Results 41 to 50 of about 287,152 (167)
Experiential Learning in Vehicle Dynamics Education via Motion Simulation and Interactive Gaming
Creating active, student‐centered learning situations in postsecondary education is an ongoing challenge for engineering educators. Contemporary students familiar with visually engaging and fast‐paced games can find traditional classroom methods of lecture and guided laboratory experiments limiting.
Kevin Hulme+5 more
wiley +1 more source
Coo: Rethink Data Anomalies In Databases [PDF]
Transaction processing technology has three important contents: data anomalies, isolation levels, and concurrent control algorithms. Concurrent control algorithms are used to eliminate some or all data anomalies at different isolation levels to ensure data consistency.
arxiv
This paper proposes an improved itinerary recording protocol for securing distributed architectures based on mobile agents. The behavior of each of the cooperating agents is described, as well as the decision process establishing the identities of offenders when an attack is detected. Our protocol is tested on a set of potential attacks and the results
Guillaume Allée+3 more
wiley +1 more source
Predicate Abstraction of ANSI-C Programs Using SAT
Predicate abstraction is a major method for verification of software. However, the generation of the abstract Boolean program from the set of predicates and the original program suffers from an exponential number of theorem prover calls as well as from ...
E. Clarke+3 more
semanticscholar +1 more source
Automated Soil and Air Temperature Monitoring Protocol [PDF]
The purpose of this resource is to continuously measure soil and air temperature at one site. Students install four temperature probes; three are placed in the soil at three different depths and one is placed in an instrument shelter. Students use a data
The GLOBE Program, University Corporation for Atmospheric Research (UCAR)
core
Personal Protective Equipment (PPE), their Standards, Donning-doffing Procedures and Challenges of Indian Drug Regulatory Authorities with the New Indian PPE Manufacturers: Personal Protective Equipment and Challenges [PDF]
Health care professionals rely on personnel protective equipment (PPE) including gown, gloves, goggles, face mask/N-95 respirators, and face shields etc to fight against COVID-19.
Mal, Dipak Kumar, Mukherjee, Biswajit
core +2 more sources
Wireless Power Transfer Analysis using Ansys [PDF]
In this report, methods of wireless power transfer of inside a cage is compared and simulated. Software Ansys Electronics Maxwell was used to simulate magnetic coupling of transmitter(s) and receiver with 10mA winding current in the mouse cage.
arxiv
The evaluation criteria for the Advanced Encryption Standard (AES) Round2 candidate algorithms, as specified in the “Request for Comments” [1], includes computational efficiency, among other criteria. Specifically, the “Call For AES Candidate Algorithms”
L. Bassham
semanticscholar +1 more source
Deductive Verification of Programs with Underspecified Semantics by Model Extraction [PDF]
We present a novel and well automatable approach to formal verification of programs with underspecified semantics, i.e., a language semantics that leaves open the order of certain evaluations. First, we reduce this problem to non-determinism of distributed systems, automatically extracting a distributed Active Object model from underspecified ...
arxiv
A software toolkit for radio frequency data terminals [PDF]
This thesis is concerned with the computer industry of "automatic identification.” Central to automatic identification is the use of barcodes and related technologies, including wireless computer networks and Radio Frequency Data Terminals (RFDTs) RFDTs ...
Buckingham, Andrew
core