The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Counterfeit coin problem has been considered for a very long time and is a topic of great significance in Mathematics as well as in Computer Science. In this problem, out of« given coins, two or more false coins (the coins are classified as false because their weights are different when compared to a standard coin) are present which have the same appearance as the other coins. This problem belongs...
Several major accidents in the oil and gas industry traced their source to deficient training resulting in serious injuries and even casualties along with extremely expensive damage to equipment and decrease in productivity. This paper presents a procedure evaluation/e-training tool called PeT to track the knowledge and confidence of trainees in emergency operating procedures. PeT was tested with...
For admissions in various graduate schools and colleges. There are some mobile applications available for GRE preparation. Those applications consists of only words with their corresponding synonym which are not very effective as they to lack to provide tricks for easy remembrance of the GRE words and there is no specialized categorization of the words and they neither provide any interesting verbal...
As the world becomes more digital, data Science is the successful study that incorporates varying techniques and theories from distinct fields. Among all fields, the domain knowledge might be the most important since all data science researchers need to start with the domain problem, and end with useful information within the domain. Identifying new application domain is always considered as fundamental...
An excersice prescription is a professionally designed excersice plan for improving one's health according to the results of his health-related physical fitness (HRPF) tests. Traditionally, an excersice prescription is formulated by manually checking the norm-referenced chart of HRPF; however, it is time consuming and a highly specialized and experienced expert on health-related physical fitness testing...
Reforms in the educational system emphasize more on continuous assessment. The descriptive examination question paper when compared to objective question paper acts as a better aid in continuous assessment for testing the progress of a student under various cognitive levels at different stages of learning. Unfortunately, assessment of descriptive answers is found to be tedious and time consuming by...
The study of mRNA methylation is an emerging research field greatly fueled by recent advancement in high throughput sequencing technology. We propose here a binomial likelihood ratio test ("bltest") aiming at detecting differentially methylated mRNA with MeRIP-Seq data, "bltest" models the read counts of each RNA methylation site in IP and input samples with a binomial distribution...
With growing popularity of online services, the amount of information on web increases dramatically, which has resulted in increasingly concerns on web application security. Subject knowledge is in desperate need to guide security testing against advanced attacks. Unlike common software security weakness study pattern, a combination analysis method based on Colored Petri Net is presented in this paper...
Software plagiarism, an act of illegally copying others' code, has become a serious concern for honest software companies and the open source community. In this paper, we propose LoPD, a program logic based approach to software plagiarism detection. Instead of directly comparing the similarity between two programs, LoPD searches for any dissimilarity between two programs by finding an input that will...
This paper addresses the issue of potential bias in VAA generated data. Specifically, we report the findings from a study whereby a VAA questionnaire was administered through two different modes. One group consisted of participants who filled an online version of the VAA while the other consisted of participants elicited through a traditional survey. We find that there is differential respondent behaviour...
Software testing plays an important role in ensuring software quality by running a program with test suites. Mutation testing is designed to evaluate whether a test suite is adequate in detecting faults. Due to the expensive cost of mutation testing, selective mutation testing was proposed to select a subset of mutants whose effectiveness is similar to the whole set of generated mutants. Although...
This paper presents work in development of a question answering (QA) system by using a combination of two different architectures i.e. the one used relevant documents and another used rule-based method, which those two contribute for answer extraction. Base on previous researches testing result, it could be inferred that each of the methods could be a complement for another method in order to increase...
SQL injection attack poses a serious security threats among the Internet community nowadays and it's continue to increase exploiting flaws found in the Web applications. In SQL injection attack, the attackers can take advantage of poorly coded web application software to introduce malicious code into the system and/or could retrieve important information. Web applications are under siege from cyber...
Although the literature on mobile web usability is growing rapidly, there have not been any systematic and methodical efforts to review it. Here, a systematic literature review is presented on primary studies related to mobile web usability. A total of 35 papers are identified through search engines, which is then pruned to 19 papers directly related to our research. Various challenges for mobile...
The Stream Control Transmission Protocol (SCTP) is a transport layer protocol introduced to complement the well known User Datagram Protocol (UDP) and the Transmission Control Protocol (TCP). The current implementation of SCTP heavily leverages some existing mature techniques from TCP. This paper studies the effect that RTOmin (retransmission timeout minimum) has on the selective acknowledgement (SACK),...
This presentation describes a JFLAP augmentation to allow for conformance testing algorithms of communication protocols modeled as Mealy machine. This allows students to better understand conformance testing through demonstration, avoiding laborious, error prone calculations of the various algorithms.
Toshiba invented an electrical current detection type of DNA (deoxyribonucleic acid) chip technology, and holds the basic patent. However, penetration has not been quick. The reason lies in the difficulties found in the business model for medical DNA testing of the human body. Difficulties concerning a social consensus on genetic testing, finding applications, and pharmaceutical approval are major...
We consider managerial decision-making regarding the evolution of knowledge in a three-stage new product development project. The manager invests in knowledge development activities (such as prototyping, pilot line testing, ramp-up experiments) at each stage throughout the project. The links between development activities at different stages are captured by recognizing that, as a result of knowledge...
Computational science and complex system administration relies on being able to model user interactions. When it comes to managing HPC, HTC and grid systems user workloads - their job submission behaviour, is an important metric when designing systems or scheduling algorithms. Most simulators are either inflexible or tied in to proprietary scheduling systems. For system administrators being able to...
In model-based design of cyber-physical systems, such as switched mixed-signal circuits or software-controlled physical systems, it is common to develop a sequence of system models of different fidelity and complexity, each appropriate for a particular design or verification task. In such a sequence, one model is often derived from the other by a process of simplification or implementation. E.g. a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.