The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Training simulation is broadly used in military training but not limited. The simulation environment contains so many elements and so many factors affect the result, so an effective and efficient mechanism to help to manage these factors is required. This article firstly listes the elements in the environment, and then builds the object models of all kinds of objects. Based on these object models,...
In order to prevent illegal users access the cloud data frequently, this paper puts forward trusted access control model based on role-task in cloud computing. It can prevent the illegal users accessing cloud data more effectively. Combining the advantages of the role access control model and the task access control model, the concept of reputation value will be introduced, and a certain threshold...
Many practical problems are modeled with networks and graphs. Their exploration is of significant importance, and several graph-exploration algorithms already exist. In this paper, we focus on a type of vertex equivalence, called exploratory equivalence, which has a great potential to speed up such algorithms. It is an equivalence based on graph automorphisms and can, for example, help us in solving...
A common approach to the problem of predicting students' exam scores has been to base this prediction on the previous educational history of students. In this paper, we present a model that bases this prediction on students' performance on several tasks assigned throughout the duration of the course. In order to build our prediction model, we use data from a semi-automated peer-assessment system implemented...
We review strategies for applying statistical inference to system design and management. In design, inferred models act as surrogates for expensive simulators and enable qualitatively new studies. In management, inferred models predict outcomes from allocation and scheduling decisions, and identify conditions that make performance stragglers more likely.
Mathematical and uncertainty modelling is an important component of data fusion (the fusion of unprocessed sensor data) and information fusion (the fusion of processed or interpreted data). If uncertainties in the modelling process are not or are incorrectly accounted for, fusion processes may provide under- or overconfident results, or in some cases incorrect results. These are often owing to incorrect...
Artificial agents are becoming artificial companions, interacting with the user on a long-term basis. This evolution brought new challenges to the affective computing domain, such as designing artificial agents with personalities to the benefits of the user. Endowing artificial agents with personality could help to increase the agent's believability, hence easing the interaction. This paper touches...
Cloud computing is recently has emerged as a pattern for hosting and service delivery on internet and has rapidly become a hot topic in academic and commercial environments and has attracted many people. Nowadays, we are encountering various cloud service providers. One of important aspects in cloud computing is service level agreement which is a contract involving service agreement between client...
The 3D face morphable model is applied in the hearing and speech rehabilitation for hearing-impaired children, put forward to 3D face morphable model is the core of special human-computer interaction model. Including 3D face, sound, vibration, air, video, gestures, etc., through the computer generate realistic 3D face expressions and motions, with corresponding voice vibration flow feedback information...
This paper proposes a novel distributed parallel EM modeling technique to speed up the process of neural network modeling for EM structures. Existing techniques for EM modeling usually need to repeatedly change the parameters of microwave devices and drive the EM simulator to obtain sufficient training and testing samples. As the complexity in EM modeling problem increases, traditional techniques...
Industrial control systems are an important part of critical infrastructures and their uninterrupted operation is important for many aspects of society. In recent years these systems have come under more scrutiny, as reports about attacks on them have become more frequent. There is therefore a need to better secure them, and the first step to achieve this is to identify the threat landscape for such...
The purpose of this paper is to propose new model for emotional interaction that uses learning styles and student emotional state to adapt the user interface and learning path. This aims to reduce the difficulty and emotional stain that students encounter while interacting with learning platforms. To this end will be used techniques of Affective Computer that can capture the student emotional state...
K-means is the most widely used clustering algorithm due to its fairly straightforward implementations in various problems. Meanwhile, when the number of clusters increase, the number of iterations also tend to slightly increase. However there are still opportunities for improvement as some studies in the literature indicate. In this study, improved implementations of k-means algorithm with a centroid...
Simulation has been demonstrated to be a powerful tool to mimic processes and activities in emergency departments. However, most applications only rely on the data that were manually input by the staff in the departments. First, this practice does not guarantee that the required data to build the simulation models are captured in the computer system, as some information about the processes of emergency...
Computing models provide the parallel and distributed algorithms for cloud. The ability to estimate the performance of parallel computing models for efficient resource scheduling is critical. Current techniques for predicting the performance are mostly based on analyzing and simulating. The behavior of parallel computing model directly leads to the diversity of mathematical model. Without a general...
Web based computing technology and services has proliferated exponentially and seen mammoth growth in the way people interact with systems across the globe since last decade. Nowadays user community has turned into contributor community and interactive social web platforms have made them empowered for global content creation and consumption. This content exploding is continued and ever increasing...
Desktop Grid (DG) systems use a combination of geographically heterogeneous distributed resources to execute jobs from science and engineering projects. Organization of the distributed resources are administrated by scheduling policies. To evaluate and prove the effectiveness of DG scheduling policy, a simulator is necessary since DG is an unpredictable and unrepeatable environment. Hence, the goal...
The Technology Leaders Program (TLP) is an interdisciplinary undergraduate program at the University of Virginia. The program has recently received a grant to purchase materials that will support its mission of fostering a maker culture. The TLP faculty advisors recognize that the current pencil-and-paper method of tracking their assets would not effectively and efficiently work with a larger inventory,...
The purpose of this study is to design a computational thinking curriculum standard for K-12 education. The Delphi technique was employed to collect different views and derive consensus from a panel of thirteen experts, including computer scientists, computer science educators, K-12 computer teachers, and industry experts. The first draft of Delphi survey questionnaire, consisting of nine themes (problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.