Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Operations of critical care departments in health systems are increasingly reliant on the availability of interoperable medical devices. Many large health care systems have fully transitioned in recent years to uniform electronic health record platforms, introducing the need for a computing infrastructure at each point of care. As demand on national health infrastructures increases, the management...
We take a visual analytics approach towards an operational model of the human-computer system. In particular, the approach combines ideas from (human-centered) interactive visualization and cognitive science. The model we derive is a first step on the path to a more complete evaluated and validated model. However, even at this stage important principles can be extracted for visual analytics systems...
This paper introduces an approach to obtain an empiric analytical model of the performance dynamics of computer systems out of discrete-event simulation (DES) experiments. To that end, the proposed methodology elicits the requirements for extending conventional stationary DES frameworks so as to meet the needs of transient performance analysis. The work goes through the rationales for the conceptual...
The usage of a simulation's visualization varies enormously within our community: for some, it is the simulation; for others, it is a development annoyance used for a screen-shot in presentations before the “proper” statistical results can be shown. Real-world systems are, for the most of us, explored visually so a simulation's visualization allows us to reconnect the simulation to its underlying...
It is important for artificial agents to accurately infer human emotions in order to provide believable interactions. However, there is currently a lack of empirical results supporting affective agent to propose effective computational models for this purpose through analyzing individual profile information and the interaction outcomes. In this paper, we bridge this gap with a game-based empirical...
Many advanced EMG-based upper-limb prosthesis control methods require model training in which subjects produce supervised forces/movements. Since unilateral limb-absent subjects cannot produce forces/movements on their affected side, one technique (mirrored bi-lateral training) relates forces/motions produced on the sound side to EMG on the affected side. However, the efforts made by the phantom limb...
Sustainable software is a software that able to work in a constraint environment. For example, a classroom without Internet facilities or unstable connection; a field trips; a meeting room or discussion room with inadequate computer facilities and power and etc. In this case, how to enabling a daily activity within such situations without losing the benefits of computer support? This paper presents...
Recent years have seen explosive growth in information security problem. Trusted computing is increasingly used in the fields of information security. The basic idea of trusted computing is different from traditional security method. In other words, system abstracts normal behavior and compare with real-time behavior. Most of the current research focuses on static integrity metrics. However, it is...
A well-known problem when executing data-intensive workloads with such frameworks as MapReduce is that small jobs with processing requirements counted in the minutes may suffer from the presence of huge jobs requiring hours or days of compute time, leading to a job slowdown distribution that is very variable and that is uneven across jobs of different sizes. Previous solutions to this problem for...
Digital Forensics is an area of Forensics Science that uses the application of scientific method toward crime investigation. The thwarting of forensic evidence is known as anti-forensics, the aim of which is ambiguous in the sense that it could be bad or good. The aim of this project is to simulate digital crimes scenario and carry out forensic and anti-forensic analysis to enhance security. This...
The propagation methods of viruses are diverse and studying the virus propagation is a hot topic. There appears a new way that the search engine quickly spreads network viruses, and many researches overlook its impact of propagation and few researches set a model to quantifiabely analyze how the search engine spread viruses. Based on community networks, this paper designs a specific model how the...
As society teeters on the verge of robotic automatons performing complex functions in every aspect of human existence, urgent questions arise concerning human accountability for ethics as they design robots capable of making moral decisions. The aim of this study considers a path toward an ethical paradigm for morally sentient robots. In order to determine the extent of human accountability, an ethical...
The importance of understanding the information technology (IT) adoption process in organizations has been highlighted by many researchers. Information technology adoption at individual or organizational level is a highly researched topic in the IT field. Most literature on IT adoption in organizations is often premised on the assumption that IT investment benefits are always obvious after selecting...
Training simulation is broadly used in military training but not limited. The simulation environment contains so many elements and so many factors affect the result, so an effective and efficient mechanism to help to manage these factors is required. This article firstly listes the elements in the environment, and then builds the object models of all kinds of objects. Based on these object models,...
Digital Game-Based Learning (DGBL) is becoming increasingly prevalent. Its participant-players are in millions and its revenues are in billions of dollars. There is a gap in how effectiveness DGBL software is to encourage students in learning and increase their motivation in learning process. This paper aims to discuss children and teenagers' education with DGBL software and the motivation design...
The mathematical model of development of a collective passion for the Internet among school students is suggested. Analogy with the early stage of the epidemic process is considered as the basis for modeling. The model shows that the interest in the Internet increases over time. The new hobbies propagation can be suggested as an effective counteraction of the excessive passion.
The objective of this work is to investigate high-resolution and high-performance computational methods for the first-principles analysis of in-situ product-level integrated circuit (IC) packages. The novelties and key technical approaches of the proposed work include: (i) a scalable geometry-based domain decomposition (DD) method to conquer the geometric complexity of physical domain, which leads...
The paper discusses the possibility of generation of a set of reusable educational components by means of paradigms of knowledge representation and management, based on contemporary concepts and tools in educational and informational technologies. Definitions of knowledge models such as ontology and characteristics of conception; model of knowledge specification and knowledge expressions by means...
Research of existing forecasting methods of cloud technologies development is given in the paper. Nowadays cloud computing became the most popular subject in the IT sphere and reached their development stage. In order to assess prospects of cloud computing technology's usage it's necessary to have forecasting method of its development in time both for short and long period. Here forecasting result...
As a kind of critical system, safety-critical system is always used for the key areas such as aerospace, national defense, transportation, nuclear energy, health and so on, which require the high security. Due to the inherent defects which caused by the complexity of the organizational structure, and the external threats which caused by the open and dynamic environment, some unexpected results will...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.