The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the development of the security subsystem of modern information systems, a problem of the joint implementation of several access control models arises quite often. Traditionally, a request for the user's access to resources is granted in case of simultaneous access permission by all active security policies. When there is a conflict between the decisions of the security policies, the issue...
Halal certification has proven to be one of the most effective ways to identify the Halal status of certain products or services that helps Muslim select foods that are permissible in Islam. The increasing global Muslim population leads to the demand for halal food, products and services. With that, the supply of halal certificates needs to be sped up to meet the increasing global demand. Coping strategies...
Recent studies show structured atomic event information is beneficial to represent the discourse semantic. However, extracting useful structured representation of events from open domain is a challenging problem. On one hand, previous event extraction methods on special domain, cannot be directly used for open domain because of domain limitation and predefined event pattern. On the other hand, atomic...
Making construals is a new digital skill that complements conventional programming. Its primary focus is on using computer-related technology to stage interactive experience of unprecedented richness and subtlety. This paper is a tutorial on the latest version of an instrument for making construals developed in the ongoing EU Erasmus+ CONSTRUIT! project. Its principal theme is the re-creation of "the...
The Exploring Electrical Engineering program will electrify your understanding of engineering! Developed as part of a larger K-6 engineering education research initiative, this workshop paper details two activities for exploring electrical and computer engineering concepts for grade 3–5 students through the use of cross-disciplinary concepts in physical education and movement. Activity 1: Going with...
To satisfy more and more complicated requirements on information recording, processing, exchange etc. in newly developed intelligent satellites, a distributed storage system is designed based on SpaceWire network in satellite platform. In this distributed storage system, a SpaceWire router unit serving as the core device of star network connects several nodes, including onboard computers, namely,...
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
Pattern recognition is one of the fundamental competencies associated with computational thinking and STEM education. Although much has been written to define computational thinking (CT), we argue that CT is a multi-faceted construct and specific aspects of CT (such as pattern recognition) should be examined. The purpose of this study is to conduct a systematic review of literature on pattern recognition...
ACM and the IEEE Computer Society plan to re-lease their computer engineering curriculum guidelines at the end of this calendar year. The curricular report, tagged CE2016, reflects the state-of-the-art in computer engineering education and practice that would be relevant for the coming decade. This panel presentation provides an overview of the report and it also provides unique perspectives from...
Most engineering programs culminate in a capstone senior design project that are often evaluated only by faculty despite the fact that the majority of the graduating seniors will be transitioning to careers in industry. In this paper, we demonstrate an innovative educational assessment tool for simultaneously integrating industry and faculty in-person evaluations of senior design projects. Two rubrics...
First-year engineering students enter our university with differing experiences using computers and technology. This affects the classroom dynamic especially with large differences between students. With this in mind, faculty must address the following questions when planning their course: Where should the faculty focus their time? Do they focus on bringing everyone to a specific level? Do they teach...
Data compression plays a vital role in various video processing applications. Basically video compression is implemented in a video stream frame by frame. Live video processing is a cumbersome task which usually reduces the video transmission rate. So, multimedia data transmission is carried out using suitable hardware modems. The question that arises here is that whether it is possible to achieve...
In this paper, an approach is made to design a Thermal and Power efficient RAM for that reason we have used DDR4L memory and six different members of SSTL I/Os standards on 28nm technology. Every spacecraft requires most energy efficient electronic system and for that very purpose we have designed the most energy efficient RAM. In this design, we have taken two main parameters for analysis that is...
Providing questions with unique sequence helps to encourage participants integrity in an examination. In this study, Secure Hash Algorithm (SHA) 2 and 3 have been proposed and evaluated in a question shuffling problem for computer based test. Two strategies were tested to use the hash algorithms. The first utilized a few of the most significant digits of the hash value and the second treated all digits...
Wind speed forecasting is essential for environmental related reasons and many applications i.e. estimating the shortterm energy production from wind farm operations. This work investigates and compares different approaches for the problem of wind forecasting in a simplified manner introducing and considering the prediction of the range within which the mean wind value will fall in the next time step...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
There are various methods of anti-forensics many of which are simple and robust, however, some advanced techniques such as Deniable Encryption not only are powerful but also proven to be unbreakable in the mathematical sense. Thus, studying them has a crucial role in the science of digital forensics research. In this research, we propose a new technique for deniable encryption based on RSA with OAEP...
We present a system to automatically grade the mathematical word questions. The questions that we currently consider are at the level of GCE (General Certificate of Education) Ordinary Level (O/L) Mathematics paper standard in Sri Lanka. The solutions to these questions are open-ended multi step answers. The system uses a regular expression based information retrieval approach to validate the expressions...
Firewall is a standard security utility within the Microsoft Windows operating system. Most Windows users adopt it as the default security option due to its free availability. Moreover, Windows Firewall is a widely used security tool because of the large market share of the Microsoft Windows operating system. It can be customised for filtering of network traffic based on user-defined inbound and outbound...
Assessments of tremor characteristics by movement disorder physicians are usually done at single time points in clinic settings, so that the description of the tremor does not take into account the dependence of the tremor on specific behavioral situations. Moreover, treatment-induced changes in tremor or behavior cannot be quantitatively tracked for extended periods of time. We developed a wearable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.