Search Results Collection Resources (395)

View
Selected filters:
  • Najran University
Analysing Use Case Diagrams in a Calculus of Context-aware Ambients
Conditions of Use:
Remix and Share
Rating

Use case diagrams are an excellent tool for capturing and analyzing the ...

Use case diagrams are an excellent tool for capturing and analyzing the functional requirements of a system under development. Context-aware use case diagrams are an extension of use case diagrams to cater for both the functional requirements and the context-awareness requirements of context-aware and pervasive systems. They provide (graphical) notations for specifying, visualizing and documenting the intended behavior of a context-aware system at an early stage of the system development life-cycle. This paper proposes an approach to analyzing context-aware use case diagrams usind a Calculus of Context-aware Ambients (CCA). An algorithm is proposed that translates a context-aware use case diagram into a CCA process. This process can then be analyzed using the CCA tools such as the simulator ccaPL which enables the execution of CCA processes and the model-checker ccaSPIN that can check automatically whether a CCA process satisfies a desired property, e.g. deadlock freedom and reachability. The proposed approach is evaluated using a real-word example of a context-aware pedestrian collision avoidance system.

Subject:
Career and Technical Education
Material Type:
Case Study
Author:
أحمد الشهي
Date created
15-جمادي الآخرة-1438
Backtracking
Conditions of Use:
No Strings Attached
Rating

Backtracking is a general algorithm for finding all (or some) solutions to ...

Backtracking is a general algorithm for finding all (or some) solutions to some computational problems, notably constraint satisfaction problems, that incrementally builds candidates to the solutions, and abandons a candidate ("backtracks") as soon as it determines that the candidate cannot possibly be completed to a valid solution.

Subject:
Applied Science
Material Type:
Reading
Author:
Dalal Alqahtani
Date created
21-رمضان-1439
Big Data Modelling
Rating

Capture the requirements of big data will be valuable data and information ...

Capture the requirements of big data will be valuable data and information in our systems and the information is the most expensive source in our life and smart using of data and information can produce important resource such as oil or gold.

Subject:
Career and Technical Education
Material Type:
Activity/Lab
Author:
أحمد الشهي
Date created
19-جمادي الأولى-1438
Blue-ray Technology
Rating

هو نوع من ادوات التخزين المستخدمة في الكمبيوتر والتي تستخدم لحفظ ملفات ...

هو نوع من ادوات التخزين المستخدمة في الكمبيوتر والتي تستخدم لحفظ ملفات ذات احجام كبيرة وبتكلفة اقل

Subject:
Career and Technical Education
Material Type:
Activity/Lab
Author:
علي المصعبي
Date created
14-جمادي الآخرة-1438
Brute-force search
Conditions of Use:
No Strings Attached
Rating

In computer science, brute-force search or exhaustive search, also known as generate ...

In computer science, brute-force search or exhaustive search, also known as generate and test, is a very general problem-solving technique that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement.

Subject:
Applied Science
Material Type:
Reading
Author:
Dalal Alqahtani
Date created
21-رمضان-1439
Data Integration
Rating

The article is about data integration and its challenges. Also, this article ...

The article is about data integration and its challenges. Also, this article includes how to overcome these challenges.

Subject:
Education
Material Type:
Reading
Author:
Maha Alwuthaynani
Date created
28-رجب-1439
Database security
Conditions of Use:
No Strings Attached
Rating

Database security concerns the use of a broad range of information security ...

Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability.

Subject:
Applied Science
Material Type:
Reading
Author:
Dalal Alqahtani
Date created
21-رمضان-1439