Página 1 dos resultados de 166056 itens digitais encontrados em 0.059 segundos

Practising Arithmetic Using Educational Video Games with an Interpersonal Computer

Beserra, Vagner; Nussbaum, Miguel; Zeni, Ricardo; Rodriguez, Werner; Wurman, Gabriel
Fonte: Ieee Computer Soc, Learning Technology Task Force Publicador: Ieee Computer Soc, Learning Technology Task Force
Tipo: Artigo de Revista Científica Formato: 343-358
ENG
Relevância na Pesquisa
46.01%
Studies show the positive effects that video games can have on student performance and attitude towards learning. In the past few years, strategies have been generated to optimize the use of technological resources with the aim of facilitating widespread adoption of technology in the classroom. Given its low acquisition and maintenance costs, the interpersonal computer allows individual interaction and simultaneous learning with large groups of students. The purpose of this work was to compare arithmetical knowledge acquired by third-grade students through the use of game-based activities and non-game-based activities using an interpersonal computer, with knowledge acquired through the use of traditional paper-and-pencil activities, and to analyze their impact in various socio-cultural contexts. To do this, a quasi-experimental study was conducted with 271 students in three different countries (Brazil, Chile, and Costa Rica), in both rural and urban schools. A set of educational games for practising arithmetic was developed and tested in six schools within these three countries. Results show that there were no significant differences (ANCOVA) in the learning acquired from game-based vs. non-game-based activities. However, both showed a significant difference when compared with the traditional method. Additionally...

Integrating user studies into computer graphics-related courses

Santos, B.S.; Dias, P.; Silva, S.; Ferreira, C.; Madeira, J.
Fonte: IEEE Computer Society Publicador: IEEE Computer Society
Tipo: Artigo de Revista Científica
ENG
Relevância na Pesquisa
46.05%
The authors argue in favor of introducing user studies into computer graphics, human-computer interaction, and information visualization courses. They discuss two sets of user studies they developed and performed over several years, with student collaboration, and the different aspects of the studies they had to consider. They also discuss a user study they designed for an information visualization course. © 2011 IEEE.

Feasibility of GNU/Linux as the OS for a PC-based medical product; Feasibility of GNU/ Linux as the operating system for a personal computer -based medical product

Lustbader, Steven B. (Steven Benjamin), 1980-
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 21 leaves; 144286 bytes; 139806 bytes; application/pdf; application/pdf
ENG
Relevância na Pesquisa
46.01%
by Steven B. Lustbader.; Thesis (M.Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, June 2003.; Includes bibliographical references (leaves 20-21).; This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.

The design of a conservative logic computer and a graphical editor simulator

Ressler, Andrew Lewis
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 128 leaves; 7002152 bytes; 7001908 bytes; application/pdf; application/pdf
ENG
Relevância na Pesquisa
46.05%
by Andrew Lewis Ressler.; Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1981.; MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING.; Bibliography: leaf 128.

The integration of routing and flow-control for voice and data in a computer communication network

Gafni, Eliezer M
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 159 leaves; 6945458 bytes; 6945214 bytes; application/pdf; application/pdf
ENG
Relevância na Pesquisa
45.98%
by Eliezer Menahem Gafni.; Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1982.; MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING.; Includes bibliographical references.

PINS : a haptic computer interface system; haPtic Intuitive N-scalable System : a haptic computer interface system

Kaanta, Bradley C. (Bradley Carter), 1980-
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 95 p.; 5153078 bytes; 5163819 bytes; application/pdf; application/pdf
EN_US
Relevância na Pesquisa
46.05%
The research goal was to develop a dense array of discreet vertical actuators as an input and output device with haptic feedback for Human Computer Interaction (HCI). This expands upon the current research of table surfaces as medium for HCI by adding a third dimension that both a user and a computer can control. The use of vertical actuation makes possible new kinds of physical interactions with virtual objects and allows a computer to maintain constancy with the physical representation and the digital information. This requires the design and constructions of an elegant, reliable, and economically reasonable actuator array. Each array element requires autonomy to quickly and accurately move to a precise height. As an array, combined elements must provide enough resolution so that the user perceives the array as a continuously morphing, three-dimensional surface. Shape transformations are accomplished either indirectly by digital means or directly by user touch. The proposed research will focus on development of a real-time haptic actuation arrays supporting technology. The process includes working on the design, function, appearance, response, and implementation.; by Bradley C. Kaanta.; Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology...

VISTA : a visualization tool for computer architects; Visualization tool for computer architects

Mihalik, Aaron D. (Aaron Daniel), 1980-
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 55 leaves; 3599683 bytes; 3605553 bytes; application/pdf; application/pdf
EN_US
Relevância na Pesquisa
46.11%
As computer architectures continue to grow in complexity, software developers and hardware engineers cope with the increasing complexity by developing proprietary applications, simulations and tool sets to understand the behavior of these complex systems. Although the field of information visualization is leading to powerful applications in many areas, information visualization applications for computer architecture development are either tightly coupled with a specific architecture or target a wide range of computer system data. This thesis introduces the Visualization Tool for Computer Architects (VISTA) Environment. The VISTA Environment is an extensible and modular information visualization environment for hardware engineers, software developers and educators to visualize data from a variety of computer architecture simulations at different levels of abstraction. The VISTA Environment leverages common attributes in simulation data, computer architecture visualizations, and computer architecture development methods to create a powerful information visualization environment to aid in designing, understanding and communicating complex computer architectures.; by Aaron D. Mihalik.; Thesis (M. Eng.)--Massachusetts Institute of Technology...

Synthesis and evaluation of fault-tolerant quantum computer architectures

Cross, Andrew W. (Andrew William), 1979-
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 247 p.; 13338513 bytes; 13370932 bytes; application/pdf; application/pdf
ENG
Relevância na Pesquisa
46.03%
Fault-tolerance is the cornerstone of practical, large-scale quantum computing, pushed into its prominent position with heroic theoretical efforts. The fault-tolerance threshold, which is the component failure probability below which arbitrarily reliable quantum computation becomes possible, is one standard quality measure of fault-tolerant designs based on recursive simulation. However, there is a gulf between theoretical achievements and the physical reality and complexity of envisioned quantum computing systems. This thesis takes a step toward bridging that gap. We develop a new experimental method for estimating fault-tolerance thresholds that applies to realistic models of quantum computer architectures, and demonstrate this technique numerically. We clarify a central problem for experimental approaches to fault-tolerance evaluation--namely, distinguishing between potentially optimistic pseudo-thresholds and actual thresholds that determine scalability. Next, we create a system architecture model for the trapped-ion quantum computer, discuss potential layouts, and numerically estimate the fault-tolerance threshold for this system when it is constrained to a local layout. Finally, we place the problem of evaluation and synthesis of fault-tolerant quantum computers into a broader framework by considering a software architecture for quantum computer design.; by Andrew W. Cross.; Thesis (S.M.)--Massachusetts Institute of Technology...

Authenticated messages for a real-time fault-tolerant computer system

Chau, David Chi-Shing
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 118, [1] p.
ENG
Relevância na Pesquisa
46.01%
This thesis develops a message authentication scheme for a new version of the X-38 Fault-Tolerant Parallel Processor (FTPP), a high-performance real-time computer system designed for applications that need extreme reliability, such as control for human spaceflight. This computer system uses multiple replicated processors to ensure that the system as a whole continues to operate correctly even if some of the processors should fail. In order to maintain a synchronized state, the replicated processors must vote among themselves to make sure that they are using identical data. This thesis adds message authentication to the voting process. Using authenticated messages allows a system to achieve the same level of reliability with fewer replicas. This thesis analyzes where message authentication is needed in the voting process, then presents and evaluates several signature schemes for implementing message authentication. The X-38 FTPP uses radiation-hardened embedded processors, which have relatively limited computational power. Therefore, the challenge is to identify a scheme that is secure enough to guarantee that signatures cannot be forged, yet fast enough to sign messages at a high rate in real time.; by David Chi-Shing Chau.; Thesis (M. Eng.)--Massachusetts Institute of Technology...

Physically animated desktop computer for ergonomic & affective movement; RoCo : a physically animated desktop computer for ergonomic and affective movement

Wang, Andrew (Andrew Fuh-Hwa)
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 84 leaves
ENG
Relevância na Pesquisa
46.07%
For better or worse, more people are spending their days in front of computers. With this increase in computer use, more people are complaining of back and neck pain. The simple act of changing your posture, however, can dramatically reduce the risk of back or neck injury from prolonged computer use. RoCo, the robotic computer, can encourage computer users to change posture by moving its screen to different positions. Having introduced motion, RoCo can now also begin to build a social relationship with the user and affect his affective state. This thesis describes the workings of RoCo and the results of an initial user study to produce affective movement.; by Andrew Wang.; Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.; Includes bibliographical references (leaves 83-84).

A Flexible Brain-Computer Interface

Bayliss, Jessica D. ; Ballard, Dana H.
Fonte: University of Rochester. Computer Science Department. Publicador: University of Rochester. Computer Science Department.
Tipo: Tese de Doutorado
ENG
Relevância na Pesquisa
46.07%
Thesis (Ph. D.)--University of Rochester. Dept. of Computer Science, 2001. Simultaneously published in the Technical Report series.; Recent advances in computer hardware and signal processing have made it feasible to use human EEG signals or "brain waves" to communicate with a computer. Locked-in patients now have a means to communicate with the outside world. Even with modern advances, such systems still suffer from communication rates on the order of 2-3 items/minute. In addition, existing systems are not likely to be designed with flexibility in mind, leading to slow systems that are difficult to improve. This dissertation presents a flexible brain-computer interface that is designed to facilitate changes in signal processing methods and user applications. In order to show the flexibility of the system, several applications, ranging from a brain-body actuated video game played with eye movements to a brain-computer interface for environmental control in a virtual apartment, are shown. The P3 evoked potential is a positive wave in the EEG signal peaking at around 300 milliseconds after task-relevant stimuli and it can be used as a binary control signal. A virtual driving experiment shows that the P3 can be reliably detected within a virtual environment. Several on-line algorithms for processing single trial P3 evoked potentials are presented and compared. It is important that actual EEG signals rather than signal artifacts are being recognized and thus false recognition of artifacts is shown to be small. Results from an environmental control application within a virtual apartment are presented. Subjects do not perform significantly different between controlling the application from a computer monitor and when fully immersed in the virtual apartment and subjects like the immersive VR environment better. This highlights the fact that the P3 component of the evoked potential is robust over different environments and that usability does not depend solely on performance...

Research in Computer Science and Computer Engineering

Feldman, J. A. ; Merriam, C. W.
Fonte: University of Rochester. Computer Science Department. Publicador: University of Rochester. Computer Science Department.
Tipo: Relatório
ENG
Relevância na Pesquisa
46.05%
This report describes many of the computer related research efforts at the University of Rochester. The Department of Computer Science is involved in research in automatic programming, including very high level languages and data structures; machine perception; and in problem solving using combinations of traditional heuristic methods, artificial intelligence,and utility theory. The research of the Department of Electrical Engineering includes basic computer engineering research in the construction of computer systems and operating systems, research in image processing and in numerical methods, and research in production automation which is concerned with mechanical manufacturing and assembly, and is currently developing mathematical models of parts, raw materials and tools. In conjunction with other departments, Electrical Engineering is also using computers for biomedical applications including ultrasound diagnostic techniques for heart disease, and pattern recognition techniques for detection of cancer from PAP smears.

Research in Computer Science and Computer Engineering

Feldman, J. A. ; Merriam, C. W.
Fonte: University of Rochester. Computer Science Department. Publicador: University of Rochester. Computer Science Department.
Tipo: Relatório
ENG
Relevância na Pesquisa
46.05%
This report describes many of the computer related research efforts at the University of Rochester. The Department of Computer Science is involved in research in automatic programming, including very high level languages and data structures; machine perception; and in problem solving using combinations of traditional heuristic methods, artificial intelligence,and utility theory. The research of the Department of Electrical Engineering includes basic computer engineering research in the construction of computer systems and operating systems, research in image processing and in numerical methods, and research in production automation which is concerned with mechanical manufacturing and assembly, and is currently developing mathematical models of parts, raw materials and tools. In conjunction with other departments, Electrical Engineering is also using computers for biomedical applications including ultrasound diagnostic techniques for heart disease, and pattern recognition techniques for detection of cancer from PAP smears.

Chameleon C2HDL Design Tool In Self-Configurable Ultrascale Computer Systems Based On Partially Reconfigurable FPGAs

Melnyk, Anatoliy; Melnyk, Viktor; Tsyhylyk, Lyubomyr
Fonte: Universidade Carlos III de Madrid Publicador: Universidade Carlos III de Madrid
Tipo: info:eu-repo/semantics/publishedVersion; info:eu-repo/semantics/bookPart; info:eu-repo/semantics/conferenceObject
Publicado em /10/2015 ENG
Relevância na Pesquisa
46.03%
The FPGA-based accelerators and reconfigurable computer systems based on them require designing the applicationspecific processors soft-cores and are effective for certain classes of problems only, for which these soft-cores were previously developed. In Self-Configurable FPGA-based Computer Systems the challenge of designing the application-specific processors soft-cores is solved with use of the C2HDL tools, allowing them to be generated automatically. In this paper, we study the questions of the self-configurable computer systems efficiency increasing with use of the partially reconfigurable FPGAs and Chameleonc C2HDL design tool, corresponding to the goals of the project entitled "Improvement of heterogeneous systems efficiency using self-configurable FPGA-based computing" which is a part of the NESUS action. One of the features of the Chameleonc C2HDL design tool is its ability to generate a number of application-specific processors soft-cores executing the same algorithm that differ by the amount of FPGA resources required for their implementation. If the self-configurable computer systems are based on partially reconfigurable FPGAs, this feature allows them to acquire in every moment of its operation such a configuration that will provide an optimal use of its reconfigurable logic at a given level of hardware multitasking.; Proceedings of: Second International Workshop on Sustainable Ultrascale Computing Systems (NESUS 2015). Krakow (Poland)...

A computer simulation study of rule-based control of an autonomous underwater vehicle

MacPherson, David L.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado
EN_US
Relevância na Pesquisa
46.03%
Approved for public release; distribution is unlimited; Man has an ever-increasing desire for machines to do his work for him. Unmanned vehicles that perform routine or hazardous tasks are receJ.vJ.ng a great deal of attention. Vehicles for unmanned submersible applications are becoming more feasible as strides are made in very large scale integration of computer hardware. This work focuses on development of algorithms and ideas for the computer control of military Autonomous Underwater Vehicles (AUVs). Both a Lisp machine and a graphics workstation, communicating via an Ethernet network, were used in this thesis to develop AUV simulator software. The emphasis has been placed on developing a computer graphic simulation of the control panel of an AUV and on a family of programs that define AUV missions. An AUV mission is a complete. software plan designed to control an AUV as it executes the steps to achieve '" some goal or objective. AUV missions are executed by this simulator in a fully autonomous mode once certain mission parameters are supplied by a human user.; http://archive.org/details/computersimulati00macp; This thesis is prepared in conjunction with research funded by the Naval Postgraduate School under the cognizance of the Naval Surface Weapons Center...

Development of intelligent computer-assisted instruction systems to facilitate reading skills of learning-disabled children

Anderson, Patricia M.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: 90 p.
EN_US
Relevância na Pesquisa
46.01%
Approved for public release; distribution is unlimited; The purpose of this thesis is to develop a high-level model to create self-adapting software which teaches learning-disabled (LD) children to read. This approach identifies and discusses the fundamental concepts of learning, motivation, learning disabilities, the Theory of Multiple Intelligences, computer games, and intelligent computer-aided learning (ICAL). These concepts are then integrated into the design of a model that manipulates these concepts to teach reading skills. The result of this effort is CAPER (Computer-Assisted Personal Education Resource). It is model of a system that will: (a) identify the individual's dominant learning styles, (b) tailor the instruction and presentation to those styles, and (C) present the lessons in an interactive game-like style will retain the child's interest and enhance the learning process.; http://archive.org/details/developmentofint00ande; Captain, United States Army

A study of computer security policies for the Indonesian Navy

Herusutopo, Antonius
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: 126 p.
EN_US
Relevância na Pesquisa
46.07%
Approved for public release; distribution is unlimited.; The Indonesian Navy recognized the need for a computer security program over ten years ago. They published their first computer security regulation in 1981. But that regulation is now obsolete because of the advances in technology and the increased availability of powerful computer systems. As computer systems become bigger, more complicated, easier to use, more interconnected, and more important, they become more vulnerable to hackers, terrorist, and disgruntled employees. This thesis demonstrates the need for an updated computer security regulation. To add in meeting that need, the thesis proposes a security program for the Indonesian Navy that is based on the multilevel trusted computer criteria published by the NCSC in the 'Orange Book', the Canadian Trusted Product Evaluation Criteria and ITSEC. The proposed program includes additional regulations concerning physical security, data security, integrity and availability, and recommended trusted evaluation guide; http://archive.org/details/studyofcomputers00heru; Major, Indonesian Navy

Developing a reliable methodology for assessing the computer network operations threat of North Korea

Brown, Christopher
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: xiv, 77 p. : ill. (some col.) ;
Relevância na Pesquisa
46.11%
Approved for release; distribution is unlimited; Computer network operations (CNO) can be considered a relatively new phenomenon being encount modern warfare. Computer network operation is comprised of three components, computer network attack computer network exploitation (CNE), and computer network defense (CND). Computer network attack is def operations to disrupt, deny, degrade, or destroy information resident in computer networks, or the computers and ne themselves. Computer network exploitation is the intelligence collection and enabling operations to gather data from adversary automated information systems (AIS) or networks. Finally, computer network defense are those me internal to the protected entity, taken to protect and defend information, computers, and networks from disruption, degradation, or destruction. No longer is warfare limited to the use of kinetic weapons and conventional methods of war. Computer network operations have become an integral part of our adversary's arsenal and more attention must be paid to the effects of CNO activities, particularly CNA and CNE being conducted by our adversaries. Of the many states suspected of conducting active CNO activities against the United States and other nations, none warrants more attention than North Korea. This thesis presents the development of methodology using information available from open sources. This work is intended to prove that a useful methodology for assessing the CNO capabilities and limitations of North Korea can be developed using only open source information.; Lieutenant...

Computer analysis, learning and creation of physical arrangements of information

Kahan, Michael Alan
Fonte: Massachusetts Institute of Technology Publicador: Massachusetts Institute of Technology
Tipo: Tese de Doutorado Formato: 76 leaves; 3165294 bytes; 3168441 bytes; application/pdf; application/pdf
ENG
Relevância na Pesquisa
46.03%
Humans' ability to arrange the individual pieces of a set of information is paramount to their understanding of the set as a whole. The physical arrangement of pieces of information yields important clues as to how those pieces are related. This thesis focuses on computer analysis of physical arrangements and use of perceived physical relations, such as horizontal and vertical alignment, in determining which pieces of information are most likely related. The computer program described in this thesis demonstrates that once a computer can deduce physical relations between pieces of information, it can learn to order the information as a human would with great accuracy. The information analysis methods presented in this thesis are of benefit to projects that deal with user collaboration and the sorting of data based on relative importance, such as the Electronic Card Wall (EWall) project.; by Michael Alan Kahan.; Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.; Includes bibliographical references (leaves 75-76).

Computational methods for multi-omic models of cell metabolism and their importance for theoretical computer science

Angione, Claudio
Fonte: University of Cambridge; Faculty of Computer Science and Technology; Computer Laboratory Publicador: University of Cambridge; Faculty of Computer Science and Technology; Computer Laboratory
Tipo: Thesis; doctoral; PhD
EN
Relevância na Pesquisa
46.07%
To paraphrase Stan Ulam, a Polish mathematician who became a leading figure in the Manhattan Project, in this dissertation I focus not only on how computer science can help biologists, but also on how biology can inspire computer scientists. On one hand, computer science provides powerful abstraction tools for metabolic networks. Cell metabolism is the set of chemical reactions taking place in a cell, with the aim of maintaining the living state of the cell. Due to the intrinsic complexity of metabolic networks, predicting the phenotypic traits resulting from a given genotype and metabolic structure is a challenging task. To this end, mathematical models of metabolic networks, called genome-scale metabolic models, contain all known metabolic reactions in an organism and can be analyzed with computational methods. In this dissertation, I propose a set of methods to investigate models of metabolic networks. These include multi-objective optimization, sensitivity, robustness and identifiability analysis, and are applied to a set of genome-scale models. Then, I augment the framework to predict metabolic adaptation to a changing environment. The adaptation of a microorganism to new environmental conditions involves shifts in its biochemical network and in the gene expression level. However...