...Research Methodology: An example in a Real Project Noel Pérez Laboratory of Optics and Experimental Mechanics, Instituto de Engenharia Mecânica e Gestão Industrial. nperez@inegi.up.pt Abstract. The research methodology defines what the activity of research is, how to proceed, how to measure progress, and what constitutes success. It provides us an advancement of wealth of human knowledge, tools of the trade to carry out research, tools to look at things in life objectively; develops a critical and scientific attitude, disciplined thinking to observe objectively (scientific deduction and inductive thinking); skills of research particularly in the ‘age of information’. Also it defines the way in which the data are collected in a research project. In this paper it presents two components of the research methodology from a real project; the theorical design and framework respectively. Keywords: Research methodology, example of research methodology, theorical framework, theorical design. 1 Introduction The research methodology defines what the activity of research is, how to proceed, how to measure progress, and what constitutes success. It provides us an advancement of wealth of human knowledge, tools of the trade to carry out research, tools to look at things in life objectively; develops a critical and scientific attitude, disciplined thinking to observe objectively (scientific deduction and inductive thinking); skills of research particularly in the ‘age of information’. The...
Words: 2220 - Pages: 9
...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...
Words: 15250 - Pages: 61
...TMGT 3201 Final Exam Study Guide 1 Revised 9/14/2014 1. The purpose of an information system’s __process___ component is generating the most useful type of information for making decisions. 2. The four Ms of resources are _____Manpower, Machinery, Materials, and Money. 3. Scheduling and assigning employees might be handled by a __personnel information system___. 4. Managers could use a _manufacturing information system____ to assess the effect on final product costs of a nine percent increase in raw materials. 5. ASCII defines up to __128__ characters. 6. Computers and communication systems use _data codes____ to represent and transfer information between computers and network systems. 7. What are some examples of input devices? Keyboard, mouse, scanner, microphone 8. ___Optical Character Reader__ works on the same principle as a barcode reader but reads text instead of barcodes. 9. To begin designing a relational database, you must define the _Logical___ structure by defining each table and the fields in it. 10. A data _dictionary___ stores definitions, such as data types for fields, default values, and validation rules for data in each field. 11. A __primary__ key uniquely identifies every record in a relational database. 12. In a relational model, when a primary key for one table appears in another table it is called a __foreign__ key. 13. Dell, Microsoft, and Unisys Corporation created a partnership to design a voting...
Words: 1046 - Pages: 5
...MIS 290 Exam 1 Study Guide Multiple Choice (1 pt each) Identify the choice that best completes the statement or answers the question. Chapter 1 ____ 1. _____ is an important component of every information system that helps organizations to achieve their goals. a.|Hardware|c.|Feedback mechanism| b.|Software|d.|Data| ____ 2. The process of defining relationships among data to create useful information requires ______ a.|an information system.|c.|knowledge| b.|intelligence|d.|intuition| ____ 3. ______ are people who create, use, and disseminate knowledge and are usually professionals in science, engineering, business, and other areas. a.|Systems analysts|c.|Chief Information Officer| b.|Knowledge workers|d.|End user| ____ 4. Data that can be used for a variety of purposes is said to be ______. a.|flexible|c.|relevant| b.|economical|d.|verifiable| ____ 5. The value of information is directly linked to how it helps decision makers achieve their organization’?s _____. a.|profits|c.|cost reduction initiatives| b.|goals|d.|quality improvement measures| ____ 6. ______ is a measure of the extent to which a system achieves its goals. a.|Efficiency|c.|Performance rate| b.|Reliability|d.|Effectiveness| ____ 7. In information systems, _____ is used to make changes to input or processing activities. a.|forecasting|c.|output| b.|feedback|d.|processing| ____ 8. _____ consists of computer equipment used to perform input, processing, and...
Words: 3708 - Pages: 15
...Title :Wind speed prediction using Artificial Neural Network (ANN) Abstract : The crisis of fossil based fuel around the world has led to the research of Renewable Energy sources. One of the oldest sources of Renewable energy was using the wind to generate electrical or mechanical power using windmills. To use it efficiently the wind speed which determines the wind power must be known beforehand. Wind speed is a random variable depending on meteorological variables like atmospheric pressure,temperature,relative humidity & such. Methods that are currently being applied to predict wind speed are Statistical, Intelligent systems, Time series, Fuzzy logic, neural networks.Our focus will be on using Artificial Neural Network to predict the wind speed in daily basis in this report. Chapter 1 1.1 Introduction Bangladesh has a 724 lm long coastal area where south-westerly tradewind& sea breeze makes the usage of wind as a renewable energy source very visible. But, not much systematic wind study has been made, adequate information on the wind speed over the country and particularly on wind speeds at hub heights of wind machines is not available. A previous study (1986) showed that for the wind monitoring stations of Bangladesh Meteorological Department (BMD) the wind speed is found to be low near the ground level at heights of around 10 meter. Chittagong – Cox’s Bazar seacoast and coastal off-shore islands appeared to have better wind speeds. Measurements...
Words: 4034 - Pages: 17
...Computer science From Wikipedia, the free encyclopedia Jump to: navigation, search Computer science or computing science (abbreviated CS) is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems.[1][2] Computer scientists invent algorithmic processes that create, describe, and transform information and formulate suitable abstractions to model complex systems. Computer science has many sub-fields; some, such as computational complexity theory, study the fundamental properties of computational problems, while others, such as computer graphics, emphasize the computation of specific results. Still others focus on the challenges in implementing computations. For example, programming language theory studies approaches to describe computations, while computer programming applies specific programming languages to solve specific computational problems, and human-computer interaction focuses on the challenges in making computers and computations useful, usable, and universally accessible to humans. The general public sometimes confuses computer science with careers that deal with computers (such as information technology), or think that it relates to their own experience of computers, which typically involves activities such as gaming, web-browsing, and word-processing. However, the focus of computer science is more on understanding the properties of the programs used to implement...
Words: 5655 - Pages: 23
...Management Science & Systems 82 Prestonwood Lane School of Management, SUNY at Buffalo East Amherst, NY 14051 Buffalo, New York 14260 Ph: (716) 688-6360 Ph: (716) 645-3258 Fax: (716)645-6117 E-Mail: rramesh@acsu.buffalo.edu Web: http://mgt.buffalo.edu/faculty/academic/systems/faculty/rramesh Education Ph.D. Industrial Engineering (Operations Research) (1985) State University of New York at Buffalo (GPA: 4.0. Awarded Ph.D with Distinction) Advisors: Mark H. Karwan and Stanley Zionts M.Tech. Industrial Engineering (1977) Indian Institute of Technology, Madras B.Tech. Chemical Engineering (1975) Indian Institute of Technology, Madras Research Streams • • • • Economics of IT – MSP and Cloud Computing Markets Conceptual Modeling and Ontologies Database Systems and Distributed Computing Supply Chains & Decision Analysis Employment Professor Department of Management Science & Systems School of Management State University of New York at Buffalo (September 1998 - ) Associate Professor Department of Management Science & Systems State University of New York at Buffalo (September, 1990 – September 1998) Assistant Professor Department of Management Science & Systems State University of New York at Buffalo (September, 1984 - September, 1990) 1 Research and Teaching Assistant Doctoral Program in Operations Research Department of Industrial Engineering State University of New York at Buffalo (January, 1981 - September, 1984) Entrepreneur SYMBIOSIS Consulting Madras, India (September...
Words: 7611 - Pages: 31
...|between $200 - $400| b.|under $200|d.|over $400| __B__ 6. ____ consists of computer programs that govern the operation of the computer. a.|Hardware|c.|Applications| b.|Software|d.|Telecommunications| __C__ 7. ____ is an example of application software that allows you to accomplish specific tasks such as word processing or tabulating numbers. a.|Systems software|c.|Microsoft Office 2010| b.|Windows 7|d.|Windows Vista| __C__ 8. People can send short messages of up to ____ using Twitter. a.|10 words|c.|140 characters| b.|100 characters|d.|140 words| __D__ 9. Using ____, you can download audio programs or music from the Internet to play on computers or music players. a.|podcasting|c.|WWW| b.|Web logs|d.|cloud computing| __D__ 10. ____ include(s) all the people who manage, run, program, and maintain the system, including the CIO, who manages the IS...
Words: 3408 - Pages: 14
...Business Computing Business Computing Survey of IS Theory Name: Muhammad Rashid Student Number: S0222212 Tutor: Ron Perkins Due Date: 16th May 2013 Central Queensland University (Sydney Campus) Survey of IS Theory Name: Muhammad Rashid Student Number: S0222212 Tutor: Ron Perkins Due Date: 16th May 2013 Central Queensland University (Sydney Campus) Table of Contents 1.0 Technical, Business and System Competencies 1 1.1 Technical Competency 1 1.2 Business Competency 2 1.3 System Competency 2 2.0 Four Major Information Systems 3 2.1 Management Information System 3 2.2 Knowledge Management System 4 2.3 Customer Relationship Management 4 2.4 Supply Chain Management System 5 3.0 Cloud Computing 5 3.1 Characteristics of Cloud Computing 6 3.1.1 Elasticity & Scalability 6 3.1.2 Provisioning 6 3.1.3 Standardisation 6 3.1.4 Billing and Service Usage 7 3.2 Issues with Cloud Computing before Implementation 7 4.0 Technology Review 7 5.0 Operating Systems in Personal Computers 8 5.1 Features of Microsoft Windows 8 9 6.0 Enterprise Systems 10 6.1 Benefits of implementing Enterprise Systems 10 6.2 Challenges caused by implementing Enterprise Systems 11 7.0 Intelligent Systems 11 7.1 Types of Intelligent Systems 12 7.1.1 Expert Systems 12 7.1.2 Artificial Neural Networks 12 7.1.3 Motion Controls 13 7.1.4 Genetic Algorithms 13 8.0 Web Services 13 9.0 Educational Institutions...
Words: 4438 - Pages: 18
...idUNIVERSITY OF PUNE , RESULT SHEET FOR B.E.(2008 PAT.)(CIVIL) EXAMINATION NOV. 2013 DATE : 14 MAR. 2014 NOTE: FIRST LINE : SEAT NO., CENTRE : K.K. WAGH COLLEGE OF ENGINEERING, NASIK. NAME OF THE CANDIDATE, MAX. MARKS, MOTHER, PERMANENT REG. NO., MARKS OBTAINED, PREVIOUS SEAT NO., P/F:PASS/FAIL, PAGE NO. COLLEGE, 01 (1638) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SEAT NO. OTHER LINES: HEAD OF PASSING, MAX.MARKS : 1500 B80130001 010 . ENVIRONMENTAL ENGINEERING II 010 . ENVIRONMENTAL ENGINEERING II 010 . ENVIRONMENTAL ENGINEERING II 020 . DAMS AND HYDRAULIC STRUCTURE 020 . DAMS AND HYDRAULIC STRUCTURE 020 . DAMS AND HYDRAULIC STRUCTURE 030 . STRUCTURAL DESIGN III 030 . STRUCTURAL DESIGN III 030 . STRUCTURAL DESIGN III 04B . SYSTEMS APPROACH IN CIVIL ENGG 04B . SYSTEMS APPROACH IN CIVIL ENGG 05E . ADVANCED CONCRETE TECHNOLOGY FIRST TERM TOTAL = B80130002 424/750. SUNITA PP TW OR PP TW OR PP TW OR PP TW PP 100 25 50 100 25 50 100 25 50 100 25 100 40 10 20 40 10 20 40 10 20 40 10 40 55 22 38 61 15 28 41 14 06 52 19 40 P P P P P P P P F P P P , 71104334F , , KKNS , MIN. PASS MARKS, C: PREVIOUS CARRY OVER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DISTINCTION : 0990 PP TW OR PP TW OR PP TW OR PP TW PP 100 25 50 100 25 50 100 25 50 100 25 100 40 10 20 40 10 20 40 10 20 40 10 40 FIRST CLASS : 900 MEENA 55...
Words: 138108 - Pages: 553
...term “Internet of Things (IoT)”? refers to the Machine-to-Machine Technology, the Industrial Internet, Internet of Everything, and probably a few other phrases. Kevin Ashton first came up with Internet of Things in The idea simply 1 1998, which involved wireless communications and networking; and the concept has been attracting extensive attention recently. IoT does go beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications[1]. It is different with human-to-human or human-to-machine interaction. The interconnection of these embedded devices (including smart objects), is expected to conduct in automation in nearly all fields, while also enabling advanced applications like a Smart Grid[2]. The Honorable Sir Charles Kuen Kao, was born in 1933, known as the “Father of Fiber Optics Communications”, was jointly awarded the 2009 Nobel Prize in Physics for “groundbreaking achievements concerning the transmission of light in fibers for optical communication.”[3] Simply put, IoT is a network of physical objects (i.e. refrigerators) that contain embedded technology (like sensors and Wi-Fi) to communicate and sense or interact with their internal states or the external environment, for example, that tells one’s smartphone when he/she...
Words: 2144 - Pages: 9
...Cloud Computing Table of Contents Abstract 1 Evolution of Cloud Computing 1 Defining Cloud Computing 3 Deployment Models 5 Delivery Models 7 Essential Characteristics of Cloud Computing 10 Benefits of Cloud Computing 11 Risks of Cloud Computing 13 Conclusion 15 References 17 Cloud Computing Abstract Cloud computing is one of the latest computer and business industry buzz words. It joins the ranks of ‘virtualization’, ‘grid computing’, and ‘clustering’, among other buzz words in the IT industry. Cloud computing is a virtual network access, application, storage, and other computing resources on a pay-as-you-go basis. It allows users to access their networks, store information, and other resources from a virtual “cloud.” It is a relatively new concept that is still evolving. As a result, there is no standard definition of the cloud computing concept, which has led to many variations of the definition of cloud computing. Due to this lack of standardization members of the IT industry have created cloud products based on their own definitions of cloud computing, which has resulted in inconsistencies and confusion about what cloud computing really is. This paper will discuss the evolution, various definitions, deployment models, delivery models, characteristics, benefits and risks, of cloud computing. Evolution of Cloud Computing Cloud Computing has evolved through a number of phases, which include grid and utility computing, application service...
Words: 4902 - Pages: 20
...Autonomic Computing: An Overview Manish Parashar1 and Salim Hariri2 The Applied Software Systems Laboratory, Rutgers University, Piscataway NJ, USA 2 High Performance Distributed Computing Laboratory, University of Arizona, Tucson, AZ, USA parashar@caip.rutgers.edu, hariri@ece.arizona.edu 1 Abstract. The increasing scale complexity, heterogeneity and dynamism of networks, systems and applications have made our computational and information infrastructure brittle, unmanageable and insecure. This has necessitated the investigation of an alternate paradigm for system and application design, which is based on strategies used by biological systems to deal with similar challenges – a vision that has been referred to as autonomic computing. The overarching goal of autonomic computing is to realize computer and software systems and applications that can manage themselves in accordance with high-level guidance from humans. Meeting the grand challenges of autonomic computing requires scientific and technological advances in a wide variety of fields, as well as new software and system architectures that support the effective integration of the constituent technologies. This paper presents an introduction to autonomic computing, its challenges, and opportunities. 1 Introduction Advances in networking and computing technology and software tools have resulted in an explosive growth in networked applications and information services that cover all aspects of our life. These sophisticated...
Words: 5552 - Pages: 23
...GREEN COMPUTING AND GREEN IT BEST PRACTICES On Regulations and Industry Initiatives, Virtualization, Power Management, Materials Recycling and Telecommuting Notice of Rights: Copyright © Jason Harris. All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Notice of Liability: The information in this book is distributed on an “As Is” basis without warranty. While every precaution has been taken in the preparation of the book, neither the author nor the publisher shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the products described in it. Trademarks: Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified throughout this book are used in editorial fashion only and for the benefit of such companies with no intention of infringement of the trademark. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with this book. 1 WRITE A REVIEW & RECEIVE A BONUS EMEREO EBOOK...
Words: 31633 - Pages: 127
...A CAPTCHA Implementation Based on 3D Animation Abstract—In order to distinguish between human users and computer programs, CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism is widely applied in websites such as accounts application website. While the major implementation of CAPTCHA method—2D still image verification code based on OCR technology is threatened by developing artificial intelligence and image recognition technologies. In this paper, we propose a new approach to implement CAPTCHA mechanism based on 3D Animation, utilizing the weakness of computer vision, which make it robust to computer attacks and convenient for users to recognize, and implemented this method to generate a 3D animation verification code. Keywords-CAPTCHA;VerificationCode;Moving Three-dimensional Animation I. Figure 1. objects; INTRODUCTION Internet is crucial to each respect of life all over the globe nowadays, through which we could retrieve and exchange information freely and efficiently. Given the fundamental relation between internet and people’ s life, vast malicious computer programs attack websites for profits, such as auto application for some mails’ accounts to send junk e-mails, etc. CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) system emerges to solve this problem by identifying end-users of internet whether a real person or an automated computer program[1][2][3]...
Words: 3406 - Pages: 14