Several characteristics of underwater acoustic (UWA) communication channels-limited bandwidth, extended multipath and severe fading-impede UWA data transmissions. To solve this problem, we propose to set up a receiver...
详细信息
Cloud computing model is very powerful in massive data processing and comprehensive analysis, but there are still limitations in the new application scenarios. The proposed edge computing is a good supplement to the s...
详细信息
The Code Genie programming environment was built by the researcher and the author of this paper as part of a Ph.D. study to encourage high school student for coding in JavaScript language. This environment was tested ...
详细信息
ISBN:
(纸本)9781728109275
The Code Genie programming environment was built by the researcher and the author of this paper as part of a Ph.D. study to encourage high school student for coding in JavaScript language. This environment was tested and used in three coding workshops. The participated students had several suggestions in their feedback comments. One of the common suggestions was adding a tutorial section to the environment. Gamification elements and the suggested tutorial section were added to the Code Genie web Integrated Development Environment (IDE). This update is introduced and discussed in this paper.
The Web information space is rapidly growing in the size and the diversity of both its data and its audience. A consequence is that Web information Systems (WIS) in many applications replace existing traditional (not ...
详细信息
ISBN:
(纸本)0769519164
The Web information space is rapidly growing in the size and the diversity of both its data and its audience. A consequence is that Web information Systems (WIS) in many applications replace existing traditional (not Web based) information systems. Since the nature of WIS differs from the nature of traditional information systems there is a strong demand for design methodologies specifically oriented towards WIS design. The complexity of WIS implies the need for an effective design process and a rigorous and systematic design approach. We argue that besides the quality of the navigation that is typical for Web (hypermedia) data also the adaptation of the presented content is a desired feature of a modern WIS. In this paper we briefly describe the navigation and adaptation design in selected WIS design methodologies, RMM, OOHDM, UWE, and particulary Hera.
During the last decade, new mobile multimedia applications have emerged for mobile and network multimedia, wireless multimedia communication, audio/video teleconferencing, remote assistance, digital storage systems, s...
详细信息
ISBN:
(纸本)9781424413119
During the last decade, new mobile multimedia applications have emerged for mobile and network multimedia, wireless multimedia communication, audio/video teleconferencing, remote assistance, digital storage systems, secure audio transmission and so on. In order to meet these requirements, tremendous research efforts have been put in the development of efficient digital audio coding technologies. In China, AVS-M audio standard is such an audio technology targeting for mobile multimedia applications which is developed and owned by China Audio and Video coding Standard Workgroup. In this paper, AVS-M audio standard is discussed by revealing the technical principles of the en- and decoding, the standardization situation and the suitability of the codec in relation to technology available, economical feasibility and the market needs. Finally it concludes with a brief discussion of future research directions.
Multiple Description coding (MDC) as an efficient method to solve the network fading problems, has been paid more and more attention these years. A novel three-channel MDC framework based on the orientation tree struc...
详细信息
The advances of informationtechnology have provided an opportunity for organizations to meet their needs by improving the system. The organization should keep the customer's trust to optimize their needs in busin...
详细信息
ISBN:
(纸本)9781538631003
The advances of informationtechnology have provided an opportunity for organizations to meet their needs by improving the system. The organization should keep the customer's trust to optimize their needs in business service and improve the service itself. Therefore, it is needed an understanding of the service computing trust. A framework of measuring the trustworthiness of service computing systems is the topic in this research. This paper reviews the service system that is represented in the direction towards developing a measurement framework. The contribution to this paper provides an understanding of service computing, service computing technologies and trusted service computing systems that will be used as a foundation for guiding the development of the measurement framework of trustworthiness of service computing system.
This book constitutes the refereed proceedings of the 2nd IFIP internationalconference on Computer and computing Technologiesin Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes sta...
ISBN:
(数字)9781441902092
ISBN:
(纸本)9781441902085
This book constitutes the refereed proceedings of the 2nd IFIP internationalconference on Computer and computing Technologiesin Agriculture held in Beijing, China on October 18-20, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed internationalconferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
The key to the efficient operation of turbo codes is the interleaver design. With proper design, the pairing of low-weight sequences to the input of the encoders can be avoided. Circular shift interleavers can be used...
详细信息
Plagiarism is one of the most common problem that has been increasing in the field of higher education. Many research papers have highlighted the issue of plagiarism in context to its detection and source that is ofte...
详细信息
ISBN:
(纸本)9781509039890
Plagiarism is one of the most common problem that has been increasing in the field of higher education. Many research papers have highlighted the issue of plagiarism in context to its detection and source that is often obtained from the text books and online sources, there is a variety of easy ways for students to copy others' work. coding style can be used to detect source code plagiarism because it relates to programmer personality but does not affect the logic of a program, thus offering a way to differentiate between different code authors. The immediate objective of this paper is to identify whether a data set consisting of student programming assignments is rich enough to apply coding style metrics on in order to detect similarities between code sequences, and we use the BlackBox data set as a case study.
暂无评论