NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Agrawal, Aastha; Agarwal, Anjali; Bansal, Priti – Education and Information Technologies, 2021
Education is one of the most vital sectors of any nation's development. Site selection for Education Centers (EC) like schools, colleges, and coaching centers can be a very complex process. Various parameters like population, literacy rate, property cost, etc. have to be considered while selecting a site. Though deterministic approaches employed…
Descriptors: Site Selection, Education Service Centers, Mathematics, Heuristics
Mohanty, Pragyan Sheela P. – ProQuest LLC, 2015
Two problems at two different abstraction levels of computational biology are studied. At the molecular level, efficient pattern matching algorithms in DNA sequences are presented. For gene order data, an efficient data structure is presented capable of storing all gene re-orderings in a systematic manner. A common characteristic of presented…
Descriptors: Computation, Biology, Genetics, Graphs
Peer reviewed Peer reviewed
Direct linkDirect link
Finkelman, Matthew D.; Kim, Wonsuk; Roussos, Louis; Verschoor, Angela – Applied Psychological Measurement, 2010
Automated test assembly (ATA) has been an area of prolific psychometric research. Although ATA methodology is well developed for unidimensional models, its application alongside cognitive diagnosis models (CDMs) is a burgeoning topic. Two suggested procedures for combining ATA and CDMs are to maximize the cognitive diagnostic index and to use a…
Descriptors: Automation, Test Construction, Programming, Models
Brown, Robert L. – ProQuest LLC, 2014
A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…
Descriptors: Computer Security, Identification, Automation, Programming