Results 41 to 50 of about 287,152 (167)

Experiential Learning in Vehicle Dynamics Education via Motion Simulation and Interactive Gaming

open access: yesInternational Journal of Computer Games Technology, Volume 2009, Issue 1, 2009., 2009
Creating active, student‐centered learning situations in postsecondary education is an ongoing challenge for engineering educators. Contemporary students familiar with visually engaging and fast‐paced games can find traditional classroom methods of lecture and guided laboratory experiments limiting.
Kevin Hulme   +5 more
wiley   +1 more source

Coo: Rethink Data Anomalies In Databases [PDF]

open access: yesarXiv, 2021
Transaction processing technology has three important contents: data anomalies, isolation levels, and concurrent control algorithms. Concurrent control algorithms are used to eliminate some or all data anomalies at different isolation levels to ensure data consistency.
arxiv  

An Improved Itinerary Recording Protocol for Securing Distributed Architectures Based on Mobile Agents

open access: yesMobile Information Systems, Volume 1, Issue 2, Page 129-147, 2005., 2005
This paper proposes an improved itinerary recording protocol for securing distributed architectures based on mobile agents. The behavior of each of the cooperating agents is described, as well as the decision process establishing the identities of offenders when an attack is detected. Our protocol is tested on a set of potential attacks and the results
Guillaume Allée   +3 more
wiley   +1 more source

Predicate Abstraction of ANSI-C Programs Using SAT

open access: yesFormal Methods Syst. Des., 2004
Predicate abstraction is a major method for verification of software. However, the generation of the abstract Boolean program from the set of predicates and the original program suffers from an exponential number of theorem prover calls as well as from ...
E. Clarke   +3 more
semanticscholar   +1 more source

Automated Soil and Air Temperature Monitoring Protocol [PDF]

open access: yes, 2003
The purpose of this resource is to continuously measure soil and air temperature at one site. Students install four temperature probes; three are placed in the soil at three different depths and one is placed in an instrument shelter. Students use a data
The GLOBE Program, University Corporation for Atmospheric Research (UCAR)
core  

Personal Protective Equipment (PPE), their Standards, Donning-doffing Procedures and Challenges of Indian Drug Regulatory Authorities with the New Indian PPE Manufacturers: Personal Protective Equipment and Challenges [PDF]

open access: yes, 2020
Health care professionals rely on personnel protective equipment (PPE) including gown, gloves, goggles, face mask/N-95 respirators, and face shields etc to fight against COVID-19.
Mal, Dipak Kumar, Mukherjee, Biswajit
core   +2 more sources

Wireless Power Transfer Analysis using Ansys [PDF]

open access: yesarXiv, 2022
In this report, methods of wireless power transfer of inside a cage is compared and simulated. Software Ansys Electronics Maxwell was used to simulate magnetic coupling of transmitter(s) and receiver with 10mA winding current in the mouse cage.
arxiv  

Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard

open access: yesAES Candidate Conference, 1999
The evaluation criteria for the Advanced Encryption Standard (AES) Round2 candidate algorithms, as specified in the “Request for Comments” [1], includes computational efficiency, among other criteria. Specifically, the “Call For AES Candidate Algorithms”
L. Bassham
semanticscholar   +1 more source

Deductive Verification of Programs with Underspecified Semantics by Model Extraction [PDF]

open access: yesarXiv, 2021
We present a novel and well automatable approach to formal verification of programs with underspecified semantics, i.e., a language semantics that leaves open the order of certain evaluations. First, we reduce this problem to non-determinism of distributed systems, automatically extracting a distributed Active Object model from underspecified ...
arxiv  

A software toolkit for radio frequency data terminals [PDF]

open access: yes, 2005
This thesis is concerned with the computer industry of "automatic identification.” Central to automatic identification is the use of barcodes and related technologies, including wireless computer networks and Radio Frequency Data Terminals (RFDTs) RFDTs ...
Buckingham, Andrew
core  

Home - About - Disclaimer - Privacy