990 resultados para Computer Science
Resumo:
Aquest projecte està emmarcat dins l'à rea de la seguretat informà tica i pretén desenvolupar una aplicació que permeti la gestió segura de les contrasenyes. Però no només s'ha de centrar en aquesta gestió, sinó que es pretén dotar a l'aplicació de la seguretat necessà ria, mitjançant algoritmes criptogrà fics, per tal que aquestes dades no es puguin comprometre.
Resumo:
Este proyecto muestra la creación de una aplicación que permite trabajar con sistemas de almacenamiento en la nube de manera encriptada.
Resumo:
El projecte realitzat procura una aproximació real al desenvolupament amb dispositius Android. La funció principal de l'aplicació desenvolupada és consultar les dades meteorològiques utilitzant un web service i l'actual posició GPS.
Resumo:
Tietojenkäsittelyn pääkokoelma sijaitsee pääkirjastossa (Linnassa), jossa painettu yleis- ja käsikirjastokokoelma koostuu noin 4000 nimekkeestä monografioita (painettujen monografiasarjojen osat mukaan lukien). Tietojenkäsittely-kokoelmasta kartoitettiin neljä osa-aluetta. Näistä selvimmäksi painopistealaksi osoittautui ohjelmointi, ohjelmointikielet & atk-ohjelmat, joka käsitti noin 33 % nimekkeistä (1314). Muiden ryhmien osuudet olivat pienemmät: tietojärjestelmät, tiedonhallinta & tietoturva noin 18 % (727 nimekettä); tekoäly, tietämystekniikka & hahmontunnistus noin 16 % (629 nimekettä). Käsikirjaston karsitussa noin 100 nimekkeen kokoelmassa on runsaasti sanakirjoja ja erilaisia hakuteoksia kuten lähes täydellinen (44/45) Encyclopedia of computer science and technology ja myös e-muodossa oleva 3-osainen Handbook of information security. Painettuja lehtiä oli 6 nimekettä (IEEE Pervasive Computing, MikroPC, myös e-muodossa oleva Social Science Computer Review, Tekniikan näköalat, Tietokone ja Tietoyhteys). Sähkökirjoja kokoelmassa oli 466 nimekettä Ebrary: Information technology -tietokannassa, 24 nimekettä NetLibrary-tietokannassa, 3 nimekettä Taylor & Francis eBooks online -tietokannassa ja 2 nimekettä sähköisinä hakuteoksina (Encyclopedia of gender and information technology ja Encyclopedia of information science and technology) sekä 4964-osainen Lecture notes in computer science -monografiasarja. Verkkolehtiä kokoelmassa oli noin 300 nimekettä. Tietokantoja oli 4 kokotekstitietokantaa (ACM - Association for Computing Machinery, EBSCOhost Academic Search Premier, Elsevier ScienceDirect ja SpringerLink) sekä 2 viitetietokantaa (Computer + Info Systems (CSA) ja Web of Scence (ISI)).
Resumo:
Este proyecto se inicia en base a la necesidad de mejorar la seguridad de la información en la empresa EkinderGarden. La solución propuesta consiste en diseñar un canal de comunicación e interacción entre las diferentes partes interesadas (empleados, candidatos a empleados, proveedores, clientes y posibles clientes), dentro del sistema de la seguridad de EkinderGarden con el fin de mejorar la gestión de la seguridad en todos los niveles.
Resumo:
Este proyecto crea un sistema de iluminación inteligente compuesto por múltiples dispositivos que, de forma inalámbrica, se sincronizan entre si, para encenderse, apagarse y cambiar el color de la luz ambiente. El sistema se ha diseñado para conectar hasta 8 dispositivos basados en el sistema embebido LPC1769 y S.O. FreeRTOS, integrando un sensor acelerómetro, varios leds de distinto color y un módulo WiFly RN-XV que los interconecta de forma inalámbrica.
Resumo:
Clúster format per una mà quina principal HEAD Node més 19 nodes de cà lcul de la gama SGI13 Altix14 XE Servers and Clusters, unides en una topologia de mà ster subordinat, amb un total de 40 processadors Dual Core i aproximadament 160Gb de RAM.
Resumo:
In this paper we present a multi-stage classifier for magnetic resonance spectra of human brain tumours which is being developed as part of a decision support system for radiologists. The basic idea is to decompose a complex classification scheme into a sequence of classifiers, each specialising in different classes of tumours and trying to reproducepart of the WHO classification hierarchy. Each stage uses a particular set of classification features, which are selected using a combination of classical statistical analysis, splitting performance and previous knowledge.Classifiers with different behaviour are combined using a simple voting scheme in order to extract different error patterns: LDA, decision trees and the k-NN classifier. A special label named "unknown¿ is used when the outcomes of the different classifiers disagree. Cascading is alsoused to incorporate class distances computed using LDA into decision trees. Both cascading and voting are effective tools to improve classification accuracy. Experiments also show that it is possible to extract useful information from the classification process itself in order to helpusers (clinicians and radiologists) to make more accurate predictions and reduce the number of possible classification mistakes.
Resumo:
In this paper, we propose a new supervised linearfeature extraction technique for multiclass classification problemsthat is specially suited to the nearest neighbor classifier (NN).The problem of finding the optimal linear projection matrix isdefined as a classification problem and the Adaboost algorithmis used to compute it in an iterative way. This strategy allowsthe introduction of a multitask learning (MTL) criterion in themethod and results in a solution that makes no assumptions aboutthe data distribution and that is specially appropriated to solvethe small sample size problem. The performance of the methodis illustrated by an application to the face recognition problem.The experiments show that the representation obtained followingthe multitask approach improves the classic feature extractionalgorithms when using the NN classifier, especially when we havea few examples from each class
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.
Resumo:
We present a polarimetric-based optical encoder for image encryption and verification. A system for generating random polarized vector keys based on a Mach-Zehnder configuration combined with translucent liquid crystal displays in each path of the interferometer is developed. Polarization information of the encrypted signal is retrieved by taking advantage of the information provided by the Stokes parameters. Moreover, photon-counting model is used in the encryption process which provides data sparseness and nonlinear transformation to enhance security. An authorized user with access to the polarization keys and the optical design variables can retrieve and validate the photon-counting plain-text. Optical experimental results demonstrate the feasibility of the encryption method.
Resumo:
In Tanzania computer knowledge is vital to supplement the pace fast growing economic and development activities, which demands high and reliable level of expertise in com- puting field. In 2006, a research carried out at Tumaini University with purpose to design and implement a contextualized curriculum that can supplement for such needs hence facilitate development in Tanzanian context. A contextualized curriculum took advantage of six principles namely curriculum contex- tualization, projects, practical, interdisciplinary orientation, international recognition and continuous research for the program’s formative and development. Implementation of the curriculum followed the CATI (Contextualize, Apply, Transfer, and Import) model with emphasis on students to identify societal expectations at the early stage in learning process, in which case the graduates will potentially cater for societal expertise needs on ICT. This study adopts an emergent exploratory cross-section research design, while employ- ing a qualitative approach. This study was conducted at Tumaini University in Iringa where by purposeful sampling was used to obtain participants such as students, teach- ers, administrators and employers who participated in several focus group discussions, in-depth interviews and participant observation. The study reveals that six principles are satisfactorily met,despite of bottlenecks such as incompatibility in pedagogical thinking and technology availability for e-learning, learning attitudes, insufficient experts with actual skills and experience,in academic field among the others. The study recommends that iterative longitudinal study should be car- ried out to design for proper intervention in response to these problems which will help in improving and stabilize the curriculum.