The EU-project SAFFI targets food for EU's 15 million and China's 45 million children under the age of three. It aims at developing an integrated approach to enhance the identification, assessment, detection a...
详细信息
In this paper, the Szemerédi's Regularity Lemma and its application are studied. This lemma is used to partition a large enough graph into almost equal parts so that the number of edges across the parts is fa...
In this paper, the Szemerédi's Regularity Lemma and its application are studied. This lemma is used to partition a large enough graph into almost equal parts so that the number of edges across the parts is fairly random. On the other hand, Roth's Theorem states that there exists an arithmetic progression with length 3 in a subset in integer with positive upper density. We shall see that it can be proved by using triangle removal lemma, which is an application of Szemerédi's Regularity Lemma. The regularity lemma does not seem to be a direct tool to be used on Roth's theorem. The lemma deals with the graphs while Roth's theorem states about subsets on integers. But however, the two are connected through the construction of an auxiliary graph, where 3-arithmetic progression of integers subsets corresponds to triangles in this such graph. At the end of this explanation, we will find that the whole trivial triangles formed by such graph partition are all disjoint. This is at the point we can conclude that there exists an arithmetic progression with length 3 in a subset in integer with positive upper density.
This is a Work in Progress Research to Practice Category paper. Research has shown that novice programmers struggle with learning introductory concepts and find it difficult to monitor their own progress. Teachers oft...
详细信息
ISBN:
(纸本)9781538611753;9781538611746
This is a Work in Progress Research to Practice Category paper. Research has shown that novice programmers struggle with learning introductory concepts and find it difficult to monitor their own progress. Teachers often have hundreds of students and multiple sections of programming courses to teach, making it infeasible to provide the amount of independent feedback each student may need to flourish. With limited instructor feedback, students who can self-monitor and self-assess their programming metacognition have a higher chance of developing a process for solving programming challenges. In this paper, we expand on the literate programming paradigm by using natural language processing and machine learning methods to automatically analyze and classify student programming metacognition levels through their source code comments. Our intent is to ultimately integrate our classification models into an interactive developer environment to provide real-time feedback to students about their metacognition while learning to program.
Risk management is an important part of software development. Risk identification is the first major step in the risk management process that determines possible risks in a software project and dictates how effective ...
详细信息
ISBN:
(纸本)9781538633038
Risk management is an important part of software development. Risk identification is the first major step in the risk management process that determines possible risks in a software project and dictates how effective the risk management process will be. However, there are several approaches used to identify risk. The approaches depend on subjective decisions of risk or domain experts which increase cost and workload. Therefore, to make the risk identification more effective, a systematic and automated approach is necessary. In this paper, we propose an alternative risk identification scheme using knowledgeable ontology representing risk taxonomy and CMMI project planning guideline. The ontology provides the relations among risk factors and software project risks according to the structure of risk taxonomy and the relevant process areas in CMMI. In this paper, we focus and demonstrate the CMMI project planning process area as an initiative to construct our ontology. The resulting ontology is supportive as expected and scalable to handle more on the other process areas of CMMI and the addition of the software project risks.
SQL antipatterns are frequently-made missteps that are commonly found in the design of relational databases, the use of SQL, and the development of database applications. They are intended to solve certain problems bu...
详细信息
ISBN:
(纸本)9781509055050
SQL antipatterns are frequently-made missteps that are commonly found in the design of relational databases, the use of SQL, and the development of database applications. They are intended to solve certain problems but will eventually lead to other problems. The motivation of this paper is how to assist database administrators in diagnosing SQL antipatterns and suggest refactoring techniques to solve the antipatterns. Specifically, we attempt to automate the detection of logical database design antipatterns by developing a tool that uses Transact-SQL language to query and analyze the database schema. The tool reports on potential antipatterns and gives an instruction on how to refactor the database schema. In an evaluation based on three databases from the industry, the performance of the tool is satisfactory in terms of recall of the antipatterns but the tool detects a number of false positives which affect its precision. It is found that SQL antipatterns detection still largely depends on the semantics of the data and the detection tool should rather be used in a semi-automated manner, i.e it can point out potential problematic locations in the database schema which require further diagnosis by the database administrators. This approach would be useful especially in the context of large databases where manual antipatterns inspection is very difficult.
Hard disk failure is a serious problem in term of product quality and credibility to customers. All hard disk drive companies need to be aware and address how to get rid of failure and prevent the repeat of the proble...
详细信息
Hard disk failure is a serious problem in term of product quality and credibility to customers. All hard disk drive companies need to be aware and address how to get rid of failure and prevent the repeat of the problem in their products. The quality of failure analysis process depends on the person who has most experience. It would not be so efficient if the company has no experienced person to perform the analysis. A knowledge management system can store the knowledge of experienced engineers. It can help new engineers to learn the craft. It would reduce a knowledge gap issues and bring up efficiency for failure solving process. This paper presents a design and implementation of knowledge management system for failure analysis in hard disk with case-based reasoning. The existing cases are stored and a new case can be compared to the existing one in order to retrieve the relevant existing knowledge to help the analysis. Once the new case is solved, it can be stored to aid the future cases. A prototype of the system has been implemented and the assessment of user satisfaction shows that it can improve the failure analysis process effectively.
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the...
详细信息
ISBN:
(纸本)9781509055050
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the market to offer corporate customers productivity and security while lowering costs of identity management. System integrators who implement the IDM solutions for their corporate customers often face problems when choosing the right IDM products for integrating with the customers' enterprise systems. This paper proposes a decision model for IDM product selection which is used in evaluating and ranking IDM products based on the proposed customer requirements questionnaire. The model is comprehensive in that its decision criteria comprise not only the technical specifications of the products but also other important aspects including price and accountability of system integrators and product vendors. Based on the decision model, product selection is conducted using a multi-criteria decision making technique called fuzzy analytic hierarchy process (fuzzy AHP). In an evaluation, a leading system integrator company in Thailand applies the proposed approach to IDM product selection for its customer and the result is quite satisfactory.
Safety systems in the automotive sector are very important. Among these are ABS brake systems, stability control system, and air bag systems. One group of these safety systems is oriented toward collisions and are act...
详细信息
Safety systems in the automotive sector are very important. Among these are ABS brake systems, stability control system, and air bag systems. One group of these safety systems is oriented toward collisions and are activated at different times, having specific objectives, for example 1) systems activated before a collision have the objective of preventing impact, 2) systems activated during a collision have the objective of minimizing the physical harm to occupants, and 3) after a collision, their objective is to minimize the time between the collision and arrival of outside assistance for the vehicle's occupants. However, while type 1 systems (passive) and type 2 systems (active) are currently in many vehicles, type 3 systems have not been thoroughly researched. Therefore, this article describes a proposal of the behavioral logic of a type 3 system, which is represented through a software requirement specification document (SRS). The SRS presented satisfies some of the recommendations of the requirements of the automotive standard ISO 26262 and two of the processes used relate to the requirements of the standard ISO/IEC/IEEE 15288.
This study aims to present a compliance analysis tool to Six Sigma by integrating indicative of success and Paraconsistent Method Decision. This way is contributing to a previous scenario analysis that can help the im...
详细信息
ISBN:
(纸本)9781538651513
This study aims to present a compliance analysis tool to Six Sigma by integrating indicative of success and Paraconsistent Method Decision. This way is contributing to a previous scenario analysis that can help the implementation of Six Sigma with higher chances of success.
Callibration in mathematical models that are based on differential equations is known to be of fundamental importance. For sophisticated models such as age-structured models that simulate biological agents, parameter ...
Callibration in mathematical models that are based on differential equations is known to be of fundamental importance. For sophisticated models such as age-structured models that simulate biological agents, parameter estimation or fitting (callibration) that solves all cases of data points available presents a formidable challenge, as efficiency considerations need to be employed in order for the method to become practical. In the case of multiscale models of hepatitis C virus dynamics that deal with partial differential equations (PDEs), a fully numerical parameter estimation method was developed that does not require an analytical approximation of the solution to the multiscale model equations, avoiding the necessity to derive the long-term approximation for each model. However, the method is considerably slow because of precision problems in estimating derivatives with respect to the parameters near their boundary values, making it almost impractical for general use. In order to overcome this limitation, two steps have been taken that significantly reduce the running time by orders of magnitude and thereby lead to a practical method. First, constrained optimization is used, letting the user add constraints relating to the boundary values of each parameter before the method is executed. Second, optimization is performed by derivative-free methods, eliminating the need to evaluate expensive numerical derviative approximations. These steps that were successful in significantly speeding up a highly non-efficient approach, rendering it practical, can also be adapted to multiscale models of other viruses and other sophisticated differential equation models. The newly efficient methods that were developed as a result of the above approach are described. Illustrations are provided using a user-friendly simulator that incorporates the efficient methods for multiscale models. We provide a simulator called HCVMultiscaleFit with a Graphical User Interface that applies these
暂无评论