604 research outputs found

    A Parsing Scheme for Finding the Design Pattern and Reducing the Development Cost of Reusable Object Oriented Software

    Full text link
    Because of the importance of object oriented methodologies, the research in developing new measure for object oriented system development is getting increased focus. The most of the metrics need to find the interactions between the objects and modules for developing necessary metric and an influential software measure that is attracting the software developers, designers and researchers. In this paper a new interactions are defined for object oriented system. Using these interactions, a parser is developed to analyze the existing architecture of the software. Within the design model, it is necessary for design classes to collaborate with one another. However, collaboration should be kept to an acceptable minimum i.e. better designing practice will introduce low coupling. If a design model is highly coupled, the system is difficult to implement, to test and to maintain overtime. In case of enhancing software, we need to introduce or remove module and in that case coupling is the most important factor to be considered because unnecessary coupling may make the system unstable and may cause reduction in the system's performance. So coupling is thought to be a desirable goal in software construction, leading to better values for external software qualities such as maintainability, reusability and so on. To test this hypothesis, a good measure of class coupling is needed. In this paper, based on the developed tool called Design Analyzer we propose a methodology to reuse an existing system with the objective of enhancing an existing Object oriented system keeping the coupling as low as possible.Comment: 15 page

    Learning object semantic description for enhancing reusability

    Get PDF
    In the design of activities for Web-Based Education Systems, the concept of Didactic Object or Learning Object, has appeared as the axis of a new paradigm concerned with the reusability of contents and activities, due to its organization from a conceptual point of view, the use of metadata in known formats and the setting of new standards. In this article, the concept of reusability is analyzed within the context of the systems mentioned. In addition, Sowa-Style Conceptual Maps as well as Hypermedia Conceptual Maps are proposed as schemes capable of representing knowledge, since they allow for a clear visualization and tend to enable known automated functionalities accurately. The above mentioned resources tend to complete the information in metadata with regard to the semantic aspect.Facultad de Informátic

    Learning object semantic description for enhancing reusability

    Get PDF
    In the design of activities for Web-Based Education Systems, the concept of Didactic Object or Learning Object, has appeared as the axis of a new paradigm concerned with the reusability of contents and activities, due to its organization from a conceptual point of view, the use of metadata in known formats and the setting of new standards. In this article, the concept of reusability is analyzed within the context of the systems mentioned. In addition, Sowa-Style Conceptual Maps as well as Hypermedia Conceptual Maps are proposed as schemes capable of representing knowledge, since they allow for a clear visualization and tend to enable known automated functionalities accurately. The above mentioned resources tend to complete the information in metadata with regard to the semantic aspect.Facultad de Informátic

    Attribute Based Encryption for Secure Data Access in Cloud

    Get PDF
    Cloud computing is a progressive computing worldview, which empowers adaptable, on-request, and ease use of Information Technology assets. However, the information transmitted to some cloud servers, and various protection concerns are arising out of it. Different plans given the property-based encryption have been proposed to secure the Cloud Storage. In any case, most work spotlights on the information substance security and the get to control, while less consideration towards the benefit control and the character protection. In this paper, a semi-anonymous benefit control conspires AnonyControl to address the information protection, as well as the client character security in existing access control plans. AnonyControl decentralizes the central authority to restrain the character spillage and accordingly accomplishes semi-anonymity. Furthermore, it likewise sums up the document get to control to the benefit control, by which advantages of all operations on the cloud information managed in a fine-grained way. Along these lines, display the AnonyControl-F, which ultimately keeps the character spillage and accomplish the full secrecy. Our security assessment demonstrates that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie-Hellman presumption, and our execution assessment shows the attainability of our plans. Index Terms: Anonymity, multi-authority, attribute-based encryption

    Generating Embedded Systems Software using a Component Based Development Approach

    Get PDF
    This work examines how a predominantly graphical approach to software development, that was designed to be deployment platform agnostic, can be used to target embedded software systems. The general aim of the approach was to provide engineers with a development method that was general enough to be applied across a multitude of problem domains. The development technique employs a component centric approach, in which target platform specifics are hidden from the language design. Deployment specific mapping tools are then used to target each type of system. Embedded software systems however are probably the most demanding type of target system, due to limited resources and lack of software infrastructure support. This paper describes a method of mapping an example component based design to a target embedded system

    Visual Programming: Concepts and Implementations

    Get PDF
    The computing environment has changed dramatically since the advent of the computer. Enhanced computer graphics and sheer processing power have ushered in a new age of computing. User interfaces have advanced from simple line entry to powerful graphical interfaces. With these advances, computer languages are no longer forced to be sequentially and textually-based. A new programming paradigm has evolved to harness the power of today's computing environment - visual programming. Visual programming provides the user with visible models which reflect physical objects. By connecting these visible models to each other, an executable program is created. By removing the inherent abstractions of textual languages, visual programming could lead computing into a new era
    • …
    corecore