The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In conventional echo stat network (ESN), the reservoir are randomly generated, then the spectral radius of the reservoir is scaled to lower than 1. In this method, only the necessary condition for echo state property (ESP) of ESN is satisfied while the sufficient condition is ignored, thus the ESN stability may not be ensured. In this paper, with the predefined singular values (smaller than 1), the...
Hadith is the second source of Islamic law after Qur'an and an explanation of verses of the Qur'an. Today, there are many hadiths that appear and that are doubtful of its authenticity. The number of hadits that are doubtful of its authenticity or so-called dhaif and maudhu hadith can lead to errors in the determination of Islamic law for everyday life. The classification of hadith is required to know...
Employing the Theory of Planned Behavior (TPB), this study aims to find determinant factors that have influence over individuals' intention to cyberbully others. Using a scenario-based questionnaire, the data were collected from 96 students in Universiti Teknologi Malaysia. According to the results, only subjective norms reflected to be significant over cyberbullying intention, while the rest of variables...
“To be considered for the 2017 IEEE Jack Keil Wolf ISIT Student Paper Award.” We study the asymptotic behavior of the type-I error in quantum hypothesis testing when the exponent of the type-II error approaches the quantum relative entropy sufficiently slowly. Our result shows that the moderate deviation principle holds for the testing problem if the quantum relative variance is positive. Our proof...
With the rapid development of Internet and information technology, information literacy has become an essential skill in the information society. China pays great attention to the development of information literacy of primary and secondary students. Nowadays, many countries have developed authoritative assessment scale, however, most of them only use it as a testing tool but fail to have real effects...
Regression testing is a process used to measure the validity of the system during software maintenance. Regression testing process is very expensive and must be introduced each time a modification occurs in software to ensure that the system still work and that the new modification doesn't cause any bugs, this process depends on selecting test cases from a test suite. Selection of test cases is very...
Technology nowadays has grown rapidly and has led to the widespread use of technology in every sector that exists throughout the world whether in agriculture, business, research or education. Previous studies have shown lack of approach in Mobile Augmented Reality (MAR) based application specifically in Arabic language education. The main objective of this work is to develop a MAR application (ARabic)...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
With the dramatic increase in the number of software security problems, a growing body of research in how to integrate security within software development is notable. Many security approaches have appeared to solve security problems by applying a set of activities through Software Development Life Cycle (SDLC). Among the top approaches are McGraw's Touchpoints, Comprehensive Lightweight Application...
Software defect localization is an important step in the process of fixing defects and is a necessary means to improve software quality. In the process of fixing defects, it is also the most time-consuming and laborious task to accurately locate the files where the defects should be fixed. In order to clarify the research progress in the field of defect localization, we introduce the key technologies...
This paper develops a new combination model incorporating three excellent classification algorithms to solve the bank customer credit rating problem. Computational results on well-known credit records from German, Australian, Chinese and Japan banks show that, compared with other state-of-the-art classification algorithms, the proposed algorithm has higher efficiency and better evaluation results...
With the rapid development of information security technology, Network Based Intrusion Protecting Devices(NIPD), like firewall and NIDS, holding the function of detecting and blocking network attacks, have become the primary security guard of critical information infrastructure, significantly reduced the security threat of network attack. Regarding these features, attackers are continuously pursuing...
The problem of detecting an anomalous process over multiple processes is considered. We consider a composite hypothesis case, in which the measurements drawn when observing a process follow a common distribution parameterized by an unknown parameter (vector). The unknown parameter belongs to one of two disjoint parameter spaces, depending on whether the process is normal or abnormal. The objective...
The design of rules governing the behaviour of a follower in a leader-follower system is a non-trivial task. In this paper, we investigate three Boids-like behavioural rules: alignment, attraction and separation. We systematically design and investigate the impact of different reward functions on the three behaviours using evolutionary computation methods. A Learning Classifier System initially starting...
Nowadays, Information Technology (IT) has been widely used by government organization in many aspects, especially in providing public services. Various researches proved that the use of IT in government sector can improve the public value. The purpose of this study is to develop IT public value model for measuring IT performance in government organization. The model will be tested using confirmatory...
Non-communicable Diseases (NCD) has become a worldwide problem. In 2012, 38 million or approximately 68% of deaths in the world are caused by NCD. The impacts caused by NCD are growing year after year. Physical inactivity is addressed as one of the main factors of NCD. Numerous efforts have been made to suppress its prevalence. Providing active game (exergame) is considered to be one of the most effective...
This study aims to construct a scientific model in estimating effort and cost of software development projects. Use Case Points (UCP) is very important method to estimate the total effort in software development projects. While the technique of Activity-based Costing (ABC) serves as the calculation of costs in each of the activities, especially the allocation of project resources. ABC technique consists...
The architecture of remote Education Resource Center for the students of engineering on the basis of data space is developed. The consolidated data catalog and the query processing schemes in data space are proposed.
The paper is devoted to the problem of the active components (transistors) automated diagnostics on the base of his current-voltage characteristics and passive radio components (resistors) the prediction class by his parameters. The procedure of identification on the neuron nets base for these transistors is proposed. For automated diagnostic of passive radio components, for example, resistors, the...
Pluralistic ignorance (PI) is a common phenomenon, observed in many social settings. It occurs when the majority of a group become non-believer conformist, but mistakenly perceive others to be true conformist. PI takes many forms and leads to a wide variety of social problems, from binge drinking to repressive political regimes and ideologies. Although discussed extensively in the literature, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.