The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Unified Modeling Language (UML) is widely taught in academia and has good acceptance in industry. However, there is not an ample dataset of UML diagrams publicly available. Our aim is to offer a dataset of UML files, together with meta-data of the software projects where the UML files belong to. Therefore, we have systematically mined over 12 million GitHub projects to find UML files in them....
With the rapid advancement in technology, we still observe a significant amount of deaths of children under the age of five years. Majority of these deaths worldwide can be attributed to various medical conditions out of which three are very significant: birth asphyxia, preterm and infections. Birth asphyxia (perinatal asphyxia) is a medical condition which is characterised by abnormal breathing patterns...
In Data Mining (DM) projects, more specifically in the Data Understanding and the Data Preparation phases, several techniques found in the literature are used to detect and handle data quality problems such as missing data, outliers, inconsistent data or time-variant data. However, the main limitation in the application of these techniques is the complexity caused by a lack of anticipation in the...
For the security risk caused by foreign products, an aerospace ground automatic test system was designed based on Kylin Operating Systems. Based on the analysis of the work principle of the system, a relevant application testing software by using QT is designed. Methods of “database + binary file” and driver design for the key technologies of fast data storage and data acquisition card are put forward...
Accelerating relational databases in general and SQL in particular has become an important topic given thechallenges arising from large data collections and increasinglycomplex workloads. Most existing work, however, has beenfocused on either accelerating a single operator (e.g., a join) orin data reduction along the data path (e.g., from disk to CPU). In this paper we focus instead on the system...
This paper was primarily conducted to develop an Online Booking System where users can search for different varieties of hotels and are able to sort them according to their price, number of stars or their location distance to any particular place in the city. Once the hotel is selected, Users are able to guess the fastest routes to all the tourist attraction places and restaurants nearby each hotel...
Code smells are sub-optimal coding circumstances such as blob classes or spaghetti code - they have received much attention and tooling in recent software engineering research. Higher-up in the abstraction level, architectural smells are problems or sub-optimal architectural patterns or other design-level characteristics. These have received significantly less attention even though they are usually...
Digital electronic type of physical unclonable functions (PUFs) are vulnerable to modeling attacks. They also suffer from errors due to temporary environmental variations, such as the variation of the ambient temperature. Motivated by that, we designed a new mixed-signal PUF using 45nm MOSFET technology. The design presents an expanding approach for the number of processed bits. The design generates...
Today, much more than in the past are discussed of plagiarism in the research. Conditions of the Web and Possibility of complex and smart searches in a short time, is rated to this, and as a result has arrived significant damages to the research. Tools designed to deal with plagiarism act on the text and ignore images. On the other, an inseparable part of information transfer are images that transfer...
Zaozhuang city in Shandong province is changing from the mining city to the tourist city, the tourism industry is developing rapidly, but the tourism management is relatively backward. In order to provide technical support for Zaozhuang tourism management, according to the characteristics of tourism resources in Zaozhuang, the author designs and develops the tourism resources management system. Combined...
This paper describes an industrial case study using Atlassian JIRA® and third party plugins for requirements management in the field of transit systems. The solution presented shows efficiency in supporting the management of requirements, traceability and the systems engineering processes globally. After a short description of the technologies in action and a brief overview of the process we targeted,...
In the field of software engineering, modeling business processes can complement the tasks currently carried out to capture various requirements, providing a common, easy graphical language to understand, allowing communication between the various actors. One type of important requirement that must be addressed is that of the data. Several studies show techniques and methods to obtain the data model...
The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses...
Hardware development is a major driver for the development of data management systems. For example, due to the increased capacity and low cost of main memory, data management systems have shifted from disk-based to in-memory systems [1]. Recently, databases on emerging hardware have gained a lot of attractions in both academia and industry. A significant amount of research has been devoted to the...
Enterprise information systems are being widely and extensively used in many business domains. In fact, some of these domains cannot survive in operations without depending heavily on such systems. Although several research studies have been performed that explored the importance of enterprise information systems, only a few have been focusing on an effective and efficient end-to-end method to design...
As the popularity of mobile smart devices continues to climb the complexity of “apps” continues to increase, making the development and maintenance process challenging. Current bug tracking systems lack key features to effectively support construction of reports with actionable information that directly lead to a bug’s resolution. In this demo we present the implementation of a novel bug reporting...
There is a vast growth of generated event data being collected and stored by organizations. Within the field of Process Mining, this data has been used to discover, analyze and enhance processes from different domains. For this purpose there are hundreds of techniques available in different tools. These techniques are mostly focused on single processes. On the other hand, there are several proposals...
In the quest for energy efficiency of Information and Communication Technology, so far research has mostly focused on the role of hardware. However, as hardware technology becomes more sophisticated, the role of software becomes crucial. Recently, the impact of software on energy consumption has been acknowledged as significant by researchers in software engineering. In spite of that, measuring the...
System testing based on a black box approach is a common industrial practice in information systems. Despite its widespread use, however, little guidance is available for testing engineers facing the problem of selecting the best test strategy. In previous work, we proposed to adopt functional models and related testing patterns according to the architectural style of the application under test. In...
We discuss our experience in use of models and model-driven techniques for developing large business applications. Benefits accrued and limitations observed are highlighted. We describe possible means of overcoming some of the limitations and experience thereof. A case for shift in focus of model driven engineering (MDE) community in the context of large enterprises is argued. Though emerging from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.