Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Avionics systems, along with their internal hardware and software components interfaces, must be well defined and specified (e.g., unambiguous, complete, verifiable, consistent, and traceable specification). Such a specification is usually written in the form of an Interface Control Document (ICD), and represents the cornerstone of the avionics system integration activities. However, there is no commonly...
The Model-Driven Architecture (MDA) is based on an understanding of a hierarchy of levels that are placed on top of each other and that are connected with instantiation. For practical MDA use, it is important to be clear about the kinds of objects that reside on the different levels and the relations between them as well as relations to objects outside of the MDA domain. This article aims at enhancing...
The article treats with the integration of an elaborate Lexicon Extended Language which is denoted all in the interconnected reuse process. The eLEL is a lexicon rich in information and allows to describe a software component such as: its identification, its notion, its behavior and its different characteristic. From this lexicon, we proposed a reused environment that included three processes, namely...
We present a simple, yet realistic, agent-based model of an electricity market. The proposed model combines the spot and balancing markets with a resolution of one minute, which enables a more accurate depiction of the physical properties of the power grid. As a test, we compare the results obtained from our simulation to data from Nord Pool.
There has been a recent rapid increase in the number of Internet of Things (IoT) devices, providing a wide range of services for smart homes such as surveillance cameras, smart lighting, and door locks that can be remotely accessed and controlled. User mobility makes static security mechanisms, such as usernames and passwords, tedious to use. In this paper, we introduce a context-aware authentication...
Authentication is one of the essential mechanism of a typical security model. It identifies the user legitimacy accessing any service over the network. Authentication can usually be done by a simple single-factor authentication method such as a password. Unfortunately, it is inadequate to ensure security when accessing variant resources and services across the Internet. Therefore, for users to authenticate...
Suppose that we are able to obtain binary paired comparisons of the form “x is closer to p than to q” for various choices of vectors p and q. Such observations arise in a variety of contexts, including nonmetric multidimensional scaling, unfolding, and ranking problems, often because they provide a powerful and flexible model of preference. In this paper we give a theoretical bound for how well we...
At the current time, there are several fundamental changes in the way computing systems are being developed, deployed and used. They are becoming increasingly large, heterogeneous, uncertain, dynamic and decentralised. These complexities lead to behaviours during run time that are difficult to understand or predict. One vision for how to rise to this challenge is to endow computing systems with increased...
The need to utilize English in daily international communications within broad settings, such as business and academia, is accelerated by Information and Communications Technologies (ICT) and internationalisation. Internationalisation introduces the increased need (through ICT) to communicate through a common language (global language) and English has evolved into such a ‘global language’. Students...
The feedback interconnection of two systems written in terms of Chen-Fliess series can be described explicitly in terms of the antipode of the output feedback Hopf algebra. At present, there are four known computational approaches to calculating this antipode. The main goal of this paper is to compare the computational performances of the three latest methods, two coproduct recursion methods and the...
Social context is important to a variety of significant applications such as business intelligence, public security and epidemic. For example, companies can refine the advertisement strategy by targeting the influential people within the social group. Social context modelling and recognition is an emerging research area which aims to infer the information that characterizes multiple users such as...
Testing of product is perform to discover or detect the errors and defects in the developed system. But testing is usually time consuming especially when complex projects are canvass. Testing of a product lead off with generation of test cases. The Test case generation are based on three parts coding, design and specification. The Specification based testing deals with generation of test cases from...
Recent device shipment trends strongly indicate that the number of Web-enabled devices other than PCs and smart phones are growing rapidly. Marking the end of the dominant era of these two traditional device categories, people will soon commonly use various types of Internet-connected devices in their daily lives, where no single device will dominate. Since today's devices are mostly standalone and...
Assessing and comparing computer systems under changing contexts is becoming crucial due to the dynamic characteristics of modern computing environments. This is especially relevant for database management systems, as the behavior of the DBMS when immersed in today's volatile environments is determinant for the success of a multitude of commercial, industrial and scientific endeavors. This paper presents...
In blended learning, learners' interest is closely related to whether they can successfully finish their studies. In order to study on learners' interest, we adopt situated cognition theory as the theoretical basis, and carried out data mining for learners' online behaviors, as well as the analysis of brain cognitive experiment data. Then brain mechanism for context learning interest and online operation...
This paper presents a classroom research study that studied the effect of giving the students of a Digital Logic course the chance to retake all exams except the final. Each exam is designed to match a single learning outcome of the course. The theoretical background that the study is based upon is the Metacognitive Awareness Framework. We are reporting that the effort that the Faculty and teaching...
Learning Analytics is the measurement, analysis, and reporting of data about learners and their contexts, for the purposes of understanding and optimizing learning and the environments in which it occurs. Civitas Learning has created a suite of learning analytics tools and employed early versions of this software at Valencia College in Orlando, Florida. We explore the use of this tool in three instructors'...
In past decade, the problem of traffic has become severe due to industrialization especially in big cities. Hence, the urban population has to invest much valuable time during traveling.
We address for the first time the question of how networked agents can collaboratively fit a Morozov-regularized linear model when each agent knows a summand of the regression data. This question generalizes previously studied data-splitting scenarios, which require that the data be partitioned among the agents. To answer the question, we introduce a class of network-structured problems, which contains...
In human history, the dependency on secret phrases - passwords - known to only a selected few in a group has mostly ensured that only those are authorised to access certain resources or information. However, such passwords have also spelled disasters when compromised. Beyond passwords, multi-factor authentication requires the knowledge of or the possession of things other than a password to complete...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.