Results 11 to 20 of about 6,158 (259)

VIRTUAL HOMOTOPY

open access: yesJournal of Knot Theory and Its Ramifications, 2010
Two welded (respectively virtual) link diagrams are homotopic if one may be transformed into the other by a sequence of extended Reidemeister moves, classical Reidemeister moves, and self crossing changes. In this paper, we extend Milnor's μ and [Formula: see text] invariants to welded and virtual links.
Dye, H. A., Kauffman, Louis H.
openaire   +3 more sources

Training Virtually Virtual

open access: yesInternational Journal of Advanced Corporate Learning (iJAC), 2012
This paper reports from a longitudinal study of a Swedish manufacturer in the automotive industry, where a series of studies have explored the potential and limitations of computer-based training of assembly operators. The study is focusing on two supplementing sets of target variables â?? operatorsâ?? attitudes and the quality output from operators in
Lennart Malmsköld   +2 more
openaire   +2 more sources

Virtual colonoscopy

open access: yesBritish Journal of Surgery, 2002
Computerized tomographic colonography (CT colonography) is a new, non-invasive technique that has been developed over the last few years; it looks at the large bowel in detail. In this chapter we look at how the examination is performed and we consider how the images are displayed.
Clare S, Smith, Helen M, Fenlon
  +7 more sources

Partecipazione e co-creazione di valore culturale. #iziTRAVELSicilia e i principi della Convenzione di Faro / Participation and co-creation of cultural value. #iziTRAVELSicilia and the principles of the Faro Convention

open access: yesIl Capitale Culturale: Studies on the Value of Cultural Heritage, 2018
Il progetto partecipativo #iziTRAVELSicilia è stato lanciato nel maggio 2016, con l'obiettivo principale di colmare il gap della comunicazione e valorizzazione digitale del patrimonio culturale della Sicilia. Questo progetto si è presto trasformato in un
Elisa Bonacini
doaj   +1 more source

Pengukuran Kinerja Kubernetes Cluster pada Nested Virtualization Berbasi KVM

open access: yesJurnal Komputer Terapan, 2023
Kubernetes sebagai sistem orkestrasi container open-source yang dapat diimplementasikan dalam infrastruktur fisik dan infrastruktur tervisualisasi. Dalam implementasi virtualisasi, masih terdapat sisa sumber daya yang tidak dimanfaatkan secara maksimal.
Sugeng Purwantoro Edy Suranta G.S   +2 more
doaj   +1 more source

A Survey of Middleware for Sensor and Network Virtualization

open access: yesSensors, 2014
Wireless Sensor Network (WSN) is leading to a new paradigm of Internet of Everything (IoE). WSNs have a wide range of applications but are usually deployed in a particular application. However, the future of WSNs lies in the aggregation and allocation of
Zubair Khalid   +2 more
doaj   +1 more source

VCF: Virtual Code Folding to Enhance Virtualization Obfuscation

open access: yesIEEE Access, 2020
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj   +1 more source

Virtual Actuators with Virtual Sensors [PDF]

open access: yesProceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering, 2005
The virtual actuator approach to bond graph based control is extended to use virtual sensor inputs; this allows relative degree conditions on the controller to be relaxed. Furthermore, the effect of the transfer system can be eliminated from the closed-loop system. Illustrative examples are given.
openaire   +1 more source

Toward the Detection of Flow Separation for Operating Airfoils Using Machine Learning

open access: yesInternational Journal of Turbomachinery, Propulsion and Power
Turbulent flow separation over lifting surfaces impacts high-lift systems such as aircraft, wind turbines, and turbomachinery, and contributes to noise, lift loss, and vibrations.
Kathrin Stahl   +6 more
doaj   +1 more source

Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

open access: yesITM Web of Conferences, 2017
For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel,
Liu Qian   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy