The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Active and passive movements are primary control paradigms adopted for robot-aided neurorehabilitation. Deepening the effect of different active and passive robot-aided trainings on muscle organization may allow evaluating the impact of such treatments, and consequently improving the effectiveness of robot-assisted rehabilitation. The aim of this work is to study how different passive strategies adopted...
Among most of the cyber attacks that occured, the most drastic are advanced persistent threats. APTs are differ from other attacks as they have multiple phases, often silent for long period of time and launched by adamant, well-funded opponents. These targeted attacks mainly concentrated on government agencies and organizations in industries, as are those involved in international trade and having...
The rehabilitation of stroke patients has been paid much attention in the world, and it will significantly improve the efficiency by introducing the robot technology into the rehabilitation training. According to the mechanical structure of the robot, the functional requirements and safety requirements of the rehabilitation training are proposed in this paper. So this paper presents a new control...
In this paper, we assume that we have two types of datasets for classifier design. One is an in-house dataset which is fully available for classifier design as training data. The other is an external dataset which is kept under a very severe privacy preserving policy. We assume that the available information on the external dataset is only the error rate of a presented classifier. No other information...
In November 2004, exactly 10 years ago, a self-consistent model of post graduate education school called “European School of Antennas” (ESoA) was founded. ESoA is becoming not only important in the specific field of Antennas and Propagation, but it is gradually evolving to become the most important and biggest school in the world of Electromagnetism. It includes, besides Antennas and Propagation,...
Cultural dynamics play a significant role in the unfolding of the global software practice. Research in the other disciplines have utilized the idea of cultural models to help researchers investigate cultural influence in their respective fields. Cultural models are defined as the taken-for-granted, pre-supposed models of the world that are shared widely by members of a society and that help the members...
Within today's European socioeconomic context, supporting careers choices and occupational integration has become a major challenge. Education has to fit the changes of industry and job market, but this process requires a unified representation of professions and training programs. The competency concept appears to be a common vector, since it has turned to be a pervasive idea. Although industry has...
School technology leadership plays a key role on the integration of technology into education. Developing professional preparation programs to meet the technology needs of school leaders in the 21st century is a complex challenge. This paper provides a glimpse into two national school technology leadership programs respectively in the UK and USA in terms of the background, features, and sustainability...
The cultivation of university students' comprehensive faculties is the starting point and the end of higher education, and both teaching and management of school is aimed at enhancing students' overall quality so that students can become the modern society qualified citizens. The paper, starting from the view of the research perspective of the organizational structure, targeting the establishment...
We propose a cross-level model to explore the relationship between high-performance work system (HPWS) and team creativity, mediated by creative team efficacy (CTE). Drawing on social cognitive theory, we propose: HPWS is positively related to CTE, CTE is positively related to team creativity and CTE mediates the relationship between HPWS and team creativity. We discuss theoretical contributions and...
Practical work in the laboratory is the most important component in training of the polytechnic specialists. The usage of information and communication technologies as well as Internet makes it possible to increase the number of laboratory facilities available for training students. Bauman University has some laboratories of remote access specialized in such important disciplines like robotics, nanotechnologies,...
Several decades of research into detecting lies has resulted in a large number of available of techniques among both behavioral and physiological channels. However only in the recent past, have researchers started to focus more on ways to detect ill-intent. Persons lying under high stakes situations show detectable changes in behavior. Similarly while lying to conceal ones true intent, one exhibits...
System Identification has been widely used in obtaining the mathematical model of nonlinear systems. Nonlinear system identification is challenging because of its complexity and unpredictability. The nonlinear system considered in this paper is Rotary Double Inverted Pendulum which is unstable and non-minimum phase system. Inverted pendulum is a well-known benchmark system in control system laboratories...
Health information systems in developing countries have shown great improvements in terms of being able to collect data from health facilities. While this is commendable, there is an urgent need to move from data collection towards data use for evidence based decision making. Data quality has been identified as a major impediment towards data use. We carried out a data quality intervention study in...
The paper proposes a unsupervised classification method for personal peculiarities in flat finishing motion, which are measured by three dimensional stylus attached to an iron file. The method classifies personal peculiarity variations in order to correct bad finishing motions effectively for skill training. In the case of flat finishing motion, the number of classes of personal peculiarities is unknown...
The study on human contribution to cyber resilience is unexplored terrain in the field of critical infrastructure security. So far cyber resilience has been discussed as an extension of the IT security research. The current discussion is focusing on technical measures and policy preparation to mitigate cyber security risks. In this human-factor based study, the methodology to achieve high resiliency...
The k-NN is one of the most popular and easy in implementation algorithm to classify the data. The best thing about k-NN is that it accepts changes with improved version. Despite many advantages of the k-NN, it is also facing many issues. These issues are: distance/similarity calculation complexity, training dataset complexity at classification phase, proper selection of k, and get duplicate values...
We are living in the 21st century society which is truly known as digital and cyber society. People are found using the electronic media for communication and information. Sometimes, it appears as if we are quite handicapped in the absence of technology. Educational technology has been in active use for a long time especially in most modern organizations at all the levels in India and abroad. The...
The vertiginous change in technologies and the increasing sophistication that cyber space present require organization and permanent preparation. However, time, education and training, results too short and not appropriate enough through traditional training methods. Training through simulation may offer proper preparation to fight against new threats that exist in this digital battlefield. The paper...
The purpose of this paper is to examine information security culture critical success factors. The current existing literature analyses have not clearly identified factors that have significant influence on information security culture adoption. This paper has examined current influential factors that could have influence information security culture creation within the organization setting. We found...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.