Catálogo de publicaciones - libros

Compartir en
redes sociales


Innovations and Advanced Techniques in Computer and Information Sciences and Engineering

Tarek Sobh (eds.)

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Circuits and Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-1-4020-6267-4

ISBN electrónico

978-1-4020-6268-1

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer 2007

Cobertura temática

Tabla de contenidos

Software Estimation using Function Point Analysis: Difficulties and Research Challenges

M.J Basavaraj; K.C Shet

Function Point Analysis method serves better efficient way of predicting estimation in beginning phase of software development life cycle(SDLC). Size and complexity of the software can be derived by function point analysis method. Difficulties of estimation using LOC(Lines of Code) can be avoided using Function Point Analysis, since it deals directly with functions or requirements and independent of language or technology. This paper explains how to calculate Function point analysis for the case study Defect Tracking System(DTS) by using function point analysis. Defect tracking system(DTS) case study has been taken from “XYZ” company. In the intention of maintaining confidentiality, authors are not disclosing the company name. Authors also discusses difficulties and challenges by using Function Point Analysis as part of their Research Work.

Pp. 111-116

Distributed Intrusion Detection System for Sensor Networks

Biswajit Panja; Sherif Rashad

An intruder tries to disable the single point in a network, i.e. the central analyzer. If this is disabled, the entire network is without protection. Since the sensor nodes fail often, the use of a centralized analyzer is highly limited. Processing all the information at a single host implies a limit on the size of the network that can be monitored. Because of the limit of the central analyzer, it is difficult to keep up with the flow of information in large network like sensor. We have proposed distributed intrusion detection system for distribute sensor networks.

Pp. 117-122

Numerical Solution to Horizontal Zero-inertia, Viscous Dam-Break Problem

Blaise NSOM; Mathieu JENNY; Youcef ASKOURA; Frédéric PERON

Debris flows such as avalanches and lahars differ from the classical dam-break problem of hydraulics due to the relative importance of viscous versus inertial forces in the momentum balance. An equation of motion describing debris flow in the limit of zero inertia is developed and solved using a converged finite difference numerical, in two limits: short time and long time. These solutions are then combined into a single, universal model.

Pp. 123-128

Pixel & Feature Level Multiresolution Image Fusion Based On Fuzzy Logic

Bushra N. Kayani; Anwar Majeed Mirza; Ajmal Bangash; Haroon Iftikhar

The motivation behind fusing multi-resolution images is to create a single image with improved interpretability. In algorithm (based on pixel and feature level) presented in this paper, images are first segmented into regions with fuzzy clustering and are then fed into a fusion system, based on fuzzy “if-then” rules. Fuzzy clustering offers more flexibility over traditional strict clustering; thus allowing more robustness as compared to other segmentation techniques (e.g. K-means clustering algorithm). A recently proposed subjective image fusion quality evaluation measure known as IQI (Image Quality Index) [1] is used to measure the quality of the fused image. Results and conclusion outlined in this paper would help explain how well the proposed algorithm performs

Pp. 129-132

Approximate Solution to the Diffusion-Reaction Problem with Nonlinear Kinetics in Transient Systems

E. Peralta Reyes; A. Regalado Méndez; G. Vidriales Escobar; C.A González Rugerio

A method to obtain the approximate solution to the diffusion-reaction problem with nonlinear kinetics in transient systems is presented. The analytical solution to the equation that governs the process is based on the linearization of the kinetics expression through the Taylor series expansion above the surface particle concentration of the key component, which includes a critical radius to avoid negative concentration values. The present results for the average concentration were compared with the numerical solution of the exact problem and the error was less than ten percent for the power-law and Monod kinetics equation.

Pp. 133-138

Describing Acoustic Fingerprint Technology Integration For Audio Monitoring Systems

Carlos Serrão; Marco Clara

The ability to create, write or compose a song is a gift or feature that not everyone has within him or herself. The results of that kind of ability are an asset that should somehow, due to their nature, be recorded and protected. That protection can be enabled by the enforcement of the author’s rights, safeguarding its works. How can this protection be enforced in a digital World? Should we trust that nobody steals or circumvents intellectual or artistic property? Or should we think of possible ways to control and monitor that property’s usage? It seems that the last one is currently the right way, and technologies such as acoustic fingerprint may allow us to provide such monitoring and enforcement. In what way can we integrate existing technology for creating such systems, and what criteria should be used for evaluating that same technology?

Pp. 139-144

AMIEDoT: An annotation model for document tracking and recommendation service

ROBERT Charles Abiodun

The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on information source. Beyond providing personal assessment to original information sources, we are looking at a situation where annotation made can be used as additional source of information for document tracking and recommendation service. Most of the annotation tools existing today were conceived for their independent use with no reference to the creator of the annotation. We propose AMIEDoT (Annotation Model for Information Exchange and Document Tracking) an annotation model that can assist in document tracking and recommendation service. The model is based on three parameters in the acts of annotation. We believe that introducing document parameters, time and the parameters of the creator of annotation into an annotation process can be a dependable source to know, who used a document, when a document was used and for what a document was used for. Beyond document tracking, our model can be used in not only for selective dissemination of information but for recommendation services. AMIEDoT can also be used for information sharing and information reuse.

Pp. 145-150

Intelligent Assistance for a Task-oriented Requirements Management

D. Mueller; P. Dietz; N. Mueller

Requirement specifications for complex products are hard to handle due to their high amount of number and interrelations. Thereby, requirements represent the legally binding basis for the product development. In this paper we present a concept for a task-oriented filtering and provision of requirement specifications to support the engineer in his information management. The approach is based on a semantically enhanced categorization of requirements to prepare a computer interpretable information basis. The selection of processed requirements and their monitoring with respect to changes will be implemented by means of information agents. The associated agent schema and exemplary system architecture is provided. The approach enables an optimized processing of requirements which backs an efficient product development.

Pp. 151-156

Translation of Safety-Critical Software Requirements Specification to Lustre

Dongchul Park

SpecTRM-RL (Specification Tools and Requirements Methodology-Requirements Language) is a modeling language for describing safety-critical software requirements. However, SpecTRM-RL does not support formal verification, which plays a very important role in developing safety-critical systems and software. Lustre is a dataflow synchronous language designed for programming reactive systems. Lustre supports the analysis and formal verification as well as code generation. Therefore, by translating SpecTRM-RL into Lustre, it not only will endow verification function to SpecTRM-RL, but also will make it possible that SpecTRM-RL supports various analysis approaches of codes by using previously developed translator which converts Lustre into NuSMV, PVS, and SAL. In this paper, I present the rules to translate SpecTRM-RL to the Lustre language, and also present an empirical study in which we practically translate a SpecTRM-RL requirements document into Lustre using the rules proposed. This study shows that SpecTRM-RL can be effectively converted into Lustre so that it can support formal verification.

Pp. 157-162

Security In Information Systems: Sociotechnical Aspects

Edison Luiz Gonçalves Fontes; Antonio José Balloni

This work considers the sociotechnical approach that must be addressed when implanting and having maintenance of the information security of an organization. In general, only the technical aspects are considered by the IT professionals. These technical aspects generates in the organization in the day by day, a security process that seems as a set of distant rules and, because of this, the security process (the rules) will not be internalized by the users. To consider sociotechnical aspects means both making a complete approach for the security subject as well increasing the chances for the existence of a continuous process, following and protecting the information resources during the growing stages and moments of difficulties in the organization.

Pp. 163-166