首页 > 最新文献

2011 Frontiers of Information Technology最新文献

英文 中文
A Systematic Review on Software Measurement Programs 软件测量程序的系统回顾
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.15
Touseef Tahir, Ali Jafar
Most of the measurement programs fail to achieve targeted goals. This paper presents outcomes of systematic review on software measurement programs. The aim of the study is to analyse goal based measurement models/frameworks applications/tools and success factors. 1579 research studies were reviewed in the beginning and on basis of predefined criteria 28 studies were chosen for analysis. The selection of research studies was done on the basis of structured procedure of systematic review. Outcome of this study consists of observations and suggestions on the basis of analysis of selected studies.
大多数的测量程序不能达到预定的目标。本文介绍了对软件度量程序进行系统评审的结果。本研究的目的是分析基于目标的测量模型/框架、应用/工具和成功因素。在一开始就对1579项研究进行了审查,并根据预先确定的标准选择了28项研究进行分析。研究项目的选择是根据系统评价的结构化程序进行的。本研究的结果包括在对所选研究进行分析的基础上的观察和建议。
{"title":"A Systematic Review on Software Measurement Programs","authors":"Touseef Tahir, Ali Jafar","doi":"10.1109/FIT.2011.15","DOIUrl":"https://doi.org/10.1109/FIT.2011.15","url":null,"abstract":"Most of the measurement programs fail to achieve targeted goals. This paper presents outcomes of systematic review on software measurement programs. The aim of the study is to analyse goal based measurement models/frameworks applications/tools and success factors. 1579 research studies were reviewed in the beginning and on basis of predefined criteria 28 studies were chosen for analysis. The selection of research studies was done on the basis of structured procedure of systematic review. Outcome of this study consists of observations and suggestions on the basis of analysis of selected studies.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Iterative Common Phase Error Correction in OFDM Systems OFDM系统的迭代共相位纠错
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.55
A. Bibi, Aizaz Ali Shah, S. Khattak
This paper deals with iterative common phase error correction in an OFDM system. Common phase error is the average phase shift of the sub carriers due to mismatch between the transmitter and receiver oscillator phases. It causes substantial degradation in receiver performance and should be compensated. In this paper an iterative scheme is proposed which feedbacks the symbol estimates available at the detector's output in order to precisely evaluate and correct the amount of common phase noise. Different feedback techniques have been investigated and their performance at different signal to noise ratios has been compared. The results show a substantial improvement in common phase noise when compared to the existing techniques.
本文研究了OFDM系统中的迭代共相位误差校正问题。共同相位误差是由于发送端和接收端振荡器相位不匹配导致的子载波的平均相移。它会导致接收机性能的大幅下降,应该加以补偿。为了精确地估计和校正共相噪声的数量,本文提出了一种反馈检测器输出处可用符号估计的迭代方案。研究了不同的反馈技术,并比较了它们在不同信噪比下的性能。结果表明,与现有技术相比,该方法在共相噪声方面有了很大的改善。
{"title":"Iterative Common Phase Error Correction in OFDM Systems","authors":"A. Bibi, Aizaz Ali Shah, S. Khattak","doi":"10.1109/FIT.2011.55","DOIUrl":"https://doi.org/10.1109/FIT.2011.55","url":null,"abstract":"This paper deals with iterative common phase error correction in an OFDM system. Common phase error is the average phase shift of the sub carriers due to mismatch between the transmitter and receiver oscillator phases. It causes substantial degradation in receiver performance and should be compensated. In this paper an iterative scheme is proposed which feedbacks the symbol estimates available at the detector's output in order to precisely evaluate and correct the amount of common phase noise. Different feedback techniques have been investigated and their performance at different signal to noise ratios has been compared. The results show a substantial improvement in common phase noise when compared to the existing techniques.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121573255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Polymorphic Circuit Design for Speedy Handwritten Character Recognition Using Cartesian Genetic Programming 基于笛卡尔遗传规划的快速手写字符识别多态电路设计
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.22
A. Rehman, G. M. Khan
In this paper we have used CGP (Cartesian Genetic Programming) to obtain an optimum polymorphic circuit for speedy recognition of hand written characters. Images are converted to binary form and arranged in one-dimension array. This data is fed, in parallel, to the system. Experiments have demonstrated that promising results can be obtained using a much simpler circuit having 1-bit multiplexers. All the experiments are conducted without any pre-processing and image is being fed in parallel to the system, thus reducing complexity of the circuit and time for recognition enormously.
本文利用笛卡尔遗传规划(CGP)得到了一种快速识别手写字符的最佳多态电路。图像被转换成二进制形式并排列成一维数组。这些数据被并行地馈送到系统。实验表明,使用更简单的1位多路复用器电路可以获得令人满意的结果。所有的实验都是在没有任何预处理的情况下进行的,图像是并行输入到系统中,从而大大降低了电路的复杂性和识别时间。
{"title":"Polymorphic Circuit Design for Speedy Handwritten Character Recognition Using Cartesian Genetic Programming","authors":"A. Rehman, G. M. Khan","doi":"10.1109/FIT.2011.22","DOIUrl":"https://doi.org/10.1109/FIT.2011.22","url":null,"abstract":"In this paper we have used CGP (Cartesian Genetic Programming) to obtain an optimum polymorphic circuit for speedy recognition of hand written characters. Images are converted to binary form and arranged in one-dimension array. This data is fed, in parallel, to the system. Experiments have demonstrated that promising results can be obtained using a much simpler circuit having 1-bit multiplexers. All the experiments are conducted without any pre-processing and image is being fed in parallel to the system, thus reducing complexity of the circuit and time for recognition enormously.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124623061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Forensics for Eucalyptus 桉树的数字取证
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.28
Zafarullah, Faiza Anwar, Z. Anwar
Cloud computing is a computing paradigm that shifts drastically from traditional computing architecture. Although this new computing paradigm brings many advantages like utility computing model but the design in not flawless and hence suffers from not only many known computer vulnerabilities but also introduces unique information confidentiality, integrity and availability risks as well due its inherent design paradigm. As a result the digital forensics, which relies heavily on physical access to computing devices and applications logs, has become a biggest challenge in cloud environments due to the non-availability of physical access to computing devices and applications logs. As we will see this paper highlights many of the digital forensics issues in the cloud environments and tries to address some of these forensics issues by identifying possible Syslog or Snort logs that can help in detecting cloud attacks or conducting digital forensics in cloud environments by analyzing logs generated by an open source cloud computing Eucalyptus software. As we will see in the paper we neither had access to Eucalyptus logs dataset nor it was known that any such dataset exist that could be analyzed offline for digital forensics purposes. Thus we generated our own dataset by attacking Eucalyptus with many of the known cloud attacks and then analyzing the resultant dataset to identify possible log entries that could identify cloud attacks or help in conducting digital forensics in cloud environments.
云计算是一种计算范式,它与传统的计算架构发生了巨大的变化。虽然这种新的计算范式具有效用计算模型等诸多优点,但其设计并不完美,不仅存在许多已知的计算机漏洞,而且由于其固有的设计范式,也带来了独特的信息机密性、完整性和可用性风险。因此,严重依赖于对计算设备和应用程序日志的物理访问的数字取证已成为云环境中最大的挑战,因为无法对计算设备和应用程序日志进行物理访问。正如我们将看到的,本文重点介绍了云环境中的许多数字取证问题,并试图通过识别可能的Syslog或Snort日志来解决其中的一些取证问题,这些日志可以帮助检测云攻击,或者通过分析开源云计算Eucalyptus软件生成的日志来在云环境中进行数字取证。正如我们将在论文中看到的,我们既没有访问桉树日志数据集,也不知道有任何这样的数据集存在,可以离线分析,用于数字取证目的。因此,我们通过使用许多已知的云攻击攻击Eucalyptus来生成自己的数据集,然后分析生成的数据集以识别可能的日志条目,这些日志条目可以识别云攻击或帮助在云环境中进行数字取证。
{"title":"Digital Forensics for Eucalyptus","authors":"Zafarullah, Faiza Anwar, Z. Anwar","doi":"10.1109/FIT.2011.28","DOIUrl":"https://doi.org/10.1109/FIT.2011.28","url":null,"abstract":"Cloud computing is a computing paradigm that shifts drastically from traditional computing architecture. Although this new computing paradigm brings many advantages like utility computing model but the design in not flawless and hence suffers from not only many known computer vulnerabilities but also introduces unique information confidentiality, integrity and availability risks as well due its inherent design paradigm. As a result the digital forensics, which relies heavily on physical access to computing devices and applications logs, has become a biggest challenge in cloud environments due to the non-availability of physical access to computing devices and applications logs. As we will see this paper highlights many of the digital forensics issues in the cloud environments and tries to address some of these forensics issues by identifying possible Syslog or Snort logs that can help in detecting cloud attacks or conducting digital forensics in cloud environments by analyzing logs generated by an open source cloud computing Eucalyptus software. As we will see in the paper we neither had access to Eucalyptus logs dataset nor it was known that any such dataset exist that could be analyzed offline for digital forensics purposes. Thus we generated our own dataset by attacking Eucalyptus with many of the known cloud attacks and then analyzing the resultant dataset to identify possible log entries that could identify cloud attacks or help in conducting digital forensics in cloud environments.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127452410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Architecture and Implementation of Modular Airthmetic Unit for SOC SOC模块化算术单元的体系结构与实现
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.27
M. H. Ahmad, Syed Wasi Alam, Irum Baig
In last decade of the twentieth century electronic gadgets penetrated our lives in huge numbers. During the development of such technologies operation of the devices/protocols was the main concern and the security aspect was ignored. But the losses that occur due to security breaches resulted in security conscious designs. The direction of technological advancement is also towards more functionality in less area. In such cases security is usually the last preference. There is also more advancement in chip fabrication per unit area that brings the concept of system on chip (SOC). So to take the advantage of small fabrication per unit area for security enhancement we propose the architecture of modular arithmetic unit (MAU) as part of the new SOC in order to implement cryptographic algorithms in an efficient manner. MAU is designed keeping in view ease of interfacing with any processor on SOC. Thus cryptographic algorithms that are based on modular arithmetic can be written in high level language and executed on processor of SOC. MAU is implemented on Xilinx Spartan 3 which shows flexibility, scalability and less area. The implementation results show area consumption of 1500 slices.
在二十世纪的最后十年,电子产品大量地渗透到我们的生活中。在这些技术的发展过程中,设备/协议的操作是主要关注的问题,而安全方面被忽视了。但是,由于安全漏洞造成的损失导致了具有安全意识的设计。技术进步的方向也是在更小的区域内实现更多的功能。在这种情况下,安全性通常是最后一个选择。每单位面积的芯片制造也有了更多的进步,这带来了片上系统(SOC)的概念。因此,为了利用单位面积的小制造来增强安全性,我们提出模块化算术单元(MAU)架构作为新SOC的一部分,以便以有效的方式实现加密算法。MAU的设计保持了与SOC上任何处理器接口的便利性。因此,基于模块化算法的密码算法可以用高级语言编写并在SOC的处理器上执行。MAU是在Xilinx Spartan 3上实现的,它显示了灵活性、可扩展性和更小的面积。实现结果表明,面积消耗为1500片。
{"title":"Architecture and Implementation of Modular Airthmetic Unit for SOC","authors":"M. H. Ahmad, Syed Wasi Alam, Irum Baig","doi":"10.1109/FIT.2011.27","DOIUrl":"https://doi.org/10.1109/FIT.2011.27","url":null,"abstract":"In last decade of the twentieth century electronic gadgets penetrated our lives in huge numbers. During the development of such technologies operation of the devices/protocols was the main concern and the security aspect was ignored. But the losses that occur due to security breaches resulted in security conscious designs. The direction of technological advancement is also towards more functionality in less area. In such cases security is usually the last preference. There is also more advancement in chip fabrication per unit area that brings the concept of system on chip (SOC). So to take the advantage of small fabrication per unit area for security enhancement we propose the architecture of modular arithmetic unit (MAU) as part of the new SOC in order to implement cryptographic algorithms in an efficient manner. MAU is designed keeping in view ease of interfacing with any processor on SOC. Thus cryptographic algorithms that are based on modular arithmetic can be written in high level language and executed on processor of SOC. MAU is implemented on Xilinx Spartan 3 which shows flexibility, scalability and less area. The implementation results show area consumption of 1500 slices.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks 认知无线电自组织网络的全分布式协同频谱感知
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.10
W. Ejaz, N. Hasan, H. Kim, M. A. Azam
Cognitive radios are indispensable to shift from conventional spectrum assignment to dynamic spectrum access. These are intelligent radios having the capability of sensing the radio environment and reconfiguring the operating parameters dynamically. Recently cognitive radios are considered for ad hoc environment. Cognitive radio ad hoc network have several unique features other than inherited features of ad hoc network like distributed multi-hop architecture, variant network topology and opportunistic spectrum availability. It is required for cognitive radio to find unutilized portion of the spectrum more accurately for successful deployment of cognitive radio ad hoc networks. In cooperative spectrum sensing, multiple cognitive radio users cooperate to detect the presence or absence of primary user to improve the detection performance. Ad hoc networks are dynamic in nature and have no central entity for data fusion. Therefore cognitive radio ad hoc networks need fully distributed cooperative spectrum sensing. In this paper, a gradient based fully distributed cooperative spectrum sensing is proposed for cognitive radio ad hoc networks. The proposed scheme is analyzed from the perspective of reliable sensing and energy consumption. Simulation results show the effectiveness of the proposed scheme.
从传统频谱分配到动态频谱接入,认知无线电是不可缺少的。这些智能无线电具有感知无线电环境和动态重新配置工作参数的能力。近年来,认知无线电被研究用于特殊环境。认知无线电自组织网络除了具有分布式多跳结构、网络拓扑变化和机会频谱可用性等自组织网络的遗传特征外,还具有一些独特的特征。为了成功部署认知无线电自组织网络,需要更准确地发现未利用的频谱部分。在协同频谱感知中,多个认知无线电用户合作检测主用户的存在或不存在,以提高检测性能。自组织网络本质上是动态的,没有数据融合的中心实体。因此,认知无线电自组织网络需要完全分布式的协同频谱感知。提出了一种基于梯度的全分布式协同频谱感知方法,用于认知无线电自组织网络。从传感可靠性和能耗两方面对该方案进行了分析。仿真结果表明了该方案的有效性。
{"title":"Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks","authors":"W. Ejaz, N. Hasan, H. Kim, M. A. Azam","doi":"10.1109/FIT.2011.10","DOIUrl":"https://doi.org/10.1109/FIT.2011.10","url":null,"abstract":"Cognitive radios are indispensable to shift from conventional spectrum assignment to dynamic spectrum access. These are intelligent radios having the capability of sensing the radio environment and reconfiguring the operating parameters dynamically. Recently cognitive radios are considered for ad hoc environment. Cognitive radio ad hoc network have several unique features other than inherited features of ad hoc network like distributed multi-hop architecture, variant network topology and opportunistic spectrum availability. It is required for cognitive radio to find unutilized portion of the spectrum more accurately for successful deployment of cognitive radio ad hoc networks. In cooperative spectrum sensing, multiple cognitive radio users cooperate to detect the presence or absence of primary user to improve the detection performance. Ad hoc networks are dynamic in nature and have no central entity for data fusion. Therefore cognitive radio ad hoc networks need fully distributed cooperative spectrum sensing. In this paper, a gradient based fully distributed cooperative spectrum sensing is proposed for cognitive radio ad hoc networks. The proposed scheme is analyzed from the perspective of reliable sensing and energy consumption. Simulation results show the effectiveness of the proposed scheme.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"415 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115924670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Automated Change Request Triage Using Alpha Frequency Matrix 使用Alpha频率矩阵的自动变更请求分类
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.62
Sana Nasim, Saad Razzaq, Javed Ferzund
Software changes are inevitable in large and long lived projects. Successful applications require proper handling and assignment of change requests (CRs). In large projects, a number of CRs are generated daily. These CRs should be resolved timely. We present an automated approach to assign CRs to appropriate developers. We use Alphabet Frequency Matrix (AFM) to classify CRs into developer classes. We apply machine learning techniques on the AFM data sets for classification. We find that AFM can be used to achieve an average accuracy from 27% to 53% with precision 25% to 55% and recall 28% to 56%.
在大型和长期项目中,软件更改是不可避免的。成功的应用程序需要正确处理和分配变更请求(cr)。在大型项目中,每天都会生成许多cr。这些问题应及时解决。我们提出了一种自动的方法来将cr分配给合适的开发人员。我们使用字母表频率矩阵(AFM)将cr划分为开发人员类别。我们将机器学习技术应用于AFM数据集进行分类。我们发现AFM可以实现27%到53%的平均准确率,精密度为25%到55%,召回率为28%到56%。
{"title":"Automated Change Request Triage Using Alpha Frequency Matrix","authors":"Sana Nasim, Saad Razzaq, Javed Ferzund","doi":"10.1109/FIT.2011.62","DOIUrl":"https://doi.org/10.1109/FIT.2011.62","url":null,"abstract":"Software changes are inevitable in large and long lived projects. Successful applications require proper handling and assignment of change requests (CRs). In large projects, a number of CRs are generated daily. These CRs should be resolved timely. We present an automated approach to assign CRs to appropriate developers. We use Alphabet Frequency Matrix (AFM) to classify CRs into developer classes. We apply machine learning techniques on the AFM data sets for classification. We find that AFM can be used to achieve an average accuracy from 27% to 53% with precision 25% to 55% and recall 28% to 56%.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126716310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Pervasive Nature of Variability in SOC SOC中可变性的普遍性
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.20
Ateeq Khan, Christian Kästner, V. Köppen, G. Saake
Service-oriented computing has gained attention from researchers and industry due to various benefits. Enterprises are supported by SOC-based solutions. Enterprise requirements change with the customer needs, market conditions, and variability is often needed in SOC. Research usually focuses at variability on the business process level and ignores variability at other layers. In this paper, we show what kind of variability can occur and how it spans across all layers of SOC. We present some example scenarios to discuss different kinds of variability and their reasons in SOC environments. Finally, we classify variability to show that variability is not an isolated problem in a single layer.
面向服务的计算由于其诸多优点而受到研究人员和业界的关注。企业由基于soc的解决方案支持。企业需求随着客户需求、市场条件的变化而变化,SOC中经常需要可变性。研究通常集中在业务流程级别的可变性上,而忽略了其他层的可变性。在本文中,我们展示了可能发生的变异性以及它如何跨越SOC的所有层。我们提供了一些示例场景来讨论SOC环境中不同类型的可变性及其原因。最后,我们对可变性进行分类,以表明可变性不是单个层中的孤立问题。
{"title":"The Pervasive Nature of Variability in SOC","authors":"Ateeq Khan, Christian Kästner, V. Köppen, G. Saake","doi":"10.1109/FIT.2011.20","DOIUrl":"https://doi.org/10.1109/FIT.2011.20","url":null,"abstract":"Service-oriented computing has gained attention from researchers and industry due to various benefits. Enterprises are supported by SOC-based solutions. Enterprise requirements change with the customer needs, market conditions, and variability is often needed in SOC. Research usually focuses at variability on the business process level and ignores variability at other layers. In this paper, we show what kind of variability can occur and how it spans across all layers of SOC. We present some example scenarios to discuss different kinds of variability and their reasons in SOC environments. Finally, we classify variability to show that variability is not an isolated problem in a single layer.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122136368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using Component-Oriented Process Models for Multi-metamodel Applications 在多元模型应用程序中使用面向组件的过程模型
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.47
F. R. Golra, F. Dagnat
Recent advancements in Model Driven Engineering (MDE) call for the corresponding software development processes. These processes need to be able to assist multi-metamodel development by extending support for the usage of models and transformations. Business processes are sequenced on the basis of their sequential contingencies whereas we argue that software development processes are meant to be sequenced along their intrinsic factors. In this paper, we present a process metamodel from our framework, inspired from the component based paradigm, to automate the software development processes. This approach presents the concept of structured artifacts and exploits the activity sequencing based on events and constraints.
模型驱动工程(MDE)的最新进展需要相应的软件开发过程。这些过程需要能够通过扩展对模型和转换使用的支持来协助多元模型开发。业务过程是根据它们的顺序偶然性来排序的,而我们认为软件开发过程是按照它们的内在因素来排序的。在本文中,我们从我们的框架中提出了一个过程元模型,该模型受基于组件的范例的启发,用于自动化软件开发过程。这种方法提出了结构化工件的概念,并利用了基于事件和约束的活动排序。
{"title":"Using Component-Oriented Process Models for Multi-metamodel Applications","authors":"F. R. Golra, F. Dagnat","doi":"10.1109/FIT.2011.47","DOIUrl":"https://doi.org/10.1109/FIT.2011.47","url":null,"abstract":"Recent advancements in Model Driven Engineering (MDE) call for the corresponding software development processes. These processes need to be able to assist multi-metamodel development by extending support for the usage of models and transformations. Business processes are sequenced on the basis of their sequential contingencies whereas we argue that software development processes are meant to be sequenced along their intrinsic factors. In this paper, we present a process metamodel from our framework, inspired from the component based paradigm, to automate the software development processes. This approach presents the concept of structured artifacts and exploits the activity sequencing based on events and constraints.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131755673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Palm Print Recognition Using Oriented Hausdorff Distance Transform 面向Hausdorff距离变换的掌纹识别
Pub Date : 2011-12-19 DOI: 10.1109/FIT.2011.23
MianMahmood Ali, M. Ghafoor, I. A. Taj, K. Hayat
Out of various biometrics being used for personal recognition, palm-print matching has gained vast acceptance due to its reliability and practicability. This paper proposes a robust palm-print recognition algorithm for human identification. The algorithm is based on Robust Oriented Hausdorff Similarity (ROHS) measure. The use of ROHS in matching is comparatively more tolerant to noise and occlusion as compared to the traditional Hausdorff distance based matching. A region of interest (128X128) is extracted from the original image and ROHS based matching is performed. The experimental results demonstrate the practicability of this algorithm.
在众多用于个人识别的生物识别技术中,掌纹匹配以其可靠性和实用性得到了广泛的认可。提出了一种鲁棒的掌纹识别算法。该算法基于面向鲁棒的Hausdorff相似度(ROHS)度量。与传统的基于Hausdorff距离的匹配相比,在匹配中使用ROHS相对更能容忍噪声和遮挡。从原始图像中提取感兴趣区域(128X128),并进行基于ROHS的匹配。实验结果证明了该算法的实用性。
{"title":"Palm Print Recognition Using Oriented Hausdorff Distance Transform","authors":"MianMahmood Ali, M. Ghafoor, I. A. Taj, K. Hayat","doi":"10.1109/FIT.2011.23","DOIUrl":"https://doi.org/10.1109/FIT.2011.23","url":null,"abstract":"Out of various biometrics being used for personal recognition, palm-print matching has gained vast acceptance due to its reliability and practicability. This paper proposes a robust palm-print recognition algorithm for human identification. The algorithm is based on Robust Oriented Hausdorff Similarity (ROHS) measure. The use of ROHS in matching is comparatively more tolerant to noise and occlusion as compared to the traditional Hausdorff distance based matching. A region of interest (128X128) is extracted from the original image and ROHS based matching is performed. The experimental results demonstrate the practicability of this algorithm.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"109 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2011 Frontiers of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1