The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, Regular Android softwa re, injected in malicious code, is nne of the imp ort an t factors of tha i Android vir us run ram pant. Protectin g the And roid software has become a foc us of attent ion in academia and industry. Address ing the safety pro tecti on Issues of the Android soft ware, this paper will present slime new schemes for Androtd scnware security technology to reinforc e j...
In this paper, we propose a two-tier evolutionary game for dynamic spectrum sharing using Licensed Shared Access (LSA) to serve the additional capacity needs of Mobile Network Operators (MNOs). The proposed algorithm ensures fair and demand-driven allocation of spectrum resources to LSA licensees, guaranteeing spectrum availability for licensees unlike previous spectrum sharing techniques. Moreover,...
The real world is mostly a connected data and better be modeled as graph models. Therefore, graph databases are also gaining much attention. To get some advantages of graph models, a huge volume of data in relational models need be converted to graph models. In this paper, we focus on mapping and converting without semantic loss. This approach studies the semantic abstraction of the relational model...
In knowledge representation reification, N-Quads and Named Graph have been introduced to represent context of knowledge, meta-information, provenance or any statements of statement. In this work we propose an attributed predicate RDF as a new alternative model in triple RDF to overcome the problem to represent statements of statement or any additional information of statement. We study that the predicate...
The paper proposes a method that helps clients to select a web service among several ones with the same functionality based on their quality of service properties (QoS). It provides a mechanism for integrated QoS assessment of web services taking into account all measured QoS properties of interest. The method estimates the strength of the mutual dependency of the QoS properties based on the data...
Acoustic radar has the advantages of low cost, high resolution, and the simplicity for sampling and storage. Recent years, it has been widely studied and applied in fields such as target detection, recognition and imaging. However, the sound signal is usually wideband. The wideband correlation function is often used in active and passive detections. To address the problems of the errors and computational...
Computer Science (CS) unplugged is a set of learning activities designed to explain CS concepts without using a computer. These activities have been used globally especially during CS outreach programs. It was used during these programs to attract middle and high school students to major in CS. With this knowledge in mind, we initiated a summer camp program involving local middle and high school girls...
This paper presents a new clustering algorithm, called Cell-MST-Based Method that is a combination of a Cell-based method and Minimum Spanning Tree based (MST-based) methods. The algorithm is dedicated for Big Datasets on a limited memory computer, especially for thin big datasets which have a small number of attributes but a very large number of instances. Firstly, a Cell-based method converts a...
Cloud computing technology use in higher education institutions is rapidly expanding and becoming a more integral part of the collegiate experience. This expansion of the use of cloud applications comes with some significant learning and adoption challenges to the end users along with the technical advantages that allow greater accessibility and ease of use. The influence of individual user perceptions...
The Metal-Oxide-Semiconductor Field-Effect Transistor (MOSFET) constitutes the backbone of today's microelectronics industry. MOSFETs are the building blocks of very-large-scale-integrated (VLSI) circuits in microprocessors, memory chips and telecommunications microcircuits. A modern microprocessor can contain more than 2 billion MOSFETs. MOSFETs are mainly used as switches in logic microcircuits.
The recent popular games have been played much by children. Additionally, they present challenge to motivate more and wider knowledge related to children's cognitive development. Cognitive development is essential because it is closely associated with the development of intellectual and mental growth. This study aimed to analyze preschoolers' cognitive concept content within popular games. The method...
Prepaid Energy Meter has been implemented in several countries. In fact, the disadvantage of the system is the behavior control of the users. Recharging should be carried out on the meter. The problem arises when the consumers leave and the electric pulses discharged. Therefore, a system is needed to control the electrical pulse wherever they are. Prepaid energy meter is proposed and simulated by...
In this paper, we apply efforts to explore the insights of sustainable development of states and to develop a model based on factor analysis aiming at evaluating sustainability in a qualitative and quantitative method, thus distinguishing more sustainable countries which can help elaborate sustainable development plans, and evaluate the effectiveness of such plans. We use the term Comprehensive Sustainability...
This study describes the development of robust control design for a spindle of lathe machine. The dynamic of the spindle is uncertain and time variation due to the deepness variation on cutting process. The dynamics model of a spindle were obtained by system identification. To find a linear model of the system based on the nonlinear system using the data of real time system identification. For obtaining...
Miscommunication among physicians, nurses, and pharmacists can lead many medication errors. It should be eliminated and medicine information should always be verified. A good medicine management integrated with patient's medical records is an important thing to avoid medication errors. A proposed model of Hospital Medicine Tracking System using RFID technology (HoMeTrack) has been presented. The objective...
RFID is one of wireless technology that can be used in various sectors of human life like military, school, sport, health, industry, security, animal, and other areas. RFID mainly consist of two important parts, the reader (combination of transceiver and antenna) and the tag (consist of unique number). The use of unique number inside the tag is very useful as an identity of an object or as tracking...
Various vehicular applications are available in VANETs either for safety-related or non-safety-related use. Collision warning and car crash alerts are those of the most important messages that own high priority to be rebroadcast than any non-safety messages. Meanwhile among non-safety messages that employs text, images and streaming packets containing voices and videos, the bandwidth must be distributed...
Previous research [2] have developed an aspect orientation agent framework based on Aglets. Aglets [1] is an object orientation agent framework. Aglet have transformed from object orientation (OO) to aspect orientation (AO) approach. The transformation process is called refactoring. Crosscutting concerns (CCC) [3] is problems behind of refactoring process. This study is a step to prove the AO Aglets...
The major selection of high school students is not only determined on the basis of academic ability but also supported by the interest factor. Students who study a science which suit their characteristics would feel excited when learning the sciences as well as having much influence in academic achievement positively. The purpose of this study is to optimize the process of major selection on the level...
This study is an implementation of information technology for education, aimed to produce a model of online lab course with a collaborative environment using a desktop sharing application. In the digital electronics lab course, participants were divided into the groups, each of them consists of three members. A desktop sharing application was used to the digital circuit simulator as an offline program...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.