The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Any tree with n vertices is conjectured to be graceful if its vertices can be labeled using integers 0, 1, …, n − 1 such that each vertex label as well as the corresponding edge label is distinct throughout the tree. There has been multiple attempts with different approaches to prove this conjecture but it remains the same. Here we will discuss the methods used to solve this problem along with two...
Nowadays cloud computing is the fastest growing technology that is used as a source of providing service through Internet. It is an enhanced model of Utility Computing. It embodies all technologies in Computer Architecture. It delivers the clients the needed applications, processes and Information as a service. It provides software platform as a service and virtualized servers, storage area and networks...
Data generation, handling and its processing have emerged as the most reliable source of understanding and discovery of new facts, knowledge and products in the world of natural and material sciences. The emergence of the most efficient techniques in statistical or bioinformatics situations has therefore become a routine practice in research and industrial sectors. Under practical conditions, dealing...
Many bio-medical databases such cohort study data suffer from potential errors involved with human factors like mistyping, overlooking some fields. It is crucial to detect such errors at the data entry stage using some techniques like outlier detection. Because such data lie in high-dimensional space and contain many null values, i.e., missing values, most conventional outlier detections are not a...
The desire to move the applications from on-premise to cloud or to move it between the clouds gives a precious freedom to the clients and enables them to freely change the cloud service provider. The ability to move the application is a hot research topic and is not solved completely yet, neither by the vendors, since they prefer client lock-in, nor by cloud providers, that have great challenges to...
Category theory, which has been applied to various fields of computer science and information technology, now provides a mathematical foundation for the development of information systems. The Meiji restoration, which is characterized by a flexible structure where making and breaking alliances among politicians were common and policy migrations of the politicians occurred dynamically in accordance...
Corporate software development often takes place within a complex organizational structure, potentially encompassing many individuals. With constant improvements in network and communication technologies, those organizations may be widely distributed through time and space. In computer science and education, group projects are typically included as part of an undergraduate and graduate engineering...
Educational data mining is emerging for useful knowledge hidden in educational databases. Frequent temporal pattern mining is one of the popular mining tasks to help us get insights into the characteristics of the students and further of their study. As time goes, educational databases in an academic credit system keep increasing and updated in nature. Thus, frequent temporal pattern mining in educational...
Active learning refers to instruction where the learners play an active role in learning and has been found to increase student retention, improve acquisition of higher order thinking and reasoning skills, and improve performance in STEM courses. Two main active learning techniques: student response systems (aka. clickers) and flipped classroom assignments, were incorporated in University of Michigan-Flint...
This paper presents an adaptation of the Brousseau method. The concepts of didactic variations and interactions are introduced by using didactic and a-didactic situations. With the main aim of guaranteeing alumni improvement and evaluation processes, a case study application was development founded on a cloud architecture, which is also based in previous research, curricular organization and interaction...
Project management can be defined as a complex set of activities that are performed by project managers, individuals or larger entities, that requires proper application of skills, knowledge, tools and techniques in order to reach or exceed project requirements. Two of the most important skills or techniques that greatly influence the end result of a project are task delegation and resource allocation...
In this paper we introduce a new modification of calculating the Impact Factor(IF) for journals based on the variation of papers' popularity in different journals and research fields over time, which we call "life cycle". The impact factor value for a journal calculated by the proposed method is called Improved Impact Factor (IIF). Papers in forty journals published from 1980 to 2014 are...
A multi-typed information network is an information network which contains multiple types of objects having actions and interactions between each other. Although many studies on single typed information network haven been found in the literature, only a little has been known concerning with multi-typed information networks. On the other hand, multiple type information networks are ubiquitous and forming...
Big Data is one of the latest emerging topics in the field of business information systems, and is marketed as being the key for companies' future success. Many analytic solutions are offered by IT companies to help other businesses with the flood of data that is generated within and outside of a company. Despite the extensive use of the notion Big Data for marketing purposes, there is no common understanding...
Emotion classification is an active area of research. It is difficult to differentiate among different emotion categories. This paper deals with classification of emotions into seven different categories such as (i) Anger, (ii) Disgust, (iii) Fear, (iv) Guilt, (v) Joy, (vi) Sadness, and (vii) Shame using ngram (unigram, bigram, and trigram) features. The features are extracted from the ISEAR dataset...
Although social networking has significantly influenced online communication, email still has managed to retain its importance. There are number of techniques proposed in past by researchers for recipient prediction/suggestion. Most of them are complex to implement and takes good amount of computation time. The major factor behind higher time complexity and space complexity is the prediction models...
This communication is framed within a broader research study referred to the basic concepts that students should know when considering first-time Database in Computing Degrees in Spanish universities. In this work, we have submitted our findings we obtained in pretrial community education experts work mainly working in the area of databases, so that we can conclude what the most important basic minimum...
Numerous studies have indicated enhanced productivity results for computer science (CS) researchers as well as their respective institutions. This paper aims to evaluate the research productivity of a Malaysian university, namely, Universiti Teknologi Malaysia (UTM) concentrating in particular on the CS researchers. The author uses the Scopus database which is known as the most accessible bibliographic...
As the use and demand for computers are growing so fast, it is very important that every student today acquire computer basic training. Computer literacy will give them all the benefits and advantages to progress their education and future career too. Sudanese students start learning computers at high secondary school. The computer science curriculum at the Sudanese high secondary schools aims at...
In this paper, we propose a framework to integrate bibliographical data of computer science publications from heterogeneous digital libraries. The framework consists of three key components: publication collector, bibliographical parser and duplicated checker. In order to analyze efficiency of our framework in integrating data from heterogeneous sources, we conduct experiment with three different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.