42 resultados para 080302 Computer System Architecture


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Focuses on two areas within the field of general relativity. Firstly, the history and implications of the long-standing conjecture that general relativistic, shear-free perfect fluids which obey a barotropic equation of state p = p(w) such that w + p = 0, are either non-expanding or non-rotating. Secondly the application of the computer algebra system Maple to the area of tetrad formalisms in general relativity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Parametric modelling is a powerful means of geometric control. Within the field of architecture, there are wide ranging possibilities in form generation, self analysing structural systems and performative building facades. This thesis has investigated the potential of parametric modelling as a design tool, specifically in the exploration of architectural surfaces.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a forensic investigation, computer profiling is used to capture evidence and to examine events surrounding a crime. A rapid increase in the last few years in the volume of data needing examination has led to an urgent need for automation of profiling. In this paper, we present an efficient, automated event profiling approach to a forensic investigation for a computer system and its activity over a fixed time period. While research in this area has adopted a number of methods, we extend and adapt work of Marrington et al. based on a simple relational model. Our work differs from theirs in a number of ways: our object set (files, applications etc.) can be enlarged or diminished repeatedly during the analysis; the transitive relation between objects is used sparingly in our work as it tends to increase the set of objects requiring investigative attention; our objective is to reduce the volume of data to be analyzed rather than extending it. We present a substantial case study to illuminate the theory presented here. The case study also illustrates how a simple visual representation of the analysis could be used to assist a forensic team.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper provides a proposal for personal e-learning system (PELS) architecture in the context of social network environment. The main objective of PELS is to develop individual skills on a specific subject and share resources with peers. Our system architecture defines organization and management of personal learning environment that aids in creating, verifying and sharing learning artifacts and making money at the same time. We also focus on in our research one of the most interesting arenas in digital content or document management called Digital Right Management (DRAM) and its application to eLearning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Creating a highly programmable surface operating at relatively high speed and in real time is an area of research with many challenges. Such a system has applications in the field of optical telescopes, product manufacturing, and giant 3D-screens and billboards for advertising and artwork. This paper covers certain aspects of a keynote presentation at ISDT 2010 including system design, modularity, programmability and the system control intelligence. An overview of the system architecture, actuator design, electronics and distributed control will provide an insight into how the system is controlled and self-tuned for a number of applications. A simulation environment that has been developed to streamline system reconfiguration will also be presented, demonstrating translation of complex mathematical functions into 3D shapes virtually before being displayed on the physical surface.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a forensic investigation, computer profiling is used to capture evidence and to examine events surrounding a crime. A rapid increase in the last few years in the volume of data needing examination has led to an urgent need for automation of profiling. In this paper, we present an efficient, automated event profiling approach to a forensic investigation for a computer system and its activity over a fixed time period. While research in this area has adopted a number of methods, we extend and adapt work of Marrington et al. based on a simple relational model. Our work differs from theirs in a number of ways: our object set (files, applications etc.) can be enlarged or diminished repeatedly during the analysis; the transitive relation between objects is used sparingly in our work as it tends to increase the set of objects requiring investigative attention; our objective is to reduce the volume of data to be analyzed rather than extending it. We present a substantial case study to illuminate the theory presented here. The case study also illustrates how a simple visual representation of the analysis could be used to assist a forensic team.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper provides a proposal for personal e-learning system (vPELS) architecture in the context of social network environment for VLSI Design. The main objective of vPELS is to develop individual skills on a specific subject, say, VLSI and share resources with peers. Our system architecture defines organization and management of personal learning environment that aids in creating, verifying and sharing learning artifacts and making money at the same time. We also focus on in our research one of the most interesting arenas in digital content or document management called Digital Right Management (DRAM) and its application to eLearning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article provides a proposal for personal e-learning system (vPELS [where 'v' stands for VLSI: very large scale integrated circuit])) architecture in the context of social network environment for VLSI Design. The main objective of vPELS is to develop individual skills on a specific subject - say, VLSI - and share resources with peers. The authors' system architecture defines the organisation and management of the personal learning environment in such a way as to aid in creating, verifying and sharing learning artefacts and making money at the same time. The authors also focus in their research on one of the most interesting arenas in digital content or document management - Digital Rights Management (DRM) - and its application to e-learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Managing Trade-Offs in Adaptable Software Architectures explores the latest research on adapting large complex systems to changing requirements. To be able to adapt a system, engineers must evaluate different quality attributes, including trade-offs to balance functional and quality requirements to maintain a well-functioning system throughout the lifetime of the system. This comprehensive book brings together research focusing on how to manage trade-offs to help engineers architect adaptive systems in different business contexts, including state-of-the-art techniques, methodologies, tools, best practices, guidelines and guidance on future software engineering research and practice.Each contributed chapter considers the practical application of the topic through case studies, experiments, empirical validation, or systematic comparisons with other approaches already in practice. Topics of interest include, but are not limited to, how to architect a system for adaptability, software architecture for self-adaptive systems, understanding and balancing the trade-offs involved, architectural patterns for self-adaptive systems, how quality attributes are exhibited by the architecture of the system, how to connect the quality of a software architecture to system architecture or other system considerations, and more.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

This paper proposes a novel architecture for
developing decision support systems. Unlike conventional decision support systems, the proposed architecture endeavors to reveal the decision-making process such that humans' subjectivity can be
incorporated into a computerized system and, at the same time, to
preserve the capability of the computerized system in processing information objectively. A number of techniques used in developing the decision support system are elaborated to make the decisionmarking
process transparent. These include procedures for high dimensional data visualization, pattern classification, prediction, and evolutionary computational search. An artificial data set is first
employed to compare the proposed approach with other methods. A simulated handwritten data set and a real data set on liver disease diagnosis are then employed to evaluate the efficacy of the proposed
approach. The results are analyzed and discussed. The potentials of the proposed architecture as a useful decision support system are demonstrated.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Malicious code is a threat to computer systems globally. In this paper, we outline the evolution of malicious code attacks. The threat is evolving, leaving challenges for attackers to improve attack techniques and for researchers and security specialists to improve detection accuracy. We present a novel architecture for an effective defense against malicious code attack, inspired by the human immune system. We introduce two phases of program execution: Adolescent and Mature Phase. The first phase uses a malware profile matching mechanism, whereas the second phase uses a program profile matching mechanism. Both mechanisms are analogous to the innate immune system

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article reports on the introduction of a computer-conferencing component into a first-year study unit in technology management at Deakin University, Australia. It was found that significant variations in computer usage were correlated to student study mode, including source of computer access, source of Internet access, hours-per-week computer usage, regular use of e-mail, regular use of the Internet, number of times the conference was accessed, use of computers for games, and use of computers for learning. Other moderate differences were also noted. Following exposure to the computer conference, on-campus students were more likely to agree that computers could assist their learning, and off-campus students were less likely to agree that learning from computers would be better than classes/lectures.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents an adaptive information grid architecture for recommendation systems, which consists of the features of the recommendation rule and a co-citation algorithm. The algorithm addresses some challenges that are essential for further searching and recommendation algorithms. It does not require users to provide a lot of interactive communication. Furthermore, it supports other queries, such as keyword, URL and document investigations. When the structure is compared to other algorithms, the scalability is noticeably better. The high online performance can be obtained as well as the repository computation, which can achieve a high group-forming accuracy using only a fraction of web pages from a cluster.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper reports on the introduction of a computer conferencing  component into a first year study unit in Technology Management at Deakin University, Australia. It was found that significant variations in computer  usage were correlated to student study mode, including source of computer access, source of Internet access, hours per week computer usage, regular use of email, regular use of the Internet, and number of times the conference was accessed. Other moderate differences were also noted. Following  exposure to the computer conference, on-campus students were more likely to agree computers could assist their learning, and off-campus students  were less likely to agree that learning from computers would be better than classes/lectures.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Distributed Denial of Service attacks is one of the most challenging areas to deal with in Security. Not only do security managers have to deal with flood and vulnerability attacks. They also have to consider whether they are from legitimate or malicious attackers. In our previous work we developed a framework called bodyguard, which is to help security software developers from the current serialized paradigm, to a multi-core paradigm. In this paper, we update our research work by moving our bodyguard paradigm, into our new Ubiquitous Multi-Core Framework. From this shift, we show a marked improvement from our previous result of 20% to 110% speedup performance with an average cost of 1.5 ms. We also conducted a second series of experiments, which we trained up Neural Network, and tested it against actual DDoS attack traffic. From these experiments, we were able to achieve an average of 93.36%, of this attack traffic.