One of the debatable issues in programming courses for core Computer Science (CS) and informationtechnology (IT) education is on how to improve the assessment so that it will reflect student's programming skills....
详细信息
ISBN:
(纸本)9780889867901
One of the debatable issues in programming courses for core Computer Science (CS) and informationtechnology (IT) education is on how to improve the assessment so that it will reflect student's programming skills. This research will focus on this issue by proposing a new model to support the assessment of programming courses, specifically in object-oriented programming. The model will be developed by identifying object oriented concepts that student's have applied in their program source code using object oriented metrics. Metrics are an important technique in quantifying desirable software and software development characteristics of object oriented software development. Currently, metrics proposed for OO software development have rarely been used to support assessment process. This paper will investigate the suitable object-oriented metrics to be applied in the process of developing the assessment model for object-oriented programming courses. We give an overview on the object-oriented metrics and the necessary steps on the applications of metrics towards development of the assessment model.
As the computational requirement of applications in computational science continues to grow tremendously, the use of computational resources distributed across the Wide Area Network (WAN) becomes advantageous. However...
详细信息
Several approaches are currently used in documenting object-oriented application frameworks. Traditional documentation approaches include tutorials, reference manuals, design patterns, cookbooks, and minimalist. The m...
详细信息
Network intrusion prevention system (NIPS) becomes more complex due to the rapid growth of network bandwidth and requirement of network security. However existing solutions, either hardware-based or software-based can...
详细信息
Packet classification is one of the most critical techniques in many network devices such as Firewall, IDS and IPS, etc. In order to meet the performance requirement for high speed Internet (even higher than 10 Gbps),...
详细信息
Facial identification has been recognized as most simple and non-intrusive technology that can be applied in many places. However, there are still many unsolved facial identification problems due to different intra-pe...
详细信息
Facial identification has been recognized as most simple and non-intrusive technology that can be applied in many places. However, there are still many unsolved facial identification problems due to different intra-personal variations. In particular, when images of the databases appear at different facial expressions, most currently available facial recognition approaches encounter the expression-invariant problem in which neutral faces are difficult to be recognized. In this paper, a new approach is proposed to transform facial expressions to neutral-face like images; hence enabling image retrieval systems to robustly identify a person's face for which its learning and testing face images differ in facial expression.
In a vendor-buyer supply chain, the buyer's economic order quantity and the vendor's optimal number of deliveries are derived either independently or collaboratively. In this paper, we establish a two-stage ve...
详细信息
information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exi...
详细信息
ISBN:
(纸本)9780982148914
information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exist in information Systems (IS) in one of government supported hospital in Malaysia. The hospital has been equipped for a Total Hospital information System (THIS). The data collected were from three different departments using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows that the most critical threat for the THIS is the power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a comprehensive list of potential threat categories in IS and subsequently taking the results of this step as input for the risk mitigation strategy. Keywords: Healthcare information Systems (HIS), information Systems (IS), Risk Analysis, Threats
This paper reports on the development of a novel approach to bridge the relationship between function point (FP) and object point (OP) sizing metrics by reverse engineering FP elements to some corresponding OP element...
详细信息
This paper reports on the development of a novel approach to bridge the relationship between function point (FP) and object point (OP) sizing metrics by reverse engineering FP elements to some corresponding OP elements. This has been applied to a wide spectrum of software projects. Two findings emerge. First, there appears to exist a high correlation between OP and FP elements with a linear relationship between the two. The second is the construction of a validated OPs database from existing FP-based projects, which facilitates the validation of existing and emerging OP-based software cost estimation (SCE) models.
Measuring structural design properties of an object-oriented system is a promising approach towards early quality *** object-oriented systems,cohesion is an important factor of objectoriented design quality.A few rese...
详细信息
Measuring structural design properties of an object-oriented system is a promising approach towards early quality *** object-oriented systems,cohesion is an important factor of objectoriented design quality.A few researchers refer cohesion to the degree of the relatedness of the members in a *** an object-oriented system,classes and components are key early artifacts that lay the foundation of an object-oriented system.A few cohesion metrics have been proposed to quantify the cohesiveness of classes in an object-oriented *** this paper,we attempt to quantify the amount of cohesion in classes and components via a suite of object-oriented design *** paper proposes four object-oriented design metrics to evaluate cohesion at the class and component *** metrics are augmented based on different definitions of *** metrics are normalized to produce values in the range [0..1],thus yielding more meaningful values than other cohesion metrics such as LCOM1 and *** proposed metrics attempt to evaluate whether an artifact (*** or component) represents one abstraction (good) or multiple abstractions (bad).If the artifact represents multiple abstractions,it should be split up into multiple artifacts (*** and components).
暂无评论