895 resultados para Virtual Computer World
Resumo:
At a recent conference on games in education, we made a radical decision to transform our standard presentation of PowerPoint slides and computer game demonstrations into a unified whole, inserting the PowerPoint presentation to the computer game. This opened up various questions relating to learning and teaching theories, which were debated by the conference delegates. In this paper, we reflect on these discussions, we present our initial experiment, and relate this to various theories of learning and teaching. In particular, we consider the applicability of “concept maps” to inform the construction of educational materials, especially their topological, geometrical and pedagogical significance. We supplement this “spatial” dimension with a theory of the dynamic, temporal dimension, grounded in a context of learning processes, such as Kolb’s learning cycle. Finally, we address the multi-player aspects of computer games, and relate this to the theories of social and collaborative learning. This paper attempts to explore various theoretical bases, and so support the development of a new learning and teaching virtual reality approach.
Resumo:
A virtuális szociális világok, úgy mint a Second Life, egyre nagyobb népszerűségre téve szert, hamar az üzleti érdeklődés középpontjában találták magukat. A szerző célja, hogy feltérképezze a virtuális identitás és a fogyasztói magatartás közötti kapcsolat mibenlétét a Second Life világában. Ezért először bemutatja, hogy miként működik a Second Life és milyen jellemzőkkel rendelkezik. Másodszor ismerteti, hogy az on-line identitásalkotás miként befolyásolja üzleti szempontból az individuális viselkedést. A Second Life vizsgálata során a virtuális identitás fogalmát használja föl, mely összevethető az egyén valódi életbeli identitásával. Harmadszor: rátér a kutatási részre, amely során a Second Life világában kialakított identitás jellemzőit vizsgálta. Négy virtuális identitástípust azonosított, melyeknek más és más kapcsolata van a virtuális fogyasztás jelenségével. Végezetül: kiemeli azokat az eredményeket és megállapításokat, melyeket a vállalatoknak különösképpen figyelembe kell venniük a pszichológiai nézőpont szempontjából ahhoz, hogy eredményesen szerepeljenek a virtuális világokban. ________ Given their increasing popularity, virtual worlds, such as Second Life, attracted the attention of the business media. The aim of the present article is to explore the relationship between virtual identity and consumer behaviour in Second Life. First, the author reviews Second Life functions and particular characteristics. Second, he illustrates how online identity construction affects one’s behaviour in such environments from a business perspective. Third, the author demonstrates his findings associated with identity construction in Second Life. More specifically, four different types of virtual identities can be identified, each with slightly different implications toward virtual consumption. Finally, he highlights the major points to which companies should pay particular attention in their virtual social world activities, focusing on the psychological mechanisms that influence people’s online behaviour and thinking.
Resumo:
In this work it was developed mathematical resolutions taking as parameter maximum intensity values for the interference analysis of electric and magnetic fields and was given two virtual computer system that supports families of CDMA and WCDMA technologies. The first family were developed computational resources to solve electric and magnetic field calculations and power densities in Radio Base stations , with the use of CDMA technology in the 800 MHz band , taking into account the permissible values referenced by the Commission International Protection on non-Ionizing Radiation . The first family is divided into two segments of calculation carried out in virtual operation. In the first segment to compute the interference field radiated by the base station with input information such as radio channel power; Gain antenna; Radio channel number; Operating frequency; Losses in the cable; Attenuation of direction; Minimum Distance; Reflections. Said computing system allows to quickly and without the need of implementing instruments for measurements, meet the following calculated values: Effective Radiated Power; Sector Power Density; Electric field in the sector; Magnetic field in the sector; Magnetic flux density; point of maximum permissible exposure of electric field and power density. The results are shown in charts for clarity of view of power density in the industry, as well as the coverage area definition. The computer module also includes folders specifications antennas, cables and towers used in cellular telephony, the following manufacturers: RFS World, Andrew, Karthein and BRASILSAT. Many are presented "links" network access "Internet" to supplement the cable specifications, antennas, etc. . In the second segment of the first family work with more variables , seeking to perform calculations quickly and safely assisting in obtaining results of radio signal loss produced by ERB . This module displays screens representing propagation systems denominated "A" and "B". By propagating "A" are obtained radio signal attenuation calculations in areas of urban models , dense urban , suburban , and rural open . In reflection calculations are present the reflection coefficients , the standing wave ratio , return loss , the reflected power ratio , as well as the loss of the signal by mismatch impedance. With the spread " B" seek radio signal losses in the survey line and not targeted , the effective area , the power density , the received power , the coverage radius , the conversion levels and the gain conversion systems radiant . The second family of virtual computing system consists of 7 modules of which 5 are geared towards the design of WCDMA and 2 technology for calculation of telephone traffic serving CDMA and WCDMA . It includes a portfolio of radiant systems used on the site. In the virtual operation of the module 1 is compute-: distance frequency reuse, channel capacity with noise and without noise, Doppler frequency, modulation rate and channel efficiency; Module 2 includes computes the cell area, thermal noise, noise power (dB), noise figure, signal to noise ratio, bit of power (dBm); with the module 3 reaches the calculation: breakpoint, processing gain (dB) loss in the space of BTS, noise power (w), chip period and frequency reuse factor. Module 4 scales effective radiated power, sectorization gain, voice activity and load effect. The module 5 performs the calculation processing gain (Hz / bps) bit time, bit energy (Ws). Module 6 deals with the telephone traffic and scales 1: traffic volume, occupancy intensity, average time of occupancy, traffic intensity, calls completed, congestion. Module 7 deals with two telephone traffic and allows calculating call completion and not completed in HMM. Tests were performed on the mobile network performance field for the calculation of data relating to: CINP , CPI , RSRP , RSRQ , EARFCN , Drop Call , Block Call , Pilot , Data Bler , RSCP , Short Call, Long Call and Data Call ; ECIO - Short Call and Long Call , Data Call Troughput . As survey were conducted surveys of electric and magnetic field in an ERB , trying to observe the degree of exposure to non-ionizing radiation they are exposed to the general public and occupational element. The results were compared to permissible values for health endorsed by the ICNIRP and the CENELEC .
Resumo:
Craving is considered the main variable associated with relapse after smoking cessation. Cue Exposure Therapy (CET) consists of controlled and repeated exposure to drug-related cues with the aim of extinguishing craving responses. Some virtual reality (VR) environments, such as virtual bars or parties, have previously shown their efficacy as tools for eliciting smoking craving. However, in order to adapt this technology to smoking cessation interventions, there is a need for more diverse environments that enhance the probability of generalization of extinction in real life. The main objective of this study was to identify frequent situations that produce smoking craving, as well as detecting specific craving cues in those contexts. Participants were 154 smokers who responded to an ad hoc self-administered inventory for assessing craving level in 12 different situations. Results showed that having a drink in a bar/pub at night, after having lunch/dinner in a restaurant and having a coffee in a cafe or after lunch/dinner at home were reported as the most craving-inducing scenarios. Some differences were found with regard to participants' gender, age, and number of cigarettes smoked per day. Females, younger people, and heavier smokers reported higher levels of craving in most situations. In general, the most widely cited specific cues across the contexts were people smoking, having a coffee, being with friends, and having finished eating. These results are discussed with a view to their consideration in the design of valid and reliable VR environments that could be used in the treatment of nicotine addicts who wish to give up smoking.
Resumo:
Network virtualisation is considerably gaining attentionas a solution to ossification of the Internet. However, thesuccess of network virtualisation will depend in part on how efficientlythe virtual networks utilise substrate network resources.In this paper, we propose a machine learning-based approachto virtual network resource management. We propose to modelthe substrate network as a decentralised system and introducea learning algorithm in each substrate node and substrate link,providing self-organization capabilities. We propose a multiagentlearning algorithm that carries out the substrate network resourcemanagement in a coordinated and decentralised way. The taskof these agents is to use evaluative feedback to learn an optimalpolicy so as to dynamically allocate network resources to virtualnodes and links. The agents ensure that while the virtual networkshave the resources they need at any given time, only the requiredresources are reserved for this purpose. Simulations show thatour dynamic approach significantly improves the virtual networkacceptance ratio and the maximum number of accepted virtualnetwork requests at any time while ensuring that virtual networkquality of service requirements such as packet drop rate andvirtual link delay are not affected.
Resumo:
Cue exposure treatment (CET) consists of controlled and repeated exposure to drugrelated stimuli in order to reduce cue-reactivity. Virtual reality (VR) has proved to be a promising tool for exposition. However, identifying the variables that can modulate the efficacy of this technique is essential for selecting the most appropriate exposure modality. The aim of this study was to determine the relation between several individual variables and self-reported craving in smokers exposed to VR environments. Fortysix smokers were exposed to seven complex virtual environments that reproduce typical situations in which people smoke. Self-reported craving was selected as the criterion variable and three types of variables were selected as the predictor variables: related to nicotine dependence, related to anxiety and impulsivity, and related to the sense of presence in the virtual environments. Sense of presence was the only predictor of self-reported craving in all the experimental virtual environments. Nicotine dependence variables added predictive power to the model only in the virtual breakfast at home. No relation was found between anxiety or impulsivity and self-reported craving. Virtual reality technology can be very helpful for improving CET for substance use disorders. However, the use of virtual environments would make sense only insofar as the sense of presence was high. Otherwise, the effectiveness of exposure might be affected. © 2012 by the Massachusetts Institute of Technology.
Resumo:
Se conformó el primer archivo docente digital de patología específica del seno en la modalidad de mamografía a nivel nacional, el cuál permitirá el entrenamiento de radiólogos y residentes de radiología según el sistema de lectura BI-RADS, buscando la unificación de criterios y mejoría de las competencias en la interpretación de las imágenes con la finalidad de aumentar la detección temprana del carcinoma de seno
Resumo:
Introduction: The Virtual Molecular Biology Lab is an innovative, computer-based educational program designed to teach advanced high school biology students how to create a transgenic mouse model in a simulated laboratory setting. It was created in an effort to combat the current decrease in adolescent enthusiasm for and academic achievement in science and science careers, especially in Hispanic students. Because studies have found that hands-on learning, particularly computer-based instruction, is effective in enhancing science achievement, the Virtual Lab is a potential tool for increasing the number of Hispanic students that choose to enter science fields. [See PDF for complete abstract]
Resumo:
The consequences of demographic dissimilarity for group trust in work teams was examined in a virtual (computer-mediated) and a face-to-face (FTF) environment. Demographic dissimilarity (based on age, gender, country of birth, enrolled degree) was predicted to be negatively associated with group trust in the FTF environment but not in the computer-mediated environment. Participants worked in small groups on a creative task for 3 consecutive days. In the computer-mediated environment, participants worked on the task for an hour per day. In the FTF environment, participants worked on the task for 20 minutes per day. Partial support was found for the effectiveness of computer-mediated groups in reducing the negative consequences of dissimilarity. Age dissimilarity was negatively related to trust in FTF groups but not in computer-mediated groups. Birthplace dissimilarity was positively related to trust in computer-mediated groups. Implications for the successful management of virtual teams are discussed.
Resumo:
It is proposed to use one common model of computer for teaching different parts of the informatics course, connected with both hardware and software subjects. Reasoning of such slant is presented; the most suitable themes of the course, where it is practical, are enumerated. The own author's development (including software support) – the educational model of virtual computer "E97" and compiler from Pascal language for it – are described. It is accented, that the discussed ideas are helpful for any other similar model.
Resumo:
Um dos temas mais debatidos na sociedade actual é a segurança. Os níveis de segurança e as ferramentas para os alcançar entram em contraponto com os métodos usados para os quebrar. Como no passado, a razão qualidade/serviço mantém-se hoje, e manter-se-á no futuro, assegurando maior segurança àqueles que melhor se protejam. Problemas simples da vida real como furtos ou uso de falsa identidade assumem no meio informático uma forma rápida e por vezes indetectável de crime organizado. Neste estudo são investigados métodos sociais e aplicações informáticas comuns para quebrar a segurança de um sistema informático genérico. Desta forma, e havendo um entendimento sobre o Modus Operandi das entidades mal-intencionadas, poderá comprovar-se a instabilidade e insegurança de um sistema informático, e, posteriormente, actuar sobre o mesmo de tal forma que fique colocado numa posição da segurança que, podendo não ser infalível, poderá estar muito melhorada. Um dos objectivos fulcrais deste trabalho é conseguir implementar e configurar um sistema completo através de um estudo de soluções de mercado, gratuitas ou comerciais, a nível da implementação de um sistema em rede com todos os serviços comuns instalados, i.e., um pacote “chave na mão” com serviços de máquinas, sistema operativo, aplicações, funcionamento em rede com serviços de correio electrónico, gestão empresarial, anti-vírus, firewall, entre outros. Será possível então evidenciar uma instância de um sistema funcional, seguro e com os serviços necessários a um sistema actual, sem recurso a terceiros, e sujeito a um conjunto de testes que contribuem para o reforço da segurança.
Resumo:
Aquest projecte ha representat la implementació d'un entorn de treball en col·laboració inspirat en el BSCW però amb una nova arquitectura, basada en miniaplicacions de servidor (
Resumo:
L'objectiu d'aquest projecte és el disseny, raonat i recolzat en dades objectives, d'una plataforma de virtualització basada en VMWARE ESXi (versió gratuïta de VMWARE), orientada al segment d'empreses i organitzacions que per la seva grandària podrien beneficiar-se d'un entorn de servidors virtualizados però que pel seu pressupost no poden accedir a tecnologies capdavanteres d'implantació.
Resumo:
El projecte té com a finalitat avaluar alguns dels productes de virtualització disponibles al mercat per diferents plataformes i amb diferents perspectives d'aquesta tecnologia. L'objectiu és esbrinar quins són els més adequats en segons quins entorns, quins donen un millor rendiment, quins són els que aporten més funcionalitats i, finalment, quins són els més fàcils d'implantar i administrar.
Resumo:
Projecte sobre la comparativa de cinc solucions de virtualització centrant-nos especialment en el rendiment de les màquines virtualitzades, extraient informació d'aquestes mitjançant la utilització de benchmarks i posterior anàlisi de les dades obtingudes.