The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Non-lossy compression can save time and energy during communication if the cost to compress and send input is less than the cost of sending it uncompressed. Unfortunately, compression can also degrade performance, no single method is always beneficial, and outcomes depend on many factors. As a result, compression choices in real systems are coarsely grained and manually controlled, resulting in suboptimal...
The proliferation and popularization of new instruments for measuring different types of electrophysiological variables, has generated the need to store huge volumes of information, corresponding to the records obtained by applying this instruments on experimental subjects. Together with this must be added the data derived from the analysis and purification processes. Moreover, several stages involved...
Learning difficulties amongst postgraduate students have been cited as one of the most neglected problems. Eye tracking plays an important role in gathering data about how students interact with the learning material. This paper proposes a new approach of using high speed eye tracking equipment and fast computer monitors to collect the necessary gaze contingent eye fixation data of the Japanese English...
In this paper, three different operational biases-A (accuracy emphasis), N (neutral) and F (speed emphasis) are investigated in the circular steering task for both younger and older user groups when interacting with computer interface. Experimental results show that operational biases have significant effect on human performance for both younger and older groups. The controllable range is wider for...
Introductory engineering courses can benefit from the flipped classroom model as these courses develop hands-on skills such as engineering design and critical thinking skills. Providing students with instruction outside the classroom with e-learning tools frees up class time to engage in activities that promote deeper learning, e.g. classroom discussions, problem-solving sessions, design activities,...
Efficient incident response operations require information sharing among parties to allow appropriate actions to be considered and executed. This sharing needs to be realized even beyond an organization's borders since many security incidents involve multiple organizations, but it is currently performed manually and thus is inefficient. In this paper, a scheme that facilitates the exchanges of enriched...
Internet service providers (ISPs) have been facing heavy competition to attract more users in the mobile data market, along with growing operational costs. Most mobile data plans charge users a fixed fee for a monthly data quota, and any unused data at the end of each month will be wasted. In the beginning of 2015, both AT&T and T-Mobile reinstated rollover data plans with constrained eligibility...
Nowadays, large volumes of data and measurements are being continuously generated by computer and telecommunication networks, but such volumes make it difficult to extract meaningful knowledge from them. This paper presents SaFe-NeC, an innovative methodology for analyzing network traffic by exploiting data mining techniques, i.e. clustering and classification algorithms, focusing on self-learning...
Data is a part of information that is formatted in some special approach. In general way data can be exist in various forms like numbers or text on a paper, as bits or bytes in computer memory, or as facts in the brain of human beings. Moreover, data is present each and every place in the universe. There is no limit of the data present all over the universe. Since the day when human civilization starts,...
By introducing the method of fuzzy algorithm model to the examination and evaluation of advanced mathematics course, the author of this paper tries to put forward an improved scheme for the traditional examination and evaluation system of the advanced mathematics course in colleges and universities, to prove the application prospect and methodology value of the model on the basis of combining the...
With the development of the network data and use the change of demand, extension from cloud computing cloud storage become the research focus and hot spot. This paper mainly introduces the characteristics of cloud storage technology, and analyze the hierarchical structure of the cloud storage service, and then analyzing the data storage structure of the cloud storage service, emphasis on reliability...
This paper is about fitting a model for the spreading of a computer virus to measured data, contributing not only the fitted model, but equally important, an account of the process of getting there. Over the last years, there has been an increased interest in epidemic models to study the speed of virus spread. But parameterising such models is hard, because due to the unexpected nature of real outbreaks,...
To support efficient business data analytics, having a good computer data structure to store and access business data is a top priority. KStore is a data structure proposed by Jane Campbell Mazzagatti based on the Phaneron of C. S. Peirce. KStore is designed and developed as a storage engine to support business intelligence data storage, queries and analysis. The generation and data access of KStore...
The applications that are data intensive and large-scale is run by data centers based on Map Reduce implementation. Map Reduce runs on large clusters which needs vast amounts of energy which parallel increase cost of the data centers, Energy reduction has to be incorporated into the map reduce implementation to improve the efficiency of the data center. In order to achieve the good performance, model...
In order to make it easier to evaluate network systems whose protocols are beyond current simulators' competence scope, a new network simulation platform is designed and implemented. We propose a new network simulator for Wireless Access in Vehicular Environments (WAVE) protocols. It is totally implemented using C++ programming languages. The core simulating operation flow of proposed simulator is...
This paper reviews quantitative literature that addresses the questions of what explains why people buy virtual goods. The study reviews independent and dependent variables, path coefficients, used methodologies, theoretical backgrounds as well as types of services covered in the relevant literature. The goal of the paper is both to provide an overview to the literature and to investigate reasons...
Sequential experimental design for computer experiments is frequently used to construct surrogate regression models of complex blackbox simulators when evaluations are expensive. The same methodology can be used to train classifiers of labeled data which is expensive to obtain. For certain problems classification can be a more appropriate method to obtain a solution with fewer samples.
UAV has been more and more applied in the military and civil domain. It needs to have the capability to perform some autonomous tasks to ensure its mission's success under the complex electromagnetic conditions. However most of existing researches are at the laboratory level and do the special case studies. Intelligence computing technology, as a basic and universal technology, should be focused on...
Computers and Smartphone's becomes vital part of everyday life and hence use of internet becomes more and more. Due to internet, computers are becomes vulnerable of different kinds of security threats. Therefore it is required that we need to have efficient security method in order to avoid leakage of important data or misuse of data. This security method is called as Intrusion Detection System (IDS)...
Dyslexia is one of the most common Specific Learning Difficulties (SpLDs) in the world. Students with dyslexia have poor fluency in reading, writing, spelling, speech, short-term memory, and also other related disorders. In addition emotion is recognised as important as the cognitive difficulty that affects dyslexia learning. Students with dyslexia often suffer emotions like frustration and low self-esteem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.