342 Hits in 4.6 sec

On the ESL algorithm for solving energy games [article]

Antonio Casares, Pierre Ohlmann
2021 arXiv   pre-print
We present it over energy games and call our variant the ESL algorithm (for Energy-Schewe-Luttenberger).  ...  We propose a variant of an algorithm introduced by Schewe and also studied by Luttenberger for solving parity or mean-payoff games.  ...  We are grateful to Alexander Kozachinskyi for pointing out to us several important references. We also thank Thomas Colcombet, Nathanaël Fijalkow and Olivier Serre for fruitful discussions.  ... 
arXiv:2110.07346v1 fatcat:kk4e3hb4brhjlpyoiejslafm5i

An improved particle swarm optimization for optimal configuration of standalone photovoltaic scheme components

Hao Liu, Baojia Wu, Akbar Maleki, Fathollah Pourfayaz
2022 Energy Science & Engineering  
This is an open access article under the terms of the Creat ive Commo ns Attri bution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited  ...  Studies show that the PSO algorithm is one of the powerful and famous algorithms for the optimization of hybrid energy schemes.  ...  The energy storage level (ESL) of the battery bank is determined by employing the following equations 49 : In charging mode: In discharging mode: where ESL (t) is energy storage level at time t, 𝜎 denotes  ... 
doi:10.1002/ese3.1052 fatcat:qgtf3rmjgjdr5noq6rjy7isk2q

A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices

Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Li Tseng
2015 International Journal of Distributed Sensor Networks  
In the paper, we propose a new ESL-secure ID-AKE protocol for mobile client-server environments.  ...  We formally prove that the proposed protocol satisfies the security requirements of both mutual authentication and key exchange while resisting the ESL attacks.  ...  Acknowledgment This research was partially supported by the Ministry of Science and Technology, Taiwan, under Contract no. MOST103-2221-E-018-022-MY2.  ... 
doi:10.1155/2015/898716 fatcat:cp3ghte56vg67gavqaho5ozsoy

Optimizing the Performance of Pure ALOHA for LoRa-Based ESL

Malak Abid Ali Khan, Hongbin Ma, Syed Muhammad Aamir, Ying Jin
2021 Sensors  
COVID-19 has limited the manpower responsible for the frequent updating of the ESL system.  ...  factor (SF) and bandwidth (BW), to maximize the throughput of LoRa for ESL.  ...  Acknowledgments: The authors sincerely thank the associate editor and the anonymous reviewers for their valuable suggestions and comments that improved the quality of our work.  ... 
doi:10.3390/s21155060 fatcat:xwsaifis2vdnvl7sjoqqdwgc3q

Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home

Anusha Vangala, Ashok Kumar Das, YoungHo Park, Sajjad Shaukat Jamal
2022 Computers Materials & Continua  
So, there is a need for designing a secure scheme which will be able to distinguish among genuine/authorized users of the system and attackers.  ...  Moreover, the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application.  ...  The authors would also like to thank the anonymous reviewers and the associate editor for their valuable feedback.  ... 
doi:10.32604/cmc.2022.025660 fatcat:52ji7kzndjhltieaztrws63rxe

From the Curtain to the Façade: Enhancing ESL/EFL Learners' Communicative Competence through an Interactive Digital Drama

Ivan Lombardi, Manfred Schewe, Susanne Even
2012 SCENARIO: Journal for Performative Teaching, Learning, Research  
In this paper, I argue that Façade may be a valuable tool for teaching English as a second/foreign language, especially for the development of communicative competence.  ...  I then linger on the role of the teacher in activities that involve Façade, as well as other digital media. My proposal is presented under the metaphor of the edurector.  ...  The enjoyment of playing a video game comes mostly from a personal challenge, from the struggle to achieve a goal which can only be accomplished by one's own ability to tackle obstacles, solve puzzles,  ... 
doi:10.33178/scenario.6.2.7 fatcat:35q2vagnnfcbdj6pd5dmoets2i

A review of gamified techniques for foreign language learning

Yasmeen Alomair, Department of Computer and Information Sciences, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia., Salah Hammami, Department of Computer and Information Sciences, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia.
2019 Journal of Educational Research and Reviews  
It is a challenge to decide which gamified technique is apt since each one of them presents several features enabling a particular learner and also inapplicable features for others based on the learners  ...  Gamification refers to "the use of game elements and game design techniques in non-gaming contexts."  ...  For this study, a random sample of teachers and students was chosen from both the ESL classroom of Bangla and English version schools at the secondary level.  ... 
doi:10.33495/jerr_v7i11.19.150 fatcat:xcti6534bvgvfndk5uozm5j24m

Access Journal Volume 02, Number 03 [article]

GEIST International Foundation
2022 Zenodo  
education sector from the different parts of the world share their research experiences and results on education, educational development, teaching methodologies, innovation, trends and future.  ...  GEIST International Foundation welcomes honorable contributors from the global education sector to submit their research and study contents so that this journal can become a platform for knowledge and  ...  Nguyen Van Bien for his helpful suggestions on the initial development of this instrument STEM-CIS and all the collaborators on this project who participated in this research.  ... 
doi:10.5281/zenodo.7091800 fatcat:je2xvzzkunf5zplavikfgd7hk4

The Evolution of eSports: An Analysis of its origin and a look at its prospective future growth as enhanced by Information Technology Management tools [article]

Anders Hval Olsen
2015 arXiv   pre-print
Through observation of the data collection, the themes games played, games genre, and single-player or team-player was deemed most important.  ...  A statistical analysis was additionally done on the numerical data, which showed significant correlation between the themes prize pool, participants and participating countries towards live audience.  ...  ACKNOWLEDGEMENTS I want to express my sincere gratitude to my supervisor, Stella-Maris Ortim, for all the help she has given during the months it has taken to construct this master thesis.  ... 
arXiv:1509.08795v1 fatcat:733eu7r7xbb5hd2nrnujpu6rzq

Engineering altruism: a theoretical and experimental investigation of anonymity and gift giving

Terence C Burnham
2003 Journal of Economic Behavior and Organization  
For those dictators who give positive amounts, the modal gift is US$ 5 in each photograph treatment versus US$ 2 in the control.  ...  One treatment has dictators viewing pictures of recipients, the second has recipients receiving pictures of dictators and the third is a pictureless control.  ...  Smith who provided the support of the ESL at the University of Arizona for these experiments. This work was supported by grants from the Dean Witter  ... 
doi:10.1016/s0167-2681(02)00044-6 fatcat:tnthqq2c7zdhvlwcc54neqspvu

How computer science serves the developing world

M. Bernardine Dias, Eric Brewer
2009 Communications of the ACM  
Creating 10 test games for English • as a second language (ESL) and testing them with 47 students.  ...  It may help motivate a new generation of computer scientists to contribute their knowledge, talents, and energies toward solving some of the world's most pressing problems.  ... 
doi:10.1145/1516046.1516064 fatcat:rjzo6ousa5a5hbzowjvo5iyx3q

An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad hoc Networks

Muhammad Asghar Khan, Insaf Ullah, Neeraj Kumar, Omar Sami Oubbati, I. Qureshi, Fazal Noor, Fahim Ullah
2021 IEEE Transactions on Vehicular Technology  
one-way cryptographic hash function.  ...  Our contribution, in this paper, is a certificate-based access control and key agreement scheme, which is based on the technique of Hyperelliptic Curve Cryptography (HECC) and employs a collision-resistant  ...  The inherent physical constraints arising due to limited on-board energy and limited computing capability, further exacerbate the situation.  ... 
doi:10.1109/tvt.2021.3055895 fatcat:pszv34o2w5hrfk3pqizbhguc7e

Analysis of Learning Outcomes from Mobile Mathematics Applications

Gary Glen Bitter, Allen Corral
2015 International journal for innovation education and research  
Finally, we provide an overview of the types of math apps and how to select one that fits a specific instructional need.  ...  The development, usage, and investigation of educational math applications for mobile devices have increased in recent years.  ...  International Educative Research Foundation and Publisher © 2015 pg. 180 Special Needs Videos presented on mobile devices can be subtitled for the hearing impaired, and dubbed for ESL students.  ... 
doi:10.31686/ijier.vol3.iss3.337 fatcat:hzbvfsj5mbc7ngknx2jcjgf4yi

Formula E: Next Generation Motorsport with Next Generation Fans

Willem Standaert, Sirkka Jarvenpaa
2016 International Conference on Information Systems  
The case is situated in between the second and third year of race operations, and describes a variety of digital innovations at FE, leveraging social, mobile, virtual reality, gaming, and artificial intelligence  ...  In the case, two key executives -the CEO and the Head of Digital at FE -appraise the initiatives and raise challenges ahead.  ...  This Committee sends a clear sign that we are on the front lines of helping to solve the climate crisis.  ... 
dblp:conf/icis/StandaertJ16 fatcat:jbznnl4c6bhabnxya44gv52nzy

A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks [article]

Tejasvi Alladi, Vinay Chamola, Nishad Sahu, Vishnu Venkatesh, Adit Goyal, Mohsen Guizani
2022 arXiv   pre-print
The security perspective focuses on security requirements and attacks.  ...  We also compile the popular simulation tools used for simulating blockchain and for simulating vehicular networks.  ...  For instance, in the case of energy trading, one would want only the charging stations that belong to a registered company to provide a platform for trading.  ... 
arXiv:2201.04803v1 fatcat:yhm4umjt45ho5fu7mbeu7g66sq
« Previous Showing results 1 — 15 out of 342 results