首页 > 最新文献

2012 African Conference for Sofware Engineering and Applied Computing最新文献

英文 中文
Computing Education: A Discussion Paper on Teaching and Assessing Ethics 计算机教育:关于伦理教学与评估的讨论文件
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.11
P. Oriogun, Babatunde Ogunleye-Johnson
The need to teach and assess ethics in computing education cannot be overemphasized. This is not unconnected to the ubiquitous nature of computing products and services, which has made ethical considerations of their use a focal point in the twenty-first century. The pervasiveness of computers in everyday life is a fact that defines the twenty-first century. However, as important and useful as the transformational field of computing is in this age, it's potential for harm and as catalyst for disaster or catastrophe has increased. Therefore, there is urgent need to review the inclusion of ethics teaching and assessment in the educational training of computing students in order to guard against the perceived negative tendencies of computing. This paper seeks to contribute to the discussion on the need to advance the teaching and assessment of ethics in the computing disciplines. This, we believe is necessary to better prepare students for the incredibly demanding and complex world that awaits them after graduation.
在计算机教育中教授和评估伦理的必要性怎么强调都不过分。这与计算机产品和服务的无所不在的性质不无关系,这使得使用它们的道德考虑成为二十一世纪的焦点。计算机在日常生活中的普及是二十一世纪的特征。然而,在这个时代,尽管计算领域的变革是重要和有用的,但它的潜在危害和灾难或灾难的催化剂已经增加。因此,迫切需要重新审视将伦理教学和评估纳入计算机学生的教育培训,以防范感知到的计算机负面倾向。本文旨在探讨在计算机学科中推进伦理教学和评估的必要性。我们认为,这是必要的,可以让学生更好地为毕业后等待他们的高要求和复杂的世界做好准备。
{"title":"Computing Education: A Discussion Paper on Teaching and Assessing Ethics","authors":"P. Oriogun, Babatunde Ogunleye-Johnson","doi":"10.1109/ACSEAC.2012.11","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.11","url":null,"abstract":"The need to teach and assess ethics in computing education cannot be overemphasized. This is not unconnected to the ubiquitous nature of computing products and services, which has made ethical considerations of their use a focal point in the twenty-first century. The pervasiveness of computers in everyday life is a fact that defines the twenty-first century. However, as important and useful as the transformational field of computing is in this age, it's potential for harm and as catalyst for disaster or catastrophe has increased. Therefore, there is urgent need to review the inclusion of ethics teaching and assessment in the educational training of computing students in order to guard against the perceived negative tendencies of computing. This paper seeks to contribute to the discussion on the need to advance the teaching and assessment of ethics in the computing disciplines. This, we believe is necessary to better prepare students for the incredibly demanding and complex world that awaits them after graduation.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122421913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring User Requirements Dependency: The Organizational Perspective 度量用户需求依赖性:组织的视角
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.17
Mesfin Kifle
In organizational environment, user requirements are key system aspects that need to be realized in the system-to-be context. Aiming to support transformational development, organizations insist to acquire software business applications that satisfy business goals and processes strategically. A software product quality for an organization depends on how well it fits to the organizational goals and business processes. In system problem decomposition, requirements dependency is critically important to measure cohesion and coupling properties of business applications. It can also be used to set acceptance criteria. The more software engineering techniques are getting far from organizational settings the gap between the business requirements and application increases. Such gaps can be minimized by employing context sensitive methods. In this paper, a heuristic method is presented to measure user requirements intentional and flow dependency by considering goal-scenario modeling. The method is designed by aligning business goals, processes, and scenario concepts.
在组织环境中,用户需求是需要在系统环境中实现的关键系统方面。为了支持转换开发,组织坚持获得满足业务目标和战略过程的软件业务应用程序。一个组织的软件产品质量取决于它对组织目标和业务过程的适应程度。在系统问题分解中,需求依赖关系对于度量业务应用程序的内聚性和耦合性至关重要。它也可以用来设置验收标准。软件工程技术离组织设置越远,业务需求和应用程序之间的差距就越大。这种差距可以通过使用上下文敏感的方法来最小化。本文提出了一种基于目标-场景建模的用户需求意向和流程依赖度量的启发式方法。该方法是通过调整业务目标、流程和场景概念来设计的。
{"title":"Measuring User Requirements Dependency: The Organizational Perspective","authors":"Mesfin Kifle","doi":"10.1109/ACSEAC.2012.17","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.17","url":null,"abstract":"In organizational environment, user requirements are key system aspects that need to be realized in the system-to-be context. Aiming to support transformational development, organizations insist to acquire software business applications that satisfy business goals and processes strategically. A software product quality for an organization depends on how well it fits to the organizational goals and business processes. In system problem decomposition, requirements dependency is critically important to measure cohesion and coupling properties of business applications. It can also be used to set acceptance criteria. The more software engineering techniques are getting far from organizational settings the gap between the business requirements and application increases. Such gaps can be minimized by employing context sensitive methods. In this paper, a heuristic method is presented to measure user requirements intentional and flow dependency by considering goal-scenario modeling. The method is designed by aligning business goals, processes, and scenario concepts.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-Oriented Design for Web-Based Systems: A Critical Review 面向安全的基于web的系统设计:一个重要的回顾
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.15
Marriette Katarahweire, J. Balikuddembe
Security of web-based systems still remains a key challenge for most IT executives, for software is vulnerable at various stages and most severely weakened in the operational environment. In the past, models and tools or even design techniques have been devised to tackle this challenge. But we still see the reemergence of the same security issues that afflict both traditional and modern web-based systems. Our major goal is to examine what has been done to date in managing this risk, particularly during the software development process and at the deployment stage, so as to establish the research gap upon which further research can revolve. Our findings show that available literature has not extensively addressed how current security mitigating mechanisms can enhance the development of secure web-based systems. Hence, future work directed at bridging this perspective will perhaps provide more insight in advanced techniques that can help manage this problem.
基于web的系统的安全性仍然是大多数IT管理人员面临的一个关键挑战,因为软件在各个阶段都很脆弱,在操作环境中最容易受到严重削弱。在过去,已经设计了模型和工具甚至设计技术来应对这一挑战。但是我们仍然看到困扰传统和现代网络系统的同样的安全问题再次出现。我们的主要目标是检查迄今为止在管理此风险方面所做的工作,特别是在软件开发过程和部署阶段,以便建立进一步研究可以围绕的研究差距。我们的研究结果表明,现有文献并没有广泛讨论当前的安全缓解机制如何增强基于web的安全系统的开发。因此,未来的工作旨在弥合这一观点,可能会提供更多的见解,先进的技术,可以帮助管理这个问题。
{"title":"Security-Oriented Design for Web-Based Systems: A Critical Review","authors":"Marriette Katarahweire, J. Balikuddembe","doi":"10.1109/ACSEAC.2012.15","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.15","url":null,"abstract":"Security of web-based systems still remains a key challenge for most IT executives, for software is vulnerable at various stages and most severely weakened in the operational environment. In the past, models and tools or even design techniques have been devised to tackle this challenge. But we still see the reemergence of the same security issues that afflict both traditional and modern web-based systems. Our major goal is to examine what has been done to date in managing this risk, particularly during the software development process and at the deployment stage, so as to establish the research gap upon which further research can revolve. Our findings show that available literature has not extensively addressed how current security mitigating mechanisms can enhance the development of secure web-based systems. Hence, future work directed at bridging this perspective will perhaps provide more insight in advanced techniques that can help manage this problem.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132128306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Mobile Cloud Services through Offline Support 通过离线支持提供强大的移动云服务
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.27
Maxwell Omwenga Momanyi, J. Sansa-Otim, Agnes F. N. Lumala
Cloud computing improves the efficiency of mobile applications. This is because data storage and processing are moved from the low resourced mobile devices to the cloud. Mobile cloud computing however, faces the challenge of intermittent cellular network connection since it is through the connection that services are reached. In this paper we argue that providing mobile cloud applications with temporary off-line file storage increases their robustness without burdening the low resourced mobile handset. We develop a module that offers off-line support which we plug into a mobile cloud calendar and we call it MobiCal.
云计算提高了移动应用程序的效率。这是因为数据存储和处理从资源匮乏的移动设备转移到了云端。然而,移动云计算面临着间歇性蜂窝网络连接的挑战,因为它是通过连接到达服务的。在本文中,我们认为为移动云应用程序提供临时离线文件存储可以增加它们的鲁棒性,而不会给低资源的移动手持设备增加负担。我们开发了一个模块,提供离线支持,我们将其插入移动云日历,我们称之为MobiCal。
{"title":"Robust Mobile Cloud Services through Offline Support","authors":"Maxwell Omwenga Momanyi, J. Sansa-Otim, Agnes F. N. Lumala","doi":"10.1109/ACSEAC.2012.27","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.27","url":null,"abstract":"Cloud computing improves the efficiency of mobile applications. This is because data storage and processing are moved from the low resourced mobile devices to the cloud. Mobile cloud computing however, faces the challenge of intermittent cellular network connection since it is through the connection that services are reached. In this paper we argue that providing mobile cloud applications with temporary off-line file storage increases their robustness without burdening the low resourced mobile handset. We develop a module that offers off-line support which we plug into a mobile cloud calendar and we call it MobiCal.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indoor Navigation Using a Mobile Phone 使用手机进行室内导航
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.26
Brett Ausmeier, T. Campbell, S. Berman
This paper describes the Innovation system for indoor navigation using a mobile phone. A tool such as this requires a method of storing building data and routing information on the phone, as well as the ability to automatically track phone location as users walk around. We describe two alternative approaches to mapping building data along with a routing database design that make the project viable despite the limited storage, processing power and battery life of the phone. In particular, we compare GUI building plan annotation on a desktop computer with pedometer-based mapping of a building using the accelerometer on a mobile phone. Experiments indicate that users found plan annotation usable and database size scaled well for large buildings. The accelerometer-based approach to mapping a building was not acceptable due to inaccurate distance estimates, however this was adequate for tracking and directing users through a building, since small imprecisions were easily accommodated by users - they appreciated that directions would not give exact distances and were able to follow instructions to their destination in all test cases.
本文介绍了一种基于手机的室内导航创新系统。像这样的工具需要在手机上存储建筑数据和路由信息的方法,以及在用户走动时自动跟踪手机位置的能力。我们描述了映射建筑数据的两种替代方法,以及路由数据库设计,尽管手机的存储、处理能力和电池寿命有限,但该项目仍然可行。特别地,我们将桌面计算机上的GUI建筑平面图注释与使用移动电话上的加速度计的基于计步器的建筑物映射进行了比较。实验表明,用户发现平面图标注是可用的,并且数据库大小可以很好地扩展到大型建筑物。由于距离估计不准确,以加速度计为基础的绘制建筑物地图的方法是不可接受的,然而这对于跟踪和引导用户穿过建筑物是足够的,因为用户很容易适应小的不精确——他们意识到方向不会给出精确的距离,并且能够在所有测试用例中遵循指示到达目的地。
{"title":"Indoor Navigation Using a Mobile Phone","authors":"Brett Ausmeier, T. Campbell, S. Berman","doi":"10.1109/ACSEAC.2012.26","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.26","url":null,"abstract":"This paper describes the Innovation system for indoor navigation using a mobile phone. A tool such as this requires a method of storing building data and routing information on the phone, as well as the ability to automatically track phone location as users walk around. We describe two alternative approaches to mapping building data along with a routing database design that make the project viable despite the limited storage, processing power and battery life of the phone. In particular, we compare GUI building plan annotation on a desktop computer with pedometer-based mapping of a building using the accelerometer on a mobile phone. Experiments indicate that users found plan annotation usable and database size scaled well for large buildings. The accelerometer-based approach to mapping a building was not acceptable due to inaccurate distance estimates, however this was adequate for tracking and directing users through a building, since small imprecisions were easily accommodated by users - they appreciated that directions would not give exact distances and were able to follow instructions to their destination in all test cases.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Logic Verification of Product-Line Variant Requirements 产品线变型需求的逻辑验证
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.14
Shamim Ripon, Sk. Jahir Hossain, Keya Azad, M. Hassan
Formal verification of variant requirements has gained much interest in the software product line (SPL) community. Feature diagrams are widely used to model product line variants. However, there is a lack of precisely defined formal notation for representing and verifying such models. This paper presents an approach to modeling and verifying SPL variant feature diagrams using first-order logic. It provides a precise and rigorous formal interpretation of the feature diagrams. Logical expressions can be built by modeling variants and their dependencies by using propositional connectives. These expressions can then be validated by any suitable verification tool. A case study of a Computer Aided Dispatch (CAD) system variant feature model is presented to illustrate the verification process.
变体需求的正式验证在软件产品线(SPL)社区中引起了很大的兴趣。特征图被广泛用于为产品线的变体建模。然而,缺乏精确定义的形式化符号来表示和验证这些模型。提出了一种利用一阶逻辑对SPL变体特征图进行建模和验证的方法。它提供了对特征图的精确和严格的正式解释。逻辑表达式可以通过使用命题连接词对变量及其依赖关系进行建模来构建。然后,这些表达式可以通过任何合适的验证工具进行验证。以计算机辅助调度(CAD)系统变体特征模型为例,说明了验证过程。
{"title":"Logic Verification of Product-Line Variant Requirements","authors":"Shamim Ripon, Sk. Jahir Hossain, Keya Azad, M. Hassan","doi":"10.1109/ACSEAC.2012.14","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.14","url":null,"abstract":"Formal verification of variant requirements has gained much interest in the software product line (SPL) community. Feature diagrams are widely used to model product line variants. However, there is a lack of precisely defined formal notation for representing and verifying such models. This paper presents an approach to modeling and verifying SPL variant feature diagrams using first-order logic. It provides a precise and rigorous formal interpretation of the feature diagrams. Logical expressions can be built by modeling variants and their dependencies by using propositional connectives. These expressions can then be validated by any suitable verification tool. A case study of a Computer Aided Dispatch (CAD) system variant feature model is presented to illustrate the verification process.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132399481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experiences in Creating Inclusive Information and Communications Technologies (IICT): Democratizing Software Development in Social Development 创建包容性信息和通信技术(ict)的经验:使社会发展中的软件开发民主化
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.13
C. Hanyane
Crowd sourcing, citizen journalism and social networks are Information and Communications Technologies (ICT) that have ushered in civil society's participation in the ICT equation. However, the participation of civil society has been limited to creating content and, to some extent, capturing data about events around the community. An area that has been neglected is the inclusion of these new players in the software development life cycle. Democratizing software development by including civil society in the software development life cycle will increase the variety of software applications and generate more buy-in of applications that improve livelihoods. Such an approach will lead to the emergence of Inclusive Information and Communication Technologies (IICT). The challenges that arise when developing IICTs include, inter alia, ownership of IICT, computer illiteracy of beneficiary communities, balkanized nature of communities in place and the well-known challenge of the communication gap between software developers and user communities. My approach to addressing these challenges was to develop the Integrated Development Spatial Planning Framework (IDSPF), a systems development methodology that seeks to demystify software development for grassroots communities by using participatory techniques that are familiar to stakeholders who implement socio economic development projects.
众包、公民新闻和社交网络是引领民间社会参与信息通信技术的信息通信技术(ICT)。然而,民间社会的参与仅限于创造内容,并在某种程度上获取有关社区周围事件的数据。一个被忽视的领域是在软件开发生命周期中包含这些新参与者。通过在软件开发生命周期中包括公民社会来实现软件开发的民主化,将增加软件应用程序的多样性,并产生更多的应用程序,从而改善人们的生活。这种方法将导致包容性信息和通信技术(ict)的出现。发展信息通信技术时所面临的挑战,除其他外,包括信息通信技术的所有权、受益社区的计算机文盲、现有社区的巴尔干性质以及众所周知的软件开发人员和用户社区之间沟通差距的挑战。我应对这些挑战的方法是开发综合发展空间规划框架(IDSPF),这是一种系统开发方法,旨在通过使用实施社会经济发展项目的利益相关者所熟悉的参与式技术,为基层社区揭开软件开发的神秘面纱。
{"title":"Experiences in Creating Inclusive Information and Communications Technologies (IICT): Democratizing Software Development in Social Development","authors":"C. Hanyane","doi":"10.1109/ACSEAC.2012.13","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.13","url":null,"abstract":"Crowd sourcing, citizen journalism and social networks are Information and Communications Technologies (ICT) that have ushered in civil society's participation in the ICT equation. However, the participation of civil society has been limited to creating content and, to some extent, capturing data about events around the community. An area that has been neglected is the inclusion of these new players in the software development life cycle. Democratizing software development by including civil society in the software development life cycle will increase the variety of software applications and generate more buy-in of applications that improve livelihoods. Such an approach will lead to the emergence of Inclusive Information and Communication Technologies (IICT). The challenges that arise when developing IICTs include, inter alia, ownership of IICT, computer illiteracy of beneficiary communities, balkanized nature of communities in place and the well-known challenge of the communication gap between software developers and user communities. My approach to addressing these challenges was to develop the Integrated Development Spatial Planning Framework (IDSPF), a systems development methodology that seeks to demystify software development for grassroots communities by using participatory techniques that are familiar to stakeholders who implement socio economic development projects.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topological Structure of Knowledge 知识的拓扑结构
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.25
T. Raboanary, J. Raboanary, Heriniaina Andry Raboanary, Tantely Mahefatiana Raboanary
In this paper, we introduce a model of knowledge based on information structures. We show this model captures the intuitive knowledge. Then we show that it is equivalent to the Kripke model. Finally, we put a Topology on this structure. This approach could give a new insight on the area of Artificial Intelligence and other areas such as Game theory, economics, and social sciences.
本文引入了一种基于信息结构的知识模型。我们展示了这个模型捕捉了直观的知识。然后我们证明它与Kripke模型是等价的。最后,我们给出了这个结构的拓扑图。这种方法可以为人工智能领域以及博弈论、经济学和社会科学等其他领域提供新的见解。
{"title":"Topological Structure of Knowledge","authors":"T. Raboanary, J. Raboanary, Heriniaina Andry Raboanary, Tantely Mahefatiana Raboanary","doi":"10.1109/ACSEAC.2012.25","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.25","url":null,"abstract":"In this paper, we introduce a model of knowledge based on information structures. We show this model captures the intuitive knowledge. Then we show that it is equivalent to the Kripke model. Finally, we put a Topology on this structure. This approach could give a new insight on the area of Artificial Intelligence and other areas such as Game theory, economics, and social sciences.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Laboratory Development for Teaching Power Systems via Interactive Experiment Environment 基于交互式实验环境的教学动力系统虚拟实验室开发
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.18
J. S. Djeumen, J. Le Roux, D. Nicolae
The creation and testing of computer-simulated interactive environment laboratory for use in the power systems field education will provide a highly interactive and powerful learning environment for all undergraduate power engineering students. This experiment will prepare students to approach their practical with more confidence and to better understand the theory in the class room. The study of electrical power systems requires a solid background on advanced mathematics, but many engineering students lack this required background. Using this tool, undergraduate students may improve their performance. MATLAB, particularly its Graphical User Interface (GUI)software has been used to design the interactive environment to calculate the fault currents and voltages that occur for different types of fault on the power systems transmission line. The manipulation on the internal connection of the power system components are the main focus. This paper describes the design of an interactive environment experiment for studying power systems fault analysis and the program will make the practical experiments in power engineering more attractive and understandable to undergraduate students.
计算机模拟交互环境实验室在电力系统领域教学中的创建和测试,将为所有电力工程本科学生提供一个高度交互和强大的学习环境。这个实验将使学生更有信心接触他们的实践,并更好地理解课堂上的理论。电力系统的研究需要扎实的高等数学背景,但许多工程专业的学生缺乏这种必要的背景。使用这个工具,本科生可以提高他们的表现。利用MATLAB,特别是MATLAB的图形用户界面(GUI)软件,设计了计算电力系统输电线上不同类型故障所产生的故障电流和电压的交互环境。对电力系统部件内部连接的操纵是主要的焦点。本文设计了一种用于电力系统故障分析研究的交互式环境实验,使电力工程的实际实验对本科生更具吸引力和可理解性。
{"title":"Virtual Laboratory Development for Teaching Power Systems via Interactive Experiment Environment","authors":"J. S. Djeumen, J. Le Roux, D. Nicolae","doi":"10.1109/ACSEAC.2012.18","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.18","url":null,"abstract":"The creation and testing of computer-simulated interactive environment laboratory for use in the power systems field education will provide a highly interactive and powerful learning environment for all undergraduate power engineering students. This experiment will prepare students to approach their practical with more confidence and to better understand the theory in the class room. The study of electrical power systems requires a solid background on advanced mathematics, but many engineering students lack this required background. Using this tool, undergraduate students may improve their performance. MATLAB, particularly its Graphical User Interface (GUI)software has been used to design the interactive environment to calculate the fault currents and voltages that occur for different types of fault on the power systems transmission line. The manipulation on the internal connection of the power system components are the main focus. This paper describes the design of an interactive environment experiment for studying power systems fault analysis and the program will make the practical experiments in power engineering more attractive and understandable to undergraduate students.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using a Genetic Algorithm for Mining Patterns from Endgame Databases 基于遗传算法的终局数据库模式挖掘
Pub Date : 2012-09-24 DOI: 10.1109/ACSEAC.2012.24
Heriniaina Andry Raboanary, J. Raboanary, T. Raboanary
Tic-tac-toe and Fanorona games are ones that can be played at an extremely high level by computer engines. Endgame databases are powerful tools to create these engines. These Endgame databases contain precious information's about how to play the game. Unfortunately, it is quite impossible for human players to learn the game strategies from endgame databases, which are only made of raw sequences of bits. The work presented here is the use of genetic algorithms to extract human friendly knowledge from these databases.
“井字棋”和“法诺罗纳”游戏是可以通过计算机引擎在极高水平上玩的游戏。Endgame数据库是创建这些引擎的强大工具。这些终局数据库包含了关于如何玩游戏的宝贵信息。不幸的是,人类玩家几乎不可能从终局数据库中学习游戏策略,因为终局数据库只是由原始的比特序列组成的。这里介绍的工作是使用遗传算法从这些数据库中提取对人类友好的知识。
{"title":"Using a Genetic Algorithm for Mining Patterns from Endgame Databases","authors":"Heriniaina Andry Raboanary, J. Raboanary, T. Raboanary","doi":"10.1109/ACSEAC.2012.24","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.24","url":null,"abstract":"Tic-tac-toe and Fanorona games are ones that can be played at an extremely high level by computer engines. Endgame databases are powerful tools to create these engines. These Endgame databases contain precious information's about how to play the game. Unfortunately, it is quite impossible for human players to learn the game strategies from endgame databases, which are only made of raw sequences of bits. The work presented here is the use of genetic algorithms to extract human friendly knowledge from these databases.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114518018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 African Conference for Sofware Engineering and Applied Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1