computer security incidents cost companies billions of dollars each year and cause untold numbers of individuals considerable inconvenience and data loss. There are many common practices that companies can put in plac...
详细信息
ISBN:
(纸本)1932415823
computer security incidents cost companies billions of dollars each year and cause untold numbers of individuals considerable inconvenience and data loss. There are many common practices that companies can put in place to help reduce their vulnerability to a computer security incident but a single negligent employee can bring down an entire network. Colleges and universities have recognized the need to incorporate computer knowledge into almost every discipline in an effort to better prepare students for employment. This raises the question - are college students aware of common security precautions? This study surveyed over 100 students to determine their awareness and compliance with accepted security principles. The results indicate reason for concern. A significant number of the students were not following or did not know if they were following common security practices. Security awareness training and mandatory compliance are among the recommendations for improving this situation.
A special program in Software Engineering (SE) for high school has been in operation in Israel whose aim is to expose young students to the field of computing. During their studies the students are required to develop...
详细信息
ISBN:
(纸本)1595930248
A special program in Software Engineering (SE) for high school has been in operation in Israel whose aim is to expose young students to the field of computing. During their studies the students are required to develop a software project, and thus gain experience in software design. Usually the development processes do not fulfill essential professional requirements, and the students' products are rarely applicable to real world situations. This motivated the initiation of an educational program designated for advanced students. In the first stage of the program, a regional out-of-school class attends an enrichment workshop. In the second stage students develop projects under the apprenticeship-based supervision of professional instructors from academia and industry. The project is currently being implemented for the first time and is being evaluated.
In the process of research and development of Speech Recognize Interface for Z+Z Intelligence Education Platform, there are too many component interfaces and their usage is too difficult. A strategy for designing soft...
详细信息
Purpose - Aims to present the ontology engineering methodology DILIGENT, a methodology focussing on the evolution of ontologies instead of the initial design, thus recognizing that knowledge is a tangible and moving t...
详细信息
A framework for construction of virtual models of the medical phenomena is proposed. Major construction steps are discussed in detail. The construction of virtual medical model is guided from acquisition of patient im...
详细信息
A framework for construction of virtual models of the medical phenomena is proposed. Major construction steps are discussed in detail. The construction of virtual medical model is guided from acquisition of patient imaging material, to 3D reconstruction based on the image processing, to the basic modelling and simulation approaches. This framework is demonstrated on human knee joint virtual model construction. Statistical assessment of the built knee joint model points out sufficient quality and accuracy. Model assessment from clinical point of view confirmed this evaluation, and, simultaneously, verified the proposed construction chain as very prospective.
This paper introduced a technique for authenticating the vehicle engines. It has been compared by the images of the imprints of the identification number acquired when the vehicle was first registered and the ones acq...
详细信息
This paper introduced a technique for authenticating the vehicle engines. It has been compared by the images of the imprints of the identification number acquired when the vehicle was first registered and the ones acquired from the routine yearly vehicle inspection. Hough Transform algorithm was used to extract line feature from the images of the imprints, which characterized the identification number. Furthermore, line feature was combined with tolerance relation on a set, an algorithm based on inexact graph matching for authentication was presented. This had dealt with incomplete data owing to lots of artificial. The experiments showed an accuracy rate close to 83%.
We give a decomposition of the Hardy space Hz^1(Ω) into "div-curl" quantities for Lipschitz domains in R^n. We also prove a decomposition of Hz^1(Ω) into Jacobians det Du, u ∈ W0^1,2 (Ω,R^2) for Ω in R^2....
详细信息
We give a decomposition of the Hardy space Hz^1(Ω) into "div-curl" quantities for Lipschitz domains in R^n. We also prove a decomposition of Hz^1(Ω) into Jacobians det Du, u ∈ W0^1,2 (Ω,R^2) for Ω in R^2. This partially answers a well-known open problem.
Purpose - This paper presents a framework for ontology evolution tailored to Digital Libraries, which makes use of two different sources for change detection and propagation, the usage of ontologies by users and the c...
详细信息
This research investigates continuous forecasting queries with alterable forecasting-step over data streams. A novel Adaptive Precision forecasting method to forecasting single attribute value of item in a single stea...
详细信息
Over the years educators have been debating about the most appropriate paradigm for teaching an introductory course in computerscience (CS). Specifically, the pedagogical approach known as "objects early" o...
详细信息
ISBN:
(纸本)1595930248
Over the years educators have been debating about the most appropriate paradigm for teaching an introductory course in computerscience (CS). Specifically, the pedagogical approach known as "objects early" or "objects first" is controversial [2,3,4]. One important reason for educators to argue against the objects early approach is their concern that starting with objects results in the learning of algorithmic problem-solving to be neglected [4]. In this poster we present a pedagogical framework for an introductory multiple-goal course in OOP based on weaving algorithmic pattern-based problem solving activities into OOD/P instruction [5].
暂无评论