The impact/role of each usability attribute may vary during the usability evaluation process and has to be quantitatively evaluated to decide relative importance of each attribute in development process. Thus, to rank...
详细信息
The impact/role of each usability attribute may vary during the usability evaluation process and has to be quantitatively evaluated to decide relative importance of each attribute in development process. Thus, to rank usability attributes there exist an algorithm “CompuRank” and Scenario Based Ranking Method (SBRM) for ranking usability attributes in software development process. However, it is required to unify and authenticate the ranks of usability attributes computed using these methods. A survey based approach has also been proposed that empirically estimates ranks by collecting the opinions of software professionals from various organizations. In this context, we compare the ranks of usability attributes computed using “CompuRank”, SBRM and survey based approach with intention of unification and substantiation of ranks. It leads to reach at agreeable ranks of usability attributes during development of usable software.
To make full use of the technological superiority of Cloud Computing, develop and push forward the application of cloud computing technology, the framework and feature of cloud computing environments should be intensi...
详细信息
To make full use of the technological superiority of Cloud Computing, develop and push forward the application of cloud computing technology, the framework and feature of cloud computing environments should be intensively studied. Based on detailed analysis and comparison Distributed Computing, Parallel Computing, Grid Computing and Cloud Computing, the paper expresses the essence of Cloud Computing and put forward a model of Cloud Computing (Cloud Computing Model, CCM) which decribed by formal mathematical language. The model represents private clouds, nodes and resources of private clouds including resource type and quantity and clearly describes the logic relationship and dynamic features between entities,which makes it easy to describe and manage all kinds of resources in whole cloud environment. Finally,the paper gives a numerical example to express structure of CCM model, The numerical example demonstrates how private cloud,its nodes and resources join and quit from the cloud environment, which indicates the model is reliable and effective.
In Wireless Sensor Network (WSN), the ability to avoid collision directly impacts on node energy consumption and network performance. Based on introduction of CSMA/CA protocol, the paper laid emphasis on shortcoming o...
详细信息
In Wireless Sensor Network (WSN), the ability to avoid collision directly impacts on node energy consumption and network performance. Based on introduction of CSMA/CA protocol, the paper laid emphasis on shortcoming of binary backoff algorithm affect survivability time of WSN. On this basis, a kind of CSMA/CA protocol based on improved binary backoff algorithm was proposed. The algorithm reasonably scheduled competition and backoff time of nodes and improved fairness of the network to increase network survival cycle. Network simulation results with OPNET shows that the improved protocol effectively improves network survivable cycle in case of fixed network size. The performance of network delay and throughput also improved to a certain extent.
To make full use of the technological superiority of Cloud Computing, and develop and push forward the application of cloud computing technology, the paper put forward a method to construct a model called CCM (Cloud C...
详细信息
To make full use of the technological superiority of Cloud Computing, and develop and push forward the application of cloud computing technology, the paper put forward a method to construct a model called CCM (Cloud Computing Model) which represents private clouds, nodes and resources of private clouds including resource type and quantity and clearly describes the logic relationship and dynamic features between entities. The method presents specific process of CCM constructing and demonstrates how CCM be able to simulate the joining and exit of the private cloud including nodes and resources, objectively reflect dynamics and expandability of cloud computing environments. Finally, the paper analysed and demonstrated the constructing and dynamic expansion of CCM through a numerical example to verify effectivities of the method of CCM constructing.
For various applications in today's service-oriented enterprise computing systems, such as process-oriented service discovering or clustering, it is necessary to measure the distance between two process models. In...
详细信息
3d model plays an important role in modern visualization applications. Image or video based 3d model reconstruction is being more and more widely used. In this paper, the way to reconstruct a 3d model from video colle...
详细信息
The fast development of the Internet of Things (IoT) makes its security problems appear gradually. It is urgent to study the intrusion detection technology for IoT security threats. An intrusion detection method based...
详细信息
Recently, the rapid evolution of large-scale domain ontologies brought about higher requirements for data access in the Semantic Web community. The basic reasoning services for ontologies, however, cannot meet the nee...
详细信息
Recently, the rapid evolution of large-scale domain ontologies brought about higher requirements for data access in the Semantic Web community. The basic reasoning services for ontologies, however, cannot meet the needs of dealing with complex queries (mainly conjunctive queries) in data-intensive applications. For that purpose, significant research efforts are recently directed toward the design and implemrntatuon of query answering algorithms for ontologies and description logic (DL) knowledge bases (KBs). Many practical tools capable of storing a knowledge base, and also performing queries on it, were constructed. Fuzzy extensions to ontologies and DLs have recently gained considerable attention especially for the purposes of handling vague information in the Semantic Web. In this study, we focus on fuzzy conjunctive queries over fuzzy DL KBs of the expressive f-SH family. We show soundness, completeness and termination of fuzzy query entailment in proper sublogics of f-SHOIQ by providing a corresponding tableau-based algorithm. We show the algorithm is sound for f-SHOIQ, and analyse the reason leading to nontermintion. We close the open problem of the complexity for answering fuzzy conjunctive queries in expressive fuzzy description logics by establishing two complexity bounds: for data complexity, we prove a CONP upper bound, as long as only simple roles occur in the query;Regarding combined complexity, we prove a CO3NEXPTIME upper bound in the size of the knowledge base and the query.
Classic rateless codes, such as Raptor codes and LT codes are long codes. But special applications such as data storage systems usually require short-length codes (a few hundred in size). In response to this demand, w...
详细信息
Classic rateless codes, such as Raptor codes and LT codes are long codes. But special applications such as data storage systems usually require short-length codes (a few hundred in size). In response to this demand, we propose a new construction method of short-length rateless codes. The generator matrix of our proposed coding scheme is a special 0-1 random matrix in which every element is valued independently and identically and has same probability to be valued 1. Based on the proposed short-length rateless codes, a new data redundancy scheme for distributed storage systems is also proposed. Theoretical analysis and numerical simulation show that our method is effective.
This paper describes the research development levels of home and abroad, and makes a mining research about Chinese school-enterprise research evaluation information. In consideration of the evaluation index system of ...
详细信息
ISBN:
(纸本)9781467330930
This paper describes the research development levels of home and abroad, and makes a mining research about Chinese school-enterprise research evaluation information. In consideration of the evaluation index system of school-enterprise research, data mining model is established in the comprehensive use of the improved genetic algorithm based on the AHP analytic hierarchy process (AHP). The paper also makes scientific quantitative analysis on the teach-research indexes to each other, the quantitative index system provides a broad prospect for teaching and research work. In order to solve the implementation of school-enterprise research mechanism the problem that is badly in need of solving in current higher vocational education in our country.
暂无评论