722 research outputs found

    Reconciling Synthesis and Decomposition: A Composite Approach to Capability Identification

    Full text link
    Stakeholders' expectations and technology constantly evolve during the lengthy development cycles of a large-scale computer based system. Consequently, the traditional approach of baselining requirements results in an unsatisfactory system because it is ill-equipped to accommodate such change. In contrast, systems constructed on the basis of Capabilities are more change-tolerant; Capabilities are functional abstractions that are neither as amorphous as user needs nor as rigid as system requirements. Alternatively, Capabilities are aggregates that capture desired functionality from the users' needs, and are designed to exhibit desirable software engineering characteristics of high cohesion, low coupling and optimum abstraction levels. To formulate these functional abstractions we develop and investigate two algorithms for Capability identification: Synthesis and Decomposition. The synthesis algorithm aggregates detailed rudimentary elements of the system to form Capabilities. In contrast, the decomposition algorithm determines Capabilities by recursively partitioning the overall mission of the system into more detailed entities. Empirical analysis on a small computer based library system reveals that neither approach is sufficient by itself. However, a composite algorithm based on a complementary approach reconciling the two polar perspectives results in a more feasible set of Capabilities. In particular, the composite algorithm formulates Capabilities using the cohesion and coupling measures as defined by the decomposition algorithm and the abstraction level as determined by the synthesis algorithm.Comment: This paper appears in the 14th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS); 10 pages, 9 figure

    KeyStroke Dynamics - Dangling Issues of Providing Authentication by Recognising User Input

    Get PDF
    A behavioral biometric such as keystroke dynamics which makes use of the typing cadence of an Individual can be used to strengthen existing security techniques effectively and cheaply. Due to the ballistic (semi-autonomous) nature of the typing behavior it is difficult to impersonate, making it useful as a biometric. Therefore in this paper, we provide a basic background of the behavioural basis behind the use of keystroke dynamics. We also discuss the data acquisition methods, approaches and the performance of the methods used by researchers on standard computer keyboards. In this survey, we find that the use and acceptance of this biometric could be increased by development of standardized databases, assignment of nomenclature for features, development of common data interchange formats, establishment of protocols for evaluating methods, and resolution of privacy issues. Keywords: Authentication, Behavioural biometrics, Identification, keystroke dynamics, typing

    Click Prediction for Advertisement in Websites using Linear Regression

    Get PDF
    Prediction is one of the most powerful and effective method used nowadays for improvement in business. Machine Learning Algorithms plays a vital role in predicting the future of business. It is widely used in the field of Marketing and Advertising fields also. The Commercial Value for the advertisement is gained based on the user click on the website. Digital advertisement and marketing play very important role in influencing the profit of business. Many Machine Learning algorithms were used for predicting and analyzing the online advertisement. In this paper, Linear Regression is used for predicting the user click on the advertisement

    Mobile Ad hoc Networks – Dangling issues of optimal path strategy

    Get PDF
    Ad Hoc network is a collection of wireless mobile hosts forming a  temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing is a process of exchanging information from one station to other stations of the network. Routing protocols of mobile ad-hoc network tend to need different approaches from existing Internet protocols because of dynamic topology, mobile host, distributed environment, less bandwidth, less battery power. The key concern is to analyze the ability of moving nodes in the network using Random Direction Mobility model based on the path availability. Key Words: Mobile ad hoc networks, Routing, Path stabilit

    Biodegradation of Ferulic Acid Using Aspergillus fumigatus

    Get PDF
    The soil samples collected from the dumped sites of coffee industry residues contaminated with ferulic acid at Keezhkadu, Kodaikanal were subjected to serial dilution and the development of fungal colonies in PDA plates. One of the colonies was selected and identified as Aspergillus fumigatus using Lacto phenol cotton blue staining method. The efficiency of the fungal strain on the degradation of different concentrations of the ferulic acid was studied using 5, 10, 15 and 20 ppm of ferulic acid. The changes in pH, COD, and biomass observed were proved statistically significant using ANOVA. It was also confirmed by the appearance of new peaks in HPLC analysis after ten days of treatment. Hence this strain can be used efficient in degrading the phenolic compound
    • …
    corecore