Buscar
Assessment of Parametric Assembly Models Based on CAD Quality Dimensions
(Taylor & Francis, 2018)
An approach to convey CAD quality
-
oriented strategies to beginning
users
to create
bottom
-
up
assemblies
is described
.
The work builds on previous
efforts in the area of single part ...
Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card
(Association for Computing Machinery (ACM), 2022)
Java Card stands out as a good choice for the development of smart
card applications due to the high interoperability between different
manufacturers, its security, and wide support of cryptographic algorithms. Despite ...
Counterbalance between Surface and Confinement Effects As Studied for Amino-Terminated Poly(propylene glycol) Constraint in Silica Nanopores
(American Chemical Society, 2019)
Broadband dielectric spectroscopy (BDS) and orthopositronium annihilation lifetime spectroscopy (PALS) are combined to study the
molecular dynamics and the free volume of poly(propylene glycol) terminated
with amino end ...
Real-time acquisition of complex optical fields by binary amplitude modulation
(Optical Society of America, 2017)
We describe, through simulations and experiments, a real-time wavefront acquisition technique using random binary amplitude masks and an iterative phase retrieval algorithm based on the Fresnel propagator. By using a digital ...
Innovation in geoprocessing for a Digital Earth
(Taylor & Francis, 2017-12)
Online geoprocessing, the provision and the use of spatial analysis functionality on the Web, is a powerful technological approach to fully realise the vision of a Digital Earth. The Digital Earth objectives include the ...
Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials
(Association for Computing Machinery (ACM), 2022)
With the daily increase in digitalization and integration of the physical and digital worlds, we need to better protect users’ privacy and
identity. Attribute-based Credentials (ABCs) seem to be a promising
technology ...
Effect of a cyberbullying prevention program integrated in the primary education curriculum
(Elsevier, 2020)
Most cases of cyberbullying occur in secondary education, which is the stage where many cyberbullying programs are focused. This situation has given rise to the design, implementation and evaluation of a cyberbullying ...
Advancing preuniversity students' computational thinking skills through an educational project based on tangible elements and virtual block‐based programming
(Wiley, 2020-11)
University students enroling in Science, Technology, Engineering and Mathematics (STEM)‐related studies such as computer science continue to decline, even though worldwide educational policy reports warn about the need for ...
Parabolicity, Brownian Exit Time and Properness of Solitons of the Direct and Inverse Mean Curvature Flow
(2019-10-05)
We study some potential theoretic properties of homothetic solitons n of the MCF
and the IMCF. Using the analysis of the extrinsic distance function defined on these
submanifolds in Rn+m, we observe similarities and ...
Locations Selection for Periodic Radio Map Update in WiFi Fingerprinting
(Springer, 2018)
The construction and update of a radio map are usually referred as the main drawbacks of WiFi fingerprinting, a very popular method in indoor localization research. For radio map update, some studies suggest taking new ...