نتایج جستجو برای: adaptation technologies

تعداد نتایج: 344682  

2012
Etienne Roux Prisca Mbikou Ales Fajmut

Etienne Roux1,2, Prisca Mbikou3 and Ales Fajmut4 1 Univ. de Bordeaux, Adaptation Cardiovasculaire à l'ischémie, Pessac, 2INSERM, Adaptation Cardiovasculaire à l'ischémie, Pessac, 3Institute of Biomedical Technologies, Auckland University of Technology, Auckland, 4University of Maribor, Medical Faculty, Faculty of Natural Sciences and Mathematics and Faculty of Health Sciences, 1,2France 3New Ze...

2007

Scope of adaptation action Regional level Approaches/ strategies The 14 SAARC Summit, held in New Delhi during 3-4 April 2007 has adopted a decision to approach climate change as a regional concern. The immediate outcome is to organize a workshop this year where regional experts will identify coastal concerns and adaptation options. The prioritized options and actions Under consideration Region...

2005
Ekaterina Vasilyeva Denis Kozlov

The paper discusses some basic applications of semantic web and agent-based technologies to the adaptation of e-learning systems. The material is presented in the following order. Firstly, the basic principles underlying e-learning, adaptive e-learning and agent-based technologies are clarified, and then we discuss the well known in the literature example how agent-based technologies can be imp...

2000
Linda Glen Dembo Daniel D. Suthers

Driven by the Internet revolution and the demand for computer literacy skills, computational media are playing an increasing role in education from pre-school through lifelong learning. Adaptation of existing technologies and design of new digital document technologies should be undertaken with an understanding of the role these technologies can play in the affective, cognitive, and social proc...

Journal: :Sig. Proc.: Image Comm. 2009
Hemantha Kodikara Arachchi Xavier Perramon Safak Dogan Ahmet M. Kondoz

Data encryption is one of the key information security technologies used for safeguarding multimedia content from unauthorised access and manipulation in end-to-end delivery and access chains. This technology, combined with the appropriate cryptographic methods, effectively prevents the content against malicious attacks, so as to protect its authenticity as well as integrity. While encryption b...

2007
Christophe M. Elie-Dit-Cosaque

Our aim in this article is to increase our understanding of how users cope with disruptive information technology (IT) that is in the process of being implemented. For that purpose, we rely on the coping model of user adaptation (CMUA) (Beaudry and Pinsonneault 2005), a model that explains user strategies that result from appraisals of the IT event. These strategies are a response to threats an...

2010
Federica Cena Antonina Dattolo Styliani Kleanthous Carlo Tasso David Bueno Vallejo David Bueno Julita Vassileva Ben Steichen Vincent Wade Yuan Wang Jie Zhang Fedor Bakalov Adrian Knoth Lora Aroyo Pasquale De Meo Domenico Ursino

The Adaptation in Social and Semantic Web workshop analyzes the benefits adaptation and personalization have to offer within the current Web and the Web of the future, and the numerous open challenges, putting together the Semantic Web, Social Web and Adaptation field. The workshop discusses the state-of-the-art, open problems, challenges and innovative research approaches in adaptation and per...

2001
Margherita Antona Anthony Savidis Constantine Stephanidis

This paper focuses on the notion of content and interaction adaptation in web-based courseware. The adopted perspective is that adaptation should continuously deliver, at any time during the use of the system, the most appropriate interactive learning content to each individual learner. To this purpose, the paper briefly discusses the concept of adaptation in educational applications from the w...

Journal: :علوم تربیتی 0
سید محمد میرکمالی حمید فرهادی راد

the main purpose of this research was to study the variables and factors that affect adaptation of university to external environment and to develop a model for assessment of tehran public universities adaptation to external environment. a mixed method research approach involving a three-round delphi study was used to record responses to the closed-questions and open-ended-questions. other data...

2005
E. Patouni N. Alonistioti P. Magdalinos Eleni Patouni

Over the last decade the mobile industry spawned numerous wireless technologies and access systems with different capabilities that coexist forming a new era in the area of wireless technologies. The current trend is the facilitation and the combination of the capabilities of the different systems, and is introduced within the reconfigurability concept. The latter lies in the dynamic adaptation...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید