this work presents an intelligent automatic fingerprint identification and verification system based on artificial neural networks. In this work, the design processes of the system have been presented step by step. In...
详细信息
this work presents an intelligent automatic fingerprint identification and verification system based on artificial neural networks. In this work, the design processes of the system have been presented step by step. In order to make the system automatic, software was developed for fingerprint identification and verification processes. 100 fingerprint images were used to test and evaluate the system. the results have shown that the task was achieved with high accuracy
OBJECTIVE – the objective of this paper is to determine under what circumstances individual organisations would be able to rely on cross-company based estimation models. MEthOD – We performed a systematic review of ...
详细信息
Agents provide developers with a flexible way of structuring systems around autonomous, communicative elements. In order to support the efficient development of such systems, design techniques need to be introduced. I...
详细信息
ISBN:
(纸本)1595933956
Agents provide developers with a flexible way of structuring systems around autonomous, communicative elements. In order to support the efficient development of such systems, design techniques need to be introduced. In this context, we propose a set of UML-based diagrams which can be used to capture structural and behavioral features of the Belief-Desire-Intention agent model. the approach aims at supporting detailed architectural design of multi-agent systems by providing a process to guide the description of agent roles according to the proposed diagrams in the context of the Tropos framework. To illustrate the approach we present a conference Management System case study. Copyright 2006 ACM.
Online applications based on the HTTP protocol are shifting from wired networks, known as Web applications and Web services, to wireless networks, known as wireless mobile online applications, due to the rapid growth ...
详细信息
Online applications based on the HTTP protocol are shifting from wired networks, known as Web applications and Web services, to wireless networks, known as wireless mobile online applications, due to the rapid growth of mobile devices, such as personal digital assistants and cell phones. Among the enabling technologies, J2ME is the dominant and the most potential one for building up these wireless mobile online applications. this paper presents a framework that makes the modeling, implementation, and maintenance of wireless mobile online applications intuitive and easy, especially for students and beginners
Topic maps offer a powerful foundation for knowledge representation and the implementation of knowledge management applications. Using ontologies to model knowledge structures, they offer concepts to link these knowle...
详细信息
Topic maps offer a powerful foundation for knowledge representation and the implementation of knowledge management applications. Using ontologies to model knowledge structures, they offer concepts to link these knowledge structures with unstructured data stored in files, external documents etc. this paper presents the architecture and prototypical implementation of a topic map application infrastructure (called "topic grid" in the following) allowing transparent access to different topic maps distributed in a network. To a client of the topic grid, it appears as if access to a single virtual topic map is provided. the topic grid architecture is designed as a multi-protocol layered model in order to enhance its reusability
During the last decades database applications are undoubtedly among the most widely used types of software applications. the presence of database statements in their source code is one of their typical characteristics...
详细信息
During the last decades database applications are undoubtedly among the most widely used types of software applications. the presence of database statements in their source code is one of their typical characteristics that however introduces many difficulties in their code-level analysis and testing. this paper describes an approach that resolves such issues and facilitates the employment of traditional software testing techniques. the approach involves two alternative methods and is founded on the execution plan that the underlying database management system derives for each SQL statement. To support this approach a prototype tool called DATeM has been developed and the experimental results from its usage are reported and analyzed
this paper aims to construct a Web-based PBL system for the students at the department of computer science and information engineering. the central bases on instructional theory, learning theory, and PBL instructional...
详细信息
this paper aims to construct a Web-based PBL system for the students at the department of computer science and information engineering. the central bases on instructional theory, learning theory, and PBL instructional activities are applied to this paper. the research methods include literature review, experts' visits, PBL instruction, interview, focus group, etc. Based on the above theories and research methods, the authors intend to educate the students' teamwork, data analyzing, and problem-solving capabilities. Moreover, the ability of technological innovation can enable students to enhance their competencies. the research results obviously show that the PBL instruction can help students learn more about artificial intelligence (AI)
Developing large softwaresystems by integrating components has a great potential to reduce costs and time to market. However, it also poses serious threats to the nonfunctional aspects of the composed system. One suc...
详细信息
Developing large softwaresystems by integrating components has a great potential to reduce costs and time to market. However, it also poses serious threats to the nonfunctional aspects of the composed system. One such problem is how to build secure composite system from components which may or may not be individually secure. A systematic approach for determining interoperability of components from a security standpoint and unifying the security features, policies and implementation mechanisms of components is needful. this paper presents a goal-oriented and model-driven approach to analyzing the security features of components to determine interoperability and a guideline for integrating them to fulfil the security goals of the composite system. the proposed analysis procedure leads to discovery of some classes of security interoperability conflicts which helps to determine whether or not the components should be used together. We provide an empirical study by applying the proposed approach to integrate two components by unifying the security features of the components to satisfice the security goals of a student and seminar information system
Traditional software testing checks to see if a software product meets specifications. this generally involves testing to see if the software performs all the functions called for in the software requirements specific...
详细信息
Traditional software testing checks to see if a software product meets specifications. this generally involves testing to see if the software performs all the functions called for in the software requirements specifications (SRS). In contrast, this work-in-progress paper proposes a testing paradigm that does not have this objective. the proposed testing paradigm tests to see if a software product exhibits proper behavior when subject to improper usage or improper input. For lack of a more descriptive name and in compliance with similar testing performed on hardware systems, the new paradigm is called "destructive testing". As presented in this paper, destructive testing does not replace conventional testing, rather destructive testing supplements conventional testing (calls for additional testing beyond conventional testing). the paper discusses other uses of the term "destructive testing" as applied to softwaresystems. Conventional testing techniques are ranked based on applicability to destructive testing. Techniques of incorporating destructive testing requirements into the SRS are proposed, the need and rational for destructive testing is discussed, and ongoing and future work in destructive testing is outlined
暂无评论