The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid advancement of information technology in today's digital era has made major changes and developments in shopping experience. Shopping online is a new trend of the market today in line with the development of technology. Mobile commerce is a new method of online shopping where purchasers can conduct transactions and direct purchase from a commerce portal through their handset. The purpose...
The concept of embedded systems is considered. The advantages of developed embedded systems compared to general purpose are emphasized. The possible ways to develop microcontroller-based embedded systems design tools are analyzed. The features provided by MCU manufacturers are touched upon. The authors investigate the case of development of equipment for education, research and design of embedded...
A novel approach to design capacity-approaching variable-length constrained sequence codes has recently been developed. A critical step in this design process is the construction of minimal sets based on a finite state machine description of the encoders. In this paper we propose three generalized criteria to select the state that will result in construction of the minimal set with the best achievable...
The paper gives an account of a historicmeeting held by the governing body of the USSRAcademy of Sciences Technology Division, whosedecisions played a key role in the development of Sovietcomputer engineering.
Soft errors are increasing in modern computers. These faults can corrupt the results of scientific simulations. This work studies error propagation by a bit flip in conjugate gradient (CG) methods. We will also introduce adaptivity to selective reliable fault-tolerant (SRFT) solvers. Our study reduces the compute-intensive reliability steps in SRFT solvers.
Power Park comprised of multiple modular microgrids exhibits advantages including: better control flexibility, higher scalability, higher reliability, etc. The energy management system (EMS) of the Power Park can be divided into three layers, namely, converter layer, microgrid module layer and Power Park layer. In order to realize system control objectives in different layers, Beaglebone Black (BBB)...
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
The next generation of world citizens must be technologically fluent members of society. By technological fluency we mean the ability to manipulate technology creatively and for one's own use. This fluency is composed of knowledge and skills utilizing materials and tools, as well as attitudes, (e.g. confidence), with respect to technology. Numerous interventions exist to support middle school students'...
One of the main challenges of current person recognition techniques lies on difficulties of recognition in various poses. Recently, attention has been focused on using soft biometric information extracted from the human body to overcome the biometric recognition system's limitation in unconstrained environments. In this paper, we integrate the face and body information in a linear combination. We...
Although, the importance of Computer Science has been increasing, it must be noted that the drop-out rate among students of STEM subjects unfortunately is among the highest we know in education, worsen the fact that the enrollment rates are relatively small. Thus, we might have to look closer at pedagogical approaches to overcome this problem. The New Zealand educator John Hattie introduced a meta-study...
Most engineering programs culminate in a capstone senior design project that are often evaluated only by faculty despite the fact that the majority of the graduating seniors will be transitioning to careers in industry. In this paper, we demonstrate an innovative educational assessment tool for simultaneously integrating industry and faculty in-person evaluations of senior design projects. Two rubrics...
This paper investigates reliable answers to the following proposed research questions: Will changing course contents and difficulty levels affect the achievement of course intended learning outcomes and the levels of students' success? Detailed analyses and findings of a proposed course assessment framework that primarily uses direct assessment techniques are presented. Two online courses are compared,...
This research is an attempt to identify the impact of effectiveness of the maritime simulator training program on different factors of needs and interest of the program. Model is developed to understand the impact. Data was collected from the course participants attending various simulator based training programmes from three training centers. Confirmatory factor analysis was employed to examine the...
The purpose of this study is to investigate the intention to use the cloud sphygmomanometer in Taiwan. This study also aims at providing suggestions on the popularization of cloud medical services. This study was established in a way that the model constructs in Technology Acceptance Model (TAM) were adapted to the context of cloud sphygmomanometer application in health management. Scale items on...
Extensive use of computer network and huge amount of data had led several works to focus on intrusion detection system, which are based on single dataset or to combine multiple detection techniques to analyze detection rate and false positive flag.
A critical node (cut vertex) in a wireless sensor network (WSN) is a node which its failure divides the network to disconnected parts. Identification of such nodes is the first step in countering against the threats on WSN reliability. In this paper, we propose the Connected Dominating Set based CUT vertex detection (CDSCUT) approach. We define 5 new rules for deciding about the statuses of nodes...
Lots of studies have shown that memory hardware error rates are orders of magnitude higher than previously reported. In order to fight with these memory hardware errors, many memory testing tools have been developed, especially software level online memory testers, which means these memory testers implemented in software can work with the OS (operating system) at the same time. However, validation...
In this work, we address the issue of automatic assessment for programming assignments. The objective is to provide immediate feedback to the learners and save teachers from manually managing all the students' solutions. We will present a method merging results from dynamic and static analysis to ensure a reliable and objective evaluation job. While dynamic analysis is based on unit testing framework,...
The future of Moore's Law is in jeopardy. The number of cores of many-core systems is steadily increasing for every technology node generation. Voltage scaling does not keep pace with the unabated decrease of transistor size. Higher leakage power and manufacturing variabilities are the consequences and lead to extremely critical power as well as thermal issues. These phenomena can downgrade the performance...
The paper proposes a framework for recognizing hand gesture which would serve not only as a way of communication between deaf and dumb and mute people, but also, as an instructor. Deaf and dumb individuals lack in proper communication with normal people and find it difficult to properly express themselves. Thus, they are subjected to face many issues in this regard. The sign language is very popular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.