Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 21
Filtrar
Mais filtros










Intervalo de ano de publicação
1.
PeerJ Comput Sci ; 10: e2000, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38855256

RESUMO

Immersive technology, especially virtual reality (VR), transforms education. It offers immersive and interactive learning experiences. This study presents a systematic review focusing on VR's integration with educational theories in higher education. The review evaluates the literature on VR applications combined with pedagogical frameworks. It aims to identify effective strategies for enhancing educational experiences through VR. The process involved analyzing studies about VR and educational theories, focusing on methodologies, outcomes, and effectiveness. Findings show that VR improves learning outcomes when aligned with theories such as constructivism, experiential learning, and collaborative learning. These integrations offer personalized, immersive, and interactive learning experiences. The study highlights the importance of incorporating educational principles into VR application development. It suggests a promising direction for future research and implementation in education. This approach aims to maximize VR's pedagogical value, enhancing learning outcomes across educational settings.

2.
Sci Rep ; 14(1): 13839, 2024 06 15.
Artigo em Inglês | MEDLINE | ID: mdl-38879689

RESUMO

With the urge to secure and protect digital assets, there is a need to emphasize the immediacy of taking measures to ensure robust security due to the enhancement of cyber security. Different advanced methods, like encryption schemes, are vulnerable to putting constraints on attacks. To encode the digital data and utilize the unique properties of DNA, like stability and durability, synthetic DNA sequences are offered as a promising alternative by DNA encoding schemes. This study enlightens the exploration of DNA's potential for encoding in evolving cyber security. Based on the systematic literature review, this paper provides a discussion on the challenges, pros, and directions for future work. We analyzed the current trends and new innovations in methodology, security attacks, the implementation of tools, and different metrics to measure. Various tools, such as Mathematica, MATLAB, NIST test suite, and Coludsim, were employed to evaluate the performance of the proposed method and obtain results. By identifying the strengths and limitations of proposed methods, the study highlights research challenges and offers future scope for investigation.


Assuntos
Segurança Computacional , DNA , DNA/genética , Humanos , Algoritmos
3.
PeerJ Comput Sci ; 10: e1995, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38686004

RESUMO

The detection of natural images, such as glaciers and mountains, holds practical applications in transportation automation and outdoor activities. Convolutional neural networks (CNNs) have been widely employed for image recognition and classification tasks. While previous studies have focused on fruits, land sliding, and medical images, there is a need for further research on the detection of natural images, particularly glaciers and mountains. To address the limitations of traditional CNNs, such as vanishing gradients and the need for many layers, the proposed work introduces a novel model called DenseHillNet. The model utilizes a DenseHillNet architecture, a type of CNN with densely connected layers, to accurately classify images as glaciers or mountains. The model contributes to the development of automation technologies in transportation and outdoor activities. The dataset used in this study comprises 3,096 images of each of the "glacier" and "mountain" categories. Rigorous methodology was employed for dataset preparation and model training, ensuring the validity of the results. A comparison with a previous work revealed that the proposed DenseHillNet model, trained on both glacier and mountain images, achieved higher accuracy (86%) compared to a CNN model that only utilized glacier images (72%). Researchers and graduate students are the audience of our article.

4.
Wirel Pers Commun ; 125(1): 367-397, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35370363

RESUMO

A network health monitoring system focuses on the quantification of the network's health by taking into account various security flaws, leaks, and vulnerabilities. A plethora of propriety tools and patents are available for network health quantification. However, there is a paucity of available research and literature in this field. Thus, in this study, we present an architectural design of a network health monitoring system. The design focuses on the quantification of the network health of each end-user as well as the entire network. The network health score for each end-user is quantified by identifying (1) illicit egress-ingress traffic, (2) anomalous fingerprints, and (3) system-network vulnerabilities based on the NVD-CVSS (National Vulnerability Database, Common Vulnerability Severity Score) standards. An overall network-health score is produced, along with a prevention and recovery mechanism that is triggered upon the detection of an anomaly. The proposed system is implemented in a local area network and has demonstrated to protect the network against various threats successfully. The study is concluded by comparing the proposed tool with the popular propriety tools available in the field. The results outline that the proposed system garners features of open-source tools and enriches them by introducing a state-of-the-art architecture coupled with multiple novel features like exhaustive identification of vulnerability and detection of network aberrations using timers.

5.
Heliyon ; 6(5): e03832, 2020 May.
Artigo em Inglês | MEDLINE | ID: mdl-32435709

RESUMO

In this study, an event-driven state estimator is designed for stochastic systems that contain unknown inputs and processes as well as correlated measurement noise. First, the event-triggered state estimator's gain is deduced by using the random stability theory and Lyapunov's function. Then, based on the results, the corresponding state estimation errors are calculated in mean square convergence. Second, the corresponding unknown inputs are inhibited by using output errors of the estimator. In addition, the corresponding event-driven transmission strategy is designed by using a quadratic performance index, which guarantees a good balance between the estimation error and the data transmission rate as well as prolonged service life of the sensor battery. Finally, numerical simulation tests verify that the designed event-driven state estimator can estimate the system's state effectively and extend the sensor's battery life by approximately 48%. The proposed algorithm also leads to reduced utilization of network resources to some degree.

6.
Sensors (Basel) ; 20(5)2020 Mar 02.
Artigo em Inglês | MEDLINE | ID: mdl-32131480

RESUMO

Internet of Things (IoT) technologies are undeniably already all around us, as we stand at the cusp of the next generation of IoT technologies. Indeed, the next-generation of IoT technologies are evolving before IoT technologies have been fully adopted, and smart dust IoT technology is one such example. The concept of smart dust IoT technology, which features very small devices with low computing power, is a revolutionary and innovative concept that enables many things that were previously unimaginable, but at the same time creates unresolved problems. One of the biggest problems is the bottlenecks in data transmission that can be caused by this large number of devices. The bottleneck problem was solved with the Dual Plane Development Kit (DPDK) architecture. However, the DPDK solution created an unexpected new problem, which is called the mixed packet problem. The mixed packet problem, which occurs when a large number of data packets and control packets mix and change at a rapid rate, can slow a system significantly. In this paper, we propose a dynamic partitioning algorithm that solves the mixed packet problem by physically separating the planes and using a learning algorithm to determine the ratio of separated planes. In addition, we propose a training data model eXtended Permuted Frame (XPF) that innovatively increases the number of training data to reflect the packet characteristics of the system. By solving the mixed packet problem in this way, it was found that the proposed dynamic partitioning algorithm performed about 72% better than the general DPDK environment, and 88% closer to the ideal environment.

7.
Ergonomics ; 63(2): 191-209, 2020 Feb.
Artigo em Inglês | MEDLINE | ID: mdl-31724907

RESUMO

Five computer network Defence displays (one Alphanumeric and four graphical displays: Radial Traffic Analyser, Bar Graph, Cube, and Treemap) were evaluated. Two experiments were conducted using different methodological procedures. Participants responded to questions that were structured to approximate various ways in which analysts might need to consider network traffic. Numerous significant effects were obtained and a fairly clear rank ordering of performance for the four graphical displays was obtained across experiments (from best to worst): Bar Graph, Cube, Radial Traffic Analyser, and Treemap. The results are interpreted from the perspective of ecological interface design: the quality of performance is directly related to the quality of semantic mapping between work domain, display, and human constraints. Factors that may have contributed to the poor performance for the Radial Traffic Analyser and Treemap displays are discussed. General implications for display and interface design are provided. Practitioner summary: Proposed displays for computer network Defence are evaluated; the results are interpreted from the perspective of ecological interface design. The associated design principles are applicable to all analogical graphical displays. Abbreviation: CND: cyber network defence; CSE: cognitive systems engineering; EID: ecological interface design; ICMP: internet control message protocol; IP: internet protocol; RTA: radial traffic analyzer; TCP: transmission control protocol; UDP: user datagram protocol.


Assuntos
Gráficos por Computador , Segurança Computacional , Apresentação de Dados , Desenho de Equipamento , Semântica , Interface Usuário-Computador , Adolescente , Adulto , Humanos , Pessoa de Meia-Idade , Adulto Jovem
8.
Stud Health Technol Inform ; 242: 592-599, 2017.
Artigo em Inglês | MEDLINE | ID: mdl-28873858

RESUMO

Electronic-health relies on extensive computer networks to facilitate access and to communicate various types of information in the form of data packets. To examine the effectiveness of these networks, the traffic parameters need to be analysed. Due to quantity of packets, examining their transmission parameters individually is not practical, especially when performed in real time. Sampling allows a subset of packets that accurately represents the original traffic to be chosen. In this study an adaptive sampling method based on regression and fuzzy inference system was developed. It dynamically updates the sampling by responding to the traffic changes. Its performance was found to be superior to the conventional non-adaptive sampling methods.


Assuntos
Algoritmos , Redes de Comunicação de Computadores , Lógica Fuzzy , Registros Eletrônicos de Saúde , Humanos
9.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-619582

RESUMO

Computing thinking is one of the hotspots in computer education field,computer network is the core course of computer,and social information process is increasing the need of computer network professionals.The characteristics of computer network course,teaching of computer network course and problems related with teaching of computer network course were analyzed in aspects of its teaching contents,teaching methods and examination methods in order to train more excellent applied professionals of computer network and improve the computing thinking of undergraduates.The ways or methods for training the computing thinking of undergraduates were put forward,which can thus provide new ideas for the teaching reform of computer network course in colleges and universities.

10.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-476323

RESUMO

〔Abstract〕 Taking North Sichuan Medical College as an example, the paper analyzes the current situation and problems in computer network basis and application teaching.Combining with teaching practice, according to the characteristics of medical students, it elabo-rates teaching reform which involves teaching idea, plans, contents and methods, etc.

11.
Modern Hospital ; (6): 144-146, 2009.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-499575

RESUMO

The construction of hospital informationization must rely on the basic computer network platform.Based on the practical engineering case and combined with the problems in the current hospital network system, this article provide a solution of reformation for the network structured cabling system and the network equipment.The idea of designing is also explored.

12.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-406364

RESUMO

Along with the popularization and application of the computer, masses of information could be achieved from the internet, ensuring the well operation of internet is becoming the prior issue. The paper introduces some successful experiences in ensuring the well operation of internet, including broadening the broadband communications, adding extra network firewall, purchasing products for network safety management, installing anti -virus software, regulating the access to the internet, etc.

13.
China Pharmacy ; (12)2007.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-531429

RESUMO

OBJECTIVE:To provide reference for clinical rational drug use.METHODS:Computer network system(CNS)of clinical rational drug use was constructed by using Hospital Information System(HIS),electronic medical records for both outpatients and inpatients and Prescription automatic screening system(PASS),which was then used for real time monitoring of clinical drug use.RESULTS & CONCLUSION:CNS has become an indispensable means for hospital management and clinical drug use in that it can provide support for the data analysis of clinical rational drug use,improve the level of clinical rational drug use,standardize the medical behavior and imrpove the treatment quality.

14.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-624561

RESUMO

Aiming at the subject characteristic of medical imaging,the authors summed up and analyzed the objective,thought and project in the reform of medical imaging experiment teaching in our school to probe into the direction of the reform of medical imaging experiment teaching and raise some thoughts about how to culture qualified students of medical imageology.

15.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-622828

RESUMO

With the rapid development of science and the education modernization project,the computer technology being introduced in function experiment teaching process is the significant measure in medical education reform.With the aid of the computer technology and the network technology,we can realize the medical education information teaching pattern.The computer will play the pivotal role either in the basic medicine teaching or in the experimental teaching,.

16.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-622642

RESUMO

Community health-care service is a dynamic and comprehensive primary health care for a given population.The increasing health-care information needs to be dynamically managed and fully utilized.The comprehensive and networking management of the medical care information with computer in community is scientific and effective in community health care service.Accordingly,The working principle of network computer information management system for community health-care service is made and the regarded functional models are established.The data in the system is convenient for work summary and scientific research.The work protocol based on the system can help realize the standardized management to community health-care service.

17.
China Pharmacy ; (12)2001.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-525124

RESUMO

OBJECTIVE:To establish a more practical and more consummated computer network system on drug control.METHODS:The computer network in our hospital was analyzed,the problems in drug control and the corresponding solutions to which were studied.RESULTS&CONCLUSION:Only through a comprehensive improvement in software,hardware,usage and management and etc.can the advantages of the computer network be really brought into fully play.

18.
Chinese Journal of Public Health ; (12): 1058-1059, 2000.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-671532

RESUMO

Developing Management information systems(MIS) is one ofthe major projects in building disease control computer network.Because MIS has both technology and management specialities, ac-tually it is a very complex system engineering to develop. In thispaper, some key problems in the process of developing MIS of dis-ease control computer network are discussed.

19.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-677184

RESUMO

Objective: To investigate the actualities of service in Outpatient Pharmacy and Emergency Pharmacy. Methods: With queuing theory of operational research and data statistics, the specialities and varities of service in both Pharmacies were investigated before and after the application of computer network. Results: (1)The distribution of the patients number arriving the Pharmacies was unequal.(2) The time of service was extended after using network.(3)The average individual time of service in Emergency Pharmacy was 74 s, and 48 s in Outpatient Pharmacy. The reasons for the average individual time of service in Emergency Pharmacy more than that in Outpatient Pharmacy was related to the formulation of drugs in 2 pharmacies and the number of drugs on prescriptions. (4)The number of windows for service should be increased in Emergency Pharmacy after using network. Conclusion: Operational research and data statistics will provide the data assisting the manager in making decisions. [

20.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-594967

RESUMO

Objective To develop a system failure recovery programs in order to prevent an accident of the hospital computer network system. Methods The network failure was divided into three grades according to its influence. The groups of network malfunction was set up and can immediately start the established program, take effective measures to prevent the situation expand and spread in the event of unforeseen circumstances. Results Through the emergency power supply program, the network route emergency program, cable emergency support program and sector emergency plan, the hospital information systems run normally. Conclusion The issue of large-area network information paralysis is effectively solved and improves the information technology capacity of the hospital.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...