The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information processing has been the primary goal — whether it was being done manually or using sophisticated devices. Sometimes one gets the feeling that although we are drowning, we are not able to extract useful knowledge. What computing and computers have allowed us to do, over several decades, is to handle large volumes of raw data, in real-time as needed, to infer meaningful knowledge and facilitate...
Practice teaching is an important link for the computer major to cultivate the talents in the Application-oriented University. In the process of practice teaching, the teaching target and the methods of training students' engineering ability play a decisive role. This paper on how to cultivate the senior professionals as the goal in the application-oriented undergraduate university, puts forward a...
Developing and improving teaching and learning in computer science is a complex task. One of the most significant challenges involves encouraging students, teachers and the formal university structures to all move in the same direction, for example to embrace the ideas of Scholarship of Teaching and Learning (SoTL). Much of the difficulty can be found in the fact that the intrinsic nature of SoTL...
Machine translation (MT) is the translation of text or speech in one language called the source language into another language called the target language. Machine translation systems (MTS) are available for various Indian languages. The very first system for the translation of Hindi text to Dogri has been developed by the authors. This paper presents the methods of machine translation and the various...
The total edge irregularity strength tes(G) and total vertex irregularity strength tvs(G) are invariants analogous to irregular strength s(G) of a graph G for total labellings. Bača et al. [Discrete Mathematics, 307: 1378-1388, (2007)] determined the bounds and precise values for some families of graphs concerning these parameters. In this paper, we show the exact values of the total edge irregularity...
Traditionally, electronic services have been considered in two domains, using information technology for interaction and the actual service deliver via the electronic channels. Newly, three constructs have been identified, namely, transform, informate and automate. Based on these concepts, the e-service applications are classified and then the usage of each application is evaluated. Afterward, the...
Formal specification focuses on covering uncovered faults that would probably go ignored with traditional specification methods. The use of VDM (Vienna Development Method) to identify a system is a well known practice in formal specification. This paper presents an approach for the specification of Particle Swarm Optimization (PSO) algorithm and formal specification language which is used for specification...
This paper presents Isarn Dhama word segmentation based on the Isarn Dharma writing system and dictionary. In this study, input text is segmented into sequences of Isarn Dharma Character Clusters (IDCCs). Each IDCC represents a group of inseparable Isarn Dharma characters based on the Isarn Dharma writing system. The sequence of IDCCs will be considered as input in order to look for the most suitable...
The notion of bags play an essential role in dealing with knowledge representation problems where object classes allow repeated occurrence of elements. Sometimes bags with some special conditions can be drawn from a given set. Under these situations, is possible to define some algebraic structures on the given set.The present paper considers the situation when some bags with special conditions are...
Grid computing is the combination of computer resources from multiple administrative domains to compute a complex and time consuming computational problems whereas Data Grids address data intensive applications that deal with the evaluation and mining of large amounts of data in the terabyte and petabyte range. By having large number of data in a complex computing structure such as grid requires a...
The vulgarization of information technologies and telecommunications has generated an enormous amount of information. This information is generally heterogeneous, stored in autonomous and distributed sources. Thus, it becomes necessary to introduce the information integration systems. These systems must ensure an optimal query response time, and the freshness of data. Using a virtual approach cannot...
Databases are the repositories of the most important and expensive information in the enterprise. With the increase in access to data stored in databases, the frequency of attacks against those databases has also increased. A database threat refers to an object, person or other entity that represents a risk of loss or corruption of sensitive data to an asset. Today, in many business organizations,...
Risk Management is one of the key cares of any organization strategic management. Referring to all the activities on-going in the organizations, risks are brought in for accomplishing the activities and their targets beneficially in all portfolios. Proper benefit of risk management is finding risks and their solutions. The result from a good risk management would be the maximization of the organization's...
This paper presents a novel technique for the classification of Arabic sentences as Dialogue Acts, based on structural information contained in Arabic function words. It focuses on classifying questions and non-questions utterances as they are used in Conversational Agents. The proposed technique extracts function words features by replacing them with numeric tokens and replacing each content word...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.