Keywords: cyberworlds, cellular model, formula expression, continuous quantity identifier, condition formula

Size: px
Start display at page:

Download "Keywords: cyberworlds, cellular model, formula expression, continuous quantity identifier, condition formula"

Transcription

1 Preprint: " An Example of Cloud Business Application Development using the Continuous Quantity Identifier of the Cellular Data System", Lecture Notes in Electrical Engineering ISSN: , in print, March 2011, Springer-Verlag, Heidelberg, Germany. An Example of Cloud Business Application Development using the Continuous Quantity Identifier of the Cellular Data System Toshio Kodama 1, Tosiyasu L. Kunii 2, Yoichi Seki 3 1 Maeda Corporation, Advanced Computer Systems, Inc., Iidabashi, Chiyoda-ku, Tokyo Japan 2 Morpho, Inc., Iidabashi First Tower 31F, Koraku, Bunkyo-ku, Tokyo Japan 3 Software Consultant, Hino-shi, Tokyo Japan 1 kodama@lab.acs-jp.com, kodama.ts@jcity.maeda.co.jp 2 kunii@ieee.org, kunii@acm.org, 3 yseki@amber.plala.or.jp Abstract. In the era of cloud computing, cyberworlds as information worlds have grown rapidly and on an extremely large scale to encapsulate real world activities like finance, commerce, education and manufacturing in the form of e-financing, e-commerce, distance education and e-manufacturing despite the lack of a firm mathematical foundation. In software engineering, many software development methodologies, including the waterfall model and object-oriented model have been introduced. But these current methodologies cannot yet solve the combinatorial explosion problem. A new approach, different from conventional engineering approach, is needed. We have developed a data processing system called the Cellular Data System (CDS) as a new methodology, based on the Incrementally Modular Abstraction Hierarchy (IMAH) in the cellular model, which offers powerful mathematical background in data modeling. In this paper, we develop a continuous quantity identifier to deal with objects that can express continuous quantity on the presentation level of IMAH and integrated it into the data search function of CDS. By taking advantage of continuous quantity identifiers with the data search function of CDS, development of business application logic using continuous quantity becomes much simpler and significantly reduces development and maintenance costs of the system. In addition, we show the effectiveness of a continuous quantity identifier by taking up some examples of core logic development of a car sharing reservation system. Keywords: cyberworlds, cellular model, formula expression, continuous quantity identifier, condition formula 1 Introduction The cyberworlds in cloud computing are distributed systems. Data and its dependencies are constantly changing within them. Cyberworlds are more

2 complicated and fluid than any other previous worlds in human history and are constantly evolving. Millions of people use Twitter or Facebook every minute through Web services on mobile phones which are one of main elements of cyberworlds. At the same time, user requirements for cyberworlds also change and become more complicated as cyberworlds change. If you analyze data using existing technology, you have to modify the schema design and application programs whenever schemas or user requirements for output change. That leads to combinatorial explosion, because user requirements, and their combinations and schemas must be specified clearly at the design stage. That is a fundamental problem, so we have to reconsider development from the data model level. Is there a data model that can reflect the changes in schemas and user requirements in cyberworlds? We consider that Incrementally Modular Abstraction Hierarchy (IMAH) of the cellular model built by one of the authors (T. L. Kunii) to be the most suitable model. The IMAH can model the architecture and the changes of cyberworlds and real worlds from the homotopy level which is most general to the view level which is the most concrete preserving invariants while preventing combinatorial explosion [1][13]. From the viewpoint of IMAH, existing data models are positioned as special cases. For example, UML can model objects at levels below the presentation level, and in the relational data model, a relation is an object at the presentation level which extends a cellular space because it has necessary attributes in which a type is defined, while the processing between relations is based on the set theoretical level. In the object-oriented model, an object is also the object at the presentation level, which extends a cellular space, while the relation between Classes is the tree structure, which is a special case of a topological space. An Object in XML is considered a special case of a cellular space that extends a topological space, because an attribute and its value are expressed in the same tag format. In our research, one of the authors (Y. Seki) proposed an algebraic system called Formula Expression as a development tool to realize the cellular model. Another (T. Kodama) has actually implemented CDS using Formula Expression [12]. In this paper, we have introduced the concept of a continuous quantity identifier into CDS. A continuous quantity formula is effective when a continuous quantity is dealt with in business application development. In addition, we have placed emphasis on practical use by taking up some examples. Firstly, we explain CDS and its main data search function briefly in Section 2, 3. Secondly, we design the properties of a continuous quantity by Formula Expression, and integrate them into the condition formula search function in Section 4. Next, we implement them in Section 5. We demonstrate the effectiveness of the continuous quantity identifier by developing a business application system, thereby abbreviating the process of designing and implementing most application programs in Section 6. The business application system is the core logic of a car sharing reservation system, where cars are reserved in accordance with customers required times and car reservation schedules. Related works are mentioned in Section 7. Lastly, we conclude in Section 8.

3 2 The Cellular Data System (CDS) 2.1 Incrementally Modular Abstraction Hierarchy The following list constitutes the Incrementally Modular Abstraction Hierarchy to be used for defining the architecture of cyberworlds and their modeling: 1. the homotopy (including fiber bundles) level 2. the set theoretical level 3. the topological space level 4. the adjunction space level 5. the cellular space level 6. the presentation (including geometry) level 7. the view (also called projection) level In modeling cyberworlds in cyberspaces, we define general properties of cyberworlds at the higher level and add more specific properties step by step while climbing down the Incrementally Modular Abstraction Hierarchy. The properties defined at the homotopy level are invariants of continuous changes of functions. The properties that do not change by continuous modifications in time and space are expressed at this level. At the set theoretical level, the elements of a cyberspace are defined, and a collection of elements constitutes a set with logical operations. When we define a function in a cyberspace, we need domains that guarantee continuity, such that neighbors are mapped to a nearby place. Therefore, a topology is introduced into a cyberspace through the concept of neighborhood. Cyberworlds are dynamic. Sometimes cyberspaces are attached to each other, an exclusive union of two cyberspaces where attached areas of two cyberspaces are equivalent. It may happen that an attached space is obtained. These attached spaces can be regarded as a set of equivalent spaces called a quotient space, which is another invariant. At the cellular structured space level, an inductive dimension is introduced into each cyberspace. At the presentation level, each space is represented in a form which may be imagined before designing the cyberworlds. At the view level, the cyberworlds are projected onto view screens. 2.2 The definition of Formula Expression Formula Expression in the alphabet is the result of finite times application of the following steps. 1. a (a Σ) is Formula Expression 2. unit element ε is Formula Expression 3. zero element φ is Formula Expression 4. when r and s are Formula Expression, addition of r+s is also Formula Expression 5. when r and s are Formula Expression, multiplication of r s is also Formula Expression 6. when r is Formula Expression, (r) is also Formula Expression

4 7. when r is Formula Expression, {r} is also Formula Expression 3 The Condition Formula Search of CDS If users can specify search conditions, data searching will become more functional. Here, we introduce the function for specifying conditions defining a condition formula by Formula Expression into CDS. Let propositions P, Q be sets which include characters p, q respectively. The conjunction, disjunction and negation of them in logical operation are defined by Formula Expression as follows: 1) Conjunction 2) Disjunction 3) Negation P Q = p q. (1) P Q = p+q. (2) P =!p. (3) A formula created from these is called a condition formula. Here "!" is a special factor which means negation. Recursivity by () in Formula Expression is supported so that the recursive search condition of a user is expressed by a condition formula. Condition formula processing is processing that results in a disjoint union of terms that satisfy a condition formula from a formula. When condition formula processing is considered, the concept of a remainder of spaces is inevitable. The processing consists of two maps: a quotient acquisition map f that derives a term that includes a specified identifier and a remainder acquisition map g that derives a term that does not include a specified identifier. If you assume x to be a formula and p,!p, p+q, p q,!(p+q),!(p q) to be condition formulas, the images of (x, p+q), (x, p q), (x,!(p+q)), (x,!(p q)) by f, g are the following: x = f(x, p)+g(x,!p) where f(x, p) g(x,!p) = φ. (4) f(x, p+q) = f(x, p)+f(g(x, p), q) (5) f(x, p q) = f(f(x, p), q) (6) f(x,!(p+q)) = g(g(x, p), q) (7) f(x,!(p q)) = g(f(f(x, p), q) (8) It is obvious that any complicated condition formula can be processed by the combinations of the above four correspondences.

5 4 A Continuous Quantity Identifier and Its Application to the Condition Formula Search of CDS 4.1 Definition The continuous quantity identifier is defined as one case of identifiers in Formula Expression, and therefore it follows the general operation of Formula Expression. If it is assumed that r and s (r<s) are arbitrary numerical identifiers, a continuous quantity identifier to express continuous quantity from r to s is defined [r+s]. If you assume t, u (t<u) and v, w (v<w) are also arbitrary numerical identifiers and a is an arbitrary letter factor, the continuous quantity identifier has the following properties: [s+r] = φ (if r<s). (1) [r+r] = ε. (2) a [r+s] = [r+s] a. (3) [r+s]+[t+u] = [r+u] (if r t<s u) = [t+s] (if t r<u s) = [r+s] (if r t<u s) = [t+u] (if t r<s u) = [r+s]+[t+u] (if t u r<s or r<s t u). [r+s] [t+u] = [t+s] (if r t<s u) = [r+u] (if t r<u s) = [t+u] (if r t<u s) = [r+s] (if t r<s u) = φ (if t u r<s or r<s t u). (4) (5) Next, the quotient acquisition map f of condition formula processing is applied to the continuous quantity identifier according to the above definitions as follows: f([r+s],[t+u]) = [t+s] (if r t<s u) = [r+u] (if t r<u s) = [t+u] (if r t<u s) = [r+s] (if t r<s u) = φ (if t u r<s or r<s t u) f([r+s],![t+u]) = [r+t] (if r t<s u) = [u+s] (if t r<u s) = [r+t]+[u+s] (if r t<u s) = φ (if t r<s u) = [r+s] (if t u r<s or r<s t u). (6) (7)

6 4.2 Applied Map g The applied map g, which replaces a formula including continuous quantity identifier(s) with the remainder of a specified continuous quantity identifier using the above f, is designed as follows; If you assume the entire set of formulas to be A, g: A, and arbitrary terms r, s, t, u follow these rules: g([r+s],u+v) = g([r+s],u)+g([r+s],v). (8) g([r+s],(u)) = (g([r+s],u)). (9) g([r+s],a [p+q] b) = a f([r+s],![p+q]) b. (10) A simple example of the map g is shown here. g([1+24], Kodama([12+14]+[16+18])) = Kodama([1+12]+[14+16]+[18+24]) 5 Implementation This system is a Web application developed using JSP and Tomcat 5.2 as an application server. The client and the server are the same machine. (OS: Windows XP; CPU: Intel Core2 Duo, 3.00GHz; RAM: 3.23GB; HD: 240GB) The quotient acquisition map f is the main function of condition formula processing. In this algorithm, the absolute position of the specified factor by the function of the language and the term including the factor are acquired first. Next, the nearest brackets of the term are acquired, and because the term becomes a factor, a recursive operation is performed. Details are abbreviated due to the restriction on the number of pages. 6 Case Study: A Car Sharing Reservation System 6.1 Outline Car sharing is a model of car rental where people rent cars for short periods of time, often by the hour. We take up the example of development of core logic of a car sharing reservation system as a business application using CDS. In this case study, we assume that there are five customers; customer (A, B, C, D, E) and three shared cars; car (1, 2, 3), and that each reservation is to be arranged by adjusting customers required times and car reservation schedules within a given period from 0 to 20. Firstly, formulas for customer s requirement times and car reservation times are designed using a continuous quantity identifier and an operation for getting the

7 formula for each s available time from them (6.2). Secondly, sample data of customers and cars are inputted and the operation is carried out according to the design. Thirdly, required data is outputted by the condition formula processing map (6.3). 6.2 Space design We design a formula for the space and the operation as follows: 1. The formula for a customer and their required times as a topological space Customer(Σcustomer id i Σ[r i +s i ]). (1) customer id i : a factor which identifies a customer [r i +s i ]: a continuous quantity identifier from r i to s i 2. The formula for shared cars and their reserved times as a topological space Shared Car(Σcar id i Σ[p i +q i ]). (2) car id i : a factor which identifies a car [p i +q i ]: a continuous quantity identifier from p i to q i 3. The operation for getting the formula for available times of shared cars g([0+20], Shared Car(Σcar id i Σ[p i +q i ])). (3) [0+20]: a continuous quantity identifier of the entire period (from 0 to 20) 6.3 Data input/output If customer A requires a shared car from time 7 to 8 and from time 13 to 15, a term for customer A is created according to the space design (1) as below: Customer(customer A ([7+8]+[13+15])) And if customer B requires a shared car from time 4 to 5 and from time 15 to 17, a term for a customer B is created and added to the previous term as below: +Customer(customer B ([4+5]+[15+17]))

8 Terms for customer C, customer D and customer E are also created as below and added to the previous formula: Customer(customer A ([7+8]+[13+15])+customer B ([4+5]+[15+17])+cust omer C ([8+20])+customer D ([6+10])+customer E ([7+8]+[13+15])). (4) In the same way, a term for car reservations is created and added to the previous formula according to the space design (2) as below: Shared Car(car1([0+4]+[10+14])+car2([4+7]+[14+17])+car2([7+10]+[12+1 4]+[17+20])). (5) The following operation is performed to get the formula for times when cars are available from formula (5) according to the operation design (3), which is then added to the formula (4). formula (4)+g([0+20],formula (5)) =Customer(customer A ([1+3]+[16+18])+customer B ([0+2]+[5+8])+cust omer C ([4+7]+[11+13])+customer D ([10+14]+[17+19])+customer E ([2+6]+[12+15]+[17+20]))+Shared Car(car1([4+10]+[14+20])+car2([0+4]+ [7+14]+[17+20])+car3([0+7]+[10+12]+[14+17])). (6) The resulting figure is shown in Fig 6.3. Fig 6.3 Times that customers require a car and when cars are available If you want to answer the question When and which cars can customer A use between times 10 and 20?, first you make the condition formula Customer(customer A)[10+20] from the question and get the image of formula (6) and the condition formula by the map f as below:

9 f(formula (6), Customer(customer A)[10+20] ) =Customer(customer A)[13+15]. (7) And then you get the image of formula (6) and the condition formula Shar ed Car[13+15] by the map f: f(formula (6), Shared Car[13+15] ) = Shared Car(car2 [13+14]+(car1+car3)[14+15]). (8) From the results, you can know that customer A can use car2 between times 13 and 14 and can also use car1 or car3 between times 14 and 15. Next, if you want to answer the question Which customer wants to use car1 from time 8 to 10?, you get the image of formula (6) and the condition formula (Customer+car1)[8+10] by the map f : f(formula (6), (Customer+car1)[8+10] ) = (Customer(customer C+customer D)+Shared Car(car1))[8+10]. (9) From the results, you can know that customer C, D want to use car1 from time 8 to 10. Next, if you want to answer the question Which customer can use which car between times 8 and 10?, you get the image of formula (6) and the condition formula (Customer+Shared Car)[8+10] by the map f: f(formula (6), (Customer+Shared car1)[8+10] ) =(Customer(customer C+customer D)+Shared Car(car1+car2))[8+10]. (10) From the results, you can know that customer C and D can use car1 or car2 from time 8 to Considerations Condition formula processing has become more effective by integrating a continuous quantity identifier when a continuous quantity such as time, distance, temperature, etc. is dealt with. If the existing method of business application development is used in this case study instead of the continuous quantity identifier function of CDS, complicated input/output programs would have to be developed according to needs, and the maintenance costs required to meet various and unexpected user requirements would be considerable.

10 7 Related Works The distinctive features of our research are the application of the concept of topological process, which deals with a subset as an element, and that the cellular space extends the topological space, as seen in Section 2. Relational OWL as a method of data and schema representation is useful when representing the schema and data of a database [2][5], but it is limited to representation of an object that has attributes. Our method can represent both objects: one that has attributes as a cellular space and one that does not have them as a set or a topological space. Many works applying other models to XML schema have been done. The motives of most of them are similar to ours. The approach in [8] aims at minimizing document revalidation in an XML schema evolution, based in part on the graph theory. The X- Entity model [9] is an extension of the Entity Relationship (ER) model and converts XML schema to a schema of the ER model. In the approach of [6], the conceptual and logical levels are represented using a standard UML class and the XML represents the physical level. XUML [10] is a conceptual model for XML schema, based on the UML2 standard. This application research concerning XML schema is needed because there are differences in the expression capability of the data model between XML and other models. On the other hand, objects and their relations in XML schema and the above models can be expressed consistently by CDS, which is based on the cellular model. That is because the tree structure, on which the XML model is based, and the graph structure [3][4][7], on which the UML and ER models are based, are special cases of a topological structure mathematically. Entity in the models can be expressed as the formula for a cellular space in CDS. Moreover, the relation between subsets cannot in general be expressed by XML. Although CDS and the existing deductive database apparently look alike, the two are completely different. The deductive database [11] raises the expression capability of the relational database (RDB) by defining some rules. On the other hand, CDS is a new tool for data management, and has nothing to do with the RDB. 8 Conclusions In this paper, we have designed and implemented a continuous quantity identifier and applied it to condition formula processing, which is the main data search function of CDS. A continuous quantity such as time, distance, etc. can be expressed as a factor in Formula Expression and integrated into business logic modeling in business application development. As a result, the cost of cloud application program development can be significantly reduced. References [1] T. L. Kunii and H. S. Kunii, A Cellular Model for Information Systems on the Web - Integrating Local and Global Information, In Proc. of DANTE'99, IEEE Computer Society Press, pp.19-24, 1999.

11 [2] Grigoris Antoniou1 and Frank van Harmelen, Web Ontology Language: OWL, Handbook on Ontologies, International Handbooks on Information Systems, Springer Publishing, 2009, Part 1, pp [3] Sergey Lukichev, Improving the quality of rule-based applications using the declarative verification approach, International Journal of Knowledge Engineering and Data Mining, Inderscience Publishers, Vol.1 Issue 3, pp , [4] David W. Embley, Semantic priming in a cortical network model, Journal of Cognitive Neuroscience, MIT Press, vol.21 Issue12, pp , [5] Ernestas Vysniauskas, Lina Nemuraite, TRANSFORMING ONTOLOGY REPRESENTATION FROM OWL TO RELATIONAL DATA, Information Technology and Control, Kaunas University of Technology, vol.35, pp , [6] Yuan An, John Mylopoulos, Alex Borgida, Building semantic mappings from databases to ontologies, In Proc. of AAAI'06, AAAI Press, pp , [7] Shlomi Dolev, Elad Michael Schiller, Paul G. Spirakis, Philippas Philippas, Strategies for repeated games with subsystem takeovers implementable by deterministic and self-stabilising automata, International Journal of Autonomous and Adaptive Communications Systems, Inderscience Publishers, Vol.4 Issue 1, pp.4-38, [8] Irena Mlynkova, Jaroslav Pokorny, FROM XML SCHEMA TO OBJECT- RELATIONAL DATABASE AN XML SCHEMA-DRIVEN MAPPING ALGORITHM, In Proc. of IADIS International Conference WWW/Internet 04, IADIS Press, pp , [9] Bernadette Farias Lósio, Ana Carolina Salgado, Luciano do Rêgo GalvĐo, Conceptual Modeling of XML Schemas, In Proc. of WIDM'03, ACM Press, pp , [10] Stephen J. Mellor, Marc J. Balcer, Executable UML: A Foundation for Model Driven Architecture, Addison Wesley, [11] Faiz Arni, Kayliang Ong, Shalom Tsur, Haixun Wang, Carlo Zaniolo, The Deductive Database System LDL++, Theory and Practice of Logic Programming, Cambridge University Press, pp.61-94, [12] Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki, A New Method for Developing Business Applications: The Cellular Data System, In Proc of CW'06, pp , IEEE Computer Society Press, [13] Kenji Ohmori, Tosiyasu L. Kunii, Designing and modeling cyberworlds using the incrementally modular abstraction hierarchy based on homotopy theory, The Visual Computer: International Journal of Computer Graphics, Vol. 26, No.5, pp ,, Springer-Verlag, 2010.

Cyber Graphics. Abstract. 1. What is cyber graphics? 2. An incrementally modular abstraction hierarchy of shape invariants

Cyber Graphics. Abstract. 1. What is cyber graphics? 2. An incrementally modular abstraction hierarchy of shape invariants Preprint of the Keynote Paper: Tosiyasu L. Kunii, Cyber Graphics, Proceedings of the First International Symposium on Cyber Worlds (CW2002), November 6-8 2002 Tokyo, Japan, in press, IEEE Computer Society

More information

DEVELOPMENT OF AN ACCOUNTING SYSTEM Applying the Incrementally Modular Abstraction Hierarchy to a Complex System

DEVELOPMENT OF AN ACCOUNTING SYSTEM Applying the Incrementally Modular Abstraction Hierarchy to a Complex System DEVELOPMENT OF AN ACCOUNTING SYSTEM Applying the Incrementally Modular Abstraction Hierarchy to a Complex System Kenji Ohmori Computer and Information Sciences, Hosei Univeristy, 3-7-2 Kajino-cho, Koganei-shi,

More information

Software Modeling and Verification

Software Modeling and Verification Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system

More information

Cloud Computing is NP-Complete

Cloud Computing is NP-Complete Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,

More information

A Tool for Searching the Semantic Web for Supplies Matching Demands

A Tool for Searching the Semantic Web for Supplies Matching Demands A Tool for Searching the Semantic Web for Supplies Matching Demands Zuzana Halanová, Pavol Návrat, Viera Rozinajová Abstract: We propose a model of searching semantic web that allows incorporating data

More information

Modeling Web Applications Using Java And XML Related Technologies

Modeling Web Applications Using Java And XML Related Technologies Modeling Web Applications Using Java And XML Related Technologies Sam Chung Computing & Stware Systems Institute Technology University Washington Tacoma Tacoma, WA 98402. USA chungsa@u.washington.edu Yun-Sik

More information

Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/

Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/ England, M. (2014) Formulating problems for real algebraic geometry. In: UNSPECIFIED. Link to official URL (if available): Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/ This

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

OWL based XML Data Integration

OWL based XML Data Integration OWL based XML Data Integration Manjula Shenoy K Manipal University CSE MIT Manipal, India K.C.Shet, PhD. N.I.T.K. CSE, Suratkal Karnataka, India U. Dinesh Acharya, PhD. ManipalUniversity CSE MIT, Manipal,

More information

Semantically Enhanced Web Personalization Approaches and Techniques

Semantically Enhanced Web Personalization Approaches and Techniques Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement

More information

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Peter Y. Wu wu@rmu.edu Department of Computer & Information Systems Robert Morris University

More information

Software Engineering

Software Engineering Software Engineering Lecture 04: The B Specification Method Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 50 The B specification method

More information

A Tool for Generating Partition Schedules of Multiprocessor Systems

A Tool for Generating Partition Schedules of Multiprocessor Systems A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.

More information

Clarifying a vision on certification of MDA tools

Clarifying a vision on certification of MDA tools SCIENTIFIC PAPERS, UNIVERSITY OF LATVIA, 2010. Vol. 757 COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES 23 29 P. Clarifying a vision on certification of MDA tools Antons Cernickins Riga Technical University,

More information

i-questionnaire A Software Service Tool for Data

i-questionnaire A Software Service Tool for Data i-questionnaire A Software Service Tool for Data Analysis in e-business 1 ANDY S.Y. LAI, 2 Y.C. POON 1, Department of Information and Communications Technology, Hong Kong Institute of Vocational Education,

More information

A Framework for the Semantics of Behavioral Contracts

A Framework for the Semantics of Behavioral Contracts A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK ashley.mcneile@metamaxim.com Abstract. Contracts have proved a powerful concept

More information

WORKSHOP ON TOPOLOGY AND ABSTRACT ALGEBRA FOR BIOMEDICINE

WORKSHOP ON TOPOLOGY AND ABSTRACT ALGEBRA FOR BIOMEDICINE WORKSHOP ON TOPOLOGY AND ABSTRACT ALGEBRA FOR BIOMEDICINE ERIC K. NEUMANN Foundation Medicine, Cambridge, MA 02139, USA Email: eneumann@foundationmedicine.com SVETLANA LOCKWOOD School of Electrical Engineering

More information

Project Knowledge Management Based on Social Networks

Project Knowledge Management Based on Social Networks DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

Division of Mathematical Sciences

Division of Mathematical Sciences Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree

More information

Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns.

Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns. Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Functional and Non-Functional

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, fabian.gruening@informatik.uni-oldenburg.de Abstract: Independent

More information

Spatio-Temporal Mapping -A Technique for Overview Visualization of Time-Series Datasets-

Spatio-Temporal Mapping -A Technique for Overview Visualization of Time-Series Datasets- Progress in NUCLEAR SCIENCE and TECHNOLOGY, Vol. 2, pp.603-608 (2011) ARTICLE Spatio-Temporal Mapping -A Technique for Overview Visualization of Time-Series Datasets- Hiroko Nakamura MIYAMURA 1,*, Sachiko

More information

MetaGame: An Animation Tool for Model-Checking Games

MetaGame: An Animation Tool for Model-Checking Games MetaGame: An Animation Tool for Model-Checking Games Markus Müller-Olm 1 and Haiseung Yoo 2 1 FernUniversität in Hagen, Fachbereich Informatik, LG PI 5 Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de

More information

Dong-Joo Kang* Dong-Kyun Kang** Balho H. Kim***

Dong-Joo Kang* Dong-Kyun Kang** Balho H. Kim*** Visualization Issues of Mass Data for Efficient HMI Design on Control System in Electric Power Industry Visualization in Computerized Operation & Simulation Tools Dong-Joo Kang* Dong-Kyun Kang** Balho

More information

UML Representation Proposal for XTT Rule Design Method

UML Representation Proposal for XTT Rule Design Method UML Representation Proposal for XTT Rule Design Method Grzegorz J. Nalepa 1 and Krzysztof Kluza 1 Institute of Automatics, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059 Kraków, Poland

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer

More information

Annotation for the Semantic Web during Website Development

Annotation for the Semantic Web during Website Development Annotation for the Semantic Web during Website Development Peter Plessers, Olga De Troyer Vrije Universiteit Brussel, Department of Computer Science, WISE, Pleinlaan 2, 1050 Brussel, Belgium {Peter.Plessers,

More information

The Theory of Concept Analysis and Customer Relationship Mining

The Theory of Concept Analysis and Customer Relationship Mining The Application of Association Rule Mining in CRM Based on Formal Concept Analysis HongSheng Xu * and Lan Wang College of Information Technology, Luoyang Normal University, Luoyang, 471022, China xhs_ls@sina.com

More information

Information Services for Smart Grids

Information Services for Smart Grids Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic

More information

Integer Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions

Integer Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions Grade 7 Mathematics, Quarter 1, Unit 1.1 Integer Operations Overview Number of Instructional Days: 15 (1 day = 45 minutes) Content to Be Learned Describe situations in which opposites combine to make zero.

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

Evolution of Interests in the Learning Context Data Model

Evolution of Interests in the Learning Context Data Model Evolution of Interests in the Learning Context Data Model Hendrik Thüs, Mohamed Amine Chatti, Roman Brandt, Ulrik Schroeder Informatik 9 (Learning Technologies), RWTH Aachen University, Aachen, Germany

More information

A Scalability Model for Managing Distributed-organized Internet Services

A Scalability Model for Managing Distributed-organized Internet Services A Scalability Model for Managing Distributed-organized Internet Services TSUN-YU HSIAO, KO-HSU SU, SHYAN-MING YUAN Department of Computer Science, National Chiao-Tung University. No. 1001, Ta Hsueh Road,

More information

Performance Improvement Techniques for Customized Data Warehouse

Performance Improvement Techniques for Customized Data Warehouse IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 213), PP 1-5 Performance Improvement Techniques for Customized Data Warehouse Md. Al Mamun

More information

Perspectives of Semantic Web in E- Commerce

Perspectives of Semantic Web in E- Commerce Perspectives of Semantic Web in E- Commerce B. VijayaLakshmi M.Tech (CSE), KIET, A.GauthamiLatha Dept. of CSE, VIIT, Dr. Y. Srinivas Dept. of IT, GITAM University, Mr. K.Rajesh Dept. of MCA, KIET, ABSTRACT

More information

BPCMont: Business Process Change Management Ontology

BPCMont: Business Process Change Management Ontology BPCMont: Business Process Change Management Ontology Muhammad Fahad DISP Lab (http://www.disp-lab.fr/), Université Lumiere Lyon 2, France muhammad.fahad@univ-lyon2.fr Abstract Change management for evolving

More information

Rotorcraft Health Management System (RHMS)

Rotorcraft Health Management System (RHMS) AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center

More information

An Intelligent Sales Assistant for Configurable Products

An Intelligent Sales Assistant for Configurable Products An Intelligent Sales Assistant for Configurable Products Martin Molina Department of Artificial Intelligence, Technical University of Madrid Campus de Montegancedo s/n, 28660 Boadilla del Monte (Madrid),

More information

New Hash Function Construction for Textual and Geometric Data Retrieval

New Hash Function Construction for Textual and Geometric Data Retrieval Latest Trends on Computers, Vol., pp.483-489, ISBN 978-96-474-3-4, ISSN 79-45, CSCC conference, Corfu, Greece, New Hash Function Construction for Textual and Geometric Data Retrieval Václav Skala, Jan

More information

Defining and Checking Model Smells: A Quality Assurance Task for Models based on the Eclipse Modeling Framework

Defining and Checking Model Smells: A Quality Assurance Task for Models based on the Eclipse Modeling Framework Defining and Checking Model Smells: A Quality Assurance Task for Models based on the Eclipse Modeling Framework Thorsten Arendt a, Matthias Burhenne a, Gabriele Taentzer a a Philipps-Universität Marburg,

More information

Execution of A Requirement Model in Software Development

Execution of A Requirement Model in Software Development Execution of A Requirement Model in Software Development Wuwei Shen, Mohsen Guizani and Zijiang Yang Dept of Computer Science, Western Michigan University {wwshen,mguizani,zijiang}@cs.wmich.edu Kevin Compton

More information

Email Spam Detection Using Customized SimHash Function

Email Spam Detection Using Customized SimHash Function International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email

More information

Knowledge-based Approach in Information Systems Life Cycle and Information Systems Architecture

Knowledge-based Approach in Information Systems Life Cycle and Information Systems Architecture 5 th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence and Informatics January 25-26, 2007 Poprad, Slovakia Knowledge-based Approach in Information Systems Life Cycle and Information

More information

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP Hong Jiang Mathematics & Computer Science Department, Benedict College, USA jiangh@benedict.edu ABSTRACT DCSP (Distributed Constraint Satisfaction Problem) has

More information

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53 Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software

More information

FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES

FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software

More information

A Contribution to Expert Decision-based Virtual Product Development

A Contribution to Expert Decision-based Virtual Product Development A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,

More information

Computer Science. 232 Computer Science. Degrees and Certificates Awarded. A.S. Degree Requirements. Program Student Outcomes. Department Offices

Computer Science. 232 Computer Science. Degrees and Certificates Awarded. A.S. Degree Requirements. Program Student Outcomes. Department Offices 232 Computer Science Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface

More information

Model Driven Interoperability through Semantic Annotations using SoaML and ODM

Model Driven Interoperability through Semantic Annotations using SoaML and ODM Model Driven Interoperability through Semantic Annotations using SoaML and ODM JiuCheng Xu*, ZhaoYang Bai*, Arne J.Berre*, Odd Christer Brovig** *SINTEF, Pb. 124 Blindern, NO-0314 Oslo, Norway (e-mail:

More information

jeti: A Tool for Remote Tool Integration

jeti: A Tool for Remote Tool Integration jeti: A Tool for Remote Tool Integration Tiziana Margaria 1, Ralf Nagel 2, and Bernhard Steffen 2 1 Service Engineering for Distributed Systems, Institute for Informatics, University of Göttingen, Germany

More information

BPMN A Logical Model and Property Analysis. Antoni Ligęza

BPMN A Logical Model and Property Analysis. Antoni Ligęza Decision Making in Manufacturing and Services Vol. 5 2011 No. 1 2 pp. 57 67 BPMN A Logical Model and Property Analysis Antoni Ligęza Abstract. Business Process Modeling Notation has become a powerful and

More information

XML DATA INTEGRATION SYSTEM

XML DATA INTEGRATION SYSTEM XML DATA INTEGRATION SYSTEM Abdelsalam Almarimi The Higher Institute of Electronics Engineering Baniwalid, Libya Belgasem_2000@Yahoo.com ABSRACT This paper describes a proposal for a system for XML data

More information

A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools

A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools Dong-Joo Kang and Sunju Park Yonsei University unlimit0909@hotmail.com, boxenju@yonsei.ac.kr Abstract

More information

Chap 1. Introduction to Software Architecture

Chap 1. Introduction to Software Architecture Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)

More information

Optimized Offloading Services in Cloud Computing Infrastructure

Optimized Offloading Services in Cloud Computing Infrastructure Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College

More information

Facilitating Business Process Discovery using Email Analysis

Facilitating Business Process Discovery using Email Analysis Facilitating Business Process Discovery using Email Analysis Matin Mavaddat Matin.Mavaddat@live.uwe.ac.uk Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process

More information

Transformation of OWL Ontology Sources into Data Warehouse

Transformation of OWL Ontology Sources into Data Warehouse Transformation of OWL Ontology Sources into Data Warehouse M. Gulić Faculty of Maritime Studies, Rijeka, Croatia marko.gulic@pfri.hr Abstract - The Semantic Web, as the extension of the traditional Web,

More information

Peter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology

Peter Mileff PhD SOFTWARE ENGINEERING. The Basics of Software Engineering. University of Miskolc Department of Information Technology Peter Mileff PhD SOFTWARE ENGINEERING The Basics of Software Engineering University of Miskolc Department of Information Technology Introduction Péter Mileff - Department of Information Engineering Room

More information

Modeling and Design of Intelligent Agent System

Modeling and Design of Intelligent Agent System International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,

More information

Data Mining Governance for Service Oriented Architecture

Data Mining Governance for Service Oriented Architecture Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY alibek@tr.ibm.com Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure

More information

A Case Study of Question Answering in Automatic Tourism Service Packaging

A Case Study of Question Answering in Automatic Tourism Service Packaging BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0045 A Case Study of Question

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

Process Modelling from Insurance Event Log

Process Modelling from Insurance Event Log Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R

More information

Novel Data Extraction Language for Structured Log Analysis

Novel Data Extraction Language for Structured Log Analysis Novel Data Extraction Language for Structured Log Analysis P.W.D.C. Jayathilake 99X Technology, Sri Lanka. ABSTRACT This paper presents the implementation of a new log data extraction language. Theoretical

More information

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

Course Syllabus. MATH 1350-Mathematics for Teachers I. Revision Date: 8/15/2016

Course Syllabus. MATH 1350-Mathematics for Teachers I. Revision Date: 8/15/2016 Course Syllabus MATH 1350-Mathematics for Teachers I Revision Date: 8/15/2016 Catalog Description: This course is intended to build or reinforce a foundation in fundamental mathematics concepts and skills.

More information

The ProB Animator and Model Checker for B

The ProB Animator and Model Checker for B The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,

More information

Business Modeling with UML

Business Modeling with UML Business Modeling with UML Hans-Erik Eriksson and Magnus Penker, Open Training Hans-Erik In order to keep up and be competitive, all companies Ericsson is and enterprises must assess the quality of their

More information

Intelligent interoperable application for employment exchange system using ontology

Intelligent interoperable application for employment exchange system using ontology 1 Webology, Volume 10, Number 2, December, 2013 Home Table of Contents Titles & Subject Index Authors Index Intelligent interoperable application for employment exchange system using ontology Kavidha Ayechetty

More information

Query Processing in Data Integration Systems

Query Processing in Data Integration Systems Query Processing in Data Integration Systems Diego Calvanese Free University of Bozen-Bolzano BIT PhD Summer School Bressanone July 3 7, 2006 D. Calvanese Data Integration BIT PhD Summer School 1 / 152

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.

More information

SQLMutation: A tool to generate mutants of SQL database queries

SQLMutation: A tool to generate mutants of SQL database queries SQLMutation: A tool to generate mutants of SQL database queries Javier Tuya, Mª José Suárez-Cabal, Claudio de la Riva University of Oviedo (SPAIN) {tuya cabal claudio} @ uniovi.es Abstract We present a

More information

Peculiarities of semantic web-services cloud runtime

Peculiarities of semantic web-services cloud runtime Procedia Computer Science Volume 71, 2015, Pages 208 214 2015 Annual International Conference on Biologically Inspired Cognitive Architectures Peculiarities of semantic web-services cloud runtime National

More information

II. PREVIOUS RELATED WORK

II. PREVIOUS RELATED WORK An extended rule framework for web forms: adding to metadata with custom rules to control appearance Atia M. Albhbah and Mick J. Ridley Abstract This paper proposes the use of rules that involve code to

More information

Extending Data Processing Capabilities of Relational Database Management Systems.

Extending Data Processing Capabilities of Relational Database Management Systems. Extending Data Processing Capabilities of Relational Database Management Systems. Igor Wojnicki University of Missouri St. Louis Department of Mathematics and Computer Science 8001 Natural Bridge Road

More information

A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems

A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems Proceedings of 10 th International Conference on User Modeling, pp423-427 Edinburgh, UK, July 24-29, 2005. Springer-Verlag Berlin Heidelberg 2005 A Framework of Context-Sensitive Visualization for User-Centered

More information

INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS

INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS Tadeusz Pankowski 1,2 1 Institute of Control and Information Engineering Poznan University of Technology Pl. M.S.-Curie 5, 60-965 Poznan

More information

Administration of Access Control in Information Systems Using URBAC Model

Administration of Access Control in Information Systems Using URBAC Model JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 89-109 Administration of Access Control in Information Systems Using URBAC Model Aneta Poniszewska-Marańda Institute of Information Technology

More information

VISUALIZATION OF GEOMETRICAL AND NON-GEOMETRICAL DATA

VISUALIZATION OF GEOMETRICAL AND NON-GEOMETRICAL DATA VISUALIZATION OF GEOMETRICAL AND NON-GEOMETRICAL DATA Maria Beatriz Carmo 1, João Duarte Cunha 2, Ana Paula Cláudio 1 (*) 1 FCUL-DI, Bloco C5, Piso 1, Campo Grande 1700 Lisboa, Portugal e-mail: bc@di.fc.ul.pt,

More information

Research on Semantic Web Service Composition Based on Binary Tree

Research on Semantic Web Service Composition Based on Binary Tree , pp.133-142 http://dx.doi.org/10.14257/ijgdc.2015.8.2.13 Research on Semantic Web Service Composition Based on Binary Tree Shengli Mao, Hui Zang and Bo Ni Computer School, Hubei Polytechnic University,

More information

Mining Association Rules: A Database Perspective

Mining Association Rules: A Database Perspective IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology

More information

A Mind Map Based Framework for Automated Software Log File Analysis

A Mind Map Based Framework for Automated Software Log File Analysis 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake

More information

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, nmansour@lau.edu.lb Keywords: Regression

More information

COURSE DESCRIPTION FOR THE COMPUTER INFORMATION SYSTEMS CURRICULUM

COURSE DESCRIPTION FOR THE COMPUTER INFORMATION SYSTEMS CURRICULUM COURSE DESCRIPTION FOR THE COMPUTER INFORMATION SYSTEMS CURRICULUM Course Code 2505100 Computing Fundamentals Pass/ Fail Prerequisite None This course includes an introduction to the use of the computer

More information

How To Create A Data Transformation And Data Visualization Tool In Java (Xslt) (Programming) (Data Visualization) (Business Process) (Code) (Powerpoint) (Scripting) (Xsv) (Mapper) (

How To Create A Data Transformation And Data Visualization Tool In Java (Xslt) (Programming) (Data Visualization) (Business Process) (Code) (Powerpoint) (Scripting) (Xsv) (Mapper) ( A Generic, Light Weight, Pluggable Data Transformation and Visualization Tool for XML to XML Transformation Rahil A. Khera 1, P. S. Game 2 1,2 Pune Institute of Computer Technology, Affiliated to SPPU,

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

Classification of Fuzzy Data in Database Management System

Classification of Fuzzy Data in Database Management System Classification of Fuzzy Data in Database Management System Deval Popat, Hema Sharda, and David Taniar 2 School of Electrical and Computer Engineering, RMIT University, Melbourne, Australia Phone: +6 3

More information

Web-based Multimedia Content Management System for Effective News Personalization on Interactive Broadcasting

Web-based Multimedia Content Management System for Effective News Personalization on Interactive Broadcasting Web-based Multimedia Content Management System for Effective News Personalization on Interactive Broadcasting S.N.CHEONG AZHAR K.M. M. HANMANDLU Faculty Of Engineering, Multimedia University, Jalan Multimedia,

More information

Genetic Algorithm Evolution of Cellular Automata Rules for Complex Binary Sequence Prediction

Genetic Algorithm Evolution of Cellular Automata Rules for Complex Binary Sequence Prediction Brill Academic Publishers P.O. Box 9000, 2300 PA Leiden, The Netherlands Lecture Series on Computer and Computational Sciences Volume 1, 2005, pp. 1-6 Genetic Algorithm Evolution of Cellular Automata Rules

More information

AN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS

AN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS AN INTELLIGENT TUTORING SYSTEM FOR LEARNING DESIGN PATTERNS ZORAN JEREMIĆ, VLADAN DEVEDŽIĆ, DRAGAN GAŠEVIĆ FON School of Business Administration, University of Belgrade Jove Ilića 154, POB 52, 11000 Belgrade,

More information

Mathematical Induction. Lecture 10-11

Mathematical Induction. Lecture 10-11 Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach

More information