Collaborative tagging services provided by various social web sites become popular means to mark web resources for different purposes such as categorization, expression of a preference and so on. However, the tags are...
详细信息
This book gathers selected high-quality papers presented at the International Conference on Computing, Power and Communication Technologies 2019 (GUCON 2019), organized by Galgotias University, India, in September 201...
详细信息
ISBN:
(数字)9789811501326
ISBN:
(纸本)9789811501319
This book gathers selected high-quality papers presented at the International Conference on Computing, Power and Communication Technologies 2019 (GUCON 2019), organized by Galgotias University, India, in September 2019. The content is divided into three sections – data mining and big data analysis, communication technologies, and cloud computing and computer networks. In-depth discussions of various issues within these broad areas provide an intriguing and insightful reference guide for researchers, engineers and students alike.
In this paper the authors present an overview of techniques and tools that enable the effective evaluation and refactoring of a Web application's conceptual schema. Moreover, based on the introduction of the notio...
详细信息
ISBN:
(纸本)0889865744
In this paper the authors present an overview of techniques and tools that enable the effective evaluation and refactoring of a Web application's conceptual schema. Moreover, based on the introduction of the notion of model clones (in a previous work), as partial conceptual schemas that are repeated within a broader application model and the notion of model smells, as certain blocks in the Web applications model that imply the possibility of refactoring, this paper illustrates a methodology and a tool for detecting and evaluating the existence of potential model clones, in order to identify problems in an application's conceptual schema by means of efficiency, consistency, usability and overall quality. The methodology can be deployed either in the process of designing an application or in the process of reengineering it. Evaluation is performed according to a number of inspection steps. At first level the compositions used in the hypertext design are evaluated, followed by a second level evaluation concerning data manipulation and presentation to the user.
This paper considers key issues surrounding energy consumption by information and communication technologies (ICT), which has been steadily growing and is now attaining approximately 10% of the worldwide electricity c...
This paper considers key issues surrounding energy consumption by information and communication technologies (ICT), which has been steadily growing and is now attaining approximately 10% of the worldwide electricity consumption with a significant impact on greenhouse gas emissions. The perimeter of ICT systems is discussed, and the role of the subsystems that compose ICT is considered. Data from recent years is used to understand how each of these sub-systems contribute to ICT's energy consumption. The quantitatively demonstrated positive correlation between the penetration of ICT in the world's different economies and the same economies' contributions to undesirable greenhouse gas emissions is also discussed. The paper also examines how emerging technologies such as 5G, AI, edge computing, and cryptocurrencies are contributing to the worldwide increase in electricity consumption by ICT, despite the increases in ICT efficiency, in terms of energy consumed per bit processed, stored, or transmitted. The measurement of specific ICT systems' electricity consumption is also addressed, and the manner in which this consumption can be minimized in a specific edge computing context is discussed.
Regarding to the smart city infrastructures, there is a demand for big data processing and its further usage. This data can be gained by various means. There are many IoT devices in the city, which can communicate and...
详细信息
Some aspects regarding delivering of different programming courses in three institutions from three countries (Serbia, FYR Macedonia and Croatia) are observed in the paper. Courses' profiles and the application of...
详细信息
In this paper we study two classical cut problems, namely Multicut and Multiway Cut on chordal graphs and split graphs. In the Multicut problem, the input is a graph G, a collection of vertex pairs (si, ti), i ∈ [], ...
详细信息
The goal of capstone project is to train students to be able to apply the required knowledge and skill to collaboratively complete the assigned work. The project-based learning (PBL) is a popular strategy used by teac...
详细信息
ISBN:
(纸本)9784990801472
The goal of capstone project is to train students to be able to apply the required knowledge and skill to collaboratively complete the assigned work. The project-based learning (PBL) is a popular strategy used by teachers to guide students to organize teams to solve problem collaboratively and to enhance students' creative and problem solving abilities in capstone project. However, the traditional PBL strategy cannot effectively enhance the students' abilities because the previous good cases cannot be easily shared and reused. Therefore, our idea is to develop a good platform to be able to share and reuse the cases together with portfolios to motivate student's imaginative power and creativity and the teachers can easily assess the students' learning achievements. Because Case-Based Reasoning (CBR) techniques consisting of cases retrieve, reuse, revise and retain can be used to model the computer reasoning, we develop a project-based learning platform using the CBR techniques to provide the case scaffoldings and reserve the learning portfolio. We further design an experiment based upon our learning platform to complete the e-book visual creative design. The experimental result shows that the given appropriate learning scaffoldings can guide students to improve the creative and problem solving abilities.
Automation of malware characterization has become increasingly important for early malware detection over the past decades. Since it is crucial to be able to perform malware detection transparently, explainable machin...
详细信息
暂无评论