The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the nuclear power engineering, methods of detection and diagnostics of failures, as well as methods of information support of human operators in order to improve the efficiency and reliability of the operation, play increasing role. A task that is solved within the information support is the task of calculating technical and economical indexes, which the paper is devoted to.
To find opportunities for applying prefactoring, several techniques for detecting bad smells in source code have been proposed. Existing smell detectors are often unsuitable for developers who have a specific context because these detectors do not consider their current context and output the results that are mixed with both smells that are and are not related to such context. Consequently, the developers...
The traditional sequential ways of spatial data processing lags in the efficiency of executing the queries. The modern parallel processing technique, the MapReduce, is used extensively for big data analysis. This paper analyzes the synthetic large spatial data-set on the MapReduce and ArcGIS to check the similarity of the outputs generated through the parallel framework and the specialized GIS software...
In this research, we investigate the possibility of applying ranking task activity in teaching and learning software engineering courses. We introduce three types of ranking tasks, conceptual-, contextual- and sequential ranking questions, which cover most core topics such as requirement analysis, architecture design and quality validation in the course. We have also done experiments on a group of...
Traffic flowing through a software defined network is vulnerable to disruptions caused by malicious switches. The malicious behaviors are diverse such as dropping traffic, adding traffic or modifying it. A switch could be malicious or otherwise dysfunctional or misconfigured. A lot of work in SDN has addressed the problem by securing the control plane and having it validate network wide properties...
This paper presents an application of clustering algorithms for streaming smart grid datasets. The authors use a framework that includes a combination of an openPDC and statistical software (R) platform to acquire Synchrophasor data to carry out the clustering process. The clustering operations on streaming synchrophasor data enables operators to detect any anomalies or outages for better decision...
The classical, popular Hungarian algorithm for solving the “optimum assignment” problems (with its broad engineering/science applications) has been well-documented in the literature. Other (more efficient) variations of the Hungarian algorithm have also been extensively studied by the research communities. In this paper, the basic Hungarian algorithm is revisited, with the ultimate goal of developing...
This paper explores the notion of self-agency in developing agent-based systems that support human-to-human communication. We first point out that a challenge in developing such agent-based systems is to successfully transfer conversational experiences that agents gain to their users. We then propose that the sense of self-agency is a key to address this challenge. We also show an experimental system...
Online failure prediction approaches aim to predict the manifestation of failures at runtime before the failures actually occur. Existing approaches generally refrain themselves from collecting internal execution data, which can further improve the prediction quality. One reason behind this general trend is the runtime overhead incurred by the measurement instruments that collect the data. Since these...
The paper presents the current state of art of a smart Distribution Management System (DMS) environment based on the evolution of a traditional Supervision Control and Data Acquisition (SCADA) system and the integration with a Network Calculation Algorithm System (NCAS). The tool is designed to perform a sensible management, on-line and off-line, of a distribution system with a high penetration of...
With the exponential growth of digital cameras and the aid of powerful video editing softwares, videos with various resolutions become ever more popular. Therefore, there is a great demand for video coding schemes supporting arbitrary resolutions with higher efficiency. In the latest standard, only a simple padding with direct copying is adopted to meet this requirement, and the coding efficiency...
Almost every year, Indonesia suffers catastrophic forest fires that has an impact on the shrinking forest land in Indonesia. Hotspot is parameter that can be used as an indicator for forest fires. One of the data mining techniques that can be used to process hotspot data is clustering. Clustering technique is used to obtain interesting patterns so that analysis on the occurrence of hotspots can be...
Cache memories have a huge impact on software's worst-case execution time (WCET). While enabling the seamless use of caches is key to provide the increasing levels of (guaranteed) performance required by automotive software, caches complicate timing analysis. In the context of Measurement-Based Probabilistic Timing Analysis (MBPTA) — a promising technique to ease timing analyis of complex hardware...
At present, most of the software security assessment system can only evaluate the potential impact of a single vulnerability on the system which ignore the impact of the multiple vulnerabilities. Therefore, we introduce the concept of relevance vulnerability pattern and design a relevance vulnerability pattern library taking consider of the potential impact caused by multiple vulnerabilities. After...
In this paper we provide an application to index the didactic resources intended to run in an adaptive learning system, which operates using the Learning styles of Felder-Silverman and according to the recommendations of the differentiated pedagogy, by offering multiple versions of the same learning object. The established application relates on the learning objects designed true to the SCORM standard,...
In a scientific research network, to determine the influence of an academic research, a key is to build and evaluate properties of its cited references or co-author networks. To analyze 18,000 lines of original data from Problem C given in 2014 MCM/ICM (Mathematical Contest In Modeling /Interdisciplinary Contest In Modeling), the Pajek software was used with obtaining a result that correlations among...
Over the years of software development, a vast amount of source code has been accumulated. Many code search tools were proposed to help programmers reuse previously-written code by performing free-text queries over a large-scale codebase. Our experience shows that the accuracy of these code search tools are often unsatisfactory. One major reason is that existing tools lack of query understanding ability...
Question-oriented text retrieval, aka natural language-based text retrieval, has been widely used in software engineering. Earlier work has concluded that questions with the same keywords but different interrogatives (such as how, what) should result in different answers. But what is the difference? How to identify the right answers to a question? In this paper, we propose to investigate the "answer...
Talents soft environment improvement is an important premise of innovation driven strategy implementation. Yangtze River delta is the most developed economic region of China, so talents soft environment researching of this area has a strong regional demonstration effect. Firstly, we establish talents soft environment evaluation system, including four aspects of talents quantitative, talents quality,...
Teaching quality value is the key point in valuing teaching quality in universities. This paper introduces the model design and evaluation index, web design and work flow, etc, and it is combined with Teaching Evaluation System (TES) of the Yuxi Normal University. It can remedy the defects in traditional teaching evaluation. Now the TES has been adopted in practice and the results show that it can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.