The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The color-word Stroop paradigm is a neuropsychological test often employed for the evaluation of the cognitive processing when a conflict between different attributes of the same visual stimulus is present. In clinical environments, the standard practice for the Stroop test administration is still based on paper supports and stopwatches. Thus, the aim of the present pilot study was to investigate...
This paper presents a new polyhedral approximation for the quadratic cost curve of thermal units for the unit commitment problem. The approximation is tight, can be represented by rational numbers, and its size grows logarithmically with respect to the required precision. In addition, the scalability is improved compared to the direct resolution of the quadratic problem involved, due to the linear...
Complex software appliances can be deployed on hardware with limited available computational resources. This computational boundary puts an additional constraint on software applications. This can be an issue for real-time applications with a fixed time constraint such as low delay video encoding. In the context of High Efficiency Video Coding (HEVC), a limited number of publications have focused...
To increase work efficiency of administration transaction, we have designed the Information-based management system of CHS. The system includes four subsidiary systems: The administration management handing system, evaluating system, searching system and statistics analytical system. The administration management handling system includes the application system of the CHS station(center), the examine...
Based on the analytic network process approach (ANP), a new evaluation method is using for college teaching, namely EM-ANP, is proposed in this paper. Compared with evaluation approaches of traditional college teaching, ES-ANP includes two kinds of steering group criteria and student criteria, and the interdependent relationship between two criteria. The conclusion shows that this kind of teaching...
To facilitate the sharing and combination of knowledge by Global Software Engineering (GSE) researchers and practitioners, the need for a common terminology and knowledge classification scheme has been identified, and as a consequence, a taxonomy and an extension were proposed. In addition, one systematic literature review and a survey on respectively the state of the art and practice of effort estimation...
Professional software products and IT systems and services today are developed mostly by globally distributed teams, projects, and companies. Successfully orchestrating Global Software Engineering (GSE) has become the major success factor both for organizations and practitioners. Yet, more than a half of all distributed projects does not achieve the intended objectives and is canceled. This paper...
This paper compares the Flexibility and Maintainability factors on open source Learning Management System (LMS) Moodle, Atutor, and ILIAS. This comparison is aimed to find out which LMS has the value maintainability and better flexibility in order to be used by agencies to consider implementation of LMS as well as useful for software developers to provide an overview of the capabilities of the source...
In the field of information security, risk assessment is the core of the risk management and control. This paper proposes a security risk assessment method based on threat analysis combined with AHP and entropy weight. This method has features that are suitable for website such as practical, easy operative and independent. And the AHP and entropy weight make the evaluation results more objective....
Embedded applications use more and more sophisticated computations. These computations can integrate composition of elementary functions and can easily be approximated by polynomials. Indeed, polynomial approximation methods allow to find a trade-off between accuracy and computation time. Software implementation of polynomial approximation in fixed-point processors is considered in this paper. To...
Scientific and accurate cultivated quality grade results are an important guarantee for applications. However, the phenomenon of abnormal cultivated land quality is always occurred due to the error of investigation or computation, so exploring effective method to inspect abnormal data of the grade results is an important problem to be solved. Cultivated land quality grade results of Wuhan Hannan district...
In this paper a new vulnerability detecting method is proposed to detect buffer boundary violations. The main idea is to use the metric of array index manipulation rather than using any heuristic method. We employ a SVM-based classifier to classify the vulnerable functions and innocent functions. Then the vulnerable functions are fed to function call graph guided symbolic execution to precisely determine...
Ternary content addressable memories (TCAMs) are special memories which are widely used in high-speed network applications such as routers, firewalls, and network address translators. In high-reliability network applications such as aerospace and defense systems, soft-error tolerant TCAMs are indispensable to prevent data corruption or faults caused by radiation. This paper proposes a novel soft-error...
Major problem of heavily loaded system is, transmission networks are operating close to their limit which causes increase in stress on transmission lines. This problem was solved by the addition of isolated and individually controlled devices such as FACTS to the existing networks. This paper focuses on FACTS device-TCSC (Thyristor Controlled Series Capacitor) and its optimal location in the power...
The present study focuses an optimal modeling of an integrated renewable energy system by considering locally available different renewable energy sources namely micro hydro, solar, wind, biomass and biogas. Three decision variables, namely total active area of the PV panels, total swept area of wind turbine blades and state of charge (SOC) of battery system have been considered for optimization of...
In the Scrum process, Product Backlog consists of a prioritized list of desired software functionalities recorded in the form of user stories. As the software product is developed, new functionalities are discovered and included in the Product Backlog. However, in large-scale projects, duplicate stories may arise because of the large number of generated stories, the lack of communication among team...
Given the growing request for reusing raw material in new manufactured products in the plastics industry, the present study analyzes the effect of the concentration of recycled materials and pigments on the rheological properties of the polymer blend. It was quantified and analyzed in a statistical way the significance of the effects that these components produce in the rheological properties, such...
The paper describes the testing of an obstacle-detection radar installed on the steerable head of a Horizontal Directional Drilling (HDD) equipment; the system was developed during the ORFEUS (Operational Radar For Every drill string Under the Street) project co-funded by the European Commission under the 7th Framework programme. HDD is a trenchless method of installing pipes and cables of various...
This paper proposes a cost-effective index poisoning scheme for unstructured Peer-to-Peer (P2P) file sharing systems. Index poisoning is a technique which alters the index of illegal shared files so that they could not be reached by any peer which wishes to access them through the P2P. The proposed scheme is a combination of the following three periodical injections of the altered index: 1) injection...
The shares are considered as a fundamental part of the equity market, as their values change over time as a result of offer and demand, and the effect of market volatility. This volatility makes the trading of shares on a stock exchange is an extremely difficult task. That is why in this article develops and analyzes a system for automatic trading shares, which incorporates a series of progressive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.