The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sensus Ekonomi 2016 (SE2016-Economy Census 2016) which will be held in 2016 is an important and massive activity. Badan Pusat Statistik (BPS-Statistics Indonesia) taking main responsibility needs to arrange strategic and appropriate actions for the success of the event. One of the actions that can be used to support SE2016 implementation is by providing information about progress of SE2016. Therefore...
Cloud computing is an emerging technology which enables the cloud users to access the computing resources without having to pay huge capital expenses to scale up the IT infrastructure and reduces the management cost, in both hardware and software. A cloud introduces a resource rich computing model with features such as flexibility, pay per use, elasticity, scalability, and others. In this context,...
In this paper, a complete set of real-time monitoring system of MAA hydrolysis reaction based on WinCC configuration software is designed, which is based on the automatic control system of MAA hydrolysis reaction of Zibo Xinhua Pharmaceutical. And this paper introduces the characteristics of SIEMENS WinCC configuration software, and expounds the structure and functions of the system and the application...
Wireless networks are used to access many services such as Internet banking, e-commerce, eHealth, and from many more systems that relay sensitive information. To connect to a wireless network a user needs to be authenticated by and be associated with an access point. Management frames and control frames are used for authentication, association and giving a user access to the wireless network. Management...
Concerns on the status of Botswana's health information systems were raised as early as the late 1980s. Several assessments overtime revealed weaknesses in the system including fragmentation, weak approaches to data collection, management, reporting, dissemination and use. A number of initiatives designed to improve the HIS were also undertaken. The BEANISH (Building Europe Africa collaborative Network...
Automated analysis is useful in anti-malware research because it helps deal with large collections of samples and reduces the human effort. This paper describes an automated system that performs dynamic analysis by running new samples in a controlled environment and analyzing the operations they perform on the filesystem. These operations are used to train a Support Vector Machine classifier that...
As aggressive integration paves the way for performance enhancement of many-core chips and technology nodes go below deca-nanometer dimensions, system-wide failure rates are becoming noticeable. Inevitably, system designers need to properly account for such failures. Checkpoint/Restart (C/R) can be deployed to prolong dependable operation of such systems. However, it introduces additional overheads...
Learning difficulties amongst postgraduate students have been cited as one of the most neglected problems. Eye tracking plays an important role in gathering data about how students interact with the learning material. This paper proposes a new approach of using high speed eye tracking equipment and fast computer monitors to collect the necessary gaze contingent eye fixation data of the Japanese English...
Considering the technological developments in the marketplace the embedded systems with multiple interface options are going to play a significant role in many monitoring and controlling applications. This paper focuses on the development of the multiple interface field control module board using microcontroller ATmega328 for monitoring and controlling the various input output devices. This board...
According as the composing and working theory of the taxing UAV, aim at the controlling for the takeoff and landing, the monitor software for the takeoff and landing is proposed. This software is based on Microsoft Visual C++6.0 and the virtual instrument. The software can real-time display flight attitude, track, parameters and the tracking divation. It showed the feasibility and necessarily of the...
Performing research on live network traffic requires the traffic to be well documented and described. The results of such research are heavily dependent on the particular network. This paper presents a study of network characteristics, which can be used to describe the behaviour of a network. We propose a number of characteristics that can be collected from the networks and evaluate them on five different...
A versatile framework for automation of sophisticated farm machinery has been proposed in this paper. The paper details the functional design and development of the hardware and software architecture of the framework for electronic monitoring and control of a complex system. The framework aims to provide a user friendly bridge between the digital world and the physical world and covers the core software...
Today's world is made of electronic networks. Everyday huge amount of sensitive data are passed through these networks. These networks are the backbones of the industries like banking, transportation, healthcare, defense, communication etc. So securing the data passed through these networks is essential. Organizations are investing more and more money to secure their data from the attackers. On the...
This talk will present a vision, and real-world examples, of the use of mobile crowdsourcing for building a variety of smart-city applications and services. I will first describe the paradigm of centrally-coordinated crowdsourcing, where the crowdsourcing platform intelligently recommends different tasks to different candidate workers, and contrast it with today's prevalent paradigm, where workers...
Social presence has two opposing effects on human corruption: the collaborative and contagious nature of another person's presence can cause people to behave in a more corrupt manner. In contrast, the monitoring nature of another person's presence can decrease corruption. We hypothesize that a robot's presence can provide the best of both worlds: Decreasing corruption by providing a monitoring presence,...
Mild Cognitive Impairment (MCI) results in a noticeable decrease in cognitive abilities but does not interfere with regular daily functions. Some patients with MCI may be able to return to age-appropriate cognitive abilities, but some will progress to dementia. Clinical interviews, tests and measurements are used to identify and monitor cognitive decline. Timely detection of cognitive decline provides...
The correlation of performance bottlenecks and their associated source code has become a cornerstone of performance analysis. It allows understanding why the efficiency of an application falls behind the computer's peak performance and enabling optimizations on the code ultimately. To this end, performance analysis tools collect the processor call-stack and then combine this information with measurements...
In this paper we study the correlation of node failures in time and space. Our study is based on measurements of a production high performance computer over an 8-month time period. We draw possible types of correlations between node failures and show that, in many cases, there are direct correlations between observed node failures. The significance of such a study is twofold: achieving a clearer understanding...
In this paper we study the correlation of node failures in time and space. Our study is based on measurements of a production high performance computer over an 8-month time period. We draw possible types of correlations between node failures and show that, in many cases, there are direct correlations between observed node failures. The significance of such a study is twofold: achieving a clearer understanding...
The correlation of performance bottlenecks and their associated source code has become a cornerstone of performance analysis. It allows understanding why the efficiency of an application falls behind the computer's peak performance and enabling optimizations on the code ultimately. To this end, performance analysis tools collect the processor call-stack and then combine this information with measurements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.