The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The naming of local variables is usually at the programmer's discretion. Thus, there is a diversity in naming local variables and this may cause variations in the code quality. Many coding conventions say that the name of a local variable can/should be short. This paper focuses on such conventions, and aims to explore the trends of local variables' names in Java and examine if abnormal local variables...
The relevance of the formation of the national digital economy is confirmed by the presence of global trends of digitalization of the international society and the need to preserve digital sovereignty of Russia. The article analyzes the subindexes of the international Networked Readiness Index (NRI) and identifies the factors that have affected Russia's lag in the network readiness rating in order...
The article is devoted to the consideration of qualimetric management methods applied to the process of developing software systems. The main approaches to the construction of qualimetric models allowing evaluating the effectiveness of the implementation of the development processes are considered: an approach based on constructing a structured function of the quality of the system, as well as an...
This paper analyzed the relationship between Networked Readiness Index and Global Competitiveness Index published by the World Economic Forum through regression model. It is verified that the global competitiveness of a country is closely related to its degree of informatization. So in the context of China's “new normal”, keeping rapid development in information technology may help China to keep the...
Over the last several years, Massive Open Online Courses (MOOCs) have received significant coverage in the higher education literature. They are the most recent development in open online distance learning. Thus, the most challenging is designing an accurate method to evaluate and provide feedbacks, especially for open questions (especially Problem Situation), since the high number of learners. To...
Huge amount of data are generated and transmitted over the world each second. Transmitting the data over the network and using the data in the applications create a need to protect this data from unauthorized entities, especially if this data are sensitive or confidential. Many techniques were used to protect the data such as Encryption. Encryption is a very popular technique was used to protect data...
We propose the novel data analysis algorithm which allows to identify exactly the position of a given point as exterior, interior, or boundary relatively to an intersection of the finite number of pattern sets. Due to the special structure of the problem under study, this algorithm can be realized not only by sequential, but also by parallel computing on the basis of appropriate model decomposition.
The characteristics of lead acid batteries are normally affected by several factors such as (discharge depth, the enclitic temperature, battery storage, transportation, and installation, etc.), in turn, affect the design of solar systems. In this work we focused on the battery's performance, cost and shortage factors and their effects on the design. Four types of HOPPECKE battery were chosen in this...
The impact and productivity of researchers are assessed using bibliometric parameters, such as the number of publications and citation analysis. A number of indices exist that use these parameters, but almost all of them overlook citation pattern of the researchers, which results in assigning the same index value to the two different authors with different citation patterns. In this paper, a new index...
Source apportionment is usually tackled with blind Positive/Non-negative Matrix factorization (PMF/NMF) methods. However, the obtained results may be poor due to the dependence between some rows of the second factor. We recently proposed to inform the estimation of this factor using some prior knowledge provided by chemists—some entries are set to some fixed values—and the sum-to-one property of each...
With the development of social network based applications, different service approaches to achieve these applications have emerged. Users' reporting and sharing of their consumption experience can be utilized to rate the quality of different approaches of online services. How to ensure the authenticity of users' reports and identify malicious ones with cheating reports become important issues to achieve...
The effectiveness of a code search engine is reduced when query terms do not represent the information needs properly or terms are ambiguous. As a result, many irrelevant code snippets and software artifacts are retrieved that hinder the developers reusing existing source code. In this paper, a technique named QExpandator is proposed that improves the effectiveness in code search by expanding query...
Automatic bug assignment is an essential activity aiming at assigning bugs to appropriate developers. Existing approaches consider either recent commits or previous bug fixes of developers, leading to recommendation of inexperienced or inactive developers respectively. Considering only one information source leads these approaches to low prediction accuracy. An approach called ERBA is proposed, which...
The usage and improvement of information and communication technologies to enhance public sector services (e-Government) was recognized as an important task for the majority of governments in developed countries. Several countries are working hard to improve their e-Government ranking to support their sustainable development. This study employed several data mining techniques to build models that...
In our report we want to present the results of a survey focusing on the use of interactive whiteboard technology in the subject called technology at primary schools to increase students' motivation in teaching technical subjects. Technology is a very specific subject in primary schools, because it combines the teaching of theoretical information and practical skill practicing. The research was to...
This paper proposes a new version of impact factor. The proposed version penalizes JCR IF by journal self-citations. The penalized IF was experimented on 26 journals from Thomson Scientific JCR for 2013 and compared with the JCR IF. For these journals rank correlation between penalized IF and JCR IF is equal to 0.63.
Circular Extreme learning machine (C-ELM) is the one extended Extreme Learning Machine (ELM). It has the same structure as ELM and Circular Back Propagation (CBP) to make it can mapping both linear and circular decision boundaries. The activation function is the one main point to define the decided boundaries. Many activation functions have been proposed. This paper proposes q-Gaussian activation...
Technical analysis is a method to forecast market price quickly. It has a paradigm which stated that history repeats itself. According to technical analysis theory, historical data is an important variable to predict the future. The previous variables that used to calculate are open, high, low, and close price. There are many technical ways to analyze and predict trends using one kind of pair. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.