The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Personal assistant agents have various abilities to support the user's tasks in the background. They are expected to be run on laptops, portable devices and even on IoT devices. Since their abilities are sometimes restricted by their running environments and hardware, is not always easy for single personal assistance agent to accomplish all the tasks. This paper presents our design and implementation...
For more than 30 years, research and applied work has been reported on the huge potential of games for learning. This paper presents Bridging Design Prototypes (BDPs) as an approach that could address the remaining challenge of the successful uptake of games in formal learning environments. BDPs are functional prototypes that bring teachers and learners into a development process early: teachers adapt,...
The paper focuses on the problem of the integrated expert systems with the problem-oriented methodology development and the AT-TECHNOLOGY workbench intellectualization problems. Special operational component intelligent planner controls the development process. The intelligent planner uses automated planning technology techniques in its core. The development of integrated expert system is shown as...
In software development processes, diagram editors play an important role. For instance, editors for creating UML diagrams are often used in early stages of software development. Three input methodologies can be distinguished: traditional mode-based editing, sketch-based editing, and gesture-based editing. Most of today's diagram editors are mode-based and use the mouse as an input device. (Multi-)touch...
Modern manufacturing systems based on cyber-physical systems with a growing amount of software allow frequent updates and reconfigurations to adapt the systems to volatile usage scenarios in the production. A diverse system environment arises even for similar or equal subsystems based on the same platform used at different locations. A major challenge for such systems is the regression test after...
The key to succeed in engineering is to master information and the correct use of materials. The learning of the basic concepts of circuit theory, the type of concepts and the form of experimentation, traditionally acquired in educational laboratories, are fundamental and demand new and better tools. The teaching of electric circuit analysis requires students to compare theory and practice of “learning...
Although many open data portals have been publishing numerous datasets on the Web, there is currently no clear standard way to describe dataset usage on the Web, which is not conducive to the healthy development of the open data ecosystem. The W3C Data on the Web Best Practices Working Group is therefore standardizing the Dataset Usage Vocabulary (DUV) for modeling, conveying and sharing dataset usage...
In this contribution, a prototype for semiautomatic computer-aided planning and reconstruction of cranial 3D Implants is presented. The software prototype guides the user through the workflow, beginning with loading and mirroring the patient's head to obtain an initial curvature of the cranial implant. However, naïve mirroring is not sufficient for an implant, because human heads are in general too...
Traditionally, HPC workloads are characterized by different requirements in CPU and memory resources, which in addition vary over time in unpredictable manner. For this reason, HPC system designs, assuming physical co-location of CPU and memory on a single motherboard, strongly limit scalability, while leading to inefficient resources over-provisioning. Also, peripherals available in the system need...
Internet usage is rising at a frenzied rate as knowledge and information sharing becomes easy and time-saving. Regrettably, the visually impaired do not enjoy this liberty and they have difficulties in using the computer and the Internet to obtain any shared and published information. This difficulty is also faced by the visually impaired Bahasa Melayu (BM) language medium Internet users. Existing...
Recent technological advances have accelerated the design and worldwide deployment of mobile payment systems (m-payment). However, m-payment over open devices and networks poses security challenges of a new dimension that users disclose lots of sensitive information and privacy can't be protected properly in open environment. In this paper, we propose a mobile payment architecture employing with trusted...
This paper develops a real-time software written in LabVIEW code to test a novel flight control strategy for a spherical blimp. Such a blimp will have an spherical hull filled with helium. Four tetrahedrally-arranged driving units (DU) were designed and constructed, with each DU having a thruster with propeller with the ability to rotate, due to the action of a DC servomotor. Such DU will be mounted...
Deviations are known as unexpected situations that could arise during Software Process (SP) enactment. They are the difference between what is expected and what is carried out in real world. Experience has shown that the appearance of such situations is unescapable, especially within large software development projects. Moreover, their occurrence often leads to software development failure if they...
Reverse unknown protocol's hidden behavior has played an important role in the field of network security. The proposed work takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the...
Based on core point evolution using water ripplemodel, the thought of software development methodology is thatthe development of a complex system is translated into the waterripple sustainable evolution of core point. However, the corepoint is defined from three levels, which are domain, feature andfunction. And it does not give a general definition of the corepoint. In addition, the evolution of...
This paper introduces new online tools to create fuzzy color spaces and share them with researchers in computational color modeling. Fuzzy color spaces, which are able to fill the semantic gap between the color representation in computers and the subjective human perception, are built according to an approach proposed by the authors in previous works. The methodology for building fuzzy color spaces...
This paper presents a software prototype of a personal digital assistant 2.0. Based on soft computing methods and cognitive computing this mobile application prototype improves calendar and mobility management in cognitive cities. Applying fuzzy cognitive maps and temporal algebra, the prototype represents a next step towards the realization of cognitive cities (i.e., smart cities enhanced with cognition)...
Implementation times for moderate to large designs targeting FPGAs can be formidable. When FPGA compile times exceed that of a typical software compile time, virtual prototyping environments become increasingly attractive. Virtual prototyping environments, however, are limited in their ability to capture and operate on live data, sometimes exhibit behavior mismatches between the modeled, and implemented...
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting of both SDN and legacy switches may be a tradeoff. Nevertheless most of the current SDN control planes can not handle legacy switches. To overcome this problem, we present HybridFlow,...
As an excellent underwater biorobotics, robotic fish has got considerable development in recent decades. However the majority of researches assume that the flow field where the fish swims is a steady one, ignoring the fact that fish in nature has to deal with diverse flow fields. This takes part of responsibility for the low efficiency of robotic fish comparing with live one. In this paper, we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.