Explore chapters and articles related to this topic
Sherlock 2: An Intelligent Tutoring System Built on the LRDC Tutor Framework
Published in Charles P. Bloom, R. Bowen Loftin, Facilitating the Development and Use of Interactive Learning Environments, 2020
Sandra Katz, Alan Lesgold, Edward Hughes, Daniel Peters, Gary Eggan, Maria Gordin, Linda Greenberg
Coherence. Coherence is the notion that every agent should handle similar activities in similar ways. That is, system elements should adhere strictly to a set of well-established policies for common system activities such as error recovery, data management, and interactions with other subsystems. For example, in Sherlock 2, the data management facility services the whole system; data management is not distributed across subsystems, so, there is no support built into the simulation for handling data. Similarly, Sherlock’s policy for handling services is to have each facility provide a high-level public interface to its services (via the communications manager) while keeping its low-level activities private.
Application of Video-Based Face Recognition for Mobile Security Using Machine Learning Techniques
Published in S. Ramakrishnan, Cryptographic and Information Security, 2018
Emir Kremić, Abdulhamit Subasi
Mobile security highly depends on data storage and authentication. Therefore, in this paper we are as well introducing s model for authentication to secure it with the visual identity. The security of mobile devices also depends on s mobile operating system such as Android, iPhone, BlackBerry, Symbian, JME or WinMobile. There are different security levels and some of those are:Normal: The consequences on applications from a normal threat are minor. Usually, it can grant some rights to the application.Dangerous: The grants related to the settings and to SEND SMS are considered very dangerous. Android has the possibility to let the user knows when these permissions are installed.Signature: The signature is granted only on the application level. And this can hide and keep public interface anonymous.Signature or System: This varies with signature, except it allows images to grant the access. Nascent mobile application security brings with it new issues, which are different from the desktop security application. When speaking about Android, we can say that Android is a platform which is based on Linux kernel, which provides a security mode.
Eiffel: A Language for Object-Oriented Software Engineering
Published in Paul W. Ross, The Handbook of Software for Engineers and Scientists, 2018
In an experiment in advanced project development and management with Eiffel at a major University, one professor had the interesting experience of creating a large-scale application in a 2-year time frame with a group of seven students who had very little interaction with each other during the project. The main technique employed was that the professor acted as both project manager and lead system designer using Eiffel as a specification language. The students were given selected specifications—including feature signatures and assertions—and were asked to “fill in” the code to match. Changes to the public interface required special approval. As the better students completed several assignments, they were given more latitude in working on extending selected areas of the system without the necessity of having every class interface change specifically approved.
Thermal Upscattering Acceleration Schemes for Parallel Transport Sweeps
Published in Nuclear Science and Engineering, 2020
The first row in Table V exposes the root cause of the poor performance of the DSA solution, i.e., the excessive number of the wgDSA invocations (equal to times the number of upscattering iterations), which directly translates into an excessive number of associated PCG iterations. Moreover, since the within-group DSA matrices have different coefficients for each group, they have to be constructed for each wg-DSA solve individually,fUnless the matrices are saved for each group; we did not go this way as at the time of implementation, the Hypre library did not provide functions for this purpose in its public interface. Instead, we formulated the gaDSA scheme that effectively circumvents this issue, as we will show momentarily. and the AMG setup needs to be performed repeatedly in each group as well. It is a known fact that the coarse grid construction is usually a bottleneck of the whole AMG algorithm (especially at higher parallel scales), and we indeed see by comparing the times in columns 1 and 2 in Table V that the setup time (taken up mostly by the AMG setup) dominates the PCG solve time.
Light Harvest: an interactive sculptural installation based on folding and mapping proteins
Published in Digital Creativity, 2018
Jiangmei Wu, Susanne Ressl, Kyle Overton
In Light Harvest, the interactive video projection, using the paper protein structure as a canvas, is designed to solicit interactive experiences in a public environment. The changes in the colours and patterns in the digital projection prompt a discovery moment in a person. And for a person to discover the most exciting state, or the finale, of the video projection, other people must be present on the gallery floor. Therefore, each person becomes a performer and a spectator at the same time. The interactive experiences between a performer and a spectator in a public interface, such as in art performance or exhibition, have been studied by researchers in the past (Reeves, Benford, and Claire 2005). While a performer is often referred to as someone who explicitly stages interaction for others to view, in a public interaction setting a performer can also be someone who implicitly stages interaction without knowing or paying attention to the spectator. Therefore, a spectator can become a performer unintentionally, not merely as someone who observes others performing interaction (Reeves, Benford, and Claire 2005). According to research in interaction design, both experiences are equally valuable and should be taken into careful consideration when designing a public interface. Interaction researchers are using four different design strategies when designing spectator experiences: ‘secretive,’ where the performers’ manipulations and effects are largely hidden; ‘expressive,’ where the performers’ interactions tend to be fully revealed; ‘magical,’ where effects are revealed but the manipulations that cause the effects are hidden; and finally, ‘suspenseful,’ where the manipulations are apparent but effects are only revealed as the spectators take their turns (Reeves, Benford, and Claire 2005). In Light Harvest, the spectator experience can be described as both ‘expressive’ and ‘magical’ at the same time. A person can step into the specified zone and see how his or her movement prompts different colours of projected light. However, a person who sees the finale might not understand what triggers the finale as the relationship between this person and the other people are hidden, thus prompting a ‘magical’ discovery moment. As previously mentioned, the finale is a metaphor for the chemical reactions that happen in biological systems. In Light Harvest, orchestrated performer/spectator experiences become the catalyst for energy conversion, in a way similar to how different ingredients work together through a natural design system such as LHCII.
A PBNM and economic incentive-based defensive mechanism against DDoS attacks
Published in Enterprise Information Systems, 2022
In this section, we discuss important communicating entities of our proposed model. However, there are some communicating entities which are part of the main entities which will be discussed later. Here, we assume the reader already knows the concept of client and server. Client: A client is a service receiving node that wants to access resources or service made available by a server or service provider. Client sends service request to the server in order to get serviced through network. A client can be authorised or illegitimate.Server: Server is a software that processes the client’s service request and sends reply accordingly through a network. Server needs to be protected from DDoS attack. In our model, the server has market of resources in which user has to trade for purchasing resources.Broker’s network: Broker network is a public interface through which client communicates with the server. It acts as a proxy server as well as service mediator between server and client. Moreover, it will provide a trading platform for clients to purchase resources from server. Broker’s network is composed of two types of network, i.e. control broker network and FEB network. Control broker is deployed at the router near to service provider. FEB is deployed at the edge router. More functionalities of the broker network are discussed later. Broker network consists of classifier and metering node. Classifier node classifies incoming traffic load according to the parameters set by policy editor. Metering node quantifies traffic flow and determines the traffic load level whether it is normal, cautious or alert level. Classification is done on the basis of possession of contract and other parameters depending on the type of organisation. Once the traffic load hit the alert level, then classifier node which acts as PEP will get triggered by PDP (CB) and is bounded to take predefined action specified in the policies stored in policy repository. Classifier node then classifies incoming load traffic into IP datagrams having contract and proposal request. IP datagrams from free riders are with a message that ‘set up a contract first’ with the server.Directory manager: DM is a node that provides yellow page service to broker node. During attack time, the broker node will ask DM for the list of cooperating nodes/ISPs. Economic incentives are provided to cooperating ISPs so that all attack traffic can be transferred to incentivised ISPs during attack time.