3164 Slices
  Title Author Publisher Format Buy Remix
Medium 9781601322432

Session - Teaching Methods + Teaching Support Systems and Tools + Case Studies

Hamid R. Arabnia, Azita Bahrami, Victor A. Clincy, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF
Medium 9781601322432

Implementing Strategies To Improve A Video Game Programming Course

Hamid R. Arabnia, Azita Bahrami, Victor A. Clincy, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Frontiers in Education: CS and CE | FECS'13 |

429

Implementing Strategies To Improve A Video Game Programming Course

Antonio Javier Cavazos Mejorado

ITESM – Monterrey Campus, México

Summary

This paper shows the interest on the students to develop videogames in object-oriented programming and the way they were motivated.

The results were obtained through the use of strategies developed during different semesters in a videogame class.

The improvements made to have a better course evaluation indicator during five years.

This specific course is a project to develop a computer application using different concepts in mathematics, programming and physics of the three previous semesters in which the subject is taught.

This is a difficult course because the students must integrate their previous knowledge and they require individual and team preparation and several tools to collaborate effectively.

The purpose of this paper is to show how the students can be motivated to program when the project is a videogame and others recognize their work out of the classroom.

See All Chapters
Medium 9781601322609

Why To Research in Knowledge Management in Software Engineering Processes?

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Vince Schmidt, Ashu M.G. Solo, Fernando G. Tinetti CSREA Press PDF

108

Int'l Conf. Software Eng. Research and Practice | SERP'13 |

Why To Research in Knowledge Management in Software

Engineering Processes?

E.A. Galvis-Lista1, J. M. Sánchez-Torres2

Facultad de Ingeniería, Universidad del Magdalena, Santa Marta, Colombia.

Doctoral Student, Universidad Nacional de Colombia, Bogotá Colombia

2

Facultad de Ingeniería, Universidad Nacional de Colombia, Bogotá, Colombia

1

Abstract – Knowledge Management is a young discipline that nowadays it is important for software development organizations (SDO). For this reason, this paper presents a review about the form knowledge management has been included in several Software Process Reference Models. For this study, five software process reference models, broadly used in Latin-American countries, were analyzed. The findings of this study show that in all models there are elements of knowledge management processes, and there are two models with a process area named Knowledge Management.

Nevertheless, the knowledge management aspects included in these models is grounded in statements from Earl’s systems and engineering schools. Likewise, in terms of Gold’s knowledge management capabilities, the technology, knowledge acquisition and knowledge conversion capabilities are broadly covered but elements for others capabilities are not included in these reference models.

See All Chapters
Medium 9781601322456

Validation of an attributes selection system through genetic algorithms for ICU on severely burnt patients (AG-PxQ) according to its usability on the clinic

Hamid R. Arabnia, Ray R. Hashemi, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

GEM is an international conference that serves researchers,
scholars, professionals, students, and academicians who are looking to both
foster working relationships and gain access to the latest research results. It
is being held jointly (same location and dates) with a number of other research
conferences; namely, The 2013 World Congress in Computer Science, Computer
Engineering, and Applied Computing (WORLDCOMP). The Congress is the largest
annual gathering of researchers in computer science, computer engineering and
applied computing. We anticipate to have 2,100 or more attendees from over 85
countries.

See All Chapters
Medium 9788131805374

Ch_14

Hari Mohan Pandey Laxmi Publications PDF

14

I NTRODUCTION TO

‘C’ PREPROCESSOR

T

his is the chapter which deals with C preprocessor is so depth which I think no book has ever dealt. Of course some compiler related macros have not been covered but I’m sure whatever I have covered is the best matter on C preprocessor you will get any where.

To start with, introduction of preprocessing given with a table of all preprocessor directives. A number of programming examples then given which makes use of some of the preprocessor directives. The difference between #include“filename” and #include< filename>is illustrated.

The notion of condition compilation is explained and various preprocessor directives used for the same are discussed.

Some special preprocessor directives like ___DATE___, ___FILE___ etc. have been explained. A brief introduction of the #pragma directive (used by the expert programmers) is given. Program to call a function first other than main is given with the help of this macro.

Difference between functions and macros are covered in the last section in an illustrative manner.

See All Chapters
Medium 9781601323279

Privacy-Preserving Protocol for Reduced Cancer Risk on Daily Physical Activity

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

246

Int'l Conf. Security and Management | SAM'14 |

Privacy-Preserving Protocol for Reduced Cancer

Risk on Daily Physical Activity

Hiroaki Kikuchi

School of Interdisciplinary

Mathematical Sciences,

Meiji University

4-21-1 Nakano, Nakano Ku,

Tokyo, 164-8525

Shigeta Ikuji

Cyber Communications Inc.

2-14-1, Higashi-shimbashi,

Minato-ku, Tokyo, Japan

Manami Inoue

National Cancer Center,

5-1-1 Tsukiji, Chuo-ku,

Tokyo 104-0045, Japan

s.ikuji@cci.co.jp

mnminoue@gan2.res.ncc.go.jp

kikn@meiji.ac.jp

Abstract—In a field of medical information, an integration of multiple data sets will lead more accurate and effective results in comparison to the research using one data set. Medical information integration has a risk of disclosure of confidential information and hence datasets don’t have the common identification information in order to reduce possible risk factor to determine the identity of an individual.

In this paper, we will examine the condition of privacypreserving data mining for the actual cohort, studied in the

National Cancer Center. We study the necessary condition for data sets without common identification information to be integrated and generating more accurate and effective results.

See All Chapters
Medium 9781601322593

Towards An Efficient Protocol for Privacy and Authentication in Wireless Networks

Kevin Daimi, Hamid R. Arabnia, Michael R. Grimaila, Kathy Liszka, George Markowsky, and Ashu, M. G. Solo CSREA Press PDF

Int'l Conf. Security and Management | SAM'13 |

191

Towards An Efficient Protocol for Privacy and

Authentication in Wireless Networks

Clifton Mulkey, Dulal Kar, and Ajay Katangur

Texas A&M University-Corpus Christi

6300 Ocean Dr, Corpus Christi, TX 78412, USA

Email: dulal.kar@tamucc.edu

Abstract—We envision a scenario for security of wireless networks that include and integrate nodes of all different capabilities, including tiny sensors or similarly battery-powered, resourceconstrained tiny nodes. However, the existing Wireless Protected

Access (WPA) protocol may not be suitable for such resourceconstrained, low-end nodes as the protocol could be too demanding since its existing authentication and privacy mechanisms can cause many inconveniences due their complexity in computation and key management. In this work, we propose an efficient protocol for authentication and privacy in wireless networks using identity-based encryption(IBE) techniques. Specifically, we propose an enhanced or extended version of the WPA protocol by incorporating IBE based authentication methods in the existing

See All Chapters
Medium 9789383828562

Unit-VI

Dr K.Sivarajan; Dr C.N.Balakrishnan Nambiar Laxmi Publications PDF

Logical Reasoning

343

Unit - VI

LOGICAL REASONING

1. STRUCTURE OF ARGUMENTS

Forcefulness of Arguments

The term ‘argument’ is fairly well-known to need any special discussion. It stands for an accepted mode of arguing for the validity of a stand which one is taking in respect of a problem area about which different opinions are held by different people.

An argument could be effective (carries conviction to most) or ineffective depending upon the force of the logic used in support of the argument and the communication techniques used for the purpose.

We can identify the basic criteria used for judging the appropriateness of an argument. An ‘argument’ can either be strong or weak. There is no fixed rule for reaching the solution; what is possible in a situation you can evolve a few dependable guidelines to help you in locating the ‘strength of an argument’.

The following guidelines can be used as the basis for taking decisions about the degree of conviction an argument carries (strength):

Guideline I: Before an in depth analysis, test the argument for the following: i.

See All Chapters
Medium 9781601322616

Personal Ontology–based Sentiment Analysis System for Mobile Devices

Hamid R. Arabnia; Leonidas Deligiannidis; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Int'l Conf. Semantic Web and Web Services | SWWS'13 |

45

Personal Ontology–based Sentiment Analysis System for

Mobile Devices

Sang-Min Park1, Doo-Kwon Baik1

Dept. of Computer and Radio Communications Engineering, Korea University, Seoul, Republic of Korea wiyard@korea.ac.kr, baikdk@korea.ac.kr

1

Abstract—The increasing proliferation of mobile devices has resulted in people being able to express their opinions and sentiments more easily. To obtain people’s preferences and evaluations about products and services, sentiments expressed over Websites and social network services need to be analyzed. However, due to the diversity of the media and the short lengths of messages, the sentiment data is fragmented and distributed. Nowadays, products are equipped with numerous functions, so product features are diverse and complex. In order to solve the sentiment data fragmentation problem and the complexity of the feature, we propose an ontology-based sentiment analysis system for mobile devices.

Keywords: Ontology, Sentiment analysis, Mobile device

See All Chapters
Medium 9781601322395

A Novel Randomized Feature Selection Algorithm

Robert Stahlbock, Gary M. Weiss, Mahmoud Abou-Nasr, and Hamid R. Arabnia CSREA Press PDF

Int'l Conf. Data Mining | DMIN'13 |

231

A Novel Randomized Feature Selection Algorithm

Subrata Saha1 , Rampi Ramprasad2 , and Sanguthevar Rajasekaran1∗

1 Department of Computer Science and Engineering

2 Department of Materials Science and Engineering

University of Connecticut, Storrs

(∗ Corresponding author)

Email: {subrata.saha, rampi, rajasek}@engr.uconn.edu

Abstract— Feature selection is the problem of identifying a subset of the most relevant features in the context of model construction. This problem has been well studied and plays a vital role in machine learning. In this paper we present a novel randomized algorithm for feature selection.

It is generic in nature and can be applied for any learning algorithm. This algorithm can be thought of as a random walk in the space of all possible subsets of the features.

We demonstrate the generality of our approach using three different applications.

Keywords: Feature Selection (FS), Machine Learning, Data Integration (DI), Gene Selection Algorithm (GSA), Kernel Ridge

See All Chapters
Medium 9781601323613

SESSION Late Breaking Papers

Hamid Arabnia, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Grid, Cloud, & Cluster Computing | GCC'16 |

59

SESSION

LATE BREAKING PAPERS

Chair(s)

TBA

ISBN: 1-60132-436-7, CSREA Press ©

60

Int'l Conf. Grid, Cloud, & Cluster Computing | GCC'16 |

ISBN: 1-60132-436-7, CSREA Press ©

Int'l Conf. Grid, Cloud, & Cluster Computing | GCC'16 |

61

Extending the Performance Evaluation Framework for

Auto-Scaling (PEAS)

Kester Leochico and Eugene John

Department of Electrical and Computer Engineering, The University of Texas at San Antonio, San Antonio,

TX, United States of America

Abstract – The Performance Evaluation framework for AutoScaling (PEAS) is a framework in which cloud auto-scalers are analyzed in terms of a chance constrained optimization problem that is solved using scenario theory, providing probabilistic guarantees on the obtainable performance of a given auto-scaling algorithm. This represents a major improvement over previous ad-hoc approaches to evaluating auto-scalers by providing a uniform set of metrics and evaluation protocol. This paper represents a first step towards extending the PEAS framework by introducing additional performance metrics from the time series forecasting community as a proof-of-concept of the flexibility of the framework and the reproducibility of the framework’s results.

See All Chapters
Medium 9781601323101

Multicore Construction of k-d Trees for High Dimensional Point Data

Hamid R. Arabnia, Mary Q. Yang, George Jandieri, James J. (Jong Hyuk) Park, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

10

Int'l Conf. on Advances in Big Data Analytics | ABDA'14 |

Multicore Construction of k-d Trees for High Dimensional Point Data

Victor Lu1 and John C. Hart2

1

2

HERE, a Nokia business unit

University of Illinois at Urbana-Champaign

Abstract

This paper presents the first parallelization of FLANN’s k-d tree for approximate nearest neighbor finding of high dimensional data. We propose a simple node-parallel strategy that acheives surprisingly scalable speedups on a range of inputs and hardware platforms. When combined with speedups from SIMD vectorization, our approach can achieve up to 91x total speedup over the existing FLANN implementation on a 32-core machine.

1. Introduction

The prevalence of digital cameras and Internet image hosting services, such as flickr, has created an explosion of online digital imagery, and with it many exciting new ways to utilize these large image databases. For example, 3-D reconstructions of the city of Rome have been built by finding and registering matching elements in the hundreds of thousands of photos on flickr tagged with the keyword “rome”

See All Chapters
Medium 9781601322401

Design of Structured Syllabus and Subject Ontology for Adaptive Learning

Hamid R. Arabnia, Azita Bahrami, Fernando G. Tinetti, Leonidas Deligiannidis, George Jandieri, and Ashu M. G. Solo CSREA Press PDF

24

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'13 |

Design of Structured Syllabus and Subject Ontology for

Adaptive Learning

Hyun-Sook Chung1, Jung-Min Kim2, and Eun-Ok Baek2

Department of Computer Engineering, Chosun University, Gwangju, South Korea

2

Department of Computer Engineering, Daejin University, Pocheon, South Korea

3

Science, Math & Technology Education, CSU San Bernardino, San Bernardino, CA, USA

1

Abstract - In this paper, we introduce our e-learning project that aims to make of creation, integration and interfacing of multiple ontologies on different layers, i.e. Curriculum ontology, Syllabus ontology, and Subject ontology. The primary objective of our project is to develop ontology-based e-learning support system which allows learners to build adaptive learning paths through understanding curriculum, syllabuses, and subjects of courses deeply. In this paper, we introduce our ontology model and propose an effective method for enhancing learning effect of students through construction of subject ontology. The subject ontology of a certain course is composed of an ontology made by a teacher and many ontologies made by students. It is used in discussion, visual presentation, and knowledge sharing between instructor and students. We used the subject ontology in two lectures in practice and found that the subject ontology enhances learning effect of students in according to the analysis of feedbacks of students.

See All Chapters
Medium 9781601323248

Image Segmentation Techniques Applied to Point Clouds of Dental Models with an Improvement in Semi-Automatic Teeth Segmentation

Hamid R. Arabnia, Leonidas Deligiannidis Joan Lu, Fernando G. Tinetti, Jane You, George Jandieri, Gerald Schaefer, and Ashu M.G. Solo CSREA Press PDF

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'14 |

63

Image Segmentation Techniques Applied to Point Clouds of Dental Models with an Improvement in SemiAutomatic Teeth Segmentation

Tamayo-Quintero, J. D.1, Arboleda-Duque, S.1,2 and Gómez-Mendoza, J.B. 1

1

Department of Electric, Electronic and Computer Engineering, Universidad Nacional de Colombia, Manizales, Caldas,

Colombia

2

Department of Telecommunication Engineering, Universidad Catolica de Manizales, Manizales, Caldas, Colombia

Abstract - This paper presents an exploratory study on the application of a combination of different segmentation techniques to point clouds of dental models. The techniques are based in geometric primitives (e.g. RANSAC), region growing segmentation and graph theory (particularly the

"Min-Cut" algorithm), and were tested using dental 3D point clouds. Data were acquired using a Konica Minolta Vivid 9i laser range scanner.

Also, a semi-automatic segmentation methodology is presented. Results of teeth segmentation using testing data suggest that it is possible to automatically segment teeth from digital 3D models.

See All Chapters
Medium 9781601322616

Session - Ontologies

Hamid R. Arabnia; Leonidas Deligiannidis; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Load more