Requirements are critical to system validation as they guide all subsequent stages of systems development. Inadequately specified requirements generate systems that require major revisions or cause system failure enti...
详细信息
This paper presents the mechanism practice linked to the skills and knowledge added to the refurbishment *** sustainable of career as building refurbishment manager is to feed the managers with skills and knowledge,st...
详细信息
This paper presents the mechanism practice linked to the skills and knowledge added to the refurbishment *** sustainable of career as building refurbishment manager is to feed the managers with skills and knowledge,strategically made in facing the future that is full of uncertainties and *** research focus on the sustainability factors through the analysis results that gathered from interview and ***,it relates to identify the current practice in dealing with the process of the refurbishment project toward *** of skills and knowledge among the project managers are the mechanism that firm or agencies to look forward.
Smart Electronic Visitor Information System (SEVIMS) is an application to replace traditional visitor registration and information management activities. SEVIMS able to record visitor information during visitor regist...
详细信息
Smart Electronic Visitor Information System (SEVIMS) is an application to replace traditional visitor registration and information management activities. SEVIMS able to record visitor information during visitor registration by using visitor's Malaysia Government Multipurpose Card (MyKad). An implementation of mobile smart card reader with biometric verification has increase the high level of security and access control. With additional features, the identity of visitor can be verify based on matching of his/her thumbprint with the thumbprint image stored in MyKad. The benefits of sophisticated SEVIMS are enhancing the level of security enforced in premises, providing an organized view of visitor records and reducing the time spent on managing visitor information.
The notation and environment in conceptual modelling transform developers' initial perception about a system to a concrete model. Any usability constraints that the notation and environment impose on the modeling ...
详细信息
The notation and environment in conceptual modelling transform developers' initial perception about a system to a concrete model. Any usability constraints that the notation and environment impose on the modeling ...
详细信息
The advent of high-throughput techniques such as microarray data enabled researchers to elucidate process in a cell that fruitfully useful for pathological and medical. For such opportunities, microarray gene expressi...
详细信息
ISBN:
(纸本)9781424437740
The advent of high-throughput techniques such as microarray data enabled researchers to elucidate process in a cell that fruitfully useful for pathological and medical. For such opportunities, microarray gene expression data have been explored and applied for various types of studies e.g. gene association, gene classification and construction of gene network. Unfortunately, since gene expression data naturally have a few of samples and thousands of genes, this leads to a biological and technical problems. Thus, the availability of artificial intelligence techniques couples with statistical methods can give promising results for addressing the problems. These approaches derive two well known methods: supervised and unsupervised. Whenever possible, these two superior methods can work well in classification and clustering in term of class discovery and class prediction. Significantly, in this paper we will review the benefit of network-based in term of interaction data for classification in identification of class cancer.
Study on topology structure of protein interaction network has been suggested as a potential effort to discover biological functions and cellular mechanisms at systems level. In this work, we introduced a graph partit...
详细信息
Study on topology structure of protein interaction network has been suggested as a potential effort to discover biological functions and cellular mechanisms at systems level. In this work, we introduced a graph partitioning method to partition protein interaction network into several clusters of interacting proteins that share similar functions called functional modules. Our proposed method encompasses three major steps which are preprocessing, informative proteins selection and graph partitioning algorithm. We utilized the protein-protein interaction dataset from MIPS to test the proposed method. We use gene ontology information to validate the biological significance of the detected modules. We also downloaded protein complex information to evaluate the performance of our method. In our analysis, the method showed high accuracy performance indicates that this method capable to detect highly significance modules. Hence, this showed that functional modules detected by the proposed method are biologically significant which can be used to predict uncharacterized proteins and infer new complexes.
Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefacts. Usually, software analysis tools a...
详细信息
Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefacts. Usually, software analysis tools are implemented for analysing only one specific language as target and for performing only one class of analyses. Furthermore, most software analysis tools support only common programming languages, but not those domain-specific languages that are used in a test process. As a solution, a framework for software analysis is presented that is based on a flexible, yet high-level facade layer that mediates between analysis rules and the underlying target software artefact; the analysis rules are specified using high-level XQuery expressions. Hence, further rules can be quickly added and new types of software artefacts can be analysed without needing to adapt the existing analysis rules. The applicability of this approach is demonstrated by examples from using this framework to calculate metrics and detect bad smells in Java source code, in UML models, and in test specifications written using the testing and test control notations (TTCN-3).
Artificial Intelligence chatbot is a technology that makes interaction between man and machine using natural language *** this paper,we proposed the architectural design of Virtual Dietition (ViDi),a chatbot that will...
详细信息
Artificial Intelligence chatbot is a technology that makes interaction between man and machine using natural language *** this paper,we proposed the architectural design of Virtual Dietition (ViDi),a chatbot that will function as virtual dietitian for diabetic patients.A general a history of a chatbot,a brief description of each chatbots is *** proposed the use of new technique that will be implemented in ViDi as the key component to function as virtual *** architectural design of ViDi,Vpath is used to remember the conversation *** architectural design will allow chatbot ViDi to response to the whole conversation as it specifically designed to be a Virtual Dietitian.
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contai...
详细信息
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contains a set of resource-rich dynamic sink nodes forming an ad hoc network. The sinks at layer second are responsible to monitor and collect data from a region, called cluster. So the sinks at second layer are also knows as cluster sinks. At the third layer, there is a resource-rich static sink, known as zonal sink also, responsible for data collection from cluster sinks. A cluster sink may be few hops away from a static sensor node and moves to the vicinity of sensor nodes to collect the data. Each cluster sink continuously updates the zonal sink by propagating the collected data from the respective cluster. The zonal sink buffers the collected data and propagates to base station. Zonal sink is the one, responsible for data transmission from network environment to the base station, where the data is processed for further use. TLAM approach is robust, increases sensor life by allowing them to operate with a limited transmission range only and provides reduced delay as cluster sink continuously updates to zonal sink without query.
暂无评论