912 resultados para Optics in computing


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Pocket Data Mining (PDM) is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data streams are now available for subscription on our smart mobile phones, the potential of using this data for decision making using data stream mining techniques has now been achievable owing to the increasing power of these handheld devices. Wireless communication among these devices using Bluetooth and WiFi technologies has opened the door wide for collaborative mining among the mobile devices within the same range that are running data mining techniques targeting the same application. This paper proposes a new architecture that we have prototyped for realizing the significant applications in this area. We have proposed using mobile software agents in this application for several reasons. Most importantly the autonomic intelligent behaviour of the agent technology has been the driving force for using it in this application. Other efficiency reasons are discussed in details in this paper. Experimental results showing the feasibility of the proposed architecture are presented and discussed.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Purpose: This paper aims to design an evaluation method that enables an organization to assess its current IT landscape and provide readiness assessment prior to Software as a Service (SaaS) adoption. Design/methodology/approach: The research employs a mixed of quantitative and qualitative approaches for conducting an IT application assessment. Quantitative data such as end user’s feedback on the IT applications contribute to the technical impact on efficiency and productivity. Qualitative data such as business domain, business services and IT application cost drivers are used to determine the business value of the IT applications in an organization. Findings: The assessment of IT applications leads to decisions on suitability of each IT application that can be migrated to cloud environment. Research limitations/implications: The evaluation of how a particular IT application impacts on a business service is done based on the logical interpretation. Data mining method is suggested in order to derive the patterns of the IT application capabilities. Practical implications: This method has been applied in a local council in UK. This helps the council to decide the future status of the IT applications for cost saving purpose.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

NDIR is proposed for monitoring of air pollutants emitted by ship engines. Careful optical filtering overcomes the challenge of optical detection of NO2 in humid exhaust gas, despite spectroscopic overlap with the water vapour band.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

SOA (Service Oriented Architecture), workflow, the Semantic Web, and Grid computing are key enabling information technologies in the development of increasingly sophisticated e-Science infrastructures and application platforms. While the emergence of Cloud computing as a new computing paradigm has provided new directions and opportunities for e-Science infrastructure development, it also presents some challenges. Scientific research is increasingly finding that it is difficult to handle “big data” using traditional data processing techniques. Such challenges demonstrate the need for a comprehensive analysis on using the above mentioned informatics techniques to develop appropriate e-Science infrastructure and platforms in the context of Cloud computing. This survey paper describes recent research advances in applying informatics techniques to facilitate scientific research particularly from the Cloud computing perspective. Our particular contributions include identifying associated research challenges and opportunities, presenting lessons learned, and describing our future vision for applying Cloud computing to e-Science. We believe our research findings can help indicate the future trend of e-Science, and can inform funding and research directions in how to more appropriately employ computing technologies in scientific research. We point out the open research issues hoping to spark new development and innovation in the e-Science field.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The present work reports on the thermo-optical properties of photorefractive sillenite Bi(12)SiO(20) (BSO) crystals obtained by applying the Thermal Lens Spectrometry technique (TLS). This crystals presents one high photorefractive sensitivity in the region blue-green spectra, since the measurements were carried out at two pump beam wavelengths (514.5 nm and 750 nm) to study of the light-induced effects in this material (thermal and/or photorefractive). We determine thermo-optical parameters like thermal diffusivity (D), thermal conductivity (K) and temperature coefficient of the optical path length change (ds/dT) in sillenite crystals. These aspects, for what we know, not was studied in details up to now using the lens spectrometry technique and are very important against of the promising potentiality of applications these crystals in non linear optics, real time holography and optical processing data.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Electromagnetically induced transparency (EIT) is an important tool for controlling light propagation and nonlinear wave mixing in atomic gases with potential applications ranging from quantum computing to table top tests of general relativity. Here we consider EIT in an atomic Bose-Einstein condensate (BEC) trapped in a double-well potential. A weak probe laser propagates through one of the wells and interacts with atoms in a three-level Lambda configuration. The well through which the probe propagates is dressed by a strong control laser with Rabi frequency Omega(mu), as in standard EIT systems. Tunneling between the wells at the frequency g provides a coherent coupling between identical electronic states in the two wells, which leads to the formation of interwell dressed states. The macroscopic interwell coherence of the BEC wave function results in the formation of two ultranarrow absorption resonances for the probe field that are inside of the ordinary EIT transparency window. We show that these new resonances can be interpreted in terms of the interwell dressed states and the formation of a type of dark state involving the control laser and the interwell tunneling. To either side of these ultranarrow resonances there is normal dispersion with very large slope controlled by g. We discuss prospects for observing these ultranarrow resonances and the corresponding regions of high dispersion experimentally.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Learning from anywhere anytime is a contemporary phenomenon in the field of education that is thought to be flexible, time and cost saving. The phenomenon is evident in the way computer technology mediates knowledge processes among learners. Computer technology is however, in some instances, faulted. There are studies that highlight drawbacks of computer technology use in learning. In this study we aimed at conducting a SWOT analysis on ubiquitous computing and computer-mediated social interaction and their affect on education. Students and teachers were interviewed on the mentioned concepts using focus group interviews. Our contribution in this study is, identifying what teachers and students perceive to be the strength, weaknesses, opportunities and threats of ubiquitous computing and computer-mediated social interaction in education. We also relate the findings with literature and present a common understanding on the SWOT of these concepts. Results show positive perceptions. Respondents revealed that ubiquitous computing and computer-mediated social interaction are important in their education due to advantages such as flexibility, efficiency in terms of cost and time, ability to acquire computer skills. Nevertheless disadvantages where also mentioned for example health effects, privacy and security issues, noise in the learning environment, to mention but a few. This paper gives suggestions on how to overcome threats mentioned.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.