computers have been integrated into almost all areas of our daily lives. Serious problems stem from the fact that elementary and secondary school students in general have taken none or inadequate computer classes and ...
详细信息
computers have been integrated into almost all areas of our daily lives. Serious problems stem from the fact that elementary and secondary school students in general have taken none or inadequate computer classes and as such, their awareness of efficient computer usage has not been adequately addressed. During university education, students have been observed experiencing hardships using computers for research and document preparation, due to their prior use of computers having consisted mostly of accessing social media and games. The current study investigated 2013-2014 high school graduates’ attitudes regarding technology, the computer programs they used and their usage frequency, reasons for why they use the Internet and social media and their usage frequencies, and their basic computer skills at university level. The participants of the current study were students who had just entered various departments and language preparation levels at Fatih University, Istanbul, Turkey. 250 Participants were randomly selected. Data for the current study were collected through a Basic computer Skills Questionnaire, an application for determining the levels of participants’ basic computer skills. Significant benefits are foreseen for students entering universities as helpful computer users with awareness attained during elementary or secondary education. Additionally, particularly for students who prefer non-social majors, it will be very useful to have learned a programming language and an algorithm at basic levels. The Internet as a medium for potentially leading to a diverse range of problems today requires conscious users.
Heterogeneous redundant series-parallel systems allow the mixing of components within the same subsystem. This diversity feature may improve the overall characteristics of the system compared with the homogeneous case...
详细信息
Cognitive Radio Technology has brought new insights to the problems of spectrum scarcity and inefficiency, in which spectrum holes are opportunistically accessed when the licensed users (primary users) are not using t...
详细信息
Cognitive Radio Technology has brought new insights to the problems of spectrum scarcity and inefficiency, in which spectrum holes are opportunistically accessed when the licensed users (primary users) are not using the frequencies that are assigned to those users. In this paper, we propose a multi-path route discovery algorithm for cognitive radio ad hoc networks (CRAHN) using algebraic connectivity. The employed routing mechanism takes into account the impact of the primary users on the non-licensed users (secondary users) in a way that the secondary users choose the paths which are less affected by the non-licensed users. With regard to proposed route discovery algorithm, data traffic congestions are tried to be avoided in the secondary network by reducing the number of all possible paths from source to destination. The results show that the devised method overcomes the technique of the route request (RREQ) message flooding between a source and a destination.
Nowadays, the emerging wireless communication technologies cause rapid growth in radio spectrum usage. However, the radio spectrum is a limited resource and has almost been fully assigned by the current network operat...
详细信息
Nowadays, the emerging wireless communication technologies cause rapid growth in radio spectrum usage. However, the radio spectrum is a limited resource and has almost been fully assigned by the current network operators (NOs). Although numerous studies have been accomplished on the spectrum management, there are rare evolutionary techniques dealing with booking spectrum on cognitive radio. Instant Overbooking Framework for Cognitive Radio networks (IOFCR) is used to maximize both spectrum utilization and the revenue of NOs under several over-booking and pricing policies. In such a network, when a primary user (PU) activity is sensed, the control of which requesting secondary users (SUs) can be denied and which Active SUs can be ejected is managed by IOFCR. In this paper, the Particle Swarm Optimization (PSO) algorithm is applied into the IOFCR to find optimal values of the over-booking price and the Compensation Cost (CC) ratio to optimize revenue and achieve high performance.
For every organization having a well secured network is the primary requirement to reach their goals. A network is said to be secure if it can protect itself from sophisticated attacks. Due to the rapid increase in th...
详细信息
For every organization having a well secured network is the primary requirement to reach their goals. A network is said to be secure if it can protect itself from sophisticated attacks. Due to the rapid increase in the number of network users, security becomes the main challenge in the area of network field. Most security related threats target the layers of the OSI reference model. Sophisticated attack types such as Distributed Denial of Service (DDoS), Man-in-the-Middle and IP spoofing attacks are used to attack these layers. In this paper, we analyze most of the attack types that cause serious problems in computer networks and defense techniques to stop or prevent these attacks.
Software is nowadays used in almost all systems. Therefore, the reliability of the software is a crucial aspect in safety engineering. Software errors can cause life-threatening situations. To counter this, software r...
详细信息
Software is nowadays used in almost all systems. Therefore, the reliability of the software is a crucial aspect in safety engineering. Software errors can cause life-threatening situations. To counter this, software reliability models are used. Currently, there are a great number of software reliability models existing. The model that will be considered as the most appropriate is depending on the respective project. That is why it cannot always be decided in advance which model would be the most suitable. In this paper a method is presented that serves to show how the most appropriate model for a project can be selected.
This study proposes a system using RFID and XBee technology to address and eliminate the problems resulting from human errors in put-away operations. The human errors in such operations are a serious problem that lead...
详细信息
ISBN:
(纸本)9781467387101
This study proposes a system using RFID and XBee technology to address and eliminate the problems resulting from human errors in put-away operations. The human errors in such operations are a serious problem that leads to a number of difficulties in production lines and supply-chain. The use of automated verification system in put-away operations in warehouses is rather rare. Therefore, the study draws from Information Technologies. Three modules - warehouse, racks, and forklifts - have been designed to ensure automated verification of error-free placement of goods. Also, a user interface is developed in Visual Studio C#.Net and SQL server is used for database management system. The developed system also provides monitoring of all steps of operation and enables real-time checking and supervision. Thus, it offers a reliable and transparent operation system, significantly contributes to effective management of supply chain and helps to improve high quality of fast and correct product delivery by minimizing the human errors. Thus, the study highlights the importance of automated verification system for an effective management of supply chain practices by establishing coordination among rack, forklift, warehouse modules, operator and product.
Sequence of q -Bleimann, Butzer, and Hahn operators which is based on a continuously differentiable function τ on R +, with τ 0 = 0, inf τ ' x ≥ 1, has been considered. Uniform approximation by such a sequence...
In this manuscript, an Economic production quantity (EPQ) model have been formulated for deteriorating items under partial trade credit policy with crisp and fuzzy demand. For fuzzy demand we take demand as a triangul...
详细信息
In this manuscript, an Economic production quantity (EPQ) model have been formulated for deteriorating items under partial trade credit policy with crisp and fuzzy demand. For fuzzy demand we take demand as a triangular fuzzy number & we consider upper α 1 − cut & lower α 1 − cut of this fuzzy number. Then the annual inventory cost of retailer is divided into two parts upper α 1 − cut of annual inventory cost & lower α 1 − cut of annual inventory cost. We use weighted sum method to convert multi objective to a single objective. Here we have to derive optimum cycle time so as to minimize the total average cost. Numerical examples are used to illustrate all results obtained in this paper. Finally the model is solved by Generalized Reduced Gradient(GRG) method and using LINGO(12) software.
Formalized stages medical-diagnostic process at development computer decision support system in medicine. For complex estimation stage medical-diagnostic process for the reason minimization risk doctor-mistake is desi...
详细信息
Formalized stages medical-diagnostic process at development computer decision support system in medicine. For complex estimation stage medical-diagnostic process for the reason minimization risk doctor-mistake is designed method to clusterizations diagnosis in space pharmacological action and correction threshold in diagnostic solving rule.
暂无评论