Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Due to the fundamental trade-off between quality and timeliness of planning, designers of self-adaptive systems often have to compromise between an approach that is quick to find an adaptation plan and an approach that is slow but finds a quality adaptation plan. To deal with this trade-off, in our previous work, we proposed a hybrid planning approach that combines a deliberative and a reactive planning...
This paper evaluates a mechanism for applying machine learning (ML) to identify over-constrained IaaS virtual machines (VMs). Herein, over-constrained VMs are defined as those who are not given sufficient system resources to meet their workload specific objective functions. To validate our approach, a variety of workload-specific benchmarks inspired by common Infrastructure-as-a-Service (IaaS) cloud...
Facial landmark is to be determined point by point of areas such as eyes, nose, mouth, eyebrows on the face. Facial recognition studies can be generally categorized into two categories, local and global. All of the faces are used in the global face recognition while the face domain is divided into subspaces in the local face recognition. In face recognition studies facial landmarks are used for facial...
In the era of Industry 4.0, Navantia is creating a Cyber-Physical System (CPS) for enabling automatic event detection in their pipe workshops. The enhanced identification of the numerous pipes of a shipyard and their traceability, from their origin and through their life-cycle, increase productive capacity and efficiency in the processes. The CPS proposed is able to transmit signals periodically,...
Article presents method of storing and processing Big Data using object-oriented datatype in commercial relational database server. Methodology was presented based on genomic data. Additionally, some methods of pattern matching implemented in the object were described and commented. Due to set of numerical experiments based on real data the efficiency of the system was testified. Obtain results shows...
Two different approaches of implementing Fast track analysis for attendance management system has been designed and analyzed. The first design is applying data access through card reader and the data is being saved in the memory card. All the data which are representing Student ID are processed by attendance management system for monitoring the attendance student performance. This is done via off-line...
Word sense disambiguation is the process of identifying existence of polysemous words in the text and disambiguating the appropriate sense satisfying the given context in Kannada language. The proposed methodology uses the synonyms of the target word and its surrounding words' gloss in combination with part of speech tagging to determine the overlap between the senses of the polysemous word or the...
Many animal species exist in this world and there are always new species being discovered each year. Therefore, it is very important that these valuable species be documented properly to be referred to in future. Numerous information retrieval systems for managing and documenting animal species today only allow users to search animal images and descriptions online via text-based input. Therefore,...
In this paper, we introduce a Monte-Carlo tree search (MCTS) approach for the game "Hearthstone: Heroes of Warcraft". We argue that, in light of the challenges posed by the game (such as uncertainty and hidden information), Monte Carlo tree search offers an appealing alternative to existing AI players. Additionally, by enriching MCTS with a properly constructed heuristic, it is possible...
In many applications, such as data integration and big data analytics, one has to integrate data from multiple sources without detailed and accurate schema information. The state of the art focuses on matching attributes among sources based on the information derived from the data in those sources. However, a best join result according to a method's own pre-determined criteria may not fit a user's...
In this work, a WiFi enabled door lock allows users to lock or unlock doors by codes that are managed from a computer or phone where new codes are issued or deleted including temporary codes to guests or office personnel. This work demonstrates an efficient smart lock system that can be configured remotely using Intel Galileo boards. The on-board server is connected through a mini- PCIe Wi-Fi card...
Configuration management tools, CMTs for short, are a set of indispensable software for DevOps (Development and Operations). CMTs automate system deployment and configuration through CMT modules, which are reusable, shareable units of configuration code. Therefore, thousands of CMT modules have been developed for various systems, and are still growing fast. Although CMT repositories usually provide...
This work presents the building and validating of a face expression database and a face expression recognizer. The face expression recognizer uses a geometric-based technique that measures distances between the central point on the face and other 68 facial landmark points. These measures are transformed into features to train a support vector machine. The database was built inside an educational context...
Despite reusability being a Learning Objects (LO) core feature, sometimes they demand modifications to fit the new use context. This adaptation process must be easy and rapid. However, several LO are produced in a way that changes need to be done at source code, requiring technical knowledge. Guided Customization (GC) aims at enabling the user to execute adaptations without this requirement. It allows...
In embedded applications, some real-time transactions may trigger external device. If these transactions fail, the influence caused by the triggered external device should be removed. The real-time database can't eliminate the influence, then we exploit compensatory task to compensate for the external influences. In this paper, the real-time transaction is divided into two parts: main task and compensatory...
Learning from examples, either alone or combined with problem solving has been proven to be beneficial for learning in Intelligent Tutoring System. However, it is generally unknown how much example-based assistance should be provided. We previously found that erroneous examples prepared students better for problem solving in comparison to worked examples when the order of learning activities is fixed...
Facial expression recognition is a very active research topic due to its potential applications in the many fields such as human-robot interaction, human-machine interfaces, driving safety, and health-care. Despite of the significant improvements, facial expression recognition is still a challenging problem that wait for more and more accurate algorithms. This article presents a new model that is...
The past decade has witnessed the popularity of video conferencing, such as FaceTime and Skype. In video conferencing, almost every frame has a human face. Hence, it is necessary to predict attention on face videos by saliency detection, as saliency can be used as a guidance of regionof- interest (ROI) for the content-based applications. To this end, this paper proposes a novel approach for saliency...
This paper deals with the idea of developing new philosophies for the reliability assessment of additive layer manufacturing (ALM) parts. ALM is a disruptive new manufacturing method by which components are created adding material layer after layer, allowing for the design and production of complex geometries, unthinkable with the use of traditional subtractive machining methods. Thinking ALM means...
Advancement in Information Technology requires reassessment in decision making regarding investment for the success of project management. The barriers of an Information Technology project should be acknowledged before implementing an organizational innovation. The purpose of this paper is to summarize and analyze the risk factors that should be regarded in Information Technology Project Management...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.