Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts

Size: px
Start display at page:

Download "Testing Documentation for CCIH Database Management System By: John Reeves, Derek King, and Robert Watts"

Transcription

1 Teting Documentation for CCIH Databae Management Sytem By: John Reeve, Derek King, and Robert Watt The teting proce for our project i divided into three part of Unit teting, one part of Integration/Function teting, and one part which combine the procee of Sytem teting and Cutomer/Uer teting. In addition, a mall number of Sytem tet are added in a eparate ection to facilitate imple brower teting. To give thi proce additional tructure, we have divided one of the two module into ucce cae and failure/error cae. In order to better how how the tet cae below are organized, the following diagram wa created: 1

2 Below i the Unit Tet Cae #1 lit for the Reult Screen Error Input Reult Screen Error Input ID # Decription Text to input Reult Decription 1 grpno entered too long Report datatype numeric(5) error from databae 2 grpno entered i empty Report not-null contraint from databae 3 grpno entered non numeric Alpha Report datatype numeric(5) error from databae 4 groupname entered too long ALPHABINGOCHARLIEDELTAECHOFOXTROTGOLFINDIA Report datatype character varying(40) error from databae 5 groupname entered i empty Report not-null contraint from databae 6 tate entered too long KYA Report datatype character(2) error from databae 7 claim_charge i non numeric Alpha Report datatype numeric(14, 4) error from databae 8 claim_charge i too long after the decimal Report datatype numeric(14, 4) error from databae 9 claim charge i too long before the decimal Report datatype numeric(14, 4) error from databae 10 clmpre i too long Report datatype numeric(4) error from databae 11 clmpre i empty Report not-null contraint from databae 12 clmpre i non numeric Alp Report datatype numeric(4) error from databae 13 clmno i too long Report datatype numeric(9) error from databae 14 clmno i non numeric Alpha Report datatype numeric(9) error from databae 15 lockno i too long 1 Report datatype numeric(10) error from databae 16 lockno i non numeric Alpha Report datatype numeric(10) error from databae 17 fromdt contain wrong format #1 AB-JAN-2012 Report datatype date error from databae 18 fromdt contain wrong format #2 12, Jan 2012 Report datatype date error from databae 19 fromdt contain wrong format #3 12 Jan, 2012, Jan Report datatype date error from databae 20 fromdt contain wrong format #4 aldfj Report datatype date error from databae 21 fromdt doe not exit #1 13/13/2012 Report datatype date error from databae 22 fromdt doe not exit #2 0/0/2012 Report datatype date error from databae 23 active entered i not a valid boolean K Report datatype Boolean error from databae 24 active entered i not a valid boolean TRUEA Report datatype Boolean error from databae 25 ppo_method i too long AA Report datatype character(1) error from databae 26 ppo_method not '' or 'd' a Report content error 2

3 Below i the Unit Tet Cae #2 lit for the Search Query Screen All Input Type. Search Query Screen Teting (All Cae) ID# Decription Text to input (' ' indicate eparate text box field) Reult Decription 1 Teting Client Search Function (one field) 2 Teting Client Search Function (no reult) 3 Teting PPO Search Function (one field) 4 Teting PPO Search Function (no reult) 5 Teting Claim Search Function (one field) 6 Teting Claim Search Function (all field) 7 Teting Claim Search Function (no reult) Reult Screen with Client Column where (GRPNO = 300) client: 77 Reult Screen : "no reult found" 0 Reult Screen with PPO Column where (PPONO = 0) 77 Reult Screen : "no reult found" claim: claim: Reult Screen with Claim Column where (CLMNO = ) Reult Screen with Claim Column where (CLMPRE = 2015) (CLMNO = ) (CLMSUF = 0) Reult Screen : "no reult found" 3

4 8 Teting Invoice Search Function (one field) 9 Teting Invoice Search Function (all field) 10 Teting Invoice Search Function (no reult) invoice: Reult Screen with Claim Column where (GRPNO = 300) Reult Screen with Invoice Column where (GRPNO = 300) (LOCNO = 1) (PPONO = 0) invoice: 77 Reult Screen : "no reult found" 11 Teting Client and PPO (all field and reult) 12 Teting Client and Claim (all field and reult) 13 Teting Client and Invoice (all field and reult) 14 Teting Claim and PPO (all field and reult) 15 Teting Invoice and PPO (all field and reult) Reult Screen with Client and PPO column where (client.grpno = 300) (ppo.ppono = 0) Reult Screen with Client and Claim column where (client.grpno = 300) (claim.clmpre = 2015) Reult Screen with Client and Invoice column where (client.grpno = 300) (invoice.grpno = 300) Reult Screen with Claim and PPO column where (claim.clmpre = 2015) (ppo.ppono = 0) Reult Screen with Invoice and PPO column where (invoice.grpno = 300) (ppo.ppono = 0) 4

5 16 Teting Invoice and Claim (all field and reult) Reult Screen with Invoice and Claim column where (invoice.grpno = 300) (claim.clmpre = 2015) 17 Teting Client, Claim, and PPO (all field and reult) Teting Client, Claim, and Invoice (all field and reult) Teting Client, Invoice, and PPO (all field and reult) Teting Invoice, Claim, and PPO (all field and reult) 21 Teting all Search function (all field and reult) Reult Screen with Client, Claim, and PPO column where (client.grpno = 300) (claim.clmpre = 2015) (ppo.ppono = 0) Reult Screen with Client, Claim, and Invoice column where (client.grpno = 300) (claim.clmpre = 2015) (invoice.grpno = 300) Reult Screen with Client, PPO, and Invoice column where (client.grpno = 300) (ppo.ppono = 0) (invoice.grpno = 300) Reult Screen with PPO, Claim, and Invoice column where (ppo.ppono) (claim.clmpre = 2015) (invoice.grpno = 300) Reult Screen with Client, PPO, Claim, and Invoice column where (ppo.ppono) (claim.clmpre = 2015) (invoice.grpno = 300) (client.grpno = 300) 5

6 Below i the Unit Tet Cae #3 lit for the Reult Screen Succe Input. They can be acceed during the Unit Tet Cae #1 phae, and can be performed in any order. Reult Screen Succe Input ID# Decription Text to input Reult Decription 1 grpno entered a minimum length 1 Databae return '1 row affected' 2 grpno entered a maximum length Databae return '1 row affected' 3 groupname entered a minimum length A Databae return '1 row affected' 4 groupname entered a maximum length ALPHABINGOCHARLIEDELTAECHOFOXTROTGOLFINDI Databae return '1 row affected' 5 tate entered a minimum length K Databae return '1 row affected' 6 tate entered a maximum length KY Databae return '1 row affected' 7 claim_charge entered a minimum length 1 Databae return '1 row affected' 8 claim_charge entered a maximum length Databae return '1 row affected' 9 clmpre i entered a minimum length 1 Databae return '1 row affected' 10 clmpre i entered a maximum length 1234 Databae return '1 row affected' 11 clmno i entered a minimum length 1 Databae return '1 row affected' 12 clmno i entered a maximum length Databae return '1 row affected' 13 lockno i entered a minimum length 1 Databae return '1 row affected' 14 lockno i entered a maximum length Databae return '1 row affected' 15 fromdt i entered a Dec-31 in format #1 12/31/2016 Databae return '1 row affected' 16 fromdt i entered a Dec-31 in format #2 31-Dec-16 Databae return '1 row affected' 17 active entered a True TRUE Databae return '1 row affected' 18 active entered a Fale FALSE Databae return '1 row affected' 6

7 19 active entered a T T Databae return '1 row affected' 20 active entered a F F Databae return '1 row affected' 21 ppo_method i entered a '' Databae return '1 row affected' 22 ppo_method i entered a 'd' d Databae return '1 row affected' 23 ppo_method i entered a '' grpno i entered a maximum length Databae return '2 row affected' 24 ppo_method i entered a '' grpno i entered a maximum length active entered a True True Databae return '3 row affected' 7

8 Below i the Sytem Tet Cae lit. It imply tet the program on each of the three popular web brower et out in our deign. FireFox, Internet Explorer, and Google Chrome teting Succe ID # Decription Text to input (' ' indicate eparate text box field) Reult Decription 1 USING FIREFOX WEB BROWSER ppo_method i entered a '' grpno i entered a maximum length active entered a True True Databae return '3 row affected' 2 USING INTERNET EXPLORER WEB BROWSER ppo_method i entered a '' grpno i entered a maximum length active entered a True True Databae return '3 row affected' 3 USING GOOGLE CHROME WEB BROWSER ppo_method i entered a '' grpno i entered a maximum length active entered a True True Databae return '3 row affected' Finally, for regreion teting we mut begin from the beginning of the lit and do all ection in equence. All tet are to be repeated once the program i intalled upon the client ytem, thi repetition accomplihe Sytem teting. Once ytem teting i complete the client will have open ended acce to tet the program in any way that they ee fit. Thi lat type of teting i called Uer or Cutomer Teting. 8

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: [email protected]

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: [email protected] Itituto

More information

Bio-Plex Analysis Software

Bio-Plex Analysis Software Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service [email protected] www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

JVD Software Development

JVD Software Development Design pecification JU Online Library December 11, 2001 JVD Joel Frank, Project Manager (ections II and V) Hours Worked: ignature Valerie tanton, Engineer (ections III, IV, and V) Hours Worked: ignature

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S

SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S Chinatu Aone, Doug McKee, Sandy Shinn, Hatte Bleje r Sytem Reearch and Application (SRA ) 2000 15th Street North Arlington, VA 2220 1 [email protected] INTRODUCTION

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring.

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring. Digifort Enterprie The mot complete Digifort olution for camera and alarm monitoring. The Enterprie verion i the package which comprie all of the feature available in the Digifort Sytem, offering complete

More information

Production Management II. Product Life-Cycle Management II

Production Management II. Product Life-Cycle Management II Production Management II - - Product Life-Cycle Management II Contact: Dipl.-Ing. Wolfgang Boo [email protected] WZL 53B Raum 507 Tel.: 80-28 469 Objective of the Lecture: Overview of Product-Data-Management-Sytem

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Thank you for attending the MDM for the Enterprise Seminar Series!

Thank you for attending the MDM for the Enterprise Seminar Series! Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional

More information

Third Party Technical Guidelines

Third Party Technical Guidelines Third Party Technical Guideline Configuration Guide Releae: Document Reviion: Ditribution Statu: NICE Engage Platform 6.3 / NICE Interaction Management 4.1 Real-Time Solution 4.9 NICE Perform 3.2 / 3.5

More information

Chapter 3 Torque Sensor

Chapter 3 Torque Sensor CHAPTER 3: TORQUE SESOR 13 Chapter 3 Torque Senor Thi chapter characterize the iue urrounding the development of the torque enor, pecifically addreing meaurement method, tranducer technology and converter

More information

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from

More information

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power Ohm Law Ohmic relationhip V=IR Ohm law tate that current through the conductor i directly proportional to the voltage acro it if temperature and other phyical condition do not change. In many material,

More information

Online Payroll Remittance Manual for Employers

Online Payroll Remittance Manual for Employers Online Payroll Remittance Manual for Employers Before you start using the online payroll website Fraud Filter and Bank Changes Depending on your bank s ACH fraud filtering mechanisms you may need to identify

More information

E-LEARNING STUDENT S MANUAL

E-LEARNING STUDENT S MANUAL E-LEARNING STUDENT S MANUAL By Williams College E-Learning is the College s Online Learning Environment, designed to enhance your learning experience by providing access to online course materials, activities,

More information

This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers.

This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers. Disable Pop-Up Blockers for MyCPD This guide will walk you through the process of disabling pop-up blockers found in three popular web browsers. Popup blockers interfere with proper functioning of the

More information

Accounts Payable Expense Distribution Tables

Accounts Payable Expense Distribution Tables Accounts Payable Expense Distribution Tables Use Expense Distribution Table Maintenance to set up tables with general ledger accounts and distribution percentages. The tables can then be selected in Invoice

More information

www.brindleytech.com Insurance Solutions

www.brindleytech.com Insurance Solutions Inurance Solution Agenda 1 2 3 4 5 Buine Value Solution Overview Capabilitie Cutomer Succe Storie Inurance Product in Nut Shell Buine Value Cutomer Buine Value Achieved through Winure Increae Efficiency

More information

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e

More information

0.002432 1.002432. where x is check for normality T 105.67 5.2546

0.002432 1.002432. where x is check for normality T 105.67 5.2546 6 PRACTICAL NUMERICAL METHODS Chapter 3 VBA Practice Problem Ue Excel and VBA to olve the following problem. Document your olution uing the Expert Problem Solving tep outlined in Table 1.2. 1.961 x 0.5

More information

TRID Technology Implementation

TRID Technology Implementation TRID Technology Implementation Jaime Koofky, Managing Attorney, Brady & Koofky PA Cecelia Raine, Co-Chair, Cloing Inight Adviory Board, RealEC Technologie Richard Triplett, CMB, Vice Preident, Director

More information

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards

Integration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards I.J. Information Technology and Computer Science, 2013, 07, 1-11 Publihed Online June 2013 in MECS (http://www.mec-pre.org/) DOI: 10.5815/ijitc.2013.07.01 Integration of Independent Application and EAI

More information

You may use a scientific calculator (non-graphing, non-programmable) during testing.

You may use a scientific calculator (non-graphing, non-programmable) during testing. TECEP Tet Decription College Algebra MAT--TE Thi TECEP tet algebraic concept, procee, and practical application. Topic include: linear equation and inequalitie; quadratic equation; ytem of equation and

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

This Quick Reference Sheet covers the most common technical issues that may be encountered.

This Quick Reference Sheet covers the most common technical issues that may be encountered. CIS Quick Reference Sheet Overview This Quick Reference Sheet covers the most common technical issues that may be encountered. Things You Need To Know The Water Corporation Contractor Induction system

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

EXPERIMENT 11 CONSOLIDATION TEST

EXPERIMENT 11 CONSOLIDATION TEST 119 EXPERIMENT 11 CONSOLIDATION TEST Purpoe: Thi tet i performed to determine the magnitude and rate of volume decreae that a laterally confined oil pecimen undergoe when ubjected to different vertical

More information

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland X SEPOPE 2 a 25 de maio de 26 May 2 rt to 25 th 26 FLORIANÓPOLIS (SC) BRASIL X SIMPÓSIO DE ESPECIALISTAS EM PLANEJAMENTO DA OPERAÇÃO E EXPANSÃO ELÉTRICA X SYMPOSIUM OF SPECIALISTS IN ELECTRIC OPERATIONAL

More information

ezsupport What is it? ezsupport Demo ezsupport Demo HostedSupport.com 1

ezsupport What is it? ezsupport Demo ezsupport Demo HostedSupport.com 1 ezsupport What is it? ezsupport is a web-based suite of customer support software tools that lets you earn $$ by displaying ads on your help desk. You get paid 50% of the revenue from your help desk ads.

More information

TRIM: Web Tool. Web Address The TRIM web tool can be accessed at:

TRIM: Web Tool. Web Address The TRIM web tool can be accessed at: TRIM: Web Tool Accessing TRIM Records through the Web The TRIM web tool is primarily aimed at providing access to records in the TRIM system. While it is possible to place records into TRIM or amend records

More information

MINUTES (Adopted at August 24, 2011 Executive Committee Meeting) 1. Call to Order, Chair s Remarks, Attendance

MINUTES (Adopted at August 24, 2011 Executive Committee Meeting) 1. Call to Order, Chair s Remarks, Attendance IAP2 BC Chapter Executive Committee (EC) Meeting #15 Wedneday, July 13, 2011 Teleconference 5:05-6:40 p.m. MINUTES ( at Augut 24, 2011 Executive Committee Meeting) 1. Call to Order, Chair Remark, Attendance

More information

Encrypted TCP chat using RSA and AES algorithm

Encrypted TCP chat using RSA and AES algorithm Encrypted TCP chat uing RSA and AES algorithm Krzyztof Jakub Szala Bachelor Thei April 2014 Degree Programme in Information Technology Technology, communication and tranport DESCRIPTION Author() SZALA

More information

Design Capacities for Structural Plywood

Design Capacities for Structural Plywood Deign Capacitie for Structural Plyood Alloale Stre Deign (ASD) The deign value in thi document correpond ith thoe pulihed in the 005 edition of the AF&PA American Wood Council Alloale Stre Deign (ASD)/RFD

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Pediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program

Pediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program Pediatric Nure Practitioner Program Pediatric Clinical Nure Specialit Program Dual Pediatric Nure Practitioner / Clinical Nure Specialit Program UCLA School of Nuring Overview: The Pediatric Nure Practitioner

More information

Delft. Matlab and Simulink for Modeling and Control. Robert Babuška and Stefano Stramigioli. November 1999

Delft. Matlab and Simulink for Modeling and Control. Robert Babuška and Stefano Stramigioli. November 1999 Matlab and Simulink for Modeling and Control Robert Babuška and Stefano Stramigioli November 999 Delft Delft Univerity of Technology Control Laboratory Faculty of Information Technology and Sytem Delft

More information

Introduction to IBM Watson Analytics Data Loading and Data Quality

Introduction to IBM Watson Analytics Data Loading and Data Quality Introduction to IBM Watson Analytics Data Loading and Data Quality December 16, 2014 Document version 2.0 This document applies to IBM Watson Analytics. Licensed Materials - Property of IBM Copyright IBM

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 [email protected] Dahai Xu AT&T Lab Reearch Florham Park,

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 [email protected] Zhi-Long Chen** Department

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

Installation & User Guide

Installation & User Guide SharePoint List Filter Plus Web Part Installation & User Guide Copyright 2005-2011 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 50 McIntosh Drive, Unit 109 Markham, Ontario ON

More information

Nimble Storage Exchange 2013 100,000-Mailbox Resiliency Storage Solution

Nimble Storage Exchange 2013 100,000-Mailbox Resiliency Storage Solution Nimble Stor Exchan 213 1,-Mailbox Reilie Stor Solution Teted with: ESRP Stor Verion. Tet date: May 2, 21 Overview Thi document provide information on Nimble Stor' iscsi tor olution for Microoft Exchan

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding

More information

Cost Models for Selecting Materialized Views in Public Clouds

Cost Models for Selecting Materialized Views in Public Clouds International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Self Service Banner Finance User Instructions

Self Service Banner Finance User Instructions Self Service Banner Finance User Instructions In order for users to understand the different features available in Self Service Banner, it is helpful to include a number of definitions for terms used throughout

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Independent Samples T- test

Independent Samples T- test Independent Sample T- tet With previou tet, we were intereted in comparing a ingle ample with a population With mot reearch, you do not have knowledge about the population -- you don t know the population

More information

Module 9 Ad Hoc Queries

Module 9 Ad Hoc Queries Module 9 Ad Hoc Queries Objectives Familiarize the User with basic steps necessary to create ad hoc queries using the Data Browser. Topics Ad Hoc Queries Create a Data Browser query Filter data Save a

More information

No. 73,122 MODEL FORM OF VERDICT ITEMIZING PERSONAL INJURY DAMAGES (TORT REFORM ACT OF 1986, S 768.77 F.S. 1987)

No. 73,122 MODEL FORM OF VERDICT ITEMIZING PERSONAL INJURY DAMAGES (TORT REFORM ACT OF 1986, S 768.77 F.S. 1987) CORRECTED OPINION No. 73,122 IN RE: STANDARD JURY INSTRUCTIONS (CIVIL CASES 88-2) [March 2, 19891 PER CURIAM. The Florida Supreme Court Committee on Standard Jury Intruction (Civil) ha recommended to thi

More information