The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Computational Thinking (CT) conceptual framework is entering its second decade of research yet still lacks a cohesive definition by which the field can coalesce. The lack of clear definition makes assessment tool challenging to formulate, pedagogical efforts difficult to compare, and research difficult to synthesize. This paper looks to operationalize differing definitions of CT enhancing the...
This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. The paper considers the possibility and necessity of using in modern control and training systems with a natural language interface methods and mechanisms, characteristic for knowledge processing systems. This symbiosis assumes the introduction of specialized...
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high entropy physical processes, but this is difficult so pseudorandomness is usually substituted for randomness. We introduce improved complexity randomness tests and use them to judge three pseudorandom bit generators; the AES block cipher (standard, strongly believed to be secure), the Dragon stream cipher...
A Kinect-based feedback system is developed for static balance ability training in this study. It includes three parts: (1) a series of demonstrations of training movements, (2) evaluation of user's gesture, and (3) real time feedback. We tested the feasibility of our feedback system to improve static balance ability with twelve participants. The participants learned and performed three movements...
This paper presents a method for designing of a 5th order Chebyshev LC band-pass filter together with virtual testing using two programming and simulation environments used in engineering: LabVIEW and OrCAD. A good designing of a Chebysev LC band-pass filter assures an attenuation-frequency characteristic with an equal ripple variation (equals minimum and maximum) in the passing band and has a monotonous...
In this paper, a new global time series averaging method is proposed for improving k-means clustering performance for observed signals or time series data. The proposed method is different from most commonly used time series averaging methods, such as pairwise averaging method (PA), nonlinear alignment and averaging filter (NLAAF), prioritized shape averaging (PSA) and dynamic time warping (DTW) barycentre...
Pneumatic circular manipulator is an experimental setup which is designed and developed at Faculty of Technical Sciences in Novi Sad, Serbia. It is controlled via Internet, using CEyeClon platform. The goal of realization of the manipulator is ability of participants to remotely use it as a test bed for testing various types of pneumatic control. Remote participants are mainly students of technical...
Testing of mobile applications becomes more importantas the usage of smartphones increases. Many studiesuse Monkey, a basic testing tool provided by Android. WithMonkey, however, it is hard to replay the behavior of actualusers. In this work, we present a mobile app testing methodthat automatically records and replays user event logs on thesmartphone. From replay testing experiments, we have shownthat...
Program assertions are useful for many program analysis tasks. They are however often missing in practice. In this work, we develop a novel approach for generating likely assertions automatically based on active learning. Our target is complex Java programs which cannot be symbolically executed (yet). Our key idea is to generate candidate assertions based on test cases and then apply active learning...
Remote control of grid tied converters has become important with an increasing number of grid connected energy storage systems. Hence, it is crucial point for utilities to outline the requirements of the communication methods and to find the best communication infrastructure to handle the remotely located converters in a reliable and cost effective manner throughout the operation. The purpose of this...
Extreme Learning machines (ELM) and Support Vector Machines have become two of the most widely used machine learning techniques for both classification and regression problems of recent. However the comparison of both ELM and SVM for classification and regression problems has often caught the attention of several researchers. In this work, an attempt has been made at investigating how SVM and ELM...
To simulate a realistic game server environment, we utilized open source software libraries to create automated players (bots) for the globally renowned online game: Minecraft. The fairly simple design of the Minecraft server as well as its massive development and support community facilitates considerable research and analysis prospects. As such, the goal of our investigation was to emulate and then...
The use of virtual devices in place of physical hardware is increasing in activities such as design, testing and debugging. Yet virtual devices are simply software applications, and like all software they are prone to faults. A full system simulator (FSS), is a class of virtual machine that includes a large set of virtual devices – enough to run the full target software stack. Defects in an FSS virtual...
We report on an approach and associated tool-support for automatically evaluating and grading exercises in Software Engineering courses, by connecting various third-party tools to the online learning platform Moodle. In the case study presented here, the tool was used in several instances of a lecture course to automatically measure the test coverage criteria wrt. the test cases defined by the students...
The Classroom Attentiveness Classification Tool (ClassACT) is a system designed to monitor student attentiveness in a variety of instructional phases within the learning environment: lectures, group work, assessments, etc. By collecting information about the user, the user's environment, and the device itself via the various sensors built in to the tablet, processing the data, and then passing it...
Current techniques for formally verifying circuits implemented in Galois field (GF) arithmetic are limited to those with a known irreducible polynomial P(x). This paper presents a computer algebra based technique that extracts the irreducible polynomial P(x) used in the implementation of a multiplier in GF(2m). The method is based on first extracting a unique polynomial in Galois field of each output...
Testing of product is perform to discover or detect the errors and defects in the developed system. But testing is usually time consuming especially when complex projects are canvass. Testing of a product lead off with generation of test cases. The Test case generation are based on three parts coding, design and specification. The Specification based testing deals with generation of test cases from...
In this paper, we conduct research on the construction and robustness testing of SaaS cloud computing data center based on the MVC design pattern. The SaaS software needs to experience the strict test before the issue. For all this, because is very difficult to forecast in the future all possible network users' to the service condition of SaaS system, therefore is also hard to conduct the completely...
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.