首页 > 最新文献

IOSR journal of computer engineering最新文献

英文 中文
Comparison Between Dynamic And Static Blocks In Sequitur Algorithm 推理算法中动态块与静态块的比较
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904013943
A. Siahaan, S. Aryza, R. Rahim, Andre Hasudungan Lubis
In the Sequitur algorithm, the compression process is performed based on the number of characters having similar similarities. Similarities will be detected on every syllable in the entire text. Determination of the number of characters to be compared will affect the compression level of this algorithm. Using dynamic or static blocks can optimize the number of compressed characters and of course, it affects the speed of data transmission.
在Sequitur算法中,压缩过程是根据具有相似度的字符的数量来执行的。在整个文本的每个音节上都会检测到相似之处。要比较的字符数的确定将影响该算法的压缩水平。使用动态或静态块可以优化压缩字符的数量,当然,它会影响数据传输的速度。
{"title":"Comparison Between Dynamic And Static Blocks In Sequitur Algorithm","authors":"A. Siahaan, S. Aryza, R. Rahim, Andre Hasudungan Lubis","doi":"10.9790/0661-1904013943","DOIUrl":"https://doi.org/10.9790/0661-1904013943","url":null,"abstract":"In the Sequitur algorithm, the compression process is performed based on the number of characters having similar similarities. Similarities will be detected on every syllable in the entire text. Determination of the number of characters to be compared will affect the compression level of this algorithm. Using dynamic or static blocks can optimize the number of compressed characters and of course, it affects the speed of data transmission.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81374181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bondage Number of a Butterfly Graph 蝴蝶图的束缚数
Pub Date : 2017-06-01 DOI: 10.9790/3021-0705015865
P. Jyothi, I. Kelkar
Domination Theory is an important branch of Graph Theory that has wide range of applications to various branches of Science and Technology. A new family of graphs called Butterfly Graphs is introduced and study of its parameters is under progress. Butterfly Graphs are undirected graphs and are widely used in interconnection networks. The bondage number b(G) of a graph G is the minimum cardinality among all sets S  E(G) such that γ(G S) > γ(G). In this paper bondage numbers of butterfly graph are studied for various values of n=2, 3, 4, then bondage number of BF(n) is generalized.
支配论是图论的一个重要分支,在科学技术的各个领域有着广泛的应用。介绍了一种新的图族——蝴蝶图,并对其参数进行了研究。蝴蝶图是一种无向图,广泛应用于互连网络中。图G的束缚数b(G)是所有集合SE(G)中使γ(gs) > γ(G)的最小基数。本文研究了n=2、3、4时蝴蝶图的束缚数,推广了BF(n)的束缚数。
{"title":"Bondage Number of a Butterfly Graph","authors":"P. Jyothi, I. Kelkar","doi":"10.9790/3021-0705015865","DOIUrl":"https://doi.org/10.9790/3021-0705015865","url":null,"abstract":"Domination Theory is an important branch of Graph Theory that has wide range of applications to various branches of Science and Technology. A new family of graphs called Butterfly Graphs is introduced and study of its parameters is under progress. Butterfly Graphs are undirected graphs and are widely used in interconnection networks. The bondage number b(G) of a graph G is the minimum cardinality among all sets S  E(G) such that γ(G S) > γ(G). In this paper bondage numbers of butterfly graph are studied for various values of n=2, 3, 4, then bondage number of BF(n) is generalized.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84269320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification Trees with Logistic Regression Functions for Network Based Intrusion Detection System 基于网络的入侵检测系统的逻辑回归分类树
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903044852
D. Y. Mahmood
Intrusion Detection Systems considered as an indispensable field of network security to detect passive and anomaly activities in network traffics and packets. In this paper a framework of network based intrusion detection system has been implemented using Logistic Model Trees supervised machine learning algorithm."NSL-KDD" dataset which is an updated dataset from "KDDCup 1999" benchmark dataset for intrusion detection has been used for the experimental analysis using percent of 60% for training phase and the rest for testing phase. The testing and experimental results from the proposed structure shows that using two way functions which are classification with regression combined in Logistic Model Tree is very accurate in term of accuracy and minimum false-positive average with high true-positive average. Two classifications has been performed in the proposed model which are (Attack or Normal)
入侵检测系统用于检测网络流量和数据包中的被动和异常活动,被认为是网络安全不可缺少的一个领域。本文利用逻辑模型树监督机器学习算法实现了一个基于网络的入侵检测系统框架。“NSL-KDD”数据集是“KDDCup 1999”入侵检测基准数据集的更新数据集,用于实验分析,60%的百分比用于训练阶段,其余用于测试阶段。对该结构的测试和实验结果表明,在Logistic模型树中使用分类与回归相结合的两种方式函数在准确率和假阳性平均值最小和真阳性平均值高方面都是非常准确的。在提出的模型中进行了两种分类(攻击或正常)
{"title":"Classification Trees with Logistic Regression Functions for Network Based Intrusion Detection System","authors":"D. Y. Mahmood","doi":"10.9790/0661-1903044852","DOIUrl":"https://doi.org/10.9790/0661-1903044852","url":null,"abstract":"Intrusion Detection Systems considered as an indispensable field of network security to detect passive and anomaly activities in network traffics and packets. In this paper a framework of network based intrusion detection system has been implemented using Logistic Model Trees supervised machine learning algorithm.\"NSL-KDD\" dataset which is an updated dataset from \"KDDCup 1999\" benchmark dataset for intrusion detection has been used for the experimental analysis using percent of 60% for training phase and the rest for testing phase. The testing and experimental results from the proposed structure shows that using two way functions which are classification with regression combined in Logistic Model Tree is very accurate in term of accuracy and minimum false-positive average with high true-positive average. Two classifications has been performed in the proposed model which are (Attack or Normal)","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78075671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A New Approach for the Betterment in Energy-Aware VM Scheduling 一种改进虚拟机能量感知调度的新方法
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903065360
Alekhya Orugonda, V. K. Kumar
Cloud Computing is dealing with an growing interest nowadays as it is present in many purchaser home equipment through advertising the illusion of countless resources in the direction of its clients. Nevertheless it increases intense problems with electricity intake: the better degrees of nice and availability require irrational strength expenses. A digital machine scheduling technique for decreasing strength consumption of IaaS datacenters is required. We need to design a CloudSim-based simulation environment, and implemented actual-international lines for the experiments. We need to show that enormous savings can be accomplished in strength intake with brand new proposed algorithms. Cloud computing is a digital pool of resources which might be supplied to customers through Internet. Cloud computing provider vendors one of the desires is to apply the assets successfully and advantage most profit. This results in task scheduling as a core and challenging difficulty in cloud computing. In this studies a dialogue closer to the useful resource management of digital machines in cloud and a way to make assets extra efficiently available to customers is furnished. The most important focus is on process scheduling. In this present work, a parametric analysis is finished to discover the requirement of technique migration and based totally in this evaluation the migration can be completed on those tactics. . The effectiveness of the paintings is diagnosed in terms of successful execution of the processes inside the deadlines.
如今,云计算正在处理越来越多的兴趣,因为它存在于许多购买者的家用设备中,通过向客户宣传无数资源的错觉。然而,它增加了电力摄入的严重问题:更好的良好程度和可用性需要不合理的力量支出。为了降低IaaS数据中心的强度消耗,需要一种数字机器调度技术。我们需要设计一个基于cloudsim的仿真环境,并为实验实现实际的国际线路。我们需要证明,通过全新提出的算法,可以在强度摄入方面实现巨大的节省。云计算是一个可以通过互联网提供给客户的数字资源池。云计算供应商的愿望之一是成功地应用这些资产并获得最大的利润。这导致任务调度成为云计算中的一个核心和具有挑战性的难题。在本研究中,提供了一种更接近于云中数字机器的有用资源管理的对话,并提供了一种使资产更有效地提供给客户的方法。最重要的焦点是进程调度。本文通过对技术迁移需求的参数化分析,发现了技术迁移的需求,并在此基础上对技术迁移策略进行了评估。绘画的有效性是根据在最后期限内成功执行过程来诊断的。
{"title":"A New Approach for the Betterment in Energy-Aware VM Scheduling","authors":"Alekhya Orugonda, V. K. Kumar","doi":"10.9790/0661-1903065360","DOIUrl":"https://doi.org/10.9790/0661-1903065360","url":null,"abstract":"Cloud Computing is dealing with an growing interest nowadays as it is present in many purchaser home equipment through advertising the illusion of countless resources in the direction of its clients. Nevertheless it increases intense problems with electricity intake: the better degrees of nice and availability require irrational strength expenses. A digital machine scheduling technique for decreasing strength consumption of IaaS datacenters is required. We need to design a CloudSim-based simulation environment, and implemented actual-international lines for the experiments. We need to show that enormous savings can be accomplished in strength intake with brand new proposed algorithms. Cloud computing is a digital pool of resources which might be supplied to customers through Internet. Cloud computing provider vendors one of the desires is to apply the assets successfully and advantage most profit. This results in task scheduling as a core and challenging difficulty in cloud computing. In this studies a dialogue closer to the useful resource management of digital machines in cloud and a way to make assets extra efficiently available to customers is furnished. The most important focus is on process scheduling. In this present work, a parametric analysis is finished to discover the requirement of technique migration and based totally in this evaluation the migration can be completed on those tactics. . The effectiveness of the paintings is diagnosed in terms of successful execution of the processes inside the deadlines.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80782309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Student Performance Based On Clustering And Classification 基于聚类和分类的学生成绩预测
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903054952
Purva Naik, Rubana P Shaikh, Odelia Diukar, Saylee Dessai
In today’s world the education field is growing, developing widely and becoming one of the most crucial industries. The data available in the educational field can be studied using educational data mining so that the unseen knowledge can be obtained from it. In this paper, various data mining approaches like Clustering, classification and regression our used to predict the students’ performance in examination in advance, so that necessary measures can be taken to improvise on their performance to score better marks. A hybrid approach of Enhanced K-strange points clustering algorithm and Naïve Bayes classification algorithm is presented implemented and compared it with existing hybrid approach which is K-means clustering algorithm and Decision tree. Finally, to predict student performance, multiple linear regression is used. The results obtained after the implementation may be useful for instructor as well as students. This work will help in taking appropriate decision to improve student’s performance.
当今世界,教育领域不断发展壮大,发展迅速,已成为最重要的产业之一。利用教育数据挖掘技术,可以对教育领域的现有数据进行研究,从而获得看不见的知识。本文采用聚类、分类、回归等多种数据挖掘方法,提前预测学生的考试成绩,从而采取必要的措施对学生的考试成绩进行即兴发挥,从而取得更好的成绩。提出了一种增强k奇异点聚类算法与Naïve贝叶斯分类算法的混合方法,并与现有的k均值聚类算法与决策树的混合方法进行了比较。最后,使用多元线性回归来预测学生的表现。实施后得到的结果对教师和学生都是有用的。这项工作将有助于做出适当的决定,以提高学生的表现。
{"title":"Predicting Student Performance Based On Clustering And Classification","authors":"Purva Naik, Rubana P Shaikh, Odelia Diukar, Saylee Dessai","doi":"10.9790/0661-1903054952","DOIUrl":"https://doi.org/10.9790/0661-1903054952","url":null,"abstract":"In today’s world the education field is growing, developing widely and becoming one of the most crucial industries. The data available in the educational field can be studied using educational data mining so that the unseen knowledge can be obtained from it. In this paper, various data mining approaches like Clustering, classification and regression our used to predict the students’ performance in examination in advance, so that necessary measures can be taken to improvise on their performance to score better marks. A hybrid approach of Enhanced K-strange points clustering algorithm and Naïve Bayes classification algorithm is presented implemented and compared it with existing hybrid approach which is K-means clustering algorithm and Decision tree. Finally, to predict student performance, multiple linear regression is used. The results obtained after the implementation may be useful for instructor as well as students. This work will help in taking appropriate decision to improve student’s performance.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81919326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Adaptive Fault Reduction Scheme to Provide Reliable Cloud Computing Environment 一种自适应故障减少方案,提供可靠的云计算环境
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904016473
M. Damodhar, S. Poojitha
The Now a days Cloud technologies has become an essential trend in the market of information technology. Virtualization and Internet-based Cloud computing leads to different kinds of failures to arise and hence, leads to the requirement for reliability and availability has become an essential issue. To make ensure for reliability and availability of cloud technologies, a scheme for fault tolerance need to be developed and implemented. As the majority of the early schemes for fault tolerance were focused on the utilization of only one way to tolerate faults. This paper presents an adaptive scheme that deals with the difficulty of fault tolerance in various cloud computing environments. The projected scheme employs adaptive behavior during the selection of replication and fine-grained checkpointing methods for attaining a reliable cloud platform that can handle different client requests. In addition to this the algorithm also determines the best suited fault tolerance method to every designated virtual machine. As the proposed scheme adapts fault tolerance methods it improves the performance of the cloud in terms of availability, throughput, cloud overheads due to huge number of check points and maintenance cost.
如今,云技术已经成为信息技术市场的一个重要趋势。虚拟化和基于internet的云计算导致了不同类型的故障的出现,因此,导致对可靠性和可用性的需求已经成为一个必不可少的问题。为了确保云技术的可靠性和可用性,需要开发和实现容错方案。由于大多数早期的容错方案都侧重于只利用一种容错方式。针对各种云计算环境下的容错困难,提出了一种自适应方案。该方案在选择复制和细粒度检查点方法时采用自适应行为,以获得可以处理不同客户端请求的可靠云平台。此外,该算法还确定了最适合每个指定虚拟机的容错方法。由于该方案采用了容错方法,在可用性、吞吐量、大量检查点造成的云开销和维护成本等方面提高了云的性能。
{"title":"An Adaptive Fault Reduction Scheme to Provide Reliable Cloud Computing Environment","authors":"M. Damodhar, S. Poojitha","doi":"10.9790/0661-1904016473","DOIUrl":"https://doi.org/10.9790/0661-1904016473","url":null,"abstract":"The Now a days Cloud technologies has become an essential trend in the market of information technology. Virtualization and Internet-based Cloud computing leads to different kinds of failures to arise and hence, leads to the requirement for reliability and availability has become an essential issue. To make ensure for reliability and availability of cloud technologies, a scheme for fault tolerance need to be developed and implemented. As the majority of the early schemes for fault tolerance were focused on the utilization of only one way to tolerate faults. This paper presents an adaptive scheme that deals with the difficulty of fault tolerance in various cloud computing environments. The projected scheme employs adaptive behavior during the selection of replication and fine-grained checkpointing methods for attaining a reliable cloud platform that can handle different client requests. In addition to this the algorithm also determines the best suited fault tolerance method to every designated virtual machine. As the proposed scheme adapts fault tolerance methods it improves the performance of the cloud in terms of availability, throughput, cloud overheads due to huge number of check points and maintenance cost.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91147502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Securing Sensitive Digital Data Techniques 保护敏感的数字数据技术
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903055366
T. Karavasilev
This paper identifies the correct and wrong approaches of securing digital data. It also proposes further ways of increasing the overall security of data transfer and storage. The variety of data can be encrypted either for comparison only purposes or for further active reuse and update, which implies the need of having a different approach when processing the data flow. Several effective models and techniques of encrypting sensitive digital information are presented in this paper, that excludes all reviewed bad practices.
本文指出了保护数字数据的正确和错误方法。本文还提出了进一步提高数据传输和存储的整体安全性的方法。对各种数据进行加密,既可以仅用于比较,也可以用于进一步的主动重用和更新,这意味着在处理数据流时需要使用不同的方法。本文提出了几种有效的加密敏感数字信息的模型和技术,并排除了所有已评述的不良做法。
{"title":"Securing Sensitive Digital Data Techniques","authors":"T. Karavasilev","doi":"10.9790/0661-1903055366","DOIUrl":"https://doi.org/10.9790/0661-1903055366","url":null,"abstract":"This paper identifies the correct and wrong approaches of securing digital data. It also proposes further ways of increasing the overall security of data transfer and storage. The variety of data can be encrypted either for comparison only purposes or for further active reuse and update, which implies the need of having a different approach when processing the data flow. Several effective models and techniques of encrypting sensitive digital information are presented in this paper, that excludes all reviewed bad practices.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87815959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Glaucoma Detection Using Enhanced K-Strange Points Clustering Algorithm and Classification 基于增强k -奇异点聚类算法的青光眼检测与分类
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904014449
V. Kamat, Shruti Chatti, A. Rodrigues, Chinmayee Shetty, Anusaya Vadji
Glaucoma is an eye disorder that majorly affects the optic nerve head in the retina. The damage caused to optic disc leads to gradual loss of peripheral vision which may further result in complete blindness. Glaucoma cannot be cured, hence early and accurate detection is necessary. This paper proposes a method to detect Glaucoma using fundus images. Enhanced K-Strange Points Clustering (EKSTRAP) algorithm is applied to obtain cup, disc and the blood vessels from the Neuro-Retinal Rim (NRR). Further elliptical fitting method is used to compute cup to disc (CDR) ratio. The Inferior-Superior-Nasal-Temporal (ISNT) ratio is obtained using masking. CDR and ISNT are used as inputs to the Naïve Bayes classifier.
青光眼是一种眼部疾病,主要影响视网膜上的视神经头。视盘损伤导致周边视力逐渐丧失,进而可能导致完全失明。青光眼是无法治愈的,因此早期和准确的检测是必要的。提出了一种利用眼底图像检测青光眼的方法。采用增强k -奇异点聚类(EKSTRAP)算法从神经视网膜边缘(NRR)获取杯状、盘状和血管。进一步采用椭圆拟合方法计算杯盘比。下-上-鼻-颞(s)比是通过掩蔽得到的。CDR和isn被用作Naïve贝叶斯分类器的输入。
{"title":"Glaucoma Detection Using Enhanced K-Strange Points Clustering Algorithm and Classification","authors":"V. Kamat, Shruti Chatti, A. Rodrigues, Chinmayee Shetty, Anusaya Vadji","doi":"10.9790/0661-1904014449","DOIUrl":"https://doi.org/10.9790/0661-1904014449","url":null,"abstract":"Glaucoma is an eye disorder that majorly affects the optic nerve head in the retina. The damage caused to optic disc leads to gradual loss of peripheral vision which may further result in complete blindness. Glaucoma cannot be cured, hence early and accurate detection is necessary. This paper proposes a method to detect Glaucoma using fundus images. Enhanced K-Strange Points Clustering (EKSTRAP) algorithm is applied to obtain cup, disc and the blood vessels from the Neuro-Retinal Rim (NRR). Further elliptical fitting method is used to compute cup to disc (CDR) ratio. The Inferior-Superior-Nasal-Temporal (ISNT) ratio is obtained using masking. CDR and ISNT are used as inputs to the Naïve Bayes classifier.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78667858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Commerce (M-Commerce) Interface Design: A Review of Literature 移动商务(M-Commerce)界面设计:文献综述
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903046670
Z. Ahmad, Roslina Ibrahim
Advances in wireless technology have led to rapid growth on various mobile services. This includes changes of shopping activities by the online shopper. Previously, shoppers use in-store shopping or through web shopping sites which is electronic commerce (e-commerce). Nowadays, with the increased use of smartphones and mobile application, the popularity of mobile commerce (m-commerce) is increased among consumer. Due to growth of m-commerce, it is crucial to ensure the m-commerce applications are highly usable and friendly. Therefore, it is important to properly design the interface of the apps. This paper discusses several interface design principles that m-commerce apps must follow in order to be a good apps. This paper provide the literature review for design guidelines based on several researches from databases such as IEEE, Science Direct, and Google Scholar. There are seven elements of m-commerce interface design such as context, content, community, customization, communication, connection and commerce elements has been found in this review.
无线技术的进步导致了各种移动服务的快速增长。这包括在线购物者购物活动的变化。以前,购物者使用店内购物或通过网络购物网站,这是电子商务(电子商务)。如今,随着智能手机和移动应用程序的使用越来越多,移动商务(m-commerce)在消费者中的普及程度越来越高。由于移动商务的发展,确保移动商务应用程序的高可用性和友好性至关重要。因此,正确设计应用程序的界面是很重要的。本文讨论了移动商务应用程序必须遵循的几个界面设计原则,以便成为一个好的应用程序。本文基于IEEE、Science Direct、Google Scholar等数据库的相关研究,对设计指南进行了文献综述。本文总结了移动商务界面设计的语境、内容、社区、定制、沟通、连接、商务等七大要素。
{"title":"Mobile Commerce (M-Commerce) Interface Design: A Review of Literature","authors":"Z. Ahmad, Roslina Ibrahim","doi":"10.9790/0661-1903046670","DOIUrl":"https://doi.org/10.9790/0661-1903046670","url":null,"abstract":"Advances in wireless technology have led to rapid growth on various mobile services. This includes changes of shopping activities by the online shopper. Previously, shoppers use in-store shopping or through web shopping sites which is electronic commerce (e-commerce). Nowadays, with the increased use of smartphones and mobile application, the popularity of mobile commerce (m-commerce) is increased among consumer. Due to growth of m-commerce, it is crucial to ensure the m-commerce applications are highly usable and friendly. Therefore, it is important to properly design the interface of the apps. This paper discusses several interface design principles that m-commerce apps must follow in order to be a good apps. This paper provide the literature review for design guidelines based on several researches from databases such as IEEE, Science Direct, and Google Scholar. There are seven elements of m-commerce interface design such as context, content, community, customization, communication, connection and commerce elements has been found in this review.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80389608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Pairing High School Teachers with Historically Black College &University (HBCU) Computer Science Students to Teach Advanced Placement Computer Science Principles 将高中教师与传统黑人学院和大学(HBCU)的计算机科学学生配对,教授大学先修课程的计算机科学原理
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903060509
N. Harris, D. KinnisGoshaPh.
Reports have shown the lack of African Americans who take and pass the Advanced Placement (AP) Computer Science (CS) course. Many times, African American students are enrolled in schools that do not offer computer science courses like AP Computer Science. Interventions are needed nationally to provide African American students with equal opportunity to learn computer science. The goal of this research paper is design a study that will evaluate the effectiveness of a program to train high school teachers to teach Advance Placement Computer Science Principals using HBCU students majoring in computer science. Additionally, this program will be evaluated by its effectiveness to train teachers, its effect on the HBCU students who instruct the teachers and it feasibility to be scaled to HBCUs around the nation.
报告显示,很少有非裔美国人参加并通过大学预修课程(AP)计算机科学(CS)课程。很多时候,非裔美国学生就读的学校不提供像AP计算机科学这样的计算机科学课程。需要在全国范围内采取干预措施,为非裔美国学生提供学习计算机科学的平等机会。本研究论文的目的是设计一项研究,以评估一项计划的有效性,该计划旨在培训高中教师使用HBCU计算机科学专业的学生教授预修计算机科学校长。此外,还将评估该项目对教师的培训效果、对指导教师的HBCU学生的影响以及在全国HBCU推广的可行性。
{"title":"Pairing High School Teachers with Historically Black College &University (HBCU) Computer Science Students to Teach Advanced Placement Computer Science Principles","authors":"N. Harris, D. KinnisGoshaPh.","doi":"10.9790/0661-1903060509","DOIUrl":"https://doi.org/10.9790/0661-1903060509","url":null,"abstract":"Reports have shown the lack of African Americans who take and pass the Advanced Placement (AP) Computer Science (CS) course. Many times, African American students are enrolled in schools that do not offer computer science courses like AP Computer Science. Interventions are needed nationally to provide African American students with equal opportunity to learn computer science. The goal of this research paper is design a study that will evaluate the effectiveness of a program to train high school teachers to teach Advance Placement Computer Science Principals using HBCU students majoring in computer science. Additionally, this program will be evaluated by its effectiveness to train teachers, its effect on the HBCU students who instruct the teachers and it feasibility to be scaled to HBCUs around the nation.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89616165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IOSR journal of computer engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1