Keywords: cyberworlds, cellular model, formula expression, continuous quantity identifier, condition formula
|
|
- Scot Sutton
- 8 years ago
- Views:
Transcription
1 Preprint: " An Example of Cloud Business Application Development using the Continuous Quantity Identifier of the Cellular Data System", Lecture Notes in Electrical Engineering ISSN: , in print, March 2011, Springer-Verlag, Heidelberg, Germany. An Example of Cloud Business Application Development using the Continuous Quantity Identifier of the Cellular Data System Toshio Kodama 1, Tosiyasu L. Kunii 2, Yoichi Seki 3 1 Maeda Corporation, Advanced Computer Systems, Inc., Iidabashi, Chiyoda-ku, Tokyo Japan 2 Morpho, Inc., Iidabashi First Tower 31F, Koraku, Bunkyo-ku, Tokyo Japan 3 Software Consultant, Hino-shi, Tokyo Japan 1 kodama@lab.acs-jp.com, kodama.ts@jcity.maeda.co.jp 2 kunii@ieee.org, kunii@acm.org, 3 yseki@amber.plala.or.jp Abstract. In the era of cloud computing, cyberworlds as information worlds have grown rapidly and on an extremely large scale to encapsulate real world activities like finance, commerce, education and manufacturing in the form of e-financing, e-commerce, distance education and e-manufacturing despite the lack of a firm mathematical foundation. In software engineering, many software development methodologies, including the waterfall model and object-oriented model have been introduced. But these current methodologies cannot yet solve the combinatorial explosion problem. A new approach, different from conventional engineering approach, is needed. We have developed a data processing system called the Cellular Data System (CDS) as a new methodology, based on the Incrementally Modular Abstraction Hierarchy (IMAH) in the cellular model, which offers powerful mathematical background in data modeling. In this paper, we develop a continuous quantity identifier to deal with objects that can express continuous quantity on the presentation level of IMAH and integrated it into the data search function of CDS. By taking advantage of continuous quantity identifiers with the data search function of CDS, development of business application logic using continuous quantity becomes much simpler and significantly reduces development and maintenance costs of the system. In addition, we show the effectiveness of a continuous quantity identifier by taking up some examples of core logic development of a car sharing reservation system. Keywords: cyberworlds, cellular model, formula expression, continuous quantity identifier, condition formula 1 Introduction The cyberworlds in cloud computing are distributed systems. Data and its dependencies are constantly changing within them. Cyberworlds are more
2 complicated and fluid than any other previous worlds in human history and are constantly evolving. Millions of people use Twitter or Facebook every minute through Web services on mobile phones which are one of main elements of cyberworlds. At the same time, user requirements for cyberworlds also change and become more complicated as cyberworlds change. If you analyze data using existing technology, you have to modify the schema design and application programs whenever schemas or user requirements for output change. That leads to combinatorial explosion, because user requirements, and their combinations and schemas must be specified clearly at the design stage. That is a fundamental problem, so we have to reconsider development from the data model level. Is there a data model that can reflect the changes in schemas and user requirements in cyberworlds? We consider that Incrementally Modular Abstraction Hierarchy (IMAH) of the cellular model built by one of the authors (T. L. Kunii) to be the most suitable model. The IMAH can model the architecture and the changes of cyberworlds and real worlds from the homotopy level which is most general to the view level which is the most concrete preserving invariants while preventing combinatorial explosion [1][13]. From the viewpoint of IMAH, existing data models are positioned as special cases. For example, UML can model objects at levels below the presentation level, and in the relational data model, a relation is an object at the presentation level which extends a cellular space because it has necessary attributes in which a type is defined, while the processing between relations is based on the set theoretical level. In the object-oriented model, an object is also the object at the presentation level, which extends a cellular space, while the relation between Classes is the tree structure, which is a special case of a topological space. An Object in XML is considered a special case of a cellular space that extends a topological space, because an attribute and its value are expressed in the same tag format. In our research, one of the authors (Y. Seki) proposed an algebraic system called Formula Expression as a development tool to realize the cellular model. Another (T. Kodama) has actually implemented CDS using Formula Expression [12]. In this paper, we have introduced the concept of a continuous quantity identifier into CDS. A continuous quantity formula is effective when a continuous quantity is dealt with in business application development. In addition, we have placed emphasis on practical use by taking up some examples. Firstly, we explain CDS and its main data search function briefly in Section 2, 3. Secondly, we design the properties of a continuous quantity by Formula Expression, and integrate them into the condition formula search function in Section 4. Next, we implement them in Section 5. We demonstrate the effectiveness of the continuous quantity identifier by developing a business application system, thereby abbreviating the process of designing and implementing most application programs in Section 6. The business application system is the core logic of a car sharing reservation system, where cars are reserved in accordance with customers required times and car reservation schedules. Related works are mentioned in Section 7. Lastly, we conclude in Section 8.
3 2 The Cellular Data System (CDS) 2.1 Incrementally Modular Abstraction Hierarchy The following list constitutes the Incrementally Modular Abstraction Hierarchy to be used for defining the architecture of cyberworlds and their modeling: 1. the homotopy (including fiber bundles) level 2. the set theoretical level 3. the topological space level 4. the adjunction space level 5. the cellular space level 6. the presentation (including geometry) level 7. the view (also called projection) level In modeling cyberworlds in cyberspaces, we define general properties of cyberworlds at the higher level and add more specific properties step by step while climbing down the Incrementally Modular Abstraction Hierarchy. The properties defined at the homotopy level are invariants of continuous changes of functions. The properties that do not change by continuous modifications in time and space are expressed at this level. At the set theoretical level, the elements of a cyberspace are defined, and a collection of elements constitutes a set with logical operations. When we define a function in a cyberspace, we need domains that guarantee continuity, such that neighbors are mapped to a nearby place. Therefore, a topology is introduced into a cyberspace through the concept of neighborhood. Cyberworlds are dynamic. Sometimes cyberspaces are attached to each other, an exclusive union of two cyberspaces where attached areas of two cyberspaces are equivalent. It may happen that an attached space is obtained. These attached spaces can be regarded as a set of equivalent spaces called a quotient space, which is another invariant. At the cellular structured space level, an inductive dimension is introduced into each cyberspace. At the presentation level, each space is represented in a form which may be imagined before designing the cyberworlds. At the view level, the cyberworlds are projected onto view screens. 2.2 The definition of Formula Expression Formula Expression in the alphabet is the result of finite times application of the following steps. 1. a (a Σ) is Formula Expression 2. unit element ε is Formula Expression 3. zero element φ is Formula Expression 4. when r and s are Formula Expression, addition of r+s is also Formula Expression 5. when r and s are Formula Expression, multiplication of r s is also Formula Expression 6. when r is Formula Expression, (r) is also Formula Expression
4 7. when r is Formula Expression, {r} is also Formula Expression 3 The Condition Formula Search of CDS If users can specify search conditions, data searching will become more functional. Here, we introduce the function for specifying conditions defining a condition formula by Formula Expression into CDS. Let propositions P, Q be sets which include characters p, q respectively. The conjunction, disjunction and negation of them in logical operation are defined by Formula Expression as follows: 1) Conjunction 2) Disjunction 3) Negation P Q = p q. (1) P Q = p+q. (2) P =!p. (3) A formula created from these is called a condition formula. Here "!" is a special factor which means negation. Recursivity by () in Formula Expression is supported so that the recursive search condition of a user is expressed by a condition formula. Condition formula processing is processing that results in a disjoint union of terms that satisfy a condition formula from a formula. When condition formula processing is considered, the concept of a remainder of spaces is inevitable. The processing consists of two maps: a quotient acquisition map f that derives a term that includes a specified identifier and a remainder acquisition map g that derives a term that does not include a specified identifier. If you assume x to be a formula and p,!p, p+q, p q,!(p+q),!(p q) to be condition formulas, the images of (x, p+q), (x, p q), (x,!(p+q)), (x,!(p q)) by f, g are the following: x = f(x, p)+g(x,!p) where f(x, p) g(x,!p) = φ. (4) f(x, p+q) = f(x, p)+f(g(x, p), q) (5) f(x, p q) = f(f(x, p), q) (6) f(x,!(p+q)) = g(g(x, p), q) (7) f(x,!(p q)) = g(f(f(x, p), q) (8) It is obvious that any complicated condition formula can be processed by the combinations of the above four correspondences.
5 4 A Continuous Quantity Identifier and Its Application to the Condition Formula Search of CDS 4.1 Definition The continuous quantity identifier is defined as one case of identifiers in Formula Expression, and therefore it follows the general operation of Formula Expression. If it is assumed that r and s (r<s) are arbitrary numerical identifiers, a continuous quantity identifier to express continuous quantity from r to s is defined [r+s]. If you assume t, u (t<u) and v, w (v<w) are also arbitrary numerical identifiers and a is an arbitrary letter factor, the continuous quantity identifier has the following properties: [s+r] = φ (if r<s). (1) [r+r] = ε. (2) a [r+s] = [r+s] a. (3) [r+s]+[t+u] = [r+u] (if r t<s u) = [t+s] (if t r<u s) = [r+s] (if r t<u s) = [t+u] (if t r<s u) = [r+s]+[t+u] (if t u r<s or r<s t u). [r+s] [t+u] = [t+s] (if r t<s u) = [r+u] (if t r<u s) = [t+u] (if r t<u s) = [r+s] (if t r<s u) = φ (if t u r<s or r<s t u). (4) (5) Next, the quotient acquisition map f of condition formula processing is applied to the continuous quantity identifier according to the above definitions as follows: f([r+s],[t+u]) = [t+s] (if r t<s u) = [r+u] (if t r<u s) = [t+u] (if r t<u s) = [r+s] (if t r<s u) = φ (if t u r<s or r<s t u) f([r+s],![t+u]) = [r+t] (if r t<s u) = [u+s] (if t r<u s) = [r+t]+[u+s] (if r t<u s) = φ (if t r<s u) = [r+s] (if t u r<s or r<s t u). (6) (7)
6 4.2 Applied Map g The applied map g, which replaces a formula including continuous quantity identifier(s) with the remainder of a specified continuous quantity identifier using the above f, is designed as follows; If you assume the entire set of formulas to be A, g: A, and arbitrary terms r, s, t, u follow these rules: g([r+s],u+v) = g([r+s],u)+g([r+s],v). (8) g([r+s],(u)) = (g([r+s],u)). (9) g([r+s],a [p+q] b) = a f([r+s],![p+q]) b. (10) A simple example of the map g is shown here. g([1+24], Kodama([12+14]+[16+18])) = Kodama([1+12]+[14+16]+[18+24]) 5 Implementation This system is a Web application developed using JSP and Tomcat 5.2 as an application server. The client and the server are the same machine. (OS: Windows XP; CPU: Intel Core2 Duo, 3.00GHz; RAM: 3.23GB; HD: 240GB) The quotient acquisition map f is the main function of condition formula processing. In this algorithm, the absolute position of the specified factor by the function of the language and the term including the factor are acquired first. Next, the nearest brackets of the term are acquired, and because the term becomes a factor, a recursive operation is performed. Details are abbreviated due to the restriction on the number of pages. 6 Case Study: A Car Sharing Reservation System 6.1 Outline Car sharing is a model of car rental where people rent cars for short periods of time, often by the hour. We take up the example of development of core logic of a car sharing reservation system as a business application using CDS. In this case study, we assume that there are five customers; customer (A, B, C, D, E) and three shared cars; car (1, 2, 3), and that each reservation is to be arranged by adjusting customers required times and car reservation schedules within a given period from 0 to 20. Firstly, formulas for customer s requirement times and car reservation times are designed using a continuous quantity identifier and an operation for getting the
7 formula for each s available time from them (6.2). Secondly, sample data of customers and cars are inputted and the operation is carried out according to the design. Thirdly, required data is outputted by the condition formula processing map (6.3). 6.2 Space design We design a formula for the space and the operation as follows: 1. The formula for a customer and their required times as a topological space Customer(Σcustomer id i Σ[r i +s i ]). (1) customer id i : a factor which identifies a customer [r i +s i ]: a continuous quantity identifier from r i to s i 2. The formula for shared cars and their reserved times as a topological space Shared Car(Σcar id i Σ[p i +q i ]). (2) car id i : a factor which identifies a car [p i +q i ]: a continuous quantity identifier from p i to q i 3. The operation for getting the formula for available times of shared cars g([0+20], Shared Car(Σcar id i Σ[p i +q i ])). (3) [0+20]: a continuous quantity identifier of the entire period (from 0 to 20) 6.3 Data input/output If customer A requires a shared car from time 7 to 8 and from time 13 to 15, a term for customer A is created according to the space design (1) as below: Customer(customer A ([7+8]+[13+15])) And if customer B requires a shared car from time 4 to 5 and from time 15 to 17, a term for a customer B is created and added to the previous term as below: +Customer(customer B ([4+5]+[15+17]))
8 Terms for customer C, customer D and customer E are also created as below and added to the previous formula: Customer(customer A ([7+8]+[13+15])+customer B ([4+5]+[15+17])+cust omer C ([8+20])+customer D ([6+10])+customer E ([7+8]+[13+15])). (4) In the same way, a term for car reservations is created and added to the previous formula according to the space design (2) as below: Shared Car(car1([0+4]+[10+14])+car2([4+7]+[14+17])+car2([7+10]+[12+1 4]+[17+20])). (5) The following operation is performed to get the formula for times when cars are available from formula (5) according to the operation design (3), which is then added to the formula (4). formula (4)+g([0+20],formula (5)) =Customer(customer A ([1+3]+[16+18])+customer B ([0+2]+[5+8])+cust omer C ([4+7]+[11+13])+customer D ([10+14]+[17+19])+customer E ([2+6]+[12+15]+[17+20]))+Shared Car(car1([4+10]+[14+20])+car2([0+4]+ [7+14]+[17+20])+car3([0+7]+[10+12]+[14+17])). (6) The resulting figure is shown in Fig 6.3. Fig 6.3 Times that customers require a car and when cars are available If you want to answer the question When and which cars can customer A use between times 10 and 20?, first you make the condition formula Customer(customer A)[10+20] from the question and get the image of formula (6) and the condition formula by the map f as below:
9 f(formula (6), Customer(customer A)[10+20] ) =Customer(customer A)[13+15]. (7) And then you get the image of formula (6) and the condition formula Shar ed Car[13+15] by the map f: f(formula (6), Shared Car[13+15] ) = Shared Car(car2 [13+14]+(car1+car3)[14+15]). (8) From the results, you can know that customer A can use car2 between times 13 and 14 and can also use car1 or car3 between times 14 and 15. Next, if you want to answer the question Which customer wants to use car1 from time 8 to 10?, you get the image of formula (6) and the condition formula (Customer+car1)[8+10] by the map f : f(formula (6), (Customer+car1)[8+10] ) = (Customer(customer C+customer D)+Shared Car(car1))[8+10]. (9) From the results, you can know that customer C, D want to use car1 from time 8 to 10. Next, if you want to answer the question Which customer can use which car between times 8 and 10?, you get the image of formula (6) and the condition formula (Customer+Shared Car)[8+10] by the map f: f(formula (6), (Customer+Shared car1)[8+10] ) =(Customer(customer C+customer D)+Shared Car(car1+car2))[8+10]. (10) From the results, you can know that customer C and D can use car1 or car2 from time 8 to Considerations Condition formula processing has become more effective by integrating a continuous quantity identifier when a continuous quantity such as time, distance, temperature, etc. is dealt with. If the existing method of business application development is used in this case study instead of the continuous quantity identifier function of CDS, complicated input/output programs would have to be developed according to needs, and the maintenance costs required to meet various and unexpected user requirements would be considerable.
10 7 Related Works The distinctive features of our research are the application of the concept of topological process, which deals with a subset as an element, and that the cellular space extends the topological space, as seen in Section 2. Relational OWL as a method of data and schema representation is useful when representing the schema and data of a database [2][5], but it is limited to representation of an object that has attributes. Our method can represent both objects: one that has attributes as a cellular space and one that does not have them as a set or a topological space. Many works applying other models to XML schema have been done. The motives of most of them are similar to ours. The approach in [8] aims at minimizing document revalidation in an XML schema evolution, based in part on the graph theory. The X- Entity model [9] is an extension of the Entity Relationship (ER) model and converts XML schema to a schema of the ER model. In the approach of [6], the conceptual and logical levels are represented using a standard UML class and the XML represents the physical level. XUML [10] is a conceptual model for XML schema, based on the UML2 standard. This application research concerning XML schema is needed because there are differences in the expression capability of the data model between XML and other models. On the other hand, objects and their relations in XML schema and the above models can be expressed consistently by CDS, which is based on the cellular model. That is because the tree structure, on which the XML model is based, and the graph structure [3][4][7], on which the UML and ER models are based, are special cases of a topological structure mathematically. Entity in the models can be expressed as the formula for a cellular space in CDS. Moreover, the relation between subsets cannot in general be expressed by XML. Although CDS and the existing deductive database apparently look alike, the two are completely different. The deductive database [11] raises the expression capability of the relational database (RDB) by defining some rules. On the other hand, CDS is a new tool for data management, and has nothing to do with the RDB. 8 Conclusions In this paper, we have designed and implemented a continuous quantity identifier and applied it to condition formula processing, which is the main data search function of CDS. A continuous quantity such as time, distance, etc. can be expressed as a factor in Formula Expression and integrated into business logic modeling in business application development. As a result, the cost of cloud application program development can be significantly reduced. References [1] T. L. Kunii and H. S. Kunii, A Cellular Model for Information Systems on the Web - Integrating Local and Global Information, In Proc. of DANTE'99, IEEE Computer Society Press, pp.19-24, 1999.
11 [2] Grigoris Antoniou1 and Frank van Harmelen, Web Ontology Language: OWL, Handbook on Ontologies, International Handbooks on Information Systems, Springer Publishing, 2009, Part 1, pp [3] Sergey Lukichev, Improving the quality of rule-based applications using the declarative verification approach, International Journal of Knowledge Engineering and Data Mining, Inderscience Publishers, Vol.1 Issue 3, pp , [4] David W. Embley, Semantic priming in a cortical network model, Journal of Cognitive Neuroscience, MIT Press, vol.21 Issue12, pp , [5] Ernestas Vysniauskas, Lina Nemuraite, TRANSFORMING ONTOLOGY REPRESENTATION FROM OWL TO RELATIONAL DATA, Information Technology and Control, Kaunas University of Technology, vol.35, pp , [6] Yuan An, John Mylopoulos, Alex Borgida, Building semantic mappings from databases to ontologies, In Proc. of AAAI'06, AAAI Press, pp , [7] Shlomi Dolev, Elad Michael Schiller, Paul G. Spirakis, Philippas Philippas, Strategies for repeated games with subsystem takeovers implementable by deterministic and self-stabilising automata, International Journal of Autonomous and Adaptive Communications Systems, Inderscience Publishers, Vol.4 Issue 1, pp.4-38, [8] Irena Mlynkova, Jaroslav Pokorny, FROM XML SCHEMA TO OBJECT- RELATIONAL DATABASE AN XML SCHEMA-DRIVEN MAPPING ALGORITHM, In Proc. of IADIS International Conference WWW/Internet 04, IADIS Press, pp , [9] Bernadette Farias Lósio, Ana Carolina Salgado, Luciano do Rêgo GalvĐo, Conceptual Modeling of XML Schemas, In Proc. of WIDM'03, ACM Press, pp , [10] Stephen J. Mellor, Marc J. Balcer, Executable UML: A Foundation for Model Driven Architecture, Addison Wesley, [11] Faiz Arni, Kayliang Ong, Shalom Tsur, Haixun Wang, Carlo Zaniolo, The Deductive Database System LDL++, Theory and Practice of Logic Programming, Cambridge University Press, pp.61-94, [12] Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki, A New Method for Developing Business Applications: The Cellular Data System, In Proc of CW'06, pp , IEEE Computer Society Press, [13] Kenji Ohmori, Tosiyasu L. Kunii, Designing and modeling cyberworlds using the incrementally modular abstraction hierarchy based on homotopy theory, The Visual Computer: International Journal of Computer Graphics, Vol. 26, No.5, pp ,, Springer-Verlag, 2010.
Cyber Graphics. Abstract. 1. What is cyber graphics? 2. An incrementally modular abstraction hierarchy of shape invariants
Preprint of the Keynote Paper: Tosiyasu L. Kunii, Cyber Graphics, Proceedings of the First International Symposium on Cyber Worlds (CW2002), November 6-8 2002 Tokyo, Japan, in press, IEEE Computer Society
More informationDEVELOPMENT OF AN ACCOUNTING SYSTEM Applying the Incrementally Modular Abstraction Hierarchy to a Complex System
DEVELOPMENT OF AN ACCOUNTING SYSTEM Applying the Incrementally Modular Abstraction Hierarchy to a Complex System Kenji Ohmori Computer and Information Sciences, Hosei Univeristy, 3-7-2 Kajino-cho, Koganei-shi,
More informationSoftware Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
More informationCloud Computing is NP-Complete
Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,
More informationA Tool for Searching the Semantic Web for Supplies Matching Demands
A Tool for Searching the Semantic Web for Supplies Matching Demands Zuzana Halanová, Pavol Návrat, Viera Rozinajová Abstract: We propose a model of searching semantic web that allows incorporating data
More informationModeling Web Applications Using Java And XML Related Technologies
Modeling Web Applications Using Java And XML Related Technologies Sam Chung Computing & Stware Systems Institute Technology University Washington Tacoma Tacoma, WA 98402. USA chungsa@u.washington.edu Yun-Sik
More informationOpus: University of Bath Online Publication Store http://opus.bath.ac.uk/
England, M. (2014) Formulating problems for real algebraic geometry. In: UNSPECIFIED. Link to official URL (if available): Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/ This
More informationProfessional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
More information[Refer Slide Time: 05:10]
Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture
More informationOWL based XML Data Integration
OWL based XML Data Integration Manjula Shenoy K Manipal University CSE MIT Manipal, India K.C.Shet, PhD. N.I.T.K. CSE, Suratkal Karnataka, India U. Dinesh Acharya, PhD. ManipalUniversity CSE MIT, Manipal,
More informationSemantically Enhanced Web Personalization Approaches and Techniques
Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationMathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson
Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement
More informationWorkflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment
Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Peter Y. Wu wu@rmu.edu Department of Computer & Information Systems Robert Morris University
More informationSoftware Engineering
Software Engineering Lecture 04: The B Specification Method Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 50 The B specification method
More informationA Tool for Generating Partition Schedules of Multiprocessor Systems
A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.
More informationClarifying a vision on certification of MDA tools
SCIENTIFIC PAPERS, UNIVERSITY OF LATVIA, 2010. Vol. 757 COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES 23 29 P. Clarifying a vision on certification of MDA tools Antons Cernickins Riga Technical University,
More informationi-questionnaire A Software Service Tool for Data
i-questionnaire A Software Service Tool for Data Analysis in e-business 1 ANDY S.Y. LAI, 2 Y.C. POON 1, Department of Information and Communications Technology, Hong Kong Institute of Vocational Education,
More informationA Framework for the Semantics of Behavioral Contracts
A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK ashley.mcneile@metamaxim.com Abstract. Contracts have proved a powerful concept
More informationWORKSHOP ON TOPOLOGY AND ABSTRACT ALGEBRA FOR BIOMEDICINE
WORKSHOP ON TOPOLOGY AND ABSTRACT ALGEBRA FOR BIOMEDICINE ERIC K. NEUMANN Foundation Medicine, Cambridge, MA 02139, USA Email: eneumann@foundationmedicine.com SVETLANA LOCKWOOD School of Electrical Engineering
More informationProject Knowledge Management Based on Social Networks
DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological
More informationMEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
More informationDivision of Mathematical Sciences
Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree
More informationKeywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns.
Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Functional and Non-Functional
More informationInternational Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
More informationData Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, fabian.gruening@informatik.uni-oldenburg.de Abstract: Independent
More informationSpatio-Temporal Mapping -A Technique for Overview Visualization of Time-Series Datasets-
Progress in NUCLEAR SCIENCE and TECHNOLOGY, Vol. 2, pp.603-608 (2011) ARTICLE Spatio-Temporal Mapping -A Technique for Overview Visualization of Time-Series Datasets- Hiroko Nakamura MIYAMURA 1,*, Sachiko
More informationMetaGame: An Animation Tool for Model-Checking Games
MetaGame: An Animation Tool for Model-Checking Games Markus Müller-Olm 1 and Haiseung Yoo 2 1 FernUniversität in Hagen, Fachbereich Informatik, LG PI 5 Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de
More informationDong-Joo Kang* Dong-Kyun Kang** Balho H. Kim***
Visualization Issues of Mass Data for Efficient HMI Design on Control System in Electric Power Industry Visualization in Computerized Operation & Simulation Tools Dong-Joo Kang* Dong-Kyun Kang** Balho
More informationUML Representation Proposal for XTT Rule Design Method
UML Representation Proposal for XTT Rule Design Method Grzegorz J. Nalepa 1 and Krzysztof Kluza 1 Institute of Automatics, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059 Kraków, Poland
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer
More informationAnnotation for the Semantic Web during Website Development
Annotation for the Semantic Web during Website Development Peter Plessers, Olga De Troyer Vrije Universiteit Brussel, Department of Computer Science, WISE, Pleinlaan 2, 1050 Brussel, Belgium {Peter.Plessers,
More informationThe Theory of Concept Analysis and Customer Relationship Mining
The Application of Association Rule Mining in CRM Based on Formal Concept Analysis HongSheng Xu * and Lan Wang College of Information Technology, Luoyang Normal University, Luoyang, 471022, China xhs_ls@sina.com
More informationInformation Services for Smart Grids
Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic
More informationInteger Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions
Grade 7 Mathematics, Quarter 1, Unit 1.1 Integer Operations Overview Number of Instructional Days: 15 (1 day = 45 minutes) Content to Be Learned Describe situations in which opposites combine to make zero.
More information01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
More informationCS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
More informationEvolution of Interests in the Learning Context Data Model
Evolution of Interests in the Learning Context Data Model Hendrik Thüs, Mohamed Amine Chatti, Roman Brandt, Ulrik Schroeder Informatik 9 (Learning Technologies), RWTH Aachen University, Aachen, Germany
More informationA Scalability Model for Managing Distributed-organized Internet Services
A Scalability Model for Managing Distributed-organized Internet Services TSUN-YU HSIAO, KO-HSU SU, SHYAN-MING YUAN Department of Computer Science, National Chiao-Tung University. No. 1001, Ta Hsueh Road,
More informationPerformance Improvement Techniques for Customized Data Warehouse
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 213), PP 1-5 Performance Improvement Techniques for Customized Data Warehouse Md. Al Mamun
More informationPerspectives of Semantic Web in E- Commerce
Perspectives of Semantic Web in E- Commerce B. VijayaLakshmi M.Tech (CSE), KIET, A.GauthamiLatha Dept. of CSE, VIIT, Dr. Y. Srinivas Dept. of IT, GITAM University, Mr. K.Rajesh Dept. of MCA, KIET, ABSTRACT
More informationBPCMont: Business Process Change Management Ontology
BPCMont: Business Process Change Management Ontology Muhammad Fahad DISP Lab (http://www.disp-lab.fr/), Université Lumiere Lyon 2, France muhammad.fahad@univ-lyon2.fr Abstract Change management for evolving
More informationRotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
More informationAn Intelligent Sales Assistant for Configurable Products
An Intelligent Sales Assistant for Configurable Products Martin Molina Department of Artificial Intelligence, Technical University of Madrid Campus de Montegancedo s/n, 28660 Boadilla del Monte (Madrid),
More informationNew Hash Function Construction for Textual and Geometric Data Retrieval
Latest Trends on Computers, Vol., pp.483-489, ISBN 978-96-474-3-4, ISSN 79-45, CSCC conference, Corfu, Greece, New Hash Function Construction for Textual and Geometric Data Retrieval Václav Skala, Jan
More informationDefining and Checking Model Smells: A Quality Assurance Task for Models based on the Eclipse Modeling Framework
Defining and Checking Model Smells: A Quality Assurance Task for Models based on the Eclipse Modeling Framework Thorsten Arendt a, Matthias Burhenne a, Gabriele Taentzer a a Philipps-Universität Marburg,
More informationExecution of A Requirement Model in Software Development
Execution of A Requirement Model in Software Development Wuwei Shen, Mohsen Guizani and Zijiang Yang Dept of Computer Science, Western Michigan University {wwshen,mguizani,zijiang}@cs.wmich.edu Kevin Compton
More informationEmail Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
More informationKnowledge-based Approach in Information Systems Life Cycle and Information Systems Architecture
5 th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence and Informatics January 25-26, 2007 Poprad, Slovakia Knowledge-based Approach in Information Systems Life Cycle and Information
More informationEFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP
EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA jiangh@benedict.edu ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has
More informationContents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53
Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software
More informationFACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES
FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software
More informationA Contribution to Expert Decision-based Virtual Product Development
A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,
More informationComputer Science. 232 Computer Science. Degrees and Certificates Awarded. A.S. Degree Requirements. Program Student Outcomes. Department Offices
232 Computer Science Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface
More informationModel Driven Interoperability through Semantic Annotations using SoaML and ODM
Model Driven Interoperability through Semantic Annotations using SoaML and ODM JiuCheng Xu*, ZhaoYang Bai*, Arne J.Berre*, Odd Christer Brovig** *SINTEF, Pb. 124 Blindern, NO-0314 Oslo, Norway (e-mail:
More informationjeti: A Tool for Remote Tool Integration
jeti: A Tool for Remote Tool Integration Tiziana Margaria 1, Ralf Nagel 2, and Bernhard Steffen 2 1 Service Engineering for Distributed Systems, Institute for Informatics, University of Göttingen, Germany
More informationBPMN A Logical Model and Property Analysis. Antoni Ligęza
Decision Making in Manufacturing and Services Vol. 5 2011 No. 1 2 pp. 57 67 BPMN A Logical Model and Property Analysis Antoni Ligęza Abstract. Business Process Modeling Notation has become a powerful and
More informationXML DATA INTEGRATION SYSTEM
XML DATA INTEGRATION SYSTEM Abdelsalam Almarimi The Higher Institute of Electronics Engineering Baniwalid, Libya Belgasem_2000@Yahoo.com ABSRACT This paper describes a proposal for a system for XML data
More informationA Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools
A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools Dong-Joo Kang and Sunju Park Yonsei University unlimit0909@hotmail.com, boxenju@yonsei.ac.kr Abstract
More informationChap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
More informationOptimized Offloading Services in Cloud Computing Infrastructure
Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College
More informationFacilitating Business Process Discovery using Email Analysis
Facilitating Business Process Discovery using Email Analysis Matin Mavaddat Matin.Mavaddat@live.uwe.ac.uk Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process
More informationTransformation of OWL Ontology Sources into Data Warehouse
Transformation of OWL Ontology Sources into Data Warehouse M. Gulić Faculty of Maritime Studies, Rijeka, Croatia marko.gulic@pfri.hr Abstract - The Semantic Web, as the extension of the traditional Web,
More informationPeter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology
Peter Mileff PhD SOFTWARE ENGINEERING The Basics of Software Engineering University of Miskolc Department of Information Technology Introduction Péter Mileff - Department of Information Engineering Room
More informationModeling and Design of Intelligent Agent System
International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,
More informationData Mining Governance for Service Oriented Architecture
Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY alibek@tr.ibm.com Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationEnhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud
OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure
More informationA Case Study of Question Answering in Automatic Tourism Service Packaging
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0045 A Case Study of Question
More informationLightweight Data Integration using the WebComposition Data Grid Service
Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed
More informationProcess Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
More informationNovel Data Extraction Language for Structured Log Analysis
Novel Data Extraction Language for Structured Log Analysis P.W.D.C. Jayathilake 99X Technology, Sri Lanka. ABSTRACT This paper presents the implementation of a new log data extraction language. Theoretical
More informationFormal Verification Coverage: Computing the Coverage Gap between Temporal Specifications
Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering
More informationCourse Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
More informationCourse Syllabus. MATH 1350-Mathematics for Teachers I. Revision Date: 8/15/2016
Course Syllabus MATH 1350-Mathematics for Teachers I Revision Date: 8/15/2016 Catalog Description: This course is intended to build or reinforce a foundation in fundamental mathematics concepts and skills.
More informationThe ProB Animator and Model Checker for B
The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,
More informationBusiness Modeling with UML
Business Modeling with UML Hans-Erik Eriksson and Magnus Penker, Open Training Hans-Erik In order to keep up and be competitive, all companies Ericsson is and enterprises must assess the quality of their
More informationIntelligent interoperable application for employment exchange system using ontology
1 Webology, Volume 10, Number 2, December, 2013 Home Table of Contents Titles & Subject Index Authors Index Intelligent interoperable application for employment exchange system using ontology Kavidha Ayechetty
More informationQuery Processing in Data Integration Systems
Query Processing in Data Integration Systems Diego Calvanese Free University of Bozen-Bolzano BIT PhD Summer School Bressanone July 3 7, 2006 D. Calvanese Data Integration BIT PhD Summer School 1 / 152
More informationSEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.
More informationSQLMutation: A tool to generate mutants of SQL database queries
SQLMutation: A tool to generate mutants of SQL database queries Javier Tuya, Mª José Suárez-Cabal, Claudio de la Riva University of Oviedo (SPAIN) {tuya cabal claudio} @ uniovi.es Abstract We present a
More informationPeculiarities of semantic web-services cloud runtime
Procedia Computer Science Volume 71, 2015, Pages 208 214 2015 Annual International Conference on Biologically Inspired Cognitive Architectures Peculiarities of semantic web-services cloud runtime National
More informationII. PREVIOUS RELATED WORK
An extended rule framework for web forms: adding to metadata with custom rules to control appearance Atia M. Albhbah and Mick J. Ridley Abstract This paper proposes the use of rules that involve code to
More informationExtending Data Processing Capabilities of Relational Database Management Systems.
Extending Data Processing Capabilities of Relational Database Management Systems. Igor Wojnicki University of Missouri St. Louis Department of Mathematics and Computer Science 8001 Natural Bridge Road
More informationA Framework of Context-Sensitive Visualization for User-Centered Interactive Systems
Proceedings of 10 th International Conference on User Modeling, pp423-427 Edinburgh, UK, July 24-29, 2005. Springer-Verlag Berlin Heidelberg 2005 A Framework of Context-Sensitive Visualization for User-Centered
More informationINTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS
INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS Tadeusz Pankowski 1,2 1 Institute of Control and Information Engineering Poznan University of Technology Pl. M.S.-Curie 5, 60-965 Poznan
More informationAdministration of Access Control in Information Systems Using URBAC Model
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 89-109 Administration of Access Control in Information Systems Using URBAC Model Aneta Poniszewska-Marańda Institute of Information Technology
More informationVISUALIZATION OF GEOMETRICAL AND NON-GEOMETRICAL DATA
VISUALIZATION OF GEOMETRICAL AND NON-GEOMETRICAL DATA Maria Beatriz Carmo 1, João Duarte Cunha 2, Ana Paula Cláudio 1 (*) 1 FCUL-DI, Bloco C5, Piso 1, Campo Grande 1700 Lisboa, Portugal e-mail: bc@di.fc.ul.pt,
More informationResearch on Semantic Web Service Composition Based on Binary Tree
, pp.133-142 http://dx.doi.org/10.14257/ijgdc.2015.8.2.13 Research on Semantic Web Service Composition Based on Binary Tree Shengli Mao, Hui Zang and Bo Ni Computer School, Hubei Polytechnic University,
More informationMining Association Rules: A Database Perspective
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology
More informationA Mind Map Based Framework for Automated Software Log File Analysis
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake
More informationKeywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction
Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, nmansour@lau.edu.lb Keywords: Regression
More informationCOURSE DESCRIPTION FOR THE COMPUTER INFORMATION SYSTEMS CURRICULUM
COURSE DESCRIPTION FOR THE COMPUTER INFORMATION SYSTEMS CURRICULUM Course Code 2505100 Computing Fundamentals Pass/ Fail Prerequisite None This course includes an introduction to the use of the computer
More informationHow To Create A Data Transformation And Data Visualization Tool In Java (Xslt) (Programming) (Data Visualization) (Business Process) (Code) (Powerpoint) (Scripting) (Xsv) (Mapper) (
A Generic, Light Weight, Pluggable Data Transformation and Visualization Tool for XML to XML Transformation Rahil A. Khera 1, P. S. Game 2 1,2 Pune Institute of Computer Technology, Affiliated to SPPU,
More informationBachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
More informationClassification of Fuzzy Data in Database Management System
Classification of Fuzzy Data in Database Management System Deval Popat, Hema Sharda, and David Taniar 2 School of Electrical and Computer Engineering, RMIT University, Melbourne, Australia Phone: +6 3
More informationWeb-based Multimedia Content Management System for Effective News Personalization on Interactive Broadcasting
Web-based Multimedia Content Management System for Effective News Personalization on Interactive Broadcasting S.N.CHEONG AZHAR K.M. M. HANMANDLU Faculty Of Engineering, Multimedia University, Jalan Multimedia,
More informationGenetic Algorithm Evolution of Cellular Automata Rules for Complex Binary Sequence Prediction
Brill Academic Publishers P.O. Box 9000, 2300 PA Leiden, The Netherlands Lecture Series on Computer and Computational Sciences Volume 1, 2005, pp. 1-6 Genetic Algorithm Evolution of Cellular Automata Rules
More informationAN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS
AN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS ZORAN JEREMIĆ, VLADAN DEVEDŽIĆ, DRAGAN GAŠEVIĆ FON School of Business Administration, University of Belgrade Jove Ilića 154, POB 52, 11000 Belgrade,
More informationMathematical Induction. Lecture 10-11
Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach
More information