Design and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance

Size: px
Start display at page:

Download "Design and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance"

Transcription

1 Iteratioal Joural of Applied Egieerig Research ISSN Volume 9, Number 21 (2014) pp Research Idia Publicatios Desig ad Implemetatio of Itegrated Testig Tool based o Metrics ad Quality Assurace Marri. Rami Reddy 1*, Dr. Prasath Yalla 2, J. Vijaya Chadra 3 1* Research Scholar, Departmet of Computer Sciece ad Egieerig, KL Uiversity, Gutur Dist., A.P, Idia. 2 Professor, Departmet of Computer Sciece ad Egieerig, KL Uiversity, Gutur Dist., A.P, Idia 3 Research Scholar, Departmet of Computer Sciece ad Egieerig, KL Uiversity, Gutur Dist., A.P, Idia 1 ramimarrireddy@gmail.com, 2 prasathyalla@kluiversity.i, 3 vijayachadra.phd@gmail.com Abstract Testig Tools help i improvig quality, maitaiability, testability ad stability of the software. They assist software egieers i icreasig the quality of the software by automatig the mechaical aspects of the software-testig task. Differet tools have a differet approach, software testig is a process that detects the defects ad miimizes the risk associated with the defects withi the software. Security Testig Tool is Software Metrics provide iformatio to support the quatitative maagerial decisio makig of the test maagers. Amog the various metrics, the code coverage metric is cosidered to be the most importat, ad is ofte used i the aalysis of software projects i the idustries. The Paper Focuses o Desigig Automated Software Testig Tool ad also Implemetatio of differet methods at differet areas where geeral tools will ot support automatically. Most of the Testers are depedig o the maual testig due to difficulty i idetifyig the appropriate tool for the applicatio to be tested; it is easier usig etwork methodologies ad algorithms automatic implemetatio of tools at differet coverage software tests. The tool also covers the job of test maager i selectig appropriate tool from the desiged pack of Testig Tool. Keyword: Software Metrics, Testig Tool, Metrics, Code Coverage. Paper Code: IJAER

2 10464 Marri. Rami Reddy et al 1. Itroductio Testig helps to measure the quality of the software, it idetifies the umber of defects, whe these defects are fixed ad these fixatios are carried out usig differet tools. The software metrics helps us i measurig size, quality, complexity ad schedule. Error or mistake is the most commo while developig software, where software is ot a piece of code it is a solutio for a problem, there are differet ways i solvig the problem, but the best way of developmet ivolves i space ad time complexity. A software should be a error free, the oly a customer ca reliable o it, It is a difficult task to idetify the mistakes at the developmet time, while testig to improve the quality these are idetified, these defects some time called as bugs or faults. Risk assessmet ad Maagemet is oe of the major task ivolved at the time of desig, develop, test ad implemetatio. Testig is ot a sigle task; it is a series of activities ivolved both i static ad dyamic for achievig similar test objectives which iclude fidig defects ad gaiig cofidece i providig iformatio about the quality ad prevetig defects. Focusig o defects helps i plaig tests, as software code is complex ad logic orieted, risk assessmet plays a great role for plaig the tests. Plaig, aalysis, desig, implemetatio ad executio are the basic steps where as evaluatig exit criteria ad reportig, test closure activities are most importat based o these retestig will be doe for better results[1]. 2. Related Work Metrics related to measuremet i the field of software testig, it ivolves i estimatio, project cotrol, productivity assessmet ad quality cotrol. The metrics for quality software provides regular feedback to the idividuals ad teams; it uses commosese, artificial itelligece ad techiques of eural etworks which provides orgaizatioal sesitivity. Error guessig is a iformal techique which depeds o the skill of a tester, there are o rules for guessig a error, it purely based o experiece ad it might be a good idea to test based o assumptios. Miimum plaig ad maximum test executio is possible i Exploratory testig. It checks formal testig process to esure ad idetify most serious defects, also ivolves about explorig ad fidig out about the software. A state trasitio testig is to fid boudary defects which iclude level of risks, risk types, test objective, documetatio available, tester s kowledge, budget ad time, developmet life cycle, use case models ad previous experiece of types of defects foud. Every compay emotioally feels better cosider that the data is secure. Security Testig offers potetial beefits icludig cost savig ad improved busiess where as security is the major factor, iformatio security risks eed to be carefully cosidered. Risks vary based o the sesitivity of the data to be stored or processed. Autheticatio is the process by which people prove that are who they say they are. At the basic level the system use userame ad password combiatios, icludig Kerberos. At ext level Systems that use certificates or tokes ad Fially Biometrics. The couter part of autheticatio is authorizatio, where autheticatio establishes who the user is; authorizatio specifies what that user ca do. Cofidetiality, privacy, itegrity, availability ad o-repudiatio are the basic priciples of data security.

3 Desig ad Implemetatio of Itegrated Testig Tool based o Metrics Cofidetiality meas keepig secrets by disguisig them, hidig them, or makig them idecipherable to others, this practice is kow as cryptography where differet algorithms ad keys are used. Service ad Security are the two major resposibilities of the cloud vedors. Impersoatio attempts, software vulerability exploits, password crackig, istallatio of Root-kits, buffer overflows, rogue commads, protocol attacks, malicious code like viruses, worms ad Trojas, illegal data maipulatio, uauthorized file access ad other differet attacks cause security breaches. SQL Ijectio attack is the major threat i Software Egieerig Projects Security, it is a techique to iject crafted SQL ito user iput fields that are part of web forms used i cloud computig, to gai malicious access to resources, applicatios ad databases, it is mostly used to bypass custom logis to websites regardig security Autheticatio. However, SQL ijectio ca also be used to log i to or eve to take over a website, so it is importat to secure agaist such attacks. The most advaced attacks are automated exploit tools, which ca spread of malware ad eable data maipulatio. 3. Test Maagemet Test Maagemet ivolves i Test Plas, Estimates ad Strategies. Testig is a quality assessmet. A black box tester ca fid more defects tha a white box tester. Sometimes black box testers also called as idepedet testers. Test leaders are ivolved i Moitorig, plaig ad test cotrol activities. Usual task of testers is writig ad executig the test cases ad log the defects. Tester must have the complete kowledge o iteded behavior of the system beig developed. Test leads guide the testers. They do the aalysis moitorig, helps i desigig the test cases ad its implemetatio ad executio. A test pla is must for every project to be tested, which is writte by test lead/maager. Test pla cotais the overall estimatio of the project about estimatio like time, resources, possibilities of differet types of tests applied for the project, which features ca be tested, which caot be tested, test approach, test suspesio ad it s resumptio criteria, etry ad exit criteria. Focused ad short test pla ca be cosidered as good test pla. There are some commo metrics ad techiques which are used i moitorig preparatio of tests ad their executio. There are differet levels of testig the project. Every project must udergo the maual testig. If the project is a log ru ad the size of the project is big (more umber of modules), the the maually tested modules are automated. There is aother kid of test which is a performace test, i which we measure the performace of the applicatio uder test. Fig. 1: Testig Process for Security Testig.

4 10466 Marri. Rami Reddy et al Automatio testig metrics are used i repetitive testig of particular task(s). Performace Metrics are used i load testig shows the performace measuremet from user perspective. Graphical usage of performace ca be depicted by volume graphs geerated by load test tools. Performace Metrics is classified ito differet stages where these stages give us a baselie agaist which to measure revisios ad chages ad reaches their milestoes. For example average respose time, error rate; miimum respose time, maximum respose time, request for secod, through put ad coected users. Security testig is iteded to fid flaws i security mechaisms of iformatio system which protects data while maitaiig fuctioality as required. I geeral security requiremets iclude cofidetiality, autheticatio, itegrity, authorizatio, availability, ad o-repudiatio. Testig Tools: As software projects become larger ad more complex, large teams are used to desig, ecode ad test the software. Automated testig tools facilitate several users to access the iformatio while esurig proper maagemet of iformatio. Possible methods may iclude automated geeratio of reports to iform other testers about the outcome of the curret test ad differet levels of access[2]. Major Types of Testig 1. Regressio Testig 2. Security Testig 3. Performace Testig 1. Regressio Testig: Regressio testig activity is performed, whe we are cofidet that future chages do ot impact the existig fuctioality. Regressio testig purpose is to have cofidece that the ewly itroduced fuctioality / chages do ot affect the existig fuctioality. 2. Security Testig: It is performed to reveal the flaws i mechaism of security i a iformatio system, which protects complete data ad maitai its fuctioality. Typical security requiremets iclude autheticatio, itegrity, cofidetiality, authorizatio ad availability. 3. Performace Testig: It is performed to determie the performace of a system i terms of its stability ad resposiveess uder a particular workload. It is also useful to validate other attributes of the system like reliability, scalability ad resource usage. A testig tool must be easy to use to esure timely, adequate ad cotiual itegratio ito the software developmet process. For differet types of testig we are i eed of differet testig tools, desigig ad implemetatio of a Hybrid Testig Tool, with all the good qualities of the regressio, security ad performace tool, brigig all the testig abilities ito oe umbrella. 4. Desigig of Itegrated Testig Tool I testig methodology there are tos of differet tools for testig, but accordig to the situatio ad requiremet of the project eeds for testig tools ca be selected the most commo ad popular tools which are ope source are take for the experimet ad desigig the itegrated testig tool where JMeter ad Badboy are used for the performace testig, Seleium ad Worksoft are used for the Regressio testig, where

5 Desig ad Implemetatio of Itegrated Testig Tool based o Metrics as the security testig for the Wireshark ad Ope Source Security Testig Methodology[3]. Table 1: Differet Tools for Itegrated Testig. S. No Tools Type Descriptio 1 JMeter Performace Testig Used to measure differet servers such as applicatio server, web servers ad databases 2 Badboy Performace Testig Used to measure cpu process activites ad memory cosumptio, o of processes etc., 3 Seleium Regressio Testig Correctess of program ad trackig quality output 4 Worksoft Regressio Testig Tests complete program with various iputs ad exercises idividual fuctios, subrouties ad object methods Checks the Network packet flow, etwork scaig 5 Wireshark Security Network Testig 6 OSSTM Security Testig Checks vulerability scaig, authorizatio ad autheticatio, log review, Itegrity checkers, virus detectio. 5. Metrics for Quality Specificatio: Evaluatio of the mathematical ad logical model for Quality Specificatio is metioed as r f + f (I ) where r requiremets i a specificatio f umber of fuctioal requiremets f umber of o-fuctioal requiremets Characteristics for Metrics for Quality Specificatio are 6. Specificity I order to determie the specificity of requiremets, a metric based o the cosistecy of the reviewer s uderstadig of each requiremet has bee proposed. This metric is represeted as ui Q 1 r

6 10468 Marri. Rami Reddy et al ui umber of requiremets for which reviewers have some uderstadig. Ambiguity of the specificatio depeds o the Q 1. If the value of Q 1 is close to (I ) the the probability of havig ay ambiguity is less. 1. Completeess Completeess of the fuctioal requiremets ca be calculated by the followig u Q 2 x i where u umber of uique fuctio requiremets i umber of iputs defied by the specificatio s umber of specified state 2. Correctess Q 2 i the give equatio cosiders oly fuctioal requiremets ad igores ofuctioal requiremets. I order to cosider o-fuctioal requiremets, it is ecessary to cosider the degree to which requiemets have bee validated. This ca be represeted by the followig equatio c Q3 c v c umber of requiemets validated as correct r umber of requiemets, which are yet to be validated 3. Modifiability Modifiability of the fuctioal requiremets ca be calculated by the followig m Q 4 r m umber of requiemets to be modified r umber of total requiemets 4. Traceability Traceability of the fuctioal requiremets ca be calculated by the followig t! Q 5 r t! umber of requiemets to be traceable r umber of total requiemets OR t! Q5 t t s

7 Desig ad Implemetatio of Itegrated Testig Tool based o Metrics t! umber of requiemets to be traceable t umber of traceable requiemets t umber of o traceable requiemets 5. Cosistacy Cosistacy of the fuctioal requiremets ca be calculated by the followig Q 6 r i 1 r 6. Achievability Achievability of the fuctioal requiremets ca be calculated by the followig ict Q7 a c r 7. Reusability Reusability of the fuctioal requiremets ca be calculated combiig Q 4, Q 5 & Q 7 the followig equatio is obtaied re Q8 a t m 8. Experimetal Aalysis I Software Testig Tools Lab for the Experimet we created a lab eviromet, where we used the JMeter: JMeter is a load testig tool. It is used to test the performace of a applicatio uder may virtual users. We caot hire thousads of users to test olie, hece we test usig the virtual users i JMeter. Performace testig is categorized ito load testig ad stress testig. There are three typical parameters Users, Data ad Time. Loger you test ad more data you use, its problem for the server. More the users are it all the problem we get. So we eed a tool, so which limits users, pumpig data ad that ca test it without ay hectic, so JMeter solves this problem. It is a ope source tool. We ca test various applicatios desiged with multiple protocols ad also with JDBC coectio ad may more features. Disadvatage of this tool is it does ot have browser ad we have to set the proxy every time. JMeter results aalyses is based o the No.of sample, throughput ad their deviatio ad media.

8 10470 Marri. Rami Reddy et al Fig. 1: JMeter Performace Testig Tool to aalyze the performace of a applicatio Badboy: Badboy is a ope source elemetary load testig tool, we eed much more to do real load testig. Badboy ca go easily with aother ope source tool called JMeter. As Badboy itegrates with Jmeter, we save the scripts i Jmete file format, which we ca ope ad ru i Jmeter, which is flexible to use the full power of Jmeter. It avoids the problem of the lack of browser i Jmeter ad proxy problem. Fig. 2: Badboy Performace Testig Tool to aalyze the performace of a applicatio. Seleium: Seleium is a ope source automatio testig suite for web applicatio across differet platforms ad browsers. It is ot a sigle tool, but it is a suite of softwares, each oe fulfills the differet testig purposes of a orgaizatio. It is

9 Desig ad Implemetatio of Itegrated Testig Tool based o Metrics primarily created by Jaso Huggis, ad there are group of developers cotributed for its developmet. Seleium does ot support o web based applicatios. As it is a ope source tool, for ay issues, we eed to rely o the commuity of seleium forums to get the issues resolved. Ad a tester should kow at least oe of the laguages supported by Seleium for successful automatio of a applicatio. It eeds Test NG ad JUit as test reports as the Seleium has o ibuilt reportig capability. It is most friedly with the Mozilla Firefox ad has several challeges with other browsers like IE. Fig. 3: Seleium Automated Testig Tool to perform the regressio testig of a applicatio. Fig. 4: Wireshark Security Testig Tool to aalyze the flow of packets Worksoft Certify: It is the tool specially desiged for automatig the SAP applicatios. But also works well for the web applicatios. Worksoft is a It is a

10 10472 Marri. Rami Reddy et al solutio for several testig challeges like multiple implemetatio types, umerous iteratios Itricate busiess ad data rules, ed to ed busiess processes tedious ad labor itesive, tight itegratio icreases exposure. It is easy to automate the apps usig its Web lear, java lear ad the most easy feature livetouch. Wireshark: For cotiuous moitorig the etwork eviromet, ad to receive the otificatio of chages of iterests. It is a vulerability scaig service tool, which is easy to deploy ad cost-effective solutio set that discovers ad asses the vulerabilities, it is the ideal solutio for scaig remote locatios i Software Testig. It is a easy-to-use-itegrated Testig Tool-based scaig solutio that eables iteral ad perimeter scas ad requires o hardware or complex software deploymet. It is a host based moitorig system for itrusio detectio; these are istalled o host they are iteded to moitor. 9. Coclusio Itegrated Testig Tool eables Testers to process etire testig procedure easily with Quality Assurace. The Tools are based o Criteria Such as the performace speed, throughput ad efficiecy. The Goal of the Itegrated Testig Tool is to aalyze the performace of testig differet tools that aid miimizig the resource program maiteace ad icreases efficiecy for program reuse. The Goal of security testig is to protect the software from differet malwares ad hackers. It scas ad iforms the possibilities of the Itrusio. A perfect Itrusio detectio system ca be implemeted. The Goal of Regressio Testig is to test complete program as well as the idividual fuctios, subrouties ad objects with various iputs. The Goal of Performace Testig is to test applicatio itself, cpu ad memory cosumptios, umber of processes etc., It also tests differet servers ad databases. Refereces [1] A Novel Risk Assessmet Model for Software Projects, Uzzafer, M.; Dept. of Comput. Sci., Uiv. of Nottigham, Nottigham, UK,IEEE- May [2] Software Testig ad Practice, Atoia Bertolio-IEEE 2013 [3] A Software Platform for Testig Itrusio Detectio Systems, Nicholas Puketza, Mady Chug, Roald A Ollso-IEEE 2012 [4] A Systematic Approach to Collaborate Quality Assurace Approaches, Adesh patel ad Suredra pal Sigh Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig, Volume 3, Issue 8, August [5] Desig ad Implemetatio of Fast Dyamic Packet Filter, Zheyu Wu, Megju Xie; Haiig Wag, Networkig IEEE, Volume 19, issue 5, October [6] Jmeter-based agig simulatio of computig system, You Jig, Zhag La, Wag Hogyua, Su Yuqiag, IEEE August 2010.

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic.

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic. Empirical Validate C&K Suite for Predict Fault-Proeess of Object-Orieted Classes Developed Usig Fuzzy Logic. Mohammad Amro 1, Moataz Ahmed 1, Kaaa Faisal 2 1 Iformatio ad Computer Sciece Departmet, Kig

More information

Data Warehousing. Paper

Data Warehousing. Paper Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

CORD Test Project in Okinawa Open Laboratory

CORD Test Project in Okinawa Open Laboratory CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

SCAN INSPECT TRACK SOLVE

SCAN INSPECT TRACK SOLVE SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

n Some thoughts on software development n The idea of a calculator n Using a grammar n Expression evaluation n Program organization n Analysis

n Some thoughts on software development n The idea of a calculator n Using a grammar n Expression evaluation n Program organization n Analysis Overview Chapter 6 Writig a Program Bjare Stroustrup Some thoughts o software developmet The idea of a calculator Usig a grammar Expressio evaluatio Program orgaizatio www.stroustrup.com/programmig 3 Buildig

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

State-space feedback 6 challenges of pole placement

State-space feedback 6 challenges of pole placement State-space feedbac 6 challeges of pole placemet J Rossiter Itroductio The earlier videos itroduced the cocept of state feedbac ad demostrated that it moves the poles. x u x Kx Bu It was show that whe

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework Shieldig Eterprises from Evolvig Cyber Attacks with a Digital Security Framework Abstract As the IT ladscape evolves, cyber threat actors also mature i respose developig ew techiques to compromise the

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

STRATEGIC. alliances & Services

STRATEGIC. alliances & Services STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Building Your Security Operations Center and Taking it to the Next Level

Building Your Security Operations Center and Taking it to the Next Level Buildig Your Security Operatios Ceter ad Takig it to the Next Level Abstract IT threats cotiue to evolve ad become more evasive, bleded, ad persistet, with attackers dig resourceful ways to avoid detectio

More information

An Empirical Study on Detecting and Fixing Buffer Overflow Bugs

An Empirical Study on Detecting and Fixing Buffer Overflow Bugs A Empirical Study o Detectig ad Fixig Buffer Overflow Bugs Lizhag Wag Joit work with Tao Ye, Xuadog Li, Najig Uiversity, Chia Ligmig Zhag,Uiversity of Texas at Dallas, USA Jue 6, 2016 Outlie Backgroud

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Mindmapping: A General Purpose (Test) Planning Tool

Mindmapping: A General Purpose (Test) Planning Tool W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage

More information

Generation of a New Complexity Dimension Scheme for Complexity Measure of Procedural Program

Generation of a New Complexity Dimension Scheme for Complexity Measure of Procedural Program Geeratio of a New Complexity Dimesio Scheme for Complexity Measure of Procedural Program Nikhar Tak, Dr. Navee Hemrajai Departmet of Computer Sciece & Egg, Suresh Gya Vihar Uiversity,Jaipur Abstract -

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Addressing SaaS Security

Addressing SaaS Security White Paper Addressig SaaS Security by Padma Krisha O V E R C O M I N G L I M I T S This paper ide fies some of the best prac ces ad desig priciples followed by Triget i developig SaaS applica os to address

More information

What are Information Systems?

What are Information Systems? Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),

More information

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com 2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION APICS CSCP Learig System users cosistetly surpass the average CSCP exam pass rate. learcscp.com 2016_APICS_A4_Brochure_parter.idd 1 WHY SEEK

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

Demystifying IaaS Adoption for Enterprise Applications

Demystifying IaaS Adoption for Enterprise Applications Demystifyig IaaS Adoptio for Eterprise Applicatios Abstract Despite the growig sped o cloud techologies, eterprises worldwide are plagued with this questio, Which amog the may is the best solutio for us?

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

TruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information

TruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information TruVu 360 User Commuity Cotiuous educatio is importat for a successful o-site lubricat program. With ever growig articles, videos, ad structured learig modules, TruVu 360 user commuity is a digital commuity

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

SCI Reflective Memory

SCI Reflective Memory Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o

More information

Continuity Logic Frontline Live

Continuity Logic Frontline Live September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

SOFTWARE usually does not work alone. It must have

SOFTWARE usually does not work alone. It must have Proceedigs of the 203 Federated Coferece o Computer Sciece ad Iformatio Systems pp. 343 348 A method for selectig eviromets for software compatibility testig Łukasz Pobereżik AGH Uiversity of Sciece ad

More information

Air Force Data Reference Architecture and Platform

Air Force Data Reference Architecture and Platform Headquarters U.S. Air Force Air Force Data Referece Architecture ad Platform Ms. Jackie Murray 11 Oct 2018 1 AF Data Challeges Large umber of legacy systems with umerous poit-to-poit iterfaces that are

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

CA InterTest for CICS r8.5

CA InterTest for CICS r8.5 PRODUCT SHEET: CA INTERTEST FOR CICS CA IterTest for CICS r8.5 CA IterTest for CICS provides testig ad debuggig of IBM CICS Trasactio Server for z/os applicatios writte i COBOL, PL/I, Assembler ad Laguage

More information

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately. Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their

More information

Definitions. Error. A wrong decision made during software development

Definitions. Error. A wrong decision made during software development Debuggig Defiitios Error A wrog decisio made durig software developmet Defiitios 2 Error A wrog decisio made durig software developmet Defect bug sometimes meas this The term Fault is also used Property

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Study on effective detection method for specific data of large database LI Jin-feng

Study on effective detection method for specific data of large database LI Jin-feng Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog

More information