systems. The measurement of the temporal behavior of reverse salience indicates that the PC game sub-system is the reverse salient, continuously trailing behind the technological performance of the CPU and GPU sub-systems from 1996 through 2006. The technological performance of the PC game sub-system as a reverse salient trails that of the CPU sub-system by up to 2300 MHz with a gradually decreasing performance disparity in recent years. In contrast, the dynamics of the PC game sub-system as a reverse salient trails the GPU sub-system with an ever increasing performance gap throughout the timeframe of analysis. In addition, we further discuss the research and managerial implications of our findings.

  20. Opportunities and Needs for Mobile-Computing Technology to Support U.S. Geological Survey Fieldwork

    Science.gov (United States)

    Wood, Nathan J.; Halsing, David L.

    2006-01-01

    To assess the opportunities and needs for mobile-computing technology at the U.S. Geological Survey (USGS), we conducted an internal, Internet-based survey of bureau scientists whose research includes fieldwork. In summer 2005, 144 survey participants answered 65 questions about fieldwork activities and conditions, technology to support field research, and postfieldwork data processing and analysis. Results suggest that some types of mobile-computing technology are already commonplace, such as digital cameras and Global Positioning System (GPS) receivers, whereas others are not, such as personal digital assistants (PDAs) and tablet-based personal computers (tablet PCs). The potential for PDA use in the USGS is high: 97 percent of respondents record field observations (primarily environmental conditions and water-quality data), and 87 percent take field samples (primarily water-quality data, water samples, and sediment/soil samples). The potential for tablet PC use in the USGS is also high: 59 percent of respondents map environmental features in the field, primarily by sketching in field notebooks, on aerial photographs, or on topographic-map sheets. Results also suggest that efficient mobile-computing-technology solutions could benefit many USGS scientists because most respondents spend at least 1 week per year in the field, conduct field sessions that are least 1 week in duration, have field crews of one to three people, and typically travel on foot about 1 mi from their field vehicles. By allowing researchers to enter data directly into digital databases while in the field, mobile-computing technology could also minimize postfieldwork data processing: 93 percent of respondents enter collected field data into their office computers, and more than 50 percent spend at least 1 week per year on postfieldwork data processing. Reducing postfieldwork data processing could free up additional time for researchers and result in cost savings for the bureau. Generally

  1. Cloud Computing (SaaS Adoption as a Strategic Technology: Results of an Empirical Study

    Directory of Open Access Journals (Sweden)

    Pedro R. Palos-Sanchez

    2017-01-01

    Full Text Available The present study empirically analyzes the factors that determine the adoption of cloud computing (SaaS model in firms where this strategy is considered strategic for executing their activity. A research model has been developed to evaluate the factors that influence the intention of using cloud computing that combines the variables found in the technology acceptance model (TAM with other external variables such as top management support, training, communication, organization size, and technological complexity. Data compiled from 150 companies in Andalusia (Spain are used to test the formulated hypotheses. The results of this study reflect what critical factors should be considered and how they are interrelated. They also show the organizational demands that must be considered by those companies wishing to implement a real management model adopted to the digital economy, especially those related to cloud computing.

  2. On Study of Application of Big Data and Cloud Computing Technology in Smart Campus

    Science.gov (United States)

    Tang, Zijiao

    2017-12-01

    We live in an era of network and information, which means we produce and face a lot of data every day, however it is not easy for database in the traditional meaning to better store, process and analyze the mass data, therefore the big data was born at the right moment. Meanwhile, the development and operation of big data rest with cloud computing which provides sufficient space and resources available to process and analyze data of big data technology. Nowadays, the proposal of smart campus construction aims at improving the process of building information in colleges and universities, therefore it is necessary to consider combining big data technology and cloud computing technology into construction of smart campus to make campus database system and campus management system mutually combined rather than isolated, and to serve smart campus construction through integrating, storing, processing and analyzing mass data.

  3. High performance computing and communications: Advancing the frontiers of information technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-31

    This report, which supplements the President`s Fiscal Year 1997 Budget, describes the interagency High Performance Computing and Communications (HPCC) Program. The HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of accomplishments to its credit. Over its five-year history, the HPCC Program has focused on developing high performance computing and communications technologies that can be applied to computation-intensive applications. Major highlights for FY 1996: (1) High performance computing systems enable practical solutions to complex problems with accuracies not possible five years ago; (2) HPCC-funded research in very large scale networking techniques has been instrumental in the evolution of the Internet, which continues exponential growth in size, speed, and availability of information; (3) The combination of hardware capability measured in gigaflop/s, networking technology measured in gigabit/s, and new computational science techniques for modeling phenomena has demonstrated that very large scale accurate scientific calculations can be executed across heterogeneous parallel processing systems located thousands of miles apart; (4) Federal investments in HPCC software R and D support researchers who pioneered the development of parallel languages and compilers, high performance mathematical, engineering, and scientific libraries, and software tools--technologies that allow scientists to use powerful parallel systems to focus on Federal agency mission applications; and (5) HPCC support for virtual environments has enabled the development of immersive technologies, where researchers can explore and manipulate multi-dimensional scientific and engineering problems. Educational programs fostered by the HPCC Program have brought into classrooms new science and engineering curricula designed to teach computational science. This document contains a small sample of the significant HPCC Program accomplishments in FY 1996.

  4. Use of computer technologies in physical education of women of the first mature age

    Directory of Open Access Journals (Sweden)

    Julia Tomilina

    2016-08-01

    Full Text Available Purpose: the improvement of process of physical education of women of the first mature age by means of Pilates with use of information technologies. Material & Methods: the experience of development and deployment of computer technologies in the process of physical education of women of mature age was systematized by means of the analysis of scientific and methodical and special literature and the best pedagogical and coach's practices, which is presented in mass media. The ways of application of computer programs were revealed, and the computer program ‘’Pilates’’ was developed by means of programming in the system Visual Basic. Results: the computer program ‘’Pilates’’, which consists of directory, settlement and recreational blocks, is offered for the purpose of improvement of the process of physical education of women of the first mature age by means of Pilates and increase in their motivation to classes by physical exercises. Conclusions: it is revealed that application of the computer programs has the positive effect in practice of physical education of women of the first mature age. The computer program ‘’Pilates’’ is submitted.

  5. Express: a Web-based technology to support human and computational experimentation.

    Science.gov (United States)

    Yule, Peter; Cooper, Richard P

    2003-11-01

    Experimental cognitive psychology has been greatly assisted by the development of general computer-based experiment presentation packages. Typically, however, such packages provide little support for running participants on different computers. It is left to the experimenter to ensure that group sizes are balanced between conditions and to merge data gathered on different computers once the experiment is complete. Equivalent issues arise in the evaluation of parameterized computational models, where it is frequently necessary to test a model's behavior over a range of parameter values (which amount to between-subjects factors) and where such testing can be speeded up significantly by the use of multiple processors. This article describes Express, a Web-based technology for coordinating "clients" participants or computational models) and collating client data. The technology provides an experiment design editor, client coordination facilities (e.g., automated randomized assignment of clients to groups so that group sizes are balanced), general data collation and tabulation facilities, a range of basic statistical functions (which are constrained by the specified experimental design), and facilities to export data to standard statistical packages (such as SPSS). We report case studies demonstrating the utility of Express in both human and computational experiments. Express may be freely downloaded from the Express Web site (http://express.psyc.bbk.ac.uk/).

  6. Computer-related assistive technology: satisfaction and experiences among users with disabilities.

    Science.gov (United States)

    Burton, Mary; Nieuwenhuijsen, Els R; Epstein, Marcy J

    2008-01-01

    Many people with disabilities use assistive technology devices (ATDs) for computer access. The specific focus of this exploratory study was (a) to assess the experiences, opinions, and satisfaction levels of 24 individuals with disabilities using computer-related ATDs; (b) to investigate their awareness of health risk factors related to computer usage; and (c) to examine the psychosocial impact of computer-related ATDs on users. Data were collected via telephone interviews with 24 individuals with physical disabilities who had experience using one or more ATDs. The Quebec User Evaluation with Assistive Technology instrument was used to evaluate users' satisfaction with ATDs in a number of dimensions, including their physical attributes. The Psychosocial Impact of Assistive Devices Scale measured the psychosocial impact (i.e., independence, competence, and adequacy) of an ATD on users. Additional questions were posed to gather information about user's opinions and experiences. Training appeared to be an important component for ATD users, many of whom preferred a setting to try out devices rather than group or individual training. Respondents with visual impairments revealed a higher level of adaptability versus those without visual impairments (p = .001). Additional research is needed to develop specific survey items focused on users of computer-related ATDs and the evaluation of the psychosocial impact of ATDs on computer users.

  7. Evolutionary features of academic articles co-keyword network and keywords co-occurrence network: Based on two-mode affiliation network

    Science.gov (United States)

    Li, Huajiao; An, Haizhong; Wang, Yue; Huang, Jiachen; Gao, Xiangyun

    2016-05-01

    Keeping abreast of trends in the articles and rapidly grasping a body of article's key points and relationship from a holistic perspective is a new challenge in both literature research and text mining. As the important component, keywords can present the core idea of the academic article. Usually, articles on a single theme or area could share one or some same keywords, and we can analyze topological features and evolution of the articles co-keyword networks and keywords co-occurrence networks to realize the in-depth analysis of the articles. This paper seeks to integrate statistics, text mining, complex networks and visualization to analyze all of the academic articles on one given theme, complex network(s). All 5944 ;complex networks; articles that were published between 1990 and 2013 and are available on the Web of Science are extracted. Based on the two-mode affiliation network theory, a new frontier of complex networks, we constructed two different networks, one taking the articles as nodes, the co-keyword relationships as edges and the quantity of co-keywords as the weight to construct articles co-keyword network, and another taking the articles' keywords as nodes, the co-occurrence relationships as edges and the quantity of simultaneous co-occurrences as the weight to construct keyword co-occurrence network. An integrated method for analyzing the topological features and evolution of the articles co-keyword network and keywords co-occurrence networks is proposed, and we also defined a new function to measure the innovation coefficient of the articles in annual level. This paper provides a useful tool and process for successfully achieving in-depth analysis and rapid understanding of the trends and relationships of articles in a holistic perspective.

  8. The Recent Trend in a Human Resource Management Journal: A Keyword Analysis

    Directory of Open Access Journals (Sweden)

    Muhammed Kürşad Özlen

    2014-07-01

    Full Text Available Continuous changes in technology, economic, social and psychological understandings and structures have influence on both Human Resources and their management. Organizations approach their human capital in a more sensitive way in order to win the loyalty and commitment of them, while increasing profit and maximizing the efficiency/effectiveness of its work power. Human Resources Management helps achieving these goals by recruiting, training, developing, motivating and rewarding employees. Therefore, the identification of current research interests is essential to lead them in defining organizational human resources strategies. The main purpose of this research is to identify top rated factors related to Human Resource Management by analyzing all the abstracts of the published papers in a Human Resource Management journal from the beginning of 2005 till the end of 2012. As a result of analyzing the keywords of all abstracts, the frequencies of the keyword categories are identified. Except the keywords related to Human Resources (17.6%, it is observed that the studies for the period consider the following: Employee rights and their career (18.3%, management (14.6%, contextual issues (10%, organizational strategies (9.5%, performance measurement and training (9.5%, behavioral issues and employee motivation (5.7, organizational culture (5.4%, technical issues (4.1%, etc. It should be noted that the researchers (a mainly stress on practice more than theory and (b consider the organization less than the individual. Interestingly, employee motivation is found to be less considered by the researchers. This study is believed to be useful for future studies and the industry by identifying the hot and top rated factors related to Human Resource Management.

  9. Mississippi Curriculum Framework for Computer Information Systems Technology. Computer Information Systems Technology (Program CIP: 52.1201--Management Information Systems & Business Data). Computer Programming (Program CIP: 52.1201). Network Support (Program CIP: 52.1290--Computer Network Support Technology). Postsecondary Programs.

    Science.gov (United States)

    Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.

    This document, which is intended for use by community and junior colleges throughout Mississippi, contains curriculum frameworks for two programs in the state's postsecondary-level computer information systems technology cluster: computer programming and network support. Presented in the introduction are program descriptions and suggested course…

  10. Assessment of the fit of removable partial denture fabricated by computer-aided designing/computer aided manufacturing technology

    Directory of Open Access Journals (Sweden)

    Khalid A.O. Arafa

    2018-01-01

    Full Text Available Objective: To assess the level of evidence that supports the quality of fit for removable partial denture (RPD fabricated by computer-aided designing/computer aided manufacturing (CAD/CAM and rapid prototyping (RP technology. Methods: An electronic search was performed in Google Scholar, PubMed, and Cochrane library search engines, using Boolean operators. All articles published in English and published in the period from 1950 until April 2017 were eligible to be included in this review. The total number of articles contained the search terms in any part of the article (including titles, abstracts, or article texts were screened, which resulted in 214 articles. After exclusion of irrelevant and duplicated articles, 12 papers were included in this systematic review. Results: All the included studies were case reports, except one study, which was a case series that recruited 10 study participants. The visual and tactile examination in the cast or clinically in the patient’s mouth was the most-used method for assessment of the fit of RPDs. From all included studies, only one has assessed the internal fit between RPDs and oral tissues using silicone registration material. The vast majority of included studies found that the fit of RPDs ranged from satisfactory to excellent fit. Conclusion: Despite the lack of clinical trials that provide strong evidence, the available evidence supported the claim of good fit of RPDs fabricated by new technologies using CAD/CAM.

  11. Assessment of the fit of removable partial denture fabricated by computer-aided designing/computer aided manufacturing technology.

    Science.gov (United States)

    Arafa, Khalid A O

    2018-01-01

    To assess the level of evidence that supports the quality of fit for removable partial denture (RPD) fabricated by computer-aided designing/computer aided manufacturing (CAD/CAM) and rapid prototyping (RP) technology. Methods: An electronic search was performed in Google Scholar, PubMed, and Cochrane library search engines, using Boolean operators. All articles published in English and published in the period from 1950 until April 2017 were eligible to be included in this review. The total number of articles contained the search terms in any part of the article (including titles, abstracts, or article texts) were screened, which resulted in 214 articles. After exclusion of irrelevant and duplicated articles, 12 papers were included in this systematic review.  Results: All the included studies were case reports, except one study, which was a case series that recruited 10 study participants. The visual and tactile examination in the cast or clinically in the patient's mouth was the most-used method for assessment of the fit of RPDs. From all included studies, only one has assessed the internal fit between RPDs and oral tissues using silicone registration material. The vast majority of included studies found that the fit of RPDs ranged from satisfactory to excellent fit. Conclusion: Despite the lack of clinical trials that provide strong evidence, the available evidence supported the claim of good fit of RPDs fabricated by new technologies using CAD/CAM.

  12. Hybrid ontology for semantic information retrieval model using keyword matching indexing system.

    Science.gov (United States)

    Uthayan, K R; Mala, G S Anandha

    2015-01-01

    Ontology is the process of growth and elucidation of concepts of an information domain being common for a group of users. Establishing ontology into information retrieval is a normal method to develop searching effects of relevant information users require. Keywords matching process with historical or information domain is significant in recent calculations for assisting the best match for specific input queries. This research presents a better querying mechanism for information retrieval which integrates the ontology queries with keyword search. The ontology-based query is changed into a primary order to predicate logic uncertainty which is used for routing the query to the appropriate servers. Matching algorithms characterize warm area of researches in computer science and artificial intelligence. In text matching, it is more dependable to study semantics model and query for conditions of semantic matching. This research develops the semantic matching results between input queries and information in ontology field. The contributed algorithm is a hybrid method that is based on matching extracted instances from the queries and information field. The queries and information domain is focused on semantic matching, to discover the best match and to progress the executive process. In conclusion, the hybrid ontology in semantic web is sufficient to retrieve the documents when compared to standard ontology.

  13. Integration of computer technology into the medical curriculum: the King's experience

    Directory of Open Access Journals (Sweden)

    Vickie Aitken

    1997-12-01

    Full Text Available Recently, there have been major changes in the requirements of medical education which have set the scene for the revision of medical curricula (Towle, 1991; GMC, 1993. As part of the new curriculum at King's, the opportunity has been taken to integrate computer technology into the course through Computer-Assisted Learning (CAL, and to train graduates in core IT skills. Although the use of computers in the medical curriculum has up to now been limited, recent studies have shown encouraging steps forward (see Boelen, 1995. One area where there has been particular interest is the use of notebook computers to allow students increased access to IT facilities (Maulitz et al, 1996.

  14. The Nuclear Energy Advanced Modeling and Simulation Enabling Computational Technologies FY09 Report

    Energy Technology Data Exchange (ETDEWEB)

    Diachin, L F; Garaizar, F X; Henson, V E; Pope, G

    2009-10-12

    In this document we report on the status of the Nuclear Energy Advanced Modeling and Simulation (NEAMS) Enabling Computational Technologies (ECT) effort. In particular, we provide the context for ECT In the broader NEAMS program and describe the three pillars of the ECT effort, namely, (1) tools and libraries, (2) software quality assurance, and (3) computational facility (computers, storage, etc) needs. We report on our FY09 deliverables to determine the needs of the integrated performance and safety codes (IPSCs) in these three areas and lay out the general plan for software quality assurance to meet the requirements of DOE and the DOE Advanced Fuel Cycle Initiative (AFCI). We conclude with a brief description of our interactions with the Idaho National Laboratory computer center to determine what is needed to expand their role as a NEAMS user facility.

  15. Scientific Computers at the Helsinki University of Technology during the Post Pioneering Stage

    Science.gov (United States)

    Nykänen, Panu; Andersin, Hans

    The paper describes the process leading from the pioneering phase when the university was free to develop and build its own computers through the period when the university was dependent on cooperation with the local computer companies to the stage when a bureaucratic state organization took over the power to decide on acquiring computing equipment to the universities. This stage ended in the late 1970s when computing power gradually became a commodity that the individual laboratories and research projects could acquire just like any resource. This development paralleled the situation in many other countries and universities as well. We have chosen the Helsinki University of Technology (TKK) as a case to illustrate this development process, which for the researchers was very annoying and frustrating when it happened.

  16. A Privacy-Preserving Intelligent Medical Diagnosis System Based on Oblivious Keyword Search

    Directory of Open Access Journals (Sweden)

    Zhaowen Lin

    2017-01-01

    Full Text Available One of the concerns people have is how to get the diagnosis online without privacy being jeopardized. In this paper, we propose a privacy-preserving intelligent medical diagnosis system (IMDS, which can efficiently solve the problem. In IMDS, users submit their health examination parameters to the server in a protected form; this submitting process is based on Paillier cryptosystem and will not reveal any information about their data. And then the server retrieves the most likely disease (or multiple diseases from the database and returns it to the users. In the above search process, we use the oblivious keyword search (OKS as a basic framework, which makes the server maintain the computational ability but cannot learn any personal information over the data of users. Besides, this paper also provides a preprocessing method for data stored in the server, to make our protocol more efficient.

  17. Research and realization implementation of monitor technology on illegal external link of classified computer

    Science.gov (United States)

    Zhang, Hong

    2017-06-01

    In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.

  18. “Happiness Inventors”: Informing Positive Computing Technologies Through Participatory Design With Children

    Science.gov (United States)

    Schueller, Stephen Matthew

    2017-01-01

    Background Positive psychological interventions for children have typically focused on direct adaptations of interventions developed for adults. As the community moves toward designing positive computing technologies to support child well-being, it is important to use a more participatory process that directly engages children’s voices. Objective Our objectives were, through a participatory design study, to understand children’s interpretations of positive psychology concepts, as well as their perspectives on technologies that are best suited to enhance their engagement with practice of well-being skills. Methods We addressed these questions through a content analysis of 434 design ideas, 51 sketches, and 8 prototype and videos, which emerged from a 14-session cooperative inquiry study with 12 child “happiness inventors.” The study was part of a summer learning camp held at the children’s middle school, which focused on teaching the invention process, teaching well-being skills drawn from positive psychology and related areas (gratitude, mindfulness, and problem solving), and iterating design ideas for technologies to support these skills. Results The children’s ideas and prototypes revealed specific facets of how they interpreted gratitude (as thanking, being positive, and doing good things), mindfulness (as externally representing thought and emotions, controlling those thoughts and emotions, getting through unpleasant things, and avoiding forgetting something), and problem solving (as preventing bad decisions, seeking alternative solutions, and not dwelling on unproductive thoughts). This process also revealed that children emphasized particular technologies in their solutions. While desktop or laptop solutions were notably lacking, other ideas were roughly evenly distributed between mobile apps and embodied computing technologies (toys, wearables, etc). We also report on desired functionalities and approaches to engagement in the children’s ideas

  19. "Happiness Inventors": Informing Positive Computing Technologies Through Participatory Design With Children.

    Science.gov (United States)

    Yarosh, Svetlana; Schueller, Stephen Matthew

    2017-01-17

    Positive psychological interventions for children have typically focused on direct adaptations of interventions developed for adults. As the community moves toward designing positive computing technologies to support child well-being, it is important to use a more participatory process that directly engages children's voices. Our objectives were, through a participatory design study, to understand children's interpretations of positive psychology concepts, as well as their perspectives on technologies that are best suited to enhance their engagement with practice of well-being skills. We addressed these questions through a content analysis of 434 design ideas, 51 sketches, and 8 prototype and videos, which emerged from a 14-session cooperative inquiry study with 12 child "happiness inventors." The study was part of a summer learning camp held at the children's middle school, which focused on teaching the invention process, teaching well-being skills drawn from positive psychology and related areas (gratitude, mindfulness, and problem solving), and iterating design ideas for technologies to support these skills. The children's ideas and prototypes revealed specific facets of how they interpreted gratitude (as thanking, being positive, and doing good things), mindfulness (as externally representing thought and emotions, controlling those thoughts and emotions, getting through unpleasant things, and avoiding forgetting something), and problem solving (as preventing bad decisions, seeking alternative solutions, and not dwelling on unproductive thoughts). This process also revealed that children emphasized particular technologies in their solutions. While desktop or laptop solutions were notably lacking, other ideas were roughly evenly distributed between mobile apps and embodied computing technologies (toys, wearables, etc). We also report on desired functionalities and approaches to engagement in the children's ideas, such as a notable emphasis on representing and

  20. Development of a global computable general equilibrium model coupled with detailed energy end-use technology

    International Nuclear Information System (INIS)

    Fujimori, Shinichiro; Masui, Toshihiko; Matsuoka, Yuzuru

    2014-01-01

    Highlights: • Detailed energy end-use technology information is considered within a CGE model. • Aggregated macro results of the detailed model are similar to traditional model. • The detailed model shows unique characteristics in the household sector. - Abstract: A global computable general equilibrium (CGE) model integrating detailed energy end-use technologies is developed in this paper. The paper (1) presents how energy end-use technologies are treated within the model and (2) analyzes the characteristics of the model’s behavior. Energy service demand and end-use technologies are explicitly considered, and the share of technologies is determined by a discrete probabilistic function, namely a Logit function, to meet the energy service demand. Coupling with detailed technology information enables the CGE model to have more realistic representation in the energy consumption. The proposed model in this paper is compared with the aggregated traditional model under the same assumptions in scenarios with and without mitigation roughly consistent with the two degree climate mitigation target. Although the results of aggregated energy supply and greenhouse gas emissions are similar, there are three main differences between the aggregated and the detailed technologies models. First, GDP losses in mitigation scenarios are lower in the detailed technology model (2.8% in 2050) as compared with the aggregated model (3.2%). Second, price elasticity and autonomous energy efficiency improvement are heterogeneous across regions and sectors in the detailed technology model, whereas the traditional aggregated model generally utilizes a single value for each of these variables. Third, the magnitude of emissions reduction and factors (energy intensity and carbon factor reduction) related to climate mitigation also varies among sectors in the detailed technology model. The household sector in the detailed technology model has a relatively higher reduction for both energy

  1. Computer Technology Training in the Workplace: A Longitudinal Investigation of the Effect of Mood.

    Science.gov (United States)

    Venkatesh; Speier

    1999-07-01

    How does a person's mood during technology training influence motivation, intentions, and, ultimately, usage of the new technology? Do these mood effects dissipate or are they sustainable over time? A repeated-measures field study (n = 316) investigated the effect of mood on employee motivation and intentions toward using a specific computer technology at two points in time: immediately after training and 6 weeks after training. Actual usage behavior was assessed for 12 weeks after training. Each individual was assigned to one of three mood treatments: positive, negative, or control. Results indicated that there were only short-term boosts in intrinsic motivation and intention to use the technology among individuals in the positive mood intervention. However, a long-term lowering of intrinsic motivation and intention was observed among those in the negative mood condition. Copyright 1999 Academic Press.

  2. TECHNOLOGICAL COMPETENCE OF FUTURE ENGINEER: FORMATION AND DEVELOPMENT IN COMPUTER INTEGRATED LABORATORY WORKSHOP ON PHYSICS

    Directory of Open Access Journals (Sweden)

    Ihor S. Chernetskyi

    2013-12-01

    Full Text Available The article examines the category «technological competence» and the definition of its components according to the educational process. A structural and functional model of technological competence of future engineers through forms, means, methods and technologies of computer oriented laboratory work. Selected blocks and elements of the model in the course of a typical student laboratory work on the course of general physics. We consider the possibility of using some type of digital labs «Phywe», «Fourier» and modern electronic media (flash books to optimize laboratory work at the Technical University. The analysis of the future research of structural elements model of technological competence.

  3. A brain-computer interface as input channel for a standard assistive technology software.

    Science.gov (United States)

    Zickler, Claudia; Riccio, Angela; Leotta, Francesco; Hillian-Tress, Sandra; Halder, Sebastian; Holz, Elisa; Staiger-Sälzer, Pit; Hoogerwerf, Evert-Jan; Desideri, Lorenzo; Mattia, Donatella; Kübler, Andrea

    2011-10-01

    Recently brain-computer interface (BCI) control was integrated into the commercial assistive technology product QualiWORLD (QualiLife Inc., Paradiso-Lugano, CH). Usability of the first prototype was evaluated in terms of effectiveness (accuracy), efficiency (information transfer rate and subjective workload/NASA Task Load Index) and user satisfaction (Quebec User Evaluation of Satisfaction with assistive Technology, QUEST 2.0) by four end-users with severe disabilities. Three assistive technology experts evaluated the device from a third person perspective. The results revealed high performance levels in communication and internet tasks. Users and assistive technology experts were quite satisfied with the device. However, none could imagine using the device in daily life without improvements. Main obstacles were the EEG-cap and low speed.

  4. Current perspective regarding adults with intellectual and developmental disabilities accessing computer technology.

    Science.gov (United States)

    Hoppestad, Brian Scott

    2013-05-01

    This article was written to summarize current efforts in the research community in regards to assisting adults with severe developmental and intellectual disabilities to access a computer. A literature search was conducted to determine contemporary research that has been conducted to enable computer use in persons with significant developmental disabilities utilizing databases such as ERIC or PubMed. Although various assistive technology devices and interventions have been developed for persons with all types of disabilities, a lack of research into methods to help persons with severe developmental disabilities access a computer is evident. This perpetuates the underutilization of computers in this population such as those attending day programs or residing in residential facilities. Persons with developmental disabilities, particularly adults, are often overlooked and are not thought to be capable of using a personal computer. Though communities have endeavored to further enhance participation by persons with disabilities in many aspects of mainstream society, there is a scarcity of research pertaining to how adults with intellectual disabilities can access a computer, especially those with severe impairments. Once formal schooling is over, there appears to be scant interest in supporting adults using computers.

  5. Tangible computer programming: Exploring the use of emerging technology in classrooms and science museums

    Science.gov (United States)

    Horn, Michael S.

    In considering ways to improve the use of digital technology in educational settings, it is helpful to look beyond desktop computers and conventional modes of interaction and consider the flood of emerging technologies that already play a prominent role in the everyday lives of children. In this dissertation, I will present a research project that builds on tangible user interface (TUI) technology to support computer programming and robotics activities in education settings. In particular, I will describe the design and implementation of a novel tangible computer programming language called Tern. I will also describe an evaluation of Tern's use in both formal and informal educational settings--as part of an interactive exhibit on robotics and computer programming called Robot Park on display at the Boston Museum of Science; and as part of a curriculum unit piloted in several kindergarten classrooms in the greater Boston area. In both cases, Tern allows children to create simple computer programs to control a robot. However, rather than using a keyboard or mouse to write programs on a computer screen, children instead use Tern to construct physical algorithmic structures using a collection of interlocking wooden blocks. The goal of this work is not to propose that tangible programming languages are general purpose tools that should replace existing graphical programming languages; rather, I will present evidence to support the argument that tangible programming begins to make sense when one considers the contexts and constraints of specific educational settings. Moreover, in these settings tangible languages can compensate for some of the shortcomings of graphical and text-based systems that have limited their use.

  6. From biological neural networks to thinking machines: Transitioning biological organizational principles to computer technology

    Science.gov (United States)

    Ross, Muriel D.

    1991-01-01

    The three-dimensional organization of the vestibular macula is under study by computer assisted reconstruction and simulation methods as a model for more complex neural systems. One goal of this research is to transition knowledge of biological neural network architecture and functioning to computer technology, to contribute to the development of thinking computers. Maculas are organized as weighted neural networks for parallel distributed processing of information. The network is characterized by non-linearity of its terminal/receptive fields. Wiring appears to develop through constrained randomness. A further property is the presence of two main circuits, highly channeled and distributed modifying, that are connected through feedforward-feedback collaterals and biasing subcircuit. Computer simulations demonstrate that differences in geometry of the feedback (afferent) collaterals affects the timing and the magnitude of voltage changes delivered to the spike initiation zone. Feedforward (efferent) collaterals act as voltage followers and likely inhibit neurons of the distributed modifying circuit. These results illustrate the importance of feedforward-feedback loops, of timing, and of inhibition in refining neural network output. They also suggest that it is the distributed modifying network that is most involved in adaptation, memory, and learning. Tests of macular adaptation, through hyper- and microgravitational studies, support this hypothesis since synapses in the distributed modifying circuit, but not the channeled circuit, are altered. Transitioning knowledge of biological systems to computer technology, however, remains problematical.

  7. Parallel, distributed and GPU computing technologies in single-particle electron microscopy

    International Nuclear Information System (INIS)

    Schmeisser, Martin; Heisen, Burkhard C.; Luettich, Mario; Busche, Boris; Hauer, Florian; Koske, Tobias; Knauber, Karl-Heinz; Stark, Holger

    2009-01-01

    An introduction to the current paradigm shift towards concurrency in software. Most known methods for the determination of the structure of macromolecular complexes are limited or at least restricted at some point by their computational demands. Recent developments in information technology such as multicore, parallel and GPU processing can be used to overcome these limitations. In particular, graphics processing units (GPUs), which were originally developed for rendering real-time effects in computer games, are now ubiquitous and provide unprecedented computational power for scientific applications. Each parallel-processing paradigm alone can improve overall performance; the increased computational performance obtained by combining all paradigms, unleashing the full power of today’s technology, makes certain applications feasible that were previously virtually impossible. In this article, state-of-the-art paradigms are introduced, the tools and infrastructure needed to apply these paradigms are presented and a state-of-the-art infrastructure and solution strategy for moving scientific applications to the next generation of computer hardware is outlined

  8. Development and Validation of the Computer Technology Literacy Self-Assessment Scale for Taiwanese Elementary School Students

    Science.gov (United States)

    Chang, Chiung-Sui

    2008-01-01

    The purpose of this study was to describe the development and validation of an instrument to identify various dimensions of the computer technology literacy self-assessment scale (CTLS) for elementary school students. The instrument included five CTLS dimensions (subscales): the technology operation skills, the computer usages concepts, the…

  9. The Effect of Using in Computer Skills on Teachers' Perceived Self-Efficacy Beliefs towards Technology Integration, Attitudes and Performance

    Science.gov (United States)

    EL-Daou, Badrie Mohammad Nour

    2016-01-01

    The current study analyzes the relationship between the apparent teacher's self-efficacy and attitudes towards integrating technology into classroom teaching, self-evaluation reports and computer performance results. Pre-post measurement of the Computer Technology Integration Survey (CTIS) (Wang et al, 2004) was used to determine the confidence…

  10. The Effect of Using Computer Skills on Teachers' Perceived Self-Efficacy Beliefs towards Technology Integration, Attitudes and Performance

    Science.gov (United States)

    EL-Daou, Badrie Mohammad Nour

    2016-01-01

    The current study analyzes the relationship between the apparent teacher's self-efficacy and attitudes towards integrating technology into classroom teaching, self-evaluation reports and computer performance results. Pre-post measurement of the Computer Technology Integration Survey (CTIS) (Wang et al, 2004) was used to determine the confidence…

  11. Wireless Technologies, Ubiquitous Computing and Mobile Health: Application to Drug Abuse Treatment and Compliance with HIV Therapies.

    Science.gov (United States)

    Boyer, Edward W; Smelson, David; Fletcher, Richard; Ziedonis, Douglas; Picard, Rosalind W

    2010-06-01

    Beneficial advances in the treatment of substance abuse and compliance with medical therapies, including HAART, are possible with new mobile technologies related to personal physiological sensing and computational methods. When incorporated into mobile platforms that allow for ubiquitous computing, these technologies have great potential for extending the reach of behavioral interventions from clinical settings where they are learned into natural environments.

  12. The application of computer and automatic technology in dose measurement of neutron radiation

    International Nuclear Information System (INIS)

    Zhou Yu; Li Chenglin; Luo Yisheng; Guo Yong; Chen Di; Xiaojiang

    1999-01-01

    Generally the dose measurement of neutron radiation requires three electrometers, two bias, three workers in the same time. To improve the accuracy and efficiency of measurement, a Model 6517A electrometer that accommodate Model 6521 scanner cards and a portable computer are used to make up of a automatic measurement system. Corresponding software is developed and used to control it. Because of the application of computer and automatic technology, this system can not only measure dose rate automatically, but also make data's calculating, saving, querying, printing and comparing ease

  13. Human-computer interaction handbook fundamentals, evolving technologies and emerging applications

    CERN Document Server

    Sears, Andrew

    2007-01-01

    This second edition of The Human-Computer Interaction Handbook provides an updated, comprehensive overview of the most important research in the field, including insights that are directly applicable throughout the process of developing effective interactive information technologies. It features cutting-edge advances to the scientific knowledge base, as well as visionary perspectives and developments that fundamentally transform the way in which researchers and practitioners view the discipline. As the seminal volume of HCI research and practice, The Human-Computer Interaction Handbook feature

  14. Fusion of smart, multimedia and computer gaming technologies research, systems and perspectives

    CERN Document Server

    Favorskaya, Margarita; Jain, Lakhmi; Howlett, Robert

    2015-01-01

      This monograph book is focused on the recent advances in smart, multimedia and computer gaming technologies. The Contributions include:   ·         Smart Gamification and Smart Serious Games. ·         Fusion of secure IPsec-based Virtual Private Network, mobile computing and rich multimedia technology. ·         Teaching and Promoting Smart Internet of Things Solutions Using the Serious-game Approach. ·         Evaluation of Student Knowledge using an e-Learning Framework. ·         The iTEC Eduteka. ·         3D Virtual Worlds as a Fusion of Immersing, Visualizing, Recording, and Replaying Technologies. ·         Fusion of multimedia and mobile technology in audioguides for Museums and Exhibitions: from Bluetooth Push to Web Pull. The book is directed to researchers, students and software developers working in the areas of education and information technologies.  

  15. [Mobile phone-computer wireless interactive graphics transmission technology and its medical application].

    Science.gov (United States)

    Huang, Shuo; Liu, Jing

    2010-05-01

    Application of clinical digital medical imaging has raised many tough issues to tackle, such as data storage, management, and information sharing. Here we investigated a mobile phone based medical image management system which is capable of achieving personal medical imaging information storage, management and comprehensive health information analysis. The technologies related to the management system spanning the wireless transmission technology, the technical capabilities of phone in mobile health care and management of mobile medical database were discussed. Taking medical infrared images transmission between phone and computer as an example, the working principle of the present system was demonstrated.

  16. A Pilot Project – From Illiteracy to Computer Literacy: Teaching and Learning Using Information Technology

    Directory of Open Access Journals (Sweden)

    Mohamad Adnan Al-Alaoui

    2008-09-01

    Full Text Available This paper addresses the use of information and communication technologies, ICT or IT for brevity, to combat illiteracy and move participants directly from illiteracy to computer literacy. The resulting assistive technology and instructional software and hardware can be employed to speed up literacy programs and make them more attractive and effective. The approach provides an interactive, self-paced, autonomous and entertaining learning experience, eases entry and exit in and out of the program, and permits monitoring and updating progress status. The hallmark of the proposed approach is the integration of speech and handwriting recognition, as well as audio and visual aids into the flow.

  17. Information Technology Service Management with Cloud Computing Approach to Improve Administration System and Online Learning Performance

    Directory of Open Access Journals (Sweden)

    Wilianto Wilianto

    2015-10-01

    Full Text Available This work discusses the development of information technology service management using cloud computing approach to improve the performance of administration system and online learning at STMIK IBBI Medan, Indonesia. The network topology is modeled and simulated for system administration and online learning. The same network topology is developed in cloud computing using Amazon AWS architecture. The model is designed and modeled using Riverbed Academic Edition Modeler to obtain values of the parameters: delay, load, CPU utilization, and throughput. The simu- lation results are the following. For network topology 1, without cloud computing, the average delay is 54  ms, load 110 000 bits/s, CPU utilization 1.1%, and throughput 440  bits/s.  With  cloud  computing,  the  average  delay  is 45 ms,  load  2 800  bits/s,  CPU  utilization  0.03%,  and throughput 540 bits/s. For network topology 2, without cloud computing, the average delay is 39  ms, load 3 500 bits/s, CPU utilization 0.02%, and throughput database server 1 400 bits/s. With cloud computing, the average delay is 26 ms, load 5 400 bits/s, CPU utilization email server 0.0001%, FTP server 0.001%, HTTP server 0.0002%, throughput email server 85 bits/s, FTP    server 100 bits/sec, and HTTP server 95  bits/s.  Thus,  the  delay, the load, and the CPU utilization decrease; but,  the throughput increases. Information technology service management with cloud computing approach has better performance.

  18. International Conference on Modern Mathematical Methods and High Performance Computing in Science and Technology

    CERN Document Server

    Srivastava, HM; Venturino, Ezio; Resch, Michael; Gupta, Vijay

    2016-01-01

    The book discusses important results in modern mathematical models and high performance computing, such as applied operations research, simulation of operations, statistical modeling and applications, invisibility regions and regular meta-materials, unmanned vehicles, modern radar techniques/SAR imaging, satellite remote sensing, coding, and robotic systems. Furthermore, it is valuable as a reference work and as a basis for further study and research. All contributing authors are respected academicians, scientists and researchers from around the globe. All the papers were presented at the international conference on Modern Mathematical Methods and High Performance Computing in Science & Technology (M3HPCST 2015), held at Raj Kumar Goel Institute of Technology, Ghaziabad, India, from 27–29 December 2015, and peer-reviewed by international experts. The conference provided an exceptional platform for leading researchers, academicians, developers, engineers and technocrats from a broad range of disciplines ...

  19. Use of Computer-Assisted Technologies (CAT) to Enhance Social, Communicative, and Language Development in Children with Autism Spectrum Disorders

    Science.gov (United States)

    Ploog, Bertram O.; Scharf, Alexa; Nelson, DeShawn; Brooks, Patricia J.

    2013-01-01

    Major advances in multimedia computer technology over the past decades have made sophisticated computer games readily available to the public. This, combined with the observation that most children, including those with autism spectrum disorders (ASD), show an affinity to computers, has led researchers to recognize the potential of computer…

  20. The Agony and the Ecstasy of Adult Learning: Faculty Learning Computer Technology. What Lessons Can We Learn from These Experiences?

    Science.gov (United States)

    Kasworm, Carol E.

    Three years of helping faculty members at a state university learn computing technology yielded the following lessons: (1) for faculty members, the ownership of a computer is an emotional event during which computers are viewed successively as glorified typewriters, status symbols, and tools; (2) even to highly knowledgeable individuals, learning…