Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409149
M. O. Suliman, V. S. Kumar
Time-cost trade off optimization problem is very important in both fields of construction management and combinatorial optimization. In this paper, we propose a Pareto approach to solve multi-objective time-cost optimization problem in a fuzzy environment. Activity duration and cost are represented by trapezoidal fuzzy numbers to assess the uncertainty associate with them. The objective considered is to minimize the project overall completion time and total project cost. An effective simulated annealing algorithm based on proposed approach is presented to solve multi-objective fuzzy time-cost optimization problem. An external memory of non-dominated solutions is considered to save and update the non-dominated solutions during the problem solving process. Numerical examples are used to evaluate and study the performance of the proposed algorithm.
{"title":"Simulated annealing based algorith for multiobjective fuzzy time-cost optimization problem","authors":"M. O. Suliman, V. S. Kumar","doi":"10.1109/WICT.2012.6409149","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409149","url":null,"abstract":"Time-cost trade off optimization problem is very important in both fields of construction management and combinatorial optimization. In this paper, we propose a Pareto approach to solve multi-objective time-cost optimization problem in a fuzzy environment. Activity duration and cost are represented by trapezoidal fuzzy numbers to assess the uncertainty associate with them. The objective considered is to minimize the project overall completion time and total project cost. An effective simulated annealing algorithm based on proposed approach is presented to solve multi-objective fuzzy time-cost optimization problem. An external memory of non-dominated solutions is considered to save and update the non-dominated solutions during the problem solving process. Numerical examples are used to evaluate and study the performance of the proposed algorithm.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115648658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409112
S. Kharche, A. Mahajan
In this paper the comparative analysis of the two versions of Internet Protocol viz. IPv4 and IPv6 is presented based on throughput as the network performance metric. The throughput is measured for the application layer Domain Name System (DNS) traffic over the transport layer protocols. The throughput measurements are repeated for Voice traffic with different voice samples and computer gaming traffic characteristics. The experiments are performed on two machines connected via crossover cable in Windows 2007 and Windows 2008 client server environment. The measurements are facilitated by the simulated DNS and software coded voice samples present in the latest version of D-ITG 2.8.0rcl tool. The results show that network performance varies not only with Internet protocol (IP) version but also with the transport layer protocols and the voice samples. The maximum throughput difference observed for G711.2 Voice sample is 86.09 percent.
本文以吞吐量为网络性能指标,对IPv4和IPv6两个版本的互联网协议进行了比较分析。吞吐量是通过传输层协议对应用层DNS (Domain Name System)流量进行测量的。对具有不同语音样本和计算机游戏流量特征的语音流量重复吞吐量测量。实验在Windows 2007和Windows 2008客户端服务器环境下通过交叉电缆连接的两台机器上进行。通过最新版本的D-ITG 2.8.0rcl工具中提供的模拟DNS和软件编码语音样本,方便了测量。结果表明,网络性能不仅与IP协议版本有关,还与传输层协议和语音样本有关。在G711.2语音样本中观察到的最大吞吐量差异为86.09%。
{"title":"IPv4 and IPv6 performance comparison for simulated DNS and VoIP traffic in Windows 2007 and Windows 2008 client server environment","authors":"S. Kharche, A. Mahajan","doi":"10.1109/WICT.2012.6409112","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409112","url":null,"abstract":"In this paper the comparative analysis of the two versions of Internet Protocol viz. IPv4 and IPv6 is presented based on throughput as the network performance metric. The throughput is measured for the application layer Domain Name System (DNS) traffic over the transport layer protocols. The throughput measurements are repeated for Voice traffic with different voice samples and computer gaming traffic characteristics. The experiments are performed on two machines connected via crossover cable in Windows 2007 and Windows 2008 client server environment. The measurements are facilitated by the simulated DNS and software coded voice samples present in the latest version of D-ITG 2.8.0rcl tool. The results show that network performance varies not only with Internet protocol (IP) version but also with the transport layer protocols and the voice samples. The maximum throughput difference observed for G711.2 Voice sample is 86.09 percent.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409094
S. M. Handigund, H. Kavitha, A. Aphoorva
The Software Requirements specification (SRS) of an information system contains description of various usecases that can be clustered as real worlds for different actors. Though, usecase diagram depicts the real world for each actor, there may be presence of some secondary actors for each real world. Thus, the real worlds of the actors are not completely isolated real worlds; there exists some sort of overlapping. This overlap indicates some sort of redundancy in the design diagrams of the same type. When this is transformed into code, the redundancy persists in the code also. The redundancy in the code always gives scope for inconsistency and defers integrity. To avoid this, there is a necessity to identify the usecase hierarchies and reflect them in usecase package diagram. This paper attempts to use the usecase diagrams, then develops automated methodology to identify the object classes participating in each usecase. It also proposes an automated methodology for design of usecase hierarchies based on "Extends", "Uses" and Groups". This paper considers the SRS of an information system. Then, using [1], molds it, abstracts its control flow in the form of CFT [1, 2, 3], designs DFT [1, 2, 3], of it & then abstracts the relevant sequence of statements for an each usecase of an actor. This paper presents our proposed methodology that identifies all possible interrelationships between usecases, forms the hierarchies of usecases using de-facto standards of hierarchical levels [4, 5]. This reorganization eliminates the redundancies and packages the usecase incorporating the common reuse and common closure principles. Here, we have also proposed the use of class diagram for the design of usecase hierarchies which may later used for the development of usecase package diagram.
{"title":"An automated methodology for the design of usecase package diagram","authors":"S. M. Handigund, H. Kavitha, A. Aphoorva","doi":"10.1109/WICT.2012.6409094","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409094","url":null,"abstract":"The Software Requirements specification (SRS) of an information system contains description of various usecases that can be clustered as real worlds for different actors. Though, usecase diagram depicts the real world for each actor, there may be presence of some secondary actors for each real world. Thus, the real worlds of the actors are not completely isolated real worlds; there exists some sort of overlapping. This overlap indicates some sort of redundancy in the design diagrams of the same type. When this is transformed into code, the redundancy persists in the code also. The redundancy in the code always gives scope for inconsistency and defers integrity. To avoid this, there is a necessity to identify the usecase hierarchies and reflect them in usecase package diagram. This paper attempts to use the usecase diagrams, then develops automated methodology to identify the object classes participating in each usecase. It also proposes an automated methodology for design of usecase hierarchies based on \"Extends\", \"Uses\" and Groups\". This paper considers the SRS of an information system. Then, using [1], molds it, abstracts its control flow in the form of CFT [1, 2, 3], designs DFT [1, 2, 3], of it & then abstracts the relevant sequence of statements for an each usecase of an actor. This paper presents our proposed methodology that identifies all possible interrelationships between usecases, forms the hierarchies of usecases using de-facto standards of hierarchical levels [4, 5]. This reorganization eliminates the redundancies and packages the usecase incorporating the common reuse and common closure principles. Here, we have also proposed the use of class diagram for the design of usecase hierarchies which may later used for the development of usecase package diagram.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125483397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409190
S. Shukla, S. Dandapat, S. Prasanna
This paper proposes a novel subspace projection based approach for analysis of stressed speech signal. The projection of stressed speech vectors onto the neutral speech subspace can separate speech specific information from stress information. Orthogonality between speech and stress is assumed to separate these two information. The orthogonal relation between speech and stress subspaces is verified using speech and stress recognition techniques with a stressed speech database consisting of four stress conditions namely, neutral, angry, sad and Lombard from 30 words vocabulary. Studies show that the speech and stress specific information are present in their respective subspaces which proves orthogonality between these two subspaces.
{"title":"Subspace projection based analysis of speech under stressed condition","authors":"S. Shukla, S. Dandapat, S. Prasanna","doi":"10.1109/WICT.2012.6409190","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409190","url":null,"abstract":"This paper proposes a novel subspace projection based approach for analysis of stressed speech signal. The projection of stressed speech vectors onto the neutral speech subspace can separate speech specific information from stress information. Orthogonality between speech and stress is assumed to separate these two information. The orthogonal relation between speech and stress subspaces is verified using speech and stress recognition techniques with a stressed speech database consisting of four stress conditions namely, neutral, angry, sad and Lombard from 30 words vocabulary. Studies show that the speech and stress specific information are present in their respective subspaces which proves orthogonality between these two subspaces.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124584266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409258
Yiying Zhang, Xiangzhen Li, Suxiang Zhang, Y. Zhen
Smart Grid requires lots of applications in the terminals to sense the environment or control the intelligent devices. Due to the low cost and high function, wireless sensors have been deployed in power grid wildly. Depending on wireless sensor network (WSN), the grid can build a two-way communication system, and then customers can interact extensively with the network, both in providing power consumption data and even feeding back domestically produced energy into the grid. This paper starts with an overview of various applications of wireless sensor network in smart grid and then discusses exiting issues. Wireless sensor network can sense and monitor the transmission line, substation, home etc. however, the issues of security, reliability, standardization etc should be address.
{"title":"Wireless sensor network in smart grid: Applications and issue","authors":"Yiying Zhang, Xiangzhen Li, Suxiang Zhang, Y. Zhen","doi":"10.1109/WICT.2012.6409258","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409258","url":null,"abstract":"Smart Grid requires lots of applications in the terminals to sense the environment or control the intelligent devices. Due to the low cost and high function, wireless sensors have been deployed in power grid wildly. Depending on wireless sensor network (WSN), the grid can build a two-way communication system, and then customers can interact extensively with the network, both in providing power consumption data and even feeding back domestically produced energy into the grid. This paper starts with an overview of various applications of wireless sensor network in smart grid and then discusses exiting issues. Wireless sensor network can sense and monitor the transmission line, substation, home etc. however, the issues of security, reliability, standardization etc should be address.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409044
S. Akashe, V. Rajak, G. Sharma, R. Pandey
High performance 4:2 Encoder design using standard CMOS (Complementary Metal Oxide Semiconductor) logic gates is proposed. The proposed encoder design implementation accommodates both high and low current/power characteristics with scalable design structure through MTCMOS (Multi threshold CMOS) technique. This technique is applied to minimize the entire power and shows significant improvement in terms of speed. During the simulation we simulate the encoder by regular CMOS scheme and then proposed MTCMOS technique consists of sleep transistors connect with the logic circuit. The leakage current reduces to 54.56% and leakage power is 57.71%.
{"title":"Estimation of high speed encoder with MTCMOS technique in 45 nanometer era","authors":"S. Akashe, V. Rajak, G. Sharma, R. Pandey","doi":"10.1109/WICT.2012.6409044","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409044","url":null,"abstract":"High performance 4:2 Encoder design using standard CMOS (Complementary Metal Oxide Semiconductor) logic gates is proposed. The proposed encoder design implementation accommodates both high and low current/power characteristics with scalable design structure through MTCMOS (Multi threshold CMOS) technique. This technique is applied to minimize the entire power and shows significant improvement in terms of speed. During the simulation we simulate the encoder by regular CMOS scheme and then proposed MTCMOS technique consists of sleep transistors connect with the logic circuit. The leakage current reduces to 54.56% and leakage power is 57.71%.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125188407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409063
A. Bongale, N. Nithin, L. Jyothi
This paper presents treatment of incoming traffic in Multi-Protocol Label Switching (MPLS) enabled Open Shortest Path First (OSPF) network where traffic is classified based on its type. In this paper, the network is simulated with incoming traffic as a mixture of delay sensitive voice and web browsing data. End-to-end Quality of Service (QoS) is ensured using Forward Equivalence Class (FEC) and thus voice packets are given primary importance. Comparison is drawn between the OSPF network and MPLS enabled OSPF network to show the low voice delays and increase in number of http object responses in MPLS core.
{"title":"Traffic prioritization in MPLS enabled OSPF network","authors":"A. Bongale, N. Nithin, L. Jyothi","doi":"10.1109/WICT.2012.6409063","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409063","url":null,"abstract":"This paper presents treatment of incoming traffic in Multi-Protocol Label Switching (MPLS) enabled Open Shortest Path First (OSPF) network where traffic is classified based on its type. In this paper, the network is simulated with incoming traffic as a mixture of delay sensitive voice and web browsing data. End-to-end Quality of Service (QoS) is ensured using Forward Equivalence Class (FEC) and thus voice packets are given primary importance. Comparison is drawn between the OSPF network and MPLS enabled OSPF network to show the low voice delays and increase in number of http object responses in MPLS core.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409168
G. Rakate
A modified human body tracking system based on Discrete Wavelet Transform (DWT) and Mean-shift algorithm is proposed. Most of the traditional object tracking systems have many disadvantages like complexity, high computation power and large size. Here, whole system is implemented on ARM-Linux platform with camera mounted on rotary platform. DWT divides a frame into four different frequency bands without losing spatial information. So it neglects most of the fake motions in background as they are decomposed into high frequency wavelet sub-band. Color and spatial information are used as tracking parameters. Mean-shift algorithm takes less number of calculations while converging to new object search window. Ultimate aim of this project is to implement single human body tracking system on ARM-Linux platform, for which minimum computations should be performed. Combination of DWT and Mean-shift algorithm significantly decreases computation power. As shown in results, human body tracking system is successfully implemented.
{"title":"Human body tracking system based on DWT and Mean-shift algorithm on ARM-Linux platform","authors":"G. Rakate","doi":"10.1109/WICT.2012.6409168","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409168","url":null,"abstract":"A modified human body tracking system based on Discrete Wavelet Transform (DWT) and Mean-shift algorithm is proposed. Most of the traditional object tracking systems have many disadvantages like complexity, high computation power and large size. Here, whole system is implemented on ARM-Linux platform with camera mounted on rotary platform. DWT divides a frame into four different frequency bands without losing spatial information. So it neglects most of the fake motions in background as they are decomposed into high frequency wavelet sub-band. Color and spatial information are used as tracking parameters. Mean-shift algorithm takes less number of calculations while converging to new object search window. Ultimate aim of this project is to implement single human body tracking system on ARM-Linux platform, for which minimum computations should be performed. Combination of DWT and Mean-shift algorithm significantly decreases computation power. As shown in results, human body tracking system is successfully implemented.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129048523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409206
M. A. Thorat, V. Deshpande
Wireless sensor network (WSN) consists of spatially distributed sensors to monitor environmental conditions. WSN has ability to cope up with the node failure, power consumption, data transfer. Performance characteristics of transport layer are reliability, congestion control, fairness, throughput etc. Performance of transport layer protocol is evaluated by these characteristics. Sensor nodes closer to the sink carries large number of packets. To avoid the congestion and reduce the probability of packet loss we have to reduce the number of packets processed by near sink nodes. So handling fairness in wireless sensor network is very essential. Fairness maintains the network traffic and helps to avoid congestion. To achieve fairness it is necessary to adjust packet transmission rate. In this paper we discuss different techniques used to achieve the fairness. And finally we discuss factors affecting fairness and requirement of traffic to be fair.
{"title":"Handling fairness in wireless sensor network","authors":"M. A. Thorat, V. Deshpande","doi":"10.1109/WICT.2012.6409206","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409206","url":null,"abstract":"Wireless sensor network (WSN) consists of spatially distributed sensors to monitor environmental conditions. WSN has ability to cope up with the node failure, power consumption, data transfer. Performance characteristics of transport layer are reliability, congestion control, fairness, throughput etc. Performance of transport layer protocol is evaluated by these characteristics. Sensor nodes closer to the sink carries large number of packets. To avoid the congestion and reduce the probability of packet loss we have to reduce the number of packets processed by near sink nodes. So handling fairness in wireless sensor network is very essential. Fairness maintains the network traffic and helps to avoid congestion. To achieve fairness it is necessary to adjust packet transmission rate. In this paper we discuss different techniques used to achieve the fairness. And finally we discuss factors affecting fairness and requirement of traffic to be fair.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130852001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409093
S. M. Handigund, C. Pushpa
The Software Requirements Specification (SRS) is prepared by the strategic management of the client organization, after collecting the end users requirements. The developer makes the feasibility study for cost estimation, availability of human & other resources and scope identification in consultation with the client for appropriate modification in the SRS. After the delivery of the software product, the end user is deprived of the modifications made in the SRS and the software architecture of the product as configured to the changing needs of the client. If the software product is used without the Product Data Flow Diagram (PdDFD), the incorporated modifications are invisible to the end users; as a result the product software becomes peripeteia with respect to client's perspective. To avoid this, it is preferable to design PdDFD by the developer. Unfortunately, in the absence of domain knowledge, the developer may not design correct and complete PdDFD. Therefore, there is an urgent need to delink the design task from the domain knowledge. As a sophomore attempt in the design of PdDFD, this paper attempts to develop the automated methodology for the abstraction of the model elements along with their values required for the PdDFD from the SRS. In this design, virtually we have narrowed down the art of defining the usecase, work process & work into engineering. In our proposed research paper, as an intermediate product we have also developed the product Work break down structure (PdWBS). This designed intermediate PdWBS can serve as the base for the design of software architecture. We have also represented the PdDFD in the tabular form without compromising its sensitive nature.
{"title":"An ameliorated methodology for the design of Product Data Flow Diagram","authors":"S. M. Handigund, C. Pushpa","doi":"10.1109/WICT.2012.6409093","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409093","url":null,"abstract":"The Software Requirements Specification (SRS) is prepared by the strategic management of the client organization, after collecting the end users requirements. The developer makes the feasibility study for cost estimation, availability of human & other resources and scope identification in consultation with the client for appropriate modification in the SRS. After the delivery of the software product, the end user is deprived of the modifications made in the SRS and the software architecture of the product as configured to the changing needs of the client. If the software product is used without the Product Data Flow Diagram (PdDFD), the incorporated modifications are invisible to the end users; as a result the product software becomes peripeteia with respect to client's perspective. To avoid this, it is preferable to design PdDFD by the developer. Unfortunately, in the absence of domain knowledge, the developer may not design correct and complete PdDFD. Therefore, there is an urgent need to delink the design task from the domain knowledge. As a sophomore attempt in the design of PdDFD, this paper attempts to develop the automated methodology for the abstraction of the model elements along with their values required for the PdDFD from the SRS. In this design, virtually we have narrowed down the art of defining the usecase, work process & work into engineering. In our proposed research paper, as an intermediate product we have also developed the product Work break down structure (PdWBS). This designed intermediate PdWBS can serve as the base for the design of software architecture. We have also represented the PdDFD in the tabular form without compromising its sensitive nature.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}