Top PDF Domain Engineering: A Conceptual Model of the Software Application Architecture

Domain Engineering: A Conceptual Model of the Software Application Architecture

Domain Engineering: A Conceptual Model of the Software Application Architecture

Business functional logic is a formal condition and Model of real business objects of business rule that describes a specific procedure. The rules are workflow includes tasks, procedural steps, input and output information tools, definitions and constraints that apply to an organization. Domain logic is the initial task of the software applications architecture, and identification of the software modules and objectization in each module. Also prescribes how business objects interact with one another, and implements the routes and the methods by which business objects are accessed and updated. Business logic determines how this rule is implemented as a process, like the application of Interest rate on fix-deposit is a business rule but the calculations [8],[15],[18].
Show more

9 Read more

FCM BPSO: ENERGY EFFICIENT TASK BASED LOAD BALANCING IN CLOUD COMPUTING

FCM BPSO: ENERGY EFFICIENT TASK BASED LOAD BALANCING IN CLOUD COMPUTING

434 on the earth and the impact of application improvement situations on the product as for productivity. There are endeavors that underline the working framework to control the energy utilization of applications. General software solutions found in [39, 40] incorporate virtualization, shutting applications which are no more being used, effective calculations by composing a minimal outline of codes and information structures, diminishment of parallelism overhead by creating proficient burden adjusting calculations, fine grained green figuring, and making vitality assignment calculations for steering information. Naumann et al. [12] concocted a conceptual reference model named GREENSOFT model for sustainable software. Their four section model backings software engineers, managers, and clients in making, keeping up, and utilizing software in a green way. The four sections cover a life cycle model, measurements, system models, and suggestions and devices for various partners. Shenoy [41] talked about that the adjustments in the current SDLC and proposes proper strides which can prompt lower carbon discharges, power and paper use, therefore helping Organizations to move towards greener and sustainable software development. Mahaux [42] contend that requirements engineering is basic to the entire software life cycle principally in the application stage where clients are conveyed the framework and anticipate that it will adjust to their prerequisites. They guarantee that proper requirement engineering can help software last more along these lines diminishing the power utilization. Capra et al. (2010) concentrate on building up a measure of resource efficiency for software applications and outline how application advancement situations can have a hindering impact because of the extra lines of code they include. Gupta [43] present a structure for making a smart force profile that execute three techniques at the moment of login into the system. These techniques consistently measure the energy utilization of running software in a given timeframe and can be consolidated in operating systems. Oliveira et al. [44] exhibited a methodology taking into account periodic measurement of GPIs and QoS and reception of Service Oriented design is utilized to streamline vitality productivity at the Software-as-Service layer. Endeavors on incorporating sustainability in Service-Oriented software are observed in [45, 9]. Sissa [46] and Agarwal [15] tried to characterize general good practices in green software, for example, gathering prerequisites through electronic means and sending
Show more

16 Read more

A Software Architecture Style for Medical Process Re-engineering

A Software Architecture Style for Medical Process Re-engineering

We identify automated means to formally reason about the correctness and consistency of architectural styles and concrete architectures captured by high level specifications in the form of structural UML diagrams. The analysis tasks is to show that the model of an architectural style fulfills the informal requirements with a concrete implementation of it i.e. show that the style and the application is consistent from both a static and dynamic point of view. In the presence of faults, a carefully constructed fault model, based on re- engineering concepts with aims at formalizing what changes in the context are encountered. Afterwards, we can first assess the fault-tolerant capabilities of the style itself by proving consistency when certain well-formed ness constraints are not satisfied by the application or the medical context. After identifying the dependability bottlenecks where certain repair actions are indispensable, new rules can be introduced to the operational description of the style to provide such repair mechanisms.
Show more

6 Read more

Semantic Web Domain Knowledge Representation Using Software Engineering Modeling Technique

Semantic Web Domain Knowledge Representation Using Software Engineering Modeling Technique

The UML class diagrams represent the important concepts from the problem domain in the form of classes and their attributes and methods. The relationships among these concepts are represented by relationships among these classes. One can also express the cardinality and other types of constraints using the UML notation available (Booch, Rum Baugh & Jacobson, 2004). The ontologies define concepts from the problem domain and relationships among them. The XML Model Interchange Language defines a standard way to serialize the UML diagrams (Cranefield, 2001). So the knowledge expressed in the form of UML diagrams can be directly comprehended by human because of its standard graphical representation as well as by ontology editors. There are also a number of Java class libraries available to provide an interface to various applications accessing this information. The UML diagrams also can be accessible and processed by computers because of XMI and associated libraries or APIs defined by MOF (Baclawski, Kokar, Kogut, Hart, Smith, Holmes, Letkowski & Aronson, 2001). The XMI specifies how a model stored in a MOF- based model repository can be represented as an XML document. The UML class diagrams can be mapped to RDF schemas (Falkovych 2003). UML classes can also be mapped to sets of Java classes. These classes correspond to the classes in the class diagram.
Show more

10 Read more

Usability of Software Architecture Design Pattern
in Medical Process Re-engineering Model

Usability of Software Architecture Design Pattern in Medical Process Re-engineering Model

KANAK SAXENA, Ph. D. in computer Science from the Devi Ahilya University, Indore, INDIA. She is professor in the Computer Applications Department at the Samrat Ashok Technological Institute affiliated to Rajiv Gandhi Technical University, Bhopal. Her Current research focuses on Database Systems, Parallel computing, Data Uncertainty and design and other interests include Network security and performance and Software Engineering. She is the member of editorial board of various international journals. She is the member of the international committee of the International Conference on Computer Science and Its Applications. She Published more than 75 research Papers in Various Conferences and Journals National / International).
Show more

10 Read more

Optimizing Flexible Manufacturing System: A Developed Computer Simulation Model

Optimizing Flexible Manufacturing System: A Developed Computer Simulation Model

Visuwan and Phruksaphanrat developed a computer simulation of electronic manufacturing service plant [9]. Azadeh et al. integrated modeling of supply chain and information system through a unique integrated meta- heuristic computer simulation algorithm. This research has simulated an actual case study with simulation and in the other stages, has moved forward to improve and optimize the objectives by focusing on a selection of suppliers [10]. Oleskow-Szlapka and Stachowiak use of computer simulation in warehouse automation. The main aim of this research was to automate the warehouse operation as much as possible and to decrease the number of staff in the store. The process was modeled using software FlexSim Simulation Software [11]. Kermanpur et al. presented the solidification process was simulated in both etmacroscopic and microscopic scales [12].
Show more

8 Read more

A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives

A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives

Cloud computing offers a different, affordable approach for supporting the IT needs of organisations. However, despite the unprecedented benefits cloud migration may bring, there are numerous difficulties involved in moving business criti- cal applications, legacy systems or corporate data into the cloud.It is necessary to consider a broad view over all busi- ness areas, and taking into account the technical and busi- ness minutiae of a full scale cloud migration, as well as the wider concerns of security, privacy and other business and technical risks. A detailed understanding of all these areas is required in order to make the correct decisions concerning cloud migration. This paper aims to take a broad view of the issues relating to migration. We propose a process model to identify risks and requirements, as well as to provide control assurance during the migration decision. We also define an outline migration strategy by focusing on the context of the organisation.
Show more

5 Read more

A Review Authentication Method in Cloud Computing

A Review Authentication Method in Cloud Computing

In this paper we dealt with different algorithms used for user authentication and authorization in cloud computing. Different algorithms such as RSA, AES, MD5, OTP password generation algorithm, DES, Rijndael encryption Algorithm were studied. RSA Algorithm is deterministic and hence becomes fragile in long run. But the other algorithms discussed make the model highly secured. Each of this algorithms discussed were developed to provide best ever possible solution to the user authentication and authorization issues. Different protocols such as LDAP, EAP, & SSO protocols were also studied. Even if some intruder gets access of the data accidentally or intentionally, he will not be able to decrypt it.
Show more

6 Read more

Software Engineering Challenges in Mobile Application Development

Software Engineering Challenges in Mobile Application Development

Its applications are mainly in the smart homes, connected lighting and the utility industry. The Zigbee Alliance is working to create a standard for another special type of network which is the neighbourhood area network (NAN) [29]. Such networks allows connecting devices outside the home (e.g., smart meters or data aggregators). Currently, only few of such communications are standards based, but analysts [30] estimate that, by 2020, 85% of NAN connectivity will be standards-based. Transformation of connectivity into networking involves solving the challenges of system-level wide security, ease of installation, low latency, and standardization of the application languages for lighting, climate control, security, care, retail, etc.
Show more

9 Read more

Engineering Of A Software Model For Esrkgs Cipher

Engineering Of A Software Model For Esrkgs Cipher

In this paper, a software for implementing the Enhanced and secured RSA Key Generation Scheme (ESRKGS) cryptography has been designed and implemented. The new system provides reliable Encryption and Decryption since it is based on ESRKGS which is a reliable form of RSA Cryptographic Cipher. With the use of four random numbers, ESRKGS makes it difficult for hackers to find he primes used and the operations performed on them to obtain the Private and Public Keys. The software was created using C Sharp programming language. It is a Graphical User Interface (GUI) application that is easy to use.
Show more

9 Read more

Cyber security behavioural intentions for trade secret protection

Cyber security behavioural intentions for trade secret protection

Moreover, Kuiper and Van Ommen (2015) have discussed the issue of defining corporate venturing, and different views in regards to this. A different view looks at corporate venturing as an external fund activity limited to a corporate venture fund. On the other hand, there is a second view that looks at corporate venturing as constituting all entrepreneurial activates that aim to create a new venture in co- operation with a large corporation. Moreover, there is a large amount of literature that limits the concept of corporate venturing to corporate venturing capital. The reason for the later view is that the four previous waves were confined to one specific model, namely the corporate venture funding model. More recently, in the last couple of years, a new wave of corporate venturing models has emerged on the surface.
Show more

213 Read more

A Comparison of Window 8 and Linux Operating System (Android) Security for Mobile Computing

A Comparison of Window 8 and Linux Operating System (Android) Security for Mobile Computing

Similar to computers all Mobile phones, are major targets of attacks. These attacks misuse weaknesses related to smart phones that can come from source of communication like Short Message Service (SMS, aka text messaging),Multimedia Messaging Service (MMS), Wi-Fi networks, Bluetooth and GSM, the de facto global standard for mobile communications. There are also attacks that effect software vulnerabilities from both the web browser and operating system. When we talk about security in mobile phones the first layer of security is at the level of the operating system (OS) [3] mobile operating system or mobile OS is operating systems that operate mobiles, tablets, PDA. Modern mobile operating systems consist of both the features of a personal computer operating system along with other fundamental features, i.e. touch screen, cellular, Wi-Fi,GPS mobile navigation, camera, video camera, Bluetooth, voice recognition, voice recorder, music player. Operating system is executed on the top of a bare machine of hardware that allocates the basic resources of the system (e.g., CPU, memory, device driver, communication port, etc), and control the execution of all applications in the system. Some of the most popular closed source and Open Source operating systems are Microsoft Windows, different flavors of UNIX (BSD, AIX, HP-UX, Solaris, etc), Mac OS, and Linux [1].
Show more

9 Read more

A Review on Recent Trends in Software Cost Estimation
Shivani Sharma, Aman Kaushik

A Review on Recent Trends in Software Cost Estimation Shivani Sharma, Aman Kaushik

A major shortcoming of both the basic and intermediate COCOMO models is that they consider a software product as a single homogeneous entity. However, most large systems are made up several smaller sub-systems. These subsystems may have widely different characteristics. The complete COCOMO model considers these differences in characteristics of the subsystems and estimates the effort and development time as the sum of the estimates for the individual subsystems. The cost of each subsystem is estimated separately. This approach reduces the margin of error in the final estimate. The following development project can be considered as an example application of the complete COCOMO model. A distributed Management Information System (MIS) product for an organization having offices at several places across the country can have the following sub-components: • Database part • Graphical User Interface (GUI) part • Communication part of these, the communication part can be considered as embedded software.
Show more

6 Read more

Nail based Disease Analysis at Earlier Stage using Median Filter in Image Processing

Nail based Disease Analysis at Earlier Stage using Median Filter in Image Processing

1)Vipra Sharma (2015) proposed system for disease detection by analysing finger nail colour and texture takes back side of palm region and then segment the image. The segmented image is the actual nail region. They have analysed the nail colour and texture and compare these values with the predefined values for healthy nails and diagnose the result. For this experiment they only processed the image having format BMP, GIF, JPEG, PNG, TIFF etc. 2) Hardik Pandit (2013) proposed the model of nail colour analysis. In this experiment they scan back side of human palm then extract nail region from cropped image of palm by RGB component analysis in which algorithm was designed which gives average as well as pixel by pixel nail colour for each finger. For the comparison they took 50 reference images per colour. After calculating arithmetic mean they fixed a reference colour. For the identification of stage of a disease they fixed a percentage of pixels with given colour in all nails.
Show more

5 Read more

Review of Authentication Mechanisms in Open Distributed System and Cloud Computing

Review of Authentication Mechanisms in Open Distributed System and Cloud Computing

In its basic form, authentication is a well-understood concept in information security. Yet, many scenarios call for slight variations on the basic theme, where existing solutions do not directly apply; new techniques need to be developed. In the context of password-based user authentication, for example, users often reuse the same credentials (i.e., their passwords) when establishing accounts with dozens of independently administered services. Under such circumstances, a user whose password is compromised is unlikely to remember every place at which she needs to update her login information. At best, recovery from compromise is a lengthy, manual process. Based on work first published as, this paper describes an authentication mechanism that addresses these challenges for SFS, a secure, global file system. To attain its goals, the system employs proactive two-party signatures, a special kind of digital signatures, in which a private key is split between two parties, both of whom must approve and participate in signing authentication requests. This property enables a design in which an authentication server keeps a signature log describing all network accesses performed on behalf of the user, which provides a valuable audit trail in case of a break-in. Moreover, proactive two-party signatures allow private key shares to be updated, so that old shares cannot be combined with new ones to sign messages or to recover the private key. While a number of proactive protocols have been proposed in the cryptographic literature, they were all based on threshold schemes that cannot be applied to the practically relevant two-party case. Our novel construction fills this deficiency, providing a solution that is at the same time easy-to-implement and cryptographically secure. As another example, in spam-filtering systems, a legitimate sender wants to authenticate himself to the recipient as a non-spammer. Leveraging an existing social network, this type of authentication can be accomplished by demonstrating a short chain of social contacts connecting the sender to the recipient— assuming that users do not maintain social relationships with spammers. Discovering these chains requires sharing social information, which introduces privacy concerns. Chapter 3 defines a privacy model for demonstrating proximity in social networks. Using insights from this modeling, we derive efficient cryptographic protocols
Show more

7 Read more

International Journal of Engineering & Technology IJET-IJENS Vol: 11 No: 03 120

International Journal of Engineering & Technology IJET-IJENS Vol: 11 No: 03 120

The dynamic character of a robot with supple decision making capabilities is one of the most important character- istics in the current domain of robotics. The main task for a robot in path planning environment is the proper execution of actions based on the set of beliefs, which control the decision- making and eventually the mobility of the robot. Usually the robot is optimized for a particular goal, and therefore, a set- of constraints make the task of optimization more difficult, yet sound. Due to the changing demands in the modern world of engineering and robotics, it is required that the algorithm should be sufficient enough to perform the basic tasks such a path-planning.
Show more

6 Read more

Guideline structural analysis in BIM

Guideline structural analysis in BIM

(3) The receiver of the IFC file is able to suggest/demand changes, and changes may be made to the model directly. But, bidirectional exchange of information (i.e. making changes and send the full model back to continue) is out of reach. This is fine for data exchange processes that are linear. When one process is over, the other one can start. However, the data exchange between the architect, BIM modeller and the engineer involves a iterative process where readjustments are being made during the design process. Therefore, having to make suggestions/demands to make changes takes more time compared to having a bidirectional exchange of information. BuildingSMART suggests using their Open BIM Collaboration Format (BCF) to support solving this issue [20]. BCF gives structure to the way suggestions or demands are being written down. The format offers the possibility to add remarks, screenshots etc., on top of the IFC model layer. It separates the communication from the model which improves the coordination between parties [21]. It is a format that allows the addition of textual comments, screenshots and more on top of the IFC model layer for an improved communication Despite the development of IFC and the number of tools that provide IFC import and export, IFC is still used to a limited extend in the construction industry due to the various challenges which the industry faces. [22]
Show more

38 Read more

MoVAL, a new approach to software architecture and its comparison with existing views based approaches in software engineering

MoVAL, a new approach to software architecture and its comparison with existing views based approaches in software engineering

proach, in which authors have offered a detailed guide to software architects for architecture documentation using an organization of views and viewtypes. Zach- man framework [29] have offered tools to classify a software architecture’s artifacts in a matrix organization decomposing the architecture to six different views and defining for each of them six different focuses. Simul- taneously, the IEEE standard have been defined for the first time in 2000 as a try to bring all the important exist- ing works in this field, and create based on them a stan- dard for multi-views software architectures. This stan- dard has been revised in many other occasions, most recently in 2011 under the name IEEE 42010 standard [10], to keep it synchronized with novel works in the field.
Show more

12 Read more

Title: SOFTWARE ENGINEERING: ARCHITECTURE, DESIGN AND FRAMEWORKS

Title: SOFTWARE ENGINEERING: ARCHITECTURE, DESIGN AND FRAMEWORKS

Software architecture descriptions are commonly organized into views, which are analogous to the different types of blueprints made in building architecture. Each view addresses a set of system concerns, following the conventions of its viewpoint, where a viewpoint is a specification that describes the notations, modeling and analysis techniques to use in a view that express the architecture in question from the perspective of a given set of stakeholders and their concerns (ISO/IEC/IEEE 42010). The viewpoint specifies not only the concerns framed (i.e., to be addressed) but the presentation, model kinds used, conventions used and any consistency (correspondence) rules to keep a view consistent with other views.
Show more

15 Read more

Service Oriented Applications Based On an Enterprise Service Bus

Service Oriented Applications Based On an Enterprise Service Bus

In the interaction diagram of the loan application (see Figure 4), there are three proxy services for each scenario, and five business services, namely loan Validation, manage Loan Review, normal Loan, credit Rating and loan Sale Process. Note that the validation of messages is simple and executed by a proxy service without any business service involved in this scenario. These proxy and business services form a queuing network as illustrated in Figure 5. In this model each service is mapped to a load- independent resource (represented by a queue notation in Figure 5) that serves arriving requests in the analytical queuing network model. The assumption that each service is load-independent simplifies the modeling complexity as well as reduces the effort of collecting parameter values to represent the load-dependent behavior of a service. This assumption is later validated by the accuracy of the modeling results in this section. The connections between proxy services and business services can be of different types of networks, such as dedicated network channels, Ethernet, or WAN. There can be firewalls and also load balancing proxies installed along the requests invocation paths of business services. The service delay introduced by network protocols and software can be represented by a system level model (see Chapter 8 in [10]) and combined into the performance model in Figure 5 by applying component level modeling methods (see Chapter 9 in [10]). Details of modeling network protocols and software are out of the scope of this paper.
Show more

9 Read more

Show all 10000 documents...