Keywords: digital learning; educational technology; online courses; educational programs; professional education; management systems;
More...Keywords: Software Security; Risk Analysis;
In recent years Agile Software Development Methods have become increasingly popular among members of software development community. Successful Agile teams produce high quality code cost effectively, deliver the product in less time with increased customer satisfaction and exhibit good team – management coordination in delivering the software. With a view to reap benefits of Agile, many IT organizations are currently in the phase of investing time and resource in transitioning to Agile for their software development. By adopting Agile many successful teams have proved that this is the right approach for their software development to produce high quality software. Taking a closer look into the security aspect of the software delivered by Agile Teams reveal that integrating security into the product during development is not considered by many teams. In today’s world, even large organizations find it difficult to produce secure software due to increased security threats. One of the main reasons for this could be attributed to the technical advancement of hackers to successfully launch attacks by exploiting security vulnerability. Regardless of software development methodology practiced, securing a web application against the most common vulnerabilities should be taken into consideration during product development to assure minimal required security for the software and protect it against easy exploitation. In this paper we will analyze security of web software developed by small and medium sized organizations practicing Agile. The focus of this paper is on a simple secure approach to easily integrate security into an existing agile methodology practiced by the organization to produce secure software, thereby establishing a security discipline for agile teams. Further, the paper also discusses some security best practices and secure coding techniques that could be adopted by agile development teams to protect applications against commonly identified security threats.
More...Keywords: Soft Skills; Computer Science; ICT; Nonverbal Communication; Social Networking; Disruptive Innovation;
Industry, government and various professional organizations emphasize the need for the ICT graduates to be able to communicate in the global work environment. The elegant injection of ‘soft skills’ in the ICT curriculum is what differentiates good contemporary ICT programs. This paper presents a joint pilot work in this area between the New Bulgarian University (NBU) and the University of Western Sydney (UWS). This blended learning approach aims to develop broad knowledge and skills in social intelligence in the IT graduates, which will position them competitively in the rapidly transforming global market.
More...In this note, we present an idea for a new Feistel-type block cipher.
More...Keywords: correctness; invariant; methodology; sub goals; puzzles; 15-puzzle;
As Dijkstra and others have pointed out, puzzles can be an effective means for elucidating approaches to problem-solving. Dijkstra used puzzles to demonstrate the efficacy of arguments based on counting rather than on combinatorics. Using his and other puzzles, we show how the Cumulative Subgoal Fulfillment technique formalizes and extends Dijkstra’s approach. CSF is also used to solve the famous 15-puzzle theorem with a short, transparent proof.
More...Keywords: Information Technology; Bulgarian Folklore; Folk songs;
Folk songs are an important and essential part of the Bulgarian cultural heritage. Following the traditions of the 20th century in publishing Bulgarian folk songs, we prepared the book “Folk Songs from Thrace” [3] with scores and lyrics recorded from original performances in the 60s and 80s of the last century. We created a digital library of over 1200 songs, which provides access to songs via full-text search engine. The data sources are stored using advanced information technology to encode texts, notes and sound. Traditional indexes and bookmarks for the book are also developed using our software.
More...Keywords: Virtual Reality; Augmented Reality; Technical Engineering Education;
Virtual Reality (VR) and Augmented Reality (AR) are becoming more and more integrated in everyday human activities. In the field of engineering education the ability to explore the design of a product in a computer generated immersive environment and to verify its functionality using a virtual prototype rather than building a physical one gives significant advantages in the training process and leads to both: time and cost savings. The paper considers and evaluates approaches for introducing VR and AR in the education of computer systems and technologies and mechanical engineering students, presents and discusses practical results.
More...Keywords: On-line information services; Data sharing; Digital libraries;
Computer science graduates are requested to possess complex professional abilities including research skills. In this paper we justify the development of a departmental repository to assist all non-auditoria activities and summarize its benefits. We are convinced that this is the way students and teachers to form interim learning societies.
More...Keywords: Online learning; learning management system; massive open online course; hybrid educational platform; edX; online PLUS; business simulation; international business;
This paper presents the experiences of the author in developing of a pilot web-based educational approach, referred to Online PLUS. Based on a critical review of existing pedagogies and professional trends in the field of online learning and the existing status of the massive open online course (MOOC): a) the purpose and the need of the learning approach Online PLUS is defined, and b) structural similarities, differences, and business models of a course in all three different formats (online, Online PLUS, and MOOC) are discussed. The learning approach Online PLUS brings together, in a diverse classroom, for-credit students and industry practitioners. The benefits and challenges of the diverse classroom are demonstrated and discussed on the example of the seven week online course ‘Doing Business in North America’. The course will have two distinct categories of participants with different involvement and assessment requirements: a) students currently enrolled in the BU online programs, and b) industry practitioners who are looking for opportunities to increase their knowledge in the main subject area, covered in this course. This paper discusses specific methodological aspects for the development of an Online PLUS course as well as requirements and plans for its pilot introduction by Boston University in fall 2014. Finally, concluding observations and recommendations are provided.
More...Keywords: Computers and Education; Information Science Education;
Online courses are being offered globally. Two key concerns that keep coming up are authentication and validation. Authentication is critically important. Many programs have no photo id of the student right through graduation. Validation of work is important - many programs don't have proctored exams. We describe research on both these frontiers at Boston University within the context of our Masters in Computers Information Systems online and online education in general at Metropolitan College. In this paper we provide an overview of a test system called OpMoSys Assessment Validation. It has resulted in us testing student assignments via smartphones and has resulted in assessing a fair grade.
More...Keywords: Teaching Programming; Students; Computer Programming;
This article presents the author’s experience in teaching programming to university students in first and second year. The system for assessing the knowledge and skills of students is an essential part of teaching. It aims not only to assess students, but also to help improving their knowledge. The importance and difficulty of Computer Programming requires specific and unconventional approach to this activity. The article discusses all three elements of ongoing assessment (tests for knowledge, homeworks, and practical programming skills), as well as the rules for final exams and final assessment.
More...Keywords: legacy systems; modernization; reengineering; source code analysis; business rules; extraction of business logic;
Modernization of the so called legacy systems has no alternative. The approaches to do this are various. From one side it is the direct moving of the legacy system to a new hardware platform. From the other it is the total rewriting of the software from scratch. In most of the modernization approaches, however, the usage of the source code of the legacy system (when it is available) could be very helpful. This paper systematizes the different possible stages of the modernization process with usage of the source code of the legacy system together with clarification which of these stages should be accomplish in each of the approaches. The basic methods and instruments necessary for successful solving the tasks of the corresponding stages are outlined, too.
More...Keywords: Project Cost Estimation; Cost Estimating; Standard for Project Estimating; Time Estimation; Cost Estimation;
Project Management Institute has just published a comprehensive Practice Standard for Project Estimating that aligns with the Project Management Body of Knowledge (PMBOK ® Guide). In this paper we illustrate this new practice standard, its inputs, activities and outputs, using real-world cost estimation tools and techniques. In particular, a parametric model designed by the author is used to illustrate how order-of-magnitude cost estimation works within the context of this framework. This paper provides a timely opportunity to understand the Project Estimating global standard and to appreciate three cost estimation techniques - analogous, parametric and bottom-up.
More...Keywords: IT Project Management; Business Analysis; Business Analytics; Big Data; Big Data Business Analysts; Business Intelligence; Metrics and KPIs; Business Value; Business Analysis Tools and Techniques;
The primary role of the big data business analyst is to generate insights that convert the potential value of big data into tangible business value. Big data business analysts are seeking opportunities to apply descriptive, predictive, and prescriptive analytics to solve business issues and to present the insights in an understandable format for the decision-makers of the 21st century enterprise. This paper outlines one educational framework for preparing big data business analysts for the IT project management profession. It is based both on results from a pilot graduate course on IT Business Analysis conducted at NBU Sofia Bulgaria, and on review and analysis of global professional trends and the existing industry demand for big data business analysts in Bulgaria.The success of the pilot course is justified by the number of participants, their feedback and the achievement of the initial set of educational objectives. The industry demand lifecycle is evaluated by critical review of the latest industry standards and professional publications from recognized authors, and by analysis of actual public records and statistics.The authors are identifying the knowledge areas and the educational approaches, used by business analysts from the IT industry for transforming data into meaningful information and for developing reports that enable the managers in charge of advertising, customer service, finance, sales andmarketing to make better business decisions.The educational framework includes hands-on exercises and applications of advanced performance management techniques and tools used for business analysis of the challenges and opportunities by market segments and locations, supply chain and price competitiveness.This paper also presents one possible curricula for new development of graduate courses for preparing of big data business analysts for the IT project management profession. The authors are suggesting appropriate educational formats for best delivery of the proposed new courses.
More...Keywords: Education; Computer-assisted instruction; Interactive learning environments; Computer-managed instruction; Adult education; Student assessment; Computing education programs; Information Technology
One of the fundamental problems that arises in continuing education is the lack of students’ preparation for master’s level courses. Perhaps there were gaps in their prior coursework, or perhaps earlier mastery has lapsed due to the passing of time or to the bustle of full-time employment and family life that is common among our students.In this article, we suggest a way to overcome this problem. We introduce bridge courses, very short tuition-free courses that cover all the terminology used in prerequisite courses and also present the digest of the material used in prerequisite courses. These courses are fully online, imposing little more than the cost of development, and possibly providing additional exposure and appeal for our programs. They include repeatable self-tests by which the student can recapture or reassure knowledge of the requisite base material. Most of all, bridge courses can improve student success in the courses they take and even in our programs as a whole.Bridge courses will make a fast and thorough introduction to graduate courses for students with deficits, or even simple trepidation about those courses or the topics they cover.
More...Keywords: Software engineering; Curriculum issues; Social and professional topics - computer science education
Software production is an integral activity that encompasses the majority of computer science and information technologies knowledge and skills such as algorithms, programming, databases, networking etc. Referring to this, an introductory course on software production summarizes and upgrades the learning achievements of students in bachelor programs of computing. This paper focuses on some curriculum issues in software engineering course. The main discussion concerns the choice of the topics and learning activities. The course should expose fundamental concepts and principles that underlie current and emerging methods, tools, and techniques for cost-effective production of high-quality software systems.
More...Keywords: Prediction error; Multicollinearity; Regression Analysis; RMSECV; Crossvalidation
In this paper will be briefly proposed a regression technique for reducing the prediction error (RMSECV) in multiple regression model. It is based on a method for estimating the model’s regressors based on leave-one-out crossvalidation. Two variations of the method are proposed - one using the Root mean square error (RMSE) and one using the mean absolute error (MAE). Using R language the technique is tested on a real problem concerning financial ratios and the results are compared with the OLS regression error. For the presented example both variations of the method are with lower RMSECV than the OLS one. For the presented example it is observed that when one of the two variations of the proposed method does not reduce the OLS error of an observation than the other does it. Possible advantages when this event occurs are discussed.
More...Keywords: Affine blocking sets; Bruen’s bound; Finite affine geometry; Arcs; Blocking sets; Computing Classification system - 2012; Mathematics and computing; Discrete mathematics; Coding theory
A t-fold blocking set with respect to the hyperplanes is a set of n points in AG(r,q) that meets each hyperplane in at least t points.The cardinality of such blocking set satisfies the following lower bound known as Bruen's bound : n≥ (t+r-1)(q-1)+1.Several classes of blocking sets meeting Bruen's bound are know . It is conjectured that there exists a constant C such that for t>C there exist no affine t-fold blocking sets meeting this bound. In this talk, wepresent several new constructions of affine t-fold blocking sets that are close to Bruen's bound.
More...Keywords: Trade; FDI; International Relations; Data Science; GDELT; World Bank’s income classification; Information systems; Information systems applications; Data mining
International politics and economics are not independent. Often, countries face economic sanctions or deteriorated economic prospects because of adverse political developments. Foreign trade (exports and imports of goods), capital flow in form of foreign direct investments (FDI) or cross-border capital investments have frequently been studied to understand political relationships between countries. On one hand, we have quantitative macroeconomic indicators, and on the other we face qualitative multilevel political relations and events. To better understand the intertwined nature of economics and politics, we use the digitized massive archival news data, the Global Database of Events, Language, and Tone (GDELT) to model and systematically quantify global political processes. We then apply statistical and machine learning methods to analyze these political events correlations with global economies and societies. We categorize countries in four groups, based on the World Bank’s income classification, and find that international relations have strong correlation with economic parameters, highly dependent on countries’ income levels.
More...