The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud providers aim to provide computing services for a wide range of applications, such as web applications, emails, web searches, map reduce jobs. These applications are commonly scheduled to run on multi-purpose clusters that nowadays are becoming larger and more heterogeneous. A major challenge is to efficiently utilize the cluster's available resources, in particular to maximize the machines'...
This paper presents an effective method for improving the accuracy of sleep detection using actigraphic algorithm. We have collected 2 sets of comparative data, wrist movement acceleration and brain wave analysis. In the first mode, we use the acceleration on x-axis as the input of actigraphic algorithm, in imitation of uni-axial accelerometer used in former study. In the second mode, we calculate...
This paper deals with the extremely pertinent problem of web crawling, which is far from trivial considering the magnitude and all-pervasive nature of the World-Wide Web. While numerous AI tools can be used to deal with this task, in this paper we map the problem onto the combinatorially-hard stochastic non-linear fractional knapsack problem, which, in turn, is then solved using Learning Automata...
Motivation is very important in any kind of human activity. This is especially true in the context of learning. Various educational systems therefore try to incorporate elements, which has motivating effects on their users -- learners (students). Increasingly popular in this domain is employing elements of gamification. In our work, we propose specific type of one of the gamification mechanics --...
Refactoring is the process of changing the internal structure of software without changing its external behavior. So far, numerous tools have been proposed on that refactoring support. However, it is difficult for existing refactoring support tools to support consecutively co-occurred refactorings. To alleviate this problem, a tool which supports consecutively co-occurred refactorings is required...
Through the analysis and study of common traffic monitoring methods, Net Eye(referring to the name of the model put forward in the context) traffic monitoring model is put forward. The article expounds its function and the key algorithm, and system implementation by technologies such as WinPcap and so on.
Electronic Health Records (EHR) is very important during Hajj period. This paper investigates a new mechanism that creates sharing platform between Health ministry and Hajj ministry to keep pilgrims health records online by using special devices. This environment will provide preemptive approach to reduce health problems and reducing the time and cost for healthcare delivery. Moreover, this mechanism...
With development of Multicore clusters the taskscheduling problem in heterogeneous cluster has become hot point of research. The method to solve this problem in Cloud computing is virtualization, which can make the heterogeneous nodes being isomorphic and then using MapReduce model for task scheduling in isomorphic nodes. But the approach has some shortcomings: virtualization itself will cause the...
Internet of things (IOT) has become one of the most promising technology of the 21th century. In this paper, we combine the WIFI and global system for mobile communication (GSM) and build a distributing monitor system supporting standard commands for programmable instruments (SCPI), in which the WIFI is used to construct a local communicating network, the GSM is used for long distance communication,...
In all European countries, initiatives are implemented towards promoting the use of Information and Communication Technologies (ICT) in schools. However, the current level of school ICT uptake remains low, due to the interrelation of a wide range of factors, including teachers' ICT competences and strategic school Leadership planning. In this context, there is a need for systems that will facilitate...
Attention Deficit Hyperactivity Disorder (ADHD) is one of the most common psychiatric conditions in childhood. Observation of the behavior of the young person plays a key role in Cognitive-Behavioural (CB) approaches to the treatment of ADHD, but traditional pen and pen-and-paper based methods have a number of disadvantages which inhibit their use in realworld situations. The WHAAM mobile application...
The Information technology (IT) plays a key role in the functioning of the modern era. The evolution of computer is very fast. It improves the efficiency of processing, the capacity of memory and the transmission rate of network. The procurement department will procure the new resources. They did not know that equipment suit any budget because they may not track changes or the development of a computer...
The implementation of the smart grid technology does not follow pre-established rules as it must be built and customized for each company. Each company must choose from a range of applications, devices and vendors the items needed taking into account its organizational and electrical infrastructure as well as the expected technical and economic benefits. Thus, the strategic planning has the aim to...
Attention is currently being paid to the saccade-related electroencephalogram (saccadic EEG) signal to investigate the brain function in saccadic eye movement. The saccadic EEG has researched to achieve a brain computer interface (BCI) based on intention to eye movement. The spike EEG just before eye movements has been confirmed as the characteristic of saccadic EEG. However, other features have not...
In the EC funded GROUND-MED project, a geothermal heat pump has been installed at the University of Oradea for heating and cooling a building used by the Department of Visual Arts. The operation of the system automated and the operating parameters are continuously monitored, the data being transmitted to two servers, one in Athens at the Center for Renewable Energy Sources and Savings (project coordinator),...
Malicious program or malware is a computer program which was written intentionally to harm computing system. Malware protection involves several sub-tasks namely Monitoring, Prevention, Analysis, Detection, Removal and Recovery. This paper proposes a static heuristic based scoring system that gives a maliciousness score to portable executable files. Malicious score can be used at different stage of...
Power System Monitoring is vital for efficient satellite operation. CubeSat power system is designed to tolerate environmental changes and load variations. Since CubeSat is a small satellite, it has severe volume constrains. It is a challenging task to achieve the objectives with minimum number of electronic devices. This project deals with monitoring of power parameters to derive the efficiency of...
Breathing difficulties are common in neonatal patients, and non-contact respiratory monitoring is an area of research which may potentially benefit patients and medical professionals alike by reducing disturbance of the patients by the monitoring system. This paper discusses a range of approaches used in recent years including magnetic, radio, optoelectronic and structured light. We also outline our...
High-dimensional torus networks are becoming common in flagship HPC systems, with five of the top ten systems in June 2014 having networks with more than three dimensions. Although such networks combine performance with scalability at reasonable cost, the challenge of how to achieve optimal performance remains. Tools are needed to help understand how well the traffic is distributed among the many...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.