The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Accurate measurement of the quality of systems is crucial to building trustworthy systems. Such a measurement indicates whether a system is working properly and meeting its requirements. Although security and dependability metrics are regarded as key metrics for measuring the quality of systems, they are not sufficient for measuring the quality of systems that are placed in a multi-domain environment...
The Government of India has undertaken large number of initiatives to improve delivery of public services and simplify the process of accessing them. Electronic Transaction Aggregation & Analysis Layer (eTaal), URL: http://etaal.gov.in, has been developed by Department of Electronics and Information Technology (DeitY) and National Informatics Centre (NIC) to provide an aggregated view of e-Transactions...
Stories about service outages in cloud environments have been making the headlines recently. In many cases, the reliability of cloud infrastructure Application Programming Interfaces (APIs) were at fault. Hence, understanding the factors affecting the reliability of these APIs is important to improve the availability of cloud services. In this study, we mined bugs of 25 modules within the 5 most important...
Deregulation and the massive growth of Distributed Generation (DG) in distribution networks are forcing the network operators to improve the operational efficiency and power quality at the distribution level. Distribution Automation (DA) enables operators to monitor and control various distribution system components and thus decrease the restoration time after a fault occurs. To implement DA properly,...
Precisely estimating the pose of an agent in a global reference frame is a crucial goal that unlocks a multitude of robotic applications, including autonomous navigation and collaboration. In order to achieve this, current state-of-the-art localization approaches collect data provided by one or more agents and create a single, consistent localization map, maintained over time. However, with the introduction...
On-line questionnaires are today widely used for various tasks, from census data collection to knowledge testing in job interviews. However, there is currently no automated system that can help us decide if the answers from the questionnaires are reliable or estimate how reliable the are. Deception is a part of everyday human behavior and deception is also present when answering on-line questionnaires...
In ad hoc networks, terminals form a network with decentralized and self-organizing manners. Although this can surely extend its potentials, it also suffers from unstable and unreliable communication environments. As concerns this, a broadcast-based routing protocol called opportunistic routing (OR) has been proposed. ORs do not establish any specific route from a source terminal to a destination...
This paper investigates reliable answers to the following proposed research questions: Will changing course contents and difficulty levels affect the achievement of course intended learning outcomes and the levels of students' success? Detailed analyses and findings of a proposed course assessment framework that primarily uses direct assessment techniques are presented. Two online courses are compared,...
With increasing critical business organizations focusing on the quality of service in cloud applications, high availability (HA) has become critical for the product level cluster of cloud applications. Existing availability evaluation methods or testing projects for cloud platforms, however, cannot sufficiently verify cluster tolerance to various reasonable environmental faults. This paper proposes...
The design of path allegiance metric (PAM) based routing protocol leverages upon a trust management framework proposed in our earlier works. The PAM routing protocol strives to provide data plane security in mobile ad hoc network and its working is based upon the belief, disbelief and uncertainty components of the trust management framework which assigns a trust metric based upon the packet forwarding...
The paper proposes a method of constructing solutions based on the experience represented by cartographic images — centers and transformations of situations that do not change their meaning. The method is based on the metatransformation of images. The goal of metatransformation is to construct new situations by known precedents. The usage of metatransformations allows to evaluate the semantic proximity...
Objective of the paper is to evaluate metrics of automatic evaluation of machine translation output using manual metrics — fluency and adequacy. We tried to answer the question to which extent the manual evaluation correlates with the automatic evaluation of MT output from/to Slovak to/from English. We focused on metrics based on the similarity and statistical principles (WER, PER, CDER and BLEU-n)...
Performance represents the completion of activities, programs, or policies to achieve the objectives, visions, and missions of organizations. The National Library of Indonesia is a government organization which provides public services. To improve its functions, the National Library established Electronic Library (E-Library) toward Information and Communication Technology (ICT) infrastructure aspect...
Cyber-physical system integrity requires both hardware and software security. Many of the cyber attacks are successful as they are designed to selectively target a specific hardware or software component in an embedded system and trigger its failure. Existing security measures also use attack vector models and isolate the malicious component as a counter-measure. Isolated security primitives do not...
This paper presents a distributed on-line test mechanism that detects stuck-at faults (SAFs) in the channels as well as identifies the faulty channel-wires in an on-chip network (NoC). The proposed test mechanism improves yield and reliability of NoCs at the cost of few test clocks and small performance degradation. Additionally, the mechanism is scalable to large-scale NoCs. We study the impact of...
In order to improve the reliability of the status perception, this paper defines a metric QoSTD to measure the quality of the subjectively labelled training data used with K-means clustering. On the basis of QoSTD, we propose a method that utilizes a support vector support (SVM) model to predict the specified states of an individual's status. We also present a way to determine a threshold for QoSTD...
In this paper we propose a methodology to build a dashboard for hospital medicines supply chain. This methodology, which we have called OPRI, is based on SCOR Model and ARIS and risk analysis.
The process of testing any software system is an atrocious task which indeed consumes a ton of effort, and expensive also. Required effort and time to do adequate as well as effective testing get bigger, as the software gets more complexed that can lead to swarm over the project budget or some test cases left uncovered or delay in completion. A suitably generated test suite does not only locate errors...
Component-Based Software Development involves integration of many different self-contained units of software that perform a specific task known as software components with the existing software components as plug-ins which can be used again and again. The present crisis in the software development forces on development of the reusable components which build once can be reused when and where ever required...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.