SLO | ENG

Večja pisava | Manjša pisava

Iskanje po katalogu digitalne knjižnice Pomoč

Iskalni niz: išči po
išči po
išči po
išči po
* po starem in bolonjskem študiju

Opcije:
  Ponastavi


31 - 40 / 710
Na začetekNa prejšnjo stran12345678910Na naslednjo stranNa konec
31.
Preverjanje pravilnosti obnašanja sistemov s sočasnostjo
Robert Meolic, magistrsko delo

Opis: Magistrsko delo obravnava metode preverjanja pravilnosti obnašanja sistemov, ki temeljijo na opisu sistema s procesno algebro. Podana je definicija procesne algebre in primeri opisov sistemov s procesi. Predstavljeno je ugotavljanje ekvivalence sledi, stroge, vejitvene in šibke opazovalne ekvivalence, ugotavljanje testne ekvivalence ter simbolično preverjanje modelov z izjavno vejitveno temporalno logiko ACTL. Vse obravnavane metode se med seboj odlično dopolnjujejo in skupaj tvorijo močno orodje za formalno verifikacijo sistemov. V magistrskem delu je opisana izvedba takšnega orodja z BDD-ji. Uporaba orodja je ponazorjena na primeru verifikacije komunikacijskega protokola BRP.
Ključne besede: formalne metode verifikacije, sistemi s sočasnostjo, procesne algebre, opazovalne ekvivalence, testne ekvivalence, simbolično preverjanje modelov, ACTL, BDD
Objavljeno: 04.08.2017; Ogledov: 66; Prenosov: 6
.pdf Celotno besedilo (1,10 MB)

32.
Social presence and interaction in learning environments
Ines Kožuh, Zoran Jeremić, Andrej Sarjaš, Julija Lapuh Bele, Vladan Devedžić, Matjaž Debevc, 2014, izvirni znanstveni članek

Opis: With the increased use of social media there is a growing interest in using social interaction and social presence in education. Despite this phenomenon, no appropriate methodology was found on effective integrating of both concepts into online learning. In this study, we propose integrating two different kinds of learning tools to provide social interaction and social presence in Personal Learning Environments. We have evaluated the proposed concept in a classroom setting, using a specific social interaction tool and a specific social presence tool. The findings revealed that although the use of the social interaction tool was positively associated with students% academic success, the perceived ease of using the social presence tool was negatively related to students' success.
Ključne besede: personal learning environment, social interaction, social presence, online social presence, academic success
Objavljeno: 03.08.2017; Ogledov: 111; Prenosov: 2
.pdf Celotno besedilo (810,12 KB)

33.
Applying automated model extraction for simulation and verification of real-life SDL specification with spin
Boštjan Vlaovič, Aleksander Vreže, Zmago Brezočnik, 2017, izvirni znanstveni članek

Opis: Formally defined Specification and Description Language (SDL) is used for the design and specification of complex safety-critical systems. Each change in the specification of the product should be immediately checked formally against the requirements’ specification. This paper presents semi-automated system abstraction, automated model extraction, simulation, and formal verification of real-life complex SDL specification. Sound algorithms implemented in our sdl2pml automated model extraction tool preserve all properties of the SDL system. Sdl2pml includes our model of discrete time, abstraction, and support for all relevant SDL functionality and constructs such as dynamic process creation, rational data types, and communication with more than one process instance. To the best of our knowledge, most of them are not supported by any other known approach. We use our SpinRCP tool for simulation and formal verification of the extracted model with the Spin model checker. We demonstrate the applicability of our approach on ISDN User adaptation protocol from SI3000 Softswitch. The extracted Promela model is the largest one ever processed by Spin. We have shown that Spin simulation and model checking can be applied successfully to such huge models.
Ključne besede: formal specifications, automated extraction, formal languages, simulation, formal verification, model cheking, SDL, Promela, SpinRCP, Sdl2pml
Objavljeno: 03.08.2017; Ogledov: 103; Prenosov: 6
.pdf Celotno besedilo (13,46 MB)

34.
A wearable device and system for movement and biometric data acquisition for sports applications
Marko Kos, Iztok Kramberger, 2017, izvirni znanstveni članek

Opis: This paper presents a miniature wearable device and a system for detecting and recording the movement and biometric information of a user during sport activities. The wearable device is designed to be worn on a wrist and can monitor skin temperature and pulse rate. Furthermore, it can monitor arm movement and detect gestures using inertial measurement unit. The device can be used for various professional and amateur sport applications and for health monitoring. Because of its small size and minimum weight, it is especially appropriate for swing-based sports like tennis or golf, where any additional weight on the arms would most likely disturb the player and have some influence on the player’s performance. Basic signal processing is performed directly on the wearable device but for more complex signal analysis, the data can be uploaded via the Internet to a cloud service, where it can be processed by a dedicated application. The device is powered by a lightweight miniature LiPo battery and has about 6 h of autonomy at maximum performance.
Ključne besede: biometric data acquisition, inertial sensing, movement detection, pulse rate, sensor fusion, wearable
Objavljeno: 03.08.2017; Ogledov: 77; Prenosov: 10
.pdf Celotno besedilo (8,88 MB)

35.
Suitability of the double Langevin function for description of anhysteretic magnetization curves in NO and GO electrical steel grades
Simon Steentjes, Martin Petrun, G. Glehn, Drago Dolinar, Kay Hameyer, 2017, izvirni znanstveni članek

Opis: This paper compares the match obtained using the classical Langevin function, the tanh function as well as a recently by the authors proposed double Langevin function with the measured anhysteretic magnetization curve of three different non-oriented electrical steel grades and one grain-oriented grade. Two standard non-oriented grades and a high-silicon grade (Si content of 6.5%) made by CVD are analyzed. An excellent match is obtained using the double Langevin function, whereas the classical solutions are less appropriate. Thereby, problems such as those due to propagation of approximation errors observed in hysteresis modeling can be bypassed.
Ključne besede: polarization, magnetization measurement, magnetic materials, hysteresis models, Langevin function, electrical steel, saturation
Objavljeno: 03.08.2017; Ogledov: 57; Prenosov: 7
.pdf Celotno besedilo (652,05 KB)

36.
Rate-dependent extensions of the parametric magneto-dynamic model with magnetic hysteresis
Simon Steentjes, Martin Petrun, G. Glehn, Drago Dolinar, Kay Hameyer, 2017, izvirni znanstveni članek

Opis: This paper extends the parametric magneto-dynamic model of soft magnetic steel sheets to account for the phase shift between local magnetic flux density and magnetic field strength. This phase shift originates from the damped motion of domain walls and is strongly dependent on the microstructure of the material. In this regard, two different approaches to include the rate-dependent effects are investigated: a purely phenomenological, mathematical approach and a physical-based one.
Ključne besede: magnetic hysteresis, eddies, magnetic flux, viscosity, magnetic fields, magneto-dynamic models, parametric
Objavljeno: 03.08.2017; Ogledov: 62; Prenosov: 5
.pdf Celotno besedilo (567,72 KB)

37.
Jezikovnoteoretska načela v korpusnem jezikoslovju
Darinka Verdonik, 2015, izvirni znanstveni članek

Opis: Predmet razprave so teoretsko-metodološka načela, ki so se razvijala v krogih t. i. novofirthijancev, kjer se od vsega začetka opredeljujejo za korpusno analizo, čim manj obremenjeno s predhodnimi jezikoslovnimi teorijami. V prispevku najprej pregledamo dela teh avtorjev, iz katerih izhajajo med drugim slovnica vzorcev (angl. pattern grammar), teorija leksikalnega proženja (angl. lexical priming), teorija konvencij in invencij (angl. theory of norms and exploitations) ter teorija kontekstne prozodije (angl. contextual prosodic theory). Nato povzamemo njihove zaledne predpostavke in stališča o jeziku kot rezultatih raziskovanja. Tako definiramo šest skupnih načel: predmet raziskovanja je jezikovna raba, tj. jezik v »kontekstu situacije«, raziskovalni fokus se obrne k temu, kar je običajno, raziskovalčeva intuicija je v vlogi evalvacije avtentičnih jezikovnih rab, jezikovne ravni (slovnica in slovar) so razumljene kot prepletene, na jezikovni sistem se gleda kot visoko dinamičen, v teoretskih temeljih pa zavzame eno osrednjih mest jezikovni vzorec. Nazadnje opozorimo tudi na nekatere omejitve, s katerimi se soočamo pri korpusnem pristopu.
Ključne besede: korpusi (jezikoslovje), korpus kot teorija, popolni korpusni pristop, korpusno jezikoslovje, teorija jezika
Objavljeno: 03.08.2017; Ogledov: 31; Prenosov: 3
.pdf Celotno besedilo (234,37 KB)

38.
Security analysis and improvements to the psychopass method
Boštjan Brumen, Marjan Heričko, Ivan Rozman, Marko Hölbl, 2013, izvirni znanstveni članek

Opis: Background: In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. Objective: To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. Methods: We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. Results: The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. Conclusions: The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.
Ključne besede: passwords, cryptanalysis, data security
Objavljeno: 02.08.2017; Ogledov: 36; Prenosov: 8
.pdf Celotno besedilo (542,01 KB)

39.
Outsourcing medical data analyses
Boštjan Brumen, Marjan Heričko, Andrej Sevčnikar, Jernej Završnik, Marko Hölbl, 2013, izvirni znanstveni članek

Opis: Background: Medical data are gold mines for deriving the knowledge that could change the course of a single patient’s life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Objective: Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Methods: Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. Results: The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19). Conclusions: The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results show that the results of analyses on original and on protected data are identical or comparably similar. The approach addresses the privacy and confidentiality issues that arise with medical data and is adherent to strict legal rules in the United States and Europe regarding the processing of the medical data.
Ključne besede: medical data, disclosure control, medical confidentiality, data analysis, data security
Objavljeno: 02.08.2017; Ogledov: 43; Prenosov: 4
.pdf Celotno besedilo (3,34 MB)

40.
Intra-minute cloud passing forecasting based on a low cost iot sensor - a solution for smoothing the output power of PV power plants
Primož Sukič, Gorazd Štumberger, 2017, izvirni znanstveni članek

Opis: Clouds moving at a high speed in front of the Sun can cause step changes in the output power of photovoltaic (PV) power plants, which can lead to voltage fluctuations and stability problems in the connected electricity networks. These effects can be reduced effectively by proper short-term cloud passing forecasting and suitable PV power plant output power control. This paper proposes a low-cost Internet of Things (IoT)-based solution for intra-minute cloud passing forecasting. The hardware consists of a Raspberry PI Model B 3 with a WiFi connection and an OmniVision OV5647 sensor with a mounted wide-angle lens, a circular polarizing (CPL) filter and a natural density (ND) filter. The completely new algorithm for cloud passing forecasting uses the green and blue colors in the photo to determine the position of the Sun, to recognize the clouds, and to predict their movement. The image processing is performed in several stages, considering selectively only a small part of the photo relevant to the movement of the clouds in the vicinity of the Sun in the next minute. The proposed algorithm is compact, fast and suitable for implementation on low cost processors with low computation power. The speed of the cloud parts closest to the Sun is used to predict when the clouds will cover the Sun. WiFi communication is used to transmit this data to the PV power plant control system in order to decrease the output power slowly and smoothly.
Ključne besede: photovoltaic power plant, cloud passing forecasting, algorithm, sensor, Raspberry Pi, camera, wide-angle lens, optical filters, internet of things
Objavljeno: 20.07.2017; Ogledov: 89; Prenosov: 7
.pdf Celotno besedilo (8,15 MB)

Iskanje izvedeno v 0.21 sek.
Na vrh
Logotipi partnerjev Univerza v Mariboru Univerza v Ljubljani Univerza na Primorskem Univerza v Novi Gorici