The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Plagiarism is a serious problem identified amongst research community. Plagiarism has been around for centuries, but with the use of Internet and easy access to material in electronic format has made it easier to plagiarize materials of others. On the other hand plagiarism detection is now as easy as plagiarizing a document. There are a number of anti-plagiarism software available either freely or...
The reach of information is now much easier and effective in the age of information technology. Electronic documents and resources have changed the entire paradigm of education and research. Students, teachers, professionals, academicians and researchers may get their information on their desktop/laptop/Smartphone through electronic platform. The availability of Information and Communication Technology...
Libraries support the parent institution's teaching, learning, and research programs irrespective of its nature being academic or corporate or Research and Development setup. Due to the impact of Information and Communication Technology (ICT), there has been a paradigm shift in the library services and the roles of information professionals. Librarians' role has been changed from information provider...
Building digital library applications is often a search for an applicable and adequate data or document model as well as for software tools which meets the requirements. Especially in digital archives, there are several data and document models to be considered. Unfortunately, there is no one-size-fits-all document model or system. For each application, the requirements and properties of a project...
As emerging technologies appear on the horizon of education every day, they are changing the world of teaching and research continuously with their adoption and integration into libraries, classrooms and research labs. Most of us are familiar with the libraries inside a lab, but hosting a lab inside a library holds tremendous potential for research and instruction. In this paper, we will feature a...
With the advent of Internet and new technologies variety of information sources are coming up. The thirst of information in R&D activities has become ever growing and ever demanding. The information is becoming more digital and people are getting easy access to abundant information which leads to the temptation of using and copying it and stealing other ideas without knowing the implications and...
UML Activity diagrams offer a very large set of constructs, however many of them seem scarcely used or even their existence is not known. Here, we present a precise view of the usage levels of these constructs by means of a survey, covering preliminarily books, courses, tutorials, and tools about UML. Results show that, among the 47 Activity diagrams constructs, a large majority of them seem to be...
Model Driven Engineering (MDE) gives new insights into software engineering and software development. This approach is quite new and it still is the subject of discussion concerning its efficiency and usefulness. However, MDE approach becomes more and more popular among researchers and developers. That is why it is being introduced into curricula by many universities. MDE proposes a new way of software...
UML modelling tools provide poor support for composite state machine code generation. Generated code is typically complex and large, especially for composite state machines. Existing approaches either do not handle this case at all or handle it by flattening the composite state machine into a simple one with a combinatorial explosion of states, and excessive generated code. This paper presents a new...
How to make software developers focus on building the basic infrastructure and enabling environment and the business users themselves configure the resources to fulfill their certain requirements is critical. To support rapid service coordination system, the method of redesigning and redeploying is needed. Business events are changes of state in enterprises or business correlated cases under the condition...
This paper describes a study that examines the effect of cohesion-based feedback on a team members' behaviors in a global software development project. Chat messages and forum posts were collected from a software development project involving students living in the US and Mexico. Half of the teams in the project received feedback in the form of a graphical representation that displayed the group's...
The existing method of teaching software engineering subjects is severely limited by scope, time and exposure to real world settings. As a result of which the significance of Software Development Processes (SDP) is not very well appreciated by students. Technical debt is the debt that the project incurs by missing any process/activity in the SDP. The idea of this paper is to impart the concept of...
Recommendation systems have the potential to support their users for filtering information and making a decision. They have become a promising research area over the past two decades in several domains. Software development field also gain benefit from the advancement of this technology. Recommendation systems specific to software engineering can facilitate their users in a wide range of activities,...
Greedy Forwarding algorithm is a widely-used routing algorithm for wireless networks. However, it can fail if the wireless network topologies contain voids, where a packet cannot be moved closer to destination. Since Yao graph and Theta graph are two types of geometric graphs exploited to construct wireless network topologies, this paper firstly studied whether these two types of graphs can contain...
Mobile comic is now evolving into an industry with great potential for its convenience, huge user base etc. A key challenge in mobile comic is to adapt the comic content to various mobile screens for better visual effect, which is also called image retargeting. Although a lot of works have been conducted in this area, most of them target on nature or natural-like images. However, cartoon images are...
Parallel coordinate is a popular tool for visualizing high-dimensional data and analyzing multivariate data. With the rapid growth of data size and complexity, data clutter in parallel coordinates is a major issue for Big Data visualization. This has given rise to three problems, 1) how to rearrange the parallel axes without the loss of data patterns, 2) how to shrink data attributes on each axis...
Mechatronics as an interdisciplinary field, which combines knowledge from multiple fields uses a comprehensive approach in the design of any technical object. It combines the requirements and their integration into all subsystems of the technical object. This approach, which is described by the VDI 2006 norm, can generally be used in the suggestion of regulation for the pressure pipe networks.
As the soul of the Software-Defined Networking (SDN), the quality of control plane applications determines the reliability of the networks. Unfortunately, better programmability in SDN increases the risk of bugs and challenges for testing. Because manually testing seems to be inefficient, automatic testing methods become promising alternative. Both white-box method with models and black-box method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.