The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Almost every year, Indonesia suffers catastrophic forest fires that has an impact on the shrinking forest land in Indonesia. Hotspot is parameter that can be used as an indicator for forest fires. One of the data mining techniques that can be used to process hotspot data is clustering. Clustering technique is used to obtain interesting patterns so that analysis on the occurrence of hotspots can be...
Cache memories have a huge impact on software's worst-case execution time (WCET). While enabling the seamless use of caches is key to provide the increasing levels of (guaranteed) performance required by automotive software, caches complicate timing analysis. In the context of Measurement-Based Probabilistic Timing Analysis (MBPTA) — a promising technique to ease timing analyis of complex hardware...
At present, most of the software security assessment system can only evaluate the potential impact of a single vulnerability on the system which ignore the impact of the multiple vulnerabilities. Therefore, we introduce the concept of relevance vulnerability pattern and design a relevance vulnerability pattern library taking consider of the potential impact caused by multiple vulnerabilities. After...
In this paper we provide an application to index the didactic resources intended to run in an adaptive learning system, which operates using the Learning styles of Felder-Silverman and according to the recommendations of the differentiated pedagogy, by offering multiple versions of the same learning object. The established application relates on the learning objects designed true to the SCORM standard,...
In a scientific research network, to determine the influence of an academic research, a key is to build and evaluate properties of its cited references or co-author networks. To analyze 18,000 lines of original data from Problem C given in 2014 MCM/ICM (Mathematical Contest In Modeling /Interdisciplinary Contest In Modeling), the Pajek software was used with obtaining a result that correlations among...
Over the years of software development, a vast amount of source code has been accumulated. Many code search tools were proposed to help programmers reuse previously-written code by performing free-text queries over a large-scale codebase. Our experience shows that the accuracy of these code search tools are often unsatisfactory. One major reason is that existing tools lack of query understanding ability...
Question-oriented text retrieval, aka natural language-based text retrieval, has been widely used in software engineering. Earlier work has concluded that questions with the same keywords but different interrogatives (such as how, what) should result in different answers. But what is the difference? How to identify the right answers to a question? In this paper, we propose to investigate the "answer...
Talents soft environment improvement is an important premise of innovation driven strategy implementation. Yangtze River delta is the most developed economic region of China, so talents soft environment researching of this area has a strong regional demonstration effect. Firstly, we establish talents soft environment evaluation system, including four aspects of talents quantitative, talents quality,...
Teaching quality value is the key point in valuing teaching quality in universities. This paper introduces the model design and evaluation index, web design and work flow, etc, and it is combined with Teaching Evaluation System (TES) of the Yuxi Normal University. It can remedy the defects in traditional teaching evaluation. Now the TES has been adopted in practice and the results show that it can...
The problem of animal social behavior estimation has two components: automatically tracking a number of identical objects with a large number of collisions and calculating indexes for behavior description. In this paper a tracking algorithm has been proposed for a sequence of depth images. This algorithm combines detection and tracking methods. The proposed algorithm is highly reliable: in the worst...
This paper presents a framework and empirical analyses for the survey data from 1,678 managers and professionals working in a collaborative environment for Japanese software houses to understand relationships among factors of factor groups; the project manager, project team members, and the organization, which may lead to project success/failures. The results of the research model using SEM show that...
This paper gives an assessment of the applicability of the discretionary, mandatory and role-based access control models for designing the information security subsystem of an electronic master plan (EMP) web-based geographic information system. The use of role-based access control model allowed authors to develop and build original information security subsystem of EMP Web-GIS.
This paper describes the development of information system software for educational institutions ranking. Analysis of the existing mathematical models of educational institutions ranking was conducted; the mathematical apparatus and ranking algorithm of educational institutions on the basis of an integral indicator of quality was proposed; an experimental study of the software was conducted; the architecture...
This research describes the stress annotation process for the two hours of Urdu speech corpus containing 18,640 words and 28,866 syllables to build a natural voice for Text-to-speech (TTS) system. For the stress annotation of speech corpus, two algorithms i.e. phonological and acoustic stress marking algorithms have been tested in comparison to perceptual stress marking. Urdu phonological stress markings...
This research has for goal to propose a model for developing viable electrical generation projects with use of Non-Conventional Renewable Energy, focused on people living in poverty in rural areas to enable and enhance sustainable development. The methodology is based on technique for cross-impact scenarios, applying strategic prospective, as well as non-experimental design without manipulation of...
The objective of this paper is to analyze the technical and economical viability of the insertion of two renewable energy sources in a timber industry. It proposes a hybrid system PV/Wind/Grid, following the concepts of Distributed Generation (DG). It is presented the local energy profile, and the response of the equipment selected for these features. It also presents two case studies that would facilitate...
Reducing the power supply-demand gap and increasing reliability of power supply are the challenges of current energy management. Implementation of smart grid, smart meters and smart metering can be a possible solution for power demand reduction, efficient power supply management, and optimization of management resource usages. Smart meters include sophisticated measurement and calculation hardware,...
Industrie 4.0 requires intelligent self-aware adaptive machines and plants that know their abilities. In this paper, we propose different qualitative and quantitative measures to evaluate reconfiguration abilities of automated production systems in the context of Industrie 4.0. This paper presents first measures to quantify different reconfiguration abilities of automated production systems, using...
Software misconfigurations are responsible for a substantial part of today's system failures, causing about one-quarter of all customer-reported issues. Identifying their root causes can be costly in terms of time and human resources. We present an approach to automatically pinpoint such defects without error reproduction. It uses static analysis to infer the correlation degree between each configuration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.