Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Autism is a neurodevelopmental disorder which is not fully curable. However, early intervention can improve the condition of the children which requires early detection of autism. For this purpose, screening tools have been immensely used in developed countries. Whereas in developing countries, people are not getting such benefits. In this paper, a new automated approach, Autism Barta is proposed...
As an important part for business operational, IT must provide services which can support business process in an organization. The ideal condition for this is when IT can give the appropriate services for business and maintain it continually. But in real life, many organizations failed to do this because they even don't know what services they have. A service catalogue is great solution for this problem...
Sensus Ekonomi 2016 (SE2016-Economy Census 2016) which will be held in 2016 is an important and massive activity. Badan Pusat Statistik (BPS-Statistics Indonesia) taking main responsibility needs to arrange strategic and appropriate actions for the success of the event. One of the actions that can be used to support SE2016 implementation is by providing information about progress of SE2016. Therefore...
Data loss, i.e. the unauthorized/unwanted disclosure of data, is a major threat for modern organizations. Data Loss Protection (DLP) solutions in use nowadays, either employ patterns of known attacks (signature-based) or try to find deviations from normal behavior (anomaly-based). While signature-based solutions provide accurate identification of known attacks and, thus, are suitable for the prevention...
Implementation of an MES (Manufacturing Execution System) in a large scale steel plant raises several technical and organizational challenges. Danieli Automation summarizes in this article its experience starting from the initial stages of the project when the overall approach was defined: from dividing the implementation in steps down to analyze the overall architecture and functionalities to be...
This study intends to analyze the design of data warehouse for the lecturer's performance as an effort to quality assurance in evaluate lecturer performance at Faculty of Science and Technology Syarif Hidayatullah State Islamic University. This evaluation have had conducted in every end of semester and in accordance with the principal task of carrying out the Tridharma Perguruan Tinggi which covering...
Web Applications used in various organizations performs different types of operations. The functions of these applications are validated through the testing methods. It becomes necessary for the improvement of the functionality and performing of the web applications. The web database application is tested for the database that is being integrated with the application to validate the quality of the...
Data of any organization increases day by day and emergence of different technologies brings challenge in maintenance and security of data. Data isolation in SaaS application needs a different approach to manage it. It requires a approach which assures isolation with low cost ownership. It should also maintain high quality security mechanism to protect it. New approach different than traditional approaches,...
The Term Big Data Analytics for Security intelligence refers to a process of analyzing and mining large amounts of data (petabytes, exabytes, zettabytes) from different sources including IP address, Emails, log files, information get from other attack investigation and many more. Many of the organization use big data analytics for security intelligence to indentified anomalies, threat, verify alerts...
Over the last 15 years the world as seen a surge in users owning smartphones and electronic devices. People today have smartphones that have the computational capabilities of computers from more than 45 years ago. With the growing populous under this information age, individuals have access to so much data. It is a fantastic time to spread ideas as anyone can reach anybody else over the internet almost...
This paper presents the methodology and its correspondent software conceived by Daimon Engineering to propose the medium voltage distribution system work plan of CELESC. To accomplish this job, a specially designed computer program has been created to take into account several technical variables, according to the type of problem (overcapacity of conductors and voltage drops). As a result of this...
In the actual competitive software industry, software development organizations need a better and formal estimation approaches in order to increase the success rate of software projects. However, currently the estimation approach typically employed in industry is the expert judgment ('experience-based'). Using measures and estimations that continue to be based on researchers' intuition does not contribute...
This paper addresses the progress made by the Association for Computing Machinery (ACM) and the IEEE Computer Society (IEEE-CS) in developing a competency model and curricular guidelines for four-year degree programs in information technology. The authors are members of an international task group representative of academic institutions, industry, and professional organizations. The task group is...
Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible, and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds. In this paper, we explore this scenario to deploy...
In order to recruit appropriate developersfor software projects, it is important to have a clarifiedunderstanding on the practical experience and expertise of eachcandidate. However, traditional resume only shows experiencesclaimed by developers, and very few evidence or informationregarding their actual development activities can be obtained. In this paper, we propose an approach to extract developers'practical...
Organizations are extensively using Identity and Access Management (IAM) systems to manage and control the employees' identity and access privileges. An IAM system acts as a single trusted source of identity and access information. Securing and safeguarding of this sensitive information from malicious insiders and cyber assaults are essential for the successful operation of an organization. Accordingly,...
This paper presents an approach to designing a file manager for speech interfaces. Speech interfaces are those which primarily use speech recognition and synthesis for interacting with the user for input and output. The present system used in various graphical user interface (GUI) operating systems for file managers is based on the 'What you see is what you get' model providing a 'point and click'...
Modern technologies are now the core building stones of efficient and flexible facilities organization. Healthcare centers are the most popular facilities in which information and communication technologies are used for both medical and management issues. This paper proposes a smart healthcare center organization that integrates smart mobile handset devices with the healthcare center intranet for...
Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for exploring peoples' relationship from their personnel information. The first portion focuses on storage structure to store data in Graph database by representing persons as nodes and...
In today's world the massive set of data is generated from different organizations throughout the world. This huge and heterogeneous data is called Big Data. Big Data Analytics offers tremendous insights to different organizations especially in healthcare. The traditional database architectures are not up to the mark to face the challenge with huge data, which is pouring into organizations today,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.