3144 Slices
Medium 9781601322388

Classical Dynamic Ising Model

Hamid R. Arabnia, George A. Gravvanis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

74

Int'l Conf. Scientific Computing | CSC'13 |

Classical Dynamic Ising Model

M. George1, C. Turquois2, and F. Yepiz, Jr.3

1

Department of Physics, Southwestern College, Chula Vista, Ca., U.S.A.

2

Department of Cognitive Science, University of California San Diego, La Jolla, Ca., U.S.A.

3

1344 Theresa Way, Chula Vista, Ca., 91911, U.S.A.

Abstract – We discuss the dynamics of the Ising model as a computational mesoscopic system. The simplicity of the Ising model allows a Hamiltonian dynamics to be developed from renormalization group theory considerations for the model which is not overly complicated and preserves a close connection with thermodynamics. At the same time, the additional structure gives the potential for application to neural networks, as a new fundamental model for networks.

This extends the Ising model to a deterministic system, of potential interest for computations.

Keywords: Ising model, Hamiltonian dynamics, mesoscopic systems, renormalization group theory.

1

Introduction

Interest in developing models for mesoscopic systems has increased in recent times, as technological and scientific developments have led to small macroscopic-scale processes impinging on the microscopic scale, dominated by quantum processes. This interest is seen no more acutely than in biophysics and biochemistry, where organic systems can come very close to scales at which quantum mechanics must be used. We are introducing the dynamic model discussed in this article, in this context, as a model of relevance to mesoscopic systems and to small biosystems.

See All Chapters
Medium 9781601323200

Session - The International Workshop on Intelligent Linguistic Technologies 2014, Ilintec'14

CSREA 2003 CSREA Press PDF
Medium 9781601322432

A Heuristic Approach for Student-Outcomes Assessment Using Bloom’s Taxonomy

Hamid R. Arabnia, Azita Bahrami, Victor A. Clincy, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

42

Int'l Conf. Frontiers in Education: CS and CE | FECS'13 |

A Heuristic Approach for Student-Outcomes

Assessment Using Bloom’s Taxonomy

Iraj Danesh

Department of Mathematics and Computer Science

College of Science, Mathematics and Technology

Alabama State University, Montgomery, Alabama, USA

Abstract - Assessment techniques constitute parts of program accreditation processes and are of enduring interest to all educators, including computer science educators. A repeating Heuristic Student-OutcomeLevel Cycle (SOL- Cycle) that includes student outcome assessment according to Bloom’s

Taxonomy, coupled with an enriching Course-Level cycle is introduced. Graphical analysis of selected topics as well as excerpts of student outcomes mapped with their performance indicators and related courses are discussed.

Keywords: Assessment, ABET, indicators, rubric, outcomes, excerpt, taxonomy

General Terms: Student outcomes, performance indicators, technology in assessment, mapping and alignment

1.

Introduction

The ABET [1] and other accrediting agencies such as SACS, NCACS, WASC grant status of public recognition to the program that meets the agency’s standards, criteria, and requirements.

See All Chapters
Medium 9781601323149

New Windows Rootkit Technologies for Enhancing Digital Rights Management in Cloud Computing Environments

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'14 |

139

New Windows Rootkit Technologies for Enhancing Digital

Rights Management in Cloud Computing Environments

Woei-Jiunn Tsaur and Jia-Xin Wu

Department of Information Management, Da-Yeh University, Taiwan

Abstract - With the increasing development of cloud computing technologies, digital contents such as music, movies, games, cartoon, and so on get more and more popular for entertainment, and therefore how to control and manage rights of digital contents has been becoming very critical in cloud computing environments. Sony-BMG used a rootkit to conceal the digital rights management (DRM) software, which is aptly installed in consumers’ computers to prevent unauthorized copying. In order to prevent unauthorized users from deleting the DRM software by employing anti-rootkit tools to remove the rootkit, we develop a new Windows driver-hidden rootkit to enhance DRM in cloud computing environments. The proposed Windows driver-hidden rootkit has verified that it can successfully avoid detection of a variety of well-known anti-rootkit tools in cloud computing environments. Our contributions are mainly twofold. Firstly, in cloud computing environments we can use the proposed new rootkit technology to reinforce the

See All Chapters
Medium 9781601323705

SESSION Software Architectures: Including HCI, Enterprise Systems, Service Oriented Archtectures and Web-Based Applications

Hamid Arabnia, Leonidas DeligiannidisFernando G. Tinetti CSREA Press PDF

Int'l Conf. Software Eng. Research and Practice | SERP'16 |

SESSION

SOFTWARE ARCHITECTURES: INCLUDING HCI,

ENTERPRISE SYSTEMS, SERVICE ORIENTED

ARCHITECTURES, WEB-BASED APPLICATIONS

Chair(s)

TBA

ISBN: 1-60132-446-4, CSREA Press ©

123

124

Int'l Conf. Software Eng. Research and Practice | SERP'16 |

ISBN: 1-60132-446-4, CSREA Press ©

Int'l Conf. Software Eng. Research and Practice | SERP'16 |

125

A systematic approach to evaluate enterprise ontologies using testing techniques of software usability

Alessandro Viola Pizzoleto1 , and Hilda Carvalho de Oliveira2

1 Department of Computer Science Federal University of São Carlos - UFSCar São Carlos, SP, Brazil

2 Dep. of Statistics, Applied Mathematics and Computer Science

Univ Estadual Paulista - UNESP Rio Claro, SP, Brazil alessandropizzoleto@gmail.com, hildarc@unesp.br

Abstract— this paper introduces a systematic for evaluating the enterprise ontologies using software usability testing techniques. The objective is to support developers of enterprise ontologies to verify if the ontology that has been developed is easy and simple to use and navigate as well as if it eases the content addressed understanding. Inconsistencies in the content can also found. The systematic adapts software usability testing techniques with the users’ participation in an organized and objective way. A case study is presented for the evaluation of an enterprise ontology considering the processes of the software quality model MPS-SW. The results contributed for improvements in the ontology, because it was possible to correct inconsistencies and problems in the organization and relationships of the content.

See All Chapters

See All Slices