首页 > 最新文献

Journal of Advanced Computer Science and Technology最新文献

英文 中文
Performance trends for operational intelligence through value chain model 通过价值链模型实现操作智能的性能趋势
Pub Date : 2016-06-28 DOI: 10.14419/JACST.V5I2.5861
R. Kaula
Value chain is a successful management model for improving business competitiveness. A value chain based analytic approach facilitates meaningful grouping of business processes such that appropriate value from business operations can be derived. As organizations focus on competitive advantage and growth, a value chain derived operational intelligence provides insight to compete successfully in the marketplace. This paper outlines an approach to develop performance based value metrics in the form of analytic business rules for operational intelligence through the value chain model. The paper illustrates the concepts through a University value chain prototype which is implemented in Oracle’s PL/SQL language.
价值链是提高企业竞争力的成功管理模式。基于价值链的分析方法有助于对业务流程进行有意义的分组,从而可以从业务操作中获得适当的价值。当组织关注竞争优势和增长时,价值链派生的操作智能提供了在市场中成功竞争的洞察力。本文概述了一种通过价值链模型以分析业务规则的形式为操作智能开发基于绩效的价值度量的方法。本文通过一个以Oracle PL/SQL语言实现的大学价值链原型来阐述这些概念。
{"title":"Performance trends for operational intelligence through value chain model","authors":"R. Kaula","doi":"10.14419/JACST.V5I2.5861","DOIUrl":"https://doi.org/10.14419/JACST.V5I2.5861","url":null,"abstract":"Value chain is a successful management model for improving business competitiveness. A value chain based analytic approach facilitates meaningful grouping of business processes such that appropriate value from business operations can be derived. As organizations focus on competitive advantage and growth, a value chain derived operational intelligence provides insight to compete successfully in the marketplace. This paper outlines an approach to develop performance based value metrics in the form of analytic business rules for operational intelligence through the value chain model. The paper illustrates the concepts through a University value chain prototype which is implemented in Oracle’s PL/SQL language.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125153080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey of the use of genetic algorithm for multiple sequence alignment 综述了遗传算法在多序列比对中的应用
Pub Date : 2016-06-08 DOI: 10.14419/JACST.V5I2.6079
M. B. Othman
Multiple Sequence Alignment (MSA) is used in genomic analysis, such as the identification of conserved sequence motifs, the estimation of evolutionary divergence between sequences, and the genes’ historical relationships inference. Several researches were conducted to determine the level of similarity of a set of sequences. Due to the problem of the NP-complete class property, a number of researches use genetic algorithms (GA) to find a solution to the multiple sequence alignment. However, the nature of genetic algorithms makes the complexity extremely high due to the redundancy provided by the different operators. The aim of this paper is to study some proposed GA solutions provided for MSA and to compare them using some criteria which we believe any solution should comply with in matters of representativeness, closeness and original sequence invariance.
多序列比对(MSA)用于基因组分析,如保守序列基序的鉴定、序列间进化差异的估计以及基因历史关系的推断。为了确定一组序列的相似程度,进行了几项研究。由于np完全类性质的问题,许多研究使用遗传算法(GA)来求解多序列比对问题。然而,由于遗传算法的特性,由于不同运算符提供的冗余性,使得遗传算法的复杂性非常高。本文的目的是研究为MSA提供的一些遗传算法解,并使用我们认为任何解在代表性,紧密性和原始序列不变性方面都应遵守的一些准则对它们进行比较。
{"title":"Survey of the use of genetic algorithm for multiple sequence alignment","authors":"M. B. Othman","doi":"10.14419/JACST.V5I2.6079","DOIUrl":"https://doi.org/10.14419/JACST.V5I2.6079","url":null,"abstract":"Multiple Sequence Alignment (MSA) is used in genomic analysis, such as the identification of conserved sequence motifs, the estimation of evolutionary divergence between sequences, and the genes’ historical relationships inference. Several researches were conducted to determine the level of similarity of a set of sequences. Due to the problem of the NP-complete class property, a number of researches use genetic algorithms (GA) to find a solution to the multiple sequence alignment. However, the nature of genetic algorithms makes the complexity extremely high due to the redundancy provided by the different operators. The aim of this paper is to study some proposed GA solutions provided for MSA and to compare them using some criteria which we believe any solution should comply with in matters of representativeness, closeness and original sequence invariance.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing a computer system and interface, performance and applications 管理计算机系统、接口、性能和应用程序
Pub Date : 2016-06-07 DOI: 10.14419/JACST.V5I2.5951
Nderim Zeqiri
Computer system has important command under various objects. To have a stable system, there is a need to create the model and functionality in terms of management and programming. The purpose of this paper is to present computer system as a central source, and other systems management interface for external management facilities. The logic of interaction of various objects is to create structures with universal purposes. In the paper presented the functioning of the computer system with microcontrollers and especially with Arduino Uno device. Also, is analyzed the performance of computer system, and are given the perspective and other question in the context of problem-solving. So, finally is given the comparisons with other systems.
计算机系统对各种对象具有重要的指挥作用。为了拥有一个稳定的系统,需要在管理和编程方面创建模型和功能。本文的目的是呈现计算机系统作为中心源,与其他系统管理接口的外部管理设施。各种对象相互作用的逻辑是创建具有通用目的的结构。本文介绍了采用微控制器,特别是Arduino Uno器件的计算机系统的功能。同时,分析了计算机系统的性能,并给出了解决问题的视角和其他问题。最后给出了与其他系统的比较。
{"title":"Managing a computer system and interface, performance and applications","authors":"Nderim Zeqiri","doi":"10.14419/JACST.V5I2.5951","DOIUrl":"https://doi.org/10.14419/JACST.V5I2.5951","url":null,"abstract":"Computer system has important command under various objects. To have a stable system, there is a need to create the model and functionality in terms of management and programming. The purpose of this paper is to present computer system as a central source, and other systems management interface for external management facilities. The logic of interaction of various objects is to create structures with universal purposes. In the paper presented the functioning of the computer system with microcontrollers and especially with Arduino Uno device. Also, is analyzed the performance of computer system, and are given the perspective and other question in the context of problem-solving. So, finally is given the comparisons with other systems.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cybersecurity Snapshot: Google, Twitter, and Other Online Databases 网络安全快照:谷歌、Twitter和其他在线数据库
Pub Date : 2016-05-22 DOI: 10.14419/JACST.V5I1.6181
B. Rawal, G. Eberhardt, Jaein Lee
Every day, millions of attacks are carried out on the networks and computer systems. In recent years, these numbers have increased dramatically. All it requires is one success for a hacker to gain unauthorized access and data, but for administrators, it is a constant battle to protect what is rightfully theirs. In this paper, we look into how these attacks have increased, what the studies of various databases and reports say on how and what types of data are being breached, who is breaching them, and how they are breaching the systems. Also, we propose various unconventional ways to prevent these attacks from happening in the future. Furthermore, this paper lists the top 26 bug-fix times reported in the Google Security Research Project (GSRP). This article brings to light reoccurring cyber threats, challenges associated with these threats, and emerging trends in the domain of cyber security.
每天,数以百万计的攻击发生在网络和计算机系统上。近年来,这些数字急剧增加。黑客只需要成功地获得未经授权的访问和数据,但对于管理员来说,保护他们的合法财产是一场持久战。在本文中,我们研究了这些攻击是如何增加的,对各种数据库和报告的研究如何以及什么类型的数据被破坏,谁在破坏它们,以及它们是如何破坏系统的。此外,我们提出了各种非常规的方法来防止这些攻击在未来发生。此外,本文列出了谷歌安全研究项目(GSRP)报告的前26个bug修复时间。本文介绍了反复出现的网络威胁、与这些威胁相关的挑战以及网络安全领域的新趋势。
{"title":"Cybersecurity Snapshot: Google, Twitter, and Other Online Databases","authors":"B. Rawal, G. Eberhardt, Jaein Lee","doi":"10.14419/JACST.V5I1.6181","DOIUrl":"https://doi.org/10.14419/JACST.V5I1.6181","url":null,"abstract":"Every day, millions of attacks are carried out on the networks and computer systems. In recent years, these numbers have increased dramatically. All it requires is one success for a hacker to gain unauthorized access and data, but for administrators, it is a constant battle to protect what is rightfully theirs. In this paper, we look into how these attacks have increased, what the studies of various databases and reports say on how and what types of data are being breached, who is breaching them, and how they are breaching the systems. Also, we propose various unconventional ways to prevent these attacks from happening in the future. Furthermore, this paper lists the top 26 bug-fix times reported in the Google Security Research Project (GSRP). This article brings to light reoccurring cyber threats, challenges associated with these threats, and emerging trends in the domain of cyber security.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132587969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A review on data stream classification approaches 数据流分类方法综述
Pub Date : 2016-02-07 DOI: 10.14419/JACST.V5I1.5225
Sajad Homayoun, Marzieh Ahmadzadeh
Stream data is usually in vast volume, changing dynamically, possibly infinite, and containing multi-dimensional features. The attention towards data stream mining is increasing as regards to its presence in wide range of real-world applications, such as e-commerce, banking, sensor data and telecommunication records. Similar to data mining, data stream mining includes classification, clustering, frequent pattern mining etc. techniques; the special focus of this paper is on classification methods invented to handle data streams. Early methods of data stream classification needed all instances to be labeled for creating classifier models, but there are some methods (Semi-Supervised Learning and Active Learning) in which unlabeled data is employed as well as labeled data. In this paper, by focusing on ensemble methods, semi-supervised and active learning, a review on some state of the art researches is given.
流数据通常是大量的,动态变化的,可能是无限的,并且包含多维特征。由于数据流挖掘在电子商务、银行、传感器数据和电信记录等广泛的现实世界应用中的存在,对数据流挖掘的关注正在增加。与数据挖掘类似,数据流挖掘包括分类、聚类、频繁模式挖掘等技术;本文特别关注为处理数据流而发明的分类方法。早期的数据流分类方法需要对所有实例进行标记以创建分类器模型,但有一些方法(半监督学习和主动学习)在使用标记数据的同时也使用未标记数据。本文主要从集成方法、半监督学习和主动学习三个方面综述了近年来在这方面的研究进展。
{"title":"A review on data stream classification approaches","authors":"Sajad Homayoun, Marzieh Ahmadzadeh","doi":"10.14419/JACST.V5I1.5225","DOIUrl":"https://doi.org/10.14419/JACST.V5I1.5225","url":null,"abstract":"Stream data is usually in vast volume, changing dynamically, possibly infinite, and containing multi-dimensional features. The attention towards data stream mining is increasing as regards to its presence in wide range of real-world applications, such as e-commerce, banking, sensor data and telecommunication records. Similar to data mining, data stream mining includes classification, clustering, frequent pattern mining etc. techniques; the special focus of this paper is on classification methods invented to handle data streams. Early methods of data stream classification needed all instances to be labeled for creating classifier models, but there are some methods (Semi-Supervised Learning and Active Learning) in which unlabeled data is employed as well as labeled data. In this paper, by focusing on ensemble methods, semi-supervised and active learning, a review on some state of the art researches is given.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133865033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Irrelevant frame removal for scene analysis using video hyperclique pattern and spectrum analysis 使用视频超团模式和频谱分析进行场景分析的不相关帧去除
Pub Date : 2016-02-06 DOI: 10.14419/JACST.V5I1.4035
Yuchou Chang, Hong Lin
Video often include frames that are irrelevant to the scenes for recording. These are mainly due to imperfect shooting, abrupt movements of camera, or unintended switching of scenes. The irrelevant frames should be removed before the semantic analysis of video scene is performed for video retrieval. An unsupervised approach for automatic removal of irrelevant frames is proposed in this paper. A novel log-spectral representation of color video frames based on Fibonacci lattice-quantization has been developed for better description of the global structures of video contents to measure similarity of video frames. Hyperclique pattern analysis, used to detect redundant data in textual analysis, is extended to extract relevant frame clusters in color videos. A new strategy using the k-nearest neighbor algorithm is developed for generating a video frame support measure and an h-confidence measure on this hyperclique pattern based analysis method. Evaluation of the proposed irrelevant video frame removal algorithm reveals promising results for datasets with irrelevant frames.
视频通常包括与录制场景无关的帧。这主要是由于不完美的拍摄,突然移动的相机,或无意切换场景。在对视频场景进行语义分析并进行视频检索之前,需要去除不相关的帧。提出了一种自动去除无关帧的无监督方法。为了更好地描述视频内容的全局结构,测量视频帧的相似性,提出了一种基于斐波那契格量化的彩色视频帧对数谱表示方法。将文本分析中用于检测冗余数据的超团模式分析扩展到彩色视频中相关帧簇的提取。提出了一种利用k近邻算法生成视频帧支持度测度和h置信度测度的新策略。对提出的不相关视频帧去除算法的评估显示了具有不相关帧的数据集的有希望的结果。
{"title":"Irrelevant frame removal for scene analysis using video hyperclique pattern and spectrum analysis","authors":"Yuchou Chang, Hong Lin","doi":"10.14419/JACST.V5I1.4035","DOIUrl":"https://doi.org/10.14419/JACST.V5I1.4035","url":null,"abstract":"Video often include frames that are irrelevant to the scenes for recording. These are mainly due to imperfect shooting, abrupt movements of camera, or unintended switching of scenes. The irrelevant frames should be removed before the semantic analysis of video scene is performed for video retrieval. An unsupervised approach for automatic removal of irrelevant frames is proposed in this paper. A novel log-spectral representation of color video frames based on Fibonacci lattice-quantization has been developed for better description of the global structures of video contents to measure similarity of video frames. Hyperclique pattern analysis, used to detect redundant data in textual analysis, is extended to extract relevant frame clusters in color videos. A new strategy using the k-nearest neighbor algorithm is developed for generating a video frame support measure and an h-confidence measure on this hyperclique pattern based analysis method. Evaluation of the proposed irrelevant video frame removal algorithm reveals promising results for datasets with irrelevant frames.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124290001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Colour sorting of translucent samples 半透明样品的颜色分选
Pub Date : 2015-10-29 DOI: 10.14419/JACST.V4I2.5310
G. Pavlidis
Automated quality control and sorting based on computer vision techniques has been a long celebrated practice in industrial processes and production. Among the surface characteristics that guide the decision making in such systems, the colour holds a prominent position. This gets somehow complicated in cases dealing with translucent samples or samples with a significant amount of transparency and yet distinctive colour hues. The scope of this paper is to provide a method to tackle with such cases and presents a successful application to the world-renowned mastiha of Chios, a natural aromatic translucent resin extracted from the mastic tree that grows on the island of Chios, Greece.
基于计算机视觉技术的自动化质量控制和分拣在工业过程和生产中已经是一个长期的著名实践。在这种系统中,在指导决策的表面特征中,颜色占据着突出的地位。在处理半透明样品或具有大量透明度的样品和独特的色调的情况下,这变得有些复杂。本文的范围是提供一种解决此类情况的方法,并介绍了一种成功应用于世界著名的基俄斯乳香树的方法,这是一种从生长在希腊基俄斯岛的乳香树中提取的天然芳香半透明树脂。
{"title":"Colour sorting of translucent samples","authors":"G. Pavlidis","doi":"10.14419/JACST.V4I2.5310","DOIUrl":"https://doi.org/10.14419/JACST.V4I2.5310","url":null,"abstract":"Automated quality control and sorting based on computer vision techniques has been a long celebrated practice in industrial processes and production. Among the surface characteristics that guide the decision making in such systems, the colour holds a prominent position. This gets somehow complicated in cases dealing with translucent samples or samples with a significant amount of transparency and yet distinctive colour hues. The scope of this paper is to provide a method to tackle with such cases and presents a successful application to the world-renowned mastiha of Chios, a natural aromatic translucent resin extracted from the mastic tree that grows on the island of Chios, Greece.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129139465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on incorporating ICT in teaching methodologies at universities of Quetta 关于将信息和通信技术纳入奎达大学教学方法的研究
Pub Date : 2015-08-12 DOI: 10.14419/JACST.V4I2.4016
Nausheen Saeed, Farrukh Nasim, Walayat Hussain, Samina Azeem
This paper presents a study on the use of ICT in teaching methodology by the faculty of universities in Quetta, Pakistan. A Survey about the impact of ICT usage was conducted in three major public universities of Quetta - University Of Balochistan, Sardar Bahadur Khan Women University, and Balochistan University of Information Technology, Engineering and Management Sciences, focusing the faculty and the students. The study shows that ample ICT facilities are available to the faculties in these universities and the teachers incorporate different ICT tools in their teaching methodologies. Teachers and students believe that ICT has played a vital role in improving the quality of education while there remain some areas of improvement like University web portals, access to digital libraries for the students and online student management systems.
本文介绍了一项关于巴基斯坦奎达大学教师在教学方法中使用ICT的研究。在奎达的三所主要公立大学——俾路支省大学、萨达尔·巴哈杜尔·汗女子大学和俾路支省信息技术、工程和管理科学大学,针对教师和学生进行了一项关于使用信息通信技术影响的调查。研究表明,这些大学的院系拥有充足的信息通信技术设施,教师在教学方法中采用了不同的信息通信技术工具。教师和学生认为,ICT在提高教育质量方面发挥了至关重要的作用,但仍有一些领域有待改进,如大学门户网站、学生使用数字图书馆和在线学生管理系统。
{"title":"A study on incorporating ICT in teaching methodologies at universities of Quetta","authors":"Nausheen Saeed, Farrukh Nasim, Walayat Hussain, Samina Azeem","doi":"10.14419/JACST.V4I2.4016","DOIUrl":"https://doi.org/10.14419/JACST.V4I2.4016","url":null,"abstract":"This paper presents a study on the use of ICT in teaching methodology by the faculty of universities in Quetta, Pakistan. A Survey about the impact of ICT usage was conducted in three major public universities of Quetta - University Of Balochistan, Sardar Bahadur Khan Women University, and Balochistan University of Information Technology, Engineering and Management Sciences, focusing the faculty and the students. The study shows that ample ICT facilities are available to the faculties in these universities and the teachers incorporate different ICT tools in their teaching methodologies. Teachers and students believe that ICT has played a vital role in improving the quality of education while there remain some areas of improvement like University web portals, access to digital libraries for the students and online student management systems.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126935543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and development of intelligent electronic tutorial software for GSM maintenance in Nigeria 尼日利亚GSM维修智能电子辅导软件的设计与开发
Pub Date : 2015-07-26 DOI: 10.14419/JACST.V4I2.4880
E. Nwabueze, Nwachukwu Catherine Ada Ngozi, J. Obiageli, Obikwere Fortune
The Global System of Mobile communication (GSM) technology has permeated every facet of human existence ,that man can no longer do away with it. This piece of work was motivated by the nagging problems, which include poor quality of service by telecom service providers, which attempts to negate the value of this revolution, inaccurate and interrupted service delivery which have resulted to delayed and aborted calls, traffic congestion, low bandwidth and oversubscription errors, inter alia. So the primary objective of this article therefore, is to design and develop intelligent electronic tutorial GSM software that would be capable of providing relevant answers to some GSM-based service challenges raised above. The Structured Systems Analysis and Design Methodology (SSADM) was employed as research methodology. The expected results shall include, among others, broadened scope of knowledge in GSM tutorial software engineering, provision of user friendly environment and cost effective communication system for a happy customer and a better society; provide an effective and feasible solution for a reliable and accurate GSM management system that would improve the efficiency and productivity of Nigerian information and communication infrastructure.
全球移动通信系统(GSM)技术已经渗透到人类生活的方方面面,人类再也无法摆脱它。这项工作的动机是恼人的问题,其中包括电信服务提供商的服务质量差,他们试图否定这场革命的价值,不准确和中断的服务交付,导致呼叫延迟和中断,交通拥堵,低带宽和超额订阅错误等。因此,本文的主要目标是设计和开发智能电子教程GSM软件,该软件能够为上述基于GSM的业务挑战提供相关的答案。采用结构化系统分析与设计方法(SSADM)作为研究方法。期望的成果包括:拓宽GSM教程软件工程的知识范围,提供用户友好的环境和具有成本效益的通信系统,使客户满意,社会更美好;为可靠和准确的GSM管理系统提供有效和可行的解决方案,以提高尼日利亚信息和通信基础设施的效率和生产力。
{"title":"Design and development of intelligent electronic tutorial software for GSM maintenance in Nigeria","authors":"E. Nwabueze, Nwachukwu Catherine Ada Ngozi, J. Obiageli, Obikwere Fortune","doi":"10.14419/JACST.V4I2.4880","DOIUrl":"https://doi.org/10.14419/JACST.V4I2.4880","url":null,"abstract":"The Global System of Mobile communication (GSM) technology has permeated every facet of human existence ,that man can no longer do away with it. This piece of work was motivated by the nagging problems, which include poor quality of service by telecom service providers, which attempts to negate the value of this revolution, inaccurate and interrupted service delivery which have resulted to delayed and aborted calls, traffic congestion, low bandwidth and oversubscription errors, inter alia. So the primary objective of this article therefore, is to design and develop intelligent electronic tutorial GSM software that would be capable of providing relevant answers to some GSM-based service challenges raised above. The Structured Systems Analysis and Design Methodology (SSADM) was employed as research methodology. The expected results shall include, among others, broadened scope of knowledge in GSM tutorial software engineering, provision of user friendly environment and cost effective communication system for a happy customer and a better society; provide an effective and feasible solution for a reliable and accurate GSM management system that would improve the efficiency and productivity of Nigerian information and communication infrastructure.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130844050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementing a software tool to ensure undeadlock state by perfect distribution of resources' instances among competing processes 设计并实现了一个软件工具,通过在竞争进程之间完美地分配资源实例来保证解死锁状态
Pub Date : 2015-07-03 DOI: 10.14419/JACST.V4I2.4857
Imad Matti Bakko, R. M. Yas
In computer operating systems books, they explain and solve deadlock problems by declaring in advance the maximum needs of resources and their instances for each process, the total number of resources' instances, and the allocation of the resources' instances for each process. In this paper, we introduce an effective software tool to prove that it is not necessary to declare in advance the allocation of resources' instances for each process since we suggested and implement in the tool some equations to calculate and discover a suitable allocation of resources' instances to be distributed among competing processes in such a way that the computer system will never enter a deadlock state. In fact, the only necessary and sufficient conditions to solve deadlock problems are the total number of resources and their instances besides the maximum needs of resources and their instances for each process. The theory and details are explained with some examples in the contents.
在计算机操作系统书籍中,它们通过提前声明每个进程对资源及其实例的最大需求、资源实例的总数以及每个进程对资源实例的分配来解释和解决死锁问题。在本文中,我们引入了一个有效的软件工具来证明没有必要预先声明每个进程的资源实例的分配,因为我们在工具中提出并实现了一些方程来计算和发现在竞争进程之间分配资源实例的适当分配,从而使计算机系统永远不会进入死锁状态。实际上,除了每个进程对资源及其实例的最大需求外,解决死锁问题的唯一必要和充分条件是资源及其实例的总数。内容中通过实例对理论和细节进行了说明。
{"title":"Design and implementing a software tool to ensure undeadlock state by perfect distribution of resources' instances among competing processes","authors":"Imad Matti Bakko, R. M. Yas","doi":"10.14419/JACST.V4I2.4857","DOIUrl":"https://doi.org/10.14419/JACST.V4I2.4857","url":null,"abstract":"In computer operating systems books, they explain and solve deadlock problems by declaring in advance the maximum needs of resources and their instances for each process, the total number of resources' instances, and the allocation of the resources' instances for each process. In this paper, we introduce an effective software tool to prove that it is not necessary to declare in advance the allocation of resources' instances for each process since we suggested and implement in the tool some equations to calculate and discover a suitable allocation of resources' instances to be distributed among competing processes in such a way that the computer system will never enter a deadlock state. In fact, the only necessary and sufficient conditions to solve deadlock problems are the total number of resources and their instances besides the maximum needs of resources and their instances for each process. The theory and details are explained with some examples in the contents.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134298301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Advanced Computer Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1