The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This presentation aims to reflect about University and Enterprises Engagement as key factor in the promotion of sustainable development, pursued by all nations in present world. It is based on an extensive bibliographical research and the practical experience close to different universities and enterprises. The collaborations, integration and partnerships between university and industry must be pursued...
The increasing number of people using social media to express their personal experiences has led to an emerging interest in supporting social media analysis for marketing, opinion analysis and understanding community cohesion. Social customer relationship management (SCRM) systems have become an interesting research area. Generally analysis needs to be done on large volumes of data (Big Data) in an...
In the article the question of building information control system with fault-tolerant architecture is considered. It is proposed to ensure fault tolerance by combining methods of performance reserve and distributed(decentralized) dispatching. An example of the reconfiguration of the system built on the basis of the proposed architecture is also considered.
This study gives insights on how to establish a customer community-based innovation system (CCBIS) from an integrated perspective of business management and computer engineering. First, the author uses value chain model to build a functional framework for CCBIS. After that, a case study of communities of Xiaomi Inc. Is proposed to describe how to achieve the functions of CCBIS in the customer community...
The teaching and learning process of memory hierarchy is a not simple task. Many topics studied in theory may discourage learning due to its complexity. Resources have been developed to improve learning experiences, and learning objects are resources worth taking into account. This paper presents a learning object called Amnesia, which aims to facilitate the knowledge construction by simulating the...
We have designed and built CalcTutor, an online educational tool for Calculus that employs the Teachers Dilemma methodology. This methodology is centered around a game framework where students take on, and are rewarded for playing well, both the role of learner and teacher. Students create machine-verifiable questions for each other and gain points based on not only correct answers but also asking...
Computer system capability is an essential capability for the computer professional undergraduate students, and the system capacity training becomes an important target for the computer professional education. Computer system design experiment is the key method to achieve this target. This paper introduces the exploration in training computer system capability of the Dept. CS&T Tsinghua University,...
The most important skills employers are looking for in engineering are creativity, ability to work in teams and critical thinking. However the most used teaching methods at universities, based on individual assignments or group projects while do address the creativity, fall back on the critical thinking and even in team work skill. Collaborative learning was long suggested as a good alternative for...
This work describes research, efforts, and outcomes for several Computer Science courses after incorporating XSEDE High Performance Computing (HPC) Resources and recommended and required curriculum additions from the ACM 2013 Computer Science Curricula and IEEE Technical Committee on Parallel Processing Curriculum Guidelines. The work herein describes the courses affected by this work, including Computer...
The automated formation of the interactive task for the computer aided training means is studied in the article. This problem is of current importance since there is a necessity to create an instrumental tool that would give an opportunity to realize different types of the testing and training tasks on basis of the interactive technologies in the modern stage of the computer training system development...
Cloud computing technology use in higher education institutions is rapidly expanding and becoming a more integral part of the collegiate experience. This expansion of the use of cloud applications comes with some significant learning and adoption challenges to the end users along with the technical advantages that allow greater accessibility and ease of use. The influence of individual user perceptions...
This study describes the development of robust control design for a spindle of lathe machine. The dynamic of the spindle is uncertain and time variation due to the deepness variation on cutting process. The dynamics model of a spindle were obtained by system identification. To find a linear model of the system based on the nonlinear system using the data of real time system identification. For obtaining...
There are currently no generally accepted metrics for information security issues. One reason is the lack of validation using empirical data. In this practical experience report, we investigate whether metrics obtained from security devices used to monitor network traffic can be employed as indicators of security incidents. If so, security experts can use this information to better define priorities...
Motivated by applications to distributed storage and computing, the multi-version coding problem was formulated by Wang and Cadambe in [4]. In this problem, a client sequently over time stores v independent versions of a message in a storage system with n server nodes. It is assumed that, a message version may not reach some servers, and that each server is unaware of what has been stored in other...
This paper addresses the concept of synergy in railway material management. It focuses on the challenge of identifying synergy opportunities between railway material management with other business lines in an enterprise. The paper presents both the logic and formation process of building railway material management synergy opportunities, along with analyzing the range and content of the concept. Through...
Computer crime activities are increasing more and more, which bring great threat to network security. Email is used for several computer crime activities due to its simplicity. In this scenario, email forensics is needed. This paper proposed an email forensic method using k- means clustering. We collect and analyze email data of suspicious users. Then filtering and clustering is done to obtain the...
A new interface to collect field data which may include text, numeric, GPS, photo, and video to introduce the plant classification in a city park named 18 Peak Mountain at Hsinchu, Taiwan is provided. The new interface is an infrastructure containing Fusion Tables APP which is made by APP Inventor and Google Fusion Tables. The APP can be used to collect photos on site, in addition, GPS will also be...
As modern computing relies more and more on distributed solutions of services and resources over the cloud, the need of potential users to assess whether the transition from traditional software systems to the cloud would be to their benefit becomes even greater. Cloud vendors also seek ways to study beforehand the behavior of potential users with respect to their decision to adopt the cloud environment...
The age of big data opens new opportunities in various fields. While the availability of a big dataset can be helpful in some scenarios, it introduces new challenges in digital forensics investigations. The existing tools and infrastructures cannot meet the expected response time when we investigate on a big dataset. Forensics investigators will face challenges while identifying necessary pieces of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.