780 resultados para embedded computing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The extensive use of cloud computing in educational institutes around the world brings unique challenges for universities. Some of these challenges are due to clear differences between Europe and Middle East universities. These differences stem from the natural variation between people. Cloud computing has created a new concept to deal with software services and hardware infrastructure. Some benefits are immediately gained, for instance, to allow students to share their information easily and to discover new experiences of the education system. However, this introduces more challenges, such as security and configuration of resources in shared environments. Educational institutes cannot escape from these challenges. Yet some differences occur between universities which use cloud computing as an educational tool or a form of social connection. This paper discusses some benefits and limitations of using cloud computing and major differences in using cloud computing at universities in Europe and the Middle East, based on the social perspective, security and economics concepts, and personal responsibility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports the first derived thermo-optical properties for vacuum deposited infrared thin films embedded in multilayers. These properties were extracted from the temperature-dependence of manufactured narrow bandpass filters across the 4-17 µm mid-infrared wavelength region. Using a repository of spaceflight multi-cavity bandpass filters, the thermo-optical expansion coefficients of PbTe and ZnSe were determined across an elevated temperature range 20-160 ºC. Embedded ZnSe films showed thermo-optical properties similar to reported bulk values, whilst the embedded PbTe films of lower optical density, deviate from reference literature sources. Detailed knowledge of derived coefficients is essential to the multilayer design of temperature-invariant narrow bandpass filters for use in non-cooled infrared detection systems. We further present manufacture of the first reported temperature-invariant multi-cavity narrow bandpass filter utilizing PbS chalcogenide layer material.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We extend the method of Cassels for computing the Cassels-Tate pairing on the 2-Selmer group of an elliptic curve, to the case of 3-Selmer groups. This requires significant modifications to both the local and global parts of the calculation. Our method is practical in sufficiently small examples, and can be used to improve the upper bound for the rank of an elliptic curve obtained by 3-descent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We derive fundamental parameters of the embedded cluster DBSB 48 in the southern nebula Hoffleit 18 and the very young open cluster Trumpler 14, by means of deep JHK(s) infrared photometry. We build colour-magnitude and colour-colour diagrams to derive reddening and age, based on main sequence and pre-main sequence distributions. Radial stellar density profiles are used to study cluster structure and guide photometric diagram extractions. Field-star decontamination is applied to uncover the intrinsic cluster sequences in the diagrams. Ages are inferred from K-excess fractions. A prominent pre-main sequence population is present in DBSB 48, and the K-excess fraction f(K) = 55 +/- 6% gives an age of 1.1 +/- 0.5 Myr. A mean reddening of A(Ks) = 0.9 +/- 0.03 was found, corresponding to A(v) = 8.2 +/- 0.3. The cluster CMD is consistent with the far kinematic distance of 5 kpc for Hoffleit 18. For Trumpler 14 we derived similar parameters as in previous studies in the optical, in particular an age of 1.7 +/- 0.7 Myr. The fraction of stars with infrared excess in Trumpler 14 is f(K) = 28 +/- 4%. Despite the young ages, both clusters are described by a King profile with core radii R-core = 0.46 +/- 0.05 pc and R-core = 0.35 +/- 0.04 pc, respectively, for DBSB 48 and Trumpler 14. Such cores are smaller than those of typical open clusters. Small cores are probably related to the cluster formation and/or parent molecular cloud fragmentation. In DBSB 48, the magnitude extent of the upper main sequence is Delta K-s approximate to 2 mag, while in Trumpler 14 it is Delta K-s approximate to 5 mag, consistent with the estimated ages. (c) 2008 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

K-band spectra of young stellar candidates in four Southern hemisphere clusters have been obtained with the Gemini Near-Infrared Spectrograph in Gemini South. The clusters are associated with IRAS sources that have colours characteristic of ultracompact H II regions. Spectral types were obtained by comparison of the observed spectra with those of a near-infrared (NIR) library; the results include the spectral classification of nine massive stars and seven objects confirmed as background late-type stars. Two of the studied sources have K-band spectra compatible with those characteristic of very hot stars, as inferred from the presence of C IV, N III and N V emission lines at 2.078, 2.116 and 2.100 mu m, respectively. One of them, I16177_IRS1, has a K-band spectrum similar to that of Cyg OB2 7, an O3If* supergiant star. The nebular K-band spectrum of the associated Ultra-Compact (UC) H II region shows the s-process [Kr III] and [Se IV] high excitation emission lines, previously identified only in planetary nebula. One young stellar object was found in each cluster, associated with either the main IRAS source or a nearby resolved Midecourse Space eXperiment (MSX) component, confirming the results obtained from previous NIR photometric surveys. The distances to the stars were derived from their spectral types and previously determined JHK magnitudes; they agree well with the values obtained from the kinematic method, except in the case of IRAS 15408-5356, for which the spectroscopic distance is about a factor of 2 smaller than the kinematic value.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using the first-principles real-space linear muffin-tin orbital method within the atomic sphere approximation (RS-LMTO-ASA) we study hyperfine and local magnetic properties of substituted pure Fe and Fe-Cu clusters in an fcc Cu matrix. Spin and orbital contributions to magnetic moments, hyperfine fields and the Mossbauer isomer shifts at the Fe sites in Fe precipitates and Fe-Cu alloy clusters of sizes up to 60 Fe atoms embedded in the Cu matrix are calculated and the influence of the local environment on these properties is discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper are given examples of tori T(2) embedded in R(3) with all their principal lines dense. These examples are obtained by stereographic projection of deformations of the Clifford torus in S(3). (C) 2008 Elsevier Masson SAS. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud computing innebär användning av datorresurser som är tillgängliga via ett nätverk, oftast Internet och är ett område som har vuxit fram i snabb takt under de senaste åren. Allt fler företag migrerar hela eller delar av sin verksamhet till molnet. Sogeti i Borlänge har behov av att migrera sina utvecklingsmiljöer till en molntjänst då drift och underhåll av dessa är kostsamma och tidsödande. Som Microsoftpartners vill Sogeti använda Microsoft tjänst för cloud computing, Windows Azure, för detta syfte. Migration till molnet är ett nytt område för Sogeti och de har inga beskrivningar för hur en sådan process går till. Vårt uppdrag var att utveckla ett tillvägagångssätt för migration av en IT-lösning till molnet. En del av uppdraget blev då att kartlägga cloud computing, dess beståndsdelar samt vilka för- och nackdelar som finns, vilket har gjort att vi har fått grundläggande kunskap i ämnet. För att utveckla ett tillvägagångssätt för migration har vi utfört flera migrationer av virtuella maskiner till Windows Azure och utifrån dessa migrationer, litteraturstudier och intervjuer dragit slutsatser som mynnat ut i ett generellt tillvägagångssätt för migration till molnet. Resultatet har visat att det är svårt att göra en generell men samtidigt detaljerad beskrivning över ett tillvägagångssätt för migration, då scenariot ser olika ut beroende på vad som ska migreras och vilken typ av molntjänst som används. Vi har dock utifrån våra erfarenheter från våra migrationer, tillsammans med litteraturstudier, dokumentstudier och intervjuer lyft vår kunskap till en generell nivå. Från denna kunskap har vi sammanställt ett generellt tillvägagångssätt med större fokus på de förberedande aktiviteter som en organisation bör genomföra innan migration. Våra studier har även resulterat i en fördjupad beskrivning av cloud computing. I vår studie har vi inte sett att någon tidigare har beskrivit kritiska framgångsfaktorer i samband med cloud computing. I vårt empiriska arbete har vi dock identifierat tre kritiska framgångsfaktorer för cloud computing och i och med detta täckt upp en del av kunskapsgapet där emellan.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Learning from anywhere anytime is a contemporary phenomenon in the field of education that is thought to be flexible, time and cost saving. The phenomenon is evident in the way computer technology mediates knowledge processes among learners. Computer technology is however, in some instances, faulted. There are studies that highlight drawbacks of computer technology use in learning. In this study we aimed at conducting a SWOT analysis on ubiquitous computing and computer-mediated social interaction and their affect on education. Students and teachers were interviewed on the mentioned concepts using focus group interviews. Our contribution in this study is, identifying what teachers and students perceive to be the strength, weaknesses, opportunities and threats of ubiquitous computing and computer-mediated social interaction in education. We also relate the findings with literature and present a common understanding on the SWOT of these concepts. Results show positive perceptions. Respondents revealed that ubiquitous computing and computer-mediated social interaction are important in their education due to advantages such as flexibility, efficiency in terms of cost and time, ability to acquire computer skills. Nevertheless disadvantages where also mentioned for example health effects, privacy and security issues, noise in the learning environment, to mention but a few. This paper gives suggestions on how to overcome threats mentioned.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Architectural description languages (ADLs) are used to specify high-level, compositional view of a software application. ADLs usually come equipped with a rigourous state-transition style semantics, facilitating specification and analysis of distributed and event-based systems. However, enterprise system architectures built upon newer middleware (implementations of Java’s EJB specification, or Microsoft’s COM+/ .NET) require additional expressive power from an ADL. The TrustME ADL is designed to meet this need. In this paper, we describe several aspects of TrustME that facilitate specification and anlysis of middleware-based architectures for the enterprise.