The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-task learning aims at learning multiple related but different tasks. In general, there are two ways for multi-task learning. One is to exploit the small set of labeled data from all tasks to learn a shared feature space for knowledge sharing. In this way, the focus is on the labeled training samples while the large amount of unlabeled data is not sufficiently considered. Another way has a focus...
Predicting the emergence of an event enables to anticipate and make decisions upstream. For instance, in the employment sector, it becomes necessary to anticipate the emergence of competencies requirements to help job seekers, education and training organization to better match the needs of the job market. Several approaches address the competencies mining with ontologies, we adopt a different point...
This work introduces adversarial feature selection, a game between a feature selection agent and its adversary. The adversarial approach is drawn from existing work on adversarial classification. The feature selection algorithm selects a subset of features from the original set based on their utility towards classification accuracy. A cost is incurred based on features selected. The adversary modifies...
Nowadays, information plays a significant role in the enterprise organizations. Sensitive and vital data have a key character in organizing and storing within the database. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. The existence of Intrusion Detection Systems in the Data-Base (DB-IDS) is a necessity because enterprises...
Natural and man-made disasters are constantly occurring leading to human casualties, infrastructure destruction and financial losses. Volunteers and volunteer organizations play a significant role in each and every phase of disaster management. Therefore, selecting and retaining skilled, motivated and able volunteers becomes important. Existing ICT based solutions focus on resource allocation, team...
One of the basic features of the information society is a constant acquisition of information. This information can be obtained from various sources. One source is the Internet environment. In this environment, you can use the standard communication of information on the web. The disadvantage of this approach is the lack of assessment of knowledge by the recipient. If you want to professionally lead...
The purpose of our research is to develop and implement the methods and tools for the organization and functioning of the intelligent computer-based learning environments.
Initiatives for women in computing exist since the 70's. However, little research has been done to study the effect they have on the women involved. Hence, this case study presents observations of the perceived value of the initiatives from the perspective of these women. This is a case study of one of the organizations contributing to this kind of initiative, the ACM (and its branch ACM-W), and how...
Computer system capability is an essential capability for the computer professional undergraduate students, and the system capacity training becomes an important target for the computer professional education. Computer system design experiment is the key method to achieve this target. This paper introduces the exploration in training computer system capability of the Dept. CS&T Tsinghua University,...
Article is devoted to the problems of building simulation models which enhance the methods of learning processes. Majority of the educational systems provide education personalization, creating adapting ways to learning, whereas one of the most important components of specialist competency is efficient interoperability. In this connection dynamic education environment and system design task is considered...
The automated formation of the interactive task for the computer aided training means is studied in the article. This problem is of current importance since there is a necessity to create an instrumental tool that would give an opportunity to realize different types of the testing and training tasks on basis of the interactive technologies in the modern stage of the computer training system development...
Software engineering principles form the foundation of methods, techniques, and tools. In this study, we identify software engineering principles introduced by several authors in various ways and describe software engineering procedures. Moreover, we create a template with 16 steps for merging two disparate software solutions.
In this empirical study, we draw on concepts of internal marketing to provide nursing managers of hospitals with an effective education method for healthcare service innovation. A cross-sectional study was used. Subjects for this study were nurses at two district hospitals in Taiwan. Internal marketing practices significantly affect service innovation. In particular, service training, rewarding employee...
Enterprise Resource Planning (ERP) systems have experienced mainstream adoption as a comprehensive solution for business function integration and end-to-end process management. To meet industry demand, many business schools offer academic courses in ERP strategy and technology to train students to be proficient in the use of ERP systems. The extant literature on ERP education highlights the need for...
Research that explores the use of machine learning for automatic security classification of information objects is about to emerge. In this paper we investigate the opportunity to increase the machine learning performance by taking advantage from time information that is "hidden" in the documents of the training set. This paper presents a technique to do so, and confirms that this is a promising...
In public and local administration contexts, the organizational structures depend on bureaucratic aspects. This often implies that people are engaged in offices and their allocation come from emergencies and political factors instead of rational motivations related to knowledge, competences and profiles. In most cases, such situations become gangrenous and generate dissatisfaction and low productivity...
With the increasing risk of data leakage, information guards have emerged as a novel concept in the field of security which bears similarity to spam filter that examine the content of the exchanged messages. A guard is defined as a high-assurance device used to control the information flow, typically from a domain with a "high" level of confidentiality, such as a corporate or military network,...
Water quality assessment is very important for monitoring water sources and main canal, which is beneficial to offer strategies for the management of water quality and environment. This paper proposes a water quality assessment method based on a sparse autoencoder network. In the proposed approach, a representation model is firstly learned via a sparse autoencoder trained by unlabeled water monitoring...
An efficient and effective security risk assessment benefits a lot on realizing the potential threats changing, uncovering emergency when maintaining cyber security, and maximize utilization of available resource. However, traditional cyber security risk assessments are usually based on knowledge-driven approach which is suffered from demanding lots of proper domain knowledge and time-consuming human...
Enterprise Resource Planning (ERP) is designed to model and automate basic processes across the organization over a centralized database sheet, or any type of tools that are used by the organization and pays a lot of attention in implementing ERP modules. The success of ERP system does not require the demolishing of the traditional ERP system models, but instead re-plat forming and hosting them. ERP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.