In the two decades since the introduction of the X-ray scanner into radiology, medical imaging techniques have become widely established as essential tools in the diagnosis of disease. As a consequence of recent technological and... more
This report is a summary of all work experience I have been able to gather during my SIWES training programme at Roystech IT Solutions. The report contains my all my experience in front-end development in relation to HTML, CSS and... more
This report is a summary of all work experience I have been able to gather during my SIWES training programme at Roystech IT Solutions.
The report contains my all my experience in front-end development in relation to HTML, CSS and Bootstrap.
It also contains an overview of my one month teaching experience at Platform Schools.
In conclusion is a summary of what I learnt in my six months SIWES programme.
The ways in which informatics is covered in K-12 education vary among European countries. In Finland and Sweden, informatics is not included in the core curriculum, whereas, for example, in Lithuania, all students are exposed to some... more
The ways in which informatics is covered in K-12 education vary among European countries. In Finland and Sweden, informatics is not included in the core curriculum, whereas, for example, in Lithuania, all students are exposed to some informatics concepts starting in the fifth grade. Bebras is an annually arranged international informatics contest for K-12 level, resulting in a large collection of data about contestants and their results. In this paper, we analyse contest data from the Finnish, Swedish and Lithuanian 2013 contests, focusing on students' performance on tasks related to algorithmic thinking. Our findings suggest that despite coming from di↵erent educational systems, students perform rather similarly on the tasks. The same tasks are di cult and the thinking behind picking an incorrect answer seems rather similar throughout the countries. The analysis also points out that there is a lack of easy questions-this needs to be fixed in order to not risk scaring students away.
Responsiveness, the ability to provide real time behavior eveninpresence of faults, is becoming one of the most sought after properties in distributed computing systems. We present a framework for ''High-Performance Responsive... more
Responsiveness, the ability to provide real time behavior eveninpresence of faults, is becoming one of the most sought after properties in distributed computing systems. We present a framework for ''High-Performance Responsive Computing''i nn etworked systems whose current implementation works on a network of fiveN eXTSTEP (Mach 2.5)-based HP workstations. Within this paper we discuss the design issues behind the ''Unstoppable Orchestra''a nd showh ow our programming framework supports synchronization and re-configuration of responsive applications.
This paper provides a complete framework for thread migration using JPDA. In our framework neither we lose portability nor do we insert any artificial code. The system developed based on our framework needs no extra involvement of... more
This paper provides a complete framework for thread migration using JPDA. In our framework neither we lose portability nor do we insert any artificial code. The system developed based on our framework needs no extra involvement of programming to continue the whole migration system. It is a powerful autonomous system for heterogeneous environment maintaining its portability since Java Virtual Machine (JVM) is not modified.
This deliverable has been produced in the context of the Knowledge-Practice Laboratory (KPLab) project, which is aimed at facilitating innovative practices of working with knowledge in higher education, teacher training, and professional... more
This deliverable has been produced in the context of the Knowledge-Practice Laboratory (KPLab) project, which is aimed at facilitating innovative practices of working with knowledge in higher education, teacher training, and professional networks. This delverable is a synopsis of the first experiences encountered during the first 6 months of the work in WP10. WP10 focused on tools and practices where elicitation, capturing and creating knowledge in different representational modes aims to making them available for problem solving and collaborative knowledge advancement in professional networks. During the first 6 months the emphasis of work has been on the state-of-the-art research, organizing and negotiating the empirical cases with professional organizations and on the coevolutionary process of defining the requirements of KP-Lab tools and practices. State-ofthe- art research has concentrated on how In WP 10 we have started to refine the research approaches as there were no ready ...
In type-theoretic research on object-oriented programming, the issue of “covariance versus contravariance” is a topic of continuing debate. In this short note we argue that covariance and contravariance appropriately characterize two... more
In type-theoretic research on object-oriented programming, the issue of “covariance versus contravariance” is a topic of continuing debate. In this short note we argue that covariance and contravariance appropriately characterize two distinct and independent mechanisms. The so-called contravariance rule correctly captures the subtyping relation (that relation which establishes which sets of functions can replace another given set in every context ). A covariant relation, instead, characterizes the specialization of code (i.e., the definition of new code which replaces old definitions in some particular cases ). Therefore, covariance and contravariance are not opposing views, but distinct concepts that each have their place in object-oriented systems. Both can (and should) be integrated in a type-safe manner in object-oriented languages. We also show that the independence of the two mechanisms is not characteristic of a particular model but is valid in general, since covariant specia...
Based on their quantitative and qualitative investigations, the authors conclude that pair programming as a strategy for teaching student teachers could be made more effective through the incorporation of principles associated with... more
Based on their quantitative and qualitative investigations, the authors conclude that pair programming as a strategy for teaching student teachers could be made more effective through the incorporation of principles associated with cooperative learning. They substantiate this claim by referring to a literature study about the advantages and disadvantages of pair programming as a teaching-learning strategy, by then discussing five principles of cooperative learning, and by presenting the findings of their empirical study. Second year student teachers taking a Delphi programming module participated in an experiment conducted over a two year period. In 2005, the participants did computer programming in pairs without the application of principles associated with cooperative learning. In 2006, a similar group of participants also programmed in pairs, but in their case, certain principles associated with cooperative learning were incorporated in the strategy followed by the facilitator. According to a comparison of the module examination marks, the 2006 group outperformed the 2005 group. This finding was confirmed by qualitative investigations.
The Lidar (LIght Detection And Ranging) sensor produced by Siemens uses five infrared beams to detect targets up to a distance of approximately 250m. The paper describes the tests witch has been develop using our new software in order to... more
The Lidar (LIght Detection And Ranging) sensor produced by Siemens uses five infrared beams to detect targets up to a distance of approximately 250m. The paper describes the tests witch has been develop using our new software in order to visualize the detected targets. We used our program in the detection of different types of targets, placed at different distances and in different combinations. An important goal was to see how various meteorological conditions affect or do not affect the target detection. Other types of experiments were focused on low visibility conditions, different lighting conditions (natural, artificial, day, night).
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities. Since most developers are not experienced software security practitioners, a solution for correctly fixing SQL injection vulnerabilities that does not... more
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities. Since most developers are not experienced software security practitioners, a solution for correctly fixing SQL injection vulnerabilities that does not require security expertise is desirable. In this paper, we propose an automated method for removing SQL injection vulnerabilities from Java code by converting plain text SQL statements into prepared statements. Prepared statements restrict the way that input can affect the ...
Purpose -This paper aims to present the semantic content identifier (SCI), a permanent identifier, computed through a linear-time onion-peeling algorithm that enables the extraction of semantic features from a text, and the integration of... more
Purpose -This paper aims to present the semantic content identifier (SCI), a permanent identifier, computed through a linear-time onion-peeling algorithm that enables the extraction of semantic features from a text, and the integration of this information within the permanent identifier. Design/methodology/approach -The authors employ SCI to propose a mechanism for simultaneously checking the authenticity and degrees of similarity between different information objects, and present an empirical investigation of the method. A management scenario for the control of the authentication process and the detection of the degree of violation of documents is proposed. Findings -Such a mechanism could be adopted as a component of libraries' strategy for the protection of the copyrights for documents published on the web. Practical implications -The use of the proposed numeric code can be utilised efficiently as a constituent part of the digital object identifier (DOI) system, making its computation more efficient and meaningful. Originality/value -The identifier proposed in the paper can result in a more efficient index for identifying and retrieving objects in a digital library, as well as online repositories and commercial applications that can handle information retrieval requests more effectively.
Mobility support is an essential feature in communication networks nowadays. Telecom operators are facing challenges in elucidating the traffic in the network. In order to address the challenges of providing IP mobility in an IMS based... more
Mobility support is an essential feature in communication networks nowadays. Telecom operators are facing challenges in elucidating the traffic in the network. In order to address the challenges of providing IP mobility in an IMS based network, we are proposing TRIM architecture, a solution to support the mobility in IP networks with IMS, making mobility transparent to applications and to communication peers of mobile nodes. It provides optimal path to exchange data between end user applications. In this paper, we can enhance the performance by analysis of in home buffering and handover delay in Mobile nodes. This solution is deployed using Network Simulator 2 considering UDP and TCP traffic. The proposed mechanism provides ability to monitor the network states by collecting management data and maintain the network resources.
In questo articolo riportiamo i risultati di uno studio sulla relazione tra programmazione e apprendimento della matematica; in particolare, i processi legati al pensiero matematico e alla soluzione di problemi. Il pensiero computazionale... more
In questo articolo riportiamo i risultati di uno studio sulla relazione tra programmazione e apprendimento della matematica; in particolare, i processi legati al pensiero matematico e alla soluzione di problemi. Il pensiero computazionale e la programmazione richiedono che lo studente sia immerso e impegnato in un processo, in continuo cambiamento, di risoluzione di problemi. Nel nostro progetto di ricerca abbiamo utilizzato l’ambiente di programmazione visivo Scratch per introdurre i principi della programmazione e del pensiero computazionale. Gli studenti hanno lavorato su problemi aperti di loro ideazione. Le loro interazioni con gli insegnanti sono state registrate e analizzate. I risultati puntano nella direzione di un legame tra l’atto di programmare, la soluzione di problemi e le competenze matematiche.
The article describes requirements to educational programming languages and considers the use of Python as the first programming language. The issues of introduction of this programming language into teaching and replacing Pascal by... more
The article describes requirements to educational programming languages and considers the use of Python as the first programming language. The issues of introduction of this programming language into teaching and replacing Pascal by Python are examined. The advantages of such approach are regarded. The comparison of popular programming languages is represented from the point of view of their convenience of use for teaching algorithmization and programming.
Much research in traceability has focused on following requirements and features over the early phases of the software lifecycle. There has been comparatively little work on traceability into later phases and artifacts. In this paper, we... more
Much research in traceability has focused on following requirements and features over the early phases of the software lifecycle. There has been comparatively little work on traceability into later phases and artifacts. In this paper, we tackle the problem of traceability across artifacts, including documents and source code, and maintaining traceability links through successive changes. We have developed Zelda, a prototype for associating arbitrary lines in text-based files with a feature map. This representation can be used to link together sections from many types of artifacts and can also contain annotations and notes. Zelda automatically tracks and presents the locations of these links in subsequent versions of the artifacts. We evaluated Zelda using 25 versions of jEdit, (260 KLOC). The overall precision for 419 links across the five features was 0.90 and the recall was 0.73. The average precision and recall per features is 0.78 and 0.69 respectively.
Recently, Ahmadi and Tang (1991) demonstrated how various manufacturing problems can be modeled and solved as graph partitioning problems. They use Lagrangian relaxation of two different mixed integer programming formulations to obtain... more
Recently, Ahmadi and Tang (1991) demonstrated how various manufacturing problems can be modeled and solved as graph partitioning problems. They use Lagrangian relaxation of two different mixed integer programming formulations to obtain both heuristic solutions and lower bounds on optimal solution values. In this note, we point to certain inconsistencies in the reported results. Among other things, we show analytically that the first bound proposed is trivial (i.e., it can never have a value greater than zero) while the second is also trivial for certain sparse graphs. We also present limited empirical results on the behavior of this second bound as a function of graph density.
We present a logical framework for modeling and reasoning about the evolution of requirements. We demonstrate how a sufficiently rich meta level logic can formally capture intuitive aspects of managing changes to requirements models,... more
We present a logical framework for modeling and reasoning about the evolution of requirements. We demonstrate how a sufficiently rich meta level logic can formally capture intuitive aspects of managing changes to requirements models, while maintaining completeness and consistency. We consider a theory as the deductive closure of a given set of axioms and conclude that software engineering is concerned, in essence, with, building and managing large theories. This theory construction commences with the development of the requirements model which we view as a theory of some nonmonotonic logic. Requirements evolution then involves the mapping of one such theory to another. Exploiting the deductive power of the theory of belief revision and nonmonotonic reasoning we develop a formal description of this mapping, as well as the requirements engineering process itself. This work thus offers a rigorous approach to reasoning about requirements evolution and a important focus for defining semantically well founded methods and tools for the effective management of changing requirements
For children in primary schools, programming small robots is an amusing way to be introduced to technological activities. Core of our project is NQCBaby, an Italian based LOGO like language, pupil oriented rather than robot oriented:... more
For children in primary schools, programming small robots is an amusing way to be introduced to technological activities. Core of our project is NQCBaby, an Italian based LOGO like language, pupil oriented rather than robot oriented: indeed concepts are used from the child world. S. Papert said:"small robots programmed in LOGO language" [1993]. We had robots, but we had't a LOGO for robots. So, we want NQCBaby looks similar to Logo so that children already introduced to turtles feel at ease with robots and interestingly discuss on differences. In our activities pupils begin using a very simple language, the essence of NQCBaby, to interact with the simplest robot RCX and then progress to an enriched language as their assembly experiences advance. The constructive pedagogical methodology (and consequently our tools) structures pupils' learning of NQCBaby language in several steps starting with NQCBaby01 up to NQCBaby05, as new hardware components are introduced to build different robots. Meanwhile children are introduced to NQC, the "true" robot language, by looking at how their descriptions of the robots behaviors are translated in NQC, "in order to be understood". This step-by-step learning activity is coordinated with children knowledge of their native language thus helping a correct development of linguistic and logical abilities in their first steps. A software environment, based on a precompiler from NQCBaby to NQC, is currently being developed for supporting the project principles where learning evolves from NQCBaby01 to NQCBaby05.
The global move toward reducing the usage of lead in electronics manufacturing industry is driving the industry to switch from tin-lead alloys to pure tin (Sn) for its component plating process. This transition has resulted in a... more
The global move toward reducing the usage of lead in electronics manufacturing industry is driving the industry to switch from tin-lead alloys to pure tin (Sn) for its component plating process. This transition has resulted in a reliability concern due to the formation of conductive Sn whiskers, which can grow from the component after the plating process within a few hours to months, with their length ranging from 10 micrometers up to several millimeters. The conductive Sn whiskers may cause current leakage or short circuits, leading to catastrophic failure in the field. This paper presents the results of an experimental study on Sn whisker formation based on the effects of annealing for 1 h at 150°C and environmental test conditions from the joint electron devices engineering council standards. This paper consisted of one temperature cycling test and two isothermal storage tests. The characterization results obtained confirm that temperature cycling and isothermal storage favor the formation of whiskers on Sn-plated copper lead frames. The average maximum length of the whiskers increased with the number of temperature cycles and duration of isothermal storage. It is also shown that annealing for 1 h at 150°C of the samples is effective in reducing the average maximum length of whiskers. Growth mechanisms of the Sn whiskers due to the effects of annealing and without annealing are also discussed.
The challenge for the metaobject protocol designer is to balance the conflicting demands of efficiency, simplicity, and extensibility. It is impossible to know all desired extensions in advance; some of them will require greater... more
The challenge for the metaobject protocol designer is to balance the conflicting demands of efficiency, simplicity, and extensibility. It is impossible to know all desired extensions in advance; some of them will require greater functionality, while others require greater efficiency. In addition, the protocol itself must be sufficiently simple that it can be fully documented and understood by those who need to use it. This paper presents a metaobject protocol for EuLisp which provides expressiveness by a multi-leveled protocol and achieves efficiency by static semantics for predefined metaobjects and modularizing their operations. The EuLisp module system supports global optimizations of metaobject applications. The metaobject system itself is structured into modules, taking into account the consequences for the compiler. It provides introspective operations as well as extension interfaces for various functionalities, including new inheritance, allocation and slot access semantics. ...
Introduction: With the rapid deployment of embedded databases across a wide range of embedded devices such as mobile devices, Internet of Things (IoT) devices, etc., the amount of data generated by such devices is also growing... more
Introduction: With the rapid deployment of embedded databases across a wide range of embedded devices such as mobile devices, Internet of Things (IoT) devices, etc., the amount of data generated by such devices is also growing increasingly. For this reason, the performance is considered as a crucial criterion in the process of selecting the most suitable embedded database management system to be used to store/ retrieve data of these devices. Currently, many embedded databases are available to be utilized in this context. Materials and Methods: In this paper, four popular open-source relational embedded databases; namely, H2, HSQLDB, Apache Derby, and SQLite have been compared experimentally with each other to evaluate their operational performance in terms of creating database tables, retrieving data, inserting data, updating data, deleting data. Results and Discussion: The experimental results of this paper have been illustrated in Table 4. Conclusions: The experimental results and analysis showed that HSQLDB outperformed other databases in most evaluation scenarios.
This paper presents a novel application involving two important Software Engineering research areas: process modeling and software reuse. The Spiral Model is a risk-driven process model, which, depending on the specific risks associated... more
This paper presents a novel application involving two important Software Engineering research areas: process modeling and software reuse. The Spiral Model is a risk-driven process model, which, depending on the specific risks associated with a given project, may be tailored to create a project-specific process model. The software reuse area is that of domain modeling of families of systems, which capture the similarities and variations among the members of the family. The domain modeling approach is used to create a domain model of a Spiral Process Model (SPM), thereby capturing the similarities and variations among a family of process models. The SPM domain model has been extended to capture the key process areas of the Software Engineering Institute's Capability Maturity Model. The domain model is used to generate projectspecific process models.
Model-based selective regression testing promises reduction in cost and labour by selecting a subset of the test suite corresponding to the modifications after system evolution. However, identification of modifications in the systems and... more
Model-based selective regression testing promises reduction in cost and labour by selecting a subset of the test suite corresponding to the modifications after system evolution. However, identification of modifications in the systems and selection of corresponding test cases is challenging due to interdependencies among models. State-based testing is an important approach to test the system behaviour. Unfortunately the existing state-based regression testing approaches do not care for dependencies of the state machine with other system models. This paper presents the tool support and evaluation of our statebased selective regression testing methodology for evolving state-based systems. START is an Eclipsebased tool for state-based regression testing compliant with UML 2.1 semantics. START deals with dependencies of state machines with class diagrams to cater for the change propagation. We applied the START on a case study and our results show significant reduction in the test cases ...
and an instructor with the Media Psychology graduate program at Fielding Graduate University. He has been writing, speaking, teaching, and researching in the area of technological change for 25 years.
Assessment of the economic value of software systems is useful in contexts such as capitalization on the balance sheet and due diligence prior to acquisition. Current accounting practice in determining software value is based on the cost... more
Assessment of the economic value of software systems is useful in contexts such as capitalization on the balance sheet and due diligence prior to acquisition. Current accounting practice in determining software value is based on the cost spent in software development. This approach fails to account for the efficiency with which software has been produced or the quality of the product. This paper proposes three alternative models for determining the production value of software, based on the notions of technical debt and interest. We applied the models to 367 proprietary systems developed by a range of different organisations using a range of different programming languages. We present the valuation results and discuss the weaknesses and strengths of the models.
This is the slide deck for my presentation done during confeRence 2018, a R user group conference hosted in Malaysia. It describes the state of R Studio Cloud circa October 2018
Scheduling surgical specialties in a medical facility is a very complex process. The choice of schedules and resource availability impact directly on the number of patients treated by specialty, cancellations, wait times, and the overall... more
Scheduling surgical specialties in a medical facility is a very complex process. The choice of schedules and resource availability impact directly on the number of patients treated by specialty, cancellations, wait times, and the overall performance of the system. In this paper we present a system-wide model developed to allow management to explore trade-offs between OR availability, bed capacity, surgeons’ booking privileges, and wait lists. We developed a mixed integer programming model to schedule surgical blocks for each specialty into ORs and applied it to the hospitals in a British Columbia Health Authority, considering OR time availability and post-surgical resource constraints. The results offer promising insights into resource optimization and wait list management, showing that without increasing post-surgical resources hospitals could handle more cases by scheduling specialties differently.
Linear permissions have been proposed as a lightweight way to specify how an object may be aliased, and whether those aliases allow mutation. Prior work has demonstrated the value of permissions for addressing many software engineering... more
Linear permissions have been proposed as a lightweight way to specify how an object may be aliased, and whether those aliases allow mutation. Prior work has demonstrated the value of permissions for addressing many software engineering concerns, including information hiding, protocol checking, concurrency, security, and memory management.
N-version programming has been proposed as a method of incorporating fault tolerance into software. Multiple versions of a program (i.e. ''N'') are prepared and executed in parallel. Their outputs are collected and examined by a voter,a... more
N-version programming has been proposed as a method of incorporating fault tolerance into software. Multiple versions of a program (i.e. ''N'') are prepared and executed in parallel. Their outputs are collected and examined by a voter,a nd, if theya re not identical, it is assumed that the majority is correct. This method depends for its reliability improvement on the assumption that programs that have been developed independently will fail independently.I nt his paper an experiment is described in which the fundamental axiom is tested. Atotal of twenty sevenversions of a program were prepared independently from the same specification at twou niversities and then subjected to one million tests. The results of the tests revealed that the programs were individually extremely reliable but that the number of tests in which more than one program failed was substantially more than expected. The results of these tests are presented along with an analysis of some of the faults that were found in the programs. Background information on the programmers used is also summarized. The conclusion from this experiment is that N-version programming must be used with care and that analysis of its reliability must include the effect of dependent errors.
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to... more
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to commercial products such as Microsoft Office Suite and Adobe Photoshop. Second, creating Virtual Machines (VMs) is another avenue to teach complex concepts in computer science, engineering, and Information Technology (IT). Third, cloud computing is an inexpensive way for clients to access information from multiple locations and devices. Fourth, universities can use the Operating System (OS) Linux and its various distributions as replacements for commercial operating systems like Windows in order to reduce IT costs. Lastly, open source programming languages like Python and their associated Integrated Development Environments (IDEs) provide comprehensive facilities for software engineers for application development or testing.
In programming it is often necessary to split a string into pieces for processing. Often a long numeric value is entered and it may be necessary to separate each digit or the decimal portion from the whole portion for processing. Using... more
In programming it is often necessary to split a string into pieces for processing. Often a long numeric value is entered and it may be necessary to separate each digit or the decimal portion from the whole portion for processing. Using the Java split method it is possible to split a string value into it's individual components. This is a demonstration of the Java .split method.
This paper describes an experimental comparison of two reading techniques, namely Checklist-based reading (CBR) and Perspective-based reading (PBR) for Object-Oriented (OO) design inspection. Software inspection is an effective approach... more
This paper describes an experimental comparison of two reading techniques, namely Checklist-based reading (CBR) and Perspective-based reading (PBR) for Object-Oriented (OO) design inspection. Software inspection is an effective approach to detect defects in the early stages of the software development process. However, inspections are usually applied for defect detection in software requirement documents or software code modules, and there is a significant lack of information how inspections should be applied to OO design documents. The comparison was performed in a controlled experiment with 59 subject students. The results of individual data analysis indicate that a) defect detection effectiveness using both inspection techniques is similar (PBR:69%, CBR:70%); b) reviewers who use PBR spend less time on inspection than reviewers who use CBR; c) cost per defect of reviewers who use CBR is smaller. The results of 3-person virtual team analysis show that CBR technique is more effective than PBR technique.
This paper discusses the concept of rapid application development and some of its specific features. Also, the main stages based on this concept in the development of different types of applications are pointed out. These two stages are:... more
This paper discusses the concept of rapid application development and some of its specific features. Also, the main stages based on this concept in the development of different types of applications are pointed out. These two stages are: application design – when creating the application outlook; and event-oriented programming – when the methods that will be executed when a specific event occurs are implemented. The most commonly used application development environments are presented and analyzed. The development of an application for calculating the values of certain trigonometric functions and drawing their graphics are described. The application is tested and the results of its execution are displayed. The guidelines for further research are formulated.).
Capturing the technical knowledge, contextual information, and rationale surrounding the design decisions underpinning system architectures can greatly improve the software development process. If not managed, this critical knowledge is... more
Capturing the technical knowledge, contextual information, and rationale surrounding the design decisions underpinning system architectures can greatly improve the software development process. If not managed, this critical knowledge is implicitly embedded in the architecture, becoming tacit knowledge which erodes as personnel on the project change. Moreover, the unavailability of architecture knowledge precludes organizations from growing their architectural capabilities. In this tutorial, we highlight the ...
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of... more
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable application developers and have gained popularity over the past few years. However, most cloud computing systems in operation today are proprietary, rely upon infrastructure that is invisible to the research community, or are not explicitly designed to be instrumented and modified by systems researchers.
Since its release in 2010 the iPad has become the leading computer tablet in the market. Due to its popularity, the iPad is widely used in different higher education (HE) institutions around the world. However, the research on the use of... more
Since its release in 2010 the iPad has become the leading computer tablet in the market. Due to its popularity, the iPad is widely used in different higher education (HE) institutions around the world. However, the research on the use of this tablet in HE remains limited. This paper describes how the iPad was used in an undergraduate web development class to encourage collaboration through participatory exercises. Firstly, the students were provided with the tablet in order to contribute to the class exercise, and then the iPad display was streamed real-time to a projector. The device was passed from student to student, thus bypassing the need for them to individually walk up to the lecturer's computer. This instructional approach also eliminated the use of laptops or workstations, and encouraged collaborative and active learning. Data was gathered through surveys and interviews with participating students, and a mixed methods approach was applied to the analysis. This paper rep...
Nowadays, outsourcing became a very growing term used in business especially in the modern countries. In this project we are going to introduce this principle to our people by employing it as an application that offer... more
Nowadays, outsourcing became a very growing term used in business especially in the modern countries. In this project we are going to introduce this principle to our people by employing it as an application that offer freelance jobs to our graduates who are suffering from high rates of unemployment. Our project is a web-based portal that allows businessmen or small companies to offer freelance projects to be done by the qualified graduates and got them paid for their tasks. Freelance work is the future of employment and this can be showed clearly in modern countries as most of their graduates go toward the work as freelancers. We have built our system using ASP.Net and uploaded it to a special domain to be available for public. Finally, we have introduced a chapter to study the opportunity for this project to get success in real world.
Information extraction from high spatial resolution imagery is sometimes hampered by the limited number of spectral channels available from these systems. Standard supervised classification algorithms found in commercial software packages... more
Information extraction from high spatial resolution imagery is sometimes hampered by the limited number of spectral channels available from these systems. Standard supervised classification algorithms found in commercial software packages may misclassify different features with similar spectral characteristics; leading to a high occurrence of false positives. An additional step in the information extraction process was developed incorporating the concept of object geometry. Objects are defined as a contiguous group of pixels identified as belonging to a single class in the spectral classification. Using results from the spectral classification, a supervised approach was developed using genetic programming to select and mathematically combine feature-specific shape descriptors from a larger set of shape descriptors, to form a new classifier. This investigation focused on extraction of residential housing from QuickBird and IKONOS imagery of the Mississippi Gulf Coast before and immediately after hurricane Katrina. Use of genetic programming significantly reduced false positives caused by asphalt pavement and isolated roofing material scattered throughout the image.