Design patterns are applied to solve the recurring software design problems,Unfortunately,choosing appropriate design patterns for the specific design problem is considered a difficult task.A search tool is,therefore,...
详细信息
Design patterns are applied to solve the recurring software design problems,Unfortunately,choosing appropriate design patterns for the specific design problem is considered a difficult task.A search tool is,therefore,needed to supports selection,However,the existing design pattern searching methodologies generally have problems on keywordsearch *** this paper,we proposed an initial model to solve the problem by using Case-Based Reasoning(CBR) and Formal Concept Analysis(FCA).For the proposed model,a case base is created to represent design *** is used to be case organization that analyze case base for obtain knowledge embedded,The knowledge can suggest suitable indexes to use for new *** method is beneficial for learning index,This paper discusses the basis theoretical of representation and retrieval design patterns for this inprogress research,along with some preliminary result.
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in...
详细信息
ISBN:
(纸本)9781424451012
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies directed to limited number of threats traced in healthcare system. Thus it introduces bias in threat analysis. This study explored the use of biological computational termed Genetic Algorithm (GAs) combined with Cox regression (CoRGA) in identifying a potential threat for healthcare system. The results show that variable described “misused of e-mail” is the major information security threats for healthcare system. Results were compared with manual analysis using the same data, and it is shows that GAs not just introducing new threats for healthcare system but it was similar with others threats proposed by previous researches.
software developers currently find design patterns through search tools for solving software design problem. However, these search tools still have keyword-search problem. In this paper, we introduce the elementary id...
详细信息
ISBN:
(纸本)9781424452446
software developers currently find design patterns through search tools for solving software design problem. However, these search tools still have keyword-search problem. In this paper, we introduce the elementary idea to improve the design pattern retrieval tool. We propose the combination of case based reasoning (CBR) and formal concept analysis (FCA). Because of CBR lead to the smart solution and FCA provides flexible way to maintain indexing in the case base.
Peering of Content Delivery Networks (CDNs) allow providers to rapidly scale-out to meet both flash crowds and anticipated increases in demand. Recent trends foster the need for a utility model for content delivery se...
详细信息
Peering of Content Delivery Networks (CDNs) allow providers to rapidly scale-out to meet both flash crowds and anticipated increases in demand. Recent trends foster the need for a utility model for content delivery services to provide transparency, high availability, reduced investment cost, and improved content delivery performance. Analysis of prior work reveals only a modest progress in evaluating the utility for peering CDNs. In this paper, we introduce a utility model and measure the content-serving ability of the peering CDNs system. Our model assists in providing a customer view of the system's health for different traffic types. Our model also captures the traffic activities in the system and helps to reveal the true propensities of participating CDNs to cooperate in peering. Through extensive simulations we unveil many interesting observations on how the utility of the peering CDNs system is varied for different system parameters and provide incentives for their exploitation in the system design.
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contai...
详细信息
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contains a set of resource-rich dynamic sink nodes forming an ad hoc network. The sinks at layer second are responsible to monitor and collect data from a region, called cluster. So the sinks at second layer are also knows as cluster sinks. At the third layer, there is a resource-rich static sink, known as zonal sink also, responsible for data collection from cluster sinks. A cluster sink may be few hops away from a static sensor node and moves to the vicinity of sensor nodes to collect the data. Each cluster sink continuously updates the zonal sink by propagating the collected data from the respective cluster. The zonal sink buffers the collected data and propagates to base station. Zonal sink is the one, responsible for data transmission from network environment to the base station, where the data is processed for further use. TLAM approach is robust, increases sensor life by allowing them to operate with a limited transmission range only and provides reduced delay as cluster sink continuously updates to zonal sink without query.
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud reso...
详细信息
ISBN:
(纸本)9781424446469;9780769537559
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud resource provider has to decide on how to allocate his scarce resources in order to maximize his profit. The application of bid price control for evaluating incoming service requests is a common approach for capacity control in network revenue management. In this paper we introduce a customized version of the concept of self-adjusting bid prices and apply it to the area of cloud computing. Furthermore, we perform a simulation in order to test the efficiency of the proposed model.
Assessing softwareengineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might require the examination of a significant vo...
详细信息
Assessing softwareengineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might require the examination of a significant volume of materials, following a consistent, repetitive and effective procedure, even for small projects. Quality assurance must be performed according to similar requirements. This paper discusses the use of quality audits, a comprehensive quality assurance procedure, as a tool for the assessment of course projects.
The clinical symptoms of metabolic disorders during neonatal period are often not apparent, if not treated early irreversible damages such as mental retardation may occur, even death. Therefore, practicing newborn scr...
详细信息
The current Internet did not define any inherent management constructs and mechanisms; such concepts were added after networking standards and architectures were constructed. This also influenced network management fo...
详细信息
The current Internet did not define any inherent management constructs and mechanisms; such concepts were added after networking standards and architectures were constructed. This also influenced network management for other types of networks. This paper is the first in a series that explores concepts for a new autonomic approach to network management that can be used for current and next generation networks as well as for the Future Internet.
Next generation networks, as well as the future Internet, aim to provide context-sensitive business services that adapt to changing user needs, business goals, and environmental conditions. This paper describes the co...
详细信息
Next generation networks, as well as the future Internet, aim to provide context-sensitive business services that adapt to changing user needs, business goals, and environmental conditions. This paper describes the composition of an autonomic element, as a fundamental part of an autonomic architecture, which uses information models and semantics to link the business services with the services provided by the underlying network devices. This linkage is inherently context-aware, and allows context changes to determine the impact of changes in the network towards business services and vice versa. The described autonomic element is a programmable toolbox supporting the clean-slate approach as well as evolutionary approaches for the future Internet.
暂无评论