The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aim of this paper is to acquaint readers with the process and reasons for the introduction of a new subsystem into the scheme of the flight simulation training designed for future military pilots in the framework of their curricula at the University of Defence (UoD) in Brno. This subsystem is based on the structure of an objective evaluation of completed training missions and their utilization...
The paper describes the new possibilities of Home LASER Shooting Simulator (HomeLESS) project and its usage for measurement of shooting skills. The first part of this project was presented at ICMT 2013 [1]. The objective of this project is provide a cross-platform free and open source LASER shooting simulator, measuring tools and accessories available to the shooters and people interested in shooting...
IT service providers differentiate themselves through offering after-sales support for hardware and software products. Thus, businesses, including large corporations, have intricate work-flows for servicing such support requests while reducing man-hours needed. These work-flows generally operate through a ticketing system for resolving customer issues. A lot of man-hours are spent in searching old...
Software development teams apply security practices to prevent vulnerabilities in the software they ship. However, vulnerabilities can be difficult to find, and security practices take time and effort. Stakeholders can better guide software development if they have empirical data on how security practices are applied by development teams. The goal of this paper is to inform managers and developers...
Traditional software engineering programming paradigms are mostly object or procedure oriented, driven by deterministic algorithms. With the advent of deep learning and cognitive sciences there is an emerging trend for data-driven programming, creating a shift in the programming paradigm among the software engineering communities. Visualizing and interpreting the execution of a current large scale...
Given the current scientific questions of societal significance, such as those related to climate change, there is an urgent need to equip the scientific community with the means to effectively use high-performance and distributed computing (HPDC), Big Data, and tools necessary for reproducible science. The Polar Computing RCN project (http://polar-computing.org) is a National Science Foundation funded...
The paper discusses using the virtual reality for simulators to simulate the pilot's sensory illusion during flying in IMC and possibility of recognition of spatial disorientation during flight. The first part of the paper describes various approaches to simulators that can be used for pilot illusion simulation. The second part describes design of a sensory illusion simulator prototype using the virtual...
When there exists not enough historical defect data for building accurate prediction model, semi-supervised defect prediction (SSDP) and cross-project defect prediction (CPDP) are two feasible solutions. Existing CPDP methods assume that the available source data is well labeled. However, due to expensive human efforts for labeling a large amount of defect data, usually, we can only make use of the...
The traditional role of the teacher as holder of all wisdom has been put in question, at least in some circles, in the last few years. Changes brought on by Millennials, a new generation of students both eager to collaborate and restless, the ubiquitous overflow of information, the rise of agility, the proliferation of new teaching methodologies, and profound shifts in technology have generated alternatives...
As security incidents continue to impact organisations, there is a growing demand for systems to be ‘forensic-ready’ - to maximise the potential use of evidence whilst minimising the costs of an investigation. Researchers have supported organisational forensic readiness efforts by proposing the use of policies and processes, aligning systems with forensics objectives and training employees. However,...
Accessibility for people with motor impairments is limited in direct manipulation-reliant software applications, especially in those that utilize geospatial technology. In this paper, we demonstrate an alternative method to interact with geospatial web applications such as Google Street ViewTM and Google MapsTM using Brain Computer Interface technology. We conducted a user study for our web application...
Curriculum guidelines for IT learners need to be aligned with the current generation of students, the so-called millennials, own features and style of learning. It is necessary explore ways of adapting the teaching/learning process, the methods, the techniques and the resources we use, to reach them and teach them more effectively. Computer-based simulations and serious games are powerful tools that...
To support code migration, we introduce JV2CS, a tool to generate asequence of C# API elements and related control units that are neededto migrate a given Java code fragment. First, we mine the mappingsbetween single APIs in Java and C#. To overcome the lexical mismatchbetween the names of Java and C# APIs, we represent an API by itsusages instead of its name. To characterize an API with its contextconsisting...
Autonomous Systems are systems situated in some environment and are able of taking decision autonomously. The environment is not precisely known at design-time and it might be full of unforeseeable events that the autonomous system has to deal with at run-time. This brings two main problems to be addressed. One is that the uncertainty of the environment makes it difficult to model all the behaviours...
Through the increasing availability of more efficient data collection procedures, biomedical scientists are now confronting ever larger sets of data, often finding themselves struggling to process and interpret what they have gathered. This, while still more data continues to accumulate. This torrent of biomedical information necessitates creative thinking about how the data are being generated, how...
With the rapid advancement in technology, we still observe a significant amount of deaths of children under the age of five years. Majority of these deaths worldwide can be attributed to various medical conditions out of which three are very significant: birth asphyxia, preterm and infections. Birth asphyxia (perinatal asphyxia) is a medical condition which is characterised by abnormal breathing patterns...
This paper is focus on the progress of wearable technology in the area of human healthcare. It has been developed a small, low cost, low power consumption and open source wearable system that allows the monitoring of the human physical activities. One of the main reasons for developing this wearable system is to promote the sport activity and combat physical inactivity i.e. a sedentary lifestyle,...
The Convention of the Rights of Persons with Disabilities guarantees that the same rights recognized in the Universal Declaration of Human Rights of 1948 are respected for persons with disabilities, including the right to work and employment. In reality, one of the problems that represent greater difficulty for people with disabilities is to get successfully involved in work environments. There are...
Today, much more than in the past are discussed of plagiarism in the research. Conditions of the Web and Possibility of complex and smart searches in a short time, is rated to this, and as a result has arrived significant damages to the research. Tools designed to deal with plagiarism act on the text and ignore images. On the other, an inseparable part of information transfer are images that transfer...
Neurosurgical procedures are complicated processes, providing challenges and demands ranging from medical knowledge and judgment to the neurosurgeons dexterity and perceptual capacities. Deliberate training of common neurosurgical procedures and underlying tasks is extremely important. One effective method for the training is to enhance the required surgical training tasks through the use of neurosurgical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.