The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
AdLocus is an APP developed by HyXen Company for mobile advertisements. This advertising software can push the message to the target users within specified locations. Based on the real big data provided by AdLocus, we design a dynamic advertisements recommendation system to increase the advertising efficiency. The proposed method uses the regression models and the click probability to recommend the...
The improvement of pattern matching algorithm is a key to improve the efficiency of network intrusion detection. Firstly, this thesis analyzes the current mainstream of single mode and multi-mode matching algorithm; then an improved multi-mode matching KR-BM2 algorithm based on KR algorithm and BM2 algorithm is proposed. BM2 algorithm using dual characters determines to move distance of the pattern...
Critical value reporting is crucial to patient care in the hospital setting, but some normal or non-critical values are valuable to clinical decision making as well. We designed a system that allows providers to subscribe to electronic notifications of laboratory results to improve workflow and potentially patient care.
As the maker movement has introduced children and adults to learning by making, researchers have begun to explore different approaches to learning by making and ways that participants take up new fabrication techniques. This work examines instruction in a making activity as a way to scaffold learning in a making activity. University students are introduced to a new-to-them fabrication technique using...
Mutation testing is considered as one of the most powerful testing methods. It operates by asking testers to design tests that reveal a set of mutants, which are purpose-made injected defects. Evidently, the strength of the method strongly depends on the used mutants. However, this dependence raises concerns regarding the mutation testing practice that is implemented by existing tools. Thus, it is...
Systems engineering activities provide an opportunity for pre-college students to engage in sophisticated engineering design practices beyond commonly-accepted limits of their capability. This research qualitatively investigates how pre-college students engaged in a systems engineering activity using LEGO EV3 robotics with three learning objectives: 1) a system can be decomposed into subsystems, 2)...
The purpose of this paper is to evaluate the effectiveness of Al-Quran learning courseware for toddler. The toddles were giving Arabic courseware that consists of seven Arabic singular characters (hijaiyah) with upper stroke (fathah). The toddlers were evaluated in recognizing the Arabic characters with upper stroke by implementing Al-Furqan learning technique. The Arabic courseware was developed...
The assessment, which is together with motivation, explanation, fixing and applying the new knowledge, an important part of the process of instruction, is not paid enough attention from the teachers' side as it definitely deserves. Teachers are making strong efforts to create the same conditions and apply identical criteria to all learners. This approach seems to be fair. However, in reality it is...
Web service composition is aimed to compose new web service form to respond the goal of business process. The web service selection brings to consider accurate and reliability composition. Mostly a web service is exist tested quality of service (QoS) that is called non-functional testing described time, availability and cost. However, the web services composition need to meet the business requirement...
Information and data are increasing and has rapid growth as we now are in big data era. Database management system becomes a major part of data centers. This paper compared the performance of an open source database management system between MySQL and MariaDB. The testing environment is Xen 4.4 virtual machine using OLTP-Simple and OLTP-Seats as the benchmark data. Our experiment results show that...
In this paper, a new score level fusion approach is proposed. It is based on Differential Evolution (DE) technique and Proportional Conflict Redistribution fusion rule. DE technique is used to find the best confidence factors of the belief assignments of the different modalities. The fusion of the weighted belief assignments is then performed by Proportional Conflict Redistribution combination rule...
Theory exploration has been investigated as the lemma generation methods which play important role in automation of theorem provers. In order to enlarge the scope of provable theorems in the exploration, in this paper we propose an approach of applying the rewriting induction technique in exploration of inductive theorems. Especially, we propose some heuristics for proof search in the rewriting induction...
Computed tomography (CT) is widely used during diagnosis and treatment of Non-Small Cell Lung Cancer (NSCLC). Current computer-aided diagnosis (CAD) models, designed for the classification of malignant and benign nodules, use image features, selected by feature selectors, for making a decision. In this paper, we investigate automated selection of different image features informed by different nodule...
In this paper, we present a system to recognize text in traffic signs, along with its context based recognition result corrections that we developed. This system detects text in traffic signs region using contour detection and using KNN Classifier to recognize letters in it. The result of the recognitions that may contain errors will be corrected using Forward Reverse Dictionary that has Contextual...
Brain-Computer Interfaces (BCIs) are trained to distinguish between two (or more) mental states, e.g., left and right hand motor imagery, from the recorded brain signals. Common Spatial Patterns (CSP) is a popular method to optimally separate data from two motor imagery tasks under the assumption of an unimodal class distribution. In out of lab environments where users are distracted by additional...
This paper presents a distributed on-line test mechanism that detects stuck-at faults (SAFs) in the channels as well as identifies the faulty channel-wires in an on-chip network (NoC). The proposed test mechanism improves yield and reliability of NoCs at the cost of few test clocks and small performance degradation. Additionally, the mechanism is scalable to large-scale NoCs. We study the impact of...
A well defined testing strategy is essential for any software development project. Testing efforts need to be carefully planed and executed in order to ensure effectiveness. Programming failures can represent a high risk for business. In order to mitigate such risk, companies have been increasingly investing more resources on software testing.
Classification involves the learning of the mapping function that associates input samples to corresponding target label. There are two major categories of classification problems: Single-label classification and Multi-label classification. Traditional binary and multi-class classifications are sub-categories of single-label classification. Several classifiers are developed for binary, multi-class...
We consider the challenge of testing lane centering ADAS control systems using a differential global positioning system localization strategy. Rather than constructing test scenarios using lane line markers or driving test vehicles on public roads, we develop a testing framework that can be used in both simulation and on open test surfaces with no lane demarcation. The primary sensor we leverage is...
Software development organizations often need to balance productivity and sustainability. To keep this balance, attention needs to be given as to why defects are re-assigned. This paper presents an empirical study to explore the causal relationships, other than probabilistic dependencies, between re-assigned/fixed defects and defect attributes: (i) Priority, (ii) Severity, (iii) Density, and (iv)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.