2,030 research outputs found

    Spartan Daily, February 10, 1982

    Get PDF
    Volume 78, Issue 6https://scholarworks.sjsu.edu/spartandaily/6849/thumbnail.jp

    Evaluation of a Field Programmable Gate Array Circuit Reconfiguration System

    Get PDF
    This research implements a circuit reconfiguration system (CRS) to reconfigure a field programmable gate array (FPGA) in response to a faulty configurable logic block (CLB). It is assumed that the location of the fault is known and the CLB is moved according to one of four replacement methods: column left, column right, row up, and row down. Partial reconfiguration of the FPGA is done through the Joint Test Action Group (JTAG) port to produce the desired logic block movement. The time required to accomplish the reconfiguration is measured for each method in both clear and congested areas of the FPGA. The measured data indicate that there is no consistently better replacement method, regardless of the circuit congestion or location within the FPGA. Thus, given a specific location in the FPGA, there is no preferred replacement method that will result in the lowest reconfiguration time

    Interim research assessment 2003-2005 - Computer Science

    Get PDF
    This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities

    The Effects of a Videoconferencing Implementation Project on Educators\u27 Level of Concern in Southwest Michigan Schools

    Get PDF
    Problem. Two-way, interactive videoconferencing is emerging as an important technology tool for K-12 educators. The challenge is to identify and describe successful implementation. Educator concerns related to implementation may inhibit success. The focus of this study of a federally funded videoconferencing project is to address the factors that influence educators\u27 level of concern. Method. The Concerns-Based Adoption Model (CBAM) Stages of Concern (SoC) instrument was administered to measure the level of concern of two cohorts of participants. Data related to project, including number of connections, district and building technical support, professional development, and equipment reliability were also collected. One-way repeated measures of analysis of variance was used to determine if change took place in the Stages of Concern responses while canonical correlation and multiple regression were used to examine the relationship between level of concern and factors thought to be related to project implementation (e.g. number of connections, equipment reliability, etc.). Results. Overall, approximately 86% of the participants were at levels 1-3 on the measure of levels of concern at the beginning of the project. At the end of the project implementation period (at posttest), about 84% were at levels 4-5. Canonical correlation analysis indicated that level of concern and number of connections were significantly associated with professional development hours, building tech support and equipment reliability ( rc = 0.81, p = 0.001). Higher levels of concern (-0.88) and a larger number of connections (-0.71) are associated with higher professional development hours (-0.60), better building tech support (-0.42), and higher equipment reliability (-0.69). However, equipment reliability (β = 0.59) is the best predictor of participants\u27 level of concern. By itself, equipment reliability accounted for 42% ( r = 0 .65) of the variance in participants\u27 levels of concern. Conclusions. The activities in the project in this study resulted in improved levels of concernfor the project participants. Improved levels of concern and increased number of connections result from higher levels of equipment reliability, adequate building-level technical support, and a high level of professional development with equipment reliability having the most impact. It is essential that as videoconferencing projects are implemented, leaders at all levels address these factors

    Profile Analysis of Mobile Application Security

    Get PDF
    ABSTRACT This thesis conducts profile analysis on the mobile application security using peer-review articles that were published from 2010 to 2018. From the analysis, we will identify prolific authors, intuitions, and geographic regions as well as the topics addressed by the articles. The profile analysis will reveal most frequently used research methods, research approaches (quantitative, qualitative and mixed), and theories used to study the field. This thesis reveals that none of the researchers have made significant contributions to the field, and researches are not collaborating to solve their research problems. The profile analysis shows that surveys and experiments are the most utilized research methods, and most researchers studied the field at a higher level, i.e., security was the focus of the research but did not go deeper into various aspects of security such as privacy, security vulnerabilities, and mobile application security best practices
    corecore