Model of Documents Management for Academic and Research Universities on Basis Set Theory

Size: px
Start display at page:

Download "Model of Documents Management for Academic and Research Universities on Basis Set Theory"

Transcription

1 American-Eurasian J. Agric. & Environ. Sci., 15 (5): , 2015 ISSN IDOSI Publications, 2015 DOI: /idosi.aejaes Model of Documents Management for Academic and Research Universities on Basis Set Theory M.N. Krasnyanskiy, S.V. Karpushkin, A.D. Obukhov and A.V. Ostroukh 1 Tambov State Technical University, Department of Computer-Integrated Systems in Mechanical Engineering, Tambov, Russian Federation 2 State Technical University - MADI, Department of Automated Control Systems, Moscow, Russian Federation Abstract: We described the application of set theory to the construction of a mathematical model of electronic document management system (EDMS) of educational and scientific institutions, which are a special case of agricultural institutions. We studied the major problems of classical and electronic document management and analyzed the work of intellectual property protection department in the academic and research institutions. We developed a mathematical model based on interaction of sets of objects, users and operations as central elements of a document management system. We introduced the basic concepts and operations of a document management process, the interrelation of sets and considered the problems restricting access to objects. Based on the proposed mathematical model we developed and described the document management information system for the Department of intellectual property protection and described the structure of its database. The results of the scientific and practical studies can be used in the development of integrated document management systems for academic and research institutions including agricultural institute. Key words: Electronic document management Patenting Set theory Automation in education Agricultural institute IT-based management Intellectual property protection INTRODUCTION limited to the scope of Department of intellectual property protection of an academic and research institution and the The introduction of information systems of electronic application of set theory to describe the subsystem document management (EDM) is necessitated by an software. ever-increasing volume of processed information, high reliability requirements to storage, processing speed and Subject Area Analysis: Any process of automation is data transfer. An academic and research institution with preceded by a deep analysis of the subject area, multiple information flows connected to a single complex processes occurring in the system, its constituent objects document management system is not an exception in the and subjects. In this case, we consider a system of overall process of labor automation. These features are document management for the Department of intellectual inherent for agricultural institutions as well as scientific property protection of an academic and research and research centers in agricultural industry [1, 2, 3, 4]. institution in general has examined, but the processes The implementation of a large-scale, sophisticated EDMS occurred here are correspond to those in the departments is a laborious and time-consuming process, requiring a of patenting in agricultural enterprises [5, 6]. As part of its significant amount of resources. Construction of work, the Department processes applications for mathematical models for such complex systems is not a registration of computer programs, databases and patents trivial task. Therefore, in this paper we will look at a from academic and research institution employees and separate subsystem of electronic document management external users. Further, a package of documents required Corresponding Author: M.N. Krasnyanskiy, Tambov State Technical University, Department of Computer-Integrated Systems in Mechanical Engineering, Tambov, Russian Federation. 824

2 for obtaining a certificate of registration or patent is S = < U, P >, formed. After all the documents have been checked, the package is submitted to the Federal Institute of Industrial where S is a document management system; U={ u 1, u 2,... Property (FIPS). If the application is approved, the u N } are set of objects (documents, projects, results of academic and research institution and the authors of the experiments, research and development (R & D), design application are granted exclusive rights under the projects (DP), etc.); P={ p 1, p 2,..., p Q }are multiple users intellectual property law [7]. [15]; The subject area analysis identified several important problems to be solved using modern information u i= < C i, A i, D i>, technologies: where u iis the i-th object of document management; C i={ Reducing time and costs of data processing and c i1, c i2,... c im } is a set of states of the i-th object; A i ={ a i1, documentation; a i2,... a it } is a set of attributes of the i-th object with the Replacing primitive local databases, Excel corresponding elements of a set of attribute values D i={ spreadsheets, text documents, etc; d i1, d i2,... d it }. The state of the object c im is characterized Incorporating fast and convenient feedback tools, as by ordered pairs: well as those permitting changes to the application without the authors consent; c im={(a it, d it) a it A i, d it D i, t=1..t i}, Providing automatic mailing of certificates. where T iis the number of attributes of the object u i. Then, Statement of the Problem: Having considered the main to get the current state of the object u i, you must apply processes and problems of paper document management the function of the state µ (u): in the Department of intellectual property protection, we set the tasks of the EDMS designing. These include µ(u i) = c im. designing of an electronic document management system for the Department of intellectual property protection, We also introduce the concept of a set of operations solving the problems of designing, processing and O={ o 1, o 2,..., o L}. Each operation in changing the object management of applications, arranging interaction u i performed by the user p q, can be represented by the between the authors and the Department staff members, function: automation of documentation [8, 9, 10]. To achieve these goals we propose to use Web-technologies for the * o l(u i, p q): u i u i, c im c ik, (a it, d it) (a it, d it ), (1) development of the information system, as their application makes the implementation of client-server if the following condition holds architecture easier and faster and provides multi-user work with the system [11, 12]. The first stage in the p q {p j (p x) (u i). (o l)}, (2) where l=1..l, t=1..ti development of the system is the description of a * and dit are new values of a it attributes of the object ui mathematical model based on set theory, which is the after the operation ol is performed and the object foundation of the EDMS. changes its state form c im to c ik. To perform the operation the user p q must have the necessary level of access Mathematical Model of the EDMS Based on Set Theory: determined by the access function (x), where In the given subject area the main object is a document parameter x is the object of document management, user which is subject to various operations resulting in its or operation and the result is a numerical value creation, changes or deletion. These actions are representing the specified user s access level or the performed by a limited number of people, namely, users of desired value of access to the object or operation. Thus, the system. Each of these actions, depending on the type if the user access level (p x) is greater or equal to the of tool and its current state, results in a change of certain product of object access levels (u i) and performed intrinsic attributes [13, 14]. Thus, based on the above a operation (o l), this operation can be performed by the document can be represented as a system with multiple user. Take for instance the read operation o 1 and editing objects, changing their attributes and states by the operation o2performed by two users p 1 and p 2, where, actions of multiple users: (p ) < (p ) [16]

3 The read operation o of the object u can be The tree compression is the process of deletion of states 1 1 performed by the users p and p, if (p1)> (u ). (o ) that do not satisfy the conditions or remain unclaimed by and (p )> (u1). (o ), respectively. the users. 2 1 If (p 1) < (u 1). (o 2) and (p 2)> (u 1). (o 2), Let us consider some examples of the tree extension, the editing operation o of the object u cannot be where the document u is the object, whose state tree is 2 1 performed by the user p 1, but it can be performed by the shown in Fig. 1. The tree extension can be made by one user p 2. user through document editing, which results in new Changing of the states will continue until the object versions of the document represented as states c i5, ci6 reaches a certain achievable end state c im, which means (Fig. 2a). In the course of further work on the document that the work with the object is completed at this point. user p 1 must come to a final version of the document, A unique feature of a document management system consisting of either one of the possible states c im, or their of an academic and research institution is that it stores union (Fig. 2b) through the operation of union o U. not only conventional documents, but also projects, When combining states, the object acquires the attribute results of experiments, R&D, DP, etc. This feature entails values from different states, forming a new, unique object the need to provide information not only about the state (c i7). The operation o U is significantly different from current state of the object, but also its past states and, the above considered operations o l as several states {c ij} moreover, the possible states. The examples of possible are involved in the creation of a new state c ik. We states of an object include different versions of a represent this as the ratio: scientific report, document or set of experimental results. * In this case, the state tree of an object u i is understood as o U(u i, p q): u i u i, {c ij} c ik, (a it, d it) (a it, d it ), (3) a directed graph, where the elements of a set of states c ij={ c ij Y U(c ij)>0, j=1..m }, C i={c i1, c i2,... c im} are the vertices of the graph containing information on all states c im of the u i. A set of branches are where Y U is a set of conditions of bundling: Y U(c ij)>0, if elements of the set of operations O performed on the condition c ij is valid for the bundling; Y U(c ij)<0 otherwise. object by multiple users P [17, 18]. Another example of the tree extension can be joint Thus, to construct a mathematical model given the work on the same document (Fig. 3). In this case, specificity of an academic and research institution it is operations are performed on the object by multiple users necessary to build the state tree C i for each object u i. (p 1, p 2, p 3), each of which generates their own version of Each vertex describes the state of the object c im, resulted the document u i. In this example, the state of the object from the operation o l performed by the user p q on the should be reduced to a single state, which is the most object u i, being in the state c ik. The states of the object are appropriate (in Fig. 3 it is c i9), however, there can be more described by ordered pairs of attributes and their values than one resulting final state of the object. (a it, d it), which comprise the technical attributes of the Thus, after the final satisfying state of the object has object (size, date, type, etc.) and the values, variables, text been received, the user must determine which of the and numeric fields, graphics, audio or any other type of states of the object they want to save for future work and information describing the object. Thus, the process of which of them have no value. Thus, the next stage is the constructing a state tree involves the analysis of the tree compression. object life cycle and its representation in the form of a Let us consider this process for both examples. In the directed graph, whose tree root is its original state c i1 of first case, after the work on the document is completed, the object u i and vertices of the graph are the states c im. the author has 7 states of the object, including the initial A simple state tree is shown in Fig. 1. and final. The state c i7 has the greatest practical value to We assume that the object u i is a document, the the user. Suppose that the state c i3 also keeps important states c ij (j = 1.4) correspond to different stages of data (as one of the stages of the work), while the editing (from the creation of document to its finalization). remaining states are to be deleted using the operation of We use the following operations: o 1 is read operation, o 2 compression of the object o c. The operation o cextends the is editing operation, o 3 is save operation. Now, we existing set of operations O, but its implementation leads consider two important operations on the state tree: to deletion of states, rather than their change: the extension and compression of the tree. The tree extension is understood as the process of acquiring new o c(u i, p q): u i u i, C i= C i\ C i*, (4) states c of the object u, resulting from the operations o. C * C, c *={ c Y (c )<0, j=1..m }, ik i l i i ij ij ñ ij i 826

4 Fig. 1: A simple state tree of an object u i Fig. 2: State tree extension by one user Fig. 3: State tree extension by multiple users Fig. 4: State tree compression 827

5 Fig. 5: A fragment of the database of document management information system Fig. 6: Sample application form where Y c is a set of conditions of the value of the state: Yc construction of the state tree of an object. Now, we turn (c ij)> 0 if cij state satisfies the conditions of the user; YC to the main elements of designing the information system (cij) <0 otherwise. Thus, a subset of C i * consists of the based on the given mathematical model. elements that do not satisfy the conditions of the user or the current task. After the operation of compression has Designing of the Information System: The resulting been completed, the object stores only the states mathematical model is the basis for the designing of the necessary for further work. We denote this by darkening database and the formation of the overall structure of the the vertices of the remote states in the graph (Fig. 4a). information system of document management, which we Thus, we examined the components of the consider on the example of the Department of intellectual mathematical model of document management between property protection of an academic and research sets, basic attributes and operations on objects, the institution [19, 20]. 828

6 Multiple documents U = {u 1, u 2} consist of the two required standard on the computer. They are available basic forms of database tables Applications and both for printing and editing by means of Microsoft Certificates. For each of them, we indicate entry boxes Office, if there is such a need. After the copyright for corresponding to the set of states and parameters. In our invention or computer program has been granted, the staff case, states are described by the entry boxes application member uploads all the necessary certificates to the registered, checked by author, checked by database and then, they are available to all authors and administrator, completed and parameters are described entered into their personal ranking [28, 29]. by the fields date, size, author, etc. [21]. Elements of the set of users P are collected in the CONCLUSIONS table containing data on logins, passwords and access rights of the user, on the basis of which the system We described the process of designing the determines which operations on the set of documents O information system of electronic document management the user can perform. Accordingly, the system of access using set theory in the construction of the mathematical to the object (2) has a simpler form: two types of users model. As the subject area we chose the Department of with high and normal levels of access, objects with similar intellectual property protection of an academic and access requirements and the two types of operations research institution. Chairs, which are similar in structure, (public and administrative) [22, 23, 24]. have presented in agricultural institutions and plants and Operations are implemented in the form of perform the task of patenting of inventions in agricultural procedures, functions and queries to the database, which technologies. The proposed approaches for development is fully consistent with the concept of operations in the of automated control system of documents and building developed mathematical model. The operations of of information system are applicable for the processes and bundling (3) and compression (4) are expressed in managing the documentation both in scientific and bundling and deletion of files, respectively. agricultural institutions. As several users can refer to one document, this has We analyzed the subject area and created a led to the implementation of another table Add. authors, mathematical model based on the interaction of multiple which describes the relationship one-to-many. users, objects and operations. Operations act as a tool to Figure 5 shows a fragment of the database underlying move an object from one state to another. We introduced a document management information system for the the concept of differentiation of access to subject using Department of intellectual property protection of an the function access that determines the possibility of academic and research institution. performing an operation on the object by a particular user. Thus, we developed an information system in the We considered the concept of state tree, the form of a website with the following structure sections: operations of extension and compression to describe the Computer programs / Databases, Patents, all of which life cycle of an object. The first category includes have sub-sections Service notes, Applications and operations that enable to generate new states of the Certificates, corresponding to the main stages of object, while the second category includes a delete document processing. First, the user enters the operation of states that do not satisfy these criteria. information on the in service note into the corresponding Based on the proposed mathematical model we developed form and boxes and then, after it has been approved, gets the document management information system for the access to the full application form (Fig. 6) [25, 26, 27]. Department of intellectual property protection. In this Having entered all the necessary data and attached way, the results of conducted research will be used for the accompanying files, the user sends them to the describing and development of document management department staff member for processing. The staff systems of scientific and educational institution, member, in turn, blocks access to the author to edit and agricultural institute, scientific and research chair of makes the required changes. If necessary, the author can agricultural enterprises. withdraw the application for correction of errors. This arrangement provides fast data editing by both parties in ACKNOWLEDGMENTS real time. After all the data have been approved, the staff The work was financially supported by the Ministry member completes editing and downloads the application of Education and Science of the Russian Federation as form and the document with the abstract formalized to the part of government target projects. 829

7 REFERENCES 12. Sarah Henderson, Genre, task, topic and time: facets of personal digital document management. 1. Ostroukh, A.V., M.N. Krasnyanskiy, S.V. Karpushkin th Proceedings of the 6 ACM SIGCHI New Zealand and A.D. Obukhov, Development of Automated chapter's international conference on Computer- Control System for University Research Projects // human interaction: making CHI natural. Middle-East Journal of Scientific Research, 20(12): 13. Stefan, Siersdorfer and Sergej Sizov, Meta DOI: /idosi.mejsr methods for model sharing in personal information 2. Obukhov, A.D., M.N. Krasnyanskiy, S.V. systems. ACM Transactions on Information Karpushkin, N.V. Molotkova, I.V. Galygina and Systems, 26(4): A.V. Ostroukh, Electronic Document 14. Krasnyanskiy, M.N., A.V. Ostroukh, S.V. Karpushkin, Management System Structure for University A.D. Obukhov, N.V. Molotkova and I.V. Galygina, Research and Education // Journal of Engineering Electronic Document Management Systems and Applied Sciences, 9: DOI: / Structure for University Research and Education. jeas Journal of Engineering and Applied Sciences, 3. Albert Cervera, "Document Management in the 9: Open University of Catalunya (UOC) Classrooms". 15. Krukovskiy, M.Y., Grafovaya model' D-Lib Magazine, 16 (7/8). kompozitnogo dokumentooborota [Graph model of a 4. Duan, W.W. and D.M. Zhou, Study on composite document]. Matematichni mashini i Internet-Based Agricultural Production sistemi, pp: Informationization. Applied Mechanics and 16. Osborn, S., R. Sandhu and Q. Nunawer, Materials, 608: Configuring Role-Based Access Control To 5. Sarah Henderson, Personal document Enforce Mandatory And Discretionary Access management strategies. Proceedings of the 10th Control Policies. ACM Trans. Info. Syst. Security, International Conference NZ Chapter of the ACM's 3: Special Interest Group on Human-Computer 17. Novikov, D.A. and A.L. Sukhanov, Models and Interaction. mechanisms for managing research projects in 6. Ron Chimes, What Exactly IS Electronic universities. M.: Institute of Education Management Document Management? IDMi Information RAO, pp: 80. Document Management International. 18. Pechnikova, T.V. and A.V. Pechnikova, Practice 7. Bernd Frohmann Revisiting, What is a working with documents in the organization: document? Journal of Documentation, 65(2). Textbook, manual for schools. M.: EMOS, pp: Jiang-Liang Hou, Fong-Hsin Lin, A hierarchical 19. Banker, R.D. and R.J. Kauffman, The evolution classification mechanism for organization document of research on information systems: A fiftieth-year management. The International Journal of Advanced survey of the literature in Management Science. Manufacturing Technology, 28(3-4). Management Science, 50: Kosuke Konishi, Naohiro Furukawa Hisashi Ikeda, 20. Obukhov, A.D. and M.N. Krasnyansky, Data model and architecture of a paper-digital Formirovanie dokumentov v Oracle Apex na osnove document management system. Proceedings of the HTML shablonov [Formation of documents in Oracle 2007 ACM symposium on Document engineering, 07. Apex HTML-based templates]. Materialy 10. Eero Eloranta, Ari Pekka Hameri, Mika Lahti, mezhdunarodnoj nauchno-prakticheskoj konferencii Improved project management through improved "Virtual'noe modelirovanie, prototipirovanie i document management. Computers in Industry, 45(3). promyshlennyj dizajn" [Proc. Int.Conf. "Virtual 11. Dingding Wang, Shenghuo Zhu, Tao Li, Yun Chi modeling prototyping and Industrial Design"]. and Yihon Gong, Integrating Clustering and Tambov, pp: Multi-document Summarization to Improve Document 21. Ostroukh, A.V. and A.B. Nikolaev, Understanding. th Proceedings of the 17 ACM Development of virtual laboratory experiments in conference on Information and Knowledge ilabs environment. International Journal Of Applied Management. And Fundamental Research, pp:

8 22. Ostroukh, A.V. and A.B. Nikolaev, Ostroukh, A.V. and L.V. Vladimorov, Distance Development of virtual laboratory experiments in education technologies. Research and development ilabs. International Journal of Online Engineering of software products for video lectures and webinars. (IJOE), 9(6): DOI: /ijoe.v9i Saarbrucken, Germany: LAP LAMBERT Academic 23. Ostroukh, A.V., KA. Barinov, A.B. Nikolaev and Publishing, pp: 97. ISBN V. Yu. Stroganov, Interactive Game Modeling 28. Ismoilov, M.I., A.B. Nikolaev and A.V. Ostroukh, Concept for Personnel Training at the Industrial Training and retraining of personnel and Enterprises. World Applied Sciences Journal industrial enterprises of transport complexes using (WASJ), 28(1): DOI: /idosi.wasj. mobile technology. Saint-Louis, MO, USA: Publishing House Science and Innovation Center, 24. Ostroukh, A.V., K.A. Barinov and N.E. Surkova, pp: 166. ISBN Computer game modeling organizational structures of 29. Ostroukh, A.V., K.A. Barinov, A.B. Nikolaev and enterprises and industrial associations. Research V.Yu. Stroganov, Formal methods for the Inventy: International Journal Of Engineering And synthesis of the organizational structure of the Science, 3(12): management through the personnel recruitment at the 25. Ostroukh, A.V. and N.E. Surkova, E-learning industrial enterprises. J. Appl. Sci., 14(5): resources in vocational education. Saarbrucken, DOI: /jas Germany: LAP LAMBERT Academic Publishing, pp: 184. ISBN Ostroukh, A.V., M.I. Ismoilov and A.V. Merkulov, Corporate training. Training of personnel of enterprises based on a virtual model of the professional community and grid technologies. Saarbrucken, Germany: LAP LAMBERT AcademicPublishing, pp: 129. ISBN

Problems of organization and search the knowledge base in the CRM-systems

Problems of organization and search the knowledge base in the CRM-systems IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 02 (February. 2014), V3 PP 18-23 www.iosrjen.org Problems of organization and search the knowledge base in

More information

User Recognition and Preference of App Icon Stylization Design on the Smartphone

User Recognition and Preference of App Icon Stylization Design on the Smartphone User Recognition and Preference of App Icon Stylization Design on the Smartphone Chun-Ching Chen (&) Department of Interaction Design, National Taipei University of Technology, Taipei, Taiwan cceugene@ntut.edu.tw

More information

SYSTEM DEVELOPMENT AND IMPLEMENTATION

SYSTEM DEVELOPMENT AND IMPLEMENTATION CHAPTER 6 SYSTEM DEVELOPMENT AND IMPLEMENTATION 6.0 Introduction This chapter discusses about the development and implementation process of EPUM web-based system. The process is based on the system design

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis of results of CET 4 & CET 6 Based on AHP

More information

High-performance XML Storage/Retrieval System

High-performance XML Storage/Retrieval System UDC 00.5:68.3 High-performance XML Storage/Retrieval System VYasuo Yamane VNobuyuki Igata VIsao Namba (Manuscript received August 8, 000) This paper describes a system that integrates full-text searching

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

Lecture 16 : Relations and Functions DRAFT

Lecture 16 : Relations and Functions DRAFT CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Prognoz Payment System Data Analysis. Description of the solution

Prognoz Payment System Data Analysis. Description of the solution Description of the solution Prognoz, 2015 Content 1. Goals and Tasks. 3 2. Proposed Architecture... 4 3. Functionality... 5 3.1 Payment system operation analysis... 5 3.2 Cash flow monitoring and analysis

More information

What s New in LANDESK Service Desk Version 7.8. Abstract

What s New in LANDESK Service Desk Version 7.8. Abstract What s New in LANDESK Service Desk Version 7.8 Abstract This document highlights the new features and enhancements introduced in versions 7.8 of LANDESK Service Desk. Document Creation: December, 19 2014.

More information

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi Proceedings of the 10 th International Conference on Manufacturing Research ICMR 2012 ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING Mehran G.

More information

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course Juan WANG College of Educational Science, JiangSu Normal University, Jiangsu, Xuzhou, China

More information

Search and Information Retrieval

Search and Information Retrieval Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Fuzzy-Set Based Information Retrieval for Advanced Help Desk

Fuzzy-Set Based Information Retrieval for Advanced Help Desk Fuzzy-Set Based Information Retrieval for Advanced Help Desk Giacomo Piccinelli, Marco Casassa Mont Internet Business Management Department HP Laboratories Bristol HPL-98-65 April, 998 E-mail: [giapicc,mcm]@hplb.hpl.hp.com

More information

Database Optimizing Services

Database Optimizing Services Database Systems Journal vol. I, no. 2/2010 55 Database Optimizing Services Adrian GHENCEA 1, Immo GIEGER 2 1 University Titu Maiorescu Bucharest, Romania 2 Bodenstedt-Wilhelmschule Peine, Deutschland

More information

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE

More information

A Review And Evaluations Of Shortest Path Algorithms

A Review And Evaluations Of Shortest Path Algorithms A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing

More information

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated

More information

Web Usability Probe: A Tool for Supporting Remote Usability Evaluation of Web Sites

Web Usability Probe: A Tool for Supporting Remote Usability Evaluation of Web Sites Web Usability Probe: A Tool for Supporting Remote Usability Evaluation of Web Sites Tonio Carta 1, Fabio Paternò 1, and Vagner Figuerêdo de Santana 1,2 1 CNR-ISTI, HIIS Laboratory, Via Moruzzi 1, 56124

More information

Appendix B Data Quality Dimensions

Appendix B Data Quality Dimensions Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational

More information

On the Relationship between Classes P and NP

On the Relationship between Classes P and NP Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,

More information

Computer Information Systems

Computer Information Systems Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data

More information

Where Do I Start With Virtual Desktops?

Where Do I Start With Virtual Desktops? The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...

More information

A Non-Linear Schema Theorem for Genetic Algorithms

A Non-Linear Schema Theorem for Genetic Algorithms A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland

More information

A&D srl Consulting & Logistic Systems Galleria Spagna, 35-35127 Padova (PD) - Italy - Telefono +39.049.8792400 - Fax +39.049.8792408 Sede Legale:

A&D srl Consulting & Logistic Systems Galleria Spagna, 35-35127 Padova (PD) - Italy - Telefono +39.049.8792400 - Fax +39.049.8792408 Sede Legale: INTEGRATED DOCUMENT MANAGEMENT GENERAL DIAGRAM 1 GENERAL CONCEPTS The integrated document management of a company is due to two trends: 1. electronic processing (scanning) of documents used within the

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany

JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS Christof Röhrig, 1 Andreas Jochheim 2 Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany Abstract: This paper

More information

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila

More information

The design and implementation of intelligent library management system based on RFID/GRPS

The design and implementation of intelligent library management system based on RFID/GRPS Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(4):839-844 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 The design and implementation of intelligent library

More information

CSI Publications. The State of Business Model Innovation in Norway. By: Tina Saebi and Krysta Alexa Singh. Theme 1: Business Model Innovation

CSI Publications. The State of Business Model Innovation in Norway. By: Tina Saebi and Krysta Alexa Singh. Theme 1: Business Model Innovation CSI Publications Theme 1: Business Model Innovation The State of Business Model Innovation in Norway By: Tina Saebi and Krysta Alexa Singh Table of Contents 1 1. The Study 3 2. Low Degree of Business Model

More information

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS ISBN: 978-972-8924-93-5 2009 IADIS RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS Ben Choi & Sumit Tyagi Computer Science, Louisiana Tech University, USA ABSTRACT In this paper we propose new methods for

More information

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

More information

Solar energy e-learning laboratory - Remote experimentation over the Internet

Solar energy e-learning laboratory - Remote experimentation over the Internet Solar energy e-learning laboratory - Remote experimentation over the Internet Ioannis Michaelides, Polyvios Eleftheriou, Kypros Economides Department of Mechanical Engineering Higher Technical Institute,

More information

Development of a Learning Content Management Systems

Development of a Learning Content Management Systems Development of a Learning Content Management Systems Lejla Abazi-Bexheti Abstract Change appears to be the only constant in the field of ICT and what was treated as advanced feature few years ago is today

More information

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè.

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè. CMPT-354-Han-95.3 Lecture Notes September 10, 1995 Chapter 1 Introduction 1.0 Database Management Systems 1. A database management system èdbmsè, or simply a database system èdbsè, consists of æ A collection

More information

Selbo 2 an Environment for Creating Electronic Content in Software Engineering

Selbo 2 an Environment for Creating Electronic Content in Software Engineering BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofia 2009 Selbo 2 an Environment for Creating Electronic Content in Software Engineering Damyan Mitev 1, Stanimir

More information

The study on the necessity of online safety education software development for research staff

The study on the necessity of online safety education software development for research staff , pp.233-238 http://dx.doi.org/10.14257/astl.2015. The study on the necessity of online safety education software development for research staff Yuna Kwon 1, Young-Guk Kwon 1 1 The Graduate School of Energy&Environment,

More information

Development of Content Management System with Animated Graph

Development of Content Management System with Animated Graph Development of Content Management System with Animated Graph Saipunidzam Mahamad, Mohammad Noor Ibrahim, Rozana Kasbon, and Chap Samol Abstract Animated graph gives some good impressions in presenting

More information

CONFIGURATION MANAGEMENT TECHNOLOGY FOR LARGE-SCALE SIMULATIONS

CONFIGURATION MANAGEMENT TECHNOLOGY FOR LARGE-SCALE SIMULATIONS SCS M&S Magazine. Vol 3. Issue 3. A. Sekiguchi, K. Shimada, Y. Wada, A. Ooba, R. Yoshimi, and A. Matsumoto. CONFIGURATION MANAGEMENT TECHNOLOGY FOR LARGE-SCALE SIMULATIONS Atsuji Sekiguchi, Kuniaki Shimada,

More information

Analyzing lifelong learning student behavior in a progressive degree

Analyzing lifelong learning student behavior in a progressive degree Analyzing lifelong learning student behavior in a progressive degree Ana-Elena Guerrero-Roldán, Enric Mor, Julià Minguillón Universitat Oberta de Catalunya Barcelona, Spain {aguerreror, emor, jminguillona}@uoc.edu

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz March 1, 2015 The Database Approach to Data Management Database: Collection of related files containing records on people, places, or things.

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Connectivity and cuts

Connectivity and cuts Math 104, Graph Theory February 19, 2013 Measure of connectivity How connected are each of these graphs? > increasing connectivity > I G 1 is a tree, so it is a connected graph w/minimum # of edges. Every

More information

A Collaborative Infrastructure for Scalable and Robust News Delivery

A Collaborative Infrastructure for Scalable and Robust News Delivery A Collaborative Infrastructure for Scalable and Robust News Delivery Werner Vogels vogels@cs.cornell.edu Chris Re cmr28@cornell.edu Robbert van Renesse rvr@cs.cornell.edu Ken Birman ken@cs.cornell.edu

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

ORACLE PROJECT PLANNING AND CONTROL

ORACLE PROJECT PLANNING AND CONTROL ORACLE PROJECT PLANNING AND CONTROL (Formerly Oracle Project Management) KEY FEATURES COLLABORATIVE PROJECT PLANNING Define a project work breakdown structure to align plans to execution Coordinate financial

More information

Biology: Foundation Edition Miller/Levine 2010

Biology: Foundation Edition Miller/Levine 2010 A Correlation of Biology: Foundation Edition Miller/Levine 2010 to the IDAHO CONTENT STANDARDS Science - Biology Grades 9-10 INTRODUCTION This document demonstrates how Prentice Hall s Biology: Foundation

More information

Development of a User Management Module for Internet TV Systems

Development of a User Management Module for Internet TV Systems , pp.43-56 http://dx.doi.org/10.14257/ijmue.2015.10.11.05 Development of a User Management Module for Internet TV Systems Kangjai Lee 1 and Jaegeol Yim 2* 1 Dept. of Computer Information, Suwon Science

More information

Approvals Management Engine R12 (AME) Demystified

Approvals Management Engine R12 (AME) Demystified Approvals Management Engine R12 (AME) Demystified By Sujay Kamath Prisio Technologies Introduction In today s world, many organizations are in need of implementing proper controls in place for faster transaction

More information

Program includes National Certification & a Clinical Externship Opportunity Mentor Supported

Program includes National Certification & a Clinical Externship Opportunity Mentor Supported Columbia Southern University Dept. of Continuing Education 21982 University Lane Orange Beach, AL 36561 http://www.columbiasouthern.edu/ Contact: Laurie Coleman 800.977.8449 x1840 laurie.coleman@columbiasouthern.edu

More information

BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS

BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,

More information

Design and Implementation of a Quality Management System for Electronic Training Information Resources

Design and Implementation of a Quality Management System for Electronic Training Information Resources Design and Implementation of a Quality Management System for Electronic Training Information Resources Hennadiy Kravtsov Kherson State University, 40 r. Zhovtnya 27, Kherson, Ukraine kgm@ksu.ks.ua Abstract:

More information

Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices

Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices MATHEMATICAL COMMUNICATIONS 47 Math. Commun., Vol. 15, No. 2, pp. 47-58 (2010) Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices Hongzhuan Wang 1, Hongbo Hua 1, and Dongdong Wang

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

Reputation Model with Forgiveness Factor for Semi-Competitive E-Business Agent Societies

Reputation Model with Forgiveness Factor for Semi-Competitive E-Business Agent Societies Reputation Model with Forgiveness Factor for Semi-Competitive E-Business Agent Societies Radu Burete, Amelia Bădică, and Costin Bădică University of Craiova Bvd.Decebal 107, Craiova, 200440, Romania radu

More information

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

Fourth generation techniques (4GT)

Fourth generation techniques (4GT) Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some

More information

A Practical Usage of Innovative Web Design Methodology: The Relational Modeling Methodology

A Practical Usage of Innovative Web Design Methodology: The Relational Modeling Methodology Abstract The web platform has transformed itself in the few years since its inception in 1993 from an instrument used merely to establish on-line presence to a platform that can support all facets of organizational

More information

Context-aware Library Management System using Augmented Reality

Context-aware Library Management System using Augmented Reality International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library

More information

Architecture of a Platform for Building Context-Aware Educational Mobile Services

Architecture of a Platform for Building Context-Aware Educational Mobile Services Architecture of a Platform for Building Context-Aware Educational Mobile Services ALEXANDER SAMOCHADIN samochadin@gmail.com DIMITRI TIMOFEEV dtim@dcn.icc.spbstu.ru MAXIM MASLOV maslov@soft-consult.ru Abstract:

More information

Empowering Global Medical Information Teams with Software Solutions

Empowering Global Medical Information Teams with Software Solutions www.arisglobal.com A White Paper Presented By ArisGlobal Empowering Global Medical Information Teams with Software Solutions by Ome Ogbru, PharmD, Medical Information, SME Empowering Global Medical Information

More information

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri

More information

EFFICIENT COMPLAINT MANAGEMENT WITH TARGENIO

EFFICIENT COMPLAINT MANAGEMENT WITH TARGENIO EFFICIENT COMPLAINT MANAGEMENT WITH TARGENIO Content Targenio Use Case Complaint Process... 3 1. Handling of inbound processes... 3 2. Customer administration and contact history... 6 3. Register of customer

More information

Product data model for PLM system

Product data model for PLM system roduct data model for LM system Li Yumei, Wan Li, Xiong Tifan (National CAD Support Software Engineering Research Center, Huazhong University of Science and Technology, Wuhan 430074) Abstract: roduct lifecycle

More information

A Little Set Theory (Never Hurt Anybody)

A Little Set Theory (Never Hurt Anybody) A Little Set Theory (Never Hurt Anybody) Matthew Saltzman Department of Mathematical Sciences Clemson University Draft: August 21, 2013 1 Introduction The fundamental ideas of set theory and the algebra

More information

jeti: A Tool for Remote Tool Integration

jeti: A Tool for Remote Tool Integration jeti: A Tool for Remote Tool Integration Tiziana Margaria 1, Ralf Nagel 2, and Bernhard Steffen 2 1 Service Engineering for Distributed Systems, Institute for Informatics, University of Göttingen, Germany

More information

National Telecom Regulatory Authority (NTRA) Research & Development Department. General Guidelines. Research Grants 4th Call for Proposals (CFP4)

National Telecom Regulatory Authority (NTRA) Research & Development Department. General Guidelines. Research Grants 4th Call for Proposals (CFP4) National Telecom Regulatory Authority (NTRA) Research & Development Department General Guidelines Research Grants 4th Call for Proposals (CFP4) April 2013 I. Scope With the objective of supporting the

More information

Tool-Based Approach to Distributed Database Design:

Tool-Based Approach to Distributed Database Design: Tool-Based Approach to Distributed Database Design: Includes Web-Based Forms Design for Access to Academic Affairs Data ABSTRACT David A. Owens System Engineer Lockheed Martin Mission Systems 9970 Federal

More information

An Automatic Tool for Checking Consistency between Data Flow Diagrams (DFDs)

An Automatic Tool for Checking Consistency between Data Flow Diagrams (DFDs) An Automatic Tool for Checking Consistency between Data Flow Diagrams (DFDs) Rosziati Ibrahim, Siow Yen Yen Abstract System development life cycle (SDLC) is a process uses during the development of any

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Col*Fusion: Not Just Jet Another Data Repository

Col*Fusion: Not Just Jet Another Data Repository Col*Fusion: Not Just Jet Another Data Repository Evgeny Karataev 1 and Vladimir Zadorozhny 1 1 School of Information Sciences, University of Pittsburgh Abstract In this poster we introduce Col*Fusion a

More information

Similarity and Diagonalization. Similar Matrices

Similarity and Diagonalization. Similar Matrices MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that

More information

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

A Group Decision Support System for Collaborative Decisions Within Business Intelligence Context

A Group Decision Support System for Collaborative Decisions Within Business Intelligence Context American Journal of Information Science and Computer Engineering Vol. 1, No. 2, 2015, pp. 84-93 http://www.aiscience.org/journal/ajisce A Group Decision Support System for Collaborative Decisions Within

More information

Chapter 3. Application Software. Chapter 3 Objectives. Application Software

Chapter 3. Application Software. Chapter 3 Objectives. Application Software Chapter 3 Objectives Chapter 3 Application Software Identify the categories of application software Explain ways software is distributed Explain how to work with application software Identify the key features

More information

Definition 11.1. Given a graph G on n vertices, we define the following quantities:

Definition 11.1. Given a graph G on n vertices, we define the following quantities: Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define

More information

Design of Data Archive in Virtual Test Architecture

Design of Data Archive in Virtual Test Architecture Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Design of Data Archive in Virtual Test Architecture Lian-Lei

More information

c 2008 Je rey A. Miron We have described the constraints that a consumer faces, i.e., discussed the budget constraint.

c 2008 Je rey A. Miron We have described the constraints that a consumer faces, i.e., discussed the budget constraint. Lecture 2b: Utility c 2008 Je rey A. Miron Outline: 1. Introduction 2. Utility: A De nition 3. Monotonic Transformations 4. Cardinal Utility 5. Constructing a Utility Function 6. Examples of Utility Functions

More information

Systems of Linear Equations

Systems of Linear Equations Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and

More information

Let s explore the content and skills assessed by Heart of Algebra questions.

Let s explore the content and skills assessed by Heart of Algebra questions. Chapter 9 Heart of Algebra Heart of Algebra focuses on the mastery of linear equations, systems of linear equations, and linear functions. The ability to analyze and create linear equations, inequalities,

More information

Bitrix Site Manager 4.1. User Guide

Bitrix Site Manager 4.1. User Guide Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing

More information

FileMaker 12. ODBC and JDBC Guide

FileMaker 12. ODBC and JDBC Guide FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.

More information

Using Analytic Hierarchy Process Method in ERP system selection process

Using Analytic Hierarchy Process Method in ERP system selection process Using Analytic Hierarchy Process Method in ERP system selection process Rima Tamošiūnienė 1, Anna Marcinkevič 2 Abstract. IT and business alignment has become of the strategic importance and the enterprise

More information

Linear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007)

Linear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) MAT067 University of California, Davis Winter 2007 Linear Maps Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) As we have discussed in the lecture on What is Linear Algebra? one of

More information

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The

More information

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure

More information

SAS Drug Development Integration & PheedIt

SAS Drug Development Integration & PheedIt SAS Drug Development Integration & PheedIt Andrew Fagan, SAS Institute, USA Carl-Olow Magnusson, SAS Institute, Sweden Copyright 2004 SAS Institute Inc. All rights reserved. Presentation Overview! What

More information

RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM IN COLLABORATIVE PLATFORM FOR ENGLISH TEACHING

RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM IN COLLABORATIVE PLATFORM FOR ENGLISH TEACHING Computer Modelling and New Technologies, 2013, vol. 17, no. 3, 93 98 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM

More information

Toward a community enhanced programming education

Toward a community enhanced programming education Toward a community enhanced programming education Ryo Suzuki University of Tokyo Tokyo, Japan 1253852881@mail.ecc.utokyo.ac.jp Permission to make digital or hard copies of all or part of this work for

More information

On the k-path cover problem for cacti

On the k-path cover problem for cacti On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

More information

Organizational Learning and Knowledge Spillover in Innovation Networks: Agent-Based Approach (Extending SKIN Framework)

Organizational Learning and Knowledge Spillover in Innovation Networks: Agent-Based Approach (Extending SKIN Framework) Int. J. Manag. Bus. Res., 4 (3), 203-212, Summer 2014 IAU Organizational Learning and Knowledge Spillover in Innovation Networks: Agent-Based Approach (Extending SKIN Framework) * 1 M. Mahmoudzadeh, 2

More information

Domain Classification of Technical Terms Using the Web

Domain Classification of Technical Terms Using the Web Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using

More information

A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS

A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS PAWE L PRA LAT Abstract. In this note we consider the on-line Ramsey numbers R(P n, P m ) for paths. Using a high performance computing clusters,

More information

The Research of Data Management in the University Human Resource Systems

The Research of Data Management in the University Human Resource Systems , pp.61-65 http://dx.doi.org/10.14257/astl.2014.53.15 The Research of Data in the University Human Resource Systems Ye FAN, Shaoyun GUAN, Honglue LV Harbin University of Commerce gsyj91@163.com Abstract.

More information

RELIABILITY OF SYSTEMS WITH VARIOUS ELEMENT CONFIGURATIONS

RELIABILITY OF SYSTEMS WITH VARIOUS ELEMENT CONFIGURATIONS Application Example 1 (Probability of combinations of events; binomial and Poisson distributions) RELIABILITY OF SYSTEMS WITH VARIOUS ELEMENT CONFIGURATIONS Note: Sections 1, 3 and 4 of this application

More information

BUILDING OLAP TOOLS OVER LARGE DATABASES

BUILDING OLAP TOOLS OVER LARGE DATABASES BUILDING OLAP TOOLS OVER LARGE DATABASES Rui Oliveira, Jorge Bernardino ISEC Instituto Superior de Engenharia de Coimbra, Polytechnic Institute of Coimbra Quinta da Nora, Rua Pedro Nunes, P-3030-199 Coimbra,

More information