The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Continuous training is crucial for creating and maintaining the right skill-profile for the industrial organization's workforce. There is a tremendous variety in the available trainings within an organization: technical, project management, quality, leadership, domain-specific, soft-skills etc. Hence it is important to assist the employee in choosing the best trainings, which perfectly suits her background,...
Society evolution toward the information and knowledge-based economy made necessary a new and more specific definition of electrical engineering. The paper discusses about new approach of electrical energy systems as power systems microprocessor controlled. From this point of view computer use was integrated in electrical engineering. Some tendency in electrical engineering curricula reform are presented...
The 2017 International Conference on Engineering Technologies and Computer Science (EnT 2017) was held at the S.I. Vavilov Institute for the History of Science and Technology of the Russian Academy of Sciences (IHST) the leading Russian research institute for the history of Science and technology, on September 28, 2017. It was the fourth international conference EnT. The conference EnT 2017 was devoted...
This article analyzes the reasons for the referral of children of Kabardian and Karachay-Balkar aristocrats to the Dmitryevskiy semisquadron of comissioned cantonists.
Identifying students' eligibility for a specific job is crucial even before commencement of the Job? Placement process. In this study, a tailored method has been proposed to generate a personalized job competency profile. First, the domain competencies are identified for a specific job. Secondly, the job competency score is calculated based on students' past performances, pertinent to the relevant...
Crowdsourcing systems are distributed problem solving platforms, where small tasks are channelled to a crowd in the form of open calls for solutions. Reward based crowdsourcing systems tries to attract the interested and capable workers to provide solutions in return for monetary rewards. We study the task recommendation problem in reward based crowdsourcing platforms, where we leverage both implicit...
From 11/2016, the VCCI Council started the Self-regulation based on CISPR 32 Ed.2. • The system of the new rules has a pyramid structure and has a hierarchy in the rules. • The technical requirements conformed to CISPR 32 Ed.2, but depending on the circumstances of Japan, there are some additional items. For example, In-situ test. • The applicable scope of the new VCCI rules is mainly MME with the...
Advanced Persistent Threat (APT) and traditional cyber attacks are different in kinds of aspects, which make the traditional defense is difficult to detect APT and protect the network. Therefore, an APT detection framework based on OpenIOC is established for the characteristics of APT system attack. Firstly, real-time attack data related to APT from massive fragmented threat data is output. Secondly,...
Modern students have been brought up on the literature in the style of “fantasy” and computer games, so reading scientific literature and watching science films seems boring to modern students. To solve the problem of increasing students' interest in learning we offer a MOOC in form of “Quest”-style.
Here we describe an approach for the dynamic selection of test cases in continuous integration test environments. By correlating historical test case results with product source code changes, we are able to construct a simple model that enables us to dynamically and automatically create test suites that are customized for each individual product software delivery. Using this technique, we are able...
This panel addresses ethical issues of curators who work with contentious, uncomfortable, or "sensitive" content relating to marginalized populations and underrepresented histories.
It is now possible to envision the close integration of rich knowledge structures and knowledgebases with digital libraries. Yet, there are many challenges to the implementation of this vision. Chief among these is finding comprehensive and rigorous, but also flexible, representations. Such representations need to go beyond semantics strictly construed to include discourse, the evolution of knowledge,...
The purpose of this research is to address the issue of diversity in the design world, exposing the need for revising our current paradigms. This study examines current events and data from the tech and creative industry that show a glaring lack of diversity in the field, and explains how this hinders creativity and innovation. This essay pairs theory and evidence to reveal that the best pathway to...
The paper presents results of a research on integration of enterprise data warehouse (EDW) and a master data management (MDM) system. The primary goal was solving a schema evolution problem, and the corner stone of our approach was utilization of a data vault modeling of an integrated meta-model of EDW and MDM as an expansion of a traditional relational database system catalog. The main contributions...
Today, multimedia-based materials are the most significant source of information. The first conference of a series called ‘Multimedia in Education’ was organised in the town of Keszthely, Hungary, more than 21 years ago, in 1995. This series of conferences has been organised annually ever since - by different institutions and at different locations, but with the same professional enthusiasm and effort...
Semantic history slicing solves the problem of extracting changes related to a particular high-level functionality from the software version histories. State-of-the-art techniques combine static program analysis and dynamic execution tracing to infer an over-approximated set of changes that can preserve the functional behaviors captured by a test suite. However, due to the conservative nature of such...
Retention is an issue that has been faced by many engineering colleges due to the difficulties and lack of knowledge about what it really is to be an engineer. The first 3 years of the course are particularly intense and hard. A way to overcome this period might be achieved by implementing a new kind of course, more enticing and dynamic. That is the idea of COPEC's engineering education research team,...
The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin. This article documents, describes, and assesses new evidence about two early multilevel access, time-sharing systems, SDC's Q-32 and NSA's RYE, and outlines its security-related consequences for both...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.