The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, one of the main challenges of big data research is the processing of big time-series data. Moreover, time data analysis is of considerable importance, because previous trends are useful for predicting the future. Due to the considerable delay when the volume of the data increases, the presence of redundancy, and the innate lack of time-series structures, the traditional relational data model...
Haze has becoming a yearly occurrence in Malaysia. There exist three dimensionsto the problems associated with air pollution: public ignorance on quality of air, impact of air pollution towards health, and difficulty in obtaining information related to air pollution. This research aims to analyse and visually identify areas and associated level of air pollutant. This study applies the air pollutant...
The colors of characters suitable to presentation slides were proposed. Here, five color combinations were proposed. A combination has three colors of base, main, and accent colors. The base color is for the background. The color white is used as the base color. The main color is for the part becoming the frame. The accent one is for the place where we want to emphasize. This paper proposes two methods...
The International Journal of Intelligent Systems was created on 1986. Today, the journal has become thirty years old. In order to celebrate this anniversary, this study develops a bibliometric review of all the papers published in the journal between 1986 and 2015. The results are mainly based on the Web of Science Core Collection that classifies the bibliographic material by using several indicators...
The effectiveness of a code search engine is reduced when query terms do not represent the information needs properly or terms are ambiguous. As a result, many irrelevant code snippets and software artifacts are retrieved that hinder the developers reusing existing source code. In this paper, a technique named QExpandator is proposed that improves the effectiveness in code search by expanding query...
Automatic bug assignment is an essential activity aiming at assigning bugs to appropriate developers. Existing approaches consider either recent commits or previous bug fixes of developers, leading to recommendation of inexperienced or inactive developers respectively. Considering only one information source leads these approaches to low prediction accuracy. An approach called ERBA is proposed, which...
The Symbolic Execution Debugger (SED) is an extension of the Eclipse debug platform for interactive symbolic execution. Like a traditional debugger, the SED can be used to locate the origin of a defect and to increase program understanding. However, as it is based on symbolic execution, all execution paths are explored simultaneously. We demonstrate an extension of the SED called Interactive Verification...
Este artículo abarca un estudio del análisis hiperespectral en el proceso de fermentación de granos de cacao violeta. La aplicación de técnicas de procesamiento de imágenes hiperespectrales en el cacao es escasa. Este artículo presenta un estudio basado en el cálculo de índices espectrales, encontrando una correlación con los parámetros bioquímicos que indican una correcta evolución de la fermentación...
For those responsible for the design and implementation of a SpaceFibre network it is essential to be able to capture and view the traffic on a SpaceFibre link in order to help validate the link is operating as expected and debug the link should any unexpected behaviour be observed. STAR-Dundee Ltd have developed hardware independent SpaceFibre Link Analyser software for this purpose. This paper describes...
The implementation of a low-cost electro pneumatic bank from an existing educational pneumatic equipment is exposed. The proposed bank operates with a PLC. To demonstrate its advantage, a stamping machine is simulated using Ladder and Grafcet language. This demonstration can simulate any machine or process requiring up to four electro pneumatic cylinders.
Preserving important troubleshooting experience gained in industrial practice, often referred to as “tribal knowledge”, and making it readily available to be re-applied in similar situations represent a serious challenge for many companies in heavy industry. The solution is very often tied to building mental models to capture and express key latent cognitive variables. In this paper, we first attempt...
A method for simulation of classic substitution ciphers for the purpose of their study in the learning process is considered. The method is based on the decomposition of the alphabets of the plain and encrypted texts. Implementation of the method has a two-level structure: the basic components are implemented using software, variation is part of the settlement. This allows user to simulate a wide...
We report an investigation of data analysis methods derived from other disciplines, which we applied to physics software systems. They concern the analysis of inequality, trend analysis and the analysis of diversity. The analysis of inequality exploits statistical methods originating from econometrics; trend analysis is typical of economics and environmental sciences; the analysis of diversity is...
Integrated evaluation of military software supportability was studied in this article, with the concept and classification of military software described, the relationship between software support and software supportability analyzed. Based on the analysis of the software supportability conceptual block diagram, the evaluation index systems of military software supportability were made and the index...
In software projects, there is a data repository which contains the bug reports. These bugs are required to carefully analyse and resolve the problem. Handling these bugs humanly is extremely time consuming process, and it can result the deleying in addressing some important bugs resolutions. To overcome this problem, researchers have introduced many techniques. One of the commonly used algorithm...
This paper studies a sensitivity analysis of the software project risk assessment model based on data envelopment analysis. Some sufficient conditions and necessary conditions are provided which can hold the efficiency of decision making units, when positive index data and reverse index data of decision making units are changed simultaneously. Finally, a numerical example is presented to give an illustration...
According to the gradual expansion of power grid scale and rapid development of computer technology, the dispatching automation and control system has played an increasingly prominent role in technique support and guarantee for power grid. In this paper we designed a kind of operating monitoring and evaluation software for the smart grid dispatching and control system, and described several key technologies...
Source code similarity measurement is a fundamental technique in software engineering research. Techniques to measure code similarity have been invented and applied to various research areas such as code clone detection, finding bug fixes, and software plagiarism detection. We perform an evaluation of 30 similarity analysers for source code. The results show that specialised tools including clone...
The first step of the K-nearest neighbor classification is to find the K-nearest neighbors of the query. A basic operation in calculating Jaccard distance is to count the number of ones in a binary vector - population count. This article focuses on finding the K-nearest neighbors in a high-dimensional Jaccard space. There are two main contributions. First, software methods for population count are...
LBlock is a lightweight block cipher designed for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel structure with SP type round function by 32 rounds. Its block size is 64 bits and key size is 80 bits. The designers show that LBlock is resistant against most classical attacks, such as differential and linear cryptanalysis. This paper proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.