The software technology is advancing rapidly over the years. In order to adapt to this advancement, the employees on software development should renew themselves consistently. During this rapid change, it is vital to train the proper software developer with respect to the criteria desired by the industry. Therefore, the curriculum of the programs related to software development at the universities should be revised according to software industry requirements. In this study, the core part of Software Development Curriculum is determined by applying association rule mining on Software Job ads in Turkey. The courses in the core part are chosen with respect to IEEE/ACM computer science curriculum. As a future study, it is also important to gather the academic personnel and the software company professionals to determine the compulsory and elective courses so that newly graduated software developers can easily adapt to the software projects in the market without taking extra training.
Exploring the Level of Computer Literacy for Candidates in Higher Education: ...Dr. Amarjeet Singh
Bahrain Polytechnic is a Higher Education technical institution established in 2008 (by Royal Decree No. 65 for the year 2008). Its main mission is to supply the Bahraini economy with a skilled Bahraini labour force aiming to contribute to economic growth and diversification. The Polytechnic ensures that its values of excellence, learning and innovation are achieved by designing curricula that meet international standards as well as national and individual needs through continuous consultations with the industries and international education institutions. The development of computer and technological literacy is a significant predictor for success in the workplace and is also one of the key skills that the polytechnic provides through its programmes to students and faculty. This paper explores how computer literacy and skills are acquired by educators and students through International Computer Driving License (ICDL) tools employed at Bahrain Polytechnic. The study also considers the challenges that hinder learners from completing the requirements of ICDL. If adequate numbers of faculty and students have already learned basic computer skills, then the question facing the polytechnic is if computer literacy should continue to be taught at all levels. To answer this question, ICDL tests were administered to ascertain the computer literacy level of existing faculty and students. The results of the tests will determine which ICDL tests students and faculty should be placed on in order to address their computer literacy needs.
E-Learning Readiness Assessment Tool for Philippine Higher Education Institut...IJITE
The growth of internet technologies changed learning strategies globally. The Philippines is no exemption. Due to its usefulness and potential, E-learning is becoming popular. But before these benefits would be enjoyed, it is very important for an institution to be assessed. This is to identify the needs and factors that directly affect their readiness. This study presents a readiness assessment tool for Philippine Higher Education Institutions. It also serves as a needs assessment instrument.
Top Career Trends in Engineering to watch in 2021MITAcademy1
"There are so many new career trends in engineering for the year 2021. In this article, let’s have a look at top career trends in engineering. "
To know more, visit: https://mitaoe.ac.in/engineering/Top-Career-Trends-in-Engineering.php
This paper introduces the competency models for Operations Manager, User Interface
Designer, and Application Developers. It will serve as a guide for Information Systems students
to identify which among the three of the offered tracks would be most suited for them to pursue
according to their knowledge, skills, values and interests. The Holland’s RIASEC model and the
Values Search model of Bronwyn and Holt were utilized to determine the most dominant interest
and most dominant values of the industry computing experts. Survey assessment forms were sent
to IT Operations Manager, User Interface Designer, and Application Developer. Most dominant
values and interests of industry computing experts were determined as well as the knowledge
and skills which are mostly required by the industry in their particular area. Based on the result
of the survey, it shows that application developer and user interface designer have a closely
related values. Thus a second round of a survey would be needed to come up with the most
exclusive dominant values for the particular information systems specialization track.
Exploring the Level of Computer Literacy for Candidates in Higher Education: ...Dr. Amarjeet Singh
Bahrain Polytechnic is a Higher Education technical institution established in 2008 (by Royal Decree No. 65 for the year 2008). Its main mission is to supply the Bahraini economy with a skilled Bahraini labour force aiming to contribute to economic growth and diversification. The Polytechnic ensures that its values of excellence, learning and innovation are achieved by designing curricula that meet international standards as well as national and individual needs through continuous consultations with the industries and international education institutions. The development of computer and technological literacy is a significant predictor for success in the workplace and is also one of the key skills that the polytechnic provides through its programmes to students and faculty. This paper explores how computer literacy and skills are acquired by educators and students through International Computer Driving License (ICDL) tools employed at Bahrain Polytechnic. The study also considers the challenges that hinder learners from completing the requirements of ICDL. If adequate numbers of faculty and students have already learned basic computer skills, then the question facing the polytechnic is if computer literacy should continue to be taught at all levels. To answer this question, ICDL tests were administered to ascertain the computer literacy level of existing faculty and students. The results of the tests will determine which ICDL tests students and faculty should be placed on in order to address their computer literacy needs.
E-Learning Readiness Assessment Tool for Philippine Higher Education Institut...IJITE
The growth of internet technologies changed learning strategies globally. The Philippines is no exemption. Due to its usefulness and potential, E-learning is becoming popular. But before these benefits would be enjoyed, it is very important for an institution to be assessed. This is to identify the needs and factors that directly affect their readiness. This study presents a readiness assessment tool for Philippine Higher Education Institutions. It also serves as a needs assessment instrument.
Top Career Trends in Engineering to watch in 2021MITAcademy1
"There are so many new career trends in engineering for the year 2021. In this article, let’s have a look at top career trends in engineering. "
To know more, visit: https://mitaoe.ac.in/engineering/Top-Career-Trends-in-Engineering.php
This paper introduces the competency models for Operations Manager, User Interface
Designer, and Application Developers. It will serve as a guide for Information Systems students
to identify which among the three of the offered tracks would be most suited for them to pursue
according to their knowledge, skills, values and interests. The Holland’s RIASEC model and the
Values Search model of Bronwyn and Holt were utilized to determine the most dominant interest
and most dominant values of the industry computing experts. Survey assessment forms were sent
to IT Operations Manager, User Interface Designer, and Application Developer. Most dominant
values and interests of industry computing experts were determined as well as the knowledge
and skills which are mostly required by the industry in their particular area. Based on the result
of the survey, it shows that application developer and user interface designer have a closely
related values. Thus a second round of a survey would be needed to come up with the most
exclusive dominant values for the particular information systems specialization track.
This research is a descriptive study which aims to describe the ability of ICT
students of the Department of Physics Education as prospective teachers in the face of
the industrial revolution 4.0. This research was conducted at the Department of
Physics Education, Musamus University, Merauke, with a sample of 52 people. Data
was collected using questionnaires and analyzed using a simple percentage formula.
The results of the study showed that the students of Physics Education Department
had 76.4% of the overall standard of basic ICT skills. This means that students of the
Department of Physics Education are skilled in using ICT. Based on the results of this
study, it is advisable for policy makers to provide training to students and lecturers
that are more intensive given the development of ICT that continues to progress
rapidly.
INFORMATION AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY OF EGYPTIAN ...ijait
his study aims at evaluating the sufficiency of IC
T skills of fresh accounting graduates by soliciting the opinion of senior accounting professionals. A questionnaire used as the data collection method, and descriptive statistics used for analysis. The resul
t of this research was surprisingly, as the level of the accounting graduates rated to be above average and they are very competent for current accounting
profession in Egypt. The research revealed that any
fresh graduate should be literate with Internet,word
processing software, spreadsheet software, e-mail,
commercial accounting software, and database
management software. The research has several pract
ical implications as well as a genuine value, as it
provides current set of ICT skills tools needed by
accounting profession in Egypt.
In industrial design education, mechanics-based courses are mainly based on traditional lecture and they are highly abstract for ID students to comprehend the mechanisms The existing studies highlight the requirement of a new approach for mechanics-based courses in ID departments The study presents, a combined teaching model of mechanism mainly based on applied teaching style and action learning to improve ID students' learning experience and competencies through promoting the transference of theoretical knowledge into practical experience and learning The combined teaching model consisting of 3 phases was integrated to a design studio project that is mechanical game design Project observations and post-questionnaire were employed to analyze objectively the appropriateness of the teaching model The results indicated that, the combined teaching model improved ID students' learning outcomes and competencies in terms of transferring the gained theoretical and practical knowledge to the action learning.
Evaluating Total Cost of Ownership for University Enterprise Resource Plannin...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
"A student willing to pursue MS in Computer Engineering should aim for the best among the lot. Studying at MITAOE will give individual an ideal environment and prepare them to tackle the corporate world's challenges. "
The Academic Performance and the Computer Programming Anxiety of BSIT Student...IJAEMSJORNAL
The 21st century has caused numerous significant impacts and advancements in the lives of people. Information Technology (IT) has contributed essential benefits in the different areas of the society. One of the vital skills in developing IT solutions is programming. For many, writing computer programs may be a very challenging task which may result in some levels of anxiety. This study aimed to describe and look at the relationship between the academic performance and the programming anxiety among Bachelor of Science in Information Technology (BSIT) students to provide a basis for instructional strategy improvement in the undergraduate level.
Industry Partners’ feedback on the OJT performance of Bachelor of Science in ...IJAEMSJORNAL
This study determined the feedback of trainers/supervisors regarding the respondents’ personal, interpersonal and technical understanding skills in their on-the-job training (OJT) program using descriptive research design. The respondents of the study were 156 BSIT students enrolled in the OJT Program during the 2nd Semester of A.Y. 2018–2019 at Nueva Ecija University of Science Technology, San Isidro Campus. The findings of the study have shown that the students were excellent in numerous personal skills. Likewise, they were very good in most of their technical understanding skills which are hard skills in the field of Information Technology. Still, there were areas in which students’ performance need enhancement. Due to this, the researchers proposed a plan of action as an intervention to improve the program that would later result in the improvement of the students’ performance in their OJT.
Requirement engineering is a key ingredient for software development to be effective. Apart from the
traditional software requirement which is not much appropriate for new emerging software such as smart
handheld device based software. In many perspectives of requirement engineering, traditional and new
emerging software are not similar. Whereas requirement engineering of traditional software needs more
research, it is obvious that new emerging software needs methodically and in-depth research for improved
productivity, quality, risk management and validity. In particular, the result of this paper shows that how
effective requirement engineering can improve in project negotiation, project planning, managing feature
creep, testing, defect, rework and product quality. This paper also shows a new methodology which is
focused on users work process applicable for eliciting the requirement of traditional software and any new
type software of smart handheld device such as iPad. As an example, the paper shows how the methodology
will be applied as a software requirement of iPad-based software for play-group students.
Using Data Mining to Identify COSMIC Function Point Measurement Competence IJECEIAES
Cosmic Function Point (CFP) measurement errors leads budget, schedule and quality problems in software projects. Therefore, it’s important to identify and plan requirements engineers’ CFP training need quickly and correctly. The purpose of this paper is to identify software requirements engineers’ COSMIC Function Point measurement competence development need by using machine learning algorithms and requirements artifacts created by engineers. Used artifacts have been provided by a large service and technology company ecosystem in Telco. First, feature set has been extracted from the requirements model at hand. To do the data preparation for educational data mining, requirements and COSMIC Function Point (CFP) audit documents have been converted into CFP data set based on the designed feature set. This data set has been used to train and test the machine learning models by designing two different experiment settings to reach statistically significant results. Ten different machine learning algorithms have been used. Finally, algorithm performances have been compared with a baseline and each other to find the best performing models on this data set. In conclusion, REPTree, OneR, and Support Vector Machines (SVM) with Sequential Minimal Optimization (SMO) algorithms achieved top performance in forecasting requirements engineers’ CFP training need.
It is impossible to separate the human factors from software engineering expertise during
software development, because software is developed by people and for people. The intangible
nature of software has made it a difficult product to successfully create, and an examination of
the many reasons for major software system failures show that the reasons for failures
eventually come down to human issues. Software developers, immersed as they are in the
technological aspect of the product, can quickly learn lessons from technological failures and
readily come up with solutions to avoid them in the future, yet they do not learn lessons from
human aspects in software engineering. Dealing with human errors is much more difficult for
developers and often this aspect is overlooked in the evaluation process as developers move on
to issues that they are more comfortable solving. A major reason for this oversight is that
software psychology (the softer side) has not developed as extensively
This research is a descriptive study which aims to describe the ability of ICT
students of the Department of Physics Education as prospective teachers in the face of
the industrial revolution 4.0. This research was conducted at the Department of
Physics Education, Musamus University, Merauke, with a sample of 52 people. Data
was collected using questionnaires and analyzed using a simple percentage formula.
The results of the study showed that the students of Physics Education Department
had 76.4% of the overall standard of basic ICT skills. This means that students of the
Department of Physics Education are skilled in using ICT. Based on the results of this
study, it is advisable for policy makers to provide training to students and lecturers
that are more intensive given the development of ICT that continues to progress
rapidly.
INFORMATION AND COMMUNICATION TECHNOLOGY SKILLS ' SUFFICIENCY OF EGYPTIAN ...ijait
his study aims at evaluating the sufficiency of IC
T skills of fresh accounting graduates by soliciting the opinion of senior accounting professionals. A questionnaire used as the data collection method, and descriptive statistics used for analysis. The resul
t of this research was surprisingly, as the level of the accounting graduates rated to be above average and they are very competent for current accounting
profession in Egypt. The research revealed that any
fresh graduate should be literate with Internet,word
processing software, spreadsheet software, e-mail,
commercial accounting software, and database
management software. The research has several pract
ical implications as well as a genuine value, as it
provides current set of ICT skills tools needed by
accounting profession in Egypt.
In industrial design education, mechanics-based courses are mainly based on traditional lecture and they are highly abstract for ID students to comprehend the mechanisms The existing studies highlight the requirement of a new approach for mechanics-based courses in ID departments The study presents, a combined teaching model of mechanism mainly based on applied teaching style and action learning to improve ID students' learning experience and competencies through promoting the transference of theoretical knowledge into practical experience and learning The combined teaching model consisting of 3 phases was integrated to a design studio project that is mechanical game design Project observations and post-questionnaire were employed to analyze objectively the appropriateness of the teaching model The results indicated that, the combined teaching model improved ID students' learning outcomes and competencies in terms of transferring the gained theoretical and practical knowledge to the action learning.
Evaluating Total Cost of Ownership for University Enterprise Resource Plannin...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
"A student willing to pursue MS in Computer Engineering should aim for the best among the lot. Studying at MITAOE will give individual an ideal environment and prepare them to tackle the corporate world's challenges. "
The Academic Performance and the Computer Programming Anxiety of BSIT Student...IJAEMSJORNAL
The 21st century has caused numerous significant impacts and advancements in the lives of people. Information Technology (IT) has contributed essential benefits in the different areas of the society. One of the vital skills in developing IT solutions is programming. For many, writing computer programs may be a very challenging task which may result in some levels of anxiety. This study aimed to describe and look at the relationship between the academic performance and the programming anxiety among Bachelor of Science in Information Technology (BSIT) students to provide a basis for instructional strategy improvement in the undergraduate level.
Industry Partners’ feedback on the OJT performance of Bachelor of Science in ...IJAEMSJORNAL
This study determined the feedback of trainers/supervisors regarding the respondents’ personal, interpersonal and technical understanding skills in their on-the-job training (OJT) program using descriptive research design. The respondents of the study were 156 BSIT students enrolled in the OJT Program during the 2nd Semester of A.Y. 2018–2019 at Nueva Ecija University of Science Technology, San Isidro Campus. The findings of the study have shown that the students were excellent in numerous personal skills. Likewise, they were very good in most of their technical understanding skills which are hard skills in the field of Information Technology. Still, there were areas in which students’ performance need enhancement. Due to this, the researchers proposed a plan of action as an intervention to improve the program that would later result in the improvement of the students’ performance in their OJT.
Requirement engineering is a key ingredient for software development to be effective. Apart from the
traditional software requirement which is not much appropriate for new emerging software such as smart
handheld device based software. In many perspectives of requirement engineering, traditional and new
emerging software are not similar. Whereas requirement engineering of traditional software needs more
research, it is obvious that new emerging software needs methodically and in-depth research for improved
productivity, quality, risk management and validity. In particular, the result of this paper shows that how
effective requirement engineering can improve in project negotiation, project planning, managing feature
creep, testing, defect, rework and product quality. This paper also shows a new methodology which is
focused on users work process applicable for eliciting the requirement of traditional software and any new
type software of smart handheld device such as iPad. As an example, the paper shows how the methodology
will be applied as a software requirement of iPad-based software for play-group students.
Using Data Mining to Identify COSMIC Function Point Measurement Competence IJECEIAES
Cosmic Function Point (CFP) measurement errors leads budget, schedule and quality problems in software projects. Therefore, it’s important to identify and plan requirements engineers’ CFP training need quickly and correctly. The purpose of this paper is to identify software requirements engineers’ COSMIC Function Point measurement competence development need by using machine learning algorithms and requirements artifacts created by engineers. Used artifacts have been provided by a large service and technology company ecosystem in Telco. First, feature set has been extracted from the requirements model at hand. To do the data preparation for educational data mining, requirements and COSMIC Function Point (CFP) audit documents have been converted into CFP data set based on the designed feature set. This data set has been used to train and test the machine learning models by designing two different experiment settings to reach statistically significant results. Ten different machine learning algorithms have been used. Finally, algorithm performances have been compared with a baseline and each other to find the best performing models on this data set. In conclusion, REPTree, OneR, and Support Vector Machines (SVM) with Sequential Minimal Optimization (SMO) algorithms achieved top performance in forecasting requirements engineers’ CFP training need.
It is impossible to separate the human factors from software engineering expertise during
software development, because software is developed by people and for people. The intangible
nature of software has made it a difficult product to successfully create, and an examination of
the many reasons for major software system failures show that the reasons for failures
eventually come down to human issues. Software developers, immersed as they are in the
technological aspect of the product, can quickly learn lessons from technological failures and
readily come up with solutions to avoid them in the future, yet they do not learn lessons from
human aspects in software engineering. Dealing with human errors is much more difficult for
developers and often this aspect is overlooked in the evaluation process as developers move on
to issues that they are more comfortable solving. A major reason for this oversight is that
software psychology (the softer side) has not developed as extensively
The impact of Technological acceptance model (TAM) outcome on implementing ac...AI Publications
Accounting software installation in Iraq's Kurdistan area will be examined in this study's primary objective. Quantitative methods were used by the researchers to determine the readiness factors for installing accounting software, including (technology readiness, human resource readiness, customer readiness, content readiness, educational readiness, leadership readiness, and cultural readiness). Erbil currently has seven small and medium-sized businesses (SME). SME's 120 administrative staff members were given the survey at random. A total of 104 people from various small and medium-sized businesses in Iraq's Kurdistan area participated in this study. Technology readiness was found to be most important, while human resource readiness came in last in Erbil SME's preparation for implementation of accounting software. There is a problem with this study because the survey questions may not be representative of the entire community of instructors and administrators at SME.
Remote interpreter API model for supporting computer programming adaptive lea...TELKOMNIKA JOURNAL
Despite the adoption of Learning Management Systems (LMS) has been continuously growing in the last decade few, if any, scholars addressed the lack of the interactivity in online learning systems. The requirement for an interactive learning model has been increasingly prominent as content providers realize the importance of personalization of content suits to learners’ learning progress. This paper demonstrates the adoption of adaptive learning into existing LMS engine to overcome the limitation of either systems plugins or server specification pertinent to students’ psychomotor abilities in computer programming learning. In this regard, the psychomotor is understood as the ability of students to write the program code as correctly as expected. In this study, a web API model that works to run an interpreter based-program code remotely was developed. The web API model can be utilized by LMS so it becomes the solution to the problem. The structure of the web API model has been adapted to the needs of the learning assessment. The implementation of the developed API web model is done in Python and PHP programming languages. The performance test was done by submitting 10 to 100 program codes simultaneously indicated no significant difference to the required resources (CPU usage and memory usage) to run the program code. Furthermore, for response time, the average time needed to run Python and PHP program code is also no significant difference. The average of CPU usage required by the web API to run a Python program code is 0.2058% with 0.5973 seconds as a response time. Meanwhile, to run the PHP program code, the average CPU usage required is 0.8074% with 0.3110 seconds response time. It can be concluded that the web API performance does not overburden the server.
Dimensions of Enterprise Resource Planning Systems Success in Public and Priv...paperpublications3
Abstract: Enterprise Resource Planning (ERP) systems have been adopted and implemented in the Kenyan higher education sector, with their success being described in many ways that one. Empirical studies have identified Quality, use, and benefits dimensions as suitable descriptors of success of ERP systems. This study used the results of a cross-sectional survey conducted in selected public and private universities in Kenya, coupled with theories and literature from existing Information System (IS) success models, to examine the effect of these dimensions on success of ERP systems. An understanding of ERP systems success dimensions will help to appreciate how each dimension fit in the higher education sector and provide a basis from which mitigation mechanisms can be employed to ensure success. There is need for universities to match their expectations on ERP systems with efficiency, assurance, accuracy, coupled with good support service by experienced professionals that will ensure the desired level quality is guaranteed. Engaging end-users during implementation and providing adequate training to employees have a direct impact on productive use of the ERP system. In addition, universities also need to define the strategic goals clearly before embarking on implementation, such that the process can always be steered towards the realization of benefits associated with the ERP system.
Keywords: ERP Success; Information Quality; Net Benefits; Service Quality; System Quality; Use.
Title: Dimensions of Enterprise Resource Planning Systems Success in Public and Private Universities in Kenya
Author: Anthony Njina, Dr. Mike Iravo, Dr. Michael Kimwele
ISSN 2350-1049
International Journal of Recent Research in Interdisciplinary Sciences (IJRRIS)
Paper Publications
AN ANALYSIS OF THE CONTRACTING PROCESS FOR AN ERP SYSTEMcscpconf
Enterprise Resource Planning (ERP) systems integrate information across an entire organization that automate core activities such as finance/accounting, human resources,
manufacturing, production and supply chain management… etc. to facilitate an integrated centralized system and rapid decision making– resulting in cost reduction, greater planning, and increased control. Many organizations are updating their current management information systems with ERP systems. This is not a trivial task. They have to identify the organization’s
objectives and satisfy a myriad of stakeholders. They have to understand what business processes they have, how they can be improved, and what particular systems would best suit
their needs. They have to understand how an ERP system is built; it involves the modification of an existing system with its own set of business rules. Deciding what to ask for and how to select the best option is a very complex operation and there is limited experience with this type of contracting in organizations. In this paper we discuss a particular experience with contracting
out an ERP system, provide some lessons learned, and offer suggestions in how the RFP and bid selection processes could have been improved.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of time is consumed in collecting requirements from the organization to build an archiving system. Sometimes the system does not meet the organization needs. This paper proposes a domain-based requirement engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed during analyzing and designing the archiving systems decreased significantly. The proposed methodology also reduces the system errors that may happen at the early stages of the development of the system.
AN ITERATIVE HYBRID AGILE METHODOLOGY FOR DEVELOPING ARCHIVING SYSTEMSijseajournal
With the massive growth of the organizations files, the needs for archiving system become a must. A lot of
time is consumed in collecting requirements from the organization to build an archiving system. Sometimes
the system does not meet the organization needs. This paper proposes a domain-based requirement
engineering system that efficiently and effectively develops different archiving systems based on new
suggested technique that merges the two best used agile methodologies: extreme programming (XP) and
SCRUM. The technique is tested on a real case study. The results shows that the time and effort consumed
during analyzing and designing the archiving systems decreased significantly. The proposed methodology
also reduces the system errors that may happen at the early stages of the development of the system.
The purpose of this paper is to design reference architecture for intelligent personal
learning environments (PLE). This research effort is a result of a multi-stage approach.
First, semi-structured interviews have been conducted with software development
practitioners working in a large technology and communications services provider
company. Interview content has been evaluated using thematic analysis. Second,
reference architecture for intelligent personal learning environments has been designed
and validated using the Software Architecture Analysis Method (SAAM). During SAAM
evaluation, the output of the first phase and previous Personal Learning Environment
literature reviews has been used. As a result, we demonstrated a novel architecture for
personal learning environments. Proposed personal learning architecture has met the
requirements of industry demands and previous literature.
Net impact implementation application development life-cycle management in ba...CSITiaesprime
Digital transformation in the banking sector creates a lot of demand for application development, either new development or application enhancement. Continuous demand for reimagining, revamping, and running applications reliably needs to be supported by collaboration tools. Several big banks in Indonesia use Atlassian products, including Jira, Confluence, Bamboo, Bitbucket, and Crowd, to support strategic company projects. We need to measure the net impact of application development life-cycle management (ADLM) as a collaboration tool. Using the deLone and McLean model, process questionnaire data from banks in Indonesia that use ADLM. Processing data using structural equation modeling (SEM), multiple variables are analyzed statistically to establish, estimate, and test the causation model. The conclusions highlight that system quality strongly affected only User Satisfaction (p=0.049 and β=0.39). Information quality strongly affected use (p=0.001 and β=0.84) and strongly affected user satisfaction (p=0.169 and β=0.28). Service quality strongly affected only use (p=0.127 and β=0.31). Conclusion research verifies the information system's achievement approach described by DeLone and McLean. Importantly, it was discovered that system usability and quality were key indicators of ADLM success. To fulfill their objective, ADLM must be developed in a way that is simple to use, adaptable, and functional.
CRESUS-T: A COLLABORATIVE REQUIREMENTS ELICITATION SUPPORT TOOLijseajournal
Communicating an organisation's requirements in a semantically consistent and understandable manner
and then reflecting the potential impact of those requirements on the IT infrastructure presents a major
challenge among stakeholders. Initial research findings indicate a desire among business executives for a
tool that allows them to communicate organisational changes using natural language and a model of the IT
infrastructure that supports those changes. Building on a detailed analysis and evaluation of these findings,
the innovative CRESUS-T support tool was designed and implemented. The purpose of this research was to
investigate to what extent CRESUS-T both aids communication in the development of a shared
understanding and supports collaborative requirements elicitation to bring about organisational, and
associated IT infrastructural, change. In order to determine the extent shared understanding was fostered,
the support tool was evaluated in a case study of a business process for the roll out of the IT software
image at a third level educational institution. Statistical analysis showed that the CRESUS-T support tool
fostered shared understanding in the case study, through increased communication. Shared understanding
is also manifested in the creation of two knowledge representation artefacts namely, a requirements model
and the IT infrastructure model. The CRESUS-T support tool will be useful to requirements engineers and
business analysts that have to gather requirements asynchronously.
AN OVERVIEW OF EXISTING FRAMEWORKS FOR INTEGRATING FRAGMENTED INFORMATION SYS...ijistjournal
Literatures show that there are several structured integration frameworks which emerged with the aim of facilitating application integration. But weakness and strength of these frameworks are not known. This paper aimed at reviewing these frameworks with the focus on identifying their weakness and strength. To accomplish this, recommended comparison factors were identified and used to compare these frameworks. Findings shows that most of these structure frameworks are custom based on their motives. They focus on integrating applications from different sectors within an organization for the purpose of eliminating communication inefficiencies. There is no framework which guides application’s integrators on goals of integrations, outcomes of integration, outputs of integration and skills which will be required for types of applications expected to be integrated. The study recommended further study on integration framework especial on designing unstructured framework which will support and guide application’s integrators with consideration on consumer’s surrounding environment.
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
2. 94 Computer Science & Information Technology (CS & IT)
This increasing importance and rapid change forced the software education to be adaptive to the
market needs. Increasing costs in the software industry, applied wrong strategies, the desires to
rise in quality and performance issues and so fast technology changes had revealed the need to
educate experts in the field and qualified software developers. Therefore, the university-industry
collaboration has gained utmost importance.
Zhengyu stated that a lot of strong software professionals were urgently required in the
community but employers felt that the graduates had the software talent shortage while a
considerable number of graduates could not find a suitable position [3].
In another study, Kuang and Han proposed the methods of teaching reform as guided by market
demand, to update the teaching content, to optimize the teaching methods, to reform the teaching
practice, to strengthen the teacher-student exchange and to promote teachers and students
together because software development training could not meet the needs of the community [4].
Among the software development departments, software Engineering (SE) is the fastest-evolving
engineering discipline that has ability to provide tools and methods for all areas of society [5].
This situation increases the responsibility of SE education to prepare SE professionals for the
industry by providing them with skills to meet the expectations of the software industry.
Innovations and improvements in the curriculum are required to bridge academia-industry gap [6]
since SE education has inability to provide students with large-scale software development
experiences [7]. However, only universities can produce highly skilled professionals who can
satisfy the needs of software industry by taking into account different standards, frameworks and
recommendations developed by interest groups [8].
A study presented software engineering education evolvement in Turkey to provide an
assessment of SE curriculum in Turkish Universities with respect to IEEE/ACM guidelines given
in SEEK (2004) and to provide a guideline to universities conducting an SE programme at
undergraduate level to align their course curriculum with IEEE/ACM guidelines [9].
Students should have necessary background of programming experience for the study of software
engineering concepts in their curriculums. In order to satisfy this condition, the current software
engineering guidelines include concepts and programming paradigms that must be mastered
through study and practice. The well-known guideline for software engineering curricula is
recommended by IEEE/ACM. This guideline gives the standards related to course scheduling,
faculty preparation, student loads, hardware and software resources, instructional materials and
curriculum development. ACM published “Curriculum Guidelines for Undergraduate Degree
Programs in Software Engineering (SE2004)” to provide guidance to academic institutions and
accreditation agencies about what should constitute an undergraduate software engineering
education [10].
This study is related to curriculum development and human resources in software development.
In addition, association rule mining on software job ads is applied. There are similar studies in
literature as follows. Chien and Chen developed a data mining framework for personnel selection
to explore the association rules between personnel characteristics and work behaviors, including
work performance and retention. Moreover, they used decision tree analysis to discover latent
knowledge and extract the rules to assist in personnel selection decisions [11].
3. Computer Science & Information Technology (CS & IT) 95
Mohsin, Ahmad, Din, Mahamud and Din proposed an intelligent model that is aimed at
facilitating key workers select suitable trainees for a training program. In this study, trainees
dataset was mined using association rule to discover important personality characteristics. Their
model produced an efficient selection process and suitable trainees [12].
In another study, Ali and Rajamani presented the solution for selecting appropriate talented
personnel resumes without risk factors using association rule mining. The practical experimental
results obtained from the proposed model encouraged human resource department to take prompt
decisions for recruiting talented personnel accurately without wasting interviewers’ time of
employer and employee. Also, they indicated that the proposed system reduced frequent
resignations, improved performance of talented personnel without training cost and continuous
monitoring [13].
Finally, Smith and Ali indicated that today’s rapid changing and competitive environment
required educators to stay alongside of the job market in order to prepare their students for the
jobs being demanded. They also implied that data mining methods were suitable for this kind of
analysis due to the large volume of job data generated through the web instead of the classical
data analysis methods. Their study illustrated the experience with employing mining techniques
to understand the trend in IT Technology jobs. At the end, collected data from an online agency
was analysed to reach a conclusion about the trends in the job market [14].
In this study, the core part of Software Development Curriculum is determined by applying
association rule mining on Software Job ads in Turkey. As a result, software engineering or
related fields that give education in software development should include these core courses in
their curriculum in order to adapt the software development industry in Turkey.
The rest of this paper is organized as follows: The second chapter makes mention of association
rules and the third chapter depicts how to apply association rule mining on software ads. The
fourth chapter gives results and discussion with respect to the association rule mining. Finally,
the fifth chapter gives the conclusion.
2. ASSOCIATION RULES
One of the important tasks for Knowledge Discovery in data is Association Rule Mining which is
a well-known procedure in data mining. In its basic structure, every association rule fulfilling the
minimum support and confidence are extracted [15]. The general purpose of an association rule A
=> B is to denote that records possessing attribute A also tend to possess attribute B. The aim is
to find association rules which are considered sufficiently interesting as defined by one or more
measures. Most common formulas for support and confidence are as follows [16]:
Support(A=>B)=
ห|∧|ห
|ୈ|
(1)
Confidence(A=>B) =
ห|∧|ห
||||
(2)
where |D| indicates total number of records and ||A|| refers to total number of record including
A.
4. 96 Computer Science & Information Technology (CS & IT)
2.1. Apriori Algorithm
Apriori is an algorithm which is developed for common set learning mining on transactional
database and association rule learning [17]. Apriori uses a level-wise search, where k-itemsets are
used to explore (k+1) itemsets. First, the set of frequent 1-itemsets denoted by L1 is found by
scanning the dataset to find the count for each item, and collecting those items satisfying
minimum support. Then, L1 is used to find L2, the set of frequent 2-itemsets, which is used to
find L3, and so on, until no more frequent k-item sets can be found. The finding of each Lk
requires one full scan of the dataset. The Apriori property is used to improve the efficiency of the
level-wise generation of frequent item sets by reducing the search space [18].
The Apriori property is based on the following interpretations. By definition, if an item set I does
not satisfy the minimum support threshold, min_sup, then I is not frequent (P(I)<min_sup). If an
item A is added to the item set I, then the resulting item set cannot happen more frequently than I.
Therefore, I U A is not frequent either (P(I U A) < min_sup ) [18].
3. ASSOCIATION RULE MINING ON SOFTWARE JOB ADS
3.1 Collecting Data
The data used in this study is taken from one of the popular job recruitment site in Turkey and
currently available ads about software are examined from 5 big cities that are Istanbul (European
Side), Istanbul (Asian Side), Ankara, Izmir and Bursa. At the end feature list and sub-categories
are prepared with respect to job ads for using in the data set [19].
653 software job ads in 5 big cities are collected from this job recruitment site in Excel format.
Finally, 30 main features are determined for finding suitable candidates for the position as shown
in Tab. A.I in Appendix.
3.2 Data Processing
After creating the initial dataset, it is observed that the year of experience in software features can
be important. Consequently, 30 features and some information within these features have been
separated. For example, considering the experience in programming languages on the job
recruitment site, programming languages are divided into 8 pieces as C, C++, C#, Java, Php,
Objective C and the other programming languages. On the other hand, experience levels are
divided into 7 as 0 (Not Acknowledged), 1, 2, 3, 4, 5 and 5+ (Years). Programming language and
experience level features are combined for simplicity. For example, if C# feature contains 2, at
least 2 year-experience is required. In addition, as example qualifications in the special
programming techniques are grouped and new features are created under new names as Software
Architecture Methodologies, Software Patterns, Programming Paradigms and Other Software
Development Processes as shown in Tab. A.II in Appendix. Finally, 653 ads are entered for the
features in Table A.II.
Then, the data is visualized in terms of database systems, programming languages, Front-end
technologies and other software technologies. As shown in Fig. 1, the leading database systems in
5. Computer Science & Information Technology (CS & IT) 97
job ads are MS SQL, Oracle and MySql. The mostly used programming languages are C#, Java
and C++ in job ads as depicted in Fig. 2
Figure 1. The leading database systems in software job ads
Figure 2. The leading programming languages in job ads
In similar way, Fig. 3 shows the leading front-end development technologies in job ads where
Javascript is prominent technology for front-end development. The other software technologies
such as software architecture, software paradigms and web services are essential as shown in Fig.
4.
Figure 3. The leading Front-end technologies in job ads
6. 98 Computer Science & Information Technology (CS & IT)
Figure 4. The leading software technologies in job ads
3.3 Applying Apriori Algorithm
Fig. 1, Fig. 2, Fig. 3 and Fig. 4 above give the frequencies of related technologies but they don’t
give which technologies are related to each other. Moreover, one job ad can contain more than
one software technology at the same time. For this purpose, association rule mining by using
apriori algorithm is applied in assessment. Different combinations trying out through the features
analysis has been done. Minimum support value has been taken as 0.1 and confidence value has
been taken as 0.5 in the analysis process. At the end, 54 rules are determined regarding software
development.
4. RESULTS AND DISCUSSION
The rules obtained by apriori algorithm are divided into 3 parts as follows:
1. Programming languages, frameworks and databases
2. Front-end web technologies
3. Web services, software architectures and programming paradigms
There are 23 rules related to programming languages, frameworks and databases as shown Tab.
1. If the result sides of these rules are noted, Education_Level=3 (B.Sc. Degree), Position=1
(Software Specialist) are prominent results. On the left side of rule 1, {Java=0} condition means
that Java is necessary but the year of experience is not important. The same thing can be said for
C# if the rule 8 is considered. While 87% of ads that want Java experience require at least B.Sc.
degree (Rule 1), 74% of ads that want C# experience require at least B.Sc. degree (Rule 14). It
can be argued from these rules that the university degree is more important in Java than C#.
Looking at rules 6 and 12, the similar result can be obtained for Oracle (79%) and MS SQL
Server (75%). The rules 4 (80%), 5 (80%) show that the ads seeking for C# experience with
MS.NET or ASP.NET framework experience categorize the job seekers as Software Specialists.
In rule 2, the same result can be obtained for 82% of ads seeking for C# experience with MS SQL
Server experience. From the rule 4, 5 and 7, it can be concluded that Job seekers knowing C#
should have enough experience in MS.NET, ASP.NET framework and MS SQL Server. If the
rule 8 is compared with the rule 21, it can be said that while 77% of the ads seeking for C#
7. Computer Science & Information Technology (CS & IT) 99
categorize the job seekers as Software Specialist, the corresponding ratio for Java is 67%. From
these rules, it can be decided that C# experience more valuable for the software firms in Turkey.
The similar result is valid for MS SQL Server (75% in rule 13) and Oracle (71% in rule 18).
Another interesting result can be obtained from the rules 22 and 23 that Oracle ads and Java ads
are separated from each other. However, C# and MS SQL Server are combined in rules 2 and 15.
It means that Oracle and Java are complicated technologies that cannot be known by one
specialist while C# and MS SQL Server are moderate technologies that can be known by one
specialist.
Table 1. Rule Extraction for Programming Languages Frameworks and Database through the Apriori
Algorithm
No Rule Confidence
Value
1 If {Java=0} ==> Education_Level =3 0.87
2 If {C#=0 ∩ MSSQL=0} ==> Position =1 0.82
3 If {Other_Languages =0} ==> Position=1 0.81
4 If {C#=0 ∩ AspDotNetFramework=0} ==> Position =1 0.80
5 If {C#=0 ∩ DotNetFramework=0} ==> Position =1 0.80
6 If {Oracle=0} ==> Education_Level =3 0.79
7 If {AspDotNetFramework =0} ==> C#=0 0.78
8 If {C#=0} ==> Position=1 0.77
9 If {DotNetFramework=0} ==> Position =1 0.76
10 If {DotNetFramework=0} ==> Education_Level =3 0.75
11 If {AspDotNetFramework=0} ==> Position =1 0.75
12 If {MSSQL=0} ==> Education_Level =3 0.75
13 If {MSSQL=0} ==> Position =1 0.75
14 If {C#=0} ==> Education_Level=3 0.74
15 If {C#=0 ∩ MSSQL=0} ==> Education_Level =3 0.73
16 If {C#=0 ∩ DotNetFramework=0} ==> Education_Level =3 0.73
17 If {Other_Languages=0} ==> Education_Level =3 0.72
18 If {Oracle=0} ==> Position =1 0.71
19 If {DotNetFramework =0} ==> C#=0 0.68
20 If {AspDotNetFramework=0} ==> Education_Level =3 0.67
21 If {Java=0} ==> Position =1 0.67
22 If {Java=0} ==> Education_Level =3 ∩ Position =1 0.60
23 If {Oracle=0} ==> Education_Level =3 ∩ Position =1 0.56
20 rules are available about front-end web technologies as shown in Tab. 2. The rule 24 indicates
that 83% of ads that want ajax knowledge require javascript as well (year of experience is not
important). Moreover, 81% of ads that include ajax and software specialist together want
javascript, too. It can be understood from the rules 24 and 25 that ajax and javascript should be
taught together. Similar results can be obtained for the rules 26, 27, 28, 30 in a way that there is a
strong relationship among ajax, jquery, javascript, HTML and CSS in terms of software
development education in front-end web technology. Also, the rules 32, 34, 36, 37 and 39 imply
that at least B.Sc. degree is required at most of the times for front-end development. The rules 24
and 43 show that while 83% of ads that want ajax knowledge require javascript, only 53% of ads
that want javascript require ajax. From these rules, it can be extracted that javascript education is
more fundamental than ajax for front-end education. Another important item for front-end
development is XML as indicated in the rules 32, 33, 40 and 41. The rules 32 and 33 indicate that
8. 100 Computer Science & Information Technology (CS & IT)
the candidates knowing XML should have at least B.Sc. degree and be software specialist at an
important level over 70%. The rules 40 and 41 imply the relation between XML and other web
technologies HTML, CSS and web services. As 62% of ads requiring XML also want HTML and
CSS (rule 40), 56% ads requiring XML want web services. These rules mean that XML is more
common data format for data transfer in web platforms. Actually, a few ads include JSON data
format but they are eliminated by apriori algorithm because of their low support count. It means
that XML is more common in the market in Turkey.
Table 2. Rule Extraction for Front-End Web Technologies through the Apriori Algorithm
No Rule Confidence
Value
24 If {Ajax=0} ==> Javascript=0 0.83
25 If {Ajax=0 ∩ Position =1} ==> Javascript=0 0.81
26 If {Javascript=0} ==> HTML_CSS=0 0.81
27 If {Ajax=0} ==> HTML_CSS=0 0.78
28 If {Jquery=0} ==> HTML_CSS=0 0.78
29 If {Ajax=0} ==> Position =1 0.78
30 If {Jquery=0} ==> Javascript=0 0.76
31 If {Ajax=0 ∩ Javascript=0} ==> Position =1 0.76
32 If {XML=0} ==> Education_Level =3 0.75
33 If {XML=0} ==> Position =1 0.71
34 If {HTML_CSS=0} ==> Education_Level =3 0.70
35 If {Javascript=0} ==> Position =1 0.68
36 If {Ajax=0} ==> Education_Level =3 0.68
37 If {Javascript=0} ==> Education_Level =3 0.67
38 If {Education_Level =3 ∩ Javascript=0} ==> Position =1 0.67
39 If {HTML_CSS=0 Javascript=0} ==> Education_Level =3 0.66
40 If {XML=0} ==> HTML_CSS=0 0.62
41 If {XML=0} ==> Web_Services=0 0.56
42 If {HTML_CSS=0 ∩ Javascript=0} ==> Ajax=0 0.55
43 If {Javascript=0} ==> Ajax=0 0.53
11 rules are obtained related to web services, software architectures and programming paradigms
as depicted in Tab. 3. These rules mostly focus on B.Sc. degree and software specialist position.
In fact, there are other ads focusing on other positions such as database administrator or software
test specialist but they are eliminated because of their low support counts. This means that the
most of software firms give ads focusing on software specialists as shown in rules 49, 51, 52.
From the other perspective, software architectures, web services and programming paradigms
(object oriented programming, functional programming etc.) topics are very special software
technologies that should be carried out by software engineers or equivalents having at least B.Sc.
degree as seen in rules 44, 45, 46, 47 and 48. The rules 53 and 54 imply B.Sc. degree and
software specialist position at the same time. 53% ads including web services imply B.Sc. degree
and software specialist position together (rule 53). The same thing is valid for programming
paradigms (rule 54). The Programming paradigm stands for the styles of various programming
languages such as Phyton, Lisp, F# and Objective-C.
9. Computer Science & Information Technology (CS & IT) 101
Table 3. Rule Extraction for Web Services, Software Architectures and Programming Paradigms through
the Apriori Algorithm
No Rule Confidence
Value
44 If {Software_Architectures=0} ==> Education_Level =3 0.84
45 If {Web_Services=0} ==> Education_Level =3 0.83
46 If {Position=1 ∩ Web_Services=0} ==> Education_Level =3 0.80
47 If {Programming_paradigms=0} ==> Education_Level =3 0.78
48 If {Position=1 ∩ Programming_paradigms=0} ==> Education_Level =3 0.77
49 If {Software_Architectures=0} ==> Position =1 0.68
50 If {Programming_paradigms=0} ==> Position =1 0.68
51 If {Education_Level =3 ∩ Programming_paradigms =0} ==> Position =1 0.67
52 If {Education_Level =3 ∩ Web_Services=0} ==> Position =1 0.64
53 If {Web_Sevices=0} ==> Education_Level =3 ∩ Position =1 0.53
54 If {Programming_paradigms =0} ==> Education_Level =3 ∩ Position =1 0.53
With respect to the rules above, the following courses should be included in Software
Development Curriculum as compulsory core courses as shown in Tab. 4. These courses are
compatible with IEEE/ACM computer science curriculum where it is dictated that successfully
deploying an updated computer science curriculum at any individual institution requires
sensitivity to local needs [20]. The rules above correspond to the local needs in Turkey.
The rules 2, 10, 12 and 15 in Tab. 1 imply that MS SQL Server is a fundamental database system
for software developers. Thus, Database Systems-I course focusing on relational database
concept by MS SQL Server is included in the curriculum. In similar way, since Oracle is also
very popular in the market according to the rules 6, 18, 23 in Tab. 1 Database Systems-II course
focusing on Oracle should be involved. The most popular language in Turkey is C# on MS.Net
framework according to the rules 4, 5, 7, 8, 9, 10, 15, 16 and 19. Because the easiest way to start
to learn C# is Windows Desktop environment, Desktop Programming course should be given in
the curriculum. The rules 1, 21, 22, 47, 48, 50, 51, and 54 in Tab. 1 indicate that Java language is
second popular language in Turkey. Since Java includes all object-oriented principles Object-
Oriented Programming course applying the basic principles on Java is recommended. Web
development can be divided into two parts as front-end and back-end web development. While
the rules 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42 and 43 in Tab. 2
imply Front-End Web Development course, the rules 4, 7, 11, 16, 19 in Tab. 2 involve Back-End
Web Development. Front-end development should include HTML, CSS, Javascript, Jquery,
Ajax, XML. Relating to the rules 4, 7, 11, 16, 19 in Tab. 1, the most popular back-end web
programming is ASP.NET with C# in Turkey. As for the rules 47, 48, 50, 51, 54, the
programming paradigm concept refers to various programming languages having different
programming styles. As a result, Programming Language Concept lecture should be included in
order to teach different programming languages such as Phyton, Lisp, F#, Objective-C. Finally,
Software Architecture course is recommended as compulsory course since the rules 44 and 49 in
Tab. 3 show the importance of software architectures focusing on multi-tier architectures and web
services.
10. 102 Computer Science & Information Technology (CS & IT)
Table 4. The Core Part of Software Development Curriculum for Undergraduate Degree Programs
Year/
Semester
Related Tech. Course Name Related Rules
2/1 MS SQL Server Database Systems-I 7, 12, 13, 15
2/1 C#, MS.Net Framework Desktop Programming 5, 7, 8, 9, 10, 14,
15, 19
2/1 Java Object Oriented
Programming
1, 21, 22, 47, 48,
50, 51, 54
2/2 Oracle Database Systems-II 6, 18, 23
2/2 HTML, CSS, JavaScript,
Jquery, Ajax, XML
Front-End Web
Development
24, 25, 26, 27,
28, 29, 30, 31,
32, 33, 34, 35,
36, 37, 38, 39,
40, 41, 42, 43
3/1 ASP.NET Back-End Web
Development
4, 7, 11, 16, 19
3/1 Phyton, Lisp, F#,
Objective-C
Programming Language
Concepts
47, 48, 50, 51, 54
3/2 Web Services, Multi-Tier Software Architecture 44, 49
5. CONCLUSION
Due to consistent growth in software market and rapid change in software technology, the
adaption of software development curriculum is necessary with respect to criteria desired by
software development industry.
This study has a contribution to the literature in a way that it applies association rule mining on
software job ads to help the managers decide on the software development curriculum. In this
study, the software job ads regarding the first 5 cities having intensive ads are obtained from a
famous Turkish employment web site. While determining the features required for association
rule mining, the years of experience on software expertise areas is considered. After applying
association rule mining, the rules related to desires of software companies are achieved.
Considering the criteria owned by software job ads, it is investigated that practical part of
software development education should be increased. Moreover, since the most of job ads seek
the employee at minimum B.Sc. level, the importance of software engineering or related fields is
increasing as well. As the companies request the new software technologies as well as
fundamental programming abilities, it is vital to revise the software development curriculum at
the universities. However, the most of them are very late to adapt their curriculums to the criteria
of the companies. Actually, it not enough to revise the curriculums but also academic personnel
in these departments should renew their knowledge on the new software technologies.
Since there are many departments related to software development such as software engineering,
computer engineering etc., it is necessary to determine the core courses of software development.
For this purpose, the core courses are determined by using association rule mining on software
job ads and IEEE/ACM computer science curriculum. The core courses should be common for all
departments related to software development because they reflect the local need of the software
development companies in Turkey.
11. Computer Science & Information Technology (CS & IT) 103
As a future study, it is also important to gather the academic personnel and the software company
professionals to focus on the hot software technologies. With respect to the results obtained from
these meetings, the compulsory and elective lectures should be determined so that newly
graduated software developers can easily adapt to the software projects in the market. As a result,
it will be easier to find a job for them and to hire a proper developer for the companies without
giving extra training.
REFERENCES
[1] Laplante, P. A.. What every engineer should know about. Taylor & Francis Group., Boca Raton, FL,
2007 [Online]. Available:http://lib.mdp.ac.id/ebook/Karya%20Umum/Every-Engineer-Should-Know-
about-Software-Engineering.pdf
[2] Mccracken, M., et al. A proposed curriculum for an undergraduate software engineering degree. In:
Software Engineering Education Training. // In Proc. 13th Conference on. IEEE, 2000, p. 246-257.
[3] Zhengyu, G. R. Y. Strengthening Practices and Researches in the Education of Corporation of
Enterprises, Colleges and Institutions. Jiangsu Social Sciences, S2, 2007.
Available: http://en.cnki.com.cn/Article_en/CJFDTOTAL-JHKX2007S2007.htm
[4] Kuang, L. Q.; Han, X. The Research of Software Engineering Curriculum Reform. Physics Procedia.
[Online] 33(2012), pp. 1762-1767.
Available: http://www.sciencedirect.com/science/article/pii/S1875389212015957
[5] Král, J.; Zemlicka, M. Engineering Education-A Great Challenge to Software Engineering. // In
Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference, pp.
488-495.
[6] Shaw, M.; Herbsleb, J. D.; Ozkaya, I. Deciding What to Design: Closing a Gap in Software
Engineering Education. // Invited paper for Education and Training Track of 27th Int. Conf. on
Software Engineering (ICSE 2005), 2005, pp. 607 – 608.
[7] Su, H.; Jodis, S.; Zhang, H. Providing an integrated software development environment for
undergraduate software engineering courses. // Journal of Computing Sciences in Colleges. [Online]
23, 2(2007), pp. 143-149. Available: http://dl.acm.org/citation.cfm?id=1292453
[8] Jaakkola, H.; Henno, J.; Rudas, I. J. IT Curriculum as a complex emerging process. // In
Computational Cybernetics, 2006. ICCC 2006. IEEE International Conference on 2006, pp. 1-5
[9] Mishra, A.; Yazici, A. An Assessment of the Software Engineering Curriculum in Turkish
Universities: IEEE/ACM Guidelines Perspective. // Hrvatski časopis za odgoj i obrazovanje. [Online]
13, 1(2011), pp. 188-219. Available: http://hrcak.srce.hr/72403
[10] Computing Curricula (CC) (2005). Guidelines for Associate-Degree Transfer Curriculum in Software
Engineering.
Available:http://www.capspace.org/committee/CommitteeFileUploads/TYC_SE_report.pdf
[11] Chien, C. F.; Chen, L. F. Data mining to improve personnel selection and enhance human capital: A
case study in high-technology industry. // Expert Systems with applications. [Online] 34, 1(2008), pp.
280-290. Available: http://www.sciencedirect.com/science/article/pii/S0957417406002776
12. 104 Computer Science & Information Technology (CS & IT)
[12] Mohsin, M. F.; Ahmad, M. F; Din, A. M.; Mahamud, K.R.K.; Din, R. An intelligent trainee selection
model. // In Computer Sciences and Convergence Information Technology (ICCIT), 6th International
Conference on, 2011, pp. 390-
[13] Ali, M. M.; Rajamani, L
manpower considering risk factor: A data mining approach. // In Information Retrieval & Knowledge
Management (CAMP), International Conference on 2012, pp. 39
[14] Smith, D.; Ali, A. Analyzing computer programming job trend using web data mining. // Issues in
Informing Science and Information Technology. [Online] 11, 2014, pp. 203
http://iisit.org/Vol11/IISITv11p203
[15] Ishibuchi, H.; Kuwajima, I.; Nojim
and Pareto-optimality in genetic rule selection. // In Knowledge
Engineering Systems. [Online] 4693, 2007, pp. 509
Available: http://link.springer.c
[16] Agrawal, R.; Imieliński, T.; Swami, A. Mining association rules between sets of items in large
databases. // In ACM SIGMOD Record. 22, 2(1993), pp. 207
[17] Agrawal, R.; Srikant, R. Fast algorithms for mi
large data bases. VLDB 1215, 1994, pp. 487
[18] Han, J.; Kamber, M. Data Mining, Southeast Asia Edition: Concepts and Techniques. Morgan
Kaufmann. 2006.
[19] Job Recruitment Website (JRW). 2
[20] Curriculum Guidelines for Undergraduate Degree Programs in Computer Science (CGCS) (2013,
December). Computer Science Curricula 2013 [Online].
Available: http://www.acm.org/education/CS2013
AUTHORS
Ilkay Yelmen received the BS degree in Software Engineering from the Istanbul
Aydin University in 2013 and he is currently pursuing the MS degree in Computer
Engineering at the Istanbul Technical University. His research interests are Data
Mining and Natural Language Processing.
Metin Zontul received the BS Degree in Computer Engineering from Middle East
Technical University, Ankara, Turkey, the MS Degree in Computer Science from
Erciyes University, Kayseri, Turkey, and the PhD Degree in
from Cumhuriyet University, Sivas, Turkey. His research interests are software
development, information systems, soft computing and data mining. He is currently
a faculty member of Software Engineering Department at Istanbul Aydin Univers
Istanbul, Turkey.
Computer Science & Information Technology (CS & IT)
in, M. F.; Ahmad, M. F; Din, A. M.; Mahamud, K.R.K.; Din, R. An intelligent trainee selection
model. // In Computer Sciences and Convergence Information Technology (ICCIT), 6th International
-393.
Ali, M. M.; Rajamani, L. Automation of decision making process for selection of talented
manpower considering risk factor: A data mining approach. // In Information Retrieval & Knowledge
Management (CAMP), International Conference on 2012, pp. 39-44.
lyzing computer programming job trend using web data mining. // Issues in
Informing Science and Information Technology. [Online] 11, 2014, pp. 203-214. Available:
http://iisit.org/Vol11/IISITv11p203-214Smith0494.pdf
Ishibuchi, H.; Kuwajima, I.; Nojima, Y. Prescreening of candidate rules using association rule mining
optimality in genetic rule selection. // In Knowledge-Based Intelligent Information and
Engineering Systems. [Online] 4693, 2007, pp. 509-516.
Available: http://link.springer.com/chapter/10.1007/978-3-540-74827-4_64
ski, T.; Swami, A. Mining association rules between sets of items in large
databases. // In ACM SIGMOD Record. 22, 2(1993), pp. 207-216.
Agrawal, R.; Srikant, R. Fast algorithms for mining association rules. // In Proc. 20th int. conf. very
large data bases. VLDB 1215, 1994, pp. 487-499.
Han, J.; Kamber, M. Data Mining, Southeast Asia Edition: Concepts and Techniques. Morgan
Job Recruitment Website (JRW). 2014. Available: http://www.kariyer.net/
Curriculum Guidelines for Undergraduate Degree Programs in Computer Science (CGCS) (2013,
December). Computer Science Curricula 2013 [Online].
Available: http://www.acm.org/education/CS2013-final-report.pdf
Ilkay Yelmen received the BS degree in Software Engineering from the Istanbul
Aydin University in 2013 and he is currently pursuing the MS degree in Computer
Engineering at the Istanbul Technical University. His research interests are Data
Mining and Natural Language Processing.
Metin Zontul received the BS Degree in Computer Engineering from Middle East
Technical University, Ankara, Turkey, the MS Degree in Computer Science from
Erciyes University, Kayseri, Turkey, and the PhD Degree in Numerical Methods
from Cumhuriyet University, Sivas, Turkey. His research interests are software
development, information systems, soft computing and data mining. He is currently
a faculty member of Software Engineering Department at Istanbul Aydin University,
in, M. F.; Ahmad, M. F; Din, A. M.; Mahamud, K.R.K.; Din, R. An intelligent trainee selection
model. // In Computer Sciences and Convergence Information Technology (ICCIT), 6th International
. Automation of decision making process for selection of talented
manpower considering risk factor: A data mining approach. // In Information Retrieval & Knowledge
lyzing computer programming job trend using web data mining. // Issues in
214. Available:
a, Y. Prescreening of candidate rules using association rule mining
Based Intelligent Information and
ski, T.; Swami, A. Mining association rules between sets of items in large
ning association rules. // In Proc. 20th int. conf. very
Han, J.; Kamber, M. Data Mining, Southeast Asia Edition: Concepts and Techniques. Morgan
Curriculum Guidelines for Undergraduate Degree Programs in Computer Science (CGCS) (2013,
13. Computer Science & Information Technology (CS & IT) 105
Appendix
Table AI. Main Features and Their Sub Details in Software Job Ads
14. 106 Computer Science & Information Technology (CS & IT)
Table AII. The Final Dataset Structure for Software Job Ads