The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
GPGPUs have been widely used for improving the performance of algorithms, with many papers documenting high order speed ups. Leading companies and industries with high expectations to attain similar quality of results for their applications. On many cases, however, results can be misleading, as sufficient description is not presented to validate and replicate results. This paper evaluates the applicability...
This work describes a preparation strategy for first year Computer Science students at the Universidad Nacional de Nordeste. This work consisted of the development of a set of activities aimed at stimulating computational thinking through the use of playful tools with the goal of motivating students and also providing them with problem-solving skills that will facilitate the understanding of the basic...
Typical career development of engineers and scientists differs between countries. In some countries, people must pursue an industrial career before they become eligible for an academic one, in other countries people can start an academic career following their university graduation. This paper describes the experience of four faculty members of the Electrical and Computer Engineering Department at...
Video Games have become a core part of life for many and the industry is making millions. Video game principles are used in virtual reality and training scenarios for military applications. Courses in video Games are something that colleges should look into making. This paper is intended to be a course outline of an introductory course for students seeking to enter the industry.
This case study was conducted at a company engaged in the processing of palm oil into Crude Palm Oil (CPO). During this time, the company's factory is not operating effectively and efficiently. The production planning in the company is done with estimation that based on past demand. But the estimation made less effective because the companies are often faced with some situations such as incompatibility...
An increasing need to improve efficiency have been enforcing buyer companies to give more attention on their supplier. As one critical task within the company's supply chain management system, a proper supplier selection mechanism not only results in a more reliable and long term supplier-buyer partnership, but also provides opportunities to reduce various costs and realizes stable production. However,...
One of the most salient features of smart city is to utilize big data to make our lives more convenient and more intelligent. This is usually achieved through solving a series of large-scale common and fundamental problems such as linear systems of equations, linear programs, etc. However, it is a very challenging task for resource-limited clients and small companies to solve such problems as the...
Agile methods are attracting increasing industry and research interest; however, among studies that have investigated the use of agile methods, most have focused on developed countries (e.g., North America, Europe). The use of agile methods in Asian countries, particularly Thailand, is poorly understood and requires additional investigation. This paper presents findings on the adoption of agile methods...
In today's competitive operating environment one of the chief factors in success of outsourcing is the suppliers. Hence, it becomes imperative for an organization to choose suppliers carefully who cater to its needs. In this paper, we have developed a hybrid approach dedicated to supplier selection problem; this approach combines the correlation coefficient and standard deviation (CCSD) method and...
ITIL is a large collection of best practices, tools and methods used in the management and handling of IT services. It's composed of five books related to the most important IT management fields. In this paper, we will place the emphasis on the Service Operation field in ITIL and more precisely, on the incident management process used for managing the life cycle of IT incidents. The main idea is to...
This article includes the details of the experiment conducted at the University of the Balearic Islands related to organize a hackathon which involves interdisciplinary, Service-learning and enterprise internship. The goal of the activity is to increase the student motivation and their knowledges and skills. Results are analysed through post-test surveys.
The development and delivery of secure software is a challenging task, that gets even harder when the developer tries to adhere to both application and organization-specific security requirements translated into security guidelines. These guidelines serve as best practices or recommendations that help reduce application exposure to vulnerabilities, and provide hints about the application's adherence...
This paper studies a Stackelberg type bilevel programming model for a codeshare problem in a typical airline network. After model-building, the model is written into its KKT form and solved by using a penalty interior point algorithm. Finally, a medium-sized numerical example is given. From the numerical example, it is shown that by codesharing both parties will enjoy a considerable profit increase...
This experience report outlines how a participatory Sexism Response Workshop helped a diverse set of students in a large class have wide-ranging and open conversations about sexism. We ran the Sexism Response Workshop for a class of 92 undergraduate students, splitting the students into two groups to make the workshop manageable. The workshop was run by a theater facilitator and was based on Augusto...
This Event log file is the most common data-sets exploited by many companies for customer behavior analysis. Oftentimes these records are unordered, and need to be grouped by certain key for effective analysis. One such example is to group similar user with different session ID to facilitate further analysis. This kind of analysis is known as User Sessionization. In this paper, we propose a distributed...
Recent studies show that many companies have successfully adopted agile methodologies. In this paper the authors present results of their quantitative and qualitative studies, showing that only experienced companies apply agile collaboration practices properly. The studies also suggest that successful professional agile teams tend to use more collaboration practices and consciously live the agile...
Agile methodologies like Scrum or Extreme Programming have come a long way over the last fifteen years. Recent quantitative studies show that many companies have successfully adopted agile methodologies. It was found that in agile software development, experience leads to collaboration. It could also be shown that successful professional agile teams tend to use more collaboration practices. In 2013,...
The tremendous growth in IT companies is due to bringing high-quality software products in the market. Quality plays a very important role for the success of any software company. The inappropriate extraction of requirements causes failure of the software product. Thus to gain superior quality software product the primary goal is to excavate correct requirements. Researchers suggested Quality Function...
This paper presents on awareness issues among agile practitioners in implementing agile software development methodology. Data were collected from 36 respondents using a quick survey of agile practitioners at Agile Malaysia events. The results revealed the awareness problems affect the productivity of agile practitioners in implementing agile practices and misuse the agile practices. There are needs...
The rapid development in the IT area brings a series of shifts, in underlying theories, technology and work practices. In the normal course of events, most changes are evolutionary, with small, incremental improvements being made to theoretical understanding or practical application. Occasionally, however, changes occur of such magnitude that they do not just alter current operational practice but...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.