Data mining and knowledge discovery of database is magnetizing wide array of non-trivial research arena, making easy to industrial decision support systems and continues to expand even beyond imagination in one such promising field like Artificial Intelligence and facing the real world challenges. Association rules forms an important paradigm in the field of data mining for various databases like transactional database, time-series database, spatial, object-oriented databases etc. The burgeoning amount of data in multiple heterogeneous sources coalesces with the impediment in building and preserving central vital repositories compels the need for effectual distributive mining techniques.
The majority of the previous studies rely on an Apriori-like candidate set generation-and-test approach. For these applications, these forms of aged techniques are found to be quite expensive, sluggish and highly subjective in case there exsist long length patterns.
CONTEXT - Software outsourcing has been progressively increasing. However significant outsourcing failure rates have also been reported. Outsourcing may not be the option that all companies will select. Therefore, outsourcing occurred by the wrong decision can cause major technological and economic setbacks.
OBJECTIVE – The objective of this project is to develop a model for outsourcing process in order to improve outsourcing process and to help out the outsourcing organizations to overcome barriers that may have a negative impact on software outsourcing as well as to improve their success rate.
METHOD –Data will be collected through literature in order to examine the strengths and weaknesses of existing models and secondly, how one can implement these factor. An experimental study will be conducted in order to validate the model.
EXPECTED OUTCOME – The anticipated outcome of this project will be a software outsourcing model to assist software practitioners in the design of effective software outsourcing projects. This model should assist outsourcing both companies embarking on outsourcing for the first time, as well as project managers who need to determine their roles and responsibilities in an outsourcing perspective.
The paper presents an extension for the JavaBeans component model that enables creating composed components dynamically, at runtime, without code generation. The composed components created can be used immediately for instantiation having their instances used for execution or for further components composition. The dynamic abilities are supported by extended type implementation based on additional superstructure provided with its Java API implementation and corresponding JavaBeans components. Using the component model and base components it provides, the new component composition is performed by building the composed prototype object that can be dynamically transformed into the new composed instantiable type. The component model can be used when implementing user defined types in declarative languages for event-driven models description.
This paper presents a test script design pattern for executing tests, automating the monitoring of global variables and simulating external devices that interface with the microcontroller; either through interrupts or shared memory areas by using the features that are common to most integrated development environments. This pattern can be used to create test scripts that are effective at detecting erroneous update errors. These scripts execute test cases and log output and diagnostic information using microcontroller simulators which have a debugger scripting feature.
The process of making a copy of an existing product, component, subassembly, without using architecture design involved in present model is termed as Reverse engineering. As the term "reverse suggests" working in reverse way , that is opposite of convention software design ,which involved architecture model chosen upon and based on it software is developed . In Reverse Engineering , we take the existing product and track it in reverse way by starting with implementation and layering down toward its distinct elements in the architecture .It is the process of identifying the functional aspects of system, which involved technical consideration pertaining to the system , function and its operation . The role of reverse engineering in software evolution is prominent as it allows the code reuse and also it involves backtracking , which results in mapping in opposite direction , which helps in tracking the old systems which don't have forward tracking phenomenon , because of lost architecture and design and fundamentals. Thus Reverse Engineering helps to recapture lost information and transforming old systems to new ones . It also helps to understand non functional requirements of the system in terms of strength and weakness which involves features like security , interoperability , reliability. In this paper various tools involved in reverse engineering are discussed which results in improvement of developing software design by use of existing source code .
Code cloning is a severe problem that negatively affects industrial software and threatens intellectual property. This paper presents a novel approach to detecting cloned software by using a bijection matching technique. The proposed approach focuses on increasing the range of similarity measures and thus enhancing the recall and precision of the detection. This is achieved by extending a well-known stable-marriage problem (SMP) and demonstrating how matches between code fragments of different files can be expressed. a prototype of our approach is provided using a proper scenario, which shows a noticeable improvement in several features such as scalability and accuracy.
This report deals with Software Process Improvement. The following are discussed as the fulfillment of the report. Six major hindrances to software processimprovement.Introduction and description of Agile processimprovement model.Role of Agile process improvement model inreducing overcoming the hindrances.Tools that are helpful in implementing processimprovement.Lastly, the solution to the report problem of the firm is suggested
Image fusion technology can improve target detection. However, The method for predicting target’s detection probability of image fusion system is lacking. To solve this problem, we propose a computational model for calculating target’s detection probability of visible and IR image fusion system. This model is designed based on five components: target’s spectral contrast to its background; visible and IR detector’s characteristic which is described as the spectral matching degree between detector’s and target’s spectral distribution; environment illuminance condition; local fusion image quality defined by local target contrast and local sharpness; distance component based on target’s distance and size. The proposed model is employed in detection tasks. Experimental results show that this model is meaningful and effective on predicting target’s detection probability of visible and infrared image fusion system since it corresponds well to the perception evaluation.
Cloud computing is a growing buzz in today’s IT world. Many organizations are now adopting cloud computing techniques in industrial applications. As a result of the growing interest towards hosting applications in cloud there are a number of cloud service providers in the market. New products are launched continuously to make cloud hosting simple and feasible. But there are some challenges that prevent cloud platforms from being widely adopted. One of the major challenges in adopting cloud computing is the portability of applications across various clouds. Cloud based applications are normally provided as services offered by different cloud service providers. The different implementations of cloud computing services developed by each cloud provider resulted in heterogeneity of APIs which the cloud application developers find it difficult to understand and implement. This is called vendor lock-in and it increases the effort in application development. In many cases there is a need for supporting multiple clouds since one cloud provider many not always cater to the needs of an organization. And they might require a different cloud service for their applications. This paper aims to systematically analyse the different existing approaches on cloud migration to analyse the gap and report an approach based on feature models. DSkyL is an eclipse plugin which is in development phase which uses feature models to generate platform independent image files. The paper gives an overview about the architecture of DSkyL.