1000 resultados para Personal Informatics


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A low-cost low-power single chip WLAN 802.11a transceiver is designed for personal communication terminal and local multimedia data transmission. It has less than 130mA current dissipation, maximal 67dB gain and can be programmed to be 20dB minimal gain. The receiver system noise figure is 6.4dB in hige-gain mode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With a view to solve the problems in modern information science, we put forward a new subject named High-Dimensional Space Geometrical Informatics (HDSGI). It builds a bridge between information science and point distribution analysis in high-dimensional space. A good many experimental results certified the correctness and availability of the theory of HDSGI. The proposed method for image restoration is an instance of its application in signal processing. Using an iterative "further blurring-debluring-further blurring" algorithm, the deblured image could be obtained.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Academic feedback is taken here as the reporting to student writers of the strengths and weaknesses of their submitted draft work, while academic feedforward refers to constructive advice regarding possible strengthening of students’ next work. Both originate from a tutor’s initial judgement of a student’s work. Feedback and feedforward on work showing need for improvement are problematic in a Confucian Heritage Culture. Even gently constructive advice within a programme seeking evidence for assessment of critical thinking may lead to perception of hurtful criticism by Taiwanese students. Some could withdraw from class activity accordingly. So the writers adjusted their response style. They now choose between different approaches featuring tutorial feedback or feedforward, depending on the standard of work being judged. When individual postings feature poor critical thinking, the writers opt for private messages concentrating on constructive feedforward. For better postings, they provide positive feedback with reasons for their judgements, and summarise to the class these exemplars of generic strengths in critical thinking. They also offer private prompting when they see scope for further enrichment of an able student’s critical thinking. This might also be a useful practice when tutoring solely in the West. (192 words) Keywords: Confucian Heritage Culture, public feedback, private feedforward, assessment

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urquhart, C., Spink, S. & Thomas, R., Assessing training and professional development needs of library staff. Report for National Library of Health. (2005). Aberystwyth: Department of Information Studies, University of Wales Aberystwyth Sponsorship: National Library for Health (NHS Information Authority)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Raybould, Marilynne, and Sims-Williams, Patrick, The geography of Celtic personal names in the Latin inscriptions of the Roman Empire (Aberystwyth: CMCS publications, 2007) RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Raybould, M. and Sims-Williams, P. (2007). A Corpus of Latin Inscriptions of the Roman Empire containing Celtic personal names. Aberystwyth: CMCS publications. RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New, E. (2002). Christological personal seals and Christocentric devotion in later medieval England and Wales. Antiquaries Journal. 82, pp.47-68. RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

12 hojas : ilustraciones, fotografías a color.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces the original concept of a cloud personal assistant, a cloud service that manages the access of mobile clients to cloud services. The cloud personal assistant works in the cloud on behalf of its owner: it discovers services, invokes them, stores the results and history, and delivers the results to the mobile user immediately or when the user requests them. Preliminary experimental results that demonstrate the concept are included.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents our efforts to bridge the gap between mobile context awareness, and mobile cloud services, using the Cloud Personal Assistant (CPA). The CPA is a part of the Context Aware Mobile Cloud Services (CAMCS) middleware, which we continue to develop. Specifically, we discuss the development and evaluation of the Context Processor component of this middleware. This component collects context data from the mobile devices of users, which is then provided to the CPA of each user, for use with mobile cloud services. We discuss the architecture and implementation of the Context Processor, followed by the evaluation. We introduce context profiles for the CPA, which influence its operation by using different context types. As part of the evaluation, we present two experimental context-aware mobile cloud services to illustrate how the CPA works with user context, and related context profiles, to complete tasks for the user.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The mobile cloud computing model promises to address the resource limitations of mobile devices, but effectively implementing this model is difficult. Previous work on mobile cloud computing has required the user to have a continuous, high-quality connection to the cloud infrastructure. This is undesirable and possibly infeasible, as the energy required on the mobile device to maintain a connection, and transfer sizeable amounts of data is large; the bandwidth tends to be quite variable, and low on cellular networks. The cloud deployment itself needs to efficiently allocate scalable resources to the user as well. In this paper, we formulate the best practices for efficiently managing the resources required for the mobile cloud model, namely energy, bandwidth and cloud computing resources. These practices can be realised with our mobile cloud middleware project, featuring the Cloud Personal Assistant (CPA). We compare this with the other approaches in the area, to highlight the importance of minimising the usage of these resources, and therefore ensure successful adoption of the model by end users. Based on results from experiments performed with mobile devices, we develop a no-overhead decision model for task and data offloading to the CPA of a user, which provides efficient management of mobile cloud resources.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Life scripts are culturally shared expectations about the order and timing of life events in a prototypical life course. American and Danish undergraduates produced life story events and life scripts by listing the seven most important events in their own lives and in the lives of hypothetical people living ordinary lives. They also rated their events on several scales and completed measures of depression, PTSD symptoms, and centrality of a negative event to their lives. The Danish life script replicated earlier work; the American life script showed minor differences from the Danish life script, apparently reflecting genuine differences in shared events as well as less homogeneity in the American sample. Both consisted of mostly positive events that came disproportionately from ages 15 to 30. Valence of life story events correlated with life script valence, depression, PTSD symptoms, and identity. In the Danish undergraduates, measures of life story deviation from the life script correlated with measures of depression and PTSD symptoms.