eve

Enhancing Software Development Process Using Automated Adaptation of Object Ensembles. (arXiv:2005.03241v1 [cs.SE])

Software development has been changing rapidly. This development process can be influenced through changing developer friendly approaches. We can save time consumption and accelerate the development process if we can automatically guide programmer during software development. There are some approaches that recommended relevant code snippets and APIitems to the developer. Some approaches apply general code, searching techniques and some approaches use an online based repository mining strategies. But it gets quite difficult to help programmers when they need particular type conversion problems. More specifically when they want to adapt existing interfaces according to their expectation. One of the familiar triumph to guide developers in such situation is adapting collections and arrays through automated adaptation of object ensembles. But how does it help to a novice developer in real time software development that is not explicitly specified? In this paper, we have developed a system that works as a plugin-tool integrated with a particular Data Mining Integrated environment (DMIE) to recommend relevant interface while they seek for a type conversion situation. We have a mined repository of respective adapter classes and related APIs from where developer, search their query and get their result using the relevant transformer classes. The system that recommends developers titled automated objective ensembles (AOE plugin).From the investigation as we have ever made, we can see that our approach much better than some of the existing approaches.




eve

Football High: Helmets Do Not Prevent Concussions

Despite the improvements in helmet technology, helmets may prevent skull fractures, but they do not prevent concussions.




eve

6 Best CMS Software for Website Development & SMBs

Are you looking for a content management system (CMS) that will help you create the digital content you need? With so many options on the market, it’s challenging to know which one is the best CMS software for your business. On this page, we’ll take a look at the six best CMS’s for website development […]

The post 6 Best CMS Software for Website Development & SMBs appeared first on WebFX Blog.




eve

Syncing Local Alexa Skills JSON Files With Alexa Developer Console Settings

In the Alexa Skills for Node.JS ASK SDK development world, the Alexa Skills Kit (ASK) Command-Line Interface (CLI) is one of the most overlooked tools.

Boosting Developer Productivity

With proper use, one could really increase productivity when developing Alexa Skills. This is especially so if you are creating many Alexa Skills, either because you are in the learning process or you are just managing multiple Alexa Skills projects for yourself or your clients.




eve

.NET Development Tools for Smart Development in 2020

.NET is indeed an important application development platform, as it's secure, robust, and quite easy to learn and implement. Developers are widely using the .NET framework to build web applications and even modernize legacy programming based applications into .NET-based ones. .NET developers also use many third-party tools to carry out development. These tools have proven to provide the best support for development.

Here are some of the top useful tools being used by many.NET development teams, .NET developers, individual .NET programmers, etc.




eve

Dozens of Spokane, Coeur d'Alene events canceled due to public health concerns over COVID-19

After Governor Jay Inslee announced a prohibition on gatherings of 250 people or more in three Washington counties (Snohomish, King, Pierce) on Wednesday, and with public health concerns growing over the COVID-19 pandemic, many organizations in Spokane are following suit. The Inlander will be frequently updating its online calendar of events to reflect local cancelations as we hear of them.…



  • Culture/Arts & Culture

eve

Someone's dead and everyone's a suspect in the slight but engaging all-star whodunit Knives Out

[IMAGE-1] Watching Rian Johnson's Knives Out, I was reminded of my middle school English teacher Mrs. Soderbergh, who loved Agatha Christie books almost as much as she loved diagramming sentences. There was a week when she brought in a box stacked high with her own Christie paperbacks, set it down in front of the classroom and had each of us pick a book based solely on the plot summary on the back.…



  • Film/Film News

eve

Jumanji: The Next Level continues a one-joke franchise that wasn't all that funny to begin with

[IMAGE-1]Welcome back to the jungle. And welcome to an unfortunate new Christmas movie tradition: the Jumanji movie.…



  • Film/Film News

eve

Everyone sees dead people in the droll Irish horror-comedy Extra Ordinary

Ever since Ghostbusters, the go-to tactic for supernatural comedy is to show characters experiencing remarkable, seemingly impossible things and yet reacting with the kind of mild bemusement you get watching someone successfully parallel park.…



  • Film/Film News

eve

Health Officials Recommended Canceling Events with 10-50 People. Then 33,000 Fans Attended a Major League Soccer Game.

As COVID-19 fears grew, public officials and sports execs contemplated health risks — and debated a PR message — but let 33,000 fans into a Seattle Sounders soccer match, emails show. By Ken Armstrong, ProPublica, and David Gutman and Lewis Kamb, The Seattle Times On March 6, at 2:43 p.m., the health officer for Public Health — Seattle & King County, the hardest-hit region in the first state to be slammed by COVID-19, sent an email to a half-dozen colleagues, saying, “I want to cancel large group gatherings now.”…



  • News/Local News

eve

The Fox Theater cancels all events, including Spokane Symphony concerts, through April 10

As the threat of the Coronavirus spreads throughout the country, public events everywhere are being canceled and postponed for public safety concerns. The Fox Theater is the latest venue to follow suit, closing its doors and canceling all events through April 10.…




eve

Food banks prepare to feed far more as COVID-19 disrupts America's food system at every level

At every level of America's food system, mandated closures and outbreaks of COVID-19 have interrupted the finely tuned network that normally gets food from farmers and food processors to restaurants, grocery stores and food banks.…



  • News/Local News

eve

Live stream the University of Idaho's short film festival on Friday evening

Every spring, audiences in Moscow are typically congregating for the Kino Short Film Festival, an evening of shorts made by the University of Idaho's senior film students. Things being as they are, the Kenworthy Theater won't be open for this year's event, but the U of I will be streaming a virtual version this Friday, May 8, at 6 pm.…



  • Film/Film News

eve

Beautiful and functional outdoor spaces can encourage more time spent outside, whether cooking, relaxing or even watching TV

Warm summer nights are on the way.…




eve

The Pacific Northwest Inlander | News, Politics, Music, Calendar, Events in Spokane, Coeur d'Alene and the Inland Northwest, Inlander

The Inlander is a community newspaper covering news, politics, events, happy hour, everything that's happening today, things to do on the weekend, in Spokane, Coeur d'Alene, the greater Inland Northwest and beyond.




eve

North Idaho's Best Charity Event: The Showcase

The Showcase celebrity golf tournament attracts big-time athletes and pop stars each year.…




eve

Sugar, spice and everything nice, plus where to find it locally this Valentine's Day

Don't be caught empty-handed (or empty-hearted) this Valentine's Day, coming up Friday, Feb. 14.…



  • Food/Food News

eve

GOOD NEWS: These local insects never murdered anybody that we know of

Last week, the New York Times dropped a terrifying story: Asian Giant Hornets, or "murder hornets" as more J. Jonah Jameson-esque researchers like to call them, have been identified in Western Washington. These insects can grow up to 2 inches long, can rip the heads off an entire hive of honeybees in a matter of hours, and have dagger-like stingers that pierce beekeeper suits to deliver a sting that sears like molten acid.…



  • News/Local News

eve

Anti-microbial and anti-static surface treatment agent with quaternary ammonium salt as active ingredient and method for preventing static electricity in polymer fibers using same

Provided are an anti-static and anti-microbial surface treatment agent including a quaternary ammonium salt compound as an active ingredient and a method of preventing a polymer fiber from developing static electricity by using the surface treatment agent. The quaternary ammonium salt compound has excellent anti-static and anti-microbial effects for the prevention or improvement of static electricity in a polymer fiber. Accordingly, the quaternary ammonium salt compound is suitable for use as a fabric softener, or an anti-static agent, and also, provides anti-microbial effects to a polymer fiber.




eve

Modeling of time-variant threshability due to interactions between a crop in a field and atmospheric and soil conditions for prediction of daily opportunity windows for harvest operations using field-level diagnosis and prediction of weather conditions an

A modeling framework for evaluating the impact of weather conditions on farming and harvest operations applies real-time, field-level weather data and forecasts of meteorological and climatological conditions together with user-provided and/or observed feedback of a present state of a harvest-related condition to agronomic models and to generate a plurality of harvest advisory outputs for precision agriculture. A harvest advisory model simulates and predicts the impacts of this weather information and user-provided and/or observed feedback in one or more physical, empirical, or artificial intelligence models of precision agriculture to analyze crops, plants, soils, and resulting agricultural commodities, and provides harvest advisory outputs to a diagnostic support tool for users to enhance farming and harvest decision-making, whether by providing pre-, post-, or in situ-harvest operations and crop analyzes.




eve

Systems and methods for classifying documents for data loss prevention

A computer-implemented method for classifying documents for data loss prevention may include 1) identifying training documents for a machine learning classifier configured for data loss prevention, 2) performing a semantic analysis on training documents to identify topics within the set training documents, 3) applying a similarity metric to the topics to identify at least one unrelated topic with a similarity to the other topics within the plurality of topics, as determined by the similarity metric, that falls below a similarity threshold, 4) identifying, based on the semantic analysis, at least one irrelevant training document within the set of training documents in which a predominance of the unrelated topic is above a predominance threshold, and 5) excluding the irrelevant training document from the set of training documents based on the predominance of the unrelated topic within the irrelevant training document. Various other methods, systems, and computer-readable media are also disclosed.




eve

System and method for using cluster level quorum to prevent split brain scenario in a data grid cluster

A system and method is described for use with a data grid cluster, which uses cluster quorum to prevent split brain scenario. The data grid cluster includes a plurality of cluster nodes, each of which runs a cluster service. Each cluster service collects and maintains statistics regarding communication flow between its cluster node and the other cluster nodes in the data grid cluster. The statistics are used to determine a status associated with other cluster nodes in the data grid cluster whenever a disconnect event happens. The data grid cluster is associated with a quorum policy, which is defined in a cache configuration file, and which specifies a time period that a cluster node will wait before making a decision on whether or not to evict one or more cluster nodes from the data grid cluster.




eve

Lipid compositions for the treatment of gastro-intestinal disorders and the promotion of intestinal development and maturation

The present invention provides a use of a lipid composition for the preparation of a nutritional, pharmaceutical or nutraceutical composition or a functional food, for the prevention and treatment of gastrointestinal diseases and disorders, and for promoting intestinal development, maturation, adaptation and differentiation.




eve

Methods for removing weakly basic nitrogen compounds from a hydrocarbon stream using basic molecular sieves

Disclosed is a method for removing weakly basic nitrogen compounds from a hydrocarbon feed stream by contacting the hydrocarbon feed stream with a basic catalyst to convert a portion of the weakly basic nitrogen compounds to basic nitrogen compounds. The method also includes contacting the hydrocarbon feed stream with an acidic adsorbent to adsorb the basic nitrogen compounds from the stream. The hydrocarbon feed stream comprises an aromatic compound and a weakly basic nitrogen compound.




eve

Use of phosphorus modified molecular sieves in conversion of organics to olefins

A method of making light olefins in a combined XTO (organics to olefins) and OCP (olefins cracking) process, from an oxygen-containing, halogenide-containing, or sulphur-containing organic feedstock contacted with a catalyst in a first reactor to convert the feedstock into a reactor effluent comprising light olefins and a heavy hydrocarbon fraction; separating the light olefins from the heavy hydrocarbon fraction, then contacting the heavy hydrocarbon fraction in a second reactor with a catalyst to convert a portion of the heavy hydrocarbons into light olefins; wherein the catalyst is a zeolite selected among a H+ or NH4+—form of MFI, MEL, FER, MOR, or clinoptilolite; modifying the zeolite by adding from 0.05 to 7 wt % of phosphorous to the zeolite, and an optional washing and/or drying in either order, then calcination. In an embodiment, the initial zeolite Si:Al atomic ratio of at least one catalyst is 100 or less.




eve

Avoiding processing flaws in a computer processor triggered by a predetermined sequence of hardware events

A system, method and computer program product for avoiding a processing flaw in a computer processor triggered by a predetermined sequence of hardware events. The system may include a detecting unit and a power-on reset unit. The detecting unit detects that the predetermined sequence of hardware events is going to occur at the computer processor. The power-on reset unit initializes the computer processor to a state stored in computer memory in response to detecting the sequence of hardware events.




eve

Preventing disturbance induced failure in a computer system

A method to prevent failure on a server computer due to internally and/or externally induced shock and/or vibration. The method includes acquiring, by at least one sensor, analog acceleration data of components in a server computer. The data is then converted to digital format and stored within a motor drive assembly processor memory unit. The processor analyzes the stored data for existence of machine degradation. In response to detecting the existence of machine degradation, the motor drive assembly processor initiates remediation procedures. The remediation procedures include controlling rotating speed of moving devices or performing a complete system shut down.




eve

Detecting effect of corrupting event on preloaded data in non-volatile memory

A method includes determining a read threshold voltage corresponding to a group of storage elements in a non-volatile memory that includes a three-dimensional (3D) memory of a data storage device. The method also includes determining an error metric corresponding to data read from the group of storage elements using the read threshold voltage. The method includes comparing the read threshold voltage and the error metric to one or more criteria corresponding to a corrupting event.




eve

Methods for generating multi-level pseudo-random sequences

A method for generating multi-level (or multi-bit) pseudo-random sequences is disclosed. This embodiment relates to communication systems, and more particularly to generating multi-level pseudo random symbol sequence. Present day systems do not employ effective mechanisms for generation of multi level PRBS in order to increase the data communication rates. Further, these systems do not cover all the possible transitions for the outputs of the system. The proposed system employs mechanisms in order to generate PRBS signals for producing multi levels signals to the electronic components. The mechanism employs alternate bit tapping techniques. In the alternate bit tapping technique, bits are tapped alternatively to determine the current state and the next state of the system. In addition, the mechanism also covers all the possible states of the output vector with transitions between the output states. This ensures that high data rates are obtained for a given bandwidth of operation.




eve

System and method to process event reporting in an adapter

Method and system for an adapter is provided. The adapter includes a plurality of function hierarchies, with each function hierarchy including a plurality of functions and each function being associated with an event. The adapter also includes a plurality of processors for processing one or more events generated by the plurality of functions. The adapter further includes a first set of arbitration modules, where each arbitration module is associated with a function hierarchy and receives interrupt signals from the functions within the associated function hierarchy and selects one of the interrupt signals. The adapter also includes a second set of arbitration modules, where each arbitration module receives processor specific interrupt signals and selects one of the interrupt signals for processing an event associated with the selected interrupt signal.




eve

System and method for event-driven prioritization

Methods include receiving at a receiving device a plurality of reports, each corresponding to at least one item and comprising data associated with one or more performance metrics. The methods further include identifying events for each report corresponding to at least one item using the data in the report. In addition, the methods include determining a report score for each report based on a number and type of the identified events. The methods also include outputting the report scores.




eve

Virtualization and dynamic resource allocation aware storage level reordering

A system and method for reordering storage levels in a virtualized environment includes identifying a virtual machine (VM) to be transitioned and determining a new storage level order for the VM. The new storage level order reduces a VM live state during a transition, and accounts for hierarchical shared storage memory and criteria imposed by an application to reduce recovery operations after dynamic resource allocation actions. The new storage level order recommendation is propagated to VMs. The new storage level order applied in the VMs. A different storage-level order is recommended after the transition.




eve

System for accessing a register file using an address retrieved from the register file

A data processing system and method are disclosed. The system comprises an instruction-fetch stage where an instruction is fetched and a specific instruction is input into decode stage; a decode stage where said specific instruction indicates that contents of a register in a register file are used as an index, and then, the register file pointed to by said index is accessed based on said index; an execution stage where an access result of said decode stage is received, and computations are implemented according to the access result of the decode stage.




eve

Virtualization support for branch prediction logic enable / disable at hypervisor and guest operating system levels

A hypervisor and one or more guest operating systems resident in a data processing system and hosted by the hypervisor are configured to selectively enable or disable branch prediction logic through separate hypervisor-mode and guest-mode instructions. By doing so, different branch prediction strategies may be employed for different operating systems and user applications hosted thereby to provide finer grained optimization of the branch prediction logic for different operating scenarios.




eve

Generating hardware events via the instruction stream for microprocessor verification

A processor receives an instruction operation (OP) code from a verification system. The instruction OP code includes instruction bits and forced event bits. The processor identifies a forced event based upon the forced event bits, which is unrelated to an instruction that corresponds to the instruction bits. In turn, the processor executes the forced event.




eve

Enhanced instruction scheduling during compilation of high level source code for improved executable code

Systems and methods for static code scheduling are disclosed. A method can include receiving an intermediate representation of source code, building a directed acyclic graph (DAG) for the intermediate representation, and creating chains of dependent instructions from the DAG for cluster formation. The chains are merged into clusters and each node in the DAG is marked with an identifier of a cluster it is part of to generate a marked instruction DAG. Instruction DAG scheduling is then performed using information about the clusters to generate an ordered intermediate representation of the source code.




eve

Systems and methods for monitoring product development

A computer-implemented method is provided for evaluating team performance in a product development environment. The method includes receiving a plurality of points of effort made by a team over a plurality of days in a time period, computing a slope associated with a line of best fit through the plurality of points of effort over the plurality of days, computing a deviation of the slope from an ideal slope corresponding to a desired performance rate for the team, and generating a display illustrating at least one of the slope, the ideal slope or the deviation.




eve

Conducting verification in event processing applications using formal methods

A method of applying formal verification methodologies to event processing applications is provided herein. The method includes the following stages: representing an event processing application as an event processing network, being a graph with event processing agents as nodes; generating a finite state machine based on the event processing network, wherein the finite state machine is an over-approximation of the event processing application; expressing stateful rules and policies that are associated with the event processing application using temporal logic, to yield a temporal representation of the event processing application; combining the temporal representation and the finite state machine into a model; generating a statement associated with a user-selected verification-related property of the event processing application, wherein the statement is generated using the temporal representation; and applying the statement to the model, to yield an indication for: (i) a correctness of the statement or (ii) a counter example, respectively.




eve

Compound versioning and identification scheme for composite application development

The present invention provides a method, a system and a computer program product for defining a version identifier of a service component. The method includes determining various specification levels corresponding to the service component. Thereafter, the determined specification levels are integrated according to a predefined hierarchy to obtain the version identifier of the service component. The present invention also enables the identification of the service components. The service components are identified from one or more service components on the basis of one or more user requirements.




eve

Program module applicability analyzer for software development and testing for multi-processor environments

In one embodiment, a machine-implemented method programs a heterogeneous multi-processor computer system to run a plurality of program modules, wherein each program module is to be run on one of the processors The system includes a plurality of processors of two or more different processor types. According to the recited method, machine-implemented offline processing is performed using a plurality of SIET tools of a scheduling information extracting toolkit (SIET) and a plurality of SBT tools of a schedule building toolkit (SBT). A program module applicability analyzer (PMAA) determines whether a first processor of a first processor type is capable of running a first program module without compiling the first program module. Machine-implemented online processing is performed using realtime data to test the scheduling software and the selected schedule solution.




eve

Vehicle event recorder systems and networks having integrated cellular wireless communications systems

Vehicle event recorder systems are arranged to be in constant communication with remote servers and administrators via mobile wireless cellular networks. Vehicle event recorders equipped with video cameras capture video and other data records of important events relating to vehicle use. These data are then transmitted over special communications networks having very high coverage space but limited bandwidth. A vehicle may be operated over very large region while maintaining continuous communications connections with a remote fixed server. As such, systems of these inventions may be characterized as including a mobile unit having: a video camera; a microprocessor; memory; an event trigger; and mobile wireless transceivers, and a fixed network portion including: mobile wireless cellular network, a protocol translation gateway, the Internet and an application-specific server.




eve

Method and apparatus for generating gate-level activity data for use in clock gating efficiency analysis

A mechanism for generating gate-level activity data for use in clock gating efficiency analysis of an integrated circuit (IC) design is provided. Generating the gate-level activity data includes generating a signal behaviour description for inter-register signals, generating a gate-level netlist for the IC design, generating gate-level stimuli based at least partly on the generated signal behaviour description, and performing gate-level simulation using the generated gate-level stimuli to generate gate-level activity data for the IC design. In one embodiment, generating the signal behaviour description includes performing Register Transfer Level (RTL) simulation of the IC design, and generating the gate-level netlist includes performing RTL synthesis. The RTL simulation and RTL synthesis are performed on RTL data for the IC design.




eve

Defect injection for transistor-level fault simulation

Aspects of the invention relate to techniques of defect injection for transistor-level fault simulation. A circuit element in a circuit netlist of a circuit is first selected for defect injection. Next, a defect is determined based on whether the selected circuit element is a design-intent circuit element or a parasitic circuit element. After the defect is determined, the defect is injected into the circuit netlist and then the circuit is simulated.




eve

Alert event notification

Alert event notifications may be provided by: displaying a first user interface layer including at least one user interface element configured to provide an alert event notification; displaying a second user interface layer such that at least a portion of the second user interface layer overlays the at least one user interface element configured to provide an alert event notification; detecting an alert event; and at least partially displaying the at least one user interface element configured to provide an alert event notification in an area where the at least a portion of the second user interface layer overlays the at least one user interface element configured to provide an alert event notification.




eve

Multi-lane time-synched visualizations of machine data events

A visualization can include a set of swim lanes, each swim lane representing information about an event type. An event type can be specified, e.g., as those events having certain keywords and/or having specified value(s) for specified field(s). The swim lane can plot when (within a time range) events of the associated event type occurred. Specifically, each such event can be assigned to a bucket having a bucket time matching the event time. A swim lane can extend along a timeline axis in the visualization, and the buckets can be positioned at a point along the axis that represents the bucket time. Thus, the visualization may indicate whether events were clustered at a point in time. Because the visualization can include a plurality of swim lanes, the visualization can further indicate how timing of events of a first type compare to timing of events of a second type.




eve

Systems and methods for dynamic development and deployment of computing applications using blueprints

Systems and methods for dynamic development and deployment of computing applications including a development framework, a visual design subsystem, and a deployment subsystem, where at runtime the deployment subsystem is operable to dynamically deploy a computing application realized by a blueprint by sending a request at runtime for graphs and components instantiated by the blueprint.




eve

Speech recognition apparatus with means for preventing errors due to delay in speech recognition

When a speech sound of at least a predetermined sound pressure is externally input while a time measurement is not being performed, a time measuring circuit starts a time measurement responsive to a signal from a speech detector. When another speech sound of at least a predetermined sound pressure is externally input while a time measurement is being performed by the time measuring circuit, a measurement time measured by the time measuring circuit at this moment is stored in a time information memory. After a predetermined time has elapsed, if a speech recognition circuit recognizes that the externally input speech sound is a "stop" command, the time measurement operation performed by the time measuring circuit is stopped, and the time information stored in the time information memory is read out and displayed as measurement time information on a display unit.




eve

Diurnal solar event triggering mechanism

A mechanism for determining whether the sun is visible at a diurnal solar event and for mechanically triggering actions based upon the sun being visible during the diurnal solar event is disclosed. The mechanisms of the invention can perform these operations without intervention or supervision for long periods of time. Certain embodiments have been applied to provide a diurnal solar event trigger based upon sidereal noon for a clock providing accurate timing for 10,000 years without intervention or supervision.




eve

Multilevel network for distributing trusted time and delegating levels of trust regarding timekeeping

A network is described for providing estimates of the current time. The network includes multiple computer systems each configured to provide an estimate of the current time in response to a received request. The computer systems are logically arranged to form a hierarchical structure, wherein the hierarchical structure includes multiple levels ranked with respect to one another. Each of the computer systems is assigned one of multiple levels of trust, and occupies one of the levels of the hierarchical structure dependent upon the assigned level of trust. The level of trust assigned to a given computer system is dependent upon a timekeeping dependability of the given computer system. The assigned level of trust may also be dependent upon a timekeeping security of the given computer system, where the timekeeping security is dependent upon a tamper resistance of the time clock of the given computer system. Methods for delegating a level of trust to a new computer system (i.e., a computer system not part of the network) and for adding a new computer system to the network are also described.




eve

Automatically preventing large block writes from starving small block writes in a storage device

A mechanism is provided in a storage device for performing a write operation. The mechanism configures a write buffer memory with a plurality of write buffer portions. Each write buffer portion is dedicated to a predetermined block size category within a plurality of block size categories. For each write operation from an initiator, the mechanism determines a block size category of the write operation. The mechanism performs each write operation by writing to a write buffer portion within the plurality of write buffer portions corresponding to the block size category of the write operation.