Volume-7 ~ Issue-2
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Requirement Engineering for Service Based Systems |
Country | : | India |
Authors | : | T.Priyaradhikadevi , Dr. R. M. S. Parvathi |
: | 10.9790/0661-0720108 | |
Keywords: Encryption, Objective approach tool, Requirement Engineering, Quality, Service
[1] Binde Luo, Zhiyong Shi, Dawei Ma, YIN Shi-ping. Design and Capacity Analysis of PoC Service based on TD-SCDMA Network, The 6th International Conference on Wireless Communications, etworking and Mobile Computing[C], 2010.
[2] Vehmas A. "Service adoption for push over cellular"[EB/OL], 2004, web page: www.tml.hut.fi/Opinnot/T-109.551/2004/reports/poc.pdf
[3] D. Roman, J. Scicluna, C. Feier, M. Stollberg & D. Fensel, ―Ontology-based Choreography and Orchestration of WSMO Services‖, http://www.wsmo.org/TR/d14/v0.1/, (online accessed= Jan 2011)
[4] Kevin Carey, Vincent Wade,‖ Realizing Adaptive Web Services through Automated Policy Refinement‖, IEEE, 2007
[5] Qiao Xiaoqiang, Wei Jun, "A Decentralized Services Choreography Approach for Business Collaboration, IEEE International Conference on Services Computing (SCC'06), 2006.
[6] M.P Papazoglou , P. Traverso, Schabram Dustdar & F. Leymann, (2007) ," Service-Oriented Computing: State of the Art and Research Challenges", Journal of Innovative Technology for Computer Professionals, IEEE Computer Society, November 2007.
[7] Erradi A., "Policy-Driven Framework for Manageable And Adaptive Service-Oriented Processes", PhD thesis, The school of Computer Science and Engineering(CSE), University of New South Wales(UNSW), June 2008.
[8] Martin, D., et al.,(Nov 2004), OWL-S: Semantic Markup for Web Services. DAML White Paper Release.
[9] Pahl,"Dynamic Adaptive Service Architecture .Towards Coordinated Service Composition", Lecture Notes in Computer Science, Software Architecture. M. Babar I.Gorton, Springer Berlin / Heidelberg. 6285:472-475, 2010, [doi: 10.1007/978-3-642-15114-9_43] [10] Souttar, J. Three Clicks and it's gone. Eye, The international review of graphical design, No. 36, Vol. 9, summer 2000, p.86
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Clustering, Web Usage Mining, WWW, Web logs, pre-processing, Data Warehouse, Cloud Computing
[2] Jaideep Srivastave, Robert Cooley, Mukund Deshpande, Pang-Ning Tan, "Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data," SIGKDD Explorations. ACM SIGKDD,2000.
[3] Pierrakos. D, "Web usage mining as a tool for personalization: a survey", User Modeling and User-Adapted Interaction, 13(4), pp. 311-372.
[4] Ralph Kimball. Entrepots de donnees. Editions Vuibert, 2001.
[5] Luotonen. The common log file format. http://www.w3.org/Daemon/User/Config/ Logging.html, 1995.
[6] R. Cooley. Web Usage Mining: Discovery and Application of Interesting Patterns from Web Data. PhD thesis, University of Minnesota, May 2000
[7] M. Spiliopoulou, L. C. Faulstich, and K. Winkler. A data miner analyzing the navigational behaviour of web users. In Proc. of the Workshop on Machine Learning in User Modeling of the ACAI'99 Int. Conf., Creta, Greece, July 1999.
[8] M. Perkowitz and O. Etzioni. Adaptive web sites: Automatically synthesizing web pages. In AAAI/IAAI, pages 727{732, 1998.
[9] V. Cadez, D. Heckerman, C. Meek, P. Smyth, and S. White. Visualization of navigation patterns on a web site using model-based clustering. In In Proceedings of the sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 280{284, Boston, Massachusetts, 2000.
[10] Mobasher, H. Dai, T. Luo, and M. Nakagawa. Discovery and evaluation of aggregate usage profiles for web personalization. Data Mining and Knowledge Discovery, 6(1):61{82, January 2002.
- Citation
- Abstract
- Reference
- Full PDF
Keywords:Job satisfaction, Human Resource Management Practices
[2] Aswhthappa, Human Resource and Personnal Management, New Delhi, Tata Mc Graw-Hill, 3rd edition
[3] Bhattacharya Kumar Diapk, Human Resource Management, , New Delhi, Excel Books 2002, 1ST edition
[4] Monoppa & Saiyadain, Personnel Management, Tata McGraw Hill, New Delhi.
[5] Patnayak, Biswajeet, Human Resource Management, ed. iii, 2006, P.H., New Delhi
[6] Pramod Verma, Management of Industrial Relations, Vora Prakashan, Ahmedabad.
[7] Sinha, PRN, Sinha IB and Shekhar SP, Industrial Relations, Trade Unions and Labour
[8] Armstrong, M. (2006). A Handbook of Human resource Management Practice, Tenth Edition, Kogan Page Publishing, London.
[9] Arvey, R. D., Bouchard, T. J., Segal, N. L., & Abraham, L. M. (1989). Job satisfaction: Environmental and genetic components. Journal of Applied Psychology, 74, 187–192
- Citation
- Abstract
- Reference
- Full PDF
Keywords:eye-controlled system, iris detection, micro-controller, real time eye detection, voice recognition
[1] Nashruddin, OpenCV Eye Detection, http://nashruddin.com/OpenCV_Eye_Detection , Last visited July 2012
[2] Face Detection using OpenCV, http://opencv.willowgarage.com/wiki/FaceDetection , Last visited July 2012
[3] Sphinx-4, http://cmusphinx.sourceforge.net/sphinx4/javadoc/index.html?overview-summary.html
[4] Sphinx-4, A speech recognizer written entirely in the JavaTM programming language, http://cmusphinx.sourceforge.net/sphinx4/
[5] Puneet Kalra, Speech Recognizer In Java, http://puneetk.com/speech-recognizer-in-java-tutorial
[6] java.awt - Class Robot, http://docs.oracle.com/javase/1.4.2/docs/api/java/awt/Robot.html
[7] Iris Detection, http://codingbox.net/jinstall/index.php?option=com_content&view=category&id=11&layout=blog&Itemid=22
Journals:
[8] J. Daugman. How iris recognition works. IEEE Transactions on circuits and systems for video technology, 14(1):21{30, 2004}
[9] N. Otsu. A threshold selection method from gray-level histograms. Automatica, 11:285{296, 1975}
Theses:
[10] Boyd, Carmaciu, Giannaros, Payne, Snell, Gillies, Iris Recognition, Imperial College London, March 19, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Keywords:Website, Website promotion, Non-Profit Organization, NPOs, Public Relations
[1] R. Benson, T. L. Bugnitz, and W. B. Walton, From Business Strategy to IT Action. Right Decisions for better bottom line (New Jersey: John Wiley & Sons, Inc, 2004)
[2] R. Stair, G. Reynolds, and T. Cheney, Principles of Business Information Systems. (London: Cengage Learning EMEA, 2008)
[3] J. Napoli, M. T. Ewing, and L. F. Pitt, Factors affecting the adoption of the Internet in the public sector, Journal of Non-profit & Public Sector Marketing, Vol. 7 (4), 2000, 77-88.
[4] J. C. Pinho, and I. M. Macedo, The Benefits and Barriers Associated with the use of the internet within the Non-Profit Sector, Journal of Nonprofit & Public Sector Marketing, Vol. 16 (1/2), 2006, 171-184.
[5] H. M. Yeon, Y. Choi, and S. Kiousis, Interactive Communication Features on Nonprofit Organizations' Webpages for the Practice of Excellence in Public Relations. Journal of Website Promotion, 2005, 61-81
. [6] M. Kinnel, and J. MacDaugall, Marketing in the Not-for-Profit Sector (Oxford: Butterworth-Heinemann, 1997)
[7] D. Chaffey, F. Ellis-Chadwick, K. Johnston, and R. Mayer, Internet Marketing Strategy, Implementation and Practice (Essex: Pearson Education Limited, 2006).
[8] D. Vrontis, D. Ktoridou, and Y. Melanthiou, Website design and development as an effective and efficient promotional tool: a Case study in the Hotel Industry in Cyprus. Journal of Website Promotion, Vol. 2, 2004, (3/4).
[9] H. P. Tuckman, P. Chatterjee, and D.Muha, Nonprofits Websites: Prevalence, Usage and Commercial Activity. Journal of Non-profit & Public Sector Marketing, Vol. 12, 2004, (1).
[10] T. Shimp, Integrated Marketing Communication in Advertising and Promotion. (South-Western: Cengage Learning, 2010).
- Citation
- Abstract
- Reference
- Full PDF
Keywords:RegEx, Traceback model, Network security, Threat.
[1] Lichuin Bao (2008) "Location Authentication Methods for Wireless Network Access Control", International conference on computer engineering and technology
[2] Yabin Liu, Huanguo Zhang , Huanguo Zhang and Bo Zhao(2009) Research on Unified Network Access Control Architecture 2009 IEEE Ninth International Conference on Computer and Information Technology. Regular Expression Matching for Deep Packet Inspection. In: Proc. ACM/IEEE ANCS. (2006) 93–102
[3] Ramaswamy, R., Kencl, L., Iannaccone, G.: Approximate Fingerprinting to Accelerate Pattern Matching. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. (2006) 301–306.
[5]. Liu, T., Yang, Y., Liu, Y., Sun, Y., Guo, L.: An Efficient Regular Expressions Compression Algorithm From A New Perspective. In: Proc. IEEE INFOCOM. (2011) 2129–2137 [4] Broder, A., Mitzenmacher, M., Mitzenmacher, A.: Network Applications of Bloom Filters: A Survey. In: Internet Mathematics, Citeseer (2002)
[6]. Kumar, S., Dharmapurikar, S., Yu, F., Crowley, P., Turner, J.: Algorithms to Accelerate Multiple Regular Expressions Matching for Deep Packet Inspection. In: Proc. ACM SIGCOMM. (2006) 339–350
[7]. Ficara, D., Giordano, S., Procissi, G., Vitucci, F., Antichi, G., Di Pietro, A.: An Improved DFA for Fast Regular Expression Matching. ACM SIGCOMM Computer Communication Review 38(5) (2008) 29–40..
- Citation
- Abstract
- Reference
- Full PDF
Keywords:Interoperability, Framework, Process agreement, Open standards, Catalogues.
[2] Biddick, Michael .―Government IT Priorities,‖ InformationWeek Government. http://www.informationweek.com news /government/ enterprise-architecture/218500752 (July 18,2009).
[3] Wikipedia. Semantic Interoperability. http://en.wikipedia.org/wiki/Semantic_interoperability (Feb. 23, 2010).
[4] Wikipedia. Ontology Engineering. http://en.wikipedia.org/wiki/Ontology_engineering (Feb. 19, 2010).
[5] Brownsword, L., Carney, D. J., Fisher, D., Lewis, G., Morris, E. J., Place, R. R., Smith, J., Wrage, L., & Meyers, B. C. Current Perspectives on Interoperability (CMU/SEI-2004-TR-009). Software Engineering Institute, Carnegie Mellon University, 2004.
[6] C4ISR Architectures Working Group. Levels of Information Systems Interoperability. U.S. DoD, OSD (C3I), CIO, Director for Architecture and Interoperability, 1998.
[7] Clark, T. & Jones, R. ―Organisational Interoperability Maturity Model for C2.‖ Proceedings of the 1999 Command and Control Research and Technology Symposium. Newport, RI, June 1999. CASOS, 1999.
[8] CS Transform. Beyond Interoperability: A New Policy Framework for e-Government. CS Transform, 2009.
[9] E-Government for Development Information Exchange. What Is eGovernment? University of Manchester's Institute for Development Policy and Management, 2008.http://www.egov4dev.org/success/definitions.shtml
[10] Global Standards Collaboration. ―Resolution GSC-14/24: (IPRWG) Open Standards (Reaffirmed). ‖Presented at the 14th Global Standards Collaboration meeting, July 2009.http://www.itu.int/dms_pub/itu-t/oth/21/05/T2105000011002400MSWE.doc