WorldWideScience

Sample records for technology keywords computer

  1. Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Yogesh K. Gedam,

    2014-07-01

    Full Text Available As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. This significant drawback makes existing techniques unsuitable in cloud computing as it is greatly affect system usability, rendering user searching experiences very frustrating and system efficiency very low. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud while maintaining keyword privacy. In our solution, we exploit edit distance to quantify keyword similarity and develop new advanced technique on constructing fuzzy keyword sets which greatly reduces the storage and representation overheads. In this way, we show that our proposed solution is secure and privacy preserving, while realizing the goal of fuzzy keyword search.

  2. Technology, Pedagogy and On line materials: Keywords in developing On line Education

    DEFF Research Database (Denmark)

    Georgsen, Marianne; Bennedsen, Jens

    2003-01-01

    Quality techniques to support their efforts. In order to ensure the highest experience has shown that it is useful for teachers to have tools and teaching, lecturers are instrumental in the development process and and mutually interdependent. When it comes to developing flexible ICT-supported one......, meaning that technology itself and the use of technology are are interrelated relationship between technology and the use of technology s a dialectic are culturally and contextually situated activities. Furthermore, the and teaching is characterized by the fact that learning and teaching The development...... of ICT-based learning and are presented. Two empirical cases are described, and lessons learned from the project .(learned in a pedagogical and organisational development project (Flexnet teaching and learning. The model is developed on the basis of lessons presents a model for planning and developing...

  3. Cloud Computing Technologies

    Directory of Open Access Journals (Sweden)

    Sean Carlin

    2012-06-01

    Full Text Available This paper outlines the key characteristics that cloud computing technologies possess and illustrates the cloud computing stack containing the three essential services (SaaS, PaaS and IaaS that have come to define the technology and its delivery model. The underlying virtualization technologies that make cloud computing possible are also identified and explained. The various challenges that face cloud computing technologies today are investigated and discussed. The future of cloud computing technologies along with its various applications and trends are also explored, giving a brief outlook of where and how the technology will progress into the future.

  4. Effective Approaches For Extraction Of Keywords

    Directory of Open Access Journals (Sweden)

    Jasmeen Kaur

    2010-11-01

    Full Text Available Keywords are index terms that contain most important information. Automatic keyword extraction is the task to identify a small set of words , keyphrases or keywords from a document that can describe the meaning of document. Keyword extraction is considered as core technology of all automatic processing for text materials. In this paper, a Survey of Keyword Extraction techniques have been presented that can be applied to extract effective keywords that uniquely identify a document.

  5. Computational color technology

    CERN Document Server

    Kang, Henry R

    2006-01-01

    Henry Kang provides the fundamental color principles and mathematical tools to prepare the reader for a new era of color reproduction, and for subsequent applications in multispectral imaging, medical imaging, remote sensing, and machine vision. This book is intended to bridge the gap between color science and computational color technology, putting color adaptation, color constancy, color transforms, color display, and color rendition in the domain of vector-matrix representations and theories. Computational Color Technology deals with color digital images on the spectral level using vector-m

  6. Computer architecture technology trends

    CERN Document Server

    1991-01-01

    Please note this is a Short Discount publication. This year's edition of Computer Architecture Technology Trends analyses the trends which are taking place in the architecture of computing systems today. Due to the sheer number of different applications to which computers are being applied, there seems no end to the different adoptions which proliferate. There are, however, some underlying trends which appear. Decision makers should be aware of these trends when specifying architectures, particularly for future applications. This report is fully revised and updated and provides insight in

  7. Computer Science and Technology Board

    Energy Technology Data Exchange (ETDEWEB)

    Blumenthal, M.S.

    1990-01-01

    The Computer Science and Technology Board (CSTB) meets three times a year to consider scientific and policy issues in computer science as well as relevant problems in associated technologies. The objectives of the Board include: initiating studies involving computer science and technology as a critical national resource; responding to requests from the government, nonprofit foundations, and industry for advice on computer science and technology; promoting the health of the technology and other fields of pure and applied science and technology; and providing a base of expertise within the NRC in the area of computer science and technology.

  8. Keyword Search in Databases

    CERN Document Server

    Yu, Jeffrey Xu; Chang, Lijun

    2009-01-01

    It has become highly desirable to provide users with flexible ways to query/search information over databases as simple as keyword search like Google search. This book surveys the recent developments on keyword search over databases, and focuses on finding structural information among objects in a database using a set of keywords. Such structural information to be returned can be either trees or subgraphs representing how the objects, that contain the required keywords, are interconnected in a relational database or in an XML database. The structural keyword search is completely different from

  9. CLOUD COMPUTING TECHNOLOGY TRENDS

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-05-01

    Full Text Available Cloud computing has been a tremendous innovation, through which applications became available online, accessible through an Internet connection and using any computing device (computer, smartphone or tablet. According to one of the most recent studies conducted in 2012 by Everest Group and Cloud Connect, 57% of companies said they already use SaaS application (Software as a Service, and 38% reported using standard tools PaaS (Platform as a Service. However, in the most cases, the users of these solutions highlighted the fact that one of the main obstacles in the development of this technology is the fact that, in cloud, the application is not available without an Internet connection. The new challenge of the cloud system has become now the offline, specifically accessing SaaS applications without being connected to the Internet. This topic is directly related to user productivity within companies as productivity growth is one of the key promises of cloud computing system applications transformation. The aim of this paper is the presentation of some important aspects related to the offline cloud system and regulatory trends in the European Union (EU.

  10. The Mnemonic Keyword Method.

    Science.gov (United States)

    Pressley, Michael; And Others

    1982-01-01

    Available experimental evidence is reviewed concerning the keyword method, a two-stage procedure for remembering materials having an associative component. The review examines subjects' memory for definitions, given vocabulary words; subjects' learning of other aspects of vocabulary, given definitions; group-administered keyword studies; and…

  11. Computer science and technologies

    Energy Technology Data Exchange (ETDEWEB)

    Kitagawa, T.

    1988-01-01

    This volume aims to provide up-to-date information on recent research and development in computer science and technology in Japan. In view of the rapid developments in these fields and the urgent demand for more detailed information about Japanese activities and achievements, it has been decided to concentrate on only a few selected topics in each volume. The topics covered will change each year so as to obtain adequate coverage of a broad range of activities over a period of a few years. This edition should not only contribute to the international understanding of technical developments in Japan, but also shed light on the cultural background to these theoretical and practical developments.

  12. Searching Databases with Keywords

    Institute of Scientific and Technical Information of China (English)

    Shan Wang; Kun-Long Zhang

    2005-01-01

    Traditionally, SQL query language is used to search the data in databases. However, it is inappropriate for end-users, since it is complex and hard to learn. It is the need of end-user, searching in databases with keywords, like in web search engines. This paper presents a survey of work on keyword search in databases. It also includes a brief introduction to the SEEKER system which has been developed.

  13. Computer Viruses. Technology Update.

    Science.gov (United States)

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  14. [Earth Science Technology Office's Computational Technologies Project

    Science.gov (United States)

    Fischer, James (Technical Monitor); Merkey, Phillip

    2005-01-01

    This grant supported the effort to characterize the problem domain of the Earth Science Technology Office's Computational Technologies Project, to engage the Beowulf Cluster Computing Community as well as the High Performance Computing Research Community so that we can predict the applicability of said technologies to the scientific community represented by the CT project and formulate long term strategies to provide the computational resources necessary to attain the anticipated scientific objectives of the CT project. Specifically, the goal of the evaluation effort is to use the information gathered over the course of the Round-3 investigations to quantify the trends in scientific expectations, the algorithmic requirements and capabilities of high-performance computers to satisfy this anticipated need.

  15. Collective spatial keyword querying

    DEFF Research Database (Denmark)

    Cao, Xin; Cong, Gao; Jensen, Christian S.;

    2011-01-01

    With the proliferation of geo-positioning and geo-tagging, spatial web objects that possess both a geographical location and a textual description are gaining in prevalence, and spatial keyword queries that exploit both location and textual description are gaining in prominence. However......, the queries studied so far generally focus on finding individual objects that each satisfy a query rather than finding groups of objects where the objects in a group collectively satisfy a query. We define the problem of retrieving a group of spatial web objects such that the group's keywords cover the query...

  16. Moving Spatial Keyword Queries

    DEFF Research Database (Denmark)

    Wu, Dingming; Yiu, Man Lung; Jensen, Christian S.

    2013-01-01

    Web users and content are increasingly being geo-positioned. This development gives prominence to spatial keyword queries, which involve both the locations and textual descriptions of content. We study the efficient processing of continuously moving top-k spatial keyword (MkSK) queries over spatial...... text data. State-of-the-art solutions for moving queries employ safe zones that guarantee the validity of reported results as long as the user remains within the safe zone associated with a result. However, existing safe-zone methods focus solely on spatial locations and ignore text relevancy. We...

  17. Understanding computer and information technology

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-15

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  18. Computer Technology and Nursing Education.

    Science.gov (United States)

    Southern Council on Collegiate Education for Nursing, Atlanta, GA.

    The influences of computer technology on college nursing education programs and health care delivery systems are discussed in eight papers. The use of computers is considered, with attention to clinical care, nursing education and continuing education, administration, and research. Attention is also directed to basic computer terminology, computer…

  19. Spatial Keyword Querying

    DEFF Research Database (Denmark)

    Cao, Xin; Chen, Lisi; Cong, Gao;

    2012-01-01

    The web is increasingly being used by mobile users. In addition, it is increasingly becoming possible to accurately geo-position mobile users and web content. This development gives prominence to spatial web data management. Specifically, a spatial keyword query takes a user location and user-sup...... different kinds of functionality as well as the ideas underlying their definition....

  20. Spatial Keyword Query Processing

    DEFF Research Database (Denmark)

    Chen, Lisi; Jensen, Christian S.; Wu, Dingming

    2013-01-01

    an all-around survey of 12 state- of-the-art geo-textual indices. We propose a benchmark that en- ables the comparison of the spatial keyword query performance. We also report on the findings obtained when applying the bench- mark to the indices, thus uncovering new insights that may guide index...

  1. Computers: Educational Technology Paradox?

    Science.gov (United States)

    Hashim, Hajah Rugayah Hj.; Mustapha, Wan Narita

    2005-01-01

    As we move further into the new millennium, the need to involve and adapt learners with new technology have been the main aim of many institutions of higher learning in Malaysia. The involvement of the government in huge technology-based projects like the Multimedia Super Corridor Highway (MSC) and one of its flagships, the Smart Schools have…

  2. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  3. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  4. PTO: The New Keyword

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ On November 5, the State Council made public the new paid-time-off (PTO) regulations in order to get some feedback. As a result, "PTO"has become the most searched keyword in China;shortly after the announcement more than 140,000 people had participated in a survey on Sina.com, with nearly 60% showing their support of the new policies.

  5. Computer Technology for Industry

    Science.gov (United States)

    1982-01-01

    Shell Oil Company used a COSMIC program, called VISCEL to insure the accuracy of the company's new computer code for analyzing polymers, and chemical compounds. Shell reported that there were no other programs available that could provide the necessary calculations. Shell produces chemicals for plastic products used in the manufacture of automobiles, housewares, appliances, film, textiles, electronic equipment and furniture.

  6. Precision and Recall in Title Keyword Searches.

    Science.gov (United States)

    McJunkin, Monica Cahill

    This study examines precision and recall for title and keyword searches performed in the "FirstSearch" WorldCat database when keywords are used with and without adjacency of terms specified. A random sample of 68 titles in economics were searched in the OCLC (Online Computer Library Center) Online Union Catalog in order to obtain their…

  7. Ubiquitous Computing Technologies in Education

    Science.gov (United States)

    Hwang, Gwo-Jen; Wu, Ting-Ting; Chen, Yen-Jung

    2007-01-01

    The prosperous development of wireless communication and sensor technologies has attracted the attention of researchers from both computer and education fields. Various investigations have been made for applying the new technologies to education purposes, such that more active and adaptive learning activities can be conducted in the real world.…

  8. Contents, Abstracts and Keywords

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Transnationalism and Its Theoretical Contributions…… Ding Yueya(1) Abstract: The theory of transnationalism and its development in past twenty years brings great contributions to the studies of the immigration, transnation and transculture. The paper first presents the origin of transnationalism and its definition; then, based on the review of literature relevant, illustrates three core concepts of transnationalism. transnational practices, transnational social space, and transnational identity; finally, discovers the contributions of transnationalism which mean the innovational influence of its logic, perspectives, structure, and method on the academia. Keywords. transnationalism; transnational practices; transnational social space; transnational identity.

  9. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  10. Standardization of Keyword Search Mode

    Science.gov (United States)

    Su, Di

    2010-01-01

    In spite of its popularity, keyword search mode has not been standardized. Though information professionals are quick to adapt to various presentations of keyword search mode, novice end-users may find keyword search confusing. This article compares keyword search mode in some major reference databases and calls for standardization. (Contains 3…

  11. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  12. Contents, Abstracts and Keywords

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    The Social Competition and the Construction of Ethnic Group: A Refection of Western Theory about Resource Competition Guan Kai(1) Abstract: The theory about resource competition claims that ethnic group, as a symbol, is a kind of toot in the social competition, and that on certain social conditions, people can be organized by ethnic group to strive for social resource, hence the boundary among ethnic groups is drawn. So the need of social competition and the strategy of individual and collectivity to meet it becomes the basic power to construct ethnic group. The paper reviews the origin and development of the theory about resource competition of ethnic group, and the relative cases; on the basis of the above, responds to the theory and analyzes its limitation. At the same time, the paper also tries to introduces a new variable--state--to the theory, that is to say, add a viewpoints of state in the theory about resource competition whose focus is on the society, and discovers the important role of state which means a competition coordinator and its function and effect in the construction of ethnic group. Keywords : resource competition; ethnic group ; state; construction of ethnic group ; competition of ethnic group.

  13. Hybrid Keyword Search Auctions

    CERN Document Server

    Goel, Ashish

    2008-01-01

    Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1) It takes into account the risk characteristics of the advertisers. 2) For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, the hybrid auction can result in significantly higher revenue. 3) An advertiser who believes that its click-probability is much higher than the auctioneer's es...

  14. Computer technology and computer programming research and strategies

    CERN Document Server

    Antonakos, James L

    2011-01-01

    Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

  15. Cooling Technology for Electronic Computers

    Science.gov (United States)

    Nakayama, Wataru

    The rapid growth of data processing speed in computers has been sustained by the advances in cooling technology. This article first presents a review of the published data of heat loads in recent Japanese large-scale computers. The survey indicates that, since around 1980, the high-level integration of microelectronic circuits has brought about almost four fold increase in the power dissipation from logic chips. The integration also has invited the evolutions of multichip modules and new schemes of electronic interconnections. Forced convection air-cooling and liquid cooling coupled with thermal connectors are discussed with reference to the designs employed in actual computers. More advanced cooling schemes are also discussed. Finally, the importance of thermal environmental control of computer rooms is emphasized.

  16. Hybrid keyword search auctions

    KAUST Repository

    Goel, Ashish

    2009-01-01

    Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1. We show that risk-seeking advertisers will choose only a per-impression bid whereas risk-averse advertisers will choose only a per-click bid, and argue that both kind of advertisers arise naturally. Hence, the ability to bid in a hybrid fashion is important to account for the risk characteristics of the advertisers. 2. For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, we show that having the extra information from the advertisers in the form of a per-impression bid can result in significantly higher revenue. 3. An advertiser who believes that its click-probability is much higher than the auctioneer\\'s estimate can use per-impression bids to correct the auctioneer\\'s prior without incurring any extra cost. 4. The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies to deal with the uncertainty in the click-probability using the same basic auction. The per-click and per-impression bidding schemes can only be used to implement two extreme cases of these strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction. The

  17. Infinite possibilities: Computational structures technology

    Science.gov (United States)

    Beam, Sherilee F.

    1994-01-01

    Computational Fluid Dynamics (or CFD) methods are very familiar to the research community. Even the general public has had some exposure to CFD images, primarily through the news media. However, very little attention has been paid to CST--Computational Structures Technology. Yet, no important design can be completed without it. During the first half of this century, researchers only dreamed of designing and building structures on a computer. Today their dreams have become practical realities as computational methods are used in all phases of design, fabrication and testing of engineering systems. Increasingly complex structures can now be built in even shorter periods of time. Over the past four decades, computer technology has been developing, and early finite element methods have grown from small in-house programs to numerous commercial software programs. When coupled with advanced computing systems, they help engineers make dramatic leaps in designing and testing concepts. The goals of CST include: predicting how a structure will behave under actual operating conditions; designing and complementing other experiments conducted on a structure; investigating microstructural damage or chaotic, unpredictable behavior; helping material developers in improving material systems; and being a useful tool in design systems optimization and sensitivity techniques. Applying CST to a structure problem requires five steps: (1) observe the specific problem; (2) develop a computational model for numerical simulation; (3) develop and assemble software and hardware for running the codes; (4) post-process and interpret the results; and (5) use the model to analyze and design the actual structure. Researchers in both industry and academia continue to make significant contributions to advance this technology with improvements in software, collaborative computing environments and supercomputing systems. As these environments and systems evolve, computational structures technology will

  18. Infinite possibilities: Computational structures technology

    Science.gov (United States)

    Beam, Sherilee F.

    1994-12-01

    Computational Fluid Dynamics (or CFD) methods are very familiar to the research community. Even the general public has had some exposure to CFD images, primarily through the news media. However, very little attention has been paid to CST--Computational Structures Technology. Yet, no important design can be completed without it. During the first half of this century, researchers only dreamed of designing and building structures on a computer. Today their dreams have become practical realities as computational methods are used in all phases of design, fabrication and testing of engineering systems. Increasingly complex structures can now be built in even shorter periods of time. Over the past four decades, computer technology has been developing, and early finite element methods have grown from small in-house programs to numerous commercial software programs. When coupled with advanced computing systems, they help engineers make dramatic leaps in designing and testing concepts. The goals of CST include: predicting how a structure will behave under actual operating conditions; designing and complementing other experiments conducted on a structure; investigating microstructural damage or chaotic, unpredictable behavior; helping material developers in improving material systems; and being a useful tool in design systems optimization and sensitivity techniques. Applying CST to a structure problem requires five steps: (1) observe the specific problem; (2) develop a computational model for numerical simulation; (3) develop and assemble software and hardware for running the codes; (4) post-process and interpret the results; and (5) use the model to analyze and design the actual structure. Researchers in both industry and academia continue to make significant contributions to advance this technology with improvements in software, collaborative computing environments and supercomputing systems. As these environments and systems evolve, computational structures technology will

  19. Military engine computational structures technology

    Science.gov (United States)

    Thomson, Daniel E.

    1992-01-01

    Integrated High Performance Turbine Engine Technology Initiative (IHPTET) goals require a strong analytical base. Effective analysis of composite materials is critical to life analysis and structural optimization. Accurate life prediction for all material systems is critical. User friendly systems are also desirable. Post processing of results is very important. The IHPTET goal is to double turbine engine propulsion capability by the year 2003. Fifty percent of the goal will come from advanced materials and structures, the other 50 percent will come from increasing performance. Computer programs are listed.

  20. Application of keyword extraction technology in Salar literature database%关键词提取技术在撒拉族文献数据库的应用

    Institute of Scientific and Technical Information of China (English)

    赵建飞; 段新文; 安守春

    2013-01-01

    The keyword extraction work is often done in the literature management. The artificial extraction may cause a complex process,and the work burden is heavy. A method of keyword pre-extraction is introduced,which is mainly divided into three steps:the image recognition and troubleshooting are conducted first by OCR system;the word frequency technology is used to extract the word frequency and highest relevance keywords as alternative keywords;and then through man-made reading manner,the accurate extraction of keywords is achieved in accordance with a certain keyword manual extraction rule.%在文献管理和研究中经常会做关键词提取的工作,通过人工的方式进行提取过程繁杂,工程量极大,因此引入一种关键词欲提取的方式,其过程主要采用以下三个步骤:先通过OCR系统对图片进行识别、排错;再通过词频技术,来提取词频及关联性最高的关键词,将其作为备选关键词;然后通过人为阅读的方式,按照一定的关键词人工提取规则进行关键词的精确提取。结果表明,该方法取得了较好的效果。

  1. Keywords

    African Journals Online (AJOL)

    Femi

    a health facility is a determinant of patient's choice of provider and willingness to pay for the services. This paper discusses ... Journal of Community Medicine and Primary Health Care. 28(1) 25-30 ..... on Health Workers' Training. Daily Trust.

  2. Keywords

    African Journals Online (AJOL)

    Femi

    Introduction: Most patients in Rivers State seek health care from primary health centres which recently had ... Outcome measured were patients' satisfaction with doctors and nurses' ..... to subject selection, measurement instrument and. 15.

  3. Keywords

    African Journals Online (AJOL)

    Femi

    found to be as long as over 2 hours in Malaysia, to about 42.89 ... guide the Department's management of the PHC. The specific ... The required sample size was calculated using the ... flow analysis chart was given to the parents or ..... health resources to improve service delivery and ... Waiting Room Issues" (2012).

  4. Keywords

    African Journals Online (AJOL)

    Femi

    Background: Domestic Violence is a serious, preventable public health problem that affects millions of people. The abuse of women ... Conclusion: Prevalence of domestic violence in the studied group was high. ...... Violence in North India.

  5. Keywords

    African Journals Online (AJOL)

    Femi

    family planning methods is for men while 41.7% would communicate with their wives about the need for either partner to use family planning ... Journal of Community Medicine and Primary Health Care. ..... Nursing Clinics of North America.

  6. Keywords

    African Journals Online (AJOL)

    Femi

    Male gender and not taking alcohol regularly were significant ... adults in Lagos and the level of knowledge of harmful health effects of tobacco is low .... Footnote: All the students were unemployed and studying at the tertiary level of education.

  7. Keywords:

    African Journals Online (AJOL)

    Femi

    Methods: The study examined several aspects of diabetes-related knowledge, attitude and ... (39.6%) 10.1% and 2.8% knew that diabetes can present with fast breathing and abdominal pain respectively. ..... Pakistan and the other in Iran.

  8. KEYWORDS'

    African Journals Online (AJOL)

    2003-05-25

    May 25, 2003 ... ... propensity to spread to healthcare workers and household members, .... phase, by hyaline membranes, interstitial and ... Respiratory protection and barrier nursing are advised for ... first time in the history of the World Health.

  9. Access to Periodicals: Search Key versus Keyword.

    Science.gov (United States)

    Golden, Susan U.; Golden, Gary A.

    1983-01-01

    Retrievability of titles of 152 periodicals were compared in a fixed-length algorithmic search (Library Computer System) and a keyword search (Washington Library Network) to determine which type of search algorithm is more successful with titles of varying lengths. Three references and a list of English language stopwords are appended. (EJS)

  10. Use of computer technology by the elderly

    OpenAIRE

    Akkan, Sultan

    1993-01-01

    The information technology that is available now has been developed for other populations, such as the general public, the business community, health care organizations, or the handicapped. However, much of it can be adapted to fit the needs, desires and capabilities of the elderly and computer technology can be much "friendlier" for the elderly in both a technological and a social sense. This study examines the elderly-computer technology interface. State-of -the-art co...

  11. KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Liang; ZOU Fu-tai; MA Fan-yuan

    2005-01-01

    Distributed inverted index technology is used in many peer-to-peer (P2P) systems to help find rapidly document in -set search system for peer-to-peer networkswhich a given word appears. Distributed inverted index by keywords may incur significant bandwidth for executing more complicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index,since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously unacceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites' queries logs to improve performance of KSS system.Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query.

  12. An Extended Keyword Extraction Method

    Science.gov (United States)

    Hong, Bao; Zhen, Deng

    Among numerous Chinese keyword extraction methods, Chinese characteristics were shortly considered. This phenomenon going against the precision enhancement of the Chinese keyword extraction. An extended term frequency based method(Extended TF) is proposed in this paper which combined Chinese linguistic characteristics with basic TF method. Unary, binary and ternary grammars for the candidate keyword extraction as well as other linguistic features were all taken into account. The method establishes classification model using support vector machine. Tests show that the proposed extraction method improved key words precision and recall rate significantly. We applied the key words extracted by the extended TF method into the text file classification. Results show that the key words extracted by the proposed method contributed greatly to raising the precision of text file classification.

  13. Computer-Based Technologies in Dentistry: Types and Applications

    Directory of Open Access Journals (Sweden)

    Rajaa Mahdi Musawi

    2016-10-01

    Full Text Available During dental education, dental students learn how to examine patients, make diagnosis, plan treatment and perform dental procedures perfectly and efficiently. However, progresses in computer-based technologies including virtual reality (VR simulators, augmented reality (AR and computer aided design/computer aided manufacturing (CAD/CAM systems have resulted in new modalities for instruction and practice of dentistry. Virtual reality dental simulators enable repeated, objective and assessable practice in various controlled situations. Superimposition of three-dimensional (3D virtual images on actual images in AR allows surgeons to simultaneously visualize the surgical site and superimpose informative 3D images of invisible regions on the surgical site to serve as a guide. The use of CAD/CAM systems for designing and manufacturing of dental appliances and prostheses has been well established.This article reviews computer-based technologies, their application in dentistry and their potentials and limitations in promoting dental education, training and practice. Practitioners will be able to choose from a broader spectrum of options in their field of practice by becoming familiar with new modalities of training and practice.Keywords: Virtual Reality Exposure Therapy; Immersion; Computer-Aided Design; Dentistry; Education

  14. Computer Technology-Infused Learning Enhancement

    Science.gov (United States)

    Keengwe, Jared; Anyanwu, Longy O.

    2007-01-01

    The purpose of the study was to determine students' perception of instructional integration of computer technology to improve learning. Two key questions were investigated in this study: (a) What is the students' perception of faculty integration of computer technology into classroom instruction? (b) To what extent does the students' perception of…

  15. College Students' Attitude towards Computer Technology

    Science.gov (United States)

    Njagi, K. O.; Havice, W. L.

    2011-01-01

    Recent advances in the contemporary world, especially in the area of computer technology, have heralded the development and implementation of new and innovative teaching strategies and particularly with the Internet revolution. This study assessed students' attitude towards computer technology. Specifically, the study assessed differences in…

  16. Theory-Guided Technology in Computer Science.

    Science.gov (United States)

    Ben-Ari, Mordechai

    2001-01-01

    Examines the history of major achievements in computer science as portrayed by winners of the prestigious Turing award and identifies a possibly unique activity called Theory-Guided Technology (TGT). Researchers develop TGT by using theoretical results to create practical technology. Discusses reasons why TGT is practical in computer science and…

  17. Advanced Hybrid Computer Systems. Software Technology.

    Science.gov (United States)

    This software technology final report evaluates advances made in Advanced Hybrid Computer System software technology . The report describes what...automatic patching software is available as well as which analog/hybrid programming languages would be most feasible for the Advanced Hybrid Computer...compiler software . The problem of how software would interface with the hybrid system is also presented.

  18. Theory-Guided Technology in Computer Science.

    Science.gov (United States)

    Ben-Ari, Mordechai

    2001-01-01

    Examines the history of major achievements in computer science as portrayed by winners of the prestigious Turing award and identifies a possibly unique activity called Theory-Guided Technology (TGT). Researchers develop TGT by using theoretical results to create practical technology. Discusses reasons why TGT is practical in computer science and…

  19. A Technology Assessment of Personal Computers. Vol. II: Personal Computer Technology, Users, and Uses.

    Science.gov (United States)

    Nilles, Jack M.

    This volume reports on the initial phase of a technology assessment of personal computers. First, technological developments that will influence the rate of diffusion of personal computer technology among the general populace are examined. Then the probable market for personal computers is estimated and analyzed on a functional basis, segregating…

  20. Future Computing Technology (2/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the second day of the Future Computing Technology series, we will talk about ubiquitous computing. From smart watches through mobile devices to virtual reality, computing devices surround us, and innovative new technologies are introduces every day. We will briefly explore how this propagation might continue, how computers can take ove...

  1. MUSICAL-COMPUTER TECHNOLOGY: THE LABORATORY

    OpenAIRE

    Gorbunova Irina B.

    2012-01-01

    The article deals with musically-computer technology in the educational system on example of the Educational and Methodical Laboratory Music & Computer Technologies at the Herzen State Pedagogical University of Russia, St. Petersburg. Interdisciplinary field of professional activities relates to the creation and application of specialized music software and hardware tools and the knowledges in music and informatics. A realization of the concept of musical-computer education in preparing music...

  2. SLJ Special Section: Computer Technology and Libraries.

    Science.gov (United States)

    School Library Journal, 1984

    1984-01-01

    This 5-article section provides an annotated bibliography of 39 books about computer technology; describes peripheral equipment essential for building computer systems; suggests an approach to software evaluation and selection; describes the implementation of a computer program for elementary/secondary students and teachers; and reviews 34…

  3. Art Therapists and Computer Technology

    Science.gov (United States)

    Peterson, Brent C.; Stovall, Kay; Elkins, David E.; Parker-Bell, Barbara

    2005-01-01

    The purpose of this study was to understand the impact of technology on art therapists by exploring how art therapists own and use technology and to determine barriers to ownership and use. A survey was conducted at the 2002 annual conference of the American Art Therapy Association in Washington, DC. Of the 250 surveys distributed, 195 were…

  4. Lighting Computer Programs in Lighting Technology

    OpenAIRE

    Ekren, Nazmi; Dursun, Bahtiyar; Ercan AYKUT

    2008-01-01

    It is well known that the computer in lighting technology is a vital component for lighting designers. Lighting computer programs are preferred in preparing architectural projects in lighting techniques, especially in lighting calculations. Lighting computer programs, which arise with the aim of helping lighting designers, gain more interest day by day. The most important property of lighting computer programs is the ability to enable the simulation of lighting projects without requiring any ...

  5. Keywords in musical free improvisation

    DEFF Research Database (Denmark)

    Bergstrøm-Nielsen, Carl

    2017-01-01

    This article presents some keywords and concepts concerning free improvised music and its recent developments drawing from ongoing bibliographical research. A radical pluralism stems from musicians' backgrounds and the mixtures and fusions of styles and idioms resulting from these mixtures....... Seemingly very different "performance-driven" and "playdriven" attitudes exist, even among musicians who share the practice of performing at concerts. New models of musical analysis aiming specifically at free improvised music provide strategical observations of interaction and structure....

  6. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  7. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  8. Computer Programming Projects in Technology Courses.

    Science.gov (United States)

    Thomas, Charles R.

    1985-01-01

    Discusses programming projects in applied technology courses, examining documentation, formal reports, and implementation. Includes recommendations based on experience with a sophomore machine elements course which provided computers for problem solving exercises. (DH)

  9. Optical technologies for computational intelligence

    Science.gov (United States)

    Pavlov, Alexander V.

    2001-11-01

    Optics has a number of deep analogies with main principles of Computational Intelligence. We can see strong analogies between basic optical phenomena, used in Fourier-holography, and mathematical foundations of Fuzzy Set Theory. Also, analogies between optical holography technique and principles of Neural Networks Paradigm can be seen. Progress in new holographic recording media with self-developing property leads to Evolutionary Computations holographic realization. Based on these analogies we review holographic techniques from two points of view: Fuzzy Logic and Fuzzy relations.

  10. Computer Technology in Construction Project Management

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhi

    2014-01-01

    Today, the network information has become a trend al of the industries have to face. For the construction project management, we must fuly master the use of computer information technology, mining its intrinsic value, so that it can promote the construction industry to meet the requirements of the times. This paper demonstrates the main application of computer technology in construction project management in a brief analysis.

  11. Computer technology forecast study for general aviation

    Science.gov (United States)

    Seacord, C. L.; Vaughn, D.

    1976-01-01

    A multi-year, multi-faceted program is underway to investigate and develop potential improvements in airframes, engines, and avionics for general aviation aircraft. The objective of this study was to assemble information that will allow the government to assess the trends in computer and computer/operator interface technology that may have application to general aviation in the 1980's and beyond. The current state of the art of computer hardware is assessed, technical developments in computer hardware are predicted, and nonaviation large volume users of computer hardware are identified.

  12. Computer simulation technology in inertial confinement (ICF)

    Energy Technology Data Exchange (ETDEWEB)

    Yabe, Takashi (Gunma Univ., Kiryu (Japan). Faculty of Engineering)

    1994-12-01

    Recent development of computational technologies in inertial confinement fusion (ICF) is reviewed with a special emphasis on hydrodynamic simulations. The CIP method developed for ICF simulations is one of the typical examples that are used in various fields of physics such as variety of computational fluid dynamics, astrophysics, laser applications, geophysics, and so on. (author).

  13. Computer science research and technology volume 3

    CERN Document Server

    Bauer, Janice P

    2011-01-01

    This book presents leading-edge research from across the globe in the field of computer science research, technology and applications. Each contribution has been carefully selected for inclusion based on the significance of the research to this fast-moving and diverse field. Some topics included are: network topology; agile programming; virtualization; and reconfigurable computing.

  14. Philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip; Soraker, Johnny Hartz

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions th

  15. Efficient Spatial Keyword Search in Trajectory Databases

    CERN Document Server

    Cong, Gao; Ooi, Beng Chin; Zhang, Dongxiang; Zhang, Meihui

    2012-01-01

    An increasing amount of trajectory data is being annotated with text descriptions to better capture the semantics associated with locations. The fusion of spatial locations and text descriptions in trajectories engenders a new type of top-$k$ queries that take into account both aspects. Each trajectory in consideration consists of a sequence of geo-spatial locations associated with text descriptions. Given a user location $\\lambda$ and a keyword set $\\psi$, a top-$k$ query returns $k$ trajectories whose text descriptions cover the keywords $\\psi$ and that have the shortest match distance. To the best of our knowledge, previous research on querying trajectory databases has focused on trajectory data without any text description, and no existing work has studied such kind of top-$k$ queries on trajectories. This paper proposes one novel method for efficiently computing top-$k$ trajectories. The method is developed based on a new hybrid index, cell-keyword conscious B$^+$-tree, denoted by \\cellbtree, which enabl...

  16. Technological Enhancements for Personal Computers

    Science.gov (United States)

    1992-03-01

    scenarios that represent some of what can be accomplished % ith personal computers. 20 D!STRIBUTION/ AVAILABILTY OF ABSTRACT 21 ABSTRACT SECURITY...not just the immediate usages . With few exceptions all of the options discussed here are available under the Desktop III contract. The new Desktop IV...Many users found them to be slow and unwieldy and consequentially they did not get the expected usage nor did they provide the advantages we find in

  17. Building Practice of ComputerAssistant Processing System for Massive Literature Keywords Indexing%用于海量文献关键词标引的计算机辅助加工系统构建实践*

    Institute of Scientific and Technical Information of China (English)

    杨贺; 杨奕虹; 吴广印; 林霄剑

    2013-01-01

      为缓解海量文献关键词标引的巨大压力,文章构建了用于海量文献关键词标引的计算机辅助加工系统,对标引数据预处理规范、自动标引核心工作区和人工标引校对平台进行了具体阐述。文章采用数据测试方法确定了自动标引软件,在单一软件不能满足标引要求后探索了多种机标结果后处理方式提升机标质量,最终由人工标引校对平台保证海量文献关键词标引质量的同时,将机标出现的问题和改进意见反馈给软件设计和词表维护,保证了计算机辅助加工系统的持续改进。%In order to all eviate the enormous pressure of the massive literature keywords indexing, the paper builds a computer assistant processing system for massive literature keywords indexing, and three modules are exposited, including Indexing data preprocessing specification, Automatic indexing core workspace and manual indexing proofreading system. The paper selects automatic indexing softwares by data testing, and discovers several combination modes to improve the quality of automatic indexing. The function of manual indexing proofreading system is designed to enhance the literature indexing quality and the whole system as well .

  18. MUSICAL-COMPUTER TECHNOLOGY: THE LABORATORY

    Directory of Open Access Journals (Sweden)

    Gorbunova Irina B.

    2012-12-01

    Full Text Available The article deals with musically-computer technology in the educational system on example of the Educational and Methodical Laboratory Music & Computer Technologies at the Herzen State Pedagogical University of Russia, St. Petersburg. Interdisciplinary field of professional activities relates to the creation and application of specialized music software and hardware tools and the knowledges in music and informatics. A realization of the concept of musical-computer education in preparing music teachers is through basic educational programs of vocational training, supplementary education, professional development of teachers and methodical support via Internet. In addition, the laboratory Music & Computer Technologies engaged in scientific activity: it is, above all, specialized researches in the field of pedagogy and international conferences.

  19. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  20. Imagined Affordance: Reconstructing a Keyword for Communication Theory

    Directory of Open Access Journals (Sweden)

    Peter Nagy

    2015-09-01

    Full Text Available In this essay, we reconstruct a keyword for communication—affordance. Affordance, adopted from ecological psychology, is now widely used in technology studies, yet the term lacks a clear definition. This is especially problematic for scholars grappling with how to theorize the relationship between technology and sociality for complex socio-technical systems such as machine-learning algorithms, pervasive computing, the Internet of Things, and other such “smart” innovations. Within technology studies, emerging theories of materiality, affect, and mediation all necessitate a richer and more nuanced definition for affordance than the field currently uses. To solve this, we develop the concept of imagined affordance. Imagined affordances emerge between users’ perceptions, attitudes, and expectations; between the materiality and functionality of technologies; and between the intentions and perceptions of designers. We use imagined affordance to evoke the importance of imagination in affordances—expectations for technology that are not fully realized in conscious, rational knowledge. We also use imagined affordance to distinguish our process-oriented, socio-technical definition of affordance from the “imagined” consensus of the field around a flimsier use of the term. We also use it in order to better capture the importance of mediation, materiality, and affect. We suggest that imagined affordance helps to theorize the duality of materiality and communication technology: namely, that people shape their media environments, perceive them, and have agency within them because of imagined affordances.

  1. Voice Technology Using Personal Computers.

    Science.gov (United States)

    1987-01-01

    PROGRA -.. NDC -A85 -AiSG 743 VOICE TECNOLOGY USING PERSONAL COMPUTE3SI(U) alit FORCE 212 INST OF TECH MRIGJ4T-PATTERSON RFB ON G L TALBOT 1987...Inline( $2E/$C6/$06/ Int24Err $Ol/$50/$89/$F8/$2E/$A2/ Int24ErrCode /$58/$BO/$OO/$89/$EC/$5D/$CF); - 150 - i..r - l. .. { Turbo: PUSH BP save...caller’s stack frame MOV BP,SP Set up this procedure’s stack frame PUSH BP ? Inline: MOV BYTE CS:[INT24Err],I Set INT24Err to True PUSH AX MOV AX,DI Get INT

  2. Future Computing Technology (3/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the third day of the Future Computing Technology series, we will touch on societal aspects of the future of computing. Our perception of computers may at time seem passive, but in reality we are a vital chain of the feedback loop. Human-computer interaction, innovative forms of computers, privacy, process automation, threats and medica...

  3. Ultimate computing. Biomolecular consciousness and nano Technology

    Energy Technology Data Exchange (ETDEWEB)

    Hameroff, S.R.

    1987-01-01

    The book advances the premise that the cytoskeleton is the cell's nervous system, the biological controller/computer. If indeed cytoskeletal dynamics in the nanoscale (billionth meter, billionth second) are the texture of intracellular information processing, emerging ''NanoTechnologies'' (scanning tunneling microscopy, Feynman machines, von Neumann replicators, etc.) should enable direct monitoring, decoding and interfacing between biological and technological information devices. This in turn could result in important biomedical applications and perhaps a merger of mind and machine: Ultimate Computing.

  4. Mathematics for engineering, technology and computing science

    CERN Document Server

    Martin, Hedley G

    1970-01-01

    Mathematics for Engineering, Technology and Computing Science is a text on mathematics for courses in engineering, technology, and computing science. It covers linear algebra, ordinary differential equations, and vector analysis, together with line and multiple integrals. This book consists of eight chapters and begins with a discussion on determinants and linear equations, with emphasis on how the value of a determinant is defined and how it may be obtained. Solution of linear equations and the dependence between linear equations are also considered. The next chapter introduces the reader to

  5. INDEXING WORKSHOP: HOW TO ASSIGN KEYWORDS

    Energy Technology Data Exchange (ETDEWEB)

    Sternberg, Virginia

    1979-09-01

    You have heard about issues surrounding indexing and retrieval of nuclear records and automation and micrographics of these records. Now we are going to get each of you involved in indexing and assigning keywords. The first part of this hands-on workshop will be a very basic, elementary step-by-step introduction, concentrating on how to assign keywords. It is a workshop for beginners, People who have never done it before. It is planned to demonstrate what an analyst has to do to index and assign keywords to a document. Then I will take some pages of a report and demonstrate how I choose keywords for it. Then each of you will have a chance to do the same thing with similar pages from another report. Then we will discuss the variations ln the keywords you individually assigned. There are many systems that can be used. In this particular workshop we will cover only a system of building your own keyword listing as you index your documents. We will be discussing keywords or descriptors or subject words, but first I want to point out a few other critical points about indexing. When developing an indexing project the most important thing to do first lS decide what elements you want to retrieve by. Whether you go into a large computer retrieval system or a small three-by-five card system, you have to decide in advance what you want to retrieve. Then you can go on from there. If you only need to search by equipment number or by purchase order or by contract number, then you can use a very simple retrieval system. But if you want to be able to retrieve a record by any combination of elements, then you have to consistently input these into your system. For example, if you want to be able to ask for the drawings of the piping in the secondary cooling system, level 3, manufactured by a certain vendor, then you must have put the information into the index by a retrieval file point, in advance. I want to stress that the time spent in deciding what has to be retrievable is never

  6. Existential Computer Anxiety and Changes in Computer Technology: What Past Research on Computer Anxiety Has Missed.

    Science.gov (United States)

    Worthington, Valerie L.; Zhao, Yong

    1999-01-01

    Proposes that the existing literature on computer anxiety has neglected to consider two issues: (1) that there is an existential element to computer anxiety, and (2) that computer technology has undergone historical changes that bring with them subsequent changes in the metaphors used to understand computers. (Contains 72 references.) (Author/LRW)

  7. Attribute-Based Proxy Re-Encryption with Keyword Search

    Science.gov (United States)

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257

  8. The Computer as Doorstop: Technology as Disempowerment.

    Science.gov (United States)

    Callister, Thomas A., Jr.; Dunne, Faith

    1992-01-01

    Efforts to replace teachers with technology have uniformly failed. Machines are only tools. Good classroom tools extend the teacher's power to create a rich learning environment. If the teacher perceives the tool as master or misconstrues its use, its potential will never be realized. Strategies for computer use must focus on purpose and derive…

  9. Competency Index. [Business/Computer Technologies Cluster.

    Science.gov (United States)

    Ohio State Univ., Columbus. Center on Education and Training for Employment.

    This index allows the user to scan the competencies under each title for the 28 subjects appropriate for use in a competency list for the 12 occupations within the business/computer technologies cluster. Titles of the 28 units are as follows: employability skills; professionalism; teamwork; professional and ethical standards; economic and business…

  10. Visualization According To Research Paper Keywords

    OpenAIRE

    Isenberg, Petra; Isenberg, Tobias; Sedlmair, Michael; Chen, Jian; Möller, Torsten

    2014-01-01

    To appear; International audience; We analyzed visualization paper keywords supplied for 4366 papers accepted to three main visualization conferences. We describe main keywords, topic areas, and 10-year historic trends from author-chosen keywords for papers published in the IEEE Visualization conference series (now called IEEE VIS) since 2004. Furthermore, we present the KeyVis Web application that allows visualization researchers to easily browse the 2600+ keywords used for IEEE VIS papers o...

  11. Future Computing Technology (1/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. Lecturer's short bio: Andrzej Nowak has 10 years of experience in computing technologies, primarily from CERN openlab and Intel. At CERN, he managed a research lab collaborating with Intel and was part of the openlab Chief Technology Office. Andrzej also worked closely and initiated projects with the private sector (e.g. HP and Go...

  12. Communication : the Digital World Keyword

    OpenAIRE

    2004-01-01

    In recent years we have become increasingly submerged by information. As Information Professionals we are called to help our users to cope with this wealth of content: it is not only a matter of quantity, it is a question of quality (improvement or obsolescence), and of rapid change of tools of selection and so on. We are discovering that technological improvements cannot be efficiently incorporated in the day by day professional activity without an appropriate context and a purpose built ...

  13. Hybrid Nanoelectronics: Future of Computer Technology

    Institute of Scientific and Technical Information of China (English)

    Wei Wang; Ming Liu; Andrew Hsu

    2006-01-01

    Nanotechnology may well prove to be the 21st century's new wave of scientific knowledge that transforms people's lives. Nanotechnology research activities are booming around the globe. This article reviews the recent progresses made on nanoelectronic research in US and China, and introduces several novel hybrid solutions specifically useful for future computer technology. These exciting new directions will lead to many future inventions, and have a huge impact to research communities and industries.

  14. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  15. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  16. Compiler Technology for Parallel Scientific Computation

    Directory of Open Access Journals (Sweden)

    Can Özturan

    1994-01-01

    Full Text Available There is a need for compiler technology that, given the source program, will generate efficient parallel codes for different architectures with minimal user involvement. Parallel computation is becoming indispensable in solving large-scale problems in science and engineering. Yet, the use of parallel computation is limited by the high costs of developing the needed software. To overcome this difficulty we advocate a comprehensive approach to the development of scalable architecture-independent software for scientific computation based on our experience with equational programming language (EPL. Our approach is based on a program decomposition, parallel code synthesis, and run-time support for parallel scientific computation. The program decomposition is guided by the source program annotations provided by the user. The synthesis of parallel code is based on configurations that describe the overall computation as a set of interacting components. Run-time support is provided by the compiler-generated code that redistributes computation and data during object program execution. The generated parallel code is optimized using techniques of data alignment, operator placement, wavefront determination, and memory optimization. In this article we discuss annotations, configurations, parallel code generation, and run-time support suitable for parallel programs written in the functional parallel programming language EPL and in Fortran.

  17. Reviews of computing technology: Object-oriented technology

    Energy Technology Data Exchange (ETDEWEB)

    Skeen, D.C.

    1993-03-01

    A useful metaphor in introducing object-oriented concepts is the idea of a computer hardware manufacturer assembling products from an existing stock of electronic parts. In this analogy, think of the parts as pieces of computer software and of the finished products as computer applications. Like its counterpart, the object is capable of performing its specific function in a wide variety of different applications. The advantages to assembling hardware using a set of prebuilt parts are obvious. The design process is greatly simplified in this scenario, since the designer needs only to carry the design down to the chip level, rather than to the transistor level. As a result, the designer is free to develop a more reliable and feature rich product. Also, since the component parts are reused in several different products, the parts can be made more robust and subjected to more rigorous testing than would be economically feasible for a part used in only one piece of equipment. Additionally, maintenance on the resulting systems is simplified because of the part-level consistency from one type of equipment to another. The remainder of this document introduces the techniques used to develop objects, the benefits of the technology, outstanding issues that remain with the technology, industry direction for the technology, and the impact that object-oriented technology is likely to have on the organization. While going through this material, the reader will find it useful to remember the parts analogy and to keep in mind that the overall purpose of object-oriented technology is to create software parts and to construct applications using those parts.

  18. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-01-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  19. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-09-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  20. Terascale Computing in Accelerator Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Kwok

    2002-08-21

    We have entered the age of ''terascale'' scientific computing. Processors and system architecture both continue to evolve; hundred-teraFLOP computers are expected in the next few years, and petaFLOP computers toward the end of this decade are conceivable. This ever-increasing power to solve previously intractable numerical problems benefits almost every field of science and engineering and is revolutionizing some of them, notably including accelerator physics and technology. At existing accelerators, it will help us optimize performance, expand operational parameter envelopes, and increase reliability. Design decisions for next-generation machines will be informed by unprecedented comprehensive and accurate modeling, as well as computer-aided engineering; all this will increase the likelihood that even their most advanced subsystems can be commissioned on time, within budget, and up to specifications. Advanced computing is also vital to developing new means of acceleration and exploring the behavior of beams under extreme conditions. With continued progress it will someday become reasonable to speak of a complete numerical model of all phenomena important to a particular accelerator.

  1. Automatic Keyword Extraction from Individual Documents

    Energy Technology Data Exchange (ETDEWEB)

    Rose, Stuart J.; Engel, David W.; Cramer, Nicholas O.; Cowley, Wendy E.

    2010-05-03

    This paper introduces a novel and domain-independent method for automatically extracting keywords, as sequences of one or more words, from individual documents. We describe the method’s configuration parameters and algorithm, and present an evaluation on a benchmark corpus of technical abstracts. We also present a method for generating lists of stop words for specific corpora and domains, and evaluate its ability to improve keyword extraction on the benchmark corpus. Finally, we apply our method of automatic keyword extraction to a corpus of news articles and define metrics for characterizing the exclusivity, essentiality, and generality of extracted keywords within a corpus.

  2. Energy management programs - computer technology, a tool

    Energy Technology Data Exchange (ETDEWEB)

    Perron, G

    1996-08-01

    Energy management systems were defined and reviewed, focusing on how the development in computer technology has impacted on the development of energy management systems. It was shown that the rise of micro-computer systems made it possible to create a tool that is well adapted to the urgent need for optimizing electromechanical systems to meet energy reduction criteria while still maintaining occupant comfort. Two case studies were cited to show the kind of savings realized by the different energy management systems installed. Besides managing energy, energy management systems can also help in detecting certain operating failures or irregularities in equipment configurations, monitoring and measuring energy consumption, as well as performing such peripherally related functions as gathering data about operating and space temperatures.

  3. Applications of computational intelligence in biomedical technology

    CERN Document Server

    Majernik, Jaroslav; Pancerz, Krzysztof; Zaitseva, Elena

    2016-01-01

    This book presents latest results and selected applications of Computational Intelligence in Biomedical Technologies. Most of contributions deal with problems of Biomedical and Medical Informatics, ranging from theoretical considerations to practical applications. Various aspects of development methods and algorithms in Biomedical and Medical Informatics as well as Algorithms for medical image processing, modeling methods are discussed. Individual contributions also cover medical decision making support, estimation of risks of treatments, reliability of medical systems, problems of practical clinical applications and many other topics  This book is intended for scientists interested in problems of Biomedical Technologies, for researchers and academic staff, for all dealing with Biomedical and Medical Informatics, as well as PhD students. Useful information is offered also to IT companies, developers of equipment and/or software for medicine and medical professionals.  .

  4. Improving student retention in computer engineering technology

    Science.gov (United States)

    Pierozinski, Russell Ivan

    The purpose of this research project was to improve student retention in the Computer Engineering Technology program at the Northern Alberta Institute of Technology by reducing the number of dropouts and increasing the graduation rate. This action research project utilized a mixed methods approach of a survey and face-to-face interviews. The participants were male and female, with a large majority ranging from 18 to 21 years of age. The research found that participants recognized their skills and capability, but their capacity to remain in the program was dependent on understanding and meeting the demanding pace and rigour of the program. The participants recognized that curriculum delivery along with instructor-student interaction had an impact on student retention. To be successful in the program, students required support in four domains: academic, learning management, career, and social.

  5. DIGITAL ERA: UTILIZE OF CLOUD COMPUTING TECHNOLOGY IN DIGITAL LIBRARY

    OpenAIRE

    T. RAGHUNADHA REDDY

    2012-01-01

    With the purpose of applying cloud computing to digital library, the paper initially describes cloud computing and analyzes current status of cloud computing in digital library. Then it proposes the architecture of cloud computing in digital library and summarises the application of cloud computing in digital library. Finally the author brings out the future improvement in digital library using cloud computing technology.

  6. Computer vision technology in log volume inspection

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Log volume inspection is very important in forestry research and paper making engineering. This paper proposed a novel approach based on computer vision technology to cope with log volume inspection. The needed hardware system was analyzed and the details of the inspection algorithms were given. A fuzzy entropy based on image enhancement algorithm was presented for enhancing the image of the cross-section of log. In many practical applications the cross-section is often partially invisible, and this is the major obstacle for correct inspection. To solve this problem, a robust Hausdorff distance method was proposed to recover the whole cross-section. Experiment results showed that this method was efficient.

  7. Computer Education and Instructional Technology Prospective Teachers’ Perceptions of Technology

    Directory of Open Access Journals (Sweden)

    Ümmü Gülsüm DURUKAN

    2016-04-01

    Full Text Available The purpose of this study is to determine the “technology” perception of prospective computer and instructional technologies (CEIT teachers by metaphors. For this purpose the study was carried out with 53 first-year prospective teachers studying in the Department of CEIT in a public university in the fall term of 2014-2015 academic year. The forms consisting of the statement “Technology is like ……………because ………” written few times were used as a data collection tool. Phenomenography design was used in the study and the data were analyzed by content analysis. According to the study's findings, it was found that out of 118 valid metaphors developed by the prospective teachers, 103 of them were included in positive category, 7 were in negative category and 8 were in the neutral category.

  8. Evaluating Computer Technology Integration in a Centralized School System

    Science.gov (United States)

    Eteokleous, N.

    2008-01-01

    The study evaluated the current situation in Cyprus elementary classrooms regarding computer technology integration in an attempt to identify ways of expanding teachers' and students' experiences with computer technology. It examined how Cypriot elementary teachers use computers, and the factors that influence computer integration in their…

  9. International Conference on Computers and Advanced Technology in Education

    CERN Document Server

    Advanced Information Technology in Education

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computers and Advanced Technology in Education. With the development of computers and advanced technology, the human social activities are changing basically. Education, especially the education reforms in different countries, has been experiencing the great help from the computers and advanced technology. Generally speaking, education is a field which needs more information, while the computers, advanced technology and internet are a good information provider. Also, with the aid of the computer and advanced technology, persons can make the education an effective combination. Therefore, computers and advanced technology should be regarded as an important media in the modern education. Volume Advanced Information Technology in Education is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of computers and advanced technology in education to d...

  10. On the development trend of computer application technology

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhi

    2014-01-01

    The development of computer application technology for people living and working has a very important significance. Dependent on computers are increasingly high. It put forward the development of computer application technology higher requirements. Only constant reform and renewal can meet the needs of social development. It is the only way to meet the development of the concept of sustainable development, and provide ongoing tech driving force for China's development. Based on this, the development trend of computer technology is discused.

  11. Computer vision research with new imaging technology

    Science.gov (United States)

    Hou, Guangqi; Liu, Fei; Sun, Zhenan

    2015-12-01

    Light field imaging is capable of capturing dense multi-view 2D images in one snapshot, which record both intensity values and directions of rays simultaneously. As an emerging 3D device, the light field camera has been widely used in digital refocusing, depth estimation, stereoscopic display, etc. Traditional multi-view stereo (MVS) methods only perform well on strongly texture surfaces, but the depth map contains numerous holes and large ambiguities on textureless or low-textured regions. In this paper, we exploit the light field imaging technology on 3D face modeling in computer vision. Based on a 3D morphable model, we estimate the pose parameters from facial feature points. Then the depth map is estimated through the epipolar plane images (EPIs) method. At last, the high quality 3D face model is exactly recovered via the fusing strategy. We evaluate the effectiveness and robustness on face images captured by a light field camera with different poses.

  12. An answer summarization method based on keyword extraction

    Directory of Open Access Journals (Sweden)

    Fan Qiaoqing

    2017-01-01

    Full Text Available In order to reduce the redundancy of answer summary generated from community q&a dataset without topic tags, we propose an answer summarization algorithm based on keyword extraction. We combine tf-idf with word vector to change the influence transferred ratio equation in TextRank. And then during summarizing, we take the ratio of the number of sentences containing any keyword to the total number of candidate sentences as an adaptive factor for AMMR. Meanwhile we reuse the scores of keywords generated by TextRank as a weight factor for sentence similarity computing. Experimental results show that the proposed answer summarization is better than the traditional MMR and AMMR.

  13. Keyword analysis of community planning documents

    Data.gov (United States)

    U.S. Environmental Protection Agency — This file contains total hits per keyword expressed as percentage of total hits for the eight domains of the human well-being index. Additional categorical data is...

  14. Processing keyword queries under access limitations

    OpenAIRE

    Calì, Andrea; Martinenghi, D.; Torlone, R.

    2015-01-01

    The Deep Web is constituted by data accessible through Web pages, but not readily indexable by search engines, as they are returned in dynamic pages. In this paper we propose a framework for accessing Deep Web sources, represented as relational tables with so-called access limitations, with keyword-based queries. We formalize the notion of optimal answer and propose methods for query processing. To the best of our knowledge, ours is the first systematic approach to keyword search in such cont...

  15. Computer-aided design and computer science technology

    Science.gov (United States)

    Fulton, R. E.; Voigt, S. J.

    1976-01-01

    A description is presented of computer-aided design requirements and the resulting computer science advances needed to support aerospace design. The aerospace design environment is examined, taking into account problems of data handling and aspects of computer hardware and software. The interactive terminal is normally the primary interface between the computer system and the engineering designer. Attention is given to user aids, interactive design, interactive computations, the characteristics of design information, data management requirements, hardware advancements, and computer science developments.

  16. Keywords in Context (Using n-grams with Python

    Directory of Open Access Journals (Sweden)

    William J. Turkel

    2012-07-01

    Full Text Available Like in Output Data as HTML File, this lesson takes the frequency pairs collected in Counting Frequencies and outputs them in HTML. This time the focus is on keywords in context (KWIC which creates n-grams from the original document content – in this case a trial transcript from the Old Bailey Online. You can use your program to select a keyword and the computer will output all instances of that keyword, along with the words to the left and right of it, making it easy to see at a glance how the keyword is used. Once the KWICs have been created, they are then wrapped in HTML and sent to the browser where they can be viewed. This reinforces what was learned in Output Data as HTML File, opting for a slightly different output. At the end of this lesson, you will be able to extract all possible n-grams from the text. In the next lesson, you will be learn how to output all of the n-grams of a given keyword in a document downloaded from the Internet, and display them clearly in your browser window.

  17. USING GOOGLE’S KEYWORD RELATION IN MULTIDOMAIN DOCUMENT CLASSIFICATION

    Directory of Open Access Journals (Sweden)

    Ping-I Chen

    2013-07-01

    Full Text Available People can collect all kinds of knowledge from search engines to improve the quality of decision making, and use document classification systems to manage the knowledge repository. Document classification systems always need to construct a keyword vector, which always contains thousands of words, to represent the knowledge domain. Thus, the computation complexity of the classification algorithm is very high. Also, users need to download all the documents before extracting the keywords and classifying the documents. In our previous work, we described a new algorithm called “Word AdHoc Network” (WANET and used it to extract the most important sequences of keywords for each document. In this paper, we adapt the WANET system to make it more precise. We will also use a new similarity measurement algorithm, called “Google Purity,” to calculate the similarity between the extracted keyword sequences to classify similar documents together. By using this system, we can easily classify the information in different knowledge domains at the same time, and all the executions are without any pre-established keyword repository. Our experiments show that the classification results are very accurate and useful. This new system can improve the efficiency of document classification and make it more usable in Web-based information management.

  18. Beam damage detection using computer vision technology

    Science.gov (United States)

    Shi, Jing; Xu, Xiangjun; Wang, Jialai; Li, Gong

    2010-09-01

    In this paper, a new approach for efficient damage detection in engineering structures is introduced. The key concept is to use the mature computer vision technology to capture the static deformation profile of a structure, and then employ profile analysis methods to detect the locations of the damages. By combining with wireless communication techniques, the proposed approach can provide an effective and economical solution for remote monitoring of structure health. Moreover, a preliminary experiment is conducted to verify the proposed concept. A commercial computer vision camera is used to capture the static deformation profiles of cracked cantilever beams under loading. The profiles are then processed to reveal the existence and location of the irregularities on the deformation profiles by applying fractal dimension, wavelet transform and roughness methods, respectively. The proposed concept is validated on both one-crack and two-crack cantilever beam-type specimens. It is also shown that all three methods can produce satisfactory results based on the profiles provided by the vision camera. In addition, the profile quality is the determining factor for the noise level in resultant detection signal.

  19. The Invisible Barrier to Integrating Computer Technology in Education

    Science.gov (United States)

    Aflalo, Ester

    2014-01-01

    The article explores contradictions in teachers' perceptions regarding the place of computer technologies in education. The research population included 47 teachers who have incorporated computers in the classroom for several years. The teachers expressed positive attitudes regarding the decisive importance of computer technologies in furthering…

  20. Computer Science and Technology Publications. NBS Publications List 84.

    Science.gov (United States)

    National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.

    This bibliography lists publications of the Institute for Computer Sciences and Technology of the National Bureau of Standards. Publications are listed by subject in the areas of computer security, computer networking, and automation technology. Sections list publications of: (1) current Federal Information Processing Standards; (2) computer…

  1. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  2. Stability-mutation feature identification of Web search keywords based on keyword concentration change ratio

    Institute of Scientific and Technical Information of China (English)

    Hongtao; LU; Guanghui; YE; Gang; LI

    2014-01-01

    Purpose: The aim of this paper is to discuss how the keyword concentration change ratio(KCCR) is used while identifying the stability-mutation feature of Web search keywords during information analyses and predictions.Design/methodology/approach: By introducing the stability-mutation feature of keywords and its significance, the paper describes the function of the KCCR in identifying keyword stability-mutation features. By using Ginsberg’s influenza keywords, the paper shows how the KCCR can be used to identify the keyword stability-mutation feature effectively.Findings: Keyword concentration ratio has close positive correlation with the change rate of research objects retrieved by users, so from the characteristic of the "stability-mutation" of keywords, we can understand the relationship between these keywords and certain information. In general, keywords representing for mutation fit for the objects changing in short-term, while those representing for stability are suitable for long-term changing objects. Research limitations: It is difficult to acquire the frequency of keywords, so indexes or parameters which are closely related to the true search volume are chosen for this study.Practical implications: The stability-mutation feature identification of Web search keywords can be applied to predict and analyze the information of unknown public events through observing trends of keyword concentration ratio.Originality/value: The stability-mutation feature of Web search could be quantitatively described by the keyword concentration change ratio(KCCR). Through KCCR, the authors took advantage of Ginsberg’s influenza epidemic data accordingly and demonstrated how accurate and effective the method proposed in this paper was while it was used in information analyses and predictions.

  3. Relationships between Computer Self-Efficacy, Technology, Attitudes and Anxiety: Development of the Computer Technology Use Scale (CTUS)

    Science.gov (United States)

    Conrad, Agatha M.; Munro, Don

    2008-01-01

    Two studies are reported which describe the development and evaluation of a new instrument, the Computer Technology Use Scale (CTUS), comprising three domains: computer self-efficacy, attitudes to technology, and technology related anxiety. Study 1 describes the development of the instrument and explores its factor structure. Study 2 used…

  4. DIGITAL ERA: UTILIZE OF CLOUD COMPUTING TECHNOLOGY IN DIGITAL LIBRARY

    Directory of Open Access Journals (Sweden)

    T. RAGHUNADHA REDDY

    2012-09-01

    Full Text Available With the purpose of applying cloud computing to digital library, the paper initially describes cloud computing and analyzes current status of cloud computing in digital library. Then it proposes the architecture of cloud computing in digital library and summarises the application of cloud computing in digital library. Finally the author brings out the future improvement in digital library using cloud computing technology.

  5. A Financial Technology Entrepreneurship Program for Computer Science Students

    Science.gov (United States)

    Lawler, James P.; Joseph, Anthony

    2011-01-01

    Education in entrepreneurship is becoming a critical area of curricula for computer science students. Few schools of computer science have a concentration in entrepreneurship in the computing curricula. The paper presents Technology Entrepreneurship in the curricula at a leading school of computer science and information systems, in which students…

  6. 3rd International Conference on Computer & Communication Technologies

    CERN Document Server

    Bhateja, Vikrant; Raju, K; Janakiramaiah, B

    2017-01-01

    The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

  7. Efficient Continuously Moving Top-K Spatial Keyword Query Processing

    DEFF Research Database (Denmark)

    Wu, Dinming; Yiu, Man Lung; Jensen, Christian Søndergaard;

    2011-01-01

    keyword data. State-of-the-art solutions for moving queries employ safe zones that guarantee the validity of reported results as long as the user remains within a zone. However, existing safe zone methods focus solely on spatial locations and ignore text relevancy. We propose two algorithms for computing...... safe zones that guarantee correct results at any time and that aim to optimize the computation on the server as well as the communication between the server and the client. We exploit tight and conservative approximations of safe zones and aggressive computational space pruning. Empirical studies...

  8. Cloud Computing. Technology Briefing. Number 1

    Science.gov (United States)

    Alberta Education, 2013

    2013-01-01

    Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…

  9. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  10. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  11. Keyword Extraction from Arabic Legal Texts

    Science.gov (United States)

    Rammal, Mahmoud; Bahsoun, Zeinab; Al Achkar Jabbour, Mona

    2015-01-01

    Purpose: The purpose of this paper is to apply local grammar (LG) to develop an indexing system which automatically extracts keywords from titles of Lebanese official journals. Design/methodology/approach: To build LG for our system, the first word that plays the determinant role in understanding the meaning of a title is analyzed and grouped as…

  12. What Makes an Automatic Keyword Classification Effective?

    Science.gov (United States)

    Jones, K. Sparck; Barber, E. O.

    1971-01-01

    The substitution information contained in automatically obtained keyword classification is most effectively exploited when: (1) strong similarity connectives only are utilized, (2) grouping is confined to non-frequent terms, (3) term groups are used to provide additional and not alternative descriptive items and (4) descriptor collection frequency…

  13. A keyword history of Marketing Science

    NARCIS (Netherlands)

    C.F. Mela (Carl); J.M.T. Roos (Jason); Y. Deng (Yanhui)

    2013-01-01

    textabstractThis paper considers the history of keywords used in Marketing Science to develop insights on the evolution of marketing science. Several findings emerge. First, "pricing" and "game theory" are the most ubiquitous words. More generally, the three C's and four P's predominate, suggesting

  14. Rapid automatic keyword extraction for information retrieval and analysis

    Science.gov (United States)

    Rose, Stuart J [Richland, WA; Cowley,; E, Wendy [Richland, WA; Crow, Vernon L [Richland, WA; Cramer, Nicholas O [Richland, WA

    2012-03-06

    Methods and systems for rapid automatic keyword extraction for information retrieval and analysis. Embodiments can include parsing words in an individual document by delimiters, stop words, or both in order to identify candidate keywords. Word scores for each word within the candidate keywords are then calculated based on a function of co-occurrence degree, co-occurrence frequency, or both. Based on a function of the word scores for words within the candidate keyword, a keyword score is calculated for each of the candidate keywords. A portion of the candidate keywords are then extracted as keywords based, at least in part, on the candidate keywords having the highest keyword scores.

  15. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITYEvaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  16. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITY Evaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  17. The Perception of EFL High School Students in Using of Computer Technology in the Process of Learning: Merits and Demerits

    Directory of Open Access Journals (Sweden)

    Siros Izadpanah

    2016-06-01

    Full Text Available Recent developments in the field of computer technology have led to a renewed interest in the process of learning.  In order to investigate EFL learners’ perception of technology use, a mixed method design was used to explore students’ attitude. Quantitative data was collected through questionnaires and qualitative data using open-ended questions.The questionnaire was distributed in two different high schools (one male and one female in Zanjan, 2015. Participants were 340 high school students who filled in CALLAI questionnaire. The data of the questionnaire was analysed using Statistical Packages for Social Sciences (SPSS Version 20. Descriptive statistics including frequencies and percentages were used to analyze questionnaire items. Data gathered from open-ended questions was analysed using qualitative data analysis software NVivo 8.0. It was found that students had positive attitude toward facilitation of English learning in the classroom through computer technology. Our objective was to explore students’ perceptions of technology usage in high schools .The implication of this study was that students, with prior experience in technology, might benefit more from technology use in education. Furthermore, it could be guidance for teachers to better understand world of technology and recognize possible barriers to integration of technology. Keywords: Advantages of Computer Technology, Computer and EFL Teaching, EFL High School Students, English learning, Perceptions of EFL learners

  18. African Journals Online: Technology, Computer Science ...

    African Journals Online (AJOL)

    Items 1 - 29 of 29 ... The Ethiopian Journal of Science and Technology (EJST) publishes high .... Sciences is an international journal reporting significant new results in all .... general technology rocketry, space and astronomy, earth sciences, ...

  19. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  20. CICT Computing, Information, and Communications Technology Program

    Science.gov (United States)

    Laufenberg, Lawrence; Tu, Eugene (Technical Monitor)

    2002-01-01

    The CICT Program is part of the NASA Aerospace Technology Enterprise's fundamental technology thrust to develop tools. processes, and technologies that enable new aerospace system capabilities and missions. The CICT Program's four key objectives are: Provide seamless access to NASA resources- including ground-, air-, and space-based distributed information technology resources-so that NASA scientists and engineers can more easily control missions, make new scientific discoveries, and design the next-generation space vehicles, provide high-data delivery from these assets directly to users for missions, develop goal-oriented human-centered systems, and research, develop and evaluate revolutionary technology.

  1. One-Match and All-Match Categories for Keywords Matching in Chatbot

    Directory of Open Access Journals (Sweden)

    Abbas S. Lokman

    2010-01-01

    Full Text Available Problem statement: Artificial intelligence chatbot is a technology that makes interactions between men and machines using natural language possible. From literature of chatbots keywords/pattern matching techniques, potential issues for improvement had been discovered. The discovered issues are in the context of keywords arrangement for matching precedence and keywords variety for matching flexibility. Approach: Combining previous techniques/mechanisms with some additional adjustment, new technique to be used for keywords matching process is proposed. Using newly developed chatbot named ViDi (abbreviation for Virtual Diabetes physician which is a chatbot for diabetes education activity as a testing medium, the proposed technique named One-Match and All-Match Categories (OMAMC is being used to test the creation of possible keywords surrounding one sample input sentence. The result for possible keywords created by this technique then being compared to possible keywords created by previous chatbots techniques surrounding the same sample sentence in matching precedence and matching flexibility context. Results: OMAMC technique is found to be improving previous matching techniques in matching precedence and flexibility context. This improvement is seen to be useful for shortening matching time and widening matching flexibility within the chatbots keywords matching process. Conclusion: OMAMC for keywords matching in chatbot is shown to be an improvement over previous techniques in the context of keywords arrangement for matching precedence and keywords variety for matching flexibility.

  2. Identification of risk factors of computer information technologies in education.

    OpenAIRE

    Hrebniak M.P.; Shchudro S.A.; Yakimova K.O.

    2014-01-01

    The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and c...

  3. Computational thermodynamics and informational technologies in the field of computer design of materials

    Directory of Open Access Journals (Sweden)

    Udovsky A.L.

    2002-01-01

    Full Text Available Computational thermodynamics and informational technologies in the field of computer desing of materials as well as appliance of CALPHAD method on resolution of thermodynamic problems are presented in this paper.

  4. JPRS Report, Science & Technology, USSR: Computers

    Science.gov (United States)

    2007-11-02

    AVTOMATIZATSIYA PROIZVODSTVA, No 1, Jan 87) 69 EDUCATION The Computer Has Come to School (RUSSKIY YAZYK I LITERATURA V KAZAKHSKOY SHKOLE, No 7, Jul 86) 76...avtomatizatsiya proizvodstva", 1987 12770 CSO: 1Ö63/209 75 EDUCATION THE COMPUTER HAS COME TO SCHOOL Alma-Ata RUSSKIY YAZYK I LITERATURA V...and wins over minds and inspires upperclassmen—the avant-garde of computer education. COPYRIGHT: "Russkiy yazyk i literatura v Kazakhskoy shkole

  5. Computer-Assisted Technology for the Twice Exceptional

    Science.gov (United States)

    Rizza, Mary

    2006-01-01

    Technology helps students develop coping strategies to deal with various learning differences. Assistive technology is a common intervention provided to students with disabilities and generally varies depending on student need. Within gifted education, the use of computers and technology is concentrated on curricular applications and activities…

  6. Impact of Computer Technology on Design and Craft Education

    Science.gov (United States)

    Thorsteinsson, Gisli

    2014-01-01

    This research aims to answer the question, "How has the use of computer technology benefited the compulsory education system, focusing on Design and Technology?" In order to reply this question, it was necessary to focus on interactive whiteboards, e-portfolios and digital projectors as the main technology formats. An initial literature…

  7. Technology Foundations for Computational Evaluation of Software Security Attributes

    Science.gov (United States)

    2006-12-01

    Technology Foundations for Computational Evaluation of Software Security Attributes Gwendolyn H. Walton Thomas A. Longstaff Richard C...security attributes to the functional behavior of the software . The emergence of CERT’s new function extraction (FX) technology , unavailable to previous... software meets security requirements if they have been specified in behavioral terms. FX technology prescribes effective means to create and record

  8. On Integrating Computer Technology into Our Curriculum

    Institute of Scientific and Technical Information of China (English)

    Jianhua Bai

    2000-01-01

    @@ 1. Introduction When something new and exciting occurs in technology, some of us foreign language teachers tend to become too excited to notice the limitations of the new technology. It is no exception with the current use of multimedia and intemet technology in our curriculum. It is my belief that,without an adequate understanding of its limitations as well as its advantages, we may find ourselves disappointed as we move ahead in integrating the multimedia technology into our instruction in a meaningful way. Therefore, in this paper, I would like to start with the discussion of the limitation of multimedia technology and then discuss how we can make use of this new technology to improve our teaching and learning of Chinese as a foreign language.

  9. On the use of computation optimization opportunities in computer technologies for applied and computational mathematics problems with prescribed quality characteristics

    Science.gov (United States)

    Babich, M. D.; Zadiraka, V. K.; Lyudvichenko, V. A.; Sergienko, I. V.

    2010-12-01

    The use of various opportunities for computation optimization in computer technologies for applied and computational mathematics problems with prescribed quality characteristics is investigated. More precisely, the choice and determination of computational resources and methods of their efficient use for finding an approximate solution of problems up to prescribed accuracy in a limited amount of processor time are investigated.

  10. Cutting Technology Costs with Refurbished Computers

    Science.gov (United States)

    Dessoff, Alan

    2010-01-01

    Many district administrators are finding that they can save money on computers by buying preowned ones instead of new ones. The practice has other benefits as well: It allows districts to give more computers to more students who need them, and it also promotes good environmental practices by keeping the machines out of landfills, where they…

  11. JPRS Report, Science & Technology, USSR: Computers.

    Science.gov (United States)

    2007-11-02

    3 hours; the Leninabad Silk Combine of the Ministry of Light Industry, 2 hours; the Tadkhik Scientific Research Institute of Scientific and...established sectorial oblast computer centers in Leninabad , Kulyab, and Kurgan-Tyube. Was there a need for this if computer centers of statistical

  12. Mistaking Computers for Technology: Technology Literacy and the Digital Divide

    Science.gov (United States)

    Amiel, Tel

    2006-01-01

    No other information and communication technology has swept the globe with greater speed than the Internet, having the potential to promote vast social, economic, and political transformations. As new technologies become available the pattern of adoption and diffusion creates disparities in access and ownership. At the most basic this gap is…

  13. 中文生物医学关键词-主题词映射表计算机辅助构建与维护机制研究%Computer-aided Construction and Maintenance of the Chinese Biomedical Keyword-Subject Heading Mapping Vocabulary

    Institute of Scientific and Technical Information of China (English)

    孙海霞; 吴英杰; 李丹亚; 李军莲

    2014-01-01

    将自然语言应用到信息组织、标引、检索和分析所需的各种词表中,实现自然语言与受控语言间的互操作,是新一代知识组织系统构建模式。文章围绕“关键词识别与扩充、关键词-主题词映射关系构建、关键词-主题词映射关系更新”3个方面,介绍了中文生物医学关键词-主题词映射表的计算机辅助构建与维护机制,以及系统的功能架构。%To realize the interoperability between natural language and control ed language, merging the natural language into vocabularies, used for information organization, indexing, retrieval and analysis, is a new mode of knowledge organization systems building. Focusing on keyword recognition and expansion, keyword-subject heading mapping building and its update, this paper introduces the computer-aided construction and maintenance mechanisms of the Chinese Biomedical keywords-subject heading mapping vocabulary, and its system's design and implementation.

  14. Evolving technologies for Space Station Freedom computer-based workstations

    Science.gov (United States)

    Jensen, Dean G.; Rudisill, Marianne

    1990-01-01

    Viewgraphs on evolving technologies for Space Station Freedom computer-based workstations are presented. The human-computer computer software environment modules are described. The following topics are addressed: command and control workstation concept; cupola workstation concept; Japanese experiment module RMS workstation concept; remote devices controlled from workstations; orbital maneuvering vehicle free flyer; remote manipulator system; Japanese experiment module exposed facility; Japanese experiment module small fine arm; flight telerobotic servicer; human-computer interaction; and workstation/robotics related activities.

  15. Reviews of computing technology: Software overview

    Energy Technology Data Exchange (ETDEWEB)

    Hartshorn, W.R.; Johnson, A.L.

    1994-01-05

    The Savannah River Site Computing Architecture states that the site computing environment will be standards-based, data-driven, and workstation-oriented. Larger server systems deliver needed information to users in a client-server relationship. Goals of the Architecture include utilizing computing resources effectively, maintaining a high level of data integrity, developing a robust infrastructure, and storing data in such a way as to promote accessibility and usability. This document describes the current storage environment at Savannah River Site (SRS) and presents some of the problems that will be faced and strategies that are planned over the next few years.

  16. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  17. Key Technologies and Applications of Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Guo

    2013-07-01

    Full Text Available With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second we discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.

  18. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  19. Wearable computer technology for dismounted applications

    Science.gov (United States)

    Daniels, Reginald

    2010-04-01

    Small computing devices which rival the compact size of traditional personal digital assistants (PDA) have recently established a market niche. These computing devices are small enough to be considered unobtrusive for humans to wear. The computing devices are also powerful enough to run full multi-tasking general purpose operating systems. This paper will explore the wearable computer information system for dismounted applications recently fielded for ground-based US Air Force use. The environments that the information systems are used in will be reviewed, as well as a description of the net-centric, ground-based warrior. The paper will conclude with a discussion regarding the importance of intuitive, usable, and unobtrusive operator interfaces for dismounted operators.

  20. Computer technology: Silicon chips lighten up

    Science.gov (United States)

    Vivien, Laurent

    2015-12-01

    Microprocessor communications have received a boost from the integration of electronics and photonics in silicon -- a first step towards low power consumption and efficient computing systems. See Letter p.534

  1. Computational methods in molecular imaging technologies

    CERN Document Server

    Gunjan, Vinit Kumar; Venkatesh, C; Amarnath, M

    2017-01-01

    This book highlights the experimental investigations that have been carried out on magnetic resonance imaging and computed tomography (MRI & CT) images using state-of-the-art Computational Image processing techniques, and tabulates the statistical values wherever necessary. In a very simple and straightforward way, it explains how image processing methods are used to improve the quality of medical images and facilitate analysis. It offers a valuable resource for researchers, engineers, medical doctors and bioinformatics experts alike.

  2. Cloud computing technology framework and reducing risks

    OpenAIRE

    Akrir, Khaled Ali Ahmed

    2015-01-01

    The thesis investigates, in a qualitative way, the vectors that contribute to cloud computing risks in the areas of security, business, and compliance. The focus of this research is on the identification of risk vectors that affect cloud computing and the creation of a framework that can help IT managers in their cloud adoption process. Economic pressures on businesses are creating a demand for an alternative delivery of the model that can provide flexible payments, dramatic cuts in capital i...

  3. HarkMan-A Vocabulary-Independent Keyword Spotter for Spontaneous Chinese Speech

    Institute of Scientific and Technical Information of China (English)

    ZHENG Fang; XU Mingxing; MOU Xiaolong; WU Jian; WU Wenhu; FANG Ditang

    1999-01-01

    In this paper, a novel technique adopted in HarkMan is introduced. HarkMan is a keyword-spotter designed to automatically spot the given words of avocabulary-independent task in unconstrained Chinese telephone speech. The speaking manner and the number of keywords are not limited. This paper focuses on the novel technique which addresses acoustic modeling, keyword spotting network, search strategies, robustness, and rejection.The underlying technologies used in HarkMan given in this paper are useful not only for keyword spotting but also for continuous speech recognition. The system has achieved a figure-of-merit value over 90%.

  4. Computational intelligence for technology enhanced learning

    Energy Technology Data Exchange (ETDEWEB)

    Xhafa, Fatos [Polytechnic Univ. of Catalonia, Barcelona (Spain). Dept. of Languages and Informatics Systems; Caballe, Santi; Daradoumis, Thanasis [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Computer Sciences Multimedia and Telecommunications; Abraham, Ajith [Machine Intelligence Research Labs (MIR Labs), Auburn, WA (United States). Scientific Network for Innovation and Research Excellence; Juan Perez, Angel Alejandro (eds.) [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Information Sciences

    2010-07-01

    E-Learning has become one of the most wide spread ways of distance teaching and learning. Technologies such as Web, Grid, and Mobile and Wireless networks are pushing teaching and learning communities to find new and intelligent ways of using these technologies to enhance teaching and learning activities. Indeed, these new technologies can play an important role in increasing the support to teachers and learners, to shorten the time to learning and teaching; yet, it is necessary to use intelligent techniques to take advantage of these new technologies to achieve the desired support to teachers and learners and enhance learners' performance in distributed learning environments. The chapters of this volume bring advances in using intelligent techniques for technology enhanced learning as well as development of e-Learning applications based on such techniques and supported by technology. Such intelligent techniques include clustering and classification for personalization of learning, intelligent context-aware techniques, adaptive learning, data mining techniques and ontologies in e-Learning systems, among others. Academics, scientists, software developers, teachers and tutors and students interested in e-Learning will find this book useful for their academic, research and practice activity. (orig.)

  5. Keyword search in the Deep Web

    OpenAIRE

    Calì, Andrea; Martinenghi, D.; Torlone, R.

    2015-01-01

    The Deep Web is constituted by data accessible through Web\\ud pages, but not readily indexable by search engines, as they are returned\\ud in dynamic pages. In this paper we propose a framework for accessing\\ud Deep Web sources, represented as relational tables with so-called ac-\\ud cess limitations, with keyword-based queries. We formalize the notion\\ud of optimal answer and investigate methods for query processing. To our\\ud knowledge, this problem has never been studied in a systematic way.

  6. Enabling Computational Technologies for Terascale Scientific Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Ashby, S.F.

    2000-08-24

    We develop scalable algorithms and object-oriented code frameworks for terascale scientific simulations on massively parallel processors (MPPs). Our research in multigrid-based linear solvers and adaptive mesh refinement enables Laboratory programs to use MPPs to explore important physical phenomena. For example, our research aids stockpile stewardship by making practical detailed 3D simulations of radiation transport. The need to solve large linear systems arises in many applications, including radiation transport, structural dynamics, combustion, and flow in porous media. These systems result from discretizations of partial differential equations on computational meshes. Our first research objective is to develop multigrid preconditioned iterative methods for such problems and to demonstrate their scalability on MPPs. Scalability describes how total computational work grows with problem size; it measures how effectively additional resources can help solve increasingly larger problems. Many factors contribute to scalability: computer architecture, parallel implementation, and choice of algorithm. Scalable algorithms have been shown to decrease simulation times by several orders of magnitude.

  7. Cloud manufacturing distributed computing technologies for global and sustainable manufacturing

    CERN Document Server

    Mehnen, Jörn

    2013-01-01

    Global networks, which are the primary pillars of the modern manufacturing industry and supply chains, can only cope with the new challenges, requirements and demands when supported by new computing and Internet-based technologies. Cloud Manufacturing: Distributed Computing Technologies for Global and Sustainable Manufacturing introduces a new paradigm for scalable service-oriented sustainable and globally distributed manufacturing systems.   The eleven chapters in this book provide an updated overview of the latest technological development and applications in relevant research areas.  Following an introduction to the essential features of Cloud Computing, chapters cover a range of methods and applications such as the factors that actually affect adoption of the Cloud Computing technology in manufacturing companies and new geometrical simplification method to stream 3-Dimensional design and manufacturing data via the Internet. This is further supported case studies and real life data for Waste Electrical ...

  8. The Application of Computer Technology in Art Design

    Directory of Open Access Journals (Sweden)

    Tao Xin

    2016-01-01

    Full Text Available After entering the twenty-first Century, computer technology has been greatly developed, applied in various fields gradually, and gained remarkable achievement. Computer technology not only is a project of great importance in China, but also cannot be ignored in the world. It has already attracted attention of numerous people, gradually integrated in daily life and closely related with it. Now how to apply it into more fields has been the main focus of our nation and also the topic we care about all the time. It is also an important project in our country to apply computer technology in art design in order to higher the art design quality. The purpose of this paper is to introduce people problems of the application of computer technology in art design, and find ways to promote cooperation and common development of them.

  9. Theories of Learning and Computer-Mediated Instructional Technologies.

    Science.gov (United States)

    Hung, David

    2001-01-01

    Describes four major models of learning: behaviorism, cognitivism, constructivism, and social constructivism. Discusses situated cognition; differences between learning theories and instructional approaches; and how computer-mediated technologies can be integrated with learning theories. (LRW)

  10. Leveraging mobile computing and communication technologies in education

    DEFF Research Database (Denmark)

    Annan, Nana Kofi

    The emergence of mobile computing and communication technologies has come with it, an unprecedented transformation in digitalising every aspect of human activities. This transformation has brought about a high degree of mobility in the way knowledge is constructed, processed, stored...... and disseminated through the use of portable information and communication technologies (ICTs) such as smart phones, tablets, personal computers and laptop computers. These mobile devices use mobile communication infrastructure to promote the mobility affordances for human activities anywhere and anytime. Although...... education and technology have evolved in tandem over the past years, this dissertation recognises the lapse that there is, in not being able to effectively leverage technology to improve education delivery by most educators. The study appreciates the enormousness of mobile computing and communication...

  11. Theories of Learning and Computer-Mediated Instructional Technologies.

    Science.gov (United States)

    Hung, David

    2001-01-01

    Describes four major models of learning: behaviorism, cognitivism, constructivism, and social constructivism. Discusses situated cognition; differences between learning theories and instructional approaches; and how computer-mediated technologies can be integrated with learning theories. (LRW)

  12. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  13. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  14. Computer technology -- 1996: Applications and methodology. PVP-Volume 326

    Energy Technology Data Exchange (ETDEWEB)

    Hulbert, G.M. [ed.] [Univ. of Michigan, Ann Arbor, MI (United States); Hsu, K.H. [ed.] [Babcock and Wilcox, Barberton, OH (United States); Lee, T.W. [ed.] [FMC Corp., Santa Clara, CA (United States); Nicholas, T. [ed.] [USAF Wright Laboratory, Wright-Patterson AFB, OH (United States)

    1996-12-01

    The primary objective of the Computer Technology Committee of the ASME Pressure Vessels and Piping Division is to promote interest and technical exchange in the field of computer technology, related to the design and analysis of pressure vessels and piping. The topics included in this volume are: analysis of bolted joints; nonlinear analysis, applications and methodology; finite element analysis and applications; and behavior of materials. Separate abstracts were prepared for 23 of the papers in this volume.

  15. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  16. Automatic keywording of High Energy Physics

    CERN Document Server

    Dallman, David Peter

    1999-01-01

    Bibliographic databases were developed from the traditional library card catalogue in order to enable users to access library documents via various types of bibliographic information, such as title, author, series or conference date. In addition these catalogues sometimes contained some form of indexation by subject, such as the Universal (or Dewey) Decimal Classification used for books. With the introduction of the eprint archives, set up by the High Energy Physics (HEP) Community in the early 90s, huge collections of documents in several fields have been made available on the World Wide Web. These developments however have not yet been followed up from a keywording point of view. We will see in this paper how important it is to attribute keywords to all documents in the area of HEP Grey Literature. As libraries are facing a future with less and less manpower available and more and more documents, we will explore the possibility of being helped by automatic classification software. We will specifically menti...

  17. Technological Imperatives: Using Computers in Academic Debate.

    Science.gov (United States)

    Ticku, Ravinder; Phelps, Greg

    Intended for forensic educators and debate teams, this document details how one university debate team, at the University of Iowa, makes use of computer resources on campus to facilitate storage and retrieval of information useful to debaters. The introduction notes the problem of storing and retrieving the amount of information required by debate…

  18. USSR Report, Cybernetics, Computers and Automation Technology.

    Science.gov (United States)

    2007-11-02

    27 Automating Data Processing on the Rayon and Oblast Levels (A.P. Kolesnik, K.V. Golovin , et al.; FINANSY SSSR, No 5, May 86) 29 Development of...RSFSR Ministry of Finance, K. V. Golovin , division chief, main computer center, USSR Ministry of Finance, and V. Z. Usov, division chief, main

  19. USSR Report, Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    algorithm consists in moving along RD to a particular finite node proceeding from successive analysis of characteris- tics (indexes) of the sampling...requirements on devices control system hardware complex. Characteristics of transducers. Characteristics of the computer, USO [entity connection...characteristics of these classes of tasks; these characteris- tics were used as the raw data for calculating the particular effectiveness criteria

  20. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The im

  1. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The im

  2. CACTUS: Calculator and Computer Technology User Service.

    Science.gov (United States)

    Hyde, Hartley

    1998-01-01

    Presents an activity in which students use computer-based spreadsheets to find out how much grain should be added to a chess board when a grain of rice is put on the first square, the amount is doubled for the next square, and the chess board is covered. (ASK)

  3. Cloud Computing Technologies Facilitate Earth Research

    Science.gov (United States)

    2015-01-01

    Under a Space Act Agreement, NASA partnered with Seattle-based Amazon Web Services to make the agency's climate and Earth science satellite data publicly available on the company's servers. Users can access the data for free, but they can also pay to use Amazon's computing services to analyze and visualize information using the same software available to NASA researchers.

  4. USSR Report: Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    Georgian SSR Academy of Sciences: "Ready for Dialogue"] [Text] Computers in schools, auditoria , and educational laboratories are an phenomenon to which we...professional-technical academies and VUZ auditoria . Obviously, the color of the screens and the characters on them is of major importance for people

  5. Computer technology: its potential for industrial energy conservation. A technology applications manual

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-01-01

    Today, computer technology is within the reach of practically any industrial corporation regardless of product size. This manual highlights a few of the many applications of computers in the process industry and provides the technical reader with a basic understanding of computer technology, terminology, and the interactions among the various elements of a process computer system. The manual has been organized to separate process applications and economics from computer technology. Chapter 1 introduces the present status of process computer technology and describes the four major applications - monitoring, analysis, control, and optimization. The basic components of a process computer system also are defined. Energy-saving applications in the four major categories defined in Chapter 1 are discussed in Chapter 2. The economics of process computer systems is the topic of Chapter 3, where the historical trend of process computer system costs is presented. Evaluating a process for the possible implementation of a computer system requires a basic understanding of computer technology as well as familiarity with the potential applications; Chapter 4 provides enough technical information for an evaluation. Computer and associated peripheral costs and the logical sequence of steps in the development of a microprocessor-based process control system are covered in Chapter 5.

  6. Progress and Challenges in High Performance Computer Technology

    Institute of Scientific and Technical Information of China (English)

    Xue-Jun Yang; Yong Dou; Qing-Feng Hu

    2006-01-01

    High performance computers provide strategic computing power in the construction of national economy and defense, and become one of symbols of the country's overall strength. Over 30 years, with the supports of governments, the technology of high performance computers is in the process of rapid development, during which the computing performance increases nearly 3 million times and the processors number expands over 10 hundred thousands times. To solve the critical issues related with parallel efficiency and scalability, scientific researchers pursued extensive theoretical studies and technical innovations. The paper briefly looks back the course of building high performance computer systems both at home and abroad,and summarizes the significant breakthroughs of international high performance computer technology. We also overview the technology progress of China in the area of parallel computer architecture, parallel operating system and resource management,parallel compiler and performance optimization, environment for parallel programming and network computing. Finally, we examine the challenging issues, "memory wall", system scalability and "power wall", and discuss the issues of high productivity computers, which is the trend in building next generation high performance computers.

  7. A New Advance in Intelligent Computing Technology

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ A recent study by Dr. HUANG Deshuang and his colleagues from the CAS Hefei Institute of Intelligent Machines has shed new light on the development of digital image processing technology. Their work was reported as a cover story in the July issue of the Digital Signal Processing: A Review Journal.

  8. Audio Technology and Mobile Human Computer Interaction

    DEFF Research Database (Denmark)

    Chamberlain, Alan; Bødker, Mads; Hazzard, Adrian

    2017-01-01

    Audio-based mobile technology is opening up a range of new interactive possibilities. This paper brings some of those possibilities to light by offering a range of perspectives based in this area. It is not only the technical systems that are developing, but novel approaches to the design...

  9. JPRS Report, Science & Technology, USSR: Computers

    Science.gov (United States)

    2007-11-02

    fast set-up change for manufacturing of new products" (GOST [State All-Union Standart ] 14.001-73 and GOST 26228- 85). A flexible automated...tekhnologicheskoy podgotovki proizvodstva" [Scientific Foundations of Integrated Standart izat ion of Technological Preparation of Production

  10. Advanced sensor-computer technology for urban runoff monitoring

    Science.gov (United States)

    Yu, Byunggu; Behera, Pradeep K.; Ramirez Rochac, Juan F.

    2011-04-01

    The paper presents the project team's advanced sensor-computer sphere technology for real-time and continuous monitoring of wastewater runoff at the sewer discharge outfalls along the receiving water. This research significantly enhances and extends the previously proposed novel sensor-computer technology. This advanced technology offers new computation models for an innovative use of the sensor-computer sphere comprising accelerometer, programmable in-situ computer, solar power, and wireless communication for real-time and online monitoring of runoff quantity. This innovation can enable more effective planning and decision-making in civil infrastructure, natural environment protection, and water pollution related emergencies. The paper presents the following: (i) the sensor-computer sphere technology; (ii) a significant enhancement to the previously proposed discrete runoff quantity model of this technology; (iii) a new continuous runoff quantity model. Our comparative study on the two distinct models is presented. Based on this study, the paper further investigates the following: (1) energy-, memory-, and communication-efficient use of the technology for runoff monitoring; (2) possible sensor extensions for runoff quality monitoring.

  11. Designing Pervasive Computing Technology - In a Nomadic Work Perspective

    DEFF Research Database (Denmark)

    Kristensen, Jannie Friis

    2002-01-01

    In my thesis work I am investigating how the design of pervasive/ubiquitous computing technology, relate to the flexible and individual work practice of nomadic workers. Through empirical studies and with an experimental systems development approach, the work is focused on: a) Supporting...... interpretation and inclusion of implicit and invisible as well as explicit and visible characteristics of artifacts, users and use practices. b) Identifying breakdowns in human-computer interaction situations, with particular emphasis on the computation that happens "behind the scenes" in the pervasive computing...... environment, and how that computational process at a sufficient level is made intelligible, visible, accountable and negotiable to the human participant....

  12. Design technologies for green and sustainable computing systems

    CERN Document Server

    Ganguly, Amlan; Chakrabarty, Krishnendu

    2013-01-01

    This book provides a comprehensive guide to the design of sustainable and green computing systems (GSC). Coverage includes important breakthroughs in various aspects of GSC, including multi-core architectures, interconnection technology, data centers, high-performance computing (HPC), and sensor networks. The authors address the challenges of power efficiency and sustainability in various contexts, including system design, computer architecture, programming languages, compilers and networking. ·         Offers readers a single-source reference for addressing the challenges of power efficiency and sustainability in embedded computing systems; ·         Provides in-depth coverage of the key underlying design technologies for green and sustainable computing; ·         Covers a wide range of topics, from chip-level design to architectures, computing systems, and networks.

  13. A Discussion of Thin Client Technology for Computer Labs

    CERN Document Server

    Martínez-Mateo, Jesús; Pérez-Rey, David

    2010-01-01

    Computer literacy is not negotiable for any professional in an increasingly computerised environment. Educational institutions should be equipped to provide this new basic training for modern life. Accordingly, computer labs are an essential medium for education in almost any field. Computer labs are one of the most popular IT infrastructures for technical training in primary and secondary schools, universities and other educational institutions all over the world. Unfortunately, a computer lab is expensive, in terms of both initial purchase and annual maintenance costs, and especially when we want to run the latest software. Hence, research efforts addressing computer lab efficiency, performance or cost reduction would have a worldwide repercussion. In response to this concern, this paper presents a survey on thin client technology for computer labs in educational environments. Besides setting out the advantages and drawbacks of this technology, we aim to refute false prejudices against thin clients, identif...

  14. A Technology Assessment of Personal Computers. Vol. I: Summary.

    Science.gov (United States)

    Nilles, Jack M.

    This volume summarizes the results of a 2-year technology assessment of personal computers. The purpose of this study was to explore possible future modes of growth of the personal computer and related industries, to assess the impacts and consequences of that growth, and to present some of the policy issues and options which may arise as a…

  15. Course Syllabus: The Social Impact of Computer Information Technology.

    Science.gov (United States)

    Behar, Joseph

    1988-01-01

    This syllabus describes the course background, central themes and issues, texts, resources, and recommended readings. Main topics are the sociology of information technology, computers and social change, telecommunications, computers and human interactions, applications in working, and social issues and political implications. (YP)

  16. Using Computer and Video Technologies to Develop Interpersonal Skills.

    Science.gov (United States)

    Campbell, J. Olin; And Others

    1995-01-01

    Two studies investigated ways in which computer and video technology can support expert human coaches in order to reduce instructor time and increase learner-centered environments; the goal was to train undergraduate students to facilitate others' interpersonal problem solving. Results indicate that the technology-supported methods can decrease…

  17. Computed Tomography Technology: Development and Applications for Defence

    Science.gov (United States)

    Baheti, G. L.; Saxena, Nisheet; Tripathi, D. K.; Songara, K. C.; Meghwal, L. R.; Meena, V. L.

    2008-09-01

    Computed Tomography(CT) has revolutionized the field of Non-Destructive Testing and Evaluation (NDT&E). Tomography for industrial applications warrants design and development of customized solutions catering to specific visualization requirements. Present paper highlights Tomography Technology Solutions implemented at Defence Laboratory, Jodhpur (DLJ). Details on the technological developments carried out and their utilization for various Defence applications has been covered.

  18. Building Computer Technology Skills in TESOL Teacher Education

    Science.gov (United States)

    DelliCarpini, Margo

    2012-01-01

    This paper reports on an action research study that investigated factors influencing TESOL (teaching English to speakers of other languages) teacher candidates' (TCs) selection and use of technology in the English as a second language (ESL) classroom and the influence of explicit training in context in the use of computer technology for second…

  19. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  20. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  1. Beyond Computer Literacy: Supporting Youth's Positive Development through Technology

    Science.gov (United States)

    Bers, Marina Umaschi

    2010-01-01

    In a digital era in which technology plays a role in most aspects of a child's life, having the competence and confidence to use computers might be a necessary step, but not a goal in itself. Developing character traits that will serve children to use technology in a safe way to communicate and connect with others, and providing opportunities for…

  2. Beyond Computer Literacy: Supporting Youth's Positive Development through Technology

    Science.gov (United States)

    Bers, Marina Umaschi

    2010-01-01

    In a digital era in which technology plays a role in most aspects of a child's life, having the competence and confidence to use computers might be a necessary step, but not a goal in itself. Developing character traits that will serve children to use technology in a safe way to communicate and connect with others, and providing opportunities for…

  3. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  4. Promoting Technology-Assisted Active Learning in Computer Science Education

    Science.gov (United States)

    Gao, Jinzhu; Hargis, Jace

    2010-01-01

    This paper describes specific active learning strategies for teaching computer science, integrating both instructional technologies and non-technology-based strategies shown to be effective in the literature. The theoretical learning components addressed include an intentional method to help students build metacognitive abilities, as well as…

  5. A Partnership Project: Integrating Computer Technology and Orff-Schulwerk.

    Science.gov (United States)

    Woody, Robert H.; Fredrickson, Julie M.

    2000-01-01

    Describes an alternative approach for general music educators wanting to study new instructional strategies in which a classroom teacher and university educator collaborated to explore the integration of computer technology with Orff-Schulwerk in second- and third-grade music classes. Discusses the project and two of its technology-assisted…

  6. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  7. Terminology of the Newest Technologies and Computering

    Directory of Open Access Journals (Sweden)

    Angelė Kaulakienė

    2011-04-01

    Full Text Available The thirty-five-year period of computer terminology has to be considered the initial stage of its evolution where synonymy and variability are characteristic features, which are usually determined by both extra-linguistic and linguistic factors. The choice of borrowed or Lithuanian terms is often determined by the relationship between borrowed and Lithuanian terms. The first stage of the newest dictionaries of computer terms approbated by the Commission of the Lithuanian Language shows that the terminology of the mentioned field is being systematized and normalized. However, the ratio between Lithuanian and borrowed terms is not fully acceptable yet, and it is partially determined by disagreement among specialists on the status of synonymous terms and the choice of them.

  8. JPRS Report, Science & Technology, USSR: Computers.

    Science.gov (United States)

    2007-11-02

    standpoint of task formulation and performance. These are the recognition of images created by man for Interaction with a computer; the recognition of...systems for visual inspection of the shape of tablets on a pharmaceutical conveyer line or research systems for analyzing the images of three...34 fuzziness " (disorderliness) of the knowledge. 11 It is well known that certain tasks related to image interpretation are accomplished in

  9. Medical imaging technology reviews and computational applications

    CERN Document Server

    Dewi, Dyah

    2015-01-01

    This book presents the latest research findings and reviews in the field of medical imaging technology, covering ultrasound diagnostics approaches for detecting osteoarthritis, breast carcinoma and cardiovascular conditions, image guided biopsy and segmentation techniques for detecting lung cancer, image fusion, and simulating fluid flows for cardiovascular applications. It offers a useful guide for students, lecturers and professional researchers in the fields of biomedical engineering and image processing.

  10. USSR Report, Cybernetics, Computers and Automation Technology.

    Science.gov (United States)

    1987-03-02

    quality silage preservative and shampoo from waste fat from the fish-canning industry. One can also name an improved oil shale processing technology...institution section of the CC CP of Estonia , and V. Rayangu, minister of higher and secondary special education of the EsSSR participated in the work of the...name at the Tallinn Polytechnical Institute. This is the first such department in Estonia . In practice it has already become an intersectorial

  11. USSR Report, Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    genetic engineering and laser technology. And now there is a new goal, a new highly complex task: elec- tronics. According to available estimates, as...by enterprises of other ministries. More than 100 cities are to be included in this system. FTD /SNAP CSO: 1863/184 11 JPRS-UCC-85-003 23 April...robotiza- tion. FTD /SNAP CSO: 1863/184 58 JPRS-UCC-85-003 23 April 1985 ENHANCED-FLEXIBILITY ROBOT HAND MODULES INVENTED Moscow

  12. 9th International Conference on Advanced Computing & Communication Technologies

    CERN Document Server

    Mandal, Jyotsna; Auluck, Nitin; Nagarajaram, H

    2016-01-01

    This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27–29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.

  13. Art and Technology of Entertainment Computing and Communication

    CERN Document Server

    Cheok, Adrian David

    2010-01-01

    "Art and Technology of Entertainment Computing and Communication" takes a blue sky research perspective on the field of interactive media for entertainment computing. Adrian David Cheok argues that entertainment as an end-product is useful for interactive play, however it is also a powerful tool for learning and communication and it is also a key driver for the development of information technology. This book explores the future of entertainment technologies used for communication and describes quantum step research. It will inform and inspire readers to create their own radical inve

  14. Identification of risk factors of computer information technologies in education

    Directory of Open Access Journals (Sweden)

    Hrebniak M.P.

    2014-03-01

    Full Text Available The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and characteristics of mental ability among schoolchildren and students during training in high school. Common risk factors, while operating CIT, are: intensification and formalization of intellectual activity, adverse ergonomic parameters, unfavorable working posture, excess of hygiene standards by chemical and physical characteristics. The priority preventive directions in applying computer information technology in education are: improvement of optimal visual parameters of activity, rationalization of ergonomic parameters, minimizing of adverse effects of chemical and physical conditions, rationalization of work and rest activity.

  15. Near threshold computing technology, methods and applications

    CERN Document Server

    Silvano, Cristina

    2016-01-01

    This book explores near-threshold computing (NTC), a design-space using techniques to run digital chips (processors) near the lowest possible voltage.  Readers will be enabled with specific techniques to design chips that are extremely robust; tolerating variability and resilient against errors.  Variability-aware voltage and frequency allocation schemes will be presented that will provide performance guarantees, when moving toward near-threshold manycore chips.  ·         Provides an introduction to near-threshold computing, enabling reader with a variety of tools to face the challenges of the power/utilization wall; ·         Demonstrates how to design efficient voltage regulation, so that each region of the chip can operate at the most efficient voltage and frequency point; ·         Investigates how performance guarantees can be ensured when moving towards NTC manycores through variability-aware voltage and frequency allocation schemes.  .

  16. Towards Empowering Hearing Impaired Students' Skills in Computing and Technology

    Directory of Open Access Journals (Sweden)

    Nihal Esam Abuzinadah

    2017-01-01

    Full Text Available Studies have shown that deaf and hearing-impaired students have many difficulties in learning applied disciplines such as Medicine, Engineering, and Computer Programming. This study aims to investigate the readiness of deaf students to pursue higher education in applied sciences, more specifically in computer science. This involves investigating their capabilities in computer skills and applications. Computer programming is an integral component in the technological field that can facilitate the development of further scientific advances. Devising a manner of teaching the deaf and hearing-impaired population will give them an opportunity to contribute to the technology sector. This would allow these students to join the scientific world when otherwise; they are generally unable to participate because of the limitations they encounter. The study showed that deaf students in Jeddah are eager to continue their higher education and that a large percentage of these students are keen on studying computer science, particularly if they are provided with the right tools.

  17. AGIS: Integration of new technologies used in ATLAS Distributed Computing

    CERN Document Server

    Anisenkov, Alexey; The ATLAS collaboration; Alandes Pradillo, Maria

    2016-01-01

    AGIS is the information system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing (ADC) applications and services. In this note, we describe the evolution and the recent developments of AGIS functionalities, related to integration of new technologies recently become widely used in ATLAS Computing like flexible computing utilization of opportunistic Cloud and HPC resources, ObjectStore services integration for Distributed Data Management (Rucio) and ATLAS workload management (PanDA) systems, unified storage protocols declaration required for PandDA Pilot site movers and others.

  18. Impact of new computing systems on computational mechanics and flight-vehicle structures technology

    Science.gov (United States)

    Noor, A. K.; Storaasli, O. O.; Fulton, R. E.

    1984-01-01

    Advances in computer technology which may have an impact on computational mechanics and flight vehicle structures technology were reviewed. The characteristics of supersystems, highly parallel systems, and small systems are summarized. The interrelations of numerical algorithms and software with parallel architectures are discussed. A scenario for future hardware/software environment and engineering analysis systems is presented. Research areas with potential for improving the effectiveness of analysis methods in the new environment are identified.

  19. A study of practical proxy reencryption with a keyword search scheme considering cloud storage structure.

    Science.gov (United States)

    Lee, Sun-Ho; Lee, Im-Yeong

    2014-01-01

    Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.

  20. Extending the horizons advances in computing, optimization, and decision technologies

    CERN Document Server

    Joseph, Anito; Mehrotra, Anuj; Trick, Michael

    2007-01-01

    Computer Science and Operations Research continue to have a synergistic relationship and this book represents the results of cross-fertilization between OR/MS and CS/AI. It is this interface of OR/CS that makes possible advances that could not have been achieved in isolation. Taken collectively, these articles are indicative of the state-of-the-art in the interface between OR/MS and CS/AI and of the high caliber of research being conducted by members of the INFORMS Computing Society. EXTENDING THE HORIZONS: Advances in Computing, Optimization, and Decision Technologies is a volume that presents the latest, leading research in the design and analysis of algorithms, computational optimization, heuristic search and learning, modeling languages, parallel and distributed computing, simulation, computational logic and visualization. This volume also emphasizes a variety of novel applications in the interface of CS, AI, and OR/MS.

  1. Computer technology in education and issues of power and equity

    Directory of Open Access Journals (Sweden)

    Alper Kesten

    2010-05-01

    Full Text Available This study aims to use ‘techniques of power’ classified (based on Foucault’s work by Gore in order to illustrate power relations between supporters (or non-supporters of computer technology and teachers. For this purpose, six out of eight techniques of power (surveillance, normalization, exclusion, classification, distribution and regulation is used in formulating thoughts about computer technology and issues of power and equity. In this study, these techniques of power were discussed more detailed both to exemplify how supporters (or non-supporters of computer technology exercise power over teachers (preservice or inservice by using of major techniques of power and to show how they are related to the issue of equity.

  2. Use of computer technology to enhance immigrant families' adaptation.

    Science.gov (United States)

    Tsai, Jenny Hsin-Chun

    2006-01-01

    To summarize how computer technology influenced immigrant families' adaptation to life in the United States. Critical ethnography. Data were collected from 1998 to 2000 from 13 parents and 16 children from nine Taiwanese immigrant families using semi-structured interviews and a questionnaire. Narrative analysis was used with interview data. Participants faced the demands of language proficiency, economic survival, loss of social networks, and social disconnection during resettlement. Computer technology provided participants with new occupational opportunities and strategies to overcome the barriers and stress created by resettlement. Internet and E-mail access greatly facilitated these participant families' adaptation. Study findings warrant further exploration to assess bow new computer technology promotes immigrant families' adaptation and alleviates stress associated with resettlement, including information about their health and health care.

  3. Computer technology in oil refining: cost or benefit

    Energy Technology Data Exchange (ETDEWEB)

    Payne, B. (KBC Process Technology (GB))

    1990-04-01

    There is undoubtedly a commitment in the oil refining industry to computerise wherever possible, and to develop advanced mathematical modelling techniques to improved profitability. However, many oil refiners are now asking themselves whether computer solutions are a cost, or are truly a benefit to their organisation. Problems have been caused by distributed computing running out of control in many organisations. This has been partly brought to reign recently, by advanced networking of PCs along with mainframe facilities, and development of management information systems with common data bases for all users to build their applications on. Implementation of information technology strategies helped many refiners to plan the way ahead for the future. The use of computers across the refining sector in the current marketplace is reviewed. The conclusion drawn is that although computer technology is a cost it can also be ranked as a significant benefit and success in the refining industry at present. (author).

  4. A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues.

    Science.gov (United States)

    Nilles, Jack M.; And Others

    A technology assessment of personal computers was conducted to study both the socially desirable and undesirable impacts of this new technology in three main areas: education, employment, and international trade. Information gleaned from this study was then used to generate suggestions for public policy options which could influence these impacts.…

  5. International Conference on Computer Science and Information Technology

    CERN Document Server

    Li, Xiaolong

    2014-01-01

    The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational Sciences and Information Technology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computer science, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.

  6. Field-programmable custom computing technology architectures, tools, and applications

    CERN Document Server

    Luk, Wayne; Pocek, Ken

    2000-01-01

    Field-Programmable Custom Computing Technology: Architectures, Tools, and Applications brings together in one place important contributions and up-to-date research results in this fast-moving area. In seven selected chapters, the book describes the latest advances in architectures, design methods, and applications of field-programmable devices for high-performance reconfigurable systems. The contributors to this work were selected from the leading researchers and practitioners in the field. It will be valuable to anyone working or researching in the field of custom computing technology. It serves as an excellent reference, providing insight into some of the most challenging issues being examined today.

  7. Team Viewer Technology for Remote Control of a Computer

    Directory of Open Access Journals (Sweden)

    Cornelia Victoria Anghel Drugarin

    2016-10-01

    Full Text Available Team Viewer software is used to remote control our PC. We can use this remote control technology to desktop sharing, online conferences and for file transfer between computers. Basically, using this software, you can ask for help a friend, or professional software to solve problems from a distance, without it having to be physically go to each client / friend in part. After installed and configured Team Viewer application, is complete, we can remote control the computer.

  8. Computer-aided Translation Technology and Its Applications

    Institute of Scientific and Technical Information of China (English)

    汪美侠; 何大顺

    2014-01-01

    This article begins with a brief analysis of the significance of translation technology in different spheres of modern life, followed by a distinction between machine translation (MT) and computer-aided translation (CAT). It then describes some trans-lation resources and tools and examines the negative and positive aspects of computer-aided translations. Finally it comes to a conclusion that it would be greatly efficient and productive for the translators to acquire the new skills in the translation work-place.

  9. JPRS Report, Science & Technology, Europe, First International Computers Communications Conference

    Science.gov (United States)

    2007-11-02

    Hong Kong Telephone has employed fibre optic technology in its transmission network since 1981. Fibre optic transmission systems are used to...leased datalines. The potentials of fibre optic systems are large, and in this paper, some examples will be given to illustrate how the attributes of... fibre optic systems are exploited in Hong Kong Telephone. This report of Science & Technology Europe, First International Computers Communications Conference.

  10. PKIS: practical keyword index search on cloud datacenter

    Directory of Open Access Journals (Sweden)

    Park Jae Hyun

    2011-01-01

    Full Text Available Abstract This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms under the provable security, they do not focus on the interoperability of the encrypted DB. In order to address this lack of practical aspects, we conduct two practical approaches--efficiency and group search in cloud datacenter. The process of this paper is as follows: first, we create two schemes of efficiency and group search--practical keyword index search--I and II; second, we define and analyze group search secrecy and keyword index search privacy in our schemes; third, we experiment on efficient performances over our proposed encrypted DB. As the result, we summarize two major results: (1our proposed schemes can support a secure group search without re-encrypting all documents under the group-key update and (2our experiments represent that our scheme is approximately 935 times faster than Golle's scheme and about 16 times faster than Song's scheme for 10,000 documents. Based on our experiments and results, this paper has the following contributions: (1 in the current cloud computing environments, our schemes provide practical, realistic, and secure solutions over the encrypted DB and (2 this paper identifies the importance of interoperability with database management system for designing efficient schemes.

  11. Fundamentals of grid computing theory, algorithms and technologies

    CERN Document Server

    2010-01-01

    This volume discusses how the novel technologies of semantic web and workflow have been integrated into the grid and grid services. It focuses on sharing resources, data replication, data management, fault tolerance, scheduling, broadcasting, and load balancing algorithms. The book discusses emerging developments in grid computing, including cloud computing, and explores large-scale computing in high energy physics, weather forecasting, and more. The contributors often use simulations to evaluate the performance of models and algorithms. In the appendices, they present two types of easy-to-use open source software written in Java

  12. 11th International Conference on Computing and Information Technology

    CERN Document Server

    Meesad, Phayung; Boonkrong, Sirapat

    2015-01-01

    This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.

  13. 2nd International Conference on Computer and Communication Technologies

    CERN Document Server

    Raju, K; Mandal, Jyotsna; Bhateja, Vikrant

    2016-01-01

    The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the te...

  14. The biological aspects of physiological anthropology with reference to its five keywords.

    Science.gov (United States)

    Iwanaga, Koichi

    2005-05-01

    The methodology of physiological anthropology has been defined in the capacity of an independent academic field by five keywords: environmental adaptability, technological adaptability, physiological polymorphism, whole-body coordination and functional potentiality, clearly suggesting the direction of approach to human beings in the field of physiological anthropology. Recently, these keywords have attracted a great deal of attention from physiological anthropologists in Japan. Physiological anthropology is based on a biological framework. From the viewpoint of biology, it is essential to discuss the biological function of human behavior. In this brief conceptual manuscript, the biological aspects of physiological anthropology are discussed in relation to the five keywords.

  15. Information Technology in project-organized electronic and computer technology engineering education

    DEFF Research Database (Denmark)

    Nielsen, Kirsten Mølgaard; Nielsen, Jens Frederik Dalsgaard

    1999-01-01

    This paper describes the integration of IT in the education of electronic and computer technology engineers at Institute of Electronic Systems, Aalborg Uni-versity, Denmark. At the Institute Information Technology is an important tool in the aspects of the education as well as for communication...

  16. The Adoption of Grid Computing Technology by Organizations: A Quantitative Study Using Technology Acceptance Model

    Science.gov (United States)

    Udoh, Emmanuel E.

    2010-01-01

    Advances in grid technology have enabled some organizations to harness enormous computational power on demand. However, the prediction of widespread adoption of the grid technology has not materialized despite the obvious grid advantages. This situation has encouraged intense efforts to close the research gap in the grid adoption process. In this…

  17. Troubling Discourse: Basic Writing and Computer-Mediated Technologies

    Science.gov (United States)

    Jonaitis, Leigh A.

    2012-01-01

    Through an examination of literature in the fields of Basic Writing and developmental education, this essay provides some historical perspective and examines the prevalent discourses on the use of computer-mediated technologies in the basic writing classroom. The author uses Bertram Bruce's (1997) framework of various "stances" on…

  18. Creating the Environment for the Prosperity of Cloud Computing Technology

    Directory of Open Access Journals (Sweden)

    Wen-Hsing Lai

    2012-08-01

    Full Text Available The key point for the success of clouding computing technology in terms of application is whether such operation can produce the sense of trustworthiness to its users. Technical measurement has always been the fundamental preventive precaution, no matter what kind of aspect in dealing with producing the sense of trustworthiness.  Except technical measurement, there are two developing issues surrounding the central idea worth notice, which are the protection of information privacy and the jurisdictional issue. The main purpose of this article is to focus on the issue of protecting information privacy and jurisdictional problem through the newly developed cloud computing technology. This article will first introduce the characteristics of cloud computing technology in order to pave the way for further discussion. Then the issue of protecting information privacy and jurisdictional problem will be discussed through disparity of legal protection of information privacy and principles for asserting jurisdiction within Internet. The personal observation and suggestion will be made at the end of this article for a future possible adjustment of infrastructure for the protection of information privacy and jurisdictional decision within cyberspace in order to promote the sense of trustworthiness of the cloud computing technology user.

  19. Computer-Assisted Foreign Language Teaching and Learning: Technological Advances

    Science.gov (United States)

    Zou, Bin; Xing, Minjie; Wang, Yuping; Sun, Mingyu; Xiang, Catherine H.

    2013-01-01

    Computer-Assisted Foreign Language Teaching and Learning: Technological Advances highlights new research and an original framework that brings together foreign language teaching, experiments and testing practices that utilize the most recent and widely used e-learning resources. This comprehensive collection of research will offer linguistic…

  20. Application and prospect of computer technology in welding materials field

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper summarizes the application status of computer technology in welding materials field from three aspects: the CAD of welding materials, the date base system for welding materials and the expert system for welding materials .Besides, this paper explores and discusses the existing problems and the developing trend in the future.

  1. Computer Technology Integration and Student Learning: Barriers and Promise

    Science.gov (United States)

    Keengwe, Jared; Onchwari, Grace; Wachira, Patrick

    2008-01-01

    Political and institutional support has enabled many institutions of learning to spend millions of dollars to acquire educational computing tools (Ficklen and Muscara, "Am Educ" 25(3):22-29, 2001) that have not been effectively integrated into the curriculum. While access to educational technology tools has remarkably improved in most schools,…

  2. Computer Software for Forestry Technology Curricula. Final Report.

    Science.gov (United States)

    Watson, Roy C.; Scobie, Walter R.

    Since microcomputers are being used more and more frequently in the forest products industry in the Pacific Northwest, Green River Community College conducted a project to search for BASIC language computer programs pertaining to forestry, and when possible, to adapt such software for use in teaching forestry technology. The search for applicable…

  3. Computational Structures Technology for Airframes and Propulsion Systems

    Science.gov (United States)

    Noor, Ahmed K. (Compiler); Housner, Jerrold M. (Compiler); Starnes, James H., Jr. (Compiler); Hopkins, Dale A. (Compiler); Chamis, Christos C. (Compiler)

    1992-01-01

    This conference publication contains the presentations and discussions from the joint University of Virginia (UVA)/NASA Workshops. The presentations included NASA Headquarters perspectives on High Speed Civil Transport (HSCT), goals and objectives of the UVA Center for Computational Structures Technology (CST), NASA and Air Force CST activities, CST activities for airframes and propulsion systems in industry, and CST activities at Sandia National Laboratory.

  4. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  5. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  6. Providing Assistive Technology Applications as a Service Through Cloud Computing.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Users with disabilities interact with Personal Computers (PCs) using Assistive Technology (AT) software solutions. Such applications run on a PC that a person with a disability commonly uses. However the configuration of AT applications is not trivial at all, especially whenever the user needs to work on a PC that does not allow him/her to rely on his / her AT tools (e.g., at work, at university, in an Internet point). In this paper, we discuss how cloud computing provides a valid technological solution to enhance such a scenario.With the emergence of cloud computing, many applications are executed on top of virtual machines (VMs). Virtualization allows us to achieve a software implementation of a real computer able to execute a standard operating system and any kind of application. In this paper we propose to build personalized VMs running AT programs and settings. By using the remote desktop technology, our solution enables users to control their customized virtual desktop environment by means of an HTML5-based web interface running on any computer equipped with a browser, whenever they are.

  7. Innovative Use of Cloud Computing in Smart Phone Technology

    Directory of Open Access Journals (Sweden)

    Vaibhav Rana

    2013-07-01

    Full Text Available This paper elaborates the vital and innovative use of Cloud computing in the field of Smart Phone Technology. In the proposed environment there is a cloud server installed at the central place called as cloud center of mobile computing. The function of cloud computing is to accept the request of the end users and process the required applications accordingly. Henceforth this server is fully equipped with all advance ICT infrastructure, mobile communication utilities and full security measure, so that every feature can be used with full security. All users are having equal priority to get connection with the cloud server and use every application as well as each function equally. Due to use of this modern technology the main advantage is that a single entity is being used by many remote users for various requirements at the same time without occupying much space and infrastructure. The resulting new paradigm of mobile cloud computing is being embraced by researchers, professionals and practitioners as an exciting new way to extend the capabilities of mobile devices and mobile platforms. This has the potential for profound impacts on the business environment and people's daily life. The most salient feature of the system is that by the use of this infrastructure we can perform mobile communication and electronic communication by a single unit and the same communication spectrum. The presented cloud computing technology offers a natural solution for expending the limited capabilities of mobile devices. This process makes the whole communication system cost effective, efficient, transparent, modular system.

  8. Public-key Encryption with Registered Keyword Search

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is

  9. Human-Computer Etiquette Cultural Expectations and the Design Implications They Place on Computers and Technology

    CERN Document Server

    Hayes, Caroline C

    2010-01-01

    Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces. Providing a complete introduction to the design of social responses to computers, the text emphasizes the value of social norms in the development of usable and enjoyable technology. It also describes the role of socially correct behavior in t

  10. Guide to cloud computing for business and technology managers from distributed computing to cloudware applications

    CERN Document Server

    Kale, Vivek

    2014-01-01

    Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book:Introduces the enterprise applications integration (EAI) solutions that were a first ste

  11. Overview of European technology in computers, telecommunications, and electronics

    Science.gov (United States)

    Blackburn, J. F.

    1990-05-01

    The emergence of the personal computer, the growing use of distributed systems, and the increasing demand for supercomputers and mini-supercomputers are causing a profound impact on the European computer market. An equally profound development in telecommunications is the integration of voice, data, and images in the public network systems - the Integrated Service Digital Network (ISDN). The programs being mounted in Europe to meet the challenges of these technologies are described. The Europe-wide trends and actions with respect to computers, telecommunications, and microelectronics are discussed, and the major European collaborative programs in these fields are described. Specific attention is given to the European Strategic Programme for Research and Development in Information (ESPRIT); Research in Advanced Communications for Europe (RACE); European Research Coordination Agency (Eureka) programs; Joint European Submicron Silicon Initiative (JESSI); and the recently combined programs Basic Research Industrial Technologies in Europe/European Research in Advanced Materials (BRITE/EURAM).

  12. Advanced computer modeling techniques expand belt conveyor technology

    Energy Technology Data Exchange (ETDEWEB)

    Alspaugh, M.

    1998-07-01

    Increased mining production is continuing to challenge engineers and manufacturers to keep up. The pressure to produce larger and more versatile equipment is increasing. This paper will show some recent major projects in the belt conveyor industry that have pushed the limits of design and engineering technology. Also, it will discuss the systems engineering discipline and advanced computer modeling tools that have helped make these achievements possible. Several examples of technologically advanced designs will be reviewed. However, new technology can sometimes produce increased problems with equipment availability and reliability if not carefully developed. Computer modeling techniques that help one design larger equipment can also compound operational headaches if engineering processes and algorithms are not carefully analyzed every step of the way.

  13. Management of information for mission operations using automated keyword referencing

    Science.gov (United States)

    Davidson, Roger A.; Curran, Patrick S.

    1993-01-01

    Although millions of dollars have helped to improve the operability and technology of ground data systems for mission operations, almost all mission documentation remains bound in printed volumes. This form of documentation is difficult and timeconsuming to use, may be out-of-date, and is usually not cross-referenced with other related volumes of mission documentation. A more effective, automated method of mission information access is needed. A new method of information management for mission operations using automated keyword referencing is proposed. We expound on the justification for and the objectives of this concept. The results of a prototype tool for mission information access that uses a hypertextlike user interface and existing mission documentation are shared. Finally, the future directions and benefits of our proposed work are described.

  14. Beyond Keyword Search: Discovering Relevant Scientific Literature

    Science.gov (United States)

    2011-06-01

    12134 8490 9318 10372 Carl Nathan , MDnitrogen 10161 9318 Figure 5: Example illustrating trust calculation for an immunologist asking, “How much do I...trust Carl Nathan with respect to the concept ‘nitrogen’?” Thick dashed lines indicate influence from Dr. Nathan to individual elements of B, and pie...or Van Jacobson (computer networks), depending on who is answering. All are distinguished researchers, but each is associated with a distinct subfield

  15. 4th International Conference on Applied Computing and Information Technology

    CERN Document Server

    2017-01-01

    This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12–14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. Th...

  16. Research on application of computer technologies in jewelry process

    Directory of Open Access Journals (Sweden)

    Junbo Xia

    2017-02-01

    Full Text Available Jewelry production is a process of precious raw materials and low losses in processing. The traditional manual mode is unable to meet the needs of enterprises in reality, while the involvement of computer technology can just solve this practical problem. At present, the problem of restricting the application for computer in jewelry production is mainly a failure to find a production model that can serve the whole industry chain with the computer as the core of production. This paper designs a “synchronous and diversified” production model with “computer aided design technology” and “rapid prototyping technology” as the core, and tests with actual production cases, and achieves certain results, which are forward-looking and advanced.

  17. Computing, information, and communications: Technologies for the 21. Century

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  18. Computational technology of multiscale modeling the gas flows in microchannels

    Science.gov (United States)

    Podryga, V. O.

    2016-11-01

    The work is devoted to modeling the gas mixture flows in engineering microchannels under conditions of many scales of computational domain. The computational technology of using the multiscale approach combining macro - and microscopic models is presented. At macrolevel the nature of the flow and the external influence on it are considered. As a model the system of quasigasdynamic equations is selected. At microlevel the correction of gasdynamic parameters and the determination of boundary conditions are made. As a numerical model the Newton's equations and the molecular dynamics method are selected. Different algorithm types used for implementation of multiscale modeling are considered. The results of the model problems for separate stages are given.

  19. Genetic Algorithm Modeling with GPU Parallel Computing Technology

    CERN Document Server

    Cavuoti, Stefano; Brescia, Massimo; Pescapé, Antonio; Longo, Giuseppe; Ventre, Giorgio

    2012-01-01

    We present a multi-purpose genetic algorithm, designed and implemented with GPGPU / CUDA parallel computing technology. The model was derived from a multi-core CPU serial implementation, named GAME, already scientifically successfully tested and validated on astrophysical massive data classification problems, through a web application resource (DAMEWARE), specialized in data mining based on Machine Learning paradigms. Since genetic algorithms are inherently parallel, the GPGPU computing paradigm has provided an exploit of the internal training features of the model, permitting a strong optimization in terms of processing performances and scalability.

  20. Digital image processing using parallel computing based on CUDA technology

    Science.gov (United States)

    Skirnevskiy, I. P.; Pustovit, A. V.; Abdrashitova, M. O.

    2017-01-01

    This article describes expediency of using a graphics processing unit (GPU) in big data processing in the context of digital images processing. It provides a short description of a parallel computing technology and its usage in different areas, definition of the image noise and a brief overview of some noise removal algorithms. It also describes some basic requirements that should be met by certain noise removal algorithm in the projection to computer tomography. It provides comparison of the performance with and without using GPU as well as with different percentage of using CPU and GPU.

  1. 12th International Conference on Computing and Information Technology

    CERN Document Server

    Boonkrong, Sirapat; Unger, Herwig

    2016-01-01

    This proceedings book presents recent research work and results in the area of communication and information technologies. The chapters of this book contain the main, well-selected and reviewed contributions of scientists who met at the 12th International Conference on Computing and Information Technology (IC2IT) held during 7th - 8th July 2016 in Khon Kaen, Thailand The book is divided into three parts: “User Centric Data Mining and Text Processing”, “Data Mining Algoritms and their Applications” and “Optimization of Complex Networks”.

  2. Technology computer aided design simulation for VLSI MOSFET

    CERN Document Server

    Sarkar, Chandan Kumar

    2013-01-01

    Responding to recent developments and a growing VLSI circuit manufacturing market, Technology Computer Aided Design: Simulation for VLSI MOSFET examines advanced MOSFET processes and devices through TCAD numerical simulations. The book provides a balanced summary of TCAD and MOSFET basic concepts, equations, physics, and new technologies related to TCAD and MOSFET. A firm grasp of these concepts allows for the design of better models, thus streamlining the design process, saving time and money. This book places emphasis on the importance of modeling and simulations of VLSI MOS transistors and

  3. Cloud computing and patient engagement: leveraging available technology.

    Science.gov (United States)

    Noblin, Alice; Cortelyou-Ward, Kendall; Servan, Rosa M

    2014-01-01

    Cloud computing technology has the potential to transform medical practices and improve patient engagement and quality of care. However, issues such as privacy and security and "fit" can make incorporation of the cloud an intimidating decision for many physicians. This article summarizes the four most common types of clouds and discusses their ideal uses, how they engage patients, and how they improve the quality of care offered. This technology also can be used to meet Meaningful Use requirements 1 and 2; and, if speculation is correct, the cloud will provide the necessary support needed for Meaningful Use 3 as well.

  4. Foundations of software technology and theoretical computer science

    Energy Technology Data Exchange (ETDEWEB)

    Madhavan, C.E.V. (Indian Inst. of Science, Bangalore (IN))

    1990-01-01

    The papers in this book report on foundations of software technology and theoretical computer science project research results. The authors report on algorithmics: design and analysis of graph, geometric, algebraic and VLSI algorithms; data structures; average analysis; complexity theory; parallel parsing; concurrency; algebraic semantics, event structures; logic programming; algebraic properties, semantics; and software technology: program transformations, algebraic methods. These results together with the formal techniques employed to present them reflect current trends pursued by research groups around the world. The papers treat their topics by reviewing existing results, developing and demonstrating new techniques and suggesting further directions for research.

  5. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  6. Alternative treatment technology information center computer database system

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, D. [Environmental Protection Agency, Edison, NJ (United States)

    1995-10-01

    The Alternative Treatment Technology Information Center (ATTIC) computer database system was developed pursuant to the 1986 Superfund law amendments. It provides up-to-date information on innovative treatment technologies to clean up hazardous waste sites. ATTIC v2.0 provides access to several independent databases as well as a mechanism for retrieving full-text documents of key literature. It can be accessed with a personal computer and modem 24 hours a day, and there are no user fees. ATTIC provides {open_quotes}one-stop shopping{close_quotes} for information on alternative treatment options by accessing several databases: (1) treatment technology database; this contains abstracts from the literature on all types of treatment technologies, including biological, chemical, physical, and thermal methods. The best literature as viewed by experts is highlighted. (2) treatability study database; this provides performance information on technologies to remove contaminants from wastewaters and soils. It is derived from treatability studies. This database is available through ATTIC or separately as a disk that can be mailed to you. (3) underground storage tank database; this presents information on underground storage tank corrective actions, surface spills, emergency response, and remedial actions. (4) oil/chemical spill database; this provides abstracts on treatment and disposal of spilled oil and chemicals. In addition to these separate databases, ATTIC allows immediate access to other disk-based systems such as the Vendor Information System for Innovative Treatment Technologies (VISITT) and the Bioremediation in the Field Search System (BFSS). The user may download these programs to their own PC via a high-speed modem. Also via modem, users are able to download entire documents through the ATTIC system. Currently, about fifty publications are available, including Superfund Innovative Technology Evaluation (SITE) program documents.

  7. Suspense is the Key. Narratology, Cognitive Neurosciences and Computer Technology

    Directory of Open Access Journals (Sweden)

    Stefano Calabrese

    2016-01-01

    Full Text Available The Narratology of new generation shows renewed heuristic scenarios, providing an intense dialogue among Humanities, Cognitive Neuroscience and Computer Technology. The suspense case is emblematic: its spread and the pleasure exercised by this rhetorical strategy on the human mind can be precisely explained by identifying the mechanisms of reward provided by neurological and Imaging studies. At the same time, patterns of automatic generation of narrative highlight the profound implications of a heated debate between Narratology and Computer Technology, in order to understand the processes of reception and inference during the narrative immersion in storyworlds. At the end of overview on of a cross-disciplinary approach of suspense analysis, the authors repost a case study considered of interest, provided by the North Caroline State University researchers group, called Liquid Narrative Group. 

  8. Importance of Computer Model Validation in Pyroprocessing Technology Development

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Y. E.; Li, Hui; Yim, M. S. [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2014-05-15

    In this research, we developed a plan for experimental validation of one of the computer models developed for ER process modeling, i. e., the ERAD code. Several candidate surrogate materials are selected for the experiment considering the chemical and physical properties. Molten salt-based pyroprocessing technology is being examined internationally as an alternative to treat spent nuclear fuel over aqueous technology. The central process in pyroprocessing is electrorefining(ER) which separates uranium from transuranic elements and fission products present in spent nuclear fuel. ER is a widely used process in the minerals industry to purify impure metals. Studies of ER by using actual spent nuclear fuel materials are problematic for both technical and political reasons. Therefore, the initial effort for ER process optimization is made by using computer models. A number of models have been developed for this purpose. But as validation of these models is incomplete and often times problematic, the simulation results from these models are inherently uncertain.

  9. Integrating computer technology in the teaching of Biology

    OpenAIRE

    GarrawayLashley, Yassanne

    2014-01-01

    Over the past decade, the number of students who gained satisfactory passes at the Caribbean Secondary Education Certificate (CSEC) in Biology in Guyana has been few. This poor performance may be attributed to the traditional method of teaching that was used to teach Biology. This study therefore ascertained if the integration of computer technology into the teaching of Biology would enhance students’ academic performance. The study was guided by a null research hypothesis. Hence, the related...

  10. Vector Field Visual Data Analysis Technologies for Petascale Computational Science

    Energy Technology Data Exchange (ETDEWEB)

    Garth, Christoph; Deines, Eduard; Joy, Kenneth I.; Bethel, E. Wes; Childs, Hank; Weber, Gunther; Ahern, Sean; Pugmire, Dave; Sanderson, Allen; Johnson, Chris

    2009-11-13

    State-of-the-art computational science simulations generate large-scale vector field data sets. Visualization and analysis is a key aspect of obtaining insight into these data sets and represents an important challenge. This article discusses possibilities and challenges of modern vector field visualization and focuses on methods and techniques developed in the SciDAC Visualization and Analytics Center for Enabling Technologies (VACET) and deployed in the open-source visualization tool, VisIt.

  11. Using Soft Computing Technologies for the Simulation of LCAC Dynamics

    Science.gov (United States)

    2011-09-01

    real-time, time-domain predictions of the vehicle’s dynamics as a function of the control signals given by the driver. Results are presented...free- running LCAC model, faster-than-real-time simulation, soft computing technology 1.0 INTRODUCTION The Maneuvering and Control Division (MCD...like all hovercraft , rides on a cushion of air. The air is supplied to the cushion by four centrifugal fans driven by the craft’s gas turbine

  12. The Application of Computer Music Technology to College Students

    Directory of Open Access Journals (Sweden)

    Wang Na

    2016-01-01

    Full Text Available Contemporary music education started late in China on the basis of western teaching theories formed its own unique system, which has a great influence on present computer music technology. This paper explores that contemporary music education is analyzed advantages and disadvantages of the influence on the development of Chinese class music, and the solutions are found out to the existing problems, summed up the reality enlightenment of that the contemporary music on the impact of education.

  13. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  14. Advances in parallel computer technology for desktop atmospheric dispersion models

    Energy Technology Data Exchange (ETDEWEB)

    Bian, X.; Ionescu-Niscov, S.; Fast, J.D. [Pacific Northwest National Lab., Richland, WA (United States); Allwine, K.J. [Allwine Enviornmental Serv., Richland, WA (United States)

    1996-12-31

    Desktop models are those models used by analysts with varied backgrounds, for performing, for example, air quality assessment and emergency response activities. These models must be robust, well documented, have minimal and well controlled user inputs, and have clear outputs. Existing coarse-grained parallel computers can provide significant increases in computation speed in desktop atmospheric dispersion modeling without considerable increases in hardware cost. This increased speed will allow for significant improvements to be made in the scientific foundations of these applied models, in the form of more advanced diffusion schemes and better representation of the wind and turbulence fields. This is especially attractive for emergency response applications where speed and accuracy are of utmost importance. This paper describes one particular application of coarse-grained parallel computer technology to a desktop complex terrain atmospheric dispersion modeling system. By comparing performance characteristics of the coarse-grained parallel version of the model with the single-processor version, we will demonstrate that applying coarse-grained parallel computer technology to desktop atmospheric dispersion modeling systems will allow us to address critical issues facing future requirements of this class of dispersion models.

  15. A virtual computer lab for distance biomedical technology education

    Science.gov (United States)

    Locatis, Craig; Vega, Anibal; Bhagwat, Medha; Liu, Wei-Li; Conde, Jose

    2008-01-01

    Background The National Library of Medicine's National Center for Biotechnology Information offers mini-courses which entail applying concepts in biochemistry and genetics to search genomics databases and other information sources. They are highly interactive and involve use of 3D molecular visualization software that can be computationally taxing. Methods Methods were devised to offer the courses at a distance so as to provide as much functionality of a computer lab as possible, the venue where they are normally taught. The methods, which can be employed with varied videoconferencing technology and desktop sharing software, were used to deliver mini-courses at a distance in pilot applications where students could see demonstrations by the instructor and the instructor could observe and interact with students working at their remote desktops. Results Student ratings of the learning experience and comments to open ended questions were similar to those when the courses are offered face to face. The real time interaction and the instructor's ability to access student desktops from a distance in order to provide individual assistance and feedback were considered invaluable. Conclusion The technologies and methods mimic much of the functionality of computer labs and may be usefully applied in any context where content changes frequently, training needs to be offered on complex computer applications at a distance in real time, and where it is necessary for the instructor to monitor students as they work. PMID:18366629

  16. Some Issues on Computer Networks: Architecture and Key Technologies

    Institute of Scientific and Technical Information of China (English)

    Guan-Qun Gu; Jun-Zhou Luo

    2006-01-01

    The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware,wireless/mobile network, new generation network services and applications, and foundational theories on network modeling.Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.

  17. Bayesian Framework for Automatic Image Annotation Using Visual Keywords

    Science.gov (United States)

    Agrawal, Rajeev; Wu, Changhua; Grosky, William; Fotouhi, Farshad

    In this paper, we propose a Bayesian probability based framework, which uses visual keywords and already available text keywords to automatically annotate the images. Taking the cue from document classification, an image can be considered as a document and objects present in it as words. Using this concept, we can create visual keywords by dividing an image into tiles based on a certain template size. Visual keywords are simple vector quantization of small-sized image tiles. We estimate the conditional probability of a text keyword in the presence of visual keywords, described by a multivariate Gaussian distribution. We demonstrate the effectiveness of our approach by comparing predicted text annotations with manual annotations and analyze the effect of text annotation length on the performance.

  18. Application of Computer Integration Technology for Fire Safety Analysis

    Institute of Scientific and Technical Information of China (English)

    SHI Jianyong; LI Yinqing; CHEN Huchuan

    2008-01-01

    With the development of information technology, the fire safety assessment of whole structure or region based on the computer simulation has become a hot topic. However, traditionally, the concemed studies are performed separately for different objectives and difficult to perform an overall evaluation. A new multi-dimensional integration model and methodology for fire safety assessment were presented and two newly developed integrated systems were introduced to demonstrate the function of integration simulation technology in this paper. The first one is the analysis on the fire-resistant behaviors of whole structure under real fire loads. The second one is the study on fire evaluation and emergency rescue of campus based on geography information technology (GIS). Some practical examples are presented to illuminate the advan-tages of computer integration technology on fire safety assessment and emphasize some problems in the simulation. The results show that the multi-dimensional integration model offers a new way and platform for the integrating fire safety assessment of whole structure or region, and the integrated software developed is the useful engineering tools for cost-saving and safe design.

  19. Discuss the Development of Computer-Aided Industrial Design Technology

    Directory of Open Access Journals (Sweden)

    Jun Yao

    2013-01-01

    Full Text Available The direction of the development of the industrial design gradually approaches mechanical-electrical integration and informational and electronic products. With an increasing improvement of its technical content, and better social economic conditions, peoples consumption concept are getting more and more different. Consumer concerns not just the functionality and quality of the product, more and more people are starting to focus on the appearance of the product, degree of innovation, environmental protection, and so on, which brings a higher degree of difficulty to the industrial technology. It is because the increasing demands of people and the industrial design, many scholars are increasingly concerned about the industrial design in recent years. With the continuous development of computer technology, a wide variety of hardware and software are developed, and a variety of ever-changing technologies are attracting the industrial design talents as well.

  20. Experiences in automatic keywording of particle physics literature

    CERN Document Server

    Montejo Ráez, Arturo

    2001-01-01

    Attributing keywords can assist in the classification and retrieval of documents in the particle physics literature. As information services face a future with less available manpower and more and more documents being written, the possibility of keyword attribution being assisted by automatic classification software is explored. A project being carried out at CERN (the European Laboratory for Particle Physics) for the development and integration of automatic keywording is described.

  1. Toward a deeper understanding of Visualization through keyword analysis

    OpenAIRE

    2014-01-01

    We present the results of a comprehensive analysis of visualization paper keywords supplied for 4366 papers submitted to five main visualization conferences. We describe main keywords, topic areas, and 10-year historic trends from two datasets: (1) the standardized PCS taxonomy keywords in use for paper submissions for IEEE InfoVis, IEEE Vis-SciVis, IEEE VAST, EuroVis, and IEEE PacificVis since 2009 and (2) the author-chosen keywords for papers published in the IEEE Visualization conference s...

  2. Incremental Training for SVM-Based Classification with Keyword Adjusting

    Institute of Scientific and Technical Information of China (English)

    SUN Jin-wen; YANG Jian-wu; LU Bin; XIAO Jian-guo

    2004-01-01

    This paper analyzed the theory of incremental learning of SVM (support vector machine) and pointed out it is a shortage that the support vector optimization is only considered in present research of SVM incremental learning.According to the significance of keyword in training, a new incremental training method considering keyword adjusting was proposed, which eliminates the difference between incremental learning and batch learning through the keyword adjusting.The experimental results show that the improved method outperforms the method without the keyword adjusting and achieve the same precision as the batch method.

  3. Computer program for distance learning of pesticide application technology.

    Science.gov (United States)

    Maia, Bruno; Cunha, Joao P A R

    2011-12-01

    Distance learning presents great potential for mitigating field problems on pesticide application technology. Thus, due to the lack of teaching material about pesticide spraying technology in the Portuguese language and the increasing availability of distance learning, this study developed and evaluated a computer program for distance learning about the theory of pesticide spraying technology using the tools of information technology. The modules comprising the course, named Pulverizar, were: (1) Basic concepts, (2) Factors that affect application, (3) Equipments, (4) Spraying nozzles, (5) Sprayer calibration, (6) Aerial application, (7) Chemigation, (8) Physical-chemical properties, (9) Formulations, (10) Adjuvants, (11) Water quality, and (12) Adequate use of pesticides. The program was made available to the public on July 1(st), 2008, hosted at the web site www.pulverizar.iciag.ufu.br, and was simple, robust and practical on the complementation of traditional teaching for the education of professionals in Agricultural Sciences. Mastering pesticide spraying technology by people involved in agricultural production can be facilitated by the program Pulverizar, which was well accepted in its initial evaluation.

  4. Computer technology applications in industrial and organizational psychology.

    Science.gov (United States)

    Crespin, Timothy R; Austin, James T

    2002-08-01

    This article reviews computer applications developed and utilized by industrial-organizational (I-O) psychologists, both in practice and in research. A primary emphasis is on applications developed for Internet usage, because this "network of networks" changes the way I-O psychologists work. The review focuses on traditional and emerging topics in I-O psychology. The first topic involves information technology applications in measurement, defined broadly across levels of analysis (persons, groups, organizations) and domains (abilities, personality, attitudes). Discussion then focuses on individual learning at work, both in formal training and in coping with continual automation of work. A section on job analysis follows, illustrating the role of computers and the Internet in studying jobs. Shifting focus to the group level of analysis, we briefly review how information technology is being used to understand and support cooperative work. Finally, special emphasis is given to the emerging "third discipline" in I-O psychology research-computational modeling of behavioral events in organizations. Throughout this review, themes of innovation and dissemination underlie a continuum between research and practice. The review concludes by setting a framework for I-O psychology in a computerized and networked world.

  5. Computational Fluid Dynamics (CFD) Technology Programme 1995- 1999

    Energy Technology Data Exchange (ETDEWEB)

    Haekkinen, R.J.; Hirsch, C.; Krause, E.; Kytoemaa, H.K. [eds.

    1997-12-31

    The report is a mid-term evaluation of the Computational Fluid Dynamics (CFD) Technology Programme started by Technology Development Centre Finland (TEKES) in 1995 as a five-year initiative to be concluded in 1999. The main goal of the programme is to increase the know-how and application of CFD in Finnish industry, to coordinate and thus provide a better basis for co-operation between national CFD activities and encouraging research laboratories and industry to establish co-operation with the international CFD community. The projects of the programme focus on the following areas: (1) studies of modeling the physics and dynamics of the behaviour of fluid material, (2) expressing the physical models in a numerical mode and developing a computer codes, (3) evaluating and testing current physical models and developing new ones, (4) developing new numerical algorithms, solvers, and pre- and post-processing software, and (5) applying the new computational tools to problems relevant to their ultimate industrial use. The report consists of two sections. The first considers issues concerning the whole programme and the second reviews each project

  6. Integrated Geo Hazard Management System in Cloud Computing Technology

    Science.gov (United States)

    Hanifah, M. I. M.; Omar, R. C.; Khalid, N. H. N.; Ismail, A.; Mustapha, I. S.; Baharuddin, I. N. Z.; Roslan, R.; Zalam, W. M. Z.

    2016-11-01

    Geo hazard can result in reducing of environmental health and huge economic losses especially in mountainous area. In order to mitigate geo-hazard effectively, cloud computer technology are introduce for managing geo hazard database. Cloud computing technology and it services capable to provide stakeholder's with geo hazards information in near to real time for an effective environmental management and decision-making. UNITEN Integrated Geo Hazard Management System consist of the network management and operation to monitor geo-hazard disaster especially landslide in our study area at Kelantan River Basin and boundary between Hulu Kelantan and Hulu Terengganu. The system will provide easily manage flexible measuring system with data management operates autonomously and can be controlled by commands to collects and controls remotely by using “cloud” system computing. This paper aims to document the above relationship by identifying the special features and needs associated with effective geohazard database management using “cloud system”. This system later will use as part of the development activities and result in minimizing the frequency of the geo-hazard and risk at that research area.

  7. Knowledge of Computer Ergonomics among Computer Science Engineering and Information Technology Students in Karnataka, India

    Directory of Open Access Journals (Sweden)

    Mohamed Sherif Sirajudeen

    2017-04-01

    Full Text Available Ergonomics is the science of designing the job to fit the worker. Neglect of ergonomic principles results in inefficiency and pain in the workplace. The objective of this research is to assess the knowledge of Computer Ergonomics among Computer Science Engineering and Information Technology Students in Karnataka. In this Cross-sectional study, 177 Computer Science Engineering and Information Technology Students were recruited. A questionnaire is used to gather details regarding Personal characteristics, Computer Usage and Knowledge of Ergonomics. Descriptive statistics was produced for Personal characteristics and Computer usage. The distribution of responses to the items related to Ergonomic knowledge was presented by percentage of the subjects who answered correctly. The results shows that Majority of the subjects were unaware of ergonomics (32.8% correct responses, cumulative trauma disorders (18.6% correct responses, healthy postures related to elbow (34.4% correct responses, wrist & hand (39.5% correct responses, Level of Monitor (35% correct responses, Position of mouse (47.4% correct responses and Mini breaks (42.9% correct responses. This research highlighted the necessity of Ergonomic training regarding healthy postures and the measures to reduce the risk of musculoskeletal disorders for the students.

  8. Output Keywords in Context in an HTML File with Python

    Directory of Open Access Journals (Sweden)

    William J. Turkel

    2012-07-01

    Full Text Available This lesson builds on Keywords in Context (Using N-grams, where n-grams were extracted from a text. Here, you will learn how to output all of the n-grams of a given keyword in a document downloaded from the Internet, and display them clearly in your browser window.

  9. Tag cloud generation for results of multiple keywords queries

    DEFF Research Database (Denmark)

    2013-01-01

    In this paper we study tag cloud generation for retrieved results of multiple keyword queries. It is motivated by many real world scenarios such as personalization tasks, surveillance systems and information retrieval tasks defined with multiple keywords. We adjust the state-of-the-art tag cloud...

  10. Using Computer Technology to Foster Learning for Understanding

    Directory of Open Access Journals (Sweden)

    Elaine Van Melle

    2009-12-01

    Full Text Available The literature shows that students typically use either a surface approach to learning, in which the emphasis is on memorization of facts, or a deep approach to learning, in which learning for understanding is the primary focus. This paper describes how computer technology, specifically the use of a multimedia CD-ROM, was integrated into a microbiology curriculum as part of the transition from focusing on facts to fostering learning for understanding. Evaluation of the changes in approaches to learning over the course of the term showed a statistically significant shift in a deep approach to learning, as measured by the Study Process Questionnaire. Additional data collected showed that the use of computer technology supported this shift by providing students with the opportunity to apply what they had learned in class to order tests and interpret the test results in relation to specific patient-focused case studies. The extent of the impact, however, varied among different groups of students in the class. For example, students who were recent high school graduates did not show a statistically significant increase in deep learning scores over the course of the term and did not perform as well in the course. The results also showed that a surface approach to learning was an important aspect of learning for understanding, although only those students who were able to combine a surface with a deep approach to learning were successfully able to learn for understanding. Implications of this finding for the future use of computer technology and learning for understanding are considered.

  11. Advanced intelligent computational technologies and decision support systems

    CERN Document Server

    Kountchev, Roumen

    2014-01-01

    This book offers a state of the art collection covering themes related to Advanced Intelligent Computational Technologies and Decision Support Systems which can be applied to fields like healthcare assisting the humans in solving problems. The book brings forward a wealth of ideas, algorithms and case studies in themes like: intelligent predictive diagnosis; intelligent analyzing of medical images; new format for coding of single and sequences of medical images; Medical Decision Support Systems; diagnosis of Down’s syndrome; computational perspectives for electronic fetal monitoring; efficient compression of CT Images; adaptive interpolation and halftoning for medical images; applications of artificial neural networks for real-life problems solving; present and perspectives for Electronic Healthcare Record Systems; adaptive approaches for noise reduction in sequences of CT images etc.

  12. Technologies for Large Data Management in Scientific Computing

    CERN Document Server

    Pace, A

    2014-01-01

    In recent years, intense usage of computing has been the main strategy of investigations in several scientific research projects. The progress in computing technology has opened unprecedented opportunities for systematic collection of experimental data and the associated analysis that were considered impossible only few years ago. This paper focusses on the strategies in use: it reviews the various components that are necessary for an effective solution that ensures the storage, the long term preservation, and the worldwide distribution of large quantities of data that are necessary in a large scientific research project. The paper also mentions several examples of data management solutions used in High Energy Physics for the CERN Large Hadron Collider (LHC) experiments in Geneva, Switzerland which generate more than 30,000 terabytes of data every year that need to be preserved, analyzed, and made available to a community of several tenth of thousands scientists worldwide.

  13. Application Specific Performance Technology for Productive Parallel Computing

    Energy Technology Data Exchange (ETDEWEB)

    Malony, Allen D. [Univ. of Oregon, Eugene, OR (United States); Shende, Sameer [Univ. of Oregon, Eugene, OR (United States)

    2008-09-30

    Our accomplishments over the last three years of the DOE project Application- Specific Performance Technology for Productive Parallel Computing (DOE Agreement: DE-FG02-05ER25680) are described below. The project will have met all of its objectives by the time of its completion at the end of September, 2008. Two extensive yearly progress reports were produced in in March 2006 and 2007 and were previously submitted to the DOE Office of Advanced Scientific Computing Research (OASCR). Following an overview of the objectives of the project, we summarize for each of the project areas the achievements in the first two years, and then describe in some more detail the project accomplishments this past year. At the end, we discuss the relationship of the proposed renewal application to the work done on the current project.

  14. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  15. Neural computation and particle accelerators research, technology and applications

    CERN Document Server

    D'Arras, Horace

    2010-01-01

    This book discusses neural computation, a network or circuit of biological neurons and relatedly, particle accelerators, a scientific instrument which accelerates charged particles such as protons, electrons and deuterons. Accelerators have a very broad range of applications in many industrial fields, from high energy physics to medical isotope production. Nuclear technology is one of the fields discussed in this book. The development that has been reached by particle accelerators in energy and particle intensity has opened the possibility to a wide number of new applications in nuclear technology. This book reviews the applications in the nuclear energy field and the design features of high power neutron sources are explained. Surface treatments of niobium flat samples and superconducting radio frequency cavities by a new technique called gas cluster ion beam are also studied in detail, as well as the process of electropolishing. Furthermore, magnetic devises such as solenoids, dipoles and undulators, which ...

  16. Processing instrumentation technology: Process definition with a cognitive computer

    Energy Technology Data Exchange (ETDEWEB)

    Price, H.L. [Wilkes Univ., Wilkes-Barre, PA (United States). Mechanical and Materials Engineering Dept.

    1996-11-01

    Much of the polymer composites industry is built around the thermochemical conversion of raw material into useful composites. The raw materials (molding compound, prepreg) often are made up of thermosetting resins and small fibers or particles. While this conversion can follow a large number of paths, only a few paths are efficient, economical and lead to desirable composite properties. Processing instrument (P/I) technology enables a computer to sense and interpret changes taking place during the cure of prepreg or molding compound. P/I technology has been used to make estimates of gel time and cure time, thermal diffusivity measurements and transition temperature measurements. Control and sensing software is comparatively straightforward. The interpretation of results with appropriate software is under development.

  17. The Development of Sociocultural Competence with the Help of Computer Technology

    Science.gov (United States)

    Rakhimova, Alina E.; Yashina, Marianna E.; Mukhamadiarova, Albina F.; Sharipova, Astrid V.

    2017-01-01

    The article deals with the description of the process of development sociocultural knowledge and competences using computer technologies. On the whole the development of modern computer technologies allows teachers to broaden trainees' sociocultural outlook and trace their progress online. Observation of modern computer technologies and estimation…

  18. The Development of Sociocultural Competence with the Help of Computer Technology

    Science.gov (United States)

    Rakhimova, Alina E.; Yashina, Marianna E.; Mukhamadiarova, Albina F.; Sharipova, Astrid V.

    2017-01-01

    The article deals with the description of the process of development sociocultural knowledge and competences using computer technologies. On the whole the development of modern computer technologies allows teachers to broaden trainees' sociocultural outlook and trace their progress online. Observation of modern computer technologies and estimation…

  19. Relating North American Experiences with Computer-Related Technology in Education to Developing Countries.

    Science.gov (United States)

    Collis, Betty

    This essay considers several areas of research in computer technology for education in North America and the implications of these areas of focus for the implementation of educational computer technologies in developing nations. The five areas of focus are: (1) curriculum integration, or the general rationale for using computer technology in…

  20. 25 CFR 502.7 - Electronic, computer or other technologic aid.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Electronic, computer or other technologic aid. 502.7... DEFINITIONS OF THIS CHAPTER § 502.7 Electronic, computer or other technologic aid. (a) Electronic, computer or other technologic aid means any machine or device that: (1) Assists a player or the playing of a...

  1. Balanced technology initiative on computational mechanics of materials

    Science.gov (United States)

    Asaro, Robert J.

    1993-04-01

    The goal of this project, which was part of the DARPA Balanced Technology Initiative on Computational Mechanics, was to develop a comprehensive approach to the numerical modeling of the mechanical behavior of materials. Particular areas for focus in the project were the inelastic deformation of highly anisotropic materials such as single crystals and textured polycrystals, as well as evolving microstructural damage in ceramics and ductile metals in both slow and high rate deformation processes. While the contract was awarded for a period of three years, it was actually funded only for the first year. Nonetheless, significant progress can be reported as a direct result of this project.

  2. Soft Computing in Information Communication Technology Volume 2

    CERN Document Server

    2012-01-01

    This book is a collection of the accepted papers concerning soft computing in information communication technology. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Fuzzy Logic, Machine Learning, Cryptography, Pattern Recognition, Bioinformatics, Biomedical Engineering, Advancements in ICT.

  3. Computer technology for self-management: a scoping review.

    Science.gov (United States)

    Jacelon, Cynthia S; Gibbs, Molly A; Ridgway, John Ve

    2016-05-01

    The purpose of this scoping review of literature is to explore the types of computer-based systems used for self-management of chronic disease, the goals and success of these systems, the value added by technology integration and the target audience for these systems. Technology is changing the way health care is provided and the way that individuals manage their health. Individuals with chronic diseases are now able to use computer-based systems to self-manage their health. These systems have the ability to remind users of daily activities, and to help them recognise when symptoms are worsening and intervention is indicated. However, there are many questions about the types of systems available, the goals of these systems and the success with which individuals with chronic illness are using them. This is a scoping review in which the Cumulative Index of Nursing and Allied Health Literature, PubMed and IEEE Xplore databases were searched. A total of 303 articles were reviewed, 89 articles were read in-depth and 30 were included in the scoping review. The Substitution, Augmentation, Modification, Redefinition model was used to evaluate the value added by the technology integration. Research on technology for self-management was conducted in 13 countries. Data analysis identified five kinds of platforms on which the systems were based, some systems were focused on a specific disease management processes, others were not. For individuals to effectively use systems to maintain maximum wellness, the systems must have a strong component of self-management and provide the user with meaningful information regarding their health states. Clinicians should choose systems for their clients based on the design, components and goals of the systems. © 2016 John Wiley & Sons Ltd.

  4. Keywords Review of IT Security Literature in Recent 20 Years

    Directory of Open Access Journals (Sweden)

    WANG Lidong

    2012-10-01

    Full Text Available The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot topics in the research field and has a very large domain-specific vocabulary. The exploitation of domain knowledge and specialized vocabulary can dramatically improve the result of literature text processing. The purpose of this paper is to identify the frequently used keywords in IT security literatures. The result then can be utilized to improve the performance of automatic IT security document retrieval, identification and classification. Our method is to query CiteseeX to retrieve source data of paper description information and build an artificially annotated corpus. Over the corpus, we perform words frequency statistics, word co-occurrence analysis, discrimination index computation, retrieval efficiency analysis and thus build a lexicon of IT security based on our experimental result. The lexicon can further be used in improving retrieval performance and assisting new words discovering and document classification.

  5. A Keyword Analysis for Human Resource Management Factors

    Directory of Open Access Journals (Sweden)

    Muhammed Kürşad ÖZLEN

    2014-05-01

    Full Text Available With the constant increasing in technology and education, with development of multinational corporations and frequent changes in economic status and structures, Human Resources become the most crucial, the most reliable and necessary department. Moreover, in many companies, Human Resource Department is the most important department. The main purpose of this research is to mark off top rated factors related with Human Resource Management by analyzing all the abstracts of the published papers of a Human Resource Management journal for the period between the first issue of 2005 and the first issue of 2013. We identified the most frequent categories of the articles during this analyzed period. The literature is reviewed according to the identified factors related to Human Resource Management. If the keywords about Human Resources (35,7 % is not considered, it is observed that the researches, for the selected period, have organizational approach (39,2 % (Management, organizational strategy, organizational performance, organizational culture, contextual issues, technical issues and location and from the individual approach (24,4 % (Individual performance, training and education, employee rights, and behavioral issues. Furthermore, it is also observed that the researchers (a mainly give importance to the practice more than the theory and (b consider the organization more than the individual.

  6. Proceedings of the 2012 International Conference on Information Technology and Software Engineering : Information Technology & Computing Intelligence

    CERN Document Server

    Cai, Guoqiang; Liu, Weibin; Xing, Weiwei

    2013-01-01

    Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012. This book presents the latest research trends, methods and experimental results in the fields of information technology and software engineering, covering various state-of-the-art research theories and approaches. The subjects range from intelligent computing to information processing, software engineering, Web, unified modeling language (UML), multimedia, communication technologies, system identification, graphics and visualizing, etc. The proceedings provide a major interdisciplinary forum for researchers and engineers to present the most innovative studies and advances, which can serve as an excellent reference work for researchers and graduate students working on information technology and software engineering. Prof. Wei Lu, Dr. Guoqiang Cai, Prof. Weibin Liu and Dr. Weiwei Xing all work at Beijing Jiaotong Uni...

  7. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  8. Counseling Student Computer Competency Skills: Effects of Technology Course in Training.

    Science.gov (United States)

    Edwards, Yolanda V.; Portman, Tarrell Awe Agahe; Bethea, James

    2002-01-01

    The focus of this article is to assess counseling student computer competency level as an effect of a one-credit hour introductory course in computer technology. Results indicate student computer competencies increased after completing the computer technology course in the following areas: ethics, assisting clients with internet searches,…

  9. Computation Directorate and Science& Technology Review Computational Science and Research Featured in 2002

    Energy Technology Data Exchange (ETDEWEB)

    Alchorn, A L

    2003-04-04

    Thank you for your interest in the activities of the Lawrence Livermore National Laboratory Computation Directorate. This collection of articles from the Laboratory's Science & Technology Review highlights the most significant computational projects, achievements, and contributions during 2002. In 2002, LLNL marked the 50th anniversary of its founding. Scientific advancement in support of our national security mission has always been the core of the Laboratory. So that researchers could better under and predict complex physical phenomena, the Laboratory has pushed the limits of the largest, fastest, most powerful computers in the world. In the late 1950's, Edward Teller--one of the LLNL founders--proposed that the Laboratory commission a Livermore Advanced Research Computer (LARC) built to Livermore's specifications. He tells the story of being in Washington, DC, when John Von Neumann asked to talk about the LARC. He thought Teller wanted too much memory in the machine. (The specifications called for 20-30,000 words.) Teller was too smart to argue with him. Later Teller invited Von Neumann to the Laboratory and showed him one of the design codes being prepared for the LARC. He asked Von Neumann for suggestions on fitting the code into 10,000 words of memory, and flattered him about ''Labbies'' not being smart enough to figure it out. Von Neumann dropped his objections, and the LARC arrived with 30,000 words of memory. Memory, and how close memory is to the processor, is still of interest to us today. Livermore's first supercomputer was the Remington-Rand Univac-1. It had 5600 vacuum tubes and was 2 meters wide by 4 meters long. This machine was commonly referred to as a 1 KFlop machine [E+3]. Skip ahead 50 years. The ASCI White machine at the Laboratory today, produced by IBM, is rated at a peak performance of 12.3 TFlops or E+13. We've improved computer processing power by 10 orders of magnitude in 50 years, and I do

  10. Preservice teachers’ preparedness to integrate computer technology into the curriculum

    Directory of Open Access Journals (Sweden)

    Jelena Magliaro

    2008-05-01

    Full Text Available For Canada to compete effectively in the digital world, beginning teachers need to play an important role in integrating computer technology into the curriculum. Equipment and connectivity do not guarantee successful or productive use of computers in the classroom, but the combination of the teaching style and technology use has the potential to change education. In this research, the computer self-efficacy beliefs of 210 preservice teachers after their first practice teaching placements were examined. First, the quantitative component of the study involved the use of Computer User Self-Efficacy (CUSE scale where students’ previous undergraduate degree, licensure area, experience and familiarity with software packages were found to have statistically significant effects on computer self-efficacy. Second, the qualitative data indicated that society and school were the most positive factors that influenced preservice teachers’ attitudes towards computers, while the family had the highest percentage of negative influence. Findings reveal that although preservice teachers had completed only two months of the program, those with higher CUSE scores were more ready to integrate computers into their lessons than those with lower scores. Résumé: Pour que le Canada puisse entrer en compétition dans le monde numérique, les nouveaux enseignants devront jouer un rôle important d’intégration des technologies informatiques dans le curriculum. Les équipements et la connectivité ne garantissent pas une utilisation gagnante ou productive de l’ordinateur en salle de classe, mais la combinaison de styles d’enseignement et d’usages de la technologie a le potentiel de changer l’éducation. Dans cette étude, les croyances d’auto-efficacité à l’ordinateur de 210 futurs enseignants après leur première affectation ont été examinées. Premièrement, la partie quantitative de l’étude impliquait l’utilisation de l’échelle du Computer

  11. Computing Technologies for Oriented Education: Applications in Biological Sciences

    Directory of Open Access Journals (Sweden)

    Santiago Jaime Reyes

    2005-12-01

    Full Text Available The experience developing modern digital programs with highly qualified profesoors with several years of teaching postgraduate biological sciences matters is described. A small group of selected professors with a minimum knowledged or basic domain in computer software were invited to develop digital programs in the items of their interest,the purpose is to establish the bases for construction of an available digital library. The products to develop are a series of CD-ROM with program source in HTML format. The didactic strategy responds to a personal tutorship, step by step workshop, to build its own project (without programming languages. The workshop begins generating trust in very simple activities. It is designed to learn building and to advance evaluating the progress. It is fulfilled the necessity to put up-to-date the available material that regularly uses to impart the classes (video, slides, pictures, articles, examples etc. The information and computing technologies ICT are a indispensable tool to diffuse the knowledge to a coarser and more diverse public in the topics of their speciality. The obtained products are 8 CD ROM with didactic programs designed with scientific and technological bases.

  12. Extraction of Keywords Related with Stock Price Change from Bloggers' Hot Topics

    Science.gov (United States)

    Hara, Shinji; Nadamoto, Hironori; Horiuchi, Tadashi

    This paper presents an extraction method of keywords related with actual changes of stock price from bloggers' hot topics. We realized the computer program to collect bloggers' hot topics about stocks and actual stock prices. Then, the important keywords, which have correlation with changes of the stock prices, are selected based on stochastic complexity. We classify information of stock price changes by using text classification method such as Naive Bayes method and decision tree learning. We confirm the effectiveness of our method through the classification experiment.

  13. Tag cloud generation for results of multiple keywords queries

    DEFF Research Database (Denmark)

    2013-01-01

    In this paper we study tag cloud generation for retrieved results of multiple keyword queries. It is motivated by many real world scenarios such as personalization tasks, surveillance systems and information retrieval tasks defined with multiple keywords. We adjust the state-of-the-art tag cloud...... generation techniques for multiple keywords query results. Consequently, we conduct the extensive evaluation on top of three distinct collaborative tagging systems. The graph-based methods perform significantly better for the Movielens and Bibsonomy datasets. Tag cloud generation based on maximal coverage...

  14. An approach for discovering keywords from Spanish tweets using Wikipedia

    Directory of Open Access Journals (Sweden)

    Daniel AYALA

    2016-05-01

    Full Text Available Most approaches to keywords discovery when analyzing microblogging messages (among them those from Twitter are based on statistical and lexical information about the words that compose the text. The lack of context in the short messages can be problematic due to the low co-occurrence of words. In this paper, we present a new approach for keywords discovering from Spanish tweets based on the addition of context information using Wikipedia as a knowledge base. We present four different ways to use Wikipedia and two ways to rank the new keywords. We have tested these strategies using more than 60000 Spanish tweets, measuring performance and analyzing particularities of each strategy.

  15. Bayesian estimation of keyword confidence in Chinese continuous speech recognition

    Institute of Scientific and Technical Information of China (English)

    HAO Jie; LI Xing

    2003-01-01

    In a syllable-based speaker-independent Chinese continuous speech recognition system based on classical Hidden Markov Model (HMM), a Bayesian approach of keyword confidence estimation is studied, which utilizes both acoustic layer scores and syllable-based statistical language model (LM) score. The Maximum a posteriori (MAP) confidence measure is proposed, and the forward-backward algorithm calculating the MAP confidence scores is deduced. The performance of the MAP confidence measure is evaluated in keyword spotting application and the experiment results show that the MAP confidence scores provide high discriminability for keyword candidates. Furthermore, the MAP confidence measure can be applied to various speech recognition applications.

  16. An introduction to XML query processing and keyword search

    CERN Document Server

    Lu, Jiaheng

    2013-01-01

    This book systematically and comprehensively covers the latest advances in XML data searching. It presents an extensive overview of the current query processing and keyword search techniques on XML data.

  17. Boolean Burritos: How the Faculty Ate Up Keyword Searching.

    Science.gov (United States)

    York, Sherry

    1999-01-01

    Describes an activity that librarians can use to acquaint teachers with keyword searching and Boolean operators to more successfully use the library's online catalog. Uses food ingredients to represent various possible combinations. (LRW)

  18. Manifold-Ranking-Based Keyword Propagation for Image Retrieval

    Directory of Open Access Journals (Sweden)

    Li Mingjing

    2006-01-01

    Full Text Available A novel keyword propagation method is proposed for image retrieval based on a recently developed manifold-ranking algorithm. In contrast to existing methods which train a binary classifier for each keyword, our keyword model is constructed in a straightforward manner by exploring the relationship among all images in the feature space in the learning stage. In relevance feedback, the feedback information can be naturally incorporated to refine the retrieval result by additional propagation processes. In order to speed up the convergence of the query concept, we adopt two active learning schemes to select images during relevance feedback. Furthermore, by means of keyword model update, the system can be self-improved constantly. The updating procedure can be performed online during relevance feedback without extra offline training. Systematic experiments on a general-purpose image database consisting of 5 000 Corel images validate the effectiveness of the proposed method.

  19. CLASCN: Candidate Network Selection for Efficient Top-k Keyword Queries over Databases

    Institute of Scientific and Technical Information of China (English)

    Jun Zhang; Zhao-Hui Peng; Shan Wang; Hui-Jing Nie

    2007-01-01

    Keyword Search Over Relational Databases (KSORD) enables casual or Web users easily access databases through free-form keyword queries. Improving the performance of KSORD systems is a critical issue in this area. In this paper, a new approach CLASCN (Classification, Learning And Selection of Candidate Network) is developed to efficiently perform top-k keyword queries in schema-graph-based online KSORD systems. In this approach, the Candidate Networks(CNs) from trained keyword queries or executed user queries are classified and stored in the databases, and top-k results from the CNs are learned for constructing CN Language Models (CNLMs). The CNLMs are used to compute the similarity scores between a new user query and the CNs from the query. The CNs with relatively large similarity score, which are the most promising ones to produce top-k results, will be selected and performed. Currently, CLASCN is only applicable for past queries and New All-keyword-Used (NAU) queries which are frequently submitted queries. Extensive experiments also show the efficiency and effectiveness of our CLASCN approach.

  20. Technical Education Transfer: Perceptions of Employee Computer Technology Self-Efficacy.

    Science.gov (United States)

    Decker, C. A.

    1999-01-01

    This study investigated influences on employee self-efficacy of computer technologies resulting from computer-training programs that were intended to meet individual and organization objectives for university personnel. Influences on the transfer of training process included previous computer training, computer-use requirements, computer-use…

  1. Triple Helix Model in Developing Technological Innovation: The Case of Computer Based Interlocking

    Directory of Open Access Journals (Sweden)

    Erry Ricardo Nurzal

    2013-01-01

    Full Text Available Computer Based Interlocking (CBI is the most important part of the electric railway signalingsystem which serves as the “brain” that controls the operation of electrical signaling system thatreplaces the role of the electromagnetic relay which has gradually been abandoned. Developmentof CBI is based on the fact that until recently the signaling system in Indonesia is still reliedheavily on the CBI products from foreign vendors. Therefore, the development of domestic CBIproducts is really necessary in order to decrease the dependence on technology from foreignvendors that at the same time is also be able to support the accelerated development of railwayinfrastructure in Indonesia.The CBI development is conducted in the form of a collaboration involving the government,universities, and industry. This paper explores and analyzes the roles and interactions betweendifferent actors in the triple helix perspective, and identifies how the innovation ecosystemfunctioning with support from the government.Based on the data collected through in-depth interview with the actors involved in the CBI casestudy, this paper gives some key findings. First, government role is very important in establishingan innovation ecosystem for CBI development. Second, the leader in the development of CBItechnological innovation should be the industry supported by governmental R & D institutionsand universities. Third, R & D consortium is an effective vehicle for creating an interactionamong industry, academia, and government.Such findings may provide conceptual direction which is important for the development oftechnological innovation in Indonesia. In addition, in providing support for R&D activities, thegovernment needs to direct its R & D incentives to the industry as a business practitioner with itsown technology roadmap. The possible further research may include some research issues. First,is the pattern occurred in the CBI case also applied in the other cases of

  2. Application of modern computer technology to EPRI (Electric Power Research Institute) nuclear computer programs: Final report

    Energy Technology Data Exchange (ETDEWEB)

    Feinauer, L.R.

    1989-08-01

    Many of the nuclear analysis programs in use today were designed and developed well over a decade ago. Within this time frame, tremendous changes in hardware and software technologies have made it necessary to revise and/or restructure most of the analysis programs to take advantage of these changes. As computer programs mature from the development phase to being production programs, program maintenance and portability become very important issues. The maintenance costs associated with a particular computer program can generally be expected to exceed the total development costs by as much as a factor of two. Many of the problems associated with high maintenance costs can be traced back to either poorly designed coding structure, or ''quick fix'' modifications which do not preserve the original coding structure. The lack of standardization between hardware designs presents an obstacle to the software designer in providing 100% portable coding; however, conformance to certain guidelines can ensure portability between a wide variety of machines and operating systems. This report presents guidelines for upgrading EPRI nuclear computer programs to conform to current programming standards while maintaining flexibility for accommodating future hardware and software design trends. Guidelines for development of new computer programs are also presented. 22 refs., 10 figs.

  3. Computer simulation of an advanced combustor for clean coal technology

    Energy Technology Data Exchange (ETDEWEB)

    Chang, S.L.; Lottes, S.A.

    1992-01-01

    Magnetohydrodynamic (MHD) power generation is a clean coal technology because of its higher thermal efficiency and lower pollutant emission. Argonne National Laboratory used a comprehensive integral combustion computer code to aid the development of a TRW's second stage combustor for MHD power generation. The integral combustion code is a computer code for two-phase, two-dimensional, steady state, turbulent, and reacting flows, based on mass, momentum, and energy conservation laws for multiple gas species and solid particles of variable sizes. In the MHD second stage combustor, opposed jets of oxidizer are injected into a confined cross-stream coal gas flow laden with seed particles. The performance of the downstream MHD power generation channel depends mainly on the degree and the uniformity of gas ionization, which, in turn, depends on the uniformity of temperature and seed vapor distributions leaving the combustor. The simulation provides in-depth information of flow, combustion, and heat transfer patterns in the combustor, which is used to predict ranges of combustor operating conditions for optimum performance of the MHD system.

  4. Computer simulation of an advanced combustor for clean coal technology

    Energy Technology Data Exchange (ETDEWEB)

    Chang, S.L.; Lottes, S.A.

    1992-09-01

    Magnetohydrodynamic (MHD) power generation is a clean coal technology because of its higher thermal efficiency and lower pollutant emission. Argonne National Laboratory used a comprehensive integral combustion computer code to aid the development of a TRW`s second stage combustor for MHD power generation. The integral combustion code is a computer code for two-phase, two-dimensional, steady state, turbulent, and reacting flows, based on mass, momentum, and energy conservation laws for multiple gas species and solid particles of variable sizes. In the MHD second stage combustor, opposed jets of oxidizer are injected into a confined cross-stream coal gas flow laden with seed particles. The performance of the downstream MHD power generation channel depends mainly on the degree and the uniformity of gas ionization, which, in turn, depends on the uniformity of temperature and seed vapor distributions leaving the combustor. The simulation provides in-depth information of flow, combustion, and heat transfer patterns in the combustor, which is used to predict ranges of combustor operating conditions for optimum performance of the MHD system.

  5. Enabling Technologies for Scalable Trapped Ion Quantum Computing

    Science.gov (United States)

    Crain, Stephen; Gaultney, Daniel; Mount, Emily; Knoernschild, Caleb; Baek, Soyoung; Maunz, Peter; Kim, Jungsang

    2013-05-01

    Scalability is one of the main challenges of trapped ion based quantum computation, mainly limited by the lack of enabling technologies needed to trap, manipulate and process the increasing number of qubits. Microelectromechanical systems (MEMS) technology allows one to design movable micromirrors to focus laser beams on individual ions in a chain and steer the focal point in two dimensions. Our current MEMS system is designed to steer 355 nm pulsed laser beams to carry out logic gates on a chain of Yb ions with a waist of 1.5 μm across a 20 μm range. In order to read the state of the qubit chain we developed a 32-channel PMT with a custom read-out circuit operating near the thermal noise limit of the readout amplifier which increases state detection fidelity. We also developed a set of digital to analog converters (DACs) used to supply analog DC voltages to the electrodes of an ion trap. We designed asynchronous DACs to avoid added noise injection at the update rate commonly found in synchronous DACs. Effective noise filtering is expected to reduce the heating rate of a surface trap, thus improving multi-qubit logic gate fidelities. Our DAC system features 96 channels and an integrated FPGA that allows the system to be controlled in real time. This work was supported by IARPA/ARO.

  6. Japanese technology assessment: Computer science, opto- and microelectronics mechatronics, biotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Brandin, D.; Wieder, H.; Spicer, W.; Nevins, J.; Oxender, D.

    1986-01-01

    The series studies Japanese research and development in four high-technology areas - computer science, opto and microelectronics, mechatronics (a term created by the Japanese to describe the union of mechanical and electronic engineering to produce the next generation of machines, robots, and the like), and biotechnology. The evaluations were conducted by panels of U.S. scientists - chosen from academia, government, and industry - actively involved in research in areas of expertise. The studies were prepared for the purpose of aiding the U.S. response to Japan's technological challenge. The main focus of the assessments is on the current status and long-term direction and emphasis of Japanese research and development. Other aspects covered include evolution of the state of the art; identification of Japanese researchers, R and D organizations, and resources; and comparative U.S. efforts. The general time frame of the studies corresponds to future industrial applications and potential commercial impacts spanning approximately the next two decades.

  7. Promoting Physical Activity through Hand-Held Computer Technology

    Science.gov (United States)

    King, Abby C.; Ahn, David K.; Oliveira, Brian M.; Atienza, Audie A.; Castro, Cynthia M.; Gardner, Christopher D.

    2009-01-01

    Background Efforts to achieve population-wide increases in walking and similar moderate-intensity physical activities potentially can be enhanced through relevant applications of state-of-the-art interactive communication technologies. Yet few systematic efforts to evaluate the efficacy of hand-held computers and similar devices for enhancing physical activity levels have occurred. The purpose of this first-generation study was to evaluate the efficacy of a hand-held computer (i.e., personal digital assistant [PDA]) for increasing moderate intensity or more vigorous (MOD+) physical activity levels over 8 weeks in mid-life and older adults relative to a standard information control arm. Design Randomized, controlled 8-week experiment. Data were collected in 2005 and analyzed in 2006-2007. Setting/Participants Community-based study of 37 healthy, initially underactive adults aged 50 years and older who were randomized and completed the 8-week study (intervention=19, control=18). Intervention Participants received an instructional session and a PDA programmed to monitor their physical activity levels twice per day and provide daily and weekly individualized feedback, goal setting, and support. Controls received standard, age-appropriate written physical activity educational materials. Main Outcome Measure Physical activity was assessed via the Community Healthy Activities Model Program for Seniors (CHAMPS) questionnaire at baseline and 8 weeks. Results Relative to controls, intervention participants reported significantly greater 8-week mean estimated caloric expenditure levels and minutes per week in MOD+ activity (p<0.04). Satisfaction with the PDA was reasonably high in this largely PDA-naive sample. Conclusions Results from this first-generation study indicate that hand-held computers may be effective tools for increasing initial physical activity levels among underactive adults. PMID:18201644

  8. Advances in computer technology: impact on the practice of medicine.

    Science.gov (United States)

    Groth-Vasselli, B; Singh, K; Farnsworth, P N

    1995-01-01

    Advances in computer technology provide a wide range of applications which are revolutionizing the practice of medicine. The development of new software for the office creates a web of communication among physicians, staff members, health care facilities and associated agencies. This provides the physician with the prospect of a paperless office. At the other end of the spectrum, the development of 3D work stations and software based on computational chemistry permits visualization of protein molecules involved in disease. Computer assisted molecular modeling has been used to construct working 3D models of lens alpha-crystallin. The 3D structure of alpha-crystallin is basic to our understanding of the molecular mechanisms involved in lens fiber cell maturation, stabilization of the inner nuclear region, the maintenance of lens transparency and cataractogenesis. The major component of the high molecular weight aggregates that occur during cataractogenesis is alpha-crystallin subunits. Subunits of alpha-crystallin occur in other tissues of the body. In the central nervous system accumulation of these subunits in the form of dense inclusion bodies occurs in pathological conditions such as Alzheimer's disease, Huntington's disease, multiple sclerosis and toxoplasmosis (Iwaki, Wisniewski et al., 1992), as well as neoplasms of astrocyte origin (Iwaki, Iwaki, et al., 1991). Also cardiac ischemia is associated with an increased alpha B synthesis (Chiesi, Longoni et al., 1990). On a more global level, the molecular structure of alpha-crystallin may provide information pertaining to the function of small heat shock proteins, hsp, in maintaining cell stability under the stress of disease.

  9. Promoting physical activity through hand-held computer technology.

    Science.gov (United States)

    King, Abby C; Ahn, David K; Oliveira, Brian M; Atienza, Audie A; Castro, Cynthia M; Gardner, Christopher D

    2008-02-01

    Efforts to achieve population-wide increases in walking and similar moderate-intensity physical activities potentially can be enhanced through relevant applications of state-of-the-art interactive communication technologies. Yet few systematic efforts to evaluate the efficacy of hand-held computers and similar devices for enhancing physical activity levels have occurred. The purpose of this first-generation study was to evaluate the efficacy of a hand-held computer (i.e., personal digital assistant [PDA]) for increasing moderate intensity or more vigorous (MOD+) physical activity levels over 8 weeks in mid-life and older adults relative to a standard information control arm. Randomized, controlled 8-week experiment. Data were collected in 2005 and analyzed in 2006-2007. Community-based study of 37 healthy, initially underactive adults aged 50 years and older who were randomized and completed the 8-week study (intervention=19, control=18). Participants received an instructional session and a PDA programmed to monitor their physical activity levels twice per day and provide daily and weekly individualized feedback, goal setting, and support. Controls received standard, age-appropriate written physical activity educational materials. Physical activity was assessed via the Community Healthy Activities Model Program for Seniors (CHAMPS) questionnaire at baseline and 8 weeks. Relative to controls, intervention participants reported significantly greater 8-week mean estimated caloric expenditure levels and minutes per week in MOD+ activity (pfirst-generation study indicate that hand-held computers may be effective tools for increasing initial physical activity levels among underactive adults.

  10. Factors Contributing to Teachers' Use of Computer Technology in the Classroom

    Science.gov (United States)

    Gilakjani, Abbas Pourhosein

    2013-01-01

    There are many factors for teachers to use computer technology in their classrooms. The goal of this study is to identify some of the important factors contributing the teachers' use of computer technology. The first goal of this paper is to discuss computer self-efficacy. The second goal is to explain teaching experience. The third goal is to…

  11. A Detailed Analysis over Some Important Issues towards Using Computer Technology into the EFL Classrooms

    Science.gov (United States)

    Gilakjani, Abbas Pourhosein

    2014-01-01

    Computer technology has changed the ways we work, learn, interact and spend our leisure time. Computer technology has changed every aspect of our daily life--how and where we get our news, how we order goods and services, and how we communicate. This study investigates some of the significant issues concerning the use of computer technology…

  12. The Diffusion of Computer-Based Technology in K-12 Schools: Teachers' Perspectives

    Science.gov (United States)

    Colandrea, John Louis

    2012-01-01

    Because computer technology represents a major financial outlay for school districts and is an efficient method of preparing and delivering lessons, studying the process of teacher adoption of computer use is beneficial and adds to the current body of knowledge. Because the teacher is the ultimate user of computer technology for lesson preparation…

  13. The Acceptance of Computer Technology by Teachers in Early Childhood Education

    Science.gov (United States)

    Jeong, Hye In; Kim, Yeolib

    2017-01-01

    This study investigated kindergarten teachers' decision-making process regarding the acceptance of computer technology. We incorporated the Technology Acceptance Model framework, in addition to computer self-efficacy, subjective norm, and personal innovativeness in education technology as external variables. The data were obtained from 160…

  14. Technological Metaphors and Moral Education: The Hacker Ethic and the Computational Experience

    Science.gov (United States)

    Warnick, Bryan R.

    2004-01-01

    This essay is an attempt to understand how technological metaphors, particularly computer metaphors, are relevant to moral education. After discussing various types of technological metaphors, it is argued that technological metaphors enter moral thought through their "functional descriptions." The computer metaphor is then explored by turning to…

  15. Moving from Computer Literate to Technologically Competent: The Next Educational Reform.

    Science.gov (United States)

    Lowther, Deborah L.; Bassoppo-Moyo, Temba; Morrison, Gary R.

    1998-01-01

    Proposes that educators must go beyond computer literacy to achieve technological competence if successful integration of technology into the classroom is to occur. An educator who is technologically competent understands the relationship between basic computer functions and student learning, and uses this understanding to design, facilitate, and…

  16. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  17. Keyword Query over Error-Tolerant Knowledge Bases

    Institute of Scientific and Technical Information of China (English)

    Yu-Rong Cheng; Ye Yuan; Jia-Yu Li; Lei Chen; Guo-Ren Wang

    2016-01-01

    With more and more knowledge provided by WWW, querying and mining the knowledge bases have attracted much research attention. Among all the queries over knowledge bases, which are usually modelled as graphs, a keyword query is the most widely used one. Although the problem of keyword query over graphs has been deeply studied for years, knowledge bases, as special error-tolerant graphs, lead to the results of the traditional defined keyword queries out of users’ satisfaction. Thus, in this paper, we define a new keyword query, called confident r-clique, specific for knowledge bases based on the r-clique definition for keyword query on general graphs, which has been proved to be the best one. However, as we prove in the paper, finding the confident r-cliques is #P-hard. We propose a filtering-and-verification framework to improve the search efficiency. In the filtering phase, we develop the tightest upper bound of the confident r-clique, and design an index together with its search algorithm, which suits the large scale of knowledge bases well. In the verification phase, we develop an efficient sampling method to verify the final answers from the candidates remaining in the filtering phase. Extensive experiments demonstrate that the results derived from our new definition satisfy the users’ requirement better compared with the traditional r-clique definition, and our algorithms are efficient.

  18. Development of a taxonomy of keywords for engineering education research

    Science.gov (United States)

    Finelli, Cynthia J.; Borrego, Maura; Rasoulifar, Golnoosh

    2016-05-01

    The diversity of engineering education research provides an opportunity for cross-fertilisation of ideas and creativity, but it also can result in fragmentation of the field and duplication of effort. One solution is to establish a standardised taxonomy of engineering education terms to map the field and communicate and connect research initiatives. This report describes the process for developing such a taxonomy, the EER Taxonomy. Although the taxonomy focuses on engineering education research in the United States, inclusive efforts have engaged 266 individuals from 149 cities in 30 countries during one multiday workshop, 7 conference sessions, and several other virtual and in-person activities. The resulting taxonomy comprises 455 terms arranged in 14 branches and 6 levels. This taxonomy was found to satisfy four criteria for validity and reliability: (1) keywords assigned to a set of abstracts were reproducible by multiple researchers, (2) the taxonomy comprised terms that could be selected as keywords to fully describe 243 articles in 3 journals, (3) the keywords for those 243 articles were evenly distributed across the branches of the taxonomy, and (4) the authors of 31 conference papers agreed with 90% of researcher-assigned keywords. This report also describes guidelines developed to help authors consistently assign keywords for their articles by encouraging them to choose terms from three categories: (1) context/focus/topic, (2) purpose/target/motivation, and (3) research approach.

  19. Word Spotting Based on a posterior Measure of Keyword Confidence

    Institute of Scientific and Technical Information of China (English)

    郝杰; 李星

    2002-01-01

    In this paper, an approach of keyword confidence estimation is developed that well combines acoustic layer scores and syllable-based statistical language model (LM) scores.An a posteriori (AP) confidence measure and its forward-backward calculating algorithm are deduced. A zero false alarm (ZFA) assumption is proposed for evaluating relative confidence measures by word spotting task. In a word spotting experiment with a vocabulary of 240keywords, the keyword accuracy under the AP measure is above 94%, which well approaches its theoretical upper limit. In addition, a syllable lattice Hidden Markov Model (SLHMM) is formulated and a unified view of confidence estimation, word spotting, optimal path search,and N-best syllable re-scoring is presented. The proposed AP measure can be easily applied to various speech recognition systems as well.

  20. Two Decades of Research Collaboration: A Keyword Scopus Evaluation

    Directory of Open Access Journals (Sweden)

    Alexandru Amarioarei

    2016-12-01

    Full Text Available One issue that has become more important over the years is to evaluate the capability for worldwide research networks on different areas of research, especially in the areas that are identified as being worldwide significant. The study investigated the research output, citations impact and collaborations on publications listed in Scopus authored by researchers all over the world, research published between 1999-2014, selected by a group of keywords identified by authors. The results of the analysis identified an increasing trend in scientific publications starting with 2006, especially on three of the analyzed keywords. We also found differences in the citations patterns for the Black Sea and Danube Delta keywords in the contributing countries. The results of this study revealed a steady increase of the collaboration output and an increasing trend in the collaboration behavior, both at the European and national level. Additionally, at the national level the study identified the collaboration network between Romanian institutions per counties.

  1. Proceedings: 1989 conference on advanced computer technology for the power industry

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, B. (ed.)

    1990-07-01

    An EPRI conference to address advanced computer technology was hosted by Arizona Public Service in Scottsdale, Arizona, December 4--6, 1989. Participants represented US and foreign utilities, major electric and computer industry vendors, R D contractors, and consulting firms. These proceedings contain the text of the technical presentations and summaries of the panel discussions. The conference objectives were: to assess modern computer technologies and how they will affect utility operations; to share US and foreign utility experiences in developing computer-based technical products; and to discuss research conducted by EPRI in advanced computer technology on behalf of its utility members. Technical presentations addressed a broad range of computer-related topics: computer-based training; engineering workshops; hypermeida and other advanced user interfaces; networks and communications; expert systems and other decision-support methodologies; intelligent database management; supercomputing architectures and applications; real-time data processing; computerized technology and information transfer; and neural networks and other emerging technologies.

  2. Joint Top-K Spatial Keyword Query Processing

    DEFF Research Database (Denmark)

    Wu, Dingming; Yiu, Man Lung; Cong, Gao

    2012-01-01

    Web users and content are increasingly being geopositioned, and increased focus is being given to serving local content in response to web queries. This development calls for spatial keyword queries that take into account both the locations and textual descriptions of content. We study...... keyword queries. Empirical studies show that the proposed solution is efficient on real data sets. We also offer analytical studies on synthetic data sets to demonstrate the efficiency of the proposed solution. Index Terms IEEE Terms Electronic mail , Google , Indexes , Joints , Mobile communication...

  3. Computer vision challenges and technologies for agile manufacturing

    Science.gov (United States)

    Molley, Perry A.

    1996-02-01

    applicable to commercial production processes and applications. Computer vision will play a critical role in the new agile production environment for automation of processes such as inspection, assembly, welding, material dispensing and other process control tasks. Although there are many academic and commercial solutions that have been developed, none have had widespread adoption considering the huge potential number of applications that could benefit from this technology. The reason for this slow adoption is that the advantages of computer vision for automation can be a double-edged sword. The benefits can be lost if the vision system requires an inordinate amount of time for reprogramming by a skilled operator to account for different parts, changes in lighting conditions, background clutter, changes in optics, etc. Commercially available solutions typically require an operator to manually program the vision system with features used for the recognition. In a recent survey, we asked a number of commercial manufacturers and machine vision companies the question, 'What prevents machine vision systems from being more useful in factories?' The number one (and unanimous) response was that vision systems require too much skill to set up and program to be cost effective.

  4. FY 1995 Blue Book: High Performance Computing and Communications: Technology for the National Information Infrastructure

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program was created to accelerate the development of future generations of high performance computers...

  5. Computer architectures for computational physics work done by Computational Research and Technology Branch and Advanced Computational Concepts Group

    Science.gov (United States)

    1985-01-01

    Slides are reproduced that describe the importance of having high performance number crunching and graphics capability. They also indicate the types of research and development underway at Ames Research Center to ensure that, in the near term, Ames is a smart buyer and user, and in the long-term that Ames knows the best possible solutions for number crunching and graphics needs. The drivers for this research are real computational physics applications of interest to Ames and NASA. They are concerned with how to map the applications, and how to maximize the physics learned from the results of the calculations. The computer graphics activities are aimed at getting maximum information from the three-dimensional calculations by using the real time manipulation of three-dimensional data on the Silicon Graphics workstation. Work is underway on new algorithms that will permit the display of experimental results that are sparse and random, the same way that the dense and regular computed results are displayed.

  6. Use of computer technology to modify objective structured clinical examinations.

    Science.gov (United States)

    Holyfield, Lavern J; Bolin, Kenneth A; Rankin, Kathleen V; Shulman, Jay D; Jones, Daniel L; Eden, Becky DeSpain

    2005-10-01

    Objective structured clinical examinations (OSCEs) are multistationed clinical examinations that have been shown to be effective in testing students' ability to integrate the knowledge, skills, and attitudes acquired during their preclinical and clinical training and experiences. The original OSCE for the third-year Preventive Dentistry course at Baylor College of Dentistry was based on the traditional format consisting of four sections of twelve stations with a group of twelve students rotating through each of the sections simultaneously. This arrangement allowed for examination of one-half of the class. The other half of the class took the exam on an alternate date. To reduce the disruption caused by the students' moving from station to station and to allow for examination of the entire class in one setting, the traditional concept was modified using computer technology, and the twelve stations "moved" via a PowerPoint presentation while students remained stationary. Questions on both exams provided a means for testing data interpretation, diagnostic skills, and, to some extent, interpersonal skills. The overall atmosphere during the computer-based examination was less chaotic. Each student received identical instructions, explanations, and time allotments to respond to the information presented. The ratio of faculty to students required to monitor the exam was less than required for the traditional format. Additionally, since there was no need to allow time for student transition, the total time required to administer the exam was reduced. Thus, objective assessment of the entire class was accomplished using fewer faculty members and less class time and with less disruption for the students.

  7. FY 1998 Blue Book: Computing, Information, and Communications: Technologies for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As the 21st century approaches, the rapid convergence of computing, communications, and information technology promises unprecedented opportunities for scientific...

  8. Art,Science and Technology——Computed Aided Design in Practice & How computer technology affect designer’s work

    Institute of Scientific and Technical Information of China (English)

    赵耀

    2010-01-01

    Introduction:Computing technology has developed significantly in the past few decades.It affects almost everyone in the modern society,creating new ways of communication which affects both our work and leisure activities.Particularly,in today’s world of design and technology,computer aided design is fast becoming a technologically and economically feasible reality.Most designers have accepted the fact that computer aided design plays an important role in the success of their practices,not due to it’s value as an efficient drafting and modeling tool,but also because of clients’perception that it makes sound financial sense to utilize CAD.On the other hand,many people argue that computers are not fully autonomous,they are merely unconscious digital slaves or tools of production.In addition,the abusive use of software technology would turn creative art design into a purely industrial activity.

  9. Computer program for distance learning of pesticide application technology

    Directory of Open Access Journals (Sweden)

    Bruno Maia

    2011-12-01

    Full Text Available Distance learning presents great potential for mitigating field problems on pesticide application technology. Thus, due to the lack of teaching material about pesticide spraying technology in the Portuguese language and the increasing availability of distance learning, this study developed and evaluated a computer program for distance learning about the theory of pesticide spraying technology using the tools of information technology. The modules comprising the course, named Pulverizar, were: (1 Basic concepts, (2 Factors that affect application, (3 Equipments, (4 Spraying nozzles, (5 Sprayer calibration, (6 Aerial application, (7 Chemigation, (8 Physical-chemical properties, (9 Formulations, (10 Adjuvants, (11 Water quality, and (12 Adequate use of pesticides. The program was made available to the public on July 1st, 2008, hosted at the web site www.pulverizar.iciag.ufu.br, and was simple, robust and practical on the complementation of traditional teaching for the education of professionals in Agricultural Sciences. Mastering pesticide spraying technology by people involved in agricultural production can be facilitated by the program Pulverizar, which was well accepted in its initial evaluation.O ensino à distância apresenta grande potencial para minorar os problemas ocorridos no campo na área de tecnologia de aplicação de agroquímicos. Dessa forma, diante da escassez de material instrucional na área de tecnologia de aplicação de agroquímicos em Português e do crescimento elevado da educação à distância, o objetivo deste trabalho foi desenvolver e avaliar um programa computacional para o ensino à distância da parte teórica de tecnologia de aplicação de agroquímicos, utilizando as ferramentas de tecnologia da informação. Os módulos que compuseram o curso, intitulado Pulverizar, foram: (1 Conceitos básicos, (2 Fatores que afetam a aplicação, (3 Equipamentos, (4 Pontas de pulverização, (5 Calibração de pulverizadores

  10. Reviews of computing technology: Fiber distributed data interface

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, A.J.

    1992-04-01

    This technology report describes Fiber Distributed Data Interface (FDDI) as a technology, looks at the applications of this technology, examines the current economics of using it, and describe activities and plans by the Information Resource Management Department to implement this technology at the Savannah River Site.

  11. Reviews of computing technology: Fiber distributed data interface. Revision

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, A.J.

    1992-04-01

    This technology report describes Fiber Distributed Data Interface (FDDI) as a technology, looks at the applications of this technology, examines the current economics of using it, and describe activities and plans by the Information Resource Management Department to implement this technology at the Savannah River Site.

  12. Hybrid Recommendation System Memanfaatkan Penggalian Frequent Itemset dan Perbandingan Keyword

    OpenAIRE

    Suka Parwita, Wayan Gede; Winarko, Edi

    2015-01-01

    AbstrakRecommendation system sering dibangun dengan memanfaatkan data peringkat item dan data identitas pengguna. Data peringkat item merupakan data yang langka pada sistem yang baru dibangun. Sedangkan, pemberian data identitas pada recommendation system dapat menimbulkan kekhawatiran penyalahgunaan data identitas.Hybrid recommendation system memanfaatkan algoritma penggalian frequent itemset dan perbandingan keyword dapat memberikan daftar rekomendasi tanpa menggunakan data identitas penggu...

  13. AN EFFECTIVE INFORMATION RETRIEVAL SYSTEM USING KEYWORD SEARCH TECHNIQUE

    Directory of Open Access Journals (Sweden)

    Dhananjay A. Gholap

    2015-10-01

    Full Text Available Keyword search is the technique use for the retrieving data or information. In Information Retrieval, keyword search is a type of search method that looks for matching documents which contain one or more keywords specified by a user.A keyword search scheme to relational database becomes an interesting area of research system within the IR and relational database system. The assumption and investigation of user search goals can be very valuable in improving search engine relevance and user experience. The user tries to search about any query on the internet, Search engine gives many numbers of result related to that query. These results can be depend on metadata or on full text indexing, because of this, user need to spend a lot of time in finding the information of his interest. Therefore, in project inferred user search goals by analyzing search engine query logs. System use a framework to discover different user search goals for a query by clustering the propose feedback sessions.

  14. Understanding the Delayed-Keyword Effect on Metacomprehension Accuracy

    Science.gov (United States)

    Thiede, Keith W.; Dunlosky, John; Griffin, Thomas D.; Wiley, Jennifer

    2005-01-01

    The typical finding from research on metacomprehension is that accuracy is quite low. However, recent studies have shown robust accuracy improvements when judgments follow certain generation tasks (summarizing or keyword listing) but only when these tasks are performed at a delay rather than immediately after reading (K. W. Thiede & M. C. M.…

  15. Keyword Searching vs. Authority Control in an Online Catalog.

    Science.gov (United States)

    Jamieson, Alexis J.; And Others

    1986-01-01

    Study conducted at the University of Western Ontario explored whether use of keywords of an online catalog would be a satisfactory alternative to self cross referencing for locating variant subject heading forms. Random comparison of machine readable cataloging with Library of Congress authorities demonstrated the desirability of cross reference…

  16. World coordinate system keywords for FITS files from Lick Observatory

    Science.gov (United States)

    Allen, Steven L.; Gates, John; Kibrick, Robert I.

    2010-07-01

    Every bit of metadata added at the time of acquisition increases the value of image data, facilitates automated processing of those data, and decreases the effort required during subsequent data curation activities. In 2002 the FITS community completed a standard for World Coordinate System (WCS) information which describes the celestial coordinates of pixels in astronomical image data. Most of the instruments in use at Lick Observatory and Keck Observatory predate this standard. None of them was designed to produce FITS files with celestial WCS information. We report on the status of WCS keywords in the FITS files of various astronomical detectors at Lick and Keck. These keywords combine the information from sources which include the telescope pointing system, the optics of the telescope and instrument, a description of the pixel layout of the detector focal plane, and the hardware and software mappings between the silicon pixels of the detector and the pixels in the data array of the FITS file. The existing WCS keywords include coordinates which refer to the detector structure itself (for locating defects and artifacts), but not celestial coordinates. We also present proof-of-concept from the first data acquisition system at Lick Observatory which inserts the WCS keywords for a celestial coordinate system.

  17. Interdisciplinarity of Nano Research Fields : A Keyword Mining Approach

    NARCIS (Netherlands)

    Wang, L.; Notten, A.; Surpatean, A.

    2012-01-01

    Using a keyword mining approach, this paper explores the interdisciplinary and integrative dynamics in five nano research fields. We argue that the general trend of integration in nano research fields is converging in the long run, although the degree of this convergence depends greatly on the indic

  18. Joint Top-K Spatial Keyword Query Processing

    DEFF Research Database (Denmark)

    Wu, Dinming; Yiu, Man Lung; Cong, Gao

    2012-01-01

    keyword queries. Empirical studies show that the proposed solution is efficient on real data sets. We also offer analytical studies on synthetic data sets to demonstrate the efficiency of the proposed solution. Index Terms IEEE Terms Electronic mail , Google , Indexes , Joints , Mobile communication...

  19. Collocations of High Frequency Noun Keywords in Prescribed Science Textbooks

    Science.gov (United States)

    Menon, Sujatha; Mukundan, Jayakaran

    2012-01-01

    This paper analyses the discourse of science through the study of collocational patterns of high frequency noun keywords in science textbooks used by upper secondary students in Malaysia. Research has shown that one of the areas of difficulty in science discourse concerns lexis, especially that of collocations. This paper describes a corpus-based…

  20. Enjoying Vocabulary Learning in Junior High: The Keyword Method

    Science.gov (United States)

    Singer, Gail

    1977-01-01

    The keyword method is a mnemonic device limited to teaching vocabulary items. It involves association of a bizarre image with the meaning of the word and can take on the attractive qualities of a game. Results indicate that motivation and interest are stimulated and vocabulary skills improved. (AMH)

  1. Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption

    Directory of Open Access Journals (Sweden)

    Nie Mengxi

    2016-01-01

    Full Text Available With the development of cloud computing, more and more data owners are motivated to outsource their data to the cloud server for great flexibility and less saving expenditure. Because the security of outsourced data must be guaranteed, some encryption methods should be used which obsoletes traditional data utilization based on plaintext, e.g. keyword search. To solve the search of encrypted data, some schemes were proposed to solve the search of encrypted data, e.g. top-k single or multiple keywords retrieval. However, the efficiency of these proposed schemes is not high enough to be impractical in the cloud computing. In this paper, we propose a new scheme based on homomorphic encryption to solve this challenging problem of privacy-preserving efficient multi-keyword ranked search over outsourced cloud data. In our scheme, the inner product is adopted to measure the relevance scores and the technique of relevance feedback is used to reflect the search preference of the data users. Security analysis shows that the proposed scheme can meet strict privacy requirements for such a secure cloud data utilization system. Performance evaluation demonstrates that the proposed scheme can achieve low overhead on both computation and communication.

  2. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud.

    Science.gov (United States)

    Munisamy, Shyamala Devi; Chokkalingam, Arun

    2015-01-01

    Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  3. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud

    Directory of Open Access Journals (Sweden)

    Shyamala Devi Munisamy

    2015-01-01

    Full Text Available Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider’s premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  4. Leveraging Bibliographic RDF Data for Keyword Prediction with Association Rule Mining (ARM

    Directory of Open Access Journals (Sweden)

    Nidhi Kushwaha

    2014-11-01

    Full Text Available The Semantic Web (Web 3.0 has been proposed as an efficient way to access the increasingly large amounts of data on the internet. The Linked Open Data Cloud project at present is the major effort to implement the concepts of the Seamtic Web, addressing the problems of inhomogeneity and large data volumes. RKBExplorer is one of many repositories implementing Open Data and contains considerable bibliographic information. This paper discusses bibliographic data, an important part of cloud data. Effective searching of bibiographic datasets can be a challenge as many of the papers residing in these databases do not have sufficient or comprehensive keyword information. In these cases however, a search engine based on RKBExplorer is only able to use information to retrieve papers based on author names and title of papers without keywords. In this paper we attempt to address this problem by using the data mining algorithm Association Rule Mining (ARM to develop keywords based on features retrieved from Resource Description Framework (RDF data within a bibliographic citation. We have demonstrate the applicability of this method for predicting missing keywords for bibliographic entries in several typical databases. −−−−− Paper presented at 1st International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2014 March 27-28, 2014. Organized by VIT University, Chennai, India. Sponsored by BRNS.

  5. Self-Concept, Computer Anxiety, Gender and Attitude towards Interactive Computer Technologies: A Predictive Study among Nigerian Teachers

    Science.gov (United States)

    Agbatogun, Alaba Olaoluwakotansibe

    2010-01-01

    Interactive Computer Technologies (ICTs) have crept into education industry, thus dramatically causing transformation in instructional process. This study examined the relative and combined contributions of computer anxiety, self-concept and gender to teachers' attitude towards the use of ICT(s). 454 Nigerian teachers constituted the sample. Three…

  6. Social Studies: Application Units. Course II, Teachers. Computer-Oriented Curriculum. REACT (Relevant Educational Applications of Computer Technology).

    Science.gov (United States)

    Tecnica Education Corp., San Carlos, CA.

    This book is one of a series in Course II of the Relevant Educational Applications of Computer Technology (REACT) Project. It is designed to point out to teachers two of the major applications of computers in the social sciences: simulation and data analysis. The first section contains a variety of simulation units organized under the following…

  7. Proceedings of seventh symposium on sharing of computer programs and technology in nuclear medicine, computer assisted data processing

    Energy Technology Data Exchange (ETDEWEB)

    Howard, B.Y.; McClain, W.J.; Landay, M. (comps.)

    1977-01-01

    The Council on Computers (CC) of the Society of Nuclear Medicine (SNM) annually publishes the Proceedings of its Symposium on the Sharing of Computer Programs and Technology in Nuclear Medicine. This is the seventh such volume and has been organized by topic, with the exception of the invited papers and the discussion following them. An index arranged by author and by subject is included.

  8. Influence of Gender and Computer Teaching Efficacy on Computer Acceptance among Malaysian Student Teachers: An Extended Technology Acceptance Model

    Science.gov (United States)

    Wong, Kung-Teck; Teo, Timothy; Russo, Sharon

    2012-01-01

    The purpose of this study is to validate the technology acceptance model (TAM) in an educational context and explore the role of gender and computer teaching efficacy as external variables. From the literature, it appeared that only limited studies had developed models to explain statistically the chain of influence of computer teaching efficacy…

  9. A study of computer graphics technology in application of communication resource management

    Science.gov (United States)

    Li, Jing; Zhou, Liang; Yang, Fei

    2017-08-01

    With the development of computer technology, computer graphics technology has been widely used. Especially, the success of object-oriented technology and multimedia technology promotes the development of graphics technology in the computer software system. Therefore, the computer graphics theory and application technology have become an important topic in the field of computer, while the computer graphics technology becomes more and more extensive in various fields of application. In recent years, with the development of social economy, especially the rapid development of information technology, the traditional way of communication resource management cannot effectively meet the needs of resource management. In this case, the current communication resource management is still using the original management tools and management methods, resource management equipment management and maintenance, which brought a lot of problems. It is very difficult for non-professionals to understand the equipment and the situation in communication resource management. Resource utilization is relatively low, and managers cannot quickly and accurately understand the resource conditions. Aimed at the above problems, this paper proposes to introduce computer graphics technology into the communication resource management. The introduction of computer graphics not only makes communication resource management more vivid, but also reduces the cost of resource management and improves work efficiency.

  10. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  11. Advances in Computing and Information Technology : Proceedings of the Second International

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2012-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  12. Architectures, Concepts and Technologies for Service Oriented Computing : Proceedings of the 2nd International Workshop on Architectures, Concepts and Technologies for Service Oriented Computing - ACT4SOC 2008

    NARCIS (Netherlands)

    Sinderen, van Marten

    2008-01-01

    This volume contains the proceedings of the Second International Workshop on Architectures, Concepts and Technologies for Service Oriented Computing (ACT4SOC 2008), held on July 5 in Porto, Portugal, in conjunction with the Third International Conference on Software and Data Technologies (ICSOFT 200

  13. Emerging Computation and Information teChnologies for Education : Proceeding of 2012 International Conference on Emerging Computation and Information teChnologies for Education

    CERN Document Server

    Xu, Linli; Tian, Wenya

    2012-01-01

    The 2012 International Conference on Emerging Computation and Information teChnologies for Education (ECICE 2012) was  held on Jan. 15-16, 2012, Hangzhou, China.  The main results of the conference are presented in this proceedings book of carefully reviewed and accepted paper addressing the hottest issues in emerging computation and information technologies used for education. The volume covers a wide series of topics in the area, including Computer-Assisted Education, Educational Information Systems, Web-based Learning, etc.

  14. Cloud Computing and Information Technology Resource Cost Management for SMEs

    DEFF Research Database (Denmark)

    Kuada, Eric; Adanu, Kwame; Olesen, Henning

    2013-01-01

    This paper analyzes the decision-making problem confronting SMEs considering the adoption of cloud computing as an alternative to in-house computing services provision. The economics of choosing between in-house computing and a cloud alternative is analyzed by comparing the total economic costs o...

  15. Making Advanced Computer Science Topics More Accessible through Interactive Technologies

    Science.gov (United States)

    Shao, Kun; Maher, Peter

    2012-01-01

    Purpose: Teaching advanced technical concepts in a computer science program to students of different technical backgrounds presents many challenges. The purpose of this paper is to present a detailed experimental pedagogy in teaching advanced computer science topics, such as computer networking, telecommunications and data structures using…

  16. Making Advanced Computer Science Topics More Accessible through Interactive Technologies

    Science.gov (United States)

    Shao, Kun; Maher, Peter

    2012-01-01

    Purpose: Teaching advanced technical concepts in a computer science program to students of different technical backgrounds presents many challenges. The purpose of this paper is to present a detailed experimental pedagogy in teaching advanced computer science topics, such as computer networking, telecommunications and data structures using…

  17. Cloud Computing: A Free Technology Option to Promote Collaborative Learning

    Science.gov (United States)

    Siegle, Del

    2010-01-01

    In a time of budget cuts and limited funding, purchasing and installing the latest software on classroom computers can be prohibitive for schools. Many educators are unaware that a variety of free software options exist, and some of them do not actually require installing software on the user's computer. One such option is cloud computing. This…

  18. Dynamic Capabilities for Managing Emerging Technologies : Organizational and Managerial Antecedents of Effective Adoption of Cloud Computing

    NARCIS (Netherlands)

    S. Khanagha (Saeed)

    2015-01-01

    markdownabstract__Abstract__ The advancement of information and communication technologies has brought a digital age, where massive computing power, high speed and ubiquitous access to internet and more recently Cloud Computing Technology are expected to transform a wide range of organizations,

  19. A Meta-Analysis of Effectiveness Studies on Computer Technology-Supported Language Learning

    Science.gov (United States)

    Grgurovic, Maja; Chapelle, Carol A.; Shelley, Mack C.

    2013-01-01

    With the aim of summarizing years of research comparing pedagogies for second/foreign language teaching supported with computer technology and pedagogy not-supported by computer technology, a meta-analysis was conducted of empirical research investigating language outcomes. Thirty-seven studies yielding 52 effect sizes were included, following a…

  20. The Role of Computer Technology in Teaching Reading and Writing: Preschool Teachers' Beliefs and Practices

    Science.gov (United States)

    Ihmeideh, Fathi

    2010-01-01

    This study investigated preschool teachers' beliefs and practices regarding the use of computer technology in teaching reading and writing in Jordan. The researcher developed a questionnaire consisting of two scales--Teachers' Beliefs Scale (TB Scale) and Teachers' Practices Scale (TP Scale)--to examine the role of computer technology in teaching…

  1. [The automatic iris map overlap technology in computer-aided iridiagnosis].

    Science.gov (United States)

    He, Jia-feng; Ye, Hu-nian; Ye, Miao-yuan

    2002-11-01

    In the paper, iridology and computer-aided iridiagnosis technologies are briefly introduced and the extraction method of the collarette contour is then investigated. The iris map can be overlapped on the original iris image based on collarette contour extraction. The research on collarette contour extraction and iris map overlap is of great importance to computer-aided iridiagnosis technologies.

  2. University Students and Ethics of Computer Technology Usage: Human Resource Development

    Science.gov (United States)

    Iyadat, Waleed; Iyadat, Yousef; Ashour, Rateb; Khasawneh, Samer

    2012-01-01

    The primary purpose of this study was to determine the level of students' awareness about computer technology ethics at the Hashemite University in Jordan. A total of 180 university students participated in the study by completing the questionnaire designed by the researchers, named the Computer Technology Ethics Questionnaire (CTEQ). Results…

  3. Effect of Physical Education Teachers' Computer Literacy on Technology Use in Physical Education

    Science.gov (United States)

    Kretschmann, Rolf

    2015-01-01

    Teachers' computer literacy has been identified as a factor that determines their technology use in class. The aim of this study was to investigate the relationship between physical education (PE) teachers' computer literacy and their technology use in PE. The study group consisted of 57 high school level in-service PE teachers. A survey was used…

  4. Neurological rehabilitation of stroke patients via motor imaginary-based brain-computer interface technology

    Institute of Scientific and Technical Information of China (English)

    Hongyu Sun; Yang Xiang; Mingdao Yang

    2011-01-01

    The present study utilized motor imaginary-based brain-computer interface technology combined with rehabilitation training in 20 stroke patients. Results from the Berg Balance Scale and the Holden Walking Classification were significantly greater at 4 weeks after treatment (P < 0.01), which suggested that motor imaginary-based brain-computer interface technology improved balance and walking in stroke patients.

  5. Dynamic Capabilities for Managing Emerging Technologies : Organizational and Managerial Antecedents of Effective Adoption of Cloud Computing

    NARCIS (Netherlands)

    S. Khanagha (Saeed)

    2015-01-01

    markdownabstract__Abstract__ The advancement of information and communication technologies has brought a digital age, where massive computing power, high speed and ubiquitous access to internet and more recently Cloud Computing Technology are expected to transform a wide range of organizations, ind

  6. University Students and Ethics of Computer Technology Usage: Human Resource Development

    Science.gov (United States)

    Iyadat, Waleed; Iyadat, Yousef; Ashour, Rateb; Khasawneh, Samer

    2012-01-01

    The primary purpose of this study was to determine the level of students' awareness about computer technology ethics at the Hashemite University in Jordan. A total of 180 university students participated in the study by completing the questionnaire designed by the researchers, named the Computer Technology Ethics Questionnaire (CTEQ). Results…

  7. Predicting Cloud Computing Technology Adoption by Organizations: An Empirical Integration of Technology Acceptance Model and Theory of Planned Behavior

    Science.gov (United States)

    Ekufu, ThankGod K.

    2012-01-01

    Organizations are finding it difficult in today's economy to implement the vast information technology infrastructure required to effectively conduct their business operations. Despite the fact that some of these organizations are leveraging on the computational powers and the cost-saving benefits of computing on the Internet cloud, others…

  8. Quantum Computers: A New Paradigm in Information Technology

    Directory of Open Access Journals (Sweden)

    Mahesh S. Raisinghani

    2001-01-01

    Full Text Available The word 'quantum' comes from the Latin word quantus meaning 'how much'. Quantum computing is a fundamentally new mode of information processing that can be performed only by harnessing physical phenomena unique to quantum mechanics (especially quantum interference. Paul Benioff of the Argonne National Laboratory first applied quantum theory to computers in 1981 and David Deutsch of Oxford proposed quantum parallel computers in 1985, years before the realization of qubits in 1995. However, it may be well into the 21st century before we see quantum computing used at a commercial level for a variety of reasons discussed in this paper. The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This paper discusses some of the current advances, applications, and chal-lenges of quantum computing as well as its impact on corporate computing and implications for management. It shows how quantum computing can be utilized to process and store information, as well as impact cryptography for perfectly secure communication, algorithmic searching, factorizing large numbers very rapidly, and simulating quantum-mechanical systems efficiently. A broad interdisciplinary effort will be needed if quantum com-puters are to fulfill their destiny as the world's fastest computing devices.

  9. Technology transfer of brain-computer interfaces as assistive technology: barriers and opportunities

    National Research Council Canada - National Science Library

    Nijboer, F

    2015-01-01

    .... Three barriers for technology transfer of BCIs as access technologies are identified. First, BCIs are developed with a narrow focus on creating a reliable technology, while a broader focus on creating a usable technology is needed...

  10. Development of training support system based on three-dimensional computer graphics technology

    Energy Technology Data Exchange (ETDEWEB)

    Kude, Akizumi; Hanafusa, Hidemitsu; Matsuoka, Yoshinori; Shirute, Ikuo [Institute of Nuclear Safety System Inc., Seika, Kyoto (Japan); Ogura, Kazuhide

    1998-09-01

    Recently, Virtual Reality (VR) technology has developed quickly, together with research conducted on various elemental and related technologies and research in various fields of its application. In particular, the development of computer graphics (CG) technology at the same pace as the progress in computer performance is remarkable. We have developed a new type of training support system using three-dimensional (3D) CG technology. It is the training support system for disassembling and assembling a motor-operated gate valve. The training support system proposed is based on a personal computer and can be used easily by anyone. The system configuration is outlined herein. (author)

  11. Keyword-based Ciphertext Search Algorithm under Cloud Storage

    Directory of Open Access Journals (Sweden)

    Ren Xunyi

    2016-01-01

    Full Text Available With the development of network storage services, cloud storage have the advantage of high scalability , inexpensive, without access limit and easy to manage. These advantages make more and more small or medium enterprises choose to outsource large quantities of data to a third party. This way can make lots of small and medium enterprises get rid of costs of construction and maintenance, so it has broad market prospects. But now lots of cloud storage service providers can not protect data security.This result leakage of user data, so many users have to use traditional storage method.This has become one of the important factors that hinder the development of cloud storage. In this article, establishing keyword index by extracting keywords from ciphertext data. After that, encrypted data and the encrypted index upload cloud server together.User get related ciphertext by searching encrypted index, so it can response data leakage problem.

  12. Study of application technology of ultra-high speed computer to the elucidation of complex phenomena

    Energy Technology Data Exchange (ETDEWEB)

    Sekiguchi, Tomotsugu [Electrotechnical Lab., Tsukuba, Ibaraki (Japan)

    1996-06-01

    The basic design of numerical information library in the decentralized computer network was explained at the first step of constructing the application technology of ultra-high speed computer to the elucidation of complex phenomena. Establishment of the system makes possible to construct the efficient application environment of ultra-high speed computer system to be scalable with the different computing systems. We named the system Ninf (Network Information Library for High Performance Computing). The summary of application technology of library was described as follows: the application technology of library under the distributed environment, numeric constants, retrieval of value, library of special functions, computing library, Ninf library interface, Ninf remote library and registration. By the system, user is able to use the program concentrating the analyzing technology of numerical value with high precision, reliability and speed. (S.Y.)

  13. Efficient re-indexing of automatically annotated image collections using keyword combination

    Science.gov (United States)

    Yavlinsky, Alexei; Rüger, Stefan

    2007-01-01

    This paper presents a framework for improving the image index obtained by automated image annotation. Within this framework, the technique of keyword combination is used for fast image re-indexing based on initial automated annotations. It aims to tackle the challenges of limited vocabulary size and low annotation accuracies resulting from differences between training and test collections. It is useful for situations when these two problems are not anticipated at the time of annotation. We show that based on example images from the automatically annotated collection, it is often possible to find multiple keyword queries that can retrieve new image concepts which are not present in the training vocabulary, and improve retrieval results of those that are already present. We demonstrate that this can be done at a very small computational cost and at an acceptable performance tradeoff, compared to traditional annotation models. We present a simple, robust, and computationally efficient approach for finding an appropriate set of keywords for a given target concept. We report results on TRECVID 2005, Getty Image Archive, and Web image datasets, the last two of which were specifically constructed to support realistic retrieval scenarios.

  14. Visualization as Seen through its Research Paper Keywords.

    Science.gov (United States)

    Isenberg, Petra; Isenberg, Tobias; Sedlmair, Michael; Chen, Jian; Moller, Torsten

    2017-01-01

    We present the results of a comprehensive multi-pass analysis of visualization paper keywords supplied by authors for their papers published in the IEEE Visualization conference series (now called IEEE VIS) between 1990-2015. From this analysis we derived a set of visualization topics that we discuss in the context of the current taxonomy that is used to categorize papers and assign reviewers in the IEEE VIS reviewing process. We point out missing and overemphasized topics in the current taxonomy and start a discussion on the importance of establishing common visualization terminology. Our analysis of research topics in visualization can, thus, serve as a starting point to (a) help create a common vocabulary to improve communication among different visualization sub-groups, (b) facilitate the process of understanding differences and commonalities of the various research sub-fields in visualization, (c) provide an understanding of emerging new research trends, (d) facilitate the crucial step of finding the right reviewers for research submissions, and (e) it can eventually lead to a comprehensive taxonomy of visualization research. One additional tangible outcome of our work is an online query tool (http://keyvis.org/) that allows visualization researchers to easily browse the 3952 keywords used for IEEE VIS papers since 1990 to find related work or make informed keyword choices.

  15. The application of computer-aided technologies in automotive styling design

    Science.gov (United States)

    Zheng, Ze-feng; Zhang, Ji; Zheng, Ying

    2012-04-01

    In automotive industry, outline design is its life and creative design is its soul indeed. Computer-aided technology has been widely used in the automotive industry and more and more attention has been paid. This paper chiefly introduce the application of computer-aided technologies including CAD, CAM and CAE, analyses the process of automotive structural design and describe the development tendency of computer-aided design.

  16. International Conference on Emerging Research in Electronics, Computer Science and Technology

    CERN Document Server

    Sheshadri, Holalu; Padma, M

    2014-01-01

    PES College of Engineering is organizing an International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-12) in Mandya and merging the event with Golden Jubilee of the Institute. The Proceedings of the Conference presents high quality, peer reviewed articles from the field of Electronics, Computer Science and Technology. The book is a compilation of research papers from the cutting-edge technologies and it is targeted towards the scientific community actively involved in research activities.

  17. Teacher Perspectives on the Current State of Computer Technology Integration into the Public School Classroom

    Science.gov (United States)

    Zuniga, Ramiro

    2009-01-01

    Since the introduction of computers into the public school arena over forty years ago, educators have been convinced that the integration of computer technology into the public school classroom will transform education. Joining educators are state and federal governments. Public schools and others involved in the process of computer technology…

  18. Examining the Relationship between Technological, Organizational, and Environmental Factors and Cloud Computing Adoption

    Science.gov (United States)

    Tweel, Abdeneaser

    2012-01-01

    High uncertainties related to cloud computing adoption may hinder IT managers from making solid decisions about adopting cloud computing. The problem addressed in this study was the lack of understanding of the relationship between factors related to the adoption of cloud computing and IT managers' interest in adopting this technology. In…

  19. Understanding Pre-Service Teachers' Computer Attitudes: Applying and Extending the Technology Acceptance Model

    Science.gov (United States)

    Teo, T.; Lee, C. B.; Chai, C. S.

    2008-01-01

    Computers are increasingly widespread, influencing many aspects of our social and work lives. As we move into a technology-based society, it is important that classroom experiences with computers are made available for all students. The purpose of this study is to examine pre-service teachers' attitudes towards computers. This study extends the…

  20. Examining the Relationship between Technological, Organizational, and Environmental Factors and Cloud Computing Adoption

    Science.gov (United States)

    Tweel, Abdeneaser

    2012-01-01

    High uncertainties related to cloud computing adoption may hinder IT managers from making solid decisions about adopting cloud computing. The problem addressed in this study was the lack of understanding of the relationship between factors related to the adoption of cloud computing and IT managers' interest in adopting this technology. In…

  1. International Conference on Computer Science and Information Technologies

    CERN Document Server

    2017-01-01

    The book reports on new theories and applications in the field of intelligent systems and computing. It covers computational and artificial intelligence methods, as well as advances in computer vision, current issue in big data and cloud computing, computation linguistics, cyber-physical systems as well as topics in intelligent information management. Written by active researchers, the different chapters are based on contributions presented at the workshop in intelligent systems and computing (ISC), held during CSIT 2016, September 6-9, and jointly organized by the Lviv Polytechnic National University, Ukraine, the Kharkiv National University of RadioElectronics, Ukraine, and the Technical University of Lodz, Poland, under patronage of Ministry of Education and Science of Ukraine. All in all, the book provides academics and professionals with extensive information and a timely snapshot of the field of intelligent systems, and it is expected to foster new discussions and collaborations among different groups. ...

  2. Alternative energy technologies an introduction with computer simulations

    CERN Document Server

    Buxton, Gavin

    2014-01-01

    Introduction to Alternative Energy SourcesGlobal WarmingPollutionSolar CellsWind PowerBiofuelsHydrogen Production and Fuel CellsIntroduction to Computer ModelingBrief History of Computer SimulationsMotivation and Applications of Computer ModelsUsing Spreadsheets for SimulationsTyping Equations into SpreadsheetsFunctions Available in SpreadsheetsRandom NumbersPlotting DataMacros and ScriptsInterpolation and ExtrapolationNumerical Integration and Diffe

  3. Hacking the brain: Brain-computer interfacing technology and the ethics of neurosecurity

    NARCIS (Netherlands)

    Ienca, M.; Haselager, W.F.G.

    2016-01-01

    Brain-computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are potentia

  4. Impact of Collaborative Work on Technology Acceptance: A Case Study from Virtual Computing

    Science.gov (United States)

    Konak, Abdullah; Kulturel-Konak, Sadan; Nasereddin, Mahdi; Bartolacci, Michael R.

    2017-01-01

    Aim/Purpose: This paper utilizes the Technology Acceptance Model (TAM) to examine the extent to which acceptance of Remote Virtual Computer Laboratories (RVCLs) is affected by students' technological backgrounds and the role of collaborative work. Background: RVCLs are widely used in information technology and cyber security education to provide…

  5. Hacking the brain: Brain-computer interfacing technology and the ethics of neurosecurity

    NARCIS (Netherlands)

    Ienca, M.; Haselager, W.F.G.

    2016-01-01

    Brain-computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are potentia

  6. Energy-efficient building design and operation: The role of computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Brambley, M.R.

    1990-09-01

    Computer technology provides many opportunities to improve the energy performance of commercial buildings throughout the entire building life cycle. We are faced with developing those technologies to put the results of many years of buildings research into the hands of building owners, designers, and operators. This report discusses both the philosophical and technological aspect associated with this topic.

  7. A Computer-Assisted Approach for Conducting Information Technology Applied Instructions

    Science.gov (United States)

    Chu, Hui-Chun; Hwang, Gwo-Jen; Tsai, Pei Jin; Yang, Tzu-Chi

    2009-01-01

    The growing popularity of computer and network technologies has attracted researchers to investigate the strategies and the effects of information technology applied instructions. Previous research has not only demonstrated the benefits of applying information technologies to the learning process, but has also revealed the difficulty of applying…

  8. Hacking the brain: Brain-computer interfacing technology and the ethics of neurosecurity

    NARCIS (Netherlands)

    Ienca, M.; Haselager, W.F.G.

    2016-01-01

    Brain-computer interfacing technologies are used as assistive technologies for patients as well as healthy subjects to control devices solely by brain activity. Yet the risks associated with the misuse of these technologies remain largely unexplored. Recent findings have shown that BCIs are

  9. Impact of Collaborative Work on Technology Acceptance: A Case Study from Virtual Computing

    Science.gov (United States)

    Konak, Abdullah; Kulturel-Konak, Sadan; Nasereddin, Mahdi; Bartolacci, Michael R.

    2017-01-01

    Aim/Purpose: This paper utilizes the Technology Acceptance Model (TAM) to examine the extent to which acceptance of Remote Virtual Computer Laboratories (RVCLs) is affected by students' technological backgrounds and the role of collaborative work. Background: RVCLs are widely used in information technology and cyber security education to provide…

  10. Technology in practice – GP computer use by age.

    Science.gov (United States)

    Henderson, Joan; Pollack, Allan; Gordon, Julie; Miller, Graeme

    2014-12-01

    Since 2005, more than 95% of general practitioners (GPs) have had access to computers in their clinical work. We have analysed the most recent 2 years of BEACH data (April 2012-March 2014) to determine whether GP age affects clinical computer use.

  11. Quantitative Investigation of the Technologies That Support Cloud Computing

    Science.gov (United States)

    Hu, Wenjin

    2014-01-01

    Cloud computing is dramatically shaping modern IT infrastructure. It virtualizes computing resources, provides elastic scalability, serves as a pay-as-you-use utility, simplifies the IT administrators' daily tasks, enhances the mobility and collaboration of data, and increases user productivity. We focus on providing generalized black-box…

  12. AGIS: Integration of new technologies used in ATLAS Distributed Computing

    CERN Document Server

    Anisenkov, Alexey; The ATLAS collaboration

    2017-01-01

    AGIS is the information system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing (ADC) applications and services. In this note, we describe the evolution and the recent developments of AGIS functionalities.

  13. Quantitative Investigation of the Technologies That Support Cloud Computing

    Science.gov (United States)

    Hu, Wenjin

    2014-01-01

    Cloud computing is dramatically shaping modern IT infrastructure. It virtualizes computing resources, provides elastic scalability, serves as a pay-as-you-use utility, simplifies the IT administrators' daily tasks, enhances the mobility and collaboration of data, and increases user productivity. We focus on providing generalized black-box…

  14. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  15. Internet and Computer Technology Hazards: Perspectives for Family Counselling.

    Science.gov (United States)

    Oravec, Jo Ann

    2000-01-01

    Explores the social construction of the various computer hazards that households are encountering, such as computer addiction and children's access to on-line pornography. Discusses these issues in terms of constructivist counseling perspectives that are sensitive to cultural and environmental contexts. Outlines specific strategies for countering…

  16. USE OF INFORMATION TECHNOLOGIES IN TEACHING COMPUTER GRAPHICS

    Directory of Open Access Journals (Sweden)

    Tel'noy Viktor Ivanovich

    2012-10-01

    Full Text Available Peculiarities of teaching computer graphics as part of the course of engineering graphics aimed at the mastering of AutoCAD graphic editor are considered by the authors. The objective of the course is to develop the competencies of future professionals, inlcuding their structural design skills. The authors recommend incorporation of mini-lectures and computer workshops into the training process. Computer quizzes are to be held at the beginning of each class to consolidate the material, to ensure preparedness for mastering new information and to stimulate the process of learning. Department of descriptive geometry and engineering graphics developed a special methodology to ensure efficient presentation of theoretical material that incorporates special computer techniques and an original structure and succession of computer slides to improve the information intensity of the computer graphics course that enjoys a small number of lecturing hours allocated within training programmes offered by the University. Well-balanced tests to be performed by students in the course of their computer workshops facilitate their mastering computer graphics techniques that help them make high-quality error-free working drawings.

  17. Application of the grid computing technology in electrical energy engineering

    Energy Technology Data Exchange (ETDEWEB)

    Al-Khannak, R. [South Westphalia Univ. of Applied Sciences, Soest (Germany)

    2007-07-01

    The need for reliable, powerful, and clean power generation in power systems is becoming more importance. This need requires geographically-distributed power systems to be integrated as a single entity where among the main features of this integration are large data base and computing intensive. Hence the current power systems are not able to handle this huge datasets required for that integration, Grid Computing is a gateway to virtual storage media and processing power. This paper describes the research work on why grid computing is needed for power systems, what are the major challenges and problem to implement grid computing into power systems, and how grid computing can be utilized to fulfil the requirement for efficient power generation. (orig.)

  18. A Mobile-Based Computer Controller via Android Technology

    Directory of Open Access Journals (Sweden)

    Siew-Chin Chong

    2013-02-01

    Full Text Available The evolution of mobile devices, especially in these modern days, has drastically changed the face of business. A mobile phone device is often expected to offer computer-like functionality. These days, most mobile phone users find it somehow inconvenient to do some tasks using their computers. Most individuals prefer to change positions while sitting, stretching, and also feeling a bit more comfortable when browsing through their computers. It can be very impractical to be confined to the keyboard and mouse while sitting 5 or 10 feet from the computer. Hence, the proposed application is meant to turn the hand phone into a wireless keyboard and mouse with a touch-pad, through the wireless network. This prototype is proven to be able to perform most of the actions a normal computer keyboard and mouse can perform.

  19. Green Computing in Local Governments and Information Technology Companies

    Directory of Open Access Journals (Sweden)

    Badar Agung Nugroho

    2013-06-01

    Full Text Available Green computing is a study and practice of designing, manufacturing, using, and disposing of information and communication devices efficiently and effectively with minimum impact on the environment. If the green computing concept was implemented, it will help the agencies or companies to reduce energy and capital cost from their IT infrastructure. The goal from this research is to explore the current condition about the efforts from local governments and IT companies at West Java to implement the green computing concept at their working environment. The primary data were collected by using focus group discussion by inviting the local governments and IT companies representatives who responsible to manage their IT infrastructure. And then, the secondary data were collected by doing brief observation in order to see the real effort of green computing implementation at each institution. The result shows that there are many different perspectives and efforts of green computing implementation between local governments and IT companies.

  20. Computer in the Kitchen---or---Being Served by Technology.

    Science.gov (United States)

    Roth, Audrey J.

    Hopefully, the time will come when the humanistic users of communications technology will be used to make English teaching better and will help students learn. This paper presents an overview of the technological possibilities for English classrooms, assuming that school systems are not likely to undergo drastic changes in the future and that most…

  1. STEM-Based Computational Modeling for Technology Education

    Science.gov (United States)

    Clark, Aaron C.; Ernst, Jeremy V.

    2008-01-01

    According to professionals in education, change is an ever-present and evolving process. With transformation in education at both state and national levels, technology education must determine a position in this climate of change. This paper reflects the views on the future of technology education based on an ongoing research project. The purpose…

  2. Spin-transfer torque magnetoresistive random-access memory technologies for normally off computing (invited)

    Energy Technology Data Exchange (ETDEWEB)

    Ando, K., E-mail: ando-koji@aist.go.jp; Yuasa, S. [National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba 305-8568 (Japan); Fujita, S.; Ito, J.; Yoda, H. [Toshiba Corporation, Kawasaki 212-8582 (Japan); Suzuki, Y. [Graduate School of Engineering Science, Osaka University, Toyonaka 560-8531 (Japan); Nakatani, Y. [Department of Communication Engineering and Informatics, University of Electro-Communication, Chofu 182-8585 (Japan); Miyazaki, T. [WPI-AIMR, Tohoku University, Sendai 980-8577 (Japan)

    2014-05-07

    Most parts of present computer systems are made of volatile devices, and the power to supply them to avoid information loss causes huge energy losses. We can eliminate this meaningless energy loss by utilizing the non-volatile function of advanced spin-transfer torque magnetoresistive random-access memory (STT-MRAM) technology and create a new type of computer, i.e., normally off computers. Critical tasks to achieve normally off computers are implementations of STT-MRAM technologies in the main memory and low-level cache memories. STT-MRAM technology for applications to the main memory has been successfully developed by using perpendicular STT-MRAMs, and faster STT-MRAM technologies for applications to the cache memory are now being developed. The present status of STT-MRAMs and challenges that remain for normally off computers are discussed.

  3. Saudi high school students' attitudes and barriers toward the use of computer technologies in learning English.

    Science.gov (United States)

    Sabti, Ahmed Abdulateef; Chaichan, Rasha Sami

    2014-01-01

    This study examines the attitudes of Saudi Arabian high school students toward the use of computer technologies in learning English. The study also discusses the possible barriers that affect and limit the actual usage of computers. Quantitative approach is applied in this research, which involved 30 Saudi Arabia students of a high school in Kuala Lumpur, Malaysia. The respondents comprised 15 males and 15 females with ages between 16 years and 18 years. Two instruments, namely, Scale of Attitude toward Computer Technologies (SACT) and Barriers affecting Students' Attitudes and Use (BSAU) were used to collect data. The Technology Acceptance Model (TAM) of Davis (1989) was utilized. The analysis of the study revealed gender differences in attitudes toward the use of computer technologies in learning English. Female students showed high and positive attitudes towards the use of computer technologies in learning English than males. Both male and female participants demonstrated high and positive perception of Usefulness and perceived Ease of Use of computer technologies in learning English. Three barriers that affected and limited the use of computer technologies in learning English were identified by the participants. These barriers are skill, equipment, and motivation. Among these barriers, skill had the highest effect, whereas motivation showed the least effect.

  4. Teachers' Organization of Participation Structures for Teaching Science with Computer Technology

    Science.gov (United States)

    Subramaniam, Karthigeyan

    2016-08-01

    This paper describes a qualitative study that investigated the nature of the participation structures and how the participation structures were organized by four science teachers when they constructed and communicated science content in their classrooms with computer technology. Participation structures focus on the activity structures and processes in social settings like classrooms thereby providing glimpses into the complex dynamics of teacher-students interactions, configurations, and conventions during collective meaning making and knowledge creation. Data included observations, interviews, and focus group interviews. Analysis revealed that the dominant participation structure evident within participants' instruction with computer technology was ( Teacher) initiation-( Student and Teacher) response sequences-( Teacher) evaluate participation structure. Three key events characterized the how participants organized this participation structure in their classrooms: setting the stage for interactive instruction, the joint activity, and maintaining accountability. Implications include the following: (1) teacher educators need to tap into the knowledge base that underscores science teachers' learning to teach philosophies when computer technology is used in instruction. (2) Teacher educators need to emphasize the essential idea that learning and cognition is not situated within the computer technology but within the pedagogical practices, specifically the participation structures. (3) The pedagogical practices developed with the integration or with the use of computer technology underscored by the teachers' own knowledge of classroom contexts and curriculum needs to be the focus for how students learn science content with computer technology instead of just focusing on how computer technology solely supports students learning of science content.

  5. Attitudes of Female Faculty toward the Use of Computer Technologies and the Barriers that Limit Their Use of Technologies in Girls' Colleges in Saudi Arabia

    Science.gov (United States)

    Almuqayteeb, Taghreed Abdulaziz

    2009-01-01

    The purpose of this study was to examine female faculty members' use of computer technologies, their attitudes toward computers, the factors that best predict their attitudes toward computers, and the barriers that limit their use of computer technologies in girls' colleges in Dammam and Jubail, Saudi Arabia. Also, this study examined how female…

  6. Summary of researches being performed in the Institute of Mathematics and Computer Science on computer science and information technologies

    OpenAIRE

    Artiom Alhazov; Elena Boian; Liudmila Burtseva; Constantin Ciubotaru; Svetlana Cojocaru; Alexandru Colesnicov; Constantin Gaindric; Galina Magariu; Iurie Rogojin; Tatiana Verlan

    2008-01-01

    Evolution of the informatization notion (which assumes automation of majority of human activities applying computers, computer networks, information technologies) towards the notion of {\\it Global Information Society} (GIS) challenges the determination of new paradigms of society: automation and intellectualization of production, new level of education and teaching, formation of new styles of work, active participation in decision making, etc. To assure transition to GIS for any society, ...

  7. More than Moore technologies for next generation computer design

    CERN Document Server

    2015-01-01

    This book provides a comprehensive overview of key technologies being used to address challenges raised by continued device scaling and the extending gap between memory and central processing unit performance.  Authors discuss in detail what are known commonly as “More than Moore” (MtM), technologies, which add value to devices by incorporating functionalities that do not necessarily scale according to “Moore's Law”.  Coverage focuses on three key technologies needed for efficient power management and cost per performance: novel memories, 3D integration and photonic on-chip interconnect.

  8. Statistics of co-occurring keywords on Twitter

    CERN Document Server

    Mathiesen, Joachim; Jensen, Mogens H

    2014-01-01

    Online social media such as the micro-blogging site Twitter has become a rich source of real-time data on online human behaviors. Here we analyze the occurrence and co-occurrence frequency of keywords in user posts on Twitter. From the occurrence rate of major international brand names, we provide examples on predictions of brand-user behaviors. From the co-occurrence rates, we further analyze the user-perceived relationships between international brand names and construct the corresponding relationship networks. In general the user activity on Twitter is highly intermittent and we show that the occurrence rate of brand names forms a highly correlated time signal.

  9. Keyword Search over Data Service Integration for Accurate Results

    CERN Document Server

    Zemleris, Vidmantas; Robert Gwadera

    2013-01-01

    Virtual data integration provides a coherent interface for querying heterogeneous data sources (e.g., web services, proprietary systems) with minimum upfront effort. Still, this requires its users to learn the query language and to get acquainted with data organization, which may pose problems even to proficient users. We present a keyword search system, which proposes a ranked list of structured queries along with their explanations. It operates mainly on the metadata, such as the constraints on inputs accepted by services. It was developed as an integral part of the CMS data discovery service, and is currently available as open source.

  10. Corpus analysis and automatic detection of emotion-including keywords

    Science.gov (United States)

    Yuan, Bo; He, Xiangqing; Liu, Ying

    2013-12-01

    Emotion words play a vital role in many sentiment analysis tasks. Previous research uses sentiment dictionary to detect the subjectivity or polarity of words. In this paper, we dive into Emotion-Inducing Keywords (EIK), which refers to the words in use that convey emotion. We first analyze an emotion corpus to explore the pragmatic aspects of EIK. Then we design an effective framework for automatically detecting EIK in sentences by utilizing linguistic features and context information. Our system outperforms traditional dictionary-based methods dramatically in increasing Precision, Recall and F1-score.

  11. Fostering Language Learning Autonomy via the Computer Technology in Tertiary Education

    Institute of Scientific and Technical Information of China (English)

    刘剑英

    2007-01-01

    This paper will begin by discussing the concept of learning autonomy.What follows is the rationale why learning autonomy is needed in language learning.It then will focus on the ways in which computer technology can foster language learning autonomy by checking different aspects of computer technology against the criteria that characterize leaning autonomy,followed by the analysis why this is possibie in tertiary education.The conclusion of this paper will be some considerations of fostering learning autonomy via the computer technology.

  12. Data Mining Based on Cloud-Computing Technology

    Directory of Open Access Journals (Sweden)

    Ren Ying

    2016-01-01

    Full Text Available There are performance bottlenecks and scalability problems when traditional data-mining system is used in cloud computing. In this paper, we present a data-mining platform based on cloud computing. Compared with a traditional data mining system, this platform is highly scalable, has massive data processing capacities, is service-oriented, and has low hardware cost. This platform can support the design and applications of a wide range of distributed data-mining systems.

  13. Distributed Computing and Monitoring Technologies for Older Patients

    DEFF Research Database (Denmark)

    Klonovs, Juris; Haque, Mohammad Ahsanul; Krüger, Volker

    , telemonitoring, ambient intelligence, ambient assisted living, gerontechnology, and aging-in-place technology. The book discusses relevant experimental studies, highlighting the application of sensor fusion, signal processing and machine learning techniques. Finally, the text discusses future challenges...

  14. Using Gazetteers to Extract Sets of Keywords from Free-Flowing Texts

    Directory of Open Access Journals (Sweden)

    Adam Crymble

    2015-12-01

    Full Text Available If you have a copy of a text in electronic format stored on your computer, it is relatively easy to keyword search for a single term. Often you can do this by using the built-in search features in your favourite text editor. However, scholars are increasingly needing to find instances of many terms within a text or texts. For example, a scholar may want to use a gazetteer to extract all mentions of English placenames within a collection of texts so that those places can later be plotted on a map. Alternatively, they may want to extract all male given names, all pronouns, stop words, or any other set of words. Using those same built-in search features to achieve this more complex goal is time consuming and clunky. This lesson will teach you how to use Python to extract a set of keywords very quickly and systematically from a set of texts. It is expected that once you have completed this lesson, you will be able to generalise the skills to extract custom sets of keywords from any set of locally saved files.

  15. Application verification research of cloud computing technology in the field of real time aerospace experiment

    Science.gov (United States)

    Wan, Junwei; Chen, Hongyan; Zhao, Jing

    2017-08-01

    According to the requirements of real-time, reliability and safety for aerospace experiment, the single center cloud computing technology application verification platform is constructed. At the IAAS level, the feasibility of the cloud computing technology be applied to the field of aerospace experiment is tested and verified. Based on the analysis of the test results, a preliminary conclusion is obtained: Cloud computing platform can be applied to the aerospace experiment computing intensive business. For I/O intensive business, it is recommended to use the traditional physical machine.

  16. Computer Science and Technology: Measurement of Interative Computing: Methodology and Application.

    Science.gov (United States)

    Cotton, Ira W.

    This dissertation reports the development and application of a new methodology for the measurement and evaluation of interactive computing, applied to either the users of an interactive computing system or to the system itself, including the service computer and any communications network through which the service is delivered. The focus is on the…

  17. Disclosive Computer Ethics: The Exposure and Evaluation of Embedded Normativity in Computer Technology

    NARCIS (Netherlands)

    Brey, Philip

    2000-01-01

    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values

  18. A Study to Compare Curriculum of Computer Information Systems and Computer Education and Instructional Technologies

    Science.gov (United States)

    Cavus, Nadire

    2008-01-01

    Today, developments of information and communication technologies have been developing very fast all over the world. These new technologies were taking an important place in education like other sciences. For this reason, education was developing parallel to new developments on the new technologies. Departments which cover curriculum of new…

  19. Formalizing An Approach to Curate the Global Change Master Directory (GCMD)'s Controlled Vocabularies (Keywords) Through a Keyword Governance Process and Community Involvement

    Science.gov (United States)

    Stevens, T.

    2016-12-01

    NASA's Global Change Master Directory (GCMD) curates a hierarchical set of controlled vocabularies (keywords) covering Earth sciences and associated information (data centers, projects, platforms, and instruments). The purpose of the keywords is to describe Earth science data and services in a consistent and comprehensive manner, allowing for precise metadata search and subsequent retrieval of data and services. The keywords are accessible in a standardized SKOS/RDF/OWL representation and are used as an authoritative taxonomy, as a source for developing ontologies, and to search and access Earth Science data within online metadata catalogs. The keyword curation approach involves: (1) receiving community suggestions; (2) triaging community suggestions; (3) evaluating keywords against a set of criteria coordinated by the NASA Earth Science Data and Information System (ESDIS) Standards Office; (4) implementing the keywords; and (5) publication/notification of keyword changes. This approach emphasizes community input, which helps ensure a high quality, normalized, and relevant keyword structure that will evolve with users' changing needs. The Keyword Community Forum, which promotes a responsive, open, and transparent process, is an area where users can discuss keyword topics and make suggestions for new keywords. Others could potentially use this formalized approach as a model for keyword curation.

  20. Computer-Aided Modeling of Lipid Processing Technology

    DEFF Research Database (Denmark)

    Diaz Tovar, Carlos Axel

    2011-01-01

    are widely used for design, analysis, and optimization of processes in the chemical and petrochemical industries. These computer-aided tools have helped the chemical industry to evolve beyond commodities toward specialty chemicals and ‘consumer oriented chemicals based products’. Unfortunately...... this is not the case for the edible oil and biodiesel industries. The oleochemical industry lags behind the chemical industry in terms of thermophysical property modeling and development of computational tools suitable for the design/analysis, and optimization of lipid-related processes. The aim of this work has been...... increase along with growing interest in biofuels, the oleochemical industry faces in the upcoming years major challenges in terms of design and development of better products and more sustainable processes to make them. Computer-aided methods and tools for process synthesis, modeling and simulation...

  1. Computer technology explodes into the oil and gas industry

    Energy Technology Data Exchange (ETDEWEB)

    1990-03-12

    This article presents a look at some of the specialized computer systems available to all segments of the oil and gas industry. Information on computer systems was gathered from a survey of more than 200 hardware and software suppliers. Suppliers were asked to submit information on products available specifically to the various segments of the industry. The information presented is designed to give brief details of some of the innovative and powerful applications, and to illustrate the wide range of capabilities some of these systems possess. Where possible, the equipment, computing power, and peripheral equipment required to effectively operate the various systems are given. The article is divided into three sections: upstream---exploration, drilling, and production; down-stream---refining, petrochemical, and gas processing, and pipeline; and a general section that covers generic hardware and software that have capabilities that may be useful to the oil and gas industry.

  2. Exploiting the Potentialities of Computer Technology for Enhancing Teaching and Learning

    Institute of Scientific and Technical Information of China (English)

    多守明

    2013-01-01

    This paper aims to provide a coherent study of the potentialities of computer technology for enhancing teaching and learning,and how these potentialities may be realized and functioned in a learning-centered school.

  3. A Technological Primrose Path? ESL Students and Computer-Assisted Writing Programs.

    Science.gov (United States)

    Sampson, Donald E; and Gregory, James F.

    1991-01-01

    Describes what happened when students, unsupervised, used a style-checking computer program to check their essays. The feedback (considered somewhat misleading) suggested that teachers need to guide students along the technological path. (seven references) (GLR)

  4. COMPUTER MODELING AS ONE OF CONTEMPORARY METHODS OF FORECASTING IN PHARMACEUTICAL TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    S. O. Losenkova

    2014-01-01

    Full Text Available The work presents researches devoted to the forecasting of compatibility of additive and drug substances with a method of computer modeling for its use in composition elaboration and technology of transdermal therapeutic systems.

  5. EXPERIMENTAL AND THEORETICAL FOUNDATIONS AND PRACTICAL IMPLEMENTATION OF TECHNOLOGY BRAIN-COMPUTER INTERFACE

    National Research Council Canada - National Science Library

    A. Ya. Kaplan; A. G. Kochetova; S. L. Shishkin; I. A. Basyul; I. P. Ganin; A. N. Vasilev; S. P. Liburkina

    2013-01-01

    Technology brain-computer interface (BCI) allow saperson to learn how to control external devices via thevoluntary regulation of own EEG directly from the brain without the involvement in the process of nerves and muscles...

  6. FY 2000 Blue Book: High Performance Computing and Communications: Information Technology Frontiers for a New Millennium

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As we near the dawn of a new millennium, advances made possible by computing, information, and communications research and development R and D ? once barely...

  7. FY 1997 Blue Book: High Performance Computing and Communications: Advancing the Frontiers of Information Technology

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  8. Research on the application in disaster reduction for using cloud computing technology

    Science.gov (United States)

    Tao, Liang; Fan, Yida; Wang, Xingling

    Cloud Computing technology has been rapidly applied in different domains recently, promotes the progress of the domain's informatization. Based on the analysis of the state of application requirement in disaster reduction and combining the characteristics of Cloud Computing technology, we present the research on the application of Cloud Computing technology in disaster reduction. First of all, we give the architecture of disaster reduction cloud, which consists of disaster reduction infrastructure as a service (IAAS), disaster reduction cloud application platform as a service (PAAS) and disaster reduction software as a service (SAAS). Secondly, we talk about the standard system of disaster reduction in five aspects. Thirdly, we indicate the security system of disaster reduction cloud. Finally, we draw a conclusion the use of cloud computing technology will help us to solve the problems for disaster reduction and promote the development of disaster reduction.

  9. Computational molecular engineering as an emerging technology in process engineering

    CERN Document Server

    Horsch, Martin; Vrabec, Jadran; Hasse, Hans

    2013-01-01

    The present level of development of molecular force field methods is assessed from the point of view of simulation-based engineering, outlining the immediate perspective for further development and highlighting the newly emerging discipline of Computational Molecular Engineering (CME) which makes basic research in soft matter physics fruitful for industrial applications. Within the coming decade, major breakthroughs can be reached if a research focus is placed on processes at interfaces, combining aspects where an increase in the accessible length and time scales due to massively parallel high-performance computing will lead to particularly significant improvements.

  10. Cloud Computing : Goals, Issues, SOA, Integrated Technologies and Future -scope

    Directory of Open Access Journals (Sweden)

    V. Madhu Viswanatham

    2016-10-01

    Full Text Available The expansion of networking infrastructure has provided a novel way to store and access resources in a reliable, convenient and affordable means of technology called the Cloud. The cloud has become so popular and established its dominance in many recent world innovations and has highly influenced the trend of the Business process Management with the advantage of shared resources. The ability to remain disaster tolerant, on-demand scalability, flexible deployment and cost effectiveness has made the future world technologies like Internet of Things, to determine the cloud as their data and processing center. However, along with the implementation of cloud based technologies, we must also address the issues involved in its realization. This paper is a review on the advancements, scopes and issues involved in realizing a secured cloud powered environments.

  11. Computer-to-plate Technology: Violet or Thermo?

    OpenAIRE

    Michael Mittelhaus

    2004-01-01

    Up to now CtP has been a technology for medium-sized and large companies and their printing presses, and thus predominantly in the 70 x 100 cm format and larger. The CtP technology is and remains divided up between violet and thermo, with the advantages and drawbacks of both imaging systems in a counterbalance. Due to the broad penetration of CtP in many markets, practical questions have now come to the fore, including those of continuous process control and quality assurance; providers and s...

  12. Summary of researches being performed in the Institute of Mathematics and Computer Science on computer science and information technologies

    Directory of Open Access Journals (Sweden)

    Artiom Alhazov

    2008-07-01

    Full Text Available Evolution of the informatization notion (which assumes automation of majority of human activities applying computers, computer networks, information technologies towards the notion of {\\it Global Information Society} (GIS challenges the determination of new paradigms of society: automation and intellectualization of production, new level of education and teaching, formation of new styles of work, active participation in decision making, etc. To assure transition to GIS for any society, including that from Republic of Moldova, requires both special training and broad application of progressive technologies and information systems. Methodological aspects concerning impact of GIS creation over the citizen, economic unit, national economy in the aggregate demands a profound study. Without systematic approach to these aspects the GIS creation would have confront great difficulties. Collective of researchers from the Institute of Mathematics and Computer Science (IMCS of Academy of Sciences of Moldova, which work in the field of computer science, constitutes the center of advanced researches and activates in those directions of researches of computer science which facilitate technologies and applications without of which the development of GIS cannot be assured.

  13. International Conference on Emerging Technologies for Information Systems, Computing, and Management

    CERN Document Server

    Ma, Tinghuai; Emerging Technologies for Information Systems, Computing, and Management

    2013-01-01

    This book aims to examine innovation in the fields of information technology, software engineering, industrial engineering, management engineering. Topics covered in this publication include; Information System Security, Privacy, Quality Assurance, High-Performance Computing and Information System Management and Integration. The book presents papers from The Second International Conference for Emerging Technologies Information Systems, Computing, and Management (ICM2012) which was held on December 1 to 2, 2012 in Hangzhou, China.

  14. Investigate the Computer Information Network Security Technology and the Development Direction

    OpenAIRE

    Ping Teng

    2017-01-01

    After China’s accession to the WTO, the computer information network security technology of our country has a rapid development, bring many conveniences for the people’s life and work, indirectly changing their daily life and working mode. For the whole development situation of our country, the development direction of informatization is the inevitable trend of development in our country, while the using process of computer information network security technology in the society still exist ma...

  15. A Research Program in Computer Technology. Volume 1

    Science.gov (United States)

    1981-08-01

    Kahn, and Bernard Lang . Formal Definition of Ada, Honeywell, Inc. and CII-Honeywell Bull, 1980. 2. Ichbiah, Jean D., et al., Reference Manual for the...14. COMPUTER RESEARCH SUPPORT Technical Staff: Support Staff: Dan Lynch John Metzger Walt Edmison Ray Bates Bill Moore Chloe HoIg Dale Chase Serge

  16. Effects of Educational Beliefs on Attitudes towards Using Computer Technologies

    Science.gov (United States)

    Onen, Aysem Seda

    2012-01-01

    This study, aiming to determine the relationship between pre-service teachers' beliefs about education and their attitudes towards utilizing computers and internet, is a descriptive study in scanning model. The sampling of the study consisted of 270 pre-service teachers. The potential relationship between the beliefs of pre-service teachers about…

  17. Future of computing technology in physics - the potentials and pitfalls

    Energy Technology Data Exchange (ETDEWEB)

    Brenner, A.E.

    1984-02-01

    The impact of the developments of modern digital computers is discussed, especially with respect to physics research in the future. The effects of large data processing capability and increasing rates at which data can be acquired and processed are considered. (GHT)

  18. Managing Technostress: Optimizing the Use of Computer Technology.

    Science.gov (United States)

    Brod, Craig

    1982-01-01

    Afraid of change, many employees refuse to join the computer revolution. The author states that only understanding and proper training can break down such resistance. The term "technostress" is described and the importance of employee self-assessment is examined. (CT)

  19. The Mediated Museum: Computer-Based Technology and Museum Infrastructure.

    Science.gov (United States)

    Sterman, Nanette T.; Allen, Brockenbrough S.

    1991-01-01

    Describes the use of computer-based tools and techniques in museums. The integration of realia with media-based advice and interpretation is described, electronic replicas of ancient Greek vases in the J. Paul Getty Museum are explained, examples of mediated exhibits are presented, and the use of hypermedia is discussed. (five references) (LRW)

  20. A Research Program in Computer Technology. 1987 Annual Technical Report

    Science.gov (United States)

    1990-07-01

    mathematical approach to computational network design," in E. E. Swartzlander (ed.), Systolic Signal Processing Systems, chapter 1, Marcel Dekker , 1987...Institute, RS-87-179, 0 May 1987. * 123 48. Matthiessen, C., and S. A. Thompson, "The structure of discourse and ’subordination’," in J. Halman and S. A

  1. Educational Technology Research Journals: Computers & Education, 2002-2011

    Science.gov (United States)

    Rackham, David D.; Hyatt, Frederick R.; Macfarlane, David C.; Nisse, Tony; Woodfield, Wendy; West, Richard E.

    2013-01-01

    In this study, the authors examined the journal "Computers & Education" to discover research trends in the articles published during 2002-2011. Research articles were analyzed to determine trends in the research methods and types of articles published, as well as the key topics published, top authors, and some of the most-cited…

  2. Investing in Computer Technology: Criteria and Procedures for System Selection.

    Science.gov (United States)

    Hofstetter, Fred T.

    The criteria used by the University of Delaware in selecting the PLATO computer-based educational system are discussed in this document. Consideration was given to support for instructional strategies, requirements of the student learning station, features for instructors and authors of instructional materials, general operational characteristics,…

  3. Computer Technology and Its Impact on Recreation and Sport Programs.

    Science.gov (United States)

    Ross, Craig M.

    This paper describes several types of computer programs that can be useful to sports and recreation programs. Computerized tournament scheduling software is helpful to recreation and parks staff working with tournaments of 50 teams/individuals or more. Important features include team capacity, league formation, scheduling conflicts, scheduling…

  4. College of Engineering receives $1 million computing technology grant

    OpenAIRE

    Nystrom, Lynn A.

    2007-01-01

    A $1 million grant of Fujitsu technology and services to Virginia Tech's College of Engineering will assist in the college's creation of "digital opportunities" for underserved students, as well as pre-college students interested in studying math, science or engineering at Virginia Tech.

  5. Administrative Strategies for Successful Adoption of Computer Technology.

    Science.gov (United States)

    Aitken, Joan E.; Shedletsky, Leonard J.

    2001-01-01

    Suggests that offering online courses extends the reach of education to people who otherwise may be unable to complete courses. Gives administrators a perspective from the standpoint of professors who are not "techies," but have been involved in the infusion of technology. Proposes that administrators keep seven critical ideas before them while…

  6. Computer-to-plate Technology: Violet or Thermo?

    Directory of Open Access Journals (Sweden)

    Michael Mittelhaus

    2004-12-01

    Full Text Available Up to now CtP has been a technology for medium-sized and large companies and their printing presses, and thus predominantly in the 70 x 100 cm format and larger. The CtP technology is and remains divided up between violet and thermo, with the advantages and drawbacks of both imaging systems in a counterbalance. Due to the broad penetration of CtP in many markets, practical questions have now come to the fore, including those of continuous process control and quality assurance; providers and specialist forums on these topics will also hold centre stage at drupa. This applies equally to frequency-modulated screening processes, which are today well known and are viewed as a means for ensuring a competitive edge. The CtP technology is now broader and more diverse than ever, and drupa 2004 will clarify which technology and which imagers best allow economical digital plate production for formats up to 50 x 70 cm.

  7. Computer Access in Higher Education for Students with Disabilities: A Practical Guide to the Selection and Use of Adapted Computer Technology. Second Edition.

    Science.gov (United States)

    Brown, Carl; And Others

    The manual provides a review of trends in adapted computer technology as well as guidelines to the selection and use of computer technology in college programs serving disabled students. Changes in the second edition include a new section dealing with the computer access needs of the severely disabled, an enlarged product guide, a curriculum guide…

  8. Proceedings: 1989 conference on advanced computer technology for the power industry

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, B. (ed.)

    1990-07-01

    An EPRI conference to address advanced computer technology was hosted by Arizona Public Service in Scottsdale, Arizona, December 4--6, 1989. Participants represented US and foreign utilities, major electric and computer industry vendors, R D contractors, and consulting firms. These Proceedings contain the text of the technical presentations and summaries of the panel discussions. The conference objectives were: to asses modern computer technologies and how they will effect utility operations; to share US and foreign utility experiences in developing computer-based technical products; and to discuss research conducted by EPRI in advanced computer technology on behalf of its utility members. Technical presentations addressed a broad range of computer-related topics: Computer-Based Training, Engineering Workstations, Hypermedia and Other Advanced User Interfaces, Networks and Communications, Expert Systems and Other Decision-Support Methodologies, Intelligent Database Management, Supercomputing Architectures and Applications, Real-Time Data Processing, Computerized Technology and Information Transfer, and Neural Networks and Other Emerging Technologies. In addition, two panel sessions were conducted to provide a forum for utilities to discuss past and future directions of EPRI software, and the future role of engineering workstations in utilities. The results of these two panels are summarized in this paper.

  9. Science and computer-based technologies: attitudes of secondary science teachers

    Science.gov (United States)

    Ng, Wan; Gunstone, Richard

    2003-02-01

    As is the case with most developed countries, pressures from various sectors of society have seen computers make a big presence in Australian education systems in the last decade. In the state of Victoria, integrating learning technology (LT) into all key learning areas of every school's curriculum has been a priority policy of governments. Over the last 8-10 years, large amounts of money have been provided to set schools up with computers and associated technologies. In the area of science, a range of LT resources is available for use in the teaching and learning processes in the classroom. However, there has been limited evaluation into teachers' attitudes towards, and types of, methodology and effectiveness of usage of computer-based technologies in knowledge construction. Using both quantitative and qualitative methods, a study aimed at identifying science teachers' opinions and practices with the use of computer-based technologies in their teaching has been carried out in Victorian government schools. The focus of this paper is on the attitudes of these science teachers towards the use of computer-based technologies in their teaching. The study showed that most teachers have embraced the introduction of these technologies into the school structure well and are generally positive about their potential in the classroom. However, their use in the classrooms is infrequent and often on an ad hoc basis. A range of obstacles preventing the use of these technologies are identified and discussed in this paper.

  10. Tool or Science? The History of Computing at the Norwegian University of Science and Technology

    Science.gov (United States)

    Nordal, Ola

    One may characterize the history of computing at the Norwegian University of Science and Technology by a tension between the computer as a tool in other disciplines and computer science as discipline in itself. This tension has been latent since the pioneering period of the 1950s until today. This paper shows how this have been expressed in the early attempts to take up computing at the University, and how it gave the Division of Computer Science a fairly rough start when it opened in 1972.

  11. Finding keywords amongst noise: automatic text classification without parsing

    Science.gov (United States)

    Allison, Andrew G.; Pearce, Charles E. M.; Abbott, Derek

    2007-06-01

    The amount of text stored on the Internet, and in our libraries, continues to expand at an exponential rate. There is a great practical need to locate relevant content. This requires quick automated methods for classifying textual information, according to subject. We propose a quick statistical approach, which can distinguish between 'keywords' and 'noisewords', like 'the' and 'a', without the need to parse the text into its parts of speech. Our classification is based on an F-statistic, which compares the observed Word Recurrence Interval (WRI) with a simple null hypothesis. We also propose a model to account for the observed distribution of WRI statistics and we subject this model to a number of tests.

  12. In the Clouds: The Implications of Cloud Computing for Higher Education Information Technology Governance and Decision Making

    Science.gov (United States)

    Dulaney, Malik H.

    2013-01-01

    Emerging technologies challenge the management of information technology in organizations. Paradigm changing technologies, such as cloud computing, have the ability to reverse the norms in organizational management, decision making, and information technology governance. This study explores the effects of cloud computing on information technology…

  13. In the Clouds: The Implications of Cloud Computing for Higher Education Information Technology Governance and Decision Making

    Science.gov (United States)

    Dulaney, Malik H.

    2013-01-01

    Emerging technologies challenge the management of information technology in organizations. Paradigm changing technologies, such as cloud computing, have the ability to reverse the norms in organizational management, decision making, and information technology governance. This study explores the effects of cloud computing on information technology…

  14. 4th International Conference on Computational Collective Intel- ligence Technologies and Applications (ICCCI 2012)

    CERN Document Server

    Trawiński, Bogdan; Katarzyniak, Radosław; Jo, Geun-Sik; Advanced Methods for Computational Collective Intelligence

    2013-01-01

    The book consists of 35 extended chapters which have been selected and invited from the submissions to the 4th International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2012) held on November 28-30, 2012 in Ho Chi Minh City, Vietnam. The book is organized into six parts, which are semantic web and ontologies, social networks and e-learning, agent and multiagent systems, data mining methods and applications, soft computing, and optimization and control, respectively. All chapters in the book discuss theoretical and practical issues connected with computational collective intelligence and related technologies. The editors hope that the book can be useful for graduate and Ph.D. students in Computer Science, in particular participants in courses on Soft Computing, Multiagent Systems, and Data Mining. This book can be also useful for researchers working on the concept of computational collective intelligence in artificial populations. It is the hope of the editors that ...

  15. ASSISTANT--Computer Consulting System for Choice and Evaluation of Education Technology.

    Science.gov (United States)

    Ganchev, Nelko; And Others

    1992-01-01

    Discussion of computer systems that help teachers plan and manage the learning process focuses on the development of a computer consulting system, ASSISTANT, which was designed to help teachers choose the most suitable educational technology and evaluate its effectiveness. The organization of the database is explained. (seven references) (LRW)

  16. Integrated Computer Aided Planning and Manufacture of Advanced Technology Jet Engines

    Directory of Open Access Journals (Sweden)

    B. K. Subhas

    1987-10-01

    Full Text Available This paper highlights an attempt at evolving a computer aided manufacturing system on a personal computer. A case study of an advanced technology jet engine component is included to illustrate various outputs from the system. The proposed system could be an alternate solution to sophisticated and expensive CAD/CAM workstations.

  17. Reading Teachers' Beliefs and Utilization of Computer and Technology: A Case Study

    Science.gov (United States)

    Remetio, Jessica Espinas

    2014-01-01

    Many researchers believe that computers have the ability to help improve the reading skills of students. In an effort to improve the poor reading scores of students on state tests, as well as improve students' overall academic performance, computers and other technologies have been installed in Frozen Bay School classrooms. As the success of these…

  18. Scaling the Digital Divide: Home Computer Technology and Student Achievement. Working Paper 48

    Science.gov (United States)

    Vigdor, Jacob L.; Ladd, Helen F.

    2010-01-01

    Does differential access to computer technology at home compound the educational disparities between rich and poor? Would a program of government provision of computers to early secondary school students reduce these disparities? The authors use administrative data on North Carolina public school students to corroborate earlier surveys that…

  19. Scaling the Digital Divide: Home Computer Technology and Student Achievement. NBER Working Paper No. 16078

    Science.gov (United States)

    Vigdor, Jacob L.; Ladd, Helen F.

    2010-01-01

    Does differential access to computer technology at home compound the educational disparities between rich and poor? Would a program of government provision of computers to early secondary school students reduce these disparities? We use administrative data on North Carolina public school students to corroborate earlier surveys that document broad…

  20. Embodying Computational Thinking: Initial Design of an Emerging Technological Learning Tool

    Science.gov (United States)

    Daily, Shaundra B.; Leonard, Alison E.; Jörg, Sophie; Babu, Sabarish; Gundersen, Kara; Parmar, Dhaval

    2015-01-01

    This emerging technology report describes virtual environment interactions an approach for blending movement and computer programming as an embodied way to support girls in building computational thinking skills. The authors seek to understand how body syntonicity might enable young learners to bootstrap their intuitive knowledge in order to…

  1. The Effects of Computer-Assisted Feedback Strategies in Technology Education: A Comparison of Learning Outcomes

    Science.gov (United States)

    Adams, Ruifang Hope; Strickland, Jane

    2012-01-01

    This study investigated the effects of computer-assisted feedback strategies that have been utilized by university students in a technology education curriculum. Specifically, the study examined the effectiveness of the computer-assisted feedback strategy "Knowledge of Response feedback" (KOR), and the "Knowledge of Correct Responses feedback"…

  2. Faculty's Acceptance of Computer Based Technology: Cross-Validation of an Extended Model

    Science.gov (United States)

    Ahmad, Tunku Badariah Tunku; Madarsha, Kamal Basha; Zainuddin, Ahmad Marzuki; Ismail, Nik Ahmad Hisham; Nordin, Mohamad Sahari

    2010-01-01

    The first aim of the present study is to validate an extended technology acceptance model (TAME) on the data derived from the faculty members of a university in an ongoing, computer mediated work setting. The study extended the original TAM model by including an intrinsic motivation component--computer self efficacy. In so doing, the study…

  3. Evaluation of Two Different Teaching Concepts in Dentistry Using Computer Technology

    Science.gov (United States)

    Reich, Sven; Simon, James F.; Ruedinger, Dirk; Shortall, Adrian; Wichmann, Manfred; Frankenberger, Roland

    2007-01-01

    The common teaching goal of two different phantom head courses was to enable the students to provide an all-ceramic restoration by the means of computer technology. The aim of this study was to compare these two courses with regard to the different educational methods using identical computer software. Undergraduate dental students from a single…

  4. Visualizing History: Computer Technology and the Graphic Presentation of the Past

    Science.gov (United States)

    Moss, Mark

    2004-01-01

    Computer technology has impacted both the study and idea of history in a number of ways. The Internet has provided numerous web-sites for students to read, see and look into for historical information. Historians, both professional and public have also begun to utilize the computer in a variety of ways, both in academic terms as well as leisure…

  5. 计算机网络安全技术%Security Technologies of Computer Network

    Institute of Scientific and Technical Information of China (English)

    罗明宇; 卢锡城; 卢泽新; 韩亚欣

    2000-01-01

    With the development of computer network,requirements of computer network security have been more and more urgent. In tills paper, goals of network security are reviewed. Several network attack methods,such as interruption,interception, modification, fabrication,are studied. Network security technologies,such as security mechan!sm,encryption,security detection,firewall,were discussed.

  6. The Role of Wireless Computing Technology in the Design of Schools.

    Science.gov (United States)

    Nair, Prakash

    This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…

  7. Computer-Aided Analysis of Patents for Product Technology Maturity Forecasting

    Science.gov (United States)

    Liang, Yanhong; Gan, Dequan; Guo, Yingchun; Zhang, Peng

    Product technology maturity foresting is vital for any enterprises to hold the chance for innovation and keep competitive for a long term. The Theory of Invention Problem Solving (TRIZ) is acknowledged both as a systematic methodology for innovation and a powerful tool for technology forecasting. Based on TRIZ, the state -of-the-art on the technology maturity of product and the limits of application are discussed. With the application of text mining and patent analysis technologies, this paper proposes a computer-aided approach for product technology maturity forecasting. It can overcome the shortcomings of the current methods.

  8. A Delphi Study on Technology Enhanced Learning (TEL) Applied on Computer Science (CS) Skills

    Science.gov (United States)

    Porta, Marcela; Mas-Machuca, Marta; Martinez-Costa, Carme; Maillet, Katherine

    2012-01-01

    Technology Enhanced Learning (TEL) is a new pedagogical domain aiming to study the usage of information and communication technologies to support teaching and learning. The following study investigated how this domain is used to increase technical skills in Computer Science (CS). A Delphi method was applied, using three-rounds of online survey…

  9. Use of Computer Technology for English Language Learning: Do Learning Styles, Gender, and Age Matter?

    Science.gov (United States)

    Lee, Cynthia; Yeung, Alexander Seeshing; Ip, Tiffany

    2016-01-01

    Computer technology provides spaces and locales for language learning. However, learning style preference and demographic variables may affect the effectiveness of technology use for a desired goal. Adapting Reid's pioneering Perceptual Learning Style Preference Questionnaire (PLSPQ), this study investigated the relations of university students'…

  10. Community Colleges in the Information Age: Gains Associated with Students' Use of Computer Technology

    Science.gov (United States)

    Anderson, Bodi; Horn, Robert

    2012-01-01

    Computer literacy is increasingly important in higher education, and many educational technology experts propose a more prominent integration of technology into pedagogy. Empirical evidence is needed to support these theories. This study examined community college students planning to transfer to 4-year universities and estimated the relationship…

  11. An Investigation of the Administrator's Role as Instructional Leader in Effective Computer Technology Integration

    Science.gov (United States)

    Thomas, Shailendra Nelle

    2010-01-01

    Purpose, scope, and method of study: Although computer technology has been a part of the educational community for many years, it is still not used at its optimal capacity (Gosmire & Grady, 2007b; Trotter, 2007). While teachers were identified early as playing important roles in the success of technology implementation, principals were often…

  12. Investigation of Pre-Service Physical Education Teachers' Attitudes Towards Computer Technologies (Case of Turkey)

    Science.gov (United States)

    Can, Suleyman

    2015-01-01

    Elicitation of pre-service physical education teachers' attitudes towards computer technologies seems to be of great importance to satisfy the conditions to be met for the conscious and effective use of the technologies required by the age to be used in educational settings. In this respect, the purpose of the present study is to investigate…

  13. Science-Technology Coupling: The Case of Mathematical Logic and Computer Science.

    Science.gov (United States)

    Wagner-Dobler, Roland

    1997-01-01

    In the history of science, there have often been periods of sudden rapprochements between pure science and technology-oriented branches of science. Mathematical logic as pure science and computer science as technology-oriented science have experienced such a rapprochement, which is studied in this article in a bibliometric manner. (Author)

  14. Computer Technology in Clinical Psychology Services for People with Mental Retardation: A Review.

    Science.gov (United States)

    Davies, Sara; Hastings, Richard P.

    2003-01-01

    Review of the literature on computer technology in clinical psychology services for people with mental retardation is organized around stages of a scientist-practitioner working model: assessment, formulation, and intervention. Examples of technologies to facilitate work at each stage are given. Practical difficulties with implementation of…

  15. Technology Readiness, Internet Self-Efficacy and Computing Experience of Professional Accounting Students

    Science.gov (United States)

    Lai, Ming-Ling

    2008-01-01

    Purpose: This study aims to assess the state of technology readiness of professional accounting students in Malaysia, to examine their level of internet self-efficacy, to assess their prior computing experience, and to explore if they are satisfied with the professional course that they are pursuing in improving their technology skills.…

  16. Use of Computer Technology for English Language Learning: Do Learning Styles, Gender, and Age Matter?

    Science.gov (United States)

    Lee, Cynthia; Yeung, Alexander Seeshing; Ip, Tiffany

    2016-01-01

    Computer technology provides spaces and locales for language learning. However, learning style preference and demographic variables may affect the effectiveness of technology use for a desired goal. Adapting Reid's pioneering Perceptual Learning Style Preference Questionnaire (PLSPQ), this study investigated the relations of university students'…

  17. Leveraging Computer-Mediated Communication Technologies to Enhance Interactions in Online Learning

    Science.gov (United States)

    Wright, Linda J.

    2011-01-01

    Computer-mediated communication (CMC) technologies have been an integral part of distance education for many years. They are found in both synchronous and asynchronous platforms and are intended to enhance the learning experience for students. CMC technologies add an interactive element to the online learning environment. The findings from this…

  18. Modeling Computer Usage Intentions of Tertiary Students in a Developing Country through the Technology Acceptance Model

    Science.gov (United States)

    Afari-Kumah, Eben; Achampong, Akwasi Kyere

    2010-01-01

    This study aims to examine the computer usage intentions of Ghanaian Tertiary Students. The Technology Acceptance Model was adopted as the theoretical framework to ascertain whether it could help explain behavioral intentions of individuals to accept and use technology. Factor analysis was used to assess the construct validity of the initial…

  19. The Impact of Iranian Teachers Cultural Values on Computer Technology Acceptance

    Science.gov (United States)

    Sadeghi, Karim; Saribagloo, Javad Amani; Aghdam, Samad Hanifepour; Mahmoudi, Hojjat

    2014-01-01

    This study was conducted with the aim of testing the technology acceptance model and the impact of Hofstede cultural values (masculinity/femininity, uncertainty avoidance, individualism/collectivism, and power distance) on computer technology acceptance among teachers at Urmia city (Iran) using the structural equation modeling approach. From among…

  20. Factors Impacting Adult Learner Achievement in a Technology Certificate Program on Computer Networks

    Science.gov (United States)

    Delialioglu, Omer; Cakir, Hasan; Bichelmeyer, Barbara A.; Dennis, Alan R.; Duffy, Thomas M.

    2010-01-01

    This study investigates the factors impacting the achievement of adult learners in a technology certificate program on computer networks. We studied 2442 participants in 256 institutions. The participants were older than age 18 and were enrolled in the Cisco Certified Network Associate (CCNA) technology training program as "non-degree" or…