917,209 research outputs found

    Information Technology of Software Architecture Structural Synthesis of Information System

    Get PDF
    Information technology of information system software architecture structural synthesis is proposed. It is used for evolutionary models of the software lifecycle, which provides configuration and formation of software to control the realization and recovery of computing processes in parallel and distributed computing resources structures. The technology is applied in the framework of the software requirements analysis, design of architecture, design and integration of software. Method of combining vertices for multilevel graph model of software architecture and automata-based method of checking performance limitations to software are based on the advanced graph model of software architecture. These methods are proposed in the framework of information technology and allow forming a rational structure of the program, as well as checking for compliance with the functional and non-functional requirements of the end user.The essence of proposed information technology is in displaying of the customer's requirements in the current version of the graph model of program complex structure and providing a reconfiguration of the system modules. This process is based on the analysis and processing of the graph model, software module specifications, formation of software structure in accordance with the graph model, software verification and its compilation

    Editorial for Vol.27, No.3

    Get PDF
    The five papers comprising the September 2019 (Vol. 27, No. 3) issue of CIT. Journal of Computing and Information Technology cover the areas of applied graph theory, time series, data mining, software engineering and applied computing

    Interview with Robert Van Spyk

    Get PDF
    Interview with Robert Van Spyk, Professor Emeritus, Telecommunications, Multimedia and Applied Computing, Science, Technology and Information Resources Centerhttps://digitalcommons.csumb.edu/oralhist_founding-faculty/1025/thumbnail.jp

    CLOUD TECHNOLOGIES IN ISLAMIC EDUCATION INSTITUTIONS

    Get PDF
    Information and Communication Technology is making use of ICT tools to store and retrieves information. It plays an important role in growing and maintaining a country’s economic growth. One of the latest technologies prevailing nowadays is cloud computing. By sharing IT services as platform-based, software-based, and infrastructure-based in the cloud, educational institutions in Uzbekistan can now out-source non-core services and better concentrate on offering students, teachers, faculty and other staff the essential tools to help them succeed. This paper looks at how Cloud Computing can be applied in the study of ICT and focuses on the role of cloud computing in the study of ICT in the Uzbek educational system. It also looks at how one can provide quality and affordable ICT education by using cloud-computing technology. A study of the previous system without cloud computing technology was considered and a new model of teaching ICT with the help of cloud computing technology has been proposed. An extensive review and analysis of the existing literature and models were considered and a new model was designed and piloted

    Quality assessment technique for ubiquitous software and middleware

    Get PDF
    The new paradigm of computing or information systems is ubiquitous computing systems. The technology-oriented issues of ubiquitous computing systems have made researchers pay much attention to the feasibility study of the technologies rather than building quality assurance indices or guidelines. In this context, measuring quality is the key to developing high-quality ubiquitous computing products. For this reason, various quality models have been defined, adopted and enhanced over the years, for example, the need for one recognised standard quality model (ISO/IEC 9126) is the result of a consensus for a software quality model on three levels: characteristics, sub-characteristics, and metrics. However, it is very much unlikely that this scheme will be directly applicable to ubiquitous computing environments which are considerably different to conventional software, trailing a big concern which is being given to reformulate existing methods, and especially to elaborate new assessment techniques for ubiquitous computing environments. This paper selects appropriate quality characteristics for the ubiquitous computing environment, which can be used as the quality target for both ubiquitous computing product evaluation processes ad development processes. Further, each of the quality characteristics has been expanded with evaluation questions and metrics, in some cases with measures. In addition, this quality model has been applied to the industrial setting of the ubiquitous computing environment. These have revealed that while the approach was sound, there are some parts to be more developed in the future

    Persuasive technology for improving information security awareness and behavior: literature review

    Get PDF
    The use of Persuasive Technology in various fields is rapidly increasing. It can be applied in many fields such as computing, marketing, sales, environment, education, and health. Persuasive Technology has been found effective in bringing a required change in users' behaviors and attitudes. However, the use of persuasive technology is scarce in the field of Information Security awareness. This paper reviews extensive literature review which focuses on a perspective on how to create awareness among users for good information security practices by applying Persuasive Technology techniques and approaches. The conceptual findings suggest there is a tremendous potential of Persuasive Technology to be applied to persuade users to change their behavior and perception toward Information Security practices

    Communication Theoretic Data Analytics

    Full text link
    Widespread use of the Internet and social networks invokes the generation of big data, which is proving to be useful in a number of applications. To deal with explosively growing amounts of data, data analytics has emerged as a critical technology related to computing, signal processing, and information networking. In this paper, a formalism is considered in which data is modeled as a generalized social network and communication theory and information theory are thereby extended to data analytics. First, the creation of an equalizer to optimize information transfer between two data variables is considered, and financial data is used to demonstrate the advantages. Then, an information coupling approach based on information geometry is applied for dimensionality reduction, with a pattern recognition example to illustrate the effectiveness. These initial trials suggest the potential of communication theoretic data analytics for a wide range of applications.Comment: Published in IEEE Journal on Selected Areas in Communications, Jan. 201
    corecore