52 research outputs found

    Pembuatan Aplikasi Android Tuntunan Qasidah Pilihan Habib Syech Bin Abdul Qadir Assegaf

    Full text link
    Sholawat is lafadz of the word prayer, derived from Arabic which means prayer, while understanding bersholawat the Prophet is acknowledged apostolic and ask God gave birth to virtue and glory, with the birth of Muhammad brought religion above all other religions and childbirth glory upon glory nabi2 others by reading the prayer-prayer sholawat that later we will get dai intercession of the Prophet.Since the presence of the town solo habib Sych lately Yogyakarta and surrounding areas sholawat become popular again, he was often held together sholawat activities both in the field and in the mosque but most people only read sholawat time when Muslims pray, and when to follow the activities sholawat akbar course sholawat but can be read at any time when the field.We make android application guidance based guidebook sholawat sholawat habib Sych expected to help remind reading sholawat only to capitalize smartphone or tablet pc that can be taken anywhere and also with the audio features that make it easier to memorize passages sholawat

    Supporting Automatic Interoperability in Model-Driven Development Processes

    Full text link
    By analyzing the last years of software development evolution, it is possible to observe that the involved technologies are increasingly focused on the definition of models for the specification of the intended software products. This model-centric development schema is the main ingredient for the Model-Driven Development (MDD) paradigm. In general terms, the MDD approaches propose the automatic generation of software products by means of the transformation of the defined models into the final program code. This transformation process is also known as model compilation process. Thus, MDD is oriented to reduce (or even eliminate) the hand-made programming, which is an error-prone and time-consuming task. Hence, models become the main actors of the MDD processes: the models are the new programming code. In this context, the interoperability can be considered a natural trend for the future of model-driven technologies, where different modeling approaches, tools, and standards can be integrated and coordinated to reduce the implementation and learning time of MDD solutions as well as to improve the quality of the final software products. However, there is a lack of approaches that provide a suitable solution to support the interoperability in MDD processes. Moreover, the proposals that define an interoperability framework for MDD processes are still in a theoretical space and are not aligned with current standards, interoperability approaches, and technologies. Thus, the main objective of this doctoral thesis is to develop an approach to achieve the interoperability in MDD processes. This interoperability approach is based on current metamodeling standards, modeling language customization mechanisms, and model-to-model transformation technologies. To achieve this objective, novel approaches have been defined to improve the integration of modeling languages, to obtain a suitable interchange of modeling information, and to perform automatic interoperability verification.Giachetti Herrera, GA. (2011). Supporting Automatic Interoperability in Model-Driven Development Processes [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/11108Palanci

    Protocol for a Systematic Literature Review on Design Decisions for UML-based DSMLs

    Get PDF
    Series: Technical Reports / Institute for Information Systems and New Medi

    A Framework for Constraint-Programming based Configuration

    Get PDF

    A web application user interface specification language based on statecharts

    Get PDF
    The Internet today has a phenomenal reach---right into the homes of a vast audience worldwide. Some organisations (and individuals) see this medium as a good opportunity for extending the reach of their computer systems. One popular approach used for such endeavours is to run an application on a server, using web technology for displaying its user interface (UI) remotely. Developing such a web-based UI can be quite tedious---it is a concurrent, distributed program which has to run in a hostile environment. Furthermore, the platform on which it is implemented (the web) was not originally intended for such usage. A web framework is a collection of software components which provides its users with support for developing and executing web-based UIs. In part, web frameworks can be seen as being analogous to interpreters: given a specification of a UI using a specification technique dictated by the framework, server components of the framework can present the UI using web technology. Topics related to web frameworks are scarce in the academic literature, but abound in industry and open discussion forums. Similarly, the designers of web frameworks seldom found their work on existing theory in the literature. This study is an attempt to bridge this gap. It is focused on two aspects of web frameworks: the specification technique a framework mandates, and how such a specification can subsequently be used to present a UI via web technology. As part of this study, a survey was conducted of 80 open source web frameworks. Based on the survey, a partial overview of the domain of web frameworks is given, covering what is seen as being typically required of a web framework and covering specification techniques that are used by existing frameworks. Two taxonomies are proposed of the strategies web frameworks use for specifying two aspects of web UIs. Using the web as platform implies adherence to certain (intended) architectural constraints. Web framework designers often strain against these constraints. However, another point of view is to recognise that the success of the web platform is made possible precisely because of its intended architecture. (And the success of the web is surely the principal motivation for using it for remote UIs in the first place.) With the bias of this viewpoint, a specification technique is proposed for web-based UIs. This technique is based on the well-known formalism of statecharts, with semantics explicitly defined in terms of the intended architectural components and constraints of the web. The design of a web framework for presenting a UI so specified is also proposed (based on the theoretical background given, as well as two prototype implementations which have been developed).Dissertation (MSc)--University of Pretoria, 2007.Computer Scienceunrestricte

    Self-adaptive Authorisation Infrastructures

    Get PDF
    Traditional approaches in access control rely on immutable criteria in which to decide and award access. These approaches are limited, notably when handling changes in an organisation’s protected resources, resulting in the inability to accommodate the dynamic aspects of risk at runtime. An example of such risk is a user abusing their privileged access to perform insider attacks. This thesis proposes self-adaptive authorisation, an approach that enables dynamic access control. A framework for developing self-adaptive authorisation is defined, where autonomic controllers are deployed within legacy based authorisation infrastructures to enable the runtime management of access control. Essential to the approach is the use of models and model driven engineering (MDE). Models enable a controller to abstract from the authorisation infrastructure it seeks to control, reason about state, and provide assurances over change to access. For example, a modelled state of access may represent an active access control policy. Given the diverse nature in implementations of authorisation infrastructures, MDE enables the creation and transformation of such models, whereby assets (e.g., policies) can be automatically generated and deployed at runtime. A prototype of the framework was developed, whereby management of access control is focused on the mitigation of abuse of access rights. The prototype implements a feedback loop to monitor an authorisation infrastructure in terms of modelling the state of access control and user behaviour, analyse potential solutions for handling malicious behaviour, and act upon the infrastructure to control future access control decisions. The framework was evaluated against mitigation of simulated insider attacks, involving the abuse of access rights governed by access control methodologies. In addition, to investigate the framework’s approach in a diverse and unpredictable environment, a live experiment was conducted. This evaluated the mitigation of abuse performed by real users as well as demonstrating the consequence of self-adaptation through observation of user response

    Modelling grid architecture.

    Get PDF
    This thesis evaluates software engineering methods, especially event modelling of distributed systems architecture, by applying them to specific data-grid projects. Other methods evaluated include requirements' analysis, formal architectural definition and discrete event simulation. A novel technique for matching architectural styles to requirements is introduced. Data-grids are a new class of networked information systems arising from e-science, itself an emergent method for computer-based collaborative research in the physical sciences. The tools used in general grid systems, which federate distributed resources, are reviewed, showing that they do not clearly guide architecture. The data-grid projects, which join heterogeneous data stores specifically, put required qualities at risk. Such risk of failure is mitigated in the EGSO and AstroGrid solar physics data-grid projects' designs by modelling. Design errors are trapped by rapidly encoding and evaluating informal concepts, architecture, component interaction and objects. The success of software engineering modelling techniques depends on the models' accuracy, ability to demonstrate the required properties, and clarity (so project managers and developers can act on findings). The novel formal event modelling language chosen, FSP, meets these criteria at the diverse early lifecycle stages (unlike some techniques trialled). Models permit very early testing, finding hidden complexity, gaps in designed protocols and risks of unreliability. However, simulation is shown to be more suitable for evaluating qualities like scalability, which emerge when there are many component instances. Design patterns (which may be reused in other data-grids to resolve commonly encountered challenges) are exposed in these models. A method for generating useful models rapidly, introducing the strength of iterative lifecycles to sequential projects, also arises. Despite reported resistance to innovation in industry, the software engineering techniques demonstrated may benefit commercial information systems too

    Computational Conflict Research

    Get PDF
    This open access book brings together a set of original studies that use cutting-edge computational methods to investigate conflict at various geographic scales and degrees of intensity and violence. Methodologically, this book covers a variety of computational approaches from text mining and machine learning to agent-based modelling and social network analysis. Empirical cases range from migration policy framing in North America and street protests in Iran to violence against civilians in Congo and food riots world-wide. Supplementary materials in the book include a comprehensive list of the datasets on conflict and dissent, as well as resources to online repositories where the annotated code and data of individual chapters can be found and where (agent-based) models can be re-produced and altered. These materials are a valuable resource for those wishing to retrace and learn from the analyses described in this volume and adapt and apply them to their own research interests. By bringing together novel research through an international team of scholars from a range of disciplines, Computational Conflict Research pioneers and maps this emerging field. The book will appeal to students, scholars, and anyone interested in the prospects of using computational social sciences to advance our understanding of conflict dynamics

    Distributed adaptive e-assessment in a higher education environment

    Get PDF
    The rapid growth of Information Communication Technology (ICT) has promoted the development of paperless assessment. Most of the e-Assessment systems available nowadays, whether as an independent system or as a built-in module of a Virtual Learning Environment (VLE), are fixed-form e-Assessment systems based on the Classical Test Theory (CTT). In the meantime, the development of psychometrics has also proven the potential for e-Assessment systems to benefit from adaptive assessment theories. This research focuses on the applicability of adaptive e-Assessment in daily teaching and attempts to create an extensible web-based framework to accommodate different adaptive assessment strategies for future research. Real-data simulation and Monte Carlo simulation were adopted in the study to examine the performance of adaptive e-Assessment in a real environment and an ideal environment respectively. The proposed framework employs a management service as the core module which manages the connection from distributed test services to coordinate the assessment. The results of this study indicate that adaptive e-Assessment can reduce test length compared to fixed-form e-Assessment, while maintaining the consistency of the psychometric properties of the test. However, for a precise ability measurement, even a simple adaptive assessment model would demand a sizable question bank with ideally over 200 questions on a single latent trait. The requirements of the two categories of stakeholders (pedagogical researchers and educational application developers), as well as the variety and complexity of adaptive models, call for a framework with good accessibility for users, considerable extensibility and flexibility for implementing different assessment models, and the ability to deliver excessive computational power in extreme cases. The designed framework employs a distributed architecture with cross-language support based on the Apache Thrift framework to allow flexible collaboration of users with different programming language skills. The framework also allows different functional components to be deployed distributedly and to collaborate over a networ

    CORPORATE SOCIAL RESPONSIBILITY IN ROMANIA

    Get PDF
    The purpose of this paper is to identify the main opportunities and limitations of corporate social responsibility (CSR). The survey was defined with the aim to involve the highest possible number of relevant CSR topics and give the issue a more wholesome perspective. It provides a basis for further comprehension and deeper analyses of specific CSR areas. The conditions determining the success of CSR in Romania have been defined in the paper on the basis of the previously cumulative knowledge as well as the results of various researches. This paper provides knowledge which may be useful in the programs promoting CSR.Corporate social responsibility, Supportive policies, Romania
    • …
    corecore