The World Wide Web provides new opportunities for distance education over the Internet. The Web, when combined with other network tools can be used to create a virtual classroom to bring together a community of learne...
详细信息
ISBN:
(纸本)0769523153
The World Wide Web provides new opportunities for distance education over the Internet. The Web, when combined with other network tools can be used to create a virtual classroom to bring together a community of learners for interactive education. In the paper we purpose the moving some of educational instructions of the Institute of Science Dokuz Eylul University at the WWW. This objective is achieved by investigating the use of emerging network technologies for training full time Students and part time students. This research will use the electronic educational materials already available on the Web;and it will evaluate the effectiveness of various collaborative tools.
Correct alignment of protein sequences is critical for accurate understanding of the evolution of the protein. Therefore, it is important to know how likely an alignment is correct. Any approach that uses randomized s...
详细信息
ISBN:
(纸本)0769523153
Correct alignment of protein sequences is critical for accurate understanding of the evolution of the protein. Therefore, it is important to know how likely an alignment is correct. Any approach that uses randomized sequences to access significance uses only part of the information inherent in an amino acid sequence. Offset alignment evaluation is a method to model and estimate the confidence of a given protein sequence alignment, which takes into account the inherent information from the protein sequence secondary structures. The confidence of a given alignment is estimated by a significance score based on the set of offset alignments. Finally, we introduce OAE, a Java implementation of the Offset alignment evaluation which is freely available to the public.
We present in this paper the effectiveness and the feasibility of measuring search engine efficiency using RankPower, a single value measurement. RankPower rates the search engines by computing the number and the rank...
详细信息
ISBN:
(纸本)0769523153
We present in this paper the effectiveness and the feasibility of measuring search engine efficiency using RankPower, a single value measurement. RankPower rates the search engines by computing the number and the rank of relevant URLs among the returned results. This is different from traditional performance measures of information retrieval systems using the precision and recall rates. The RankPower is much more easier to compute and much more intuitive for ordinary, web search users. The conclusions are supported by a set of empirical results collected from the experiments that the authors designed and carried out.
One of the major problems of managing information systems for e-Commerce or m-Commerce is to estimate the memory utilization for its set of servers, among others. In particular, along with system security and fault to...
详细信息
ISBN:
(纸本)0769523153
One of the major problems of managing information systems for e-Commerce or m-Commerce is to estimate the memory utilization for its set of servers, among others. In particular, along with system security and fault tolerance, memory management is perhaps the most frequently observed challenge that the IS/IT manager faces on a daily basis. A framework for building an automated intelligent agent for memory management under the client-server architecture is suggested in this paper. Further, possible applications of the framework in terms of data mining are suggested.
Distinct features of handheld devices, such as their mobility, personalization and location-awareness, engender a new class of consumer-oriented software applications. While simple shopping assistant programs were one...
详细信息
ISBN:
(纸本)0769523153
Distinct features of handheld devices, such as their mobility, personalization and location-awareness, engender a new class of consumer-oriented software applications. While simple shopping assistant programs were one of the first to emerge for this class of devices, many modern m-commerce applications become more complex and utilize a wide range of features of pervasive, computing. In this paper, we discuss a number of design issues pertinent to the development of these applications including context awareness, personalization, ubiquitous access, and intelligent interfaces., We applied these and other principles in the design and development of SMMART, an intelligent context aware framework for delivery of personalized and targeted promotions to the users of mobile devices, which is used as a case study throughout this paper.
To facilitate thousands of hand held device users' lookup for services anywhere anytime, the importance of a resource discovery scheme in pervasive computing environments cannot be overlooked. The incorporation of...
详细信息
ISBN:
(纸本)0769523153
To facilitate thousands of hand held device users' lookup for services anywhere anytime, the importance of a resource discovery scheme in pervasive computing environments cannot be overlooked. The incorporation of Security, Adaptability, Fault Tolerance, and Efficiency features is the quest for long but there is no existing resource discovery scheme that can be claimed as "the solution". In this paper, we propose the design of such a discovery mechanism named SAFE-RD, which is an integral part of our on-going research project MARKS (Adaptive Middleware for Resource discovery, Knowledge usability and Self-healing) with illustrative examples.
We propose the n-state quantum coin flipping protocol by generalizing the three states protocol proposed by Ambainis. Furthermore, we conduct security analysis on our protocol and show that in our protocol we can redu...
详细信息
Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information;they mainly work in outdoor environment. Applications call for...
详细信息
ISBN:
(纸本)0769523153
Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information;they mainly work in outdoor environment. Applications call for precise, easy-to-build, and easy-to-use indoor location systems. This paper presents our work to implement an indoor location determination system, for Microsoft-Windows-based platforms using a preexisting IEEE 802.11 wireless network. The location is determined from radio signal strength information collected from multiple base stations at different physical locations. Our experiments show a high accuracy rate of this approach.
In this paper, a scheme is proposed for parallel-pipelined implementation of the multialphabet arithmetic-coding algorithm used in lossless data compression. Using this scheme, it is possible to parallelize both the e...
详细信息
ISBN:
(纸本)0769523153
In this paper, a scheme is proposed for parallel-pipelined implementation of the multialphabet arithmetic-coding algorithm used in lossless data compression. Using this scheme, it is possible to parallelize both the encoding and decoding operations used respectively in data compression and decompression. The compression performance of the proposed implementation for both order 0 and order 1 models have been evaluated and compared with existing sequential implementations in terms of compression ratios as well as the execution time using the Canterbury Corpus benchmark set of files. The proposed scheme also facilitates hardware realisation of the respective modules and hence is suitable for integration into embedded microprocessor systems, an important area where lossless data compression is applied.
A pervasive computing environment consists Of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activi...
详细信息
ISBN:
(纸本)0769523153
A pervasive computing environment consists Of numerous casually accessible, frequently mobile, embedded, handheld devices capable of sensing the environment around it and reacting intelligently to simplify user activities. These devices are distributed everywhere at office, homes, stores, classroom, and are often connected to ad-hoc network and the internet providing access from anywhere and anytime. Access control mechanisms can sometimes fail to provide complete security to these pervasive computing devices as witnessed in infrastructure based networks. The addition of pervasive computing devices to infrastructure based networks makes the problem of intrusion detection even harder. In this paper, the challenges and characteristics of intrusion detection in pervasive computing devices are discussed along with a mobile agents-based solution for both for a network environment made up of infrastructure based network and pervasive computing devices.
暂无评论