The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper deals with the processing of information on the state of a computer system using probabilistic automata. An intelligent system model for the detection and classification of malicious software is proposed which compares a set of features that are characteristic for different classes of viruses with multiple states of the machine. The analysis process is reduced to the modeling of the automaton...
An underground wireless attendance system is designed based on radio frequency identification and wireless sensor network technology. The advantages of wireless sensor network have been applied in the attendance system, mainly solving the problems of wiring complexity and error-prone information collection, among other issues in the current attendance system. This system consists of radio frequency...
This paper reports on an investigation into perceptions of international university lecturers and their concerns about students' social and academic motivation for learning in online learning environments. The study results suggest that pedagogic lurking is a widespread phenomenon, with some perceiving it as problematic and others as a step towards more active participation. Most interestingly, there...
Line, a kind of Instant Messenger, has become one of the popular communication tools for modern people. “Ignoring read messages” which means the recipients keep silent after they read the messages sent by the senders have caused poor communication between romantic lovers and further led the devastation of their romantic relationships. This study forms a unique framework representing the factors affecting...
TreeBank is a crucial resource for syntactic parsing. But syntactic labeling and error checking for treebank is time and energy consuming. To improve the efficiency in constructing treebanks, we have designed and realized a treebank editing system based on a graphical interface. And this graphical treebank editing system is proved to be 5 times faster than error checking on bracket marked syntactic...
Bipolar information including positive information and negative information is an essential feature in information processing, positive information means that it is possible or preferential and negative information means that it is impossible or forbidden. This paper mainly discusses the mathematical characterization of bipolar information aggregation and decomposition. Firstly, some algebraic operators...
Heterogeneous rectangular dissections are frequently used in information processing such as multiple paged books in spread sheet languages and multi-layer image data. In previous studies, a hexadecimal grid graph model was proposed for multilayer rectangular dissections and certain algorithms were provided. In this paper, we propose a 16-ary list structure to implement their algorithms for the hexadecimal...
People agree that there are two major concerns in Internet computing: Big Data and the Internet of Things (IoT). On purpose, expected evolutions and progresses in technology and science are ruled by the development of suited paradigms (e.g., plug & play middleware for the IoT or MapReduce for Big Data) to face up this “ever encountered” nature of Internet computing. To that extent, information...
In this paper, we develop a new approach to deal with neutrosphic shortest path problem in a network in which each edge weight (or length) is represented as triangular fuzzy neutrosophic number. The proposed algorithm also gives the shortest path length from source node to destination node using ranking function. Finally, an illustrative example is also included to demonstrate our proposed approach.
Popularity of open source software (OSS) projects has spiked an interest in the requirements engineering (RE) practices of such communities that are starkly different from those in traditional software development projects. Past work has focused on characterizing the main differences between OSS and traditional forms of software RE. In this effort we focus on differences in RE activity in OSS. RE...
Organizations make significant investments in enterprise-wide system development -- also known as enterprise resource planning (ERP). Yet success in such endeavors remains elusive. To improve success rates, companies have deployed executive steering committees to govern these initiatives. Still, scholars and practitioners have an incomplete understanding of what makes these committees successful....
In the European and American advanced, it's being common sense to develop software offshore at a developing country in Asia. Since putting it in our country, but English operational capability is being short, is developing it dilatorily offshore and isn't advancing. The foreigner student studying abroad who will learn at a university in our country later is the session of information processing when...
Knowledge sharing is important for Software Engineers because software is purely based on individual's knowledge and one of the sources to learn new knowledge is through sharing. Although Software Engineering is a growing field, however research done in this profession is still not mature. One of the areas, which have not been thoroughly investigated in this profession, is working environment and...
The paper presents an analysis of the ineffectiveness of the information and computer technologies (ICT) used by Russian enterprises. A capability based approach is proposed to improve this situation. The approach is focused on establishing a close and direct link from enterprise capabilities and values to ICT systems. The approach comprises: • A set of 9 universal capabilities, which are mandatory...
The paper deals with the general principles of data collection and analysis of geographic information - analytical system magnetotelluric geodynamic monitoring. The generalized structure of information processing of signals is offered. As investigated signals are the registered components of the natural electromagnetic field of the Earth in the ultralow-frequency range.
There are many online communities with member-generated and openly available multimedia content. Their success depends on having active contributing users and on producing useful content. With this criterion, the community of sound practitioners that has emerged in Freesound is a successful case of interest to be studied. But to understand it and support it further we need an appropriate analysis...
In order to solve the problems of the financial reporting system based on value chain accounting, we introduces the eXtensible Business Reporting Language(XBRL), the XBRL technology which is based on XML, mainly used in the standardization of business information processing, value chain-accounting research on the enterprise value information and its deep-rooted relations behind. As the ultimate outcome...
Software needs to be delivered well in time and within budgets. One way of doing this is performing incremental delivery of the software with each increment being adding new features along with changes requests. This incremental delivery is supported with requirement prioritization and needs to be tested for checking the reliability and quality. Testing of this increment calls for testing of not only...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.