Software architecture is the structural solution that achieves the overall technical and operational
requirements for software developments. Software engineers applied software architectures for their
software system developments; however, they worry the basic benchmarks in order to select software
architecture styles, possible components, integration methods (connectors) and the exact application of
each style.
The objective of this research work was a comparative analysis of software architecture styles by its
weakness and benefits in order to select by the programmer during their design time. Finally, in this study,
the researcher has been identified architectural styles, weakness, and Strength and application areas with
its component, connector and Interface for the selected architectural styles.
Master sequence diagrams with this sequence diagram guide. It describes everything you need to know on sequence diagram notations, best practices as well as common mistakes. It also explains how to draw a sequence diagram step by step. Plus it offers Creately sequence diagram templates you can click and edit right away.
Je vous partage l'un des présentations que j'ai réalisé lorsque j'étais élève ingénieur pour le module 'Anglais Business ' , utile pour les étudiants souhaitant préparer une présentation en anglais sur les Design Pattern - ou les patrons de conception .
Master sequence diagrams with this sequence diagram guide. It describes everything you need to know on sequence diagram notations, best practices as well as common mistakes. It also explains how to draw a sequence diagram step by step. Plus it offers Creately sequence diagram templates you can click and edit right away.
Je vous partage l'un des présentations que j'ai réalisé lorsque j'étais élève ingénieur pour le module 'Anglais Business ' , utile pour les étudiants souhaitant préparer une présentation en anglais sur les Design Pattern - ou les patrons de conception .
Unified Modeling Language (UML) is a modeling language, used for design. Designed based on OMG Standard, Object this helps to express and design documents, software. This is particularly useful for OO design. Here is a brief tutorial that talks about UML usage.
This is a basic crash course for android development covers:
Android Studio,Hello World Application,Application Components,Application Resources,User Interface,Good UI,Play Store
Is User Centered Design a buzzword, a technique, or a methodology? Why does "UCD" get so much attention? How has it changed how teams approach web application usability efforts? Is UCD right for you?
1. User Centered Design: Evolving from Dot-Com to Web 2.0
2. Why UCD? (Development, Business, Design benefits)
3. Development process: UCD vs. Agile vs. Waterfall
4. Case Studies: User Centered Design success stories
5. Is UCD right for you?: Planning a UCD process for your product
6. Q & A
Reverse Engineering for Documenting Software Architectures, a Literature ReviewEditor IJCATR
Recently, much research in software engineering focused on reverse engineering of software systems which has become one
of the major engineering trends for software evolution. The objective of this survey paper is to provide a literature review on the
existing reverse engineering methodologies and approaches for documenting the architecture of software systems. The survey process
was based on selecting the most common approaches that form the current state of the art in documenting software architectures. We
discuss the limitations of these approaches and highlight the main directions for future research and describe specific open issues for
research.
Unified Modeling Language (UML) is a modeling language, used for design. Designed based on OMG Standard, Object this helps to express and design documents, software. This is particularly useful for OO design. Here is a brief tutorial that talks about UML usage.
This is a basic crash course for android development covers:
Android Studio,Hello World Application,Application Components,Application Resources,User Interface,Good UI,Play Store
Is User Centered Design a buzzword, a technique, or a methodology? Why does "UCD" get so much attention? How has it changed how teams approach web application usability efforts? Is UCD right for you?
1. User Centered Design: Evolving from Dot-Com to Web 2.0
2. Why UCD? (Development, Business, Design benefits)
3. Development process: UCD vs. Agile vs. Waterfall
4. Case Studies: User Centered Design success stories
5. Is UCD right for you?: Planning a UCD process for your product
6. Q & A
Reverse Engineering for Documenting Software Architectures, a Literature ReviewEditor IJCATR
Recently, much research in software engineering focused on reverse engineering of software systems which has become one
of the major engineering trends for software evolution. The objective of this survey paper is to provide a literature review on the
existing reverse engineering methodologies and approaches for documenting the architecture of software systems. The survey process
was based on selecting the most common approaches that form the current state of the art in documenting software architectures. We
discuss the limitations of these approaches and highlight the main directions for future research and describe specific open issues for
research.
A metric based approach for measuring the conceptual integrity of software ar...ijseajournal
Software architectures evaluation has an important role in the life cycle of software systems. The
conceptual integrity is one of the quality attributes which could be closely related to software architectural
design. It is the underlying theme or vision that unifies all levels of the system's design. In this paper, a
method for measuring the conceptual integrity of software architecture is provided. Conceptual integrity
measurement is done in several steps by extracting a graph structure which its nodes are architectural
concepts and its edges are relationship between them. The constructed graph is then weighted according to
the type of relationship among the architectural concepts. Finally, a metric for evaluating the conceptual
integrity from the refined graph is provided.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Software Archtecture.
Software design is a process to transform user requirements into some suitable form, which helps the programmer in software coding and implementation.
Software design is the important step in SDLC (Software Design Life Cycle), which moves the concentration from problem domain to solution domain. It tries to specify how to fulfill the requirements mentioned in SRS.
Software design plays an important role in developing software: during software design, software engineers produce various models that form a kind of blueprint of the solution to be implemented
Systems variability modeling a textual model mixing class and feature conceptsijcsit
System’s reusability and cost are very important in software product line design area. Developers’ goal is
to increase system reusability and decreasing cost and efforts for building components from scratch for
each software configuration. This can be reached by developing software product line (SPL). To handle
SPL engineering process, several approaches with several techniques were developed. One of these
approaches is called separated approach. It requires separating the commonalities and variability for
system’s components to allow configuration selection based on user defined features. Textual notationbased
approaches have been used for their formal syntax and semantics to represent system features and
implementations. But these approaches are still weak in mixing features (conceptual level) and classes
(physical level) that guarantee smooth and automatic configuration generation for software releases. The
absence of methodology supporting the mixing process is a real weakness. In this paper, we enhanced
SPL’s reusability by introducing some meta-features, classified according to their functionalities. As a first
consequence, mixing class and feature concepts is supported in a simple way using class interfaces and
inherent features for smooth move from feature model to class model. And as a second consequence, the
mixing process is supported by a textual design and implementation methodology, mixing class and feature
models by combining their concepts in a single language. The supported configuration generation process
is simple, coherent, and complete.
The following presentation covers the basics of Software Architecture and the related topics. Most of the information provided is given in short phrases. Refer to Wikipedia article on the same for more information.
This is meant to be a brief slideshow only.
FRAMEWORKS BETWEEN COMPONENTS AND OBJECTSacijjournal
Before the emergence of Component-Based Frameworks, similar issues have been addressed by other
software development paradigms including e.g. Object-Oriented Programming (OOP), ComponentBased Development (CBD), and Object-Oriented Framework. In this study, these approaches especially
object-oriented Frameworks are compared to Component-Based Frameworks and their relationship are
discussed. Different software reuse methods impacts on architectural patterns and support for
application extensions and versioning. It is concluded that many of the mechanisms provided by
Component-Based Framework can be enabled by software elements at the lower level. The main
contribution of Component-Based Framework is the focus on Component development. All of them can be
built on each other in layered manner by adopting suitable design patterns. Still some things such as
which method to develop and upgrade existing application to other approach.
3rd International Conference on Machine Learning, NLP and Data Mining (MLDA 2...ADEIJ Journal
3rd International Conference on Machine Learning, NLP and Data Mining (MLDA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Machine Learning, NLP and Data Mining.
8th International Conference on Soft Computing, Mathematics and Control (SMC ...ADEIJ Journal
8th International Conference on Soft Computing, Mathematics and Control (SMC 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications impacts and challenges of Soft Computing, Mathematics and Control. The conference documents practical and theoretical results which make a fundamental contribution for the development of Soft Computing, Mathematics and Control. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
3rd International Conference on Machine Learning, NLP and Data Mining (MLDA 2...ADEIJ Journal
3rd International Conference on Machine Learning, NLP and Data Mining (MLDA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Machine Learning, Natural Language Computing and Data Mining.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)ADEIJ Journal
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...ADEIJ Journal
12th International Conference of Artificial Intelligence and Fuzzy Logic (AI & FL 2024) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
10th International Conference on Artificial Intelligence and Applications (AI...ADEIJ Journal
10th International Conference on Artificial Intelligence and Applications (AI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and its applications. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
10th International Conference on Artificial Intelligence and Soft Computing (...ADEIJ Journal
10th International Conference on Artificial Intelligence and Soft Computing (AIS 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology, and applications of Artificial Intelligence, Soft Computing. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Soft Computing in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
Today, a large number of people access internet through their smart phones to login to their bank accounts, social networking accounts and various other blogs. In such a scenario, user authentication has emerged as a major security issue in mobile internet. To date, password based authentication schemes have been extensively used to provide authentication and security. The password based authentication has always been cumbersome for the users because human memory is transient and remembering a large number of long and complicated passwords is impossible. Also, it is vulnerable to various kinds of attacks like brute force, rainbow table, dictionary, sniffing, shoulder surfing and so on. As the main contribution of this paper, a new passwordless authentication scheme for smart phones is presented which not only resolves all the weaknesses of password based schemes but also provide robust security. The proposed scheme relieves users from memorizing and storing long and complicated passwords. The proposed scheme uses ECDSA which is based on Elliptic Curve Cryptography (ECC). ECC has remarkable strength and efficiency advantages in terms of bandwidth, key sizes and computational overheads over other public key cryptosystems. It is therefore suitable for resource constraint devices like smart phone. Furthermore, the proposed scheme incorporate CAPTCHA which play a very important role in protecting the web resources from spamming and other malicious activities. To the best of our knowledge, until now no passwordless user authentication protocol based on ECC has been proposed for smart phones. Finally, the security and functionality analysis shows that compared with existing password based authentication schemes, the proposed scheme is more secure and efficient.
11th International Conference on Cybernetics & Informatics (CYBI 2024)ADEIJ Journal
11th International Conference on Cybernetics & Informatics (CYBI 2024) is a forum for presenting new advances and research results in the fields of information, control and system theory, understands the design and function of any system and the relationship among these applications. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. This conference aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
2nd International Conference on Computer Science, Engineering and Artificial ...ADEIJ Journal
2nd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
SOI RF Switch for Wireless Sensor NetworkADEIJ Journal
The objective of this research was to design a 0-5 GHz RF SOI switch, with 0.18um power Jazz SOI technology by using Cadence software, for health care applications. This paper introduces the design of a RF switch implemented in shunt-series topology. An insertion loss of 0.906 dB and an isolation of 30.95 dB were obtained at 5 GHz. The switch also achieved a third order distortion of 53.05 dBm and 1 dB compression point reached 50.06dBm. The RF switch performance meets the desired specification requirements.
11th International Conference on Cybernetics & Informatics (CYBI 2024)ADEIJ Journal
11th International Conference on Cybernetics & Informatics (CYBI 2024) is a forum for presenting new advances and research results in the fields of information, control and system theory, understands the design and function of any system and the relationship among these applications. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. This conference aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
A STUDY OF METHODS FOR TRAINING WITH DIFFERENT DATASETS IN IMAGE CLASSIFICATIONADEIJ Journal
This research developed a training method of Convolutional Neural Network model with multiple datasets to achieve good performance on both datasets. Two different methods of training with two characteristically different datasets with identical categories, one with very clean images and one with real-world data, were proposed and studied. The model used for the study was a neural network derived from ResNet. Mixed training was shown to produce the best accuracies for each dataset when the dataset is mixed into the training set at the highest proportion, and the best combined performance when the realworld dataset was mixed in at a ratio of around 70%. This ratio produced a top-1 combined performance of 63.8% (no mixing produced 30.8%) and a top-3 combined performance of 83.0% (no mixing produced 55.3%). This research also showed that iterative training has a worse combined performance than mixed training due to the issue of fast forgetting.
CLASSIFICATION AND COMPARISION OF REMOTE SENSING IMAGE USING SUPPORT VECTOR M...ADEIJ Journal
Remote sensing is collecting information about an object without any direct physical contact with the particular object. It is widely used in many fields such as oceanography, geology, ecology. Remote sensing uses the Satellite to detect and classify the particular object or area. They also classify the object on the earth surfaces which includes Vegetation, Building, Soil, Forest and Water. The approach uses the classifiers of previous images to decrease the required number of training samples for the classifier training of an incoming image. For each incoming image, a rough classifier is predicted first based on the temporal trend of a set of previous classifiers. The predicted classifier is then fine-tuned into a more accurate manner with current training samples. This approach can be further applied as sequential image data, with only a small number of training samples, which are being required from each image. This method uses LANSAT 8 images for Training and Testing processes. First, using the Classifier Prediction technique the Signatures are being generated for the input images. The generated Signatures are used for the Training purposes. SVM Classification is used for classifying the images. The final results describes that the leverage of a priori information from previous images will provide advantageous improvement for future images in multi temporal image classification.
RECOGNITION OF SKIN CANCER IN DERMOSCOPIC IMAGES USING KNN CLASSIFIERADEIJ Journal
The largest organ of the body is human skin. Melanoma is a fastest growing & deadliest cancer which starts in pigment cells (melanocytes) of the skin that mostly occurs on the exposed parts of the body. Early detection is vital in treating this type of skin cancer but the time and effort required is immense. Dermoscopy is a non invasive skin imaging technique of acquiring a magnified and illuminated image of a region of skin for increased clarity of the spots on the skin The use of machine learning and automation of the process involved in detection will not only save time but will also provide a more accurate diagnosis. The skin images collected from the databases cannot be directly classified by the automation techniques. The reason is twofold: (a) Lack of clarity in the features which is mainly due to the poor contrast of the raw image and (b) Large dimensions of the input image which causes the complexity of the system. Hence, suitable techniques must be adopted prior to the image classification process to overcome these drawbacks. The first drawback can be minimized by adopting suitable pre- processing techniques which can enhance the contrast of the input images. The second drawback is solved by incorporating the feature extraction technique which reduces the dimensions of the input image to high extent. Further, K-NN (K-Nearest Neighbor) classifier is used for classification of the given image into cancerous or non- cancerous.
REGION CLASSIFICATION AND CHANGE DETECTION USING LANSAT-8 IMAGESADEIJ Journal
The change detection in remote sensing images remains an important and open problem for damage assessment. A new change detection method for LANSAT-8 images based on homogeneous pixel transformation (HPT) is proposed. Homogeneous Pixel Transformation transfers one image from its original feature space (e.g., gray space) to another feature space (e.g., spectral space) in pixel-level to make the pre-event images and post-event images to be represented in a common space or projection space for the convenience of change detection. HPT consists of two operations, i.e., forward transformation and backward transformation. In the forward transformation, each pixel of pre-event image in the first feature space is taken and will estimate its mapping pixel in the second space corresponding to post-event image based on the known unchanged pixels. A multi-value estimation method with the noise tolerance is produced to determine the mapping pixel using K-nearest neighbours technique. Once the mapping pixels of pre-event image are identified, the difference values between the mapping image and the post-event image can be directly generated. Then the similar work is done for backward transformation to combine the post-event image with the first space, and one more difference value for each pixel will be generated. Then, the two difference values are taken and combined to improve the robustness of detection with respect to the noise and heterogeneousness of images. (FRFCM) Fast and Robust Fuzzy C-means clustering algorithm is employed to divide the integrated difference values into two clusters- changed pixels and unchanged pixels. This detection results may contain few noisy regions as small error detections, and a spatial-neighbor based noise filter is developed to reduce the false alarms and missing detections. The experiments for change detection with real images of LANSAT-8 in Tuticorin between 2013-2019 are given to validate the percentage of the changed regions in the proposed method.
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ADEIJ Journal
A design of a sales system for professional services requires a comprehensive understanding of the
dynamics of sale cycles and how key knowledge for completing sales is managed. This research describes
a design model of a business development (sales) system for professional service firms based on the Saudi
Arabian commercial market, which takes into account the new advances in technology while preserving
unique or cultural practices that are an important part of the Saudi Arabian commercial market. The
design model has combined a number of key technologies, such as cloud computing and mobility, as an
integral part of the proposed system. An adaptive development process has also been used in implementing
the proposed design model
EXPERIMENTAL STUDY ON SOLAR HEATING BY NATURAL HEAT CONVECTION AND RADIATIONADEIJ Journal
Heat storage is a good energy saving option these days. Heat storage makes it possible to use thermal
energy at the required time. Solar water heaters for construction purposes and industrial purposes are the
best source to maintain traditional energy sources and thus can maintain high quality energy and liquid or
steel fuel due to the highest rise in their prices. In recent years, using solar energy has become remarkably
cheap and especially noteworthy. The efficiency of natural solar water heater system depends on collector
and reservoir setting, design and environmental factors such as solar intensity, ambient temperature and
wind conditions. Also, the relative height of the tank and collector separation mainly affects the volume of
the Siphon thermal flow rates, including both forward and reverse flow at night. In this pilot investigation,
two parallel rectangular glass plates were connected to the hot water storage tank. The effect of the
separation space between the plates (collectors) (D) was investigated and reported. The results reported
that outlet temperature in case D= 15 cm for two plates decreased approximately 24% and 23% for two
plates. Also, the heat radiated to the room decreased as the inner space between the two plates increased,
and decreased to approximately 25% as compared to stack plates.
FAULT IDENTIFY OF BEARING USING ENHANCED HILBERT-HUANG TRANSFORMADEIJ Journal
Today the maintenance and repair based on condition monitoring techniques of rotating equipment is one
of the most important tools to prevent stopping of production and reduce the cost of maintenance and
repair and the vibration analysis according to the width of identifiable defects scope has a specific
importance. In this paper, we discuss about rolling bearings defects detection with using of normalized
Hilbert huang approach.
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSADEIJ Journal
The increased development of IT tools and social communication networks has significantly increased the
need for people to be identified with reliable and secure tools hence the importance of using biometric
technology. Biometrics is an emerging field where technology improves our ability to identify a person. The
advantage of biometric identification is that each individual has its own physical characteristics that
cannot be changed, lost or stolen. The use of fingerprinting is today one of the most reliable technologies
on the market to authenticate an individual. This technology is simple to use and easy to implement. The
techniques of fingerprint recognition are numerous and diversified, they are generally based on generic
algorithms and tools for filtering images.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Chapter 3 - Islamic Banking Products and Services.pptx
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
1. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
DOI:10.5121/ijfcst.2017.7602 11
A COMPARATIVE ANALYSIS ON SOFTWARE
ARCHITECTURE STYLES
Feidu Akmel 1
, Ermiyas Birhanu 2
, Behar Siraj 3
, Seifedin Shifa4
Lecturer, Department of Computer Science, Department of Software Engineering,
Wolkite University, Wolkite, Ethiopia
Assistant Lecturer, Department of Information system,
Wolkite University, Wolkite, Ethiopia
ABSTRACT
Software architecture is the structural solution that achieves the overall technical and operational
requirements for software developments. Software engineers applied software architectures for their
software system developments; however, they worry the basic benchmarks in order to select software
architecture styles, possible components, integration methods (connectors) and the exact application of
each style.
The objective of this research work was a comparative analysis of software architecture styles by its
weakness and benefits in order to select by the programmer during their design time. Finally, in this study,
the researcher has been identified architectural styles, weakness, and Strength and application areas with
its component, connector and Interface for the selected architectural styles.
KEYWORDS
Architecture Styles, Components, Connectors, Interface
1. INTRODUCTION
Today the business world is very dynamic and the organization often change their business
processes to be competent in the market. These businesses supported their through software
systems. Moreover, size and complexity of software systems increases, Software Architecture is
emerging as an important research area in software engineering [1]. Software architecture is the
process of defining a structured solution that meets all of the technical and operational
requirements, while optimizing common quality attributes such as reusability performance,
security, and manageability [2][3]. Software architects use a number of commonly recognized
styles to develop the architecture of a System [3, 4]. Software architecture styles are an abstract
framework developed for a family of systems to have general solutions to common problems that
arise in the software development process. It is accountable to offer a lexicon of connectors and
components with principles on how they can be combined, improve partitioning and allow the
reuse of design by giving solutions to frequently occurring problems and describe a particular
way to configure a collection of components which has a module with well-defined interfaces and
re-usable connectors of communication link between modules [5].
2. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
12
This research presents to evaluate five architectural styles in order to minimize the confusion of
the designers and programmer while selecting appropriate architecture style for their specific
need. The researchers selected thus five commonly used styles that are applied for various types
of software application areas in real world scenarios as we shown Table 1 .These software
architecture styles are: Message Bus Architecture Style, Component-Based Architecture Style,
Layered Architecture Style, Object-Oriented Architecture Style and Service Oriented Architecture
Style (SOA)
2. STATEMENT OF PROBLEMS
According to, Sommerville definition regarding to Software Engineering [6] to develop, Manage
and evolving software systems Software Engineering gives an emphasize on methods, theories
and tools. Software Engineering has different models and each model has its own lifecycle
mainly which includes requirement analysis, Design (System and Object), Implementation,
Testing, Delivery and maintenance. During design phase, we have considered an issue regarding
to software architecture, which are high-level design stage.
The main idea behind software architecture is to decompose the system in to a group of different
components and then develop components and related connectors ,to achieve this decomposition
and selection of an architecture styles [7]. An architecture style is defined by the component sets
and the interactive rules between them. Most common known example of architectural style types
are Component-based, Layered, Client -Server, Message Bus and Service Oriented Architecture
as we shown Table 1.
Anubha et al [8] attempts to discussed the software architecture styles, importance and classifying
it according to its benefits and its application, but they did not consider an emphasize about their
interaction methods and its components.
Most of software engineers worry what are the basic benchmarks in order to select software
architecture styles, possible components, integration methods (connectors) and the exact
application of each style. In this study, we consider the selected architectural style strength and
weakness using its parameters in addition to detail explanations of components, connectors and
application areas.
Thus, the research is attempted to answer the following research questions:
• Which type of connectors and components are applied by software architecture
styles?
• How data is communicated through software architecture styles?
• What are pros and cons we considered for each architectural style?
2.1.General objective
The main objective of this study was comparative analysis of software architecture styles in order
to identify the application areas, advantage, disadvantages and how component of software
system could be composed.
3. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
13
3. RELATIONSHIP BETWEEN ARCHITECTURE STYLES AND DESIGN
PATTERNS
The most common known definition of design pattern was by Christopher Alexander there is a
problem which occurs again and again in a given system and solved by available patterns many
times[9], from this definition we asses four basic elements in design patterns which are patterns
name, solutions, problems and consequences. The concept of design patterns is not about design
of linked list and hash tables, but it also gives an emphasize to complex and domain specific
applications (namely classes and objects). Architectural styles indicate that an established of
design rules that classify the type of connectors and components that is used to applies to
compose a system or subsystem, together with global or local constraints that are executed[10].
The relationship between styles and patterns are discussed in two perspectives, first, architectural
styles can be viewed as kinds of patterns or perhaps more accurately as pattern languages. The
second method that design patterns are associated to styles is that for a specified style there may
exist a set of idiomatic uses of it. According to, Robert T et al view about styles and patterns are
complementary mechanisms for encapsulating designs. Architectural styles are a collection of
building blocks design elements, rules and design whereas patterns is expressing by making with
solutions to lower level programming ways, rather than software system structuring issue[11].
3.1 Software Architecture Styles
Software architecture styles are patterns or an abstract framework developed for a family of
systems to have overall solutions to problems that arise in the software development life cycle
processes. There are set of principles and guidance's to shape or define the components and
connectors that compose a solution and their relations. It determines the vocabulary of
components and connectors that can be used in instances of that style, together with a set of
constraints on how they can be combined. The most crucial benefit is that, they can provide a
common language by being an opportunity for conversations that are technology agnostic because
this helps a higher level of conversations that is inclusive of principles and patterns without
becoming into specifics. Software architectural style is responsible to provide a connectors and
components with rules on how they can be combined, improve partitioning and allow the reuse of
design by giving solutions to frequently occurring problems and describe a particular way to
configure a collection of components which has a module with well-defined interfaces, reusable
and replaceable and connectors of communication link between modules. Each architecture style
defines a system family that includes a set of component types that perform a required function
by the system, semantic constraints which define how components can be integrated to form the
system and a topological layout of the components indicating their run time interrelationships.
There are different kind of architectural styles in software development world and varieties and
categories of styles depend on their focus area, as we showed Table 1 below.
4. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
14
Table 1: Patterns (Category) and Architectural Styles [12]
3.2.Client-Server Architecture Styles
Nowadays most communication like internet through client server architectural style, which
means there is request and response take place. There are mainly three components such as
Client, Server and Medium of communication[8]. Medium of communication between client and
server are File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP) and Hypertext
Transfer Protocol (HTTP)[13].Client Server system has popular models namely 3-tier and n-tire
architectures. From figure 1, we observed that the general layout for client and server architecture
look like.
Figure1: Client Server Architecture frame work [13]
Application Areas
• File Transfer: client server architecture allows the user to store and retrieve their data to
server such as movies, images and music’s.
• Mail Transfer: Which provides the user to communicate with someone who is available
somewhere through their mail using mail transfer protocol (MTP)?
• Web based applications[8]: Client Server architecture is used for internet applications ,
for instance AceProject, Ganttic, Celoxis etc.
5. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
15
Strength:
The basic benefits for using client server architecture are higher security: Since all the data are
stored at server machine we can apply different security mechanisms to enhance its security than
client machines. Centralized data access: any authorized user can able to access and updates
data on the server because the data is available centrally. Simple to maintenance: Roles of a
computing system are distributed among several servers that are recognized to each other through
a medium or network. This ensure that a work stations keep unaware and unaffected by a server
relocation, upgrade or repair [4].
Weakness /Challenges
There are a number of thing that are considered by any organization before they are going to
deploy and use client server architectures[13, 14], which includes : The number of customers
server by the model, It needs skilled peoples ,The server is quite expensive, Security issues ,
Management of applications.
3.3 Component-Based Architecture Style
Component based architecture is an architecture that focuses on decomposing software design
into functional or logical components with their own methods, events and properties. In case of
component based architectural styles no need of an issues like communication protocols and
shared states[12]. The components are loosely coupled and reusable to provide modular programs
that can be tailored to fit any need. A provided interface specifies what a component can provide
to other components in the system. There are three types of components such as user interface
components such as and buttons and grids and helper and utility components that expose a
specific subset of functions used in other components. Other kinds of components are not
frequently accessed, resource intensive and must be activated using the just-in-time (JIT)
approach (common in remote or distributed component scenarios); and queued components
whose method calls may be executed asynchronously using message queuing and store and
forward.
As we have shown on Figure 2 there is five components such as User interface, Notification,
Order Management, Accounting and persistence layer.
Figure 2 : Component based Architecture [8]
6. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
16
Strength:
The benefit of component based architecture, the use of components that are Ease of deployment,
Reduced Cost, Ease of development, Reusable and Mitigation of Technical complexity[12] as
researcher discussed here:- Ease of deployment: when new well-matched versions become
available, we can replace the current versions without any drawback on the other components or
the products as a whole. Reduced Cost: the use of third party components allows you to reduce
the cost of development and technical support. Ease of development: components implement
well-known interfaces to provide defined functionality, allowing development without impacting
other parts of the system. Reusable: the use of reusable components are to extend applications or
systems. Mitigation of technical complexity: components mitigate complexity through the use
of a component container and its services. Example component services include component
activation, life time management, method queuing and transactions.
Weakness:
The main weakness of component based architectural style discussed here: -Message handling:
needs to be predefined for the components. Possibly it could be a limiting factor. Reliance on
third parties: if your component come from a third party of some sort then you will be at the
mercy for updates and changes to the component. Complexity: while it is designed to reduce
complexity of systems it introduces a different type of complexity in terms of component-to-
component interactions. Testing: can be difficult if the component doesn't come with its own
execution environment. Second system syndrome: depending on how complex the components
themselves are you can end up with a platform within a platform within a platform type problem.
Application Areas
The application area under component based architecture is structured; to create pluggable
applications this architecture will be appropriate. Since whole picture of system is in terms of
components, it results in high maintainability and portability[8].
3.4 Layered Architecture Style
The Layered Architecture style is focused around dividing software functionality into distinct
layers that are interacted and stacked vertically on top of each other. Functionality within each
layer is related by a common role or responsibility. Communication between layers is explicit and
loosely coupled. The main application of layering helps to support great separation of concerns
that in turn, support maintainability and flexibility. [12]. It is dependent on message passing
between layers and clearly defined functional layers. Components for layered architecture are
classified based on its layers namely presentations, business and data access.
7. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
Figure3
Strength:
The main benefit of layered Architecture
view of the system as whole while
roles of individual layers and association
be made about data types, methods and properties or implementation during design as these are
not exposed at layer boundaries.
functionality in each layer is clear.
each layer and ensuring that each layer contains functionality directly related to the task of that
layer will help to maximize cohesion within
dependencies on higher layers potentially allowing them to be reusable in other scenarios.
coupling: communication between layers is based on abstraction and events to provide loose.
Weakness:
Difficulties structuring systems as layered systems. Specifically, restricting communication to
adjacent layers and keeping coupling between layers reduced.
presentation patterns if the user need to
interface functionality or to separate task of designing the UI from the development of the logic
code that drives it.
Application Areas
According to researchers the current application area within industry are OSI mode
(Networking), telecommunications
phones and Internet services) and Nokia Siemens Networks (telecommunications infrastructure)
[15], generally it applied for both networking and Mobile industries
urnal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
Figure3: Layered Architecture Style
The main benefit of layered Architecture is: -Abstraction: layered architectures abstracts the
view of the system as whole while providing enough detail to recognize the responsibilities
association between them. Encapsulation: no assumption need to
be made about data types, methods and properties or implementation during design as these are
not exposed at layer boundaries. Clearly defined functional layer: the separation between
functionality in each layer is clear. High cohesion: well defined responsibility boundaries for
each layer and ensuring that each layer contains functionality directly related to the task of that
layer will help to maximize cohesion within the layer. Reusable: lowers layers have no
dependencies on higher layers potentially allowing them to be reusable in other scenarios.
communication between layers is based on abstraction and events to provide loose.
Difficulties structuring systems as layered systems. Specifically, restricting communication to
adjacent layers and keeping coupling between layers reduced. It required to consider a various
presentation patterns if the user need to improved testability and simplified maintenance of user
interface functionality or to separate task of designing the UI from the development of the logic
According to researchers the current application area within industry are OSI mode
(Networking), telecommunications domain, comprising architecture documents in Nokia (mobile
phones and Internet services) and Nokia Siemens Networks (telecommunications infrastructure)
generally it applied for both networking and Mobile industries.
urnal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
17
: layered architectures abstracts the
responsibilities and
: no assumption need to
be made about data types, methods and properties or implementation during design as these are
paration between
: well defined responsibility boundaries for
each layer and ensuring that each layer contains functionality directly related to the task of that
: lowers layers have no
dependencies on higher layers potentially allowing them to be reusable in other scenarios. Loose
communication between layers is based on abstraction and events to provide loose.
Difficulties structuring systems as layered systems. Specifically, restricting communication to
It required to consider a various
d simplified maintenance of user
interface functionality or to separate task of designing the UI from the development of the logic
According to researchers the current application area within industry are OSI model
domain, comprising architecture documents in Nokia (mobile
phones and Internet services) and Nokia Siemens Networks (telecommunications infrastructure)
8. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
18
3.5 Message Bus Architecture Style
Message bus architecture gives detail about the protocols of using a software system that can
accept and send messages using one or more communication channels, so that applications can
interact without needing to know specific details about each other[4]. This style uses common
buss for the interaction between applications which is accomplished by messages, mainly
asynchronously. There are various implementation methods, the most common implementations
of message bus architecture use either a Publish/Subscribe pattern or a messaging router, message
Queuing. Message bus and service oriented styles are under categories of communication, but
Service oriented architecture gives itself very well to utilizing a message bus architecture to
facilitate the subscription of service providers to service requesters[16].
Strength:
The main strength for message bus Architecture are flexibility ,Extensibility, Scalability
[16].Extensibility: Applications with message bus architecture support both adding and
removing from the bus without having an impact on the existing applications. Flexibility: The set
of applications that make up a complex process, or the communication patterns between
applications, can be changed easily to match changes in business or user requirements, simply
through changes to the configuration or parameters that control routing and application
complexity is reduced because each application only needs to know how to communicate with the
bus. Scalability: numerous instances of the identical application can be attached to the bus in
order to touch multiple requirements at the same time.
Weakness:
The drawback of message bus architecture is difficult to modifiability, lower security and
problem of down tolerances[16].
Lower modifiability: changes to the bus interface must maintain backwards compatibility, or
every component that utilizes the bus will have to be updated in order to support the new
interface .Lowered security: a broadcast based message bus offers no privacy without some form
of encryption as messages are delivered indiscriminately to all connected nodes. Lowered down
tolerance: The bus becomes a single point of failure for all communications across the
application. Logic is not necessarily implemented for applications to manage their own messages
while the bus is out of service, which can lead to message loss and failures of data integrity.
Application Areas
A message bus offers the capability to handle message-oriented communications, complex
processing logic, modifications to processing logic, integration with different environments
systems.
9. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
19
Figure 4: Message bus Architecture
3.6 Object Oriented Architecture Style
The basic feature of object-oriented architecture abstract objects that denotes data and the
interaction method is whether functional or procedural [17]. One of the design principle which
divided object based on its responsibilities is called object oriented architecture, for any products
or Applications into individual reusable and self-sufficient objects, each containing the data and
the behavior relevant to the object. Object- oriented design look like an application as sequence of
cooperating objects, instead of a set of routines or procedural instructions[4]. Due to its concepts
and implementations contribute to the getting acceptance of the architecture to expansion
popularity in the world. These major principles are Inheritance: where objects can inherit the
characteristics of other objects. Encapsulation: the internal of an object can be hidden from
others so that only that object can manipulate its own state and variables. Abstraction: breaking
down a system into logical components that can perform some sort of work and communicate
with other objects in meaningful ways. Polymorphism: giving an object multiple forms. The
component for OOP are objects and the communication between this object can be achieved
through sending message or passing parameters from and to objects. The relationship between the
object is depends on the application being developed by the programmer, as shown figure 5.
Figure 5: Object Oriented Architecture [17]
10. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
20
Strength
Reusability, Testability, Extensibility and highly cohesive are the strength of OOP styles, as they
have the principle of polymorphism, abstraction, encapsulation and polymorphism. Thus, Object
interacts with others, if the method which is available within one object changes there is also
affects the other.
Weakness
The main drawback of object-oriented architecture are service integration and strong coupling
between objects, there is an integration of services into object oriented systems has been made
however, as current business’s market trends has moved towards a greater use of external services
in line with the advancement of telecommunications capabilities expanding more, it is becoming
a common problem in existing object-oriented systems. Strong coupling between super classes
and sub classes, swapping out of super classes can break sub classes.
Application Areas
The application area of OOP is for complex business and application domains such as
telecommunications, distributed medical imaging, and real-time applications
3.7 Service Oriented Architecture Style
Service-oriented architecture (SOA) makes application functionality to be provided as a set of
services, and the creation of applications that make use of software services. It is an architectural
style that supports service orientation. It is a way of thinking in terms of services, service-based
development, and the outcomes of services. In SOA, the basic components are types are service
provider, service users and Service registry. An approach that communicates between each
component in SOA can be implemented differently. During pure web service solution, SOA
protocol is used. However, software Architect wants the simpler approach such as
Representational State Transfer (REST) as a means of communication between SOA components.
There are other alternatives in order to communicate through message passing protocols like
Microsoft MSMQ and IBM WebSphere MQ (previously called MQSeries) [18].
Strength
Domain alignment: Reuse of common services with standard interfaces increases business and
technology opportunities and reduces cost .Abstraction: Services are self-directed and accessed
through a formal contract, which gives loose coupling and abstraction and services can
representation descriptions that allow other applications and services to locate them and
automatically decide the interface. Interoperability: Because the rules and data formats are based
on industry standards, the provider and consumer of the service can be built and deployed on
different platforms. Rationalization: Services can be coarse in order to provide specific
functionality, rather than duplicating the functionality in number of applications, which removes
duplication.
11. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
Figure
Application Area of SOA widely used for constructing large distributed systems.
4. CONCLUSION
Software architecture styles are patterns or an abstract framework developed for a family of
systems to have general solutions to common problems that arise in the software development
process.
In this study, the researcher’s has presented a comparativ
architecture styles using the parameters like implementation architecture ,basic advantages and
drawback of the architectural styles ,interface, component
application areas of five architectural styles namely Component
Layered Architecture Style, Service Oriented Architecture Style, Object
Style and Message Bus Architecture Style. According to
that, software developer should consider these styles in order to select the best architectures styles
that fit with their problem domains based the above parameters.
recommended that for the future we need to give attention to design h
components and connectors in order to communicate each other to design generic architecture
styles that meets various problem domains.
REFERENCES
[1] Guozhen Tan, Xinpeng Li, Jiankun Wu, H. Z. and, and C. Li.
[2] Microsoft. (2013). What is Software Architecture Available:
https://msdn.microsoft.com/en
[3] Mei Hong, Chang Jichuan, and Y. Fuqing, "Software component composition based on ADL and
Middelware," Science in China vol. Series F pp
[4] Microsoft. (2013). Chapter 3: Architectural Patterns and styles Available:
https://msdn.microsoft.com/en
urnal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
Figure 6: Service Oriented Architecture[18]
SOA widely used for constructing large distributed systems.
Software architecture styles are patterns or an abstract framework developed for a family of
systems to have general solutions to common problems that arise in the software development
In this study, the researcher’s has presented a comparative analysis of various software
using the parameters like implementation architecture ,basic advantages and
drawback of the architectural styles ,interface, component ,integration methods (connectors), and
rchitectural styles namely Component-Based Architecture Style,
Layered Architecture Style, Service Oriented Architecture Style, Object-Oriented Architecture
Style and Message Bus Architecture Style. According to the researchers knowledge recommended
software developer should consider these styles in order to select the best architectures styles
that fit with their problem domains based the above parameters. Moreover, the researchers
for the future we need to give attention to design hybrid of architecture styles,
components and connectors in order to communicate each other to design generic architecture
styles that meets various problem domains.
Guozhen Tan, Xinpeng Li, Jiankun Wu, H. Z. and, and C. Li.
Microsoft. (2013). What is Software Architecture Available:
https://msdn.microsoft.com/en-us/library/ee658098.aspx
Mei Hong, Chang Jichuan, and Y. Fuqing, "Software component composition based on ADL and
Middelware," Science in China vol. Series F pp. 136-151.
Microsoft. (2013). Chapter 3: Architectural Patterns and styles Available:
https://msdn.microsoft.com/en-us/library/ee658117.aspx
urnal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
21
Software architecture styles are patterns or an abstract framework developed for a family of
systems to have general solutions to common problems that arise in the software development
e analysis of various software
using the parameters like implementation architecture ,basic advantages and
egration methods (connectors), and
Based Architecture Style,
Oriented Architecture
the researchers knowledge recommended
software developer should consider these styles in order to select the best architectures styles
Moreover, the researchers
ybrid of architecture styles,
components and connectors in order to communicate each other to design generic architecture
Mei Hong, Chang Jichuan, and Y. Fuqing, "Software component composition based on ADL and
12. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.7, No.5/6, November 2017
22
[5] D.Garlan and M. Shaw. (1994). An introduction to software Architecture Available:
http://www.cs.cmu.edu/afs/cs/project/vit/ftp/pdf/intro_softarch.pdf
[6] I. Sommerville, Software Engineering. Addison-Wesley Pub. Co, 1996.
[7] C. Hai-Shan, "Survey on the Style and Description of Software Architecture," The 8th International
Conference on Computer Supported Cooperative Work in Design Proceedings, 2003.
[8] Anubha S, Manoj K, and S. A, "A Complete Survey on Software Architectural Styles and Patterns,"
4th International Conference on Eco-friendly Computing and Communication Systems, 2015.
[9] KevinZhang, Design Patterns Elements of Reusable Object-Oriented Software.
[10] Somo S, "Software Architecture: Styles and Representational Schemes " MSc Interdepartmental
Program in System Sciences National Institute of Technology, Rourkela, India,, 2004
[11] Robert T, Andrew K, Ralph M, and D. B., "Architectural Styles, Design Patterns, and " IEEE
Software.
[12] P . U. Chavan, Dr. M. Murugan, and P. P. Chavan, "A Review on Software Architecture Styles with
Layered Robotic Software Architecture," presented at the International Conference on Computing
Communication Control and Automation, 2015.
[13] Haroon S, "Client-Server Model " IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16,
2014,.
[14] S. Tayib, "Title," unpublished|.
[15] Juha S and Varvana M, "Layered Architecture Revisited – Comparison of Research and Practice "
IEEE 2009.
[16] D. Tody. (1998). Message Bus and Distributed Object Technology Available:
http://adass.org/adass/proceedings/adass97/todyd2.html
[17] M. Boddoohi, "An Evaluation of Software Architectures – Using Aspects " MSc MSc, Information
Systems and Operations Management, University of North Carolina Wilmington, 2010.
[18] Phil B, Rick K, and Paulo M, "Evaluating a Service-Oriented Architecture," Carnegie
MellonUniversity,USA200