The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A method of PV pump system calculation for small irrigation is presented. The solar radiation calculation was performed with PVGIS software. The numerical example contains pump flow rates, pumped water volumes (daily, monthly and for all irrigation period)
In our daily life we develop many activities that result imperceptible for the majority of us because the null effort that they represent to develop them, however, when we most develop those activities with any type of restriction, they acquire a higher level of difficulty. One simple activity is the communication process; we develop it in an easy way during almost all day, however, for people with...
The field of non-biological ecosystem studies is riddled with different kind of ecosystems, connections and relations of which are rarely discussed. For example, the field of software ecosystems is influenced by both natural and business ecosystems, as studies have identified a strong inspiration from both. In this study, we survey the ecosystem literature and identify how different types of ecosystems...
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
The aim of this paper is to show the strengths and the weakness of process mining tools in post-delivery validation. This is illustrated on two use-cases from a real-world system. We also indicate what type of research has to be done to make process mining tools more usable for validation purposes.
Contemporary tools aimed at information system (IS) development often use models to generate system implementation. Starting from an IS model, these tools commonly generate database implementation schema as well as code for generic CRUD operations of business applications. On the other hand, at the level of platform-independent models (PIMs) there is a lack of support for specification of more complex...
The software supply chain is a source of cybersecurity risk for many commercial and government organizations. Public data may be used to inform automated tools for detecting software supply chain risk during continuous integration and deployment. We link data from the National Vulnerability Database (NVD) with open version control data for the open source project OpenSSL, a widely used secure networking...
Latency and cost of Internet-based services are encouraging the use of application-level caching to continue satisfying users’ demands, and improve the scalability and availability of origin servers. Despite its popularity, this level of caching involves the manual implementation by developers and is typically addressed in an ad-hoc way, given that it depends on specific details of the application...
This paper proposes a novel hybrid transactional memory scheme based on both abort prediction and an adaptive retry policy. First, the proposed scheme can predict not only conflicts between transactions running concurrently, but also the capacity and other aborts of transactions by collecting the information of previously executed transactions. Second, the proposed scheme can provide an adaptive retry...
Task switching and interruptions are a daily reality in software development projects: developers switch between Requirements Engineering (RE), coding, testing, daily meetings, and other tasks. Task switching may increase productivity through increased information flow and effective time management. However, it might also cause a cognitive load to reorient the primary task, which accounts for the...
Developing new ideas and algorithms or comparing new findings in the field of requirements engineering and management implies a dataset to work with. Collecting the required data is time consuming, tedious, and may involve unforeseen difficulties. The need for datasets often forces re-searchers to collect data themselves in order to evaluate their findings. However, comparing results with other publications...
A tele-monitoring system, based on a soft transducer network, developed by students of the Course "Measurements on Communications Network" (MRC), at the Department of Electrical Engineering and Information Technology, University of Naples Federico II, is presented. This project is the result of an innovative education approach for (i) overcoming specialization of single Courses on different...
Nano- and pico-satellites are currently used as low cost in-orbit-demonstrators of new technologies or for the university research. These satellites are launched to the low Earth orbits and radio commanded from the ground control stations. Most of them are equipped with narrow band transceivers working in UHF radio amateur frequency band, reaching only low data transmission rates. Low Earth orbits...
Relational databases provide a wealth of functionality to a wide range of applications. Yet, there are tasks for which they are less than optimal, for instance when processing becomes more complex (e.g., regular expression evaluation, data analytics) or the data is less structured (e.g., text or long strings). With the increasing amount of user-generated data stored in relational databases, there...
Genetic sequence alignment has always been a computational challenge in bioinformatics. Depending on the problem size, software-based aligners can take multiple CPU-days to process the sequence data, creating a bottleneck point in bioinformatic analysis flow. Reconfigurable accelerator can achieve high performance for such computation by providing massive parallelism, but at the expense of programming...
This paper presents differential pressure based flow configuration software implemented using FDT2 technology. FDT2 is a latest version of FDT standard (IEC62453) which is useful for configuration, monitoring, diagnosis and asset management of field device. Using FDT2 technology, client server system for flow configuration will be achieved keeping the interoperability of host system. The original...
The article considers the most popular methods of data collection from socially oriented websites. There were reviewed specialized software for information search and analysis from social networks. Advantages and disadvantages of manual social network analysis as well as automated software are shown. Main stages of socially oriented websites analysis using API and source code analysis are described.
Informational and psychological manipulation (IPM) more and more frequently occurs in online communities, posing a threat to members viewpoints and attitudes as well as hindering existence of a community. Considering the structure of an online community, peculiarities and patterns of communication in an online community, the key components crucial for IPM detection are determined. Formal models of...
The purpose of this research study is to investigate the problems of design and requirements to diagnostic automated systems based on image processing. To realize the research purpose, the authors designed a conceptual model, a use case diagram, and a prototype of automated system object model.
Development of technologies in bioinformatics resulted into many folds growth of biological data that led to the research for accelerated solutions in various domains of computational bioinformatics. String matching is one of the most widely performed tasks at various stages of computational pipeline and it needs an accelerated and reconfigurable methodology for implementation. In this paper we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.