722 research outputs found
Reconciling Synthesis and Decomposition: A Composite Approach to Capability Identification
Stakeholders' expectations and technology constantly evolve during the
lengthy development cycles of a large-scale computer based system.
Consequently, the traditional approach of baselining requirements results in an
unsatisfactory system because it is ill-equipped to accommodate such change. In
contrast, systems constructed on the basis of Capabilities are more
change-tolerant; Capabilities are functional abstractions that are neither as
amorphous as user needs nor as rigid as system requirements. Alternatively,
Capabilities are aggregates that capture desired functionality from the users'
needs, and are designed to exhibit desirable software engineering
characteristics of high cohesion, low coupling and optimum abstraction levels.
To formulate these functional abstractions we develop and investigate two
algorithms for Capability identification: Synthesis and Decomposition. The
synthesis algorithm aggregates detailed rudimentary elements of the system to
form Capabilities. In contrast, the decomposition algorithm determines
Capabilities by recursively partitioning the overall mission of the system into
more detailed entities. Empirical analysis on a small computer based library
system reveals that neither approach is sufficient by itself. However, a
composite algorithm based on a complementary approach reconciling the two polar
perspectives results in a more feasible set of Capabilities. In particular, the
composite algorithm formulates Capabilities using the cohesion and coupling
measures as defined by the decomposition algorithm and the abstraction level as
determined by the synthesis algorithm.Comment: This paper appears in the 14th Annual IEEE International Conference
and Workshop on the Engineering of Computer Based Systems (ECBS); 10 pages, 9
figure
KeyStroke Dynamics - Dangling Issues of Providing Authentication by Recognising User Input
A behavioral biometric such as keystroke dynamics which makes use of the typing cadence of an Individual can be used to strengthen existing security techniques effectively and cheaply. Due to the ballistic (semi-autonomous) nature of the typing behavior it is difficult to impersonate, making it useful as a biometric. Therefore in this paper, we provide a basic background of the behavioural basis behind the use of keystroke dynamics. We also discuss the data acquisition methods, approaches and the performance of the methods used by researchers on standard computer keyboards. In this survey, we find that the use and acceptance of this biometric could be increased by development of standardized databases, assignment of nomenclature for features, development of common data interchange formats, establishment of protocols for evaluating methods, and resolution of privacy issues. Keywords: Authentication, Behavioural biometrics, Identification, keystroke dynamics, typing
Click Prediction for Advertisement in Websites using Linear Regression
Prediction is one of the most powerful and effective method used nowadays for improvement in business. Machine Learning Algorithms plays a vital role in predicting the future of business. It is widely used in the field of Marketing and Advertising fields also. The Commercial Value for the advertisement is gained based on the user click on the website. Digital advertisement and marketing play very important role in influencing the profit of business. Many Machine Learning algorithms were used for predicting and analyzing the online advertisement. In this paper, Linear Regression is used for predicting the user click on the advertisement
Mobile Ad hoc Networks – Dangling issues of optimal path strategy
Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing is a process of exchanging information from one station to other stations of the network. Routing protocols of mobile ad-hoc network tend to need different approaches from existing Internet protocols because of dynamic topology, mobile host, distributed environment, less bandwidth, less battery power. The key concern is to analyze the ability of moving nodes in the network using Random Direction Mobility model based on the path availability. Key Words: Mobile ad hoc networks, Routing, Path stabilit
Biodegradation of Ferulic Acid Using Aspergillus fumigatus
The soil samples collected from the dumped sites of coffee industry residues contaminated with ferulic acid at Keezhkadu, Kodaikanal were subjected to serial dilution and the development of fungal colonies in PDA plates. One of the colonies was selected and identified as Aspergillus fumigatus using Lacto phenol cotton blue staining method. The efficiency of the fungal strain on the degradation of different concentrations of the ferulic acid was studied using 5, 10, 15 and 20 ppm of ferulic acid. The changes in pH, COD, and biomass observed were proved statistically significant using ANOVA. It was also confirmed by the appearance of new peaks in HPLC analysis after ten days of treatment. Hence this strain can be used efficient in degrading the phenolic compound
- …