The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The importance of understanding the information technology (IT) adoption process in organizations has been highlighted by many researchers. Information technology adoption at individual or organizational level is a highly researched topic in the IT field. Most literature on IT adoption in organizations is often premised on the assumption that IT investment benefits are always obvious after selecting...
Training simulation is broadly used in military training but not limited. The simulation environment contains so many elements and so many factors affect the result, so an effective and efficient mechanism to help to manage these factors is required. This article firstly listes the elements in the environment, and then builds the object models of all kinds of objects. Based on these object models,...
Digital Game-Based Learning (DGBL) is becoming increasingly prevalent. Its participant-players are in millions and its revenues are in billions of dollars. There is a gap in how effectiveness DGBL software is to encourage students in learning and increase their motivation in learning process. This paper aims to discuss children and teenagers' education with DGBL software and the motivation design...
The mathematical model of development of a collective passion for the Internet among school students is suggested. Analogy with the early stage of the epidemic process is considered as the basis for modeling. The model shows that the interest in the Internet increases over time. The new hobbies propagation can be suggested as an effective counteraction of the excessive passion.
The objective of this work is to investigate high-resolution and high-performance computational methods for the first-principles analysis of in-situ product-level integrated circuit (IC) packages. The novelties and key technical approaches of the proposed work include: (i) a scalable geometry-based domain decomposition (DD) method to conquer the geometric complexity of physical domain, which leads...
The paper discusses the possibility of generation of a set of reusable educational components by means of paradigms of knowledge representation and management, based on contemporary concepts and tools in educational and informational technologies. Definitions of knowledge models such as ontology and characteristics of conception; model of knowledge specification and knowledge expressions by means...
Research of existing forecasting methods of cloud technologies development is given in the paper. Nowadays cloud computing became the most popular subject in the IT sphere and reached their development stage. In order to assess prospects of cloud computing technology's usage it's necessary to have forecasting method of its development in time both for short and long period. Here forecasting result...
As a kind of critical system, safety-critical system is always used for the key areas such as aerospace, national defense, transportation, nuclear energy, health and so on, which require the high security. Due to the inherent defects which caused by the complexity of the organizational structure, and the external threats which caused by the open and dynamic environment, some unexpected results will...
This paper introduces an approach to the design of discrete event simulation experiments aimed at transient performance analysis. Specially in complex, multi-tier applications, the net effects of small delays introduced by buffers, IO operations, communication latency and averaged measurements, may result in significant inertia along the input-output path. In order to bring out these dynamic properties,...
Modern avionics systems benefit a lot from integration which in return increases the system complexity and safety problems. The hazards existed in IMA have been considered from the prospects of resources allocation/ scheduling while the resource process integration is ignored. The existing analysis methods, proposed by the ARP4761, cannot analyze the data interaction problems among functions. The...
There are many risks for computers in network. However most risks can not be solved, managing of risks is appropriate approach to empower the computers. Every developer need to an appropriate approach for managing threaten risks for computers. In this paper, a new approach for risk management base on polling system is presented. Management of risks includes recognition of assets and evaluation of...
Aiming at the problem of low speed in 3D freehand gesture tracking in gesture-oriented 3D human-computer interactive interface, we introduce the visual attention mechanism into the human-computer interaction interface and propose hand gesture tracking algorithm based on distribution of visual attention model. First of all, the change process of the eye sight is accurately tracked using eye tracker...
This study aims to implement fuzzy logic controller using Mamdani and defuzzification method of Centroid, as a controller for train speed. Research methodology employed consists of Modeling, Design, Testing, and Analysis. At Modeling phase, the system is modeled utilizing transfer function model; at Design phase, the system with fuzzy logic controller is designed; at Testing phase, system output is...
In social networking (SNS), the user and the topic are important dimensions of social influence. This article presents a framework of decision-making on SNS topic expanding, named MSNTD [1]. MAS was used in this frame to describe SNS. For a specific topic, agents can get the best way to make the topic expand through active consultation and evaluation. Decision-making process is divided into two stages...
In this paper we propose and implement a methodology for power reduction in digital circuits, closing the gap between conceptual (by designer) and local (by EDA) clock gating. We introduce a new class of coarse grained local clock gating conditions and develop a method for detecting such conditions and formally proving their correctness. The detection of these conditions relies on architecture characterization...
In this paper, we propose a state-based energy/performance model for a given parallel application on multicore computer systems. By quantifying energy consumptions at fine-grained levels, defined as states, we analyze the energy/performance impact by taking into account the application characteristics and energy features of multicore computers. By combining Amdahl's Law with our proposed model, we...
Forwarding messages in opportunistic networks incurs costs for nodes in terms of storage and energy. Some nodes becomes selfish or even malicious. The selfish and malicious behaviors depress the connectivity of opportunistic networks. To tackle this issue, in this paper, we propose CARISON: a community and reputation based incentive scheme for opportunistic networks. CARISON allows every node belongs...
In India cellular communication scenario, the term MNP or Mobile Number Portability is becoming more popular. The mobile operators are forced to adapt the Herbert Spencers theory on Survival of the fittest. MNP allows the customer to transfer their existing number from one mobile network provider to another. Thus, if a customer is dissatisfied by the services provided by a mobile operator the customer...
Software process improvement (SPI) aims to increase the quality of the software products or service. There are many software standers for software process improvement must be implemented during development process to achieve software quality characteristic such as functionality, reliability, efficiency, operability, security and maintainability on the other hand to reduce the development effort. There...
This study investigates performance difference between a new bandrol tracking system designed using Model-View-Controller, Model-View-Presenter and Proxy patterns and the bandrol tracking system which TRT (Turkish Radio Television Corporation) currently uses and which was designed without using the aforementioned design patterns. The study concludes that the use of design patterns increases the testability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.