The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multiplayer Online Battle Arena (MOBA) games are very popular in the current eSport scenario, being highlighted in several competitions around the world. However, the domain of knowledge contained in these games is large, which makes it difficult to discover and predict the course of a match. The present work proposes the application of classification algorithms to determine the team with more chances...
Pneumatic circular manipulator is an experimental setup which is designed and developed at Faculty of Technical Sciences in Novi Sad, Serbia. It is controlled via Internet, using CEyeClon platform. The goal of realization of the manipulator is ability of participants to remotely use it as a test bed for testing various types of pneumatic control. Remote participants are mainly students of technical...
Stateful programmable dataplanes are emerging as a disruptive technology and an enabler factor for network function virtualization in SDN environments. In this demo paper we show three real world use cases with stateful forwarding requirements to validate both the hardware and software implementations of the Open Packet Processor data plane.
The link between logic and computation has been established by the BHK interpretation and the Curry-Howard isomorphism, based on which proof assistants capable of verifying formal proofs by transforming proofs into programs and by computationally evaluating the programs have been developed for the past few decades. Because evolutionary algorithms are search methods with remarkable feasibility and...
A system of unmanned aerial vehicles (UAVs) can be used to provide uninterrupted service to customers by handing the mission from a weary UAV to a fresh one in an automated manner. Toward such a system, we discuss the development of two components: ROS GPS waypoint tracking package and centralized task allocation network system (CTANS). The ROS GPS waypoint tracking package is the first open source...
Machine learning has been widely used and achieved considerable results in various research areas. On the other hand, machine learning becomes a big threat when malicious attackers make use it for the wrong purpose. As such a threat, self-evolving botnets have been considered in the past. The self-evolving botnets autonomously predict vulnerabilities by implementing machine learning with computing...
Passwords are still the predominant mode of authentication in contemporary information systems, despite a long list of problems associated with their insecurity. Their primary advantage is the ease of use and the price of implementation, compared to other systems of authentication (e.g. two-factor, biometry, …). In this paper we present an analysis of passwords used by students of one of universities...
The purpose of this paper is to introduce a set of automatic feeding system in the tank area, to achieve a variety of material handling precision control. This paper introduces the composition and function of the system and describes the characteristics and application of PCS7 software in the automatic feeding control system. The system was designed and developed based on Siemens PCS7 software. The...
The implementation of RFID technology in computer systems gives access to quality information on the location or object tracking in real time, thereby improving workflow and lead to safer, faster and better business decisions. This paper discusses the quantitative indicators of the quality of the computer system supported by RFID technology applied in monitoring facilities (pallets, packages and people)...
Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of...
Storyline visualization, as a process of illustrating data that has a course of events via a visual medium, has been used in the area of film making for a very long time. Not so long ago, it has moved from the paper version to the digital word allowing for a wider usage. In this paper we propose its usage as a teaching tool in the area of literature reading for the Croatian class (primary language)...
The article treats with the integration of an elaborate Lexicon Extended Language which is denoted all in the interconnected reuse process. The eLEL is a lexicon rich in information and allows to describe a software component such as: its identification, its notion, its behavior and its different characteristic. From this lexicon, we proposed a reused environment that included three processes, namely...
Given the current scientific questions of societal significance, such as those related to climate change, there is an urgent need to equip the scientific community with the means to effectively use high-performance and distributed computing (HPDC), Big Data, and tools necessary for reproducible science. The Polar Computing RCN project (http://polar-computing.org) is a National Science Foundation funded...
Devices and methods for interaction with a computer do not change very often. However, with technology advancements, solutions for new ways of human-computer interaction are possible. Especially for physically disabled users, solutions for contactless interaction with a device promise new possibilities for independent computer use and management. In this study a solution for a contactless interaction...
Under competitive market conditions, one of the key objectives of an industrial enterprise is to form and implement an innovation strategy. The purpose of this research study is to form, justify and evaluate the financial and investment development strategy of the enterprise in a short-term and middle-term period. The mission of the enterprise is to develop and introduce software products for industrial...
In this paper, we set out to explore the level of programming experience present among the masses (the last mile end-user programmers), the influence of various factors such as early exposure to software, as well as age, on programming experience, their effects on the types of software people mightwant to create, and the software development approaches they prefer.
Network function virtualization (NFV) introduces great flexibility in designing software-based network appliances to reduce cost and accelerate service deployment for network operators. However, with the fast development of high speed network of 100 GbE and beyond, how to efficiently design virtual network functions (VNF) on commodity servers has become a challenging problem. Although the advances...
This paper presents the experience of designing, implementing and evaluating a first semester project-based course for the software engineering bachelors undergraduate curriculum at PUC-MG in Brazil in 2016. We present an overview of the motivation behind the curriculum and the challenges and restrictions considering the generation of students who are going to follow it. The methodology of the course,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.