The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quality and safety of consumer products have drawn wide attention from scholars in related domain, this issue is based on the subject of the quality and safety of consumer goods, in accordance with characteristics of cases, and put forward a hierarchical support vector machine classification algorithm based on the relative separability of the feature space, to solve the low classification performance...
Global interaction specifications define the rules that participating components should respect in their interaction with the aim of guaranteeing correct interoperability in the requirement phase. The design model of a particular component gives the communicative behavior from the point of view of that component in the design phase. In this paper, the global interaction specifications are specified...
The IT Infrastructure Library (ITIL) is the most widely used IT service management framework and a de facto standard. ITIL provides instructions for IT service providers and organizations how to design, manage and support IT services. However, adopting best practices of ITIL can be difficult for many IT companies. The main contribution of this paper is to present challenges and problems that were...
Wireless Sensor Networks have attracted many researchers all over the world. Wireless sensor networks have become a kind of sub field including data fusion, data aggregation, remote environmental monitoring, sensing (temperature, pressure speed) and a variety of military applications. The Received Signal Strength Indicator (RSSI) is used for distance measurement between sensor nodes. This paper proposes...
We use a scenario-based visual notation, called Policy Sequence Chart (PSC), for specifying security policies in service coordination. A security policy defines a set of security requirements that correspond to permissions, prohibitions and obligations to some executions when some contextual conditions are satisfied. In this paper, we propose an approach of defining operational semantics of PSCs in...
This paper introduced the GQM model into software engineer behavior analysis measurement process, which makes the software engineer behavior controllable and prevision. Here has fully explained GQM model, while introducing the software measurement steps. And based on a giving software engineer behavior analysis management frame referencing to Organizational Behavior, this paper has finished a series...
With the current direction of service and cloud, unique characteristics of online software services impose new algorithmic requirements and cause differential applicability/ suitability of different clustering approaches in service analytics. In this paper, we investigate the efficiency and effectiveness of current important data clustering techniques, partitioning and hierarchical, for service analytics...
Agile software development methods and techniques have gained attention in the recent few years. The main motive behind adopting agile software development approach is to improve end-product quality, enhance developer's moral and achieve stakeholder satisfaction. However, Agile adoption always comes with special challenges and thus fundamental organizational changes are necessary for successful outcomes...
When designing services, a service provider has to define the quality of service levels that will be offered to customers. These service level objectives (SLOs) form the basis for service level agreements (SLAs) between the provider and consumers of services. The design of SLAs is a complex task which needs to combine business considerations regarding revenues, costs and penalties, and technical considerations...
The implementation degree of software interoperation is fundamentally determined by interoperability between operating systems. For the purpose of meeting the requirements of software interoperation, this paper proposes that the nature of interoperability testing between operating systems is API testing relating to interoperation functions in operating system. On this basis, we lead the mature theory...
In this paper, we propose anenergy-aware algorithm to construct a routing backbonein wireless sensor networks. The proposed algorithm selects the backbone members based on the remaining energy of nodes. The node with higher remaining energy will be selected and become the backbone member to relay the message to the sink. The proposed algorithm uses the countdown mechanism;each node checks if it is...
Recently, the concept of distributed file system has been widely used in many Internet applications. A distributed file system integrates many file servers on the network and becomes an efficiency file system with large storage space. Users can access their files anytime and anywhere. However, the cost for building and maintaining these storage systems is high for many small enterprises and organizations...
Machine learning is a subfield of Artificial Intelligence, concerned with the development of algorithms that allow computers to learn based on data, such as sensor data or databases. A major focus of machine learning research is to automatically learn to recognize complex patterns and make intelligent decisions based on such data. In this paper both sheep and goat disease database is created using...
Post internship is an important practice step during combining work with study and during running school-enterprise cooperation schools in higher vocational colleges, which has contributed greatly to the development of talents with high skills. This paper is concerned about the lack of the flexibility and the independency when students applying for posts in the current arrangement of post internship...
Flash memory has been widely used in embedded systems because of its advantages. The traditional scheduler over flash memory storage systems, namely NOOP, makes no distinction between read and write requests. There is much room for improving the I/O performance, especially over multi-bank flash memory storage systems. In this paper, a novel scheduler, namely Multi-Bank Flash Memory scheduler (MBF...
This paper presents the design of Learner Integrated Data Exchange System for e-Learning based on Multi Prime-RSA(M-RSA) cryptosystem for E-Learning System transactions focusing on the electronic signing for e-admissions, certified e-mail, e-payment, e-material delivery and e-evaluation.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.