This Internet of things is one of the most trending technology with wide range of applications. Here we are going to focus on Medical and Healthcare applications of IOT. Generally such IOT applications are very complex comprising of many different modules. Thus a lot of care has to be taken during the requirement engineering of IOT applications. Requirement Engineering is a process of structuring all the requirements of the users. This is the base phase of software development which greatly affects the rest of the phases. Thus our best should be given in the engineering of requirements because if the effort goes down here, it will greatly affect the quality of the end product. In this study we have presented an approach to improve the requirements engineering phase of IOT applications development by using Object Oriented Analysis and Design Approach(OOADA) along with Constraints Story Card(CSC) templates.
Comparative Study of Object Oriented Design and Component Based Software Engi...ijsrd.com
Object Oriented Approach and Component Based Software Engineering are two of the popular software paradigms. In this paper we have shown how these two paradigms differ from each other by conceptual comparison. This paper will cover the property comparisons of these two concepts and will also conclude a better concept in a particular situation. It will also cover the future work possible in this field.
Comparative Study of Object Oriented Design and Component Based Software Engi...ijsrd.com
Object Oriented Approach and Component Based Software Engineering are two of the popular software paradigms. In this paper we have shown how these two paradigms differ from each other by conceptual comparison. This paper will cover the property comparisons of these two concepts and will also conclude a better concept in a particular situation. It will also cover the future work possible in this field.
FUNCTIONAL AND INFORMATIONAL MODEL OF EXPERT SPECIALIZATION USING IDEF STANDARDMandar Trivedi
For process of modeling are developed suitable CASE tools. In the course of
building this process a standard is used for functional modeling of IDEF0 realized through
BPWin tool. Family of integrated IDEF methods presents basic tool of some modern
strategies and methodologies of business process improvement, like for example: BPR, CPI,
IPD, TQM etc. In paper is given functional and informational model of ″Process of expert
specialization of employees in education″ using graphical language IDEF0 that is, CASE
Bpwin tool.
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport, pan card, etc. In such applications user can provide two to three biometrics patterns
like face, finger, palm, signature, iris data, and so on. We considered face and finger patterns
for encoding and then also for verification. Using this data we proposed a novel model for
authentication in multimodal biometrics often called Context-Sensitive Exponent Associative Memory Model (CSEAM). It provides different stages of security for biometrics patterns. In
stage 1, face and finger patterns can be fusion through Principal Component Analysis (PCA), in stage 2 by applying SVD decomposition to generate keys from the fusion data and preprocessed face pattern and then in stage 3, using CSEAM model the generated keys can be encoded. The final key will be stored in the smart cards. In CSEAM model, exponential
kronecker product plays a critical role for encoding and also for verification to verify the chosen samples from the users. This paper discusses by considering realistic biometric data in
terms of time and space
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...ijcsit
Recommendation systems only provide more specific recommendations to users. They do not consider
giving a justification for the recommendation. However, the justification for the recommendation allows the
user to make the decision whether or not to accept the recommendation. It also improves user satisfaction
and the relevance of the recommended item. However, the IAAS recommendation system that uses
advisories to make recommendations does not provide a justification for the recommendations. That is why
in this article, our task consists for helping IAAS users to justify their recommendations. For this, we
conducted a related work on architectures and approaches for justifying recommendations in order to
identify an architecture and approach suitable for the context of IAAS. From the analysis in this article, we
note that neither of these approaches uses the notices (IAAS mechanism) to justify their recommendations.
Therefore, existing architectures cannot be used in the context of IAAS. That is why,we have developed a
new IAAS architecture that deals separately with item filtration and justification extraction that
accompanied the item during recommendation generation (Figure 7). And we haveimproved the reviews by
adding users’ reviews on the items. The user’s notices include the Documentary Unit (DU), the user Group
(G), the Justification (J) and the weight (a); noted A=(DU,G,J,a).
AN APPROACH TO IMPROVEMENT THE USABILITY IN SOFTWARE PRODUCTSijseajournal
One of the significantaspects of software quality is usability. It is one of the characteristics that judge by
the success or failure of software applications. The most important risk facing the software applications is
usability which may lead to the existence of a gap between users and systems. This may lead to system
failure because of Poor design. This is due to the design is not based on the desires and requirements of the
customer. To overcome these problems, this paper proposed an approach to improve usability of software
applications to meet the needs of the customer and interacts with the user easily with an efficient and
effective manner.The proposed approach is based prototyping technique due to itssimplicity and it does not
require additional costs to elicit precise and complete requirement and design.
Analysis and Design of Information Systems Financial Reports with Object Orie...ijceronline
Micro, Small and Medium Enterprises (SMEs) are a group effort proved resistant to a wide range of economic crisis shocks. But in the operation of their business financial management is still not transparent and are also still mixed between business finance and personal finance. So that needs to be done with good financial management. In this research, analysis and information system design financial reports as a basis for the development of the system. Software development life cycle (SDLC) using the model of the object oriented approach. With object-oriented approach, the tools used by the notation Unified Modelling Language (UML). In object-oriented approach all systems applications are Viewed as a collection of objects that allow organisasi interloking and end users to Easily understand logical entities. Object-oriented approach Provides the benefits of the reuse of codes and saves the time for developing quality product.
The software development process heavily relies on requirement engineering as it forms the base for entire process. Although software engineering is full of methods for requirement analysis, the problem we face is which method to select and how to apply it. It is expected that we should be able to get clear and complete idea about what is expected by the user from the proposed system. This puts emphasis on requirement analysis process. The method we need to adopt should enable us to get clear and complete set of requirements. The requirement engineering process dependent on abilities of the persons carrying out the process also the nature of system puts certain constraints on the process. . This paper is an attempt to look at certain problems posed by the requirement engineering process and possible corrective measures against it to help improve overall software quality.
Testing and verification of software model through formal semantics a systema...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
The Artificial Intelligence approach is used for Iris recognition by understanding the distinctive and measurable characteristics of the human body such as a person’s face, iris, DNA, fingerprints, etc. AI methods analyzed the attributes like iris images. Privacy and Security being a major concern nowadays, Recognition Technique can find numerous applications.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
FUNCTIONAL AND INFORMATIONAL MODEL OF EXPERT SPECIALIZATION USING IDEF STANDARDMandar Trivedi
For process of modeling are developed suitable CASE tools. In the course of
building this process a standard is used for functional modeling of IDEF0 realized through
BPWin tool. Family of integrated IDEF methods presents basic tool of some modern
strategies and methodologies of business process improvement, like for example: BPR, CPI,
IPD, TQM etc. In paper is given functional and informational model of ″Process of expert
specialization of employees in education″ using graphical language IDEF0 that is, CASE
Bpwin tool.
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport, pan card, etc. In such applications user can provide two to three biometrics patterns
like face, finger, palm, signature, iris data, and so on. We considered face and finger patterns
for encoding and then also for verification. Using this data we proposed a novel model for
authentication in multimodal biometrics often called Context-Sensitive Exponent Associative Memory Model (CSEAM). It provides different stages of security for biometrics patterns. In
stage 1, face and finger patterns can be fusion through Principal Component Analysis (PCA), in stage 2 by applying SVD decomposition to generate keys from the fusion data and preprocessed face pattern and then in stage 3, using CSEAM model the generated keys can be encoded. The final key will be stored in the smart cards. In CSEAM model, exponential
kronecker product plays a critical role for encoding and also for verification to verify the chosen samples from the users. This paper discusses by considering realistic biometric data in
terms of time and space
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...ijcsit
Recommendation systems only provide more specific recommendations to users. They do not consider
giving a justification for the recommendation. However, the justification for the recommendation allows the
user to make the decision whether or not to accept the recommendation. It also improves user satisfaction
and the relevance of the recommended item. However, the IAAS recommendation system that uses
advisories to make recommendations does not provide a justification for the recommendations. That is why
in this article, our task consists for helping IAAS users to justify their recommendations. For this, we
conducted a related work on architectures and approaches for justifying recommendations in order to
identify an architecture and approach suitable for the context of IAAS. From the analysis in this article, we
note that neither of these approaches uses the notices (IAAS mechanism) to justify their recommendations.
Therefore, existing architectures cannot be used in the context of IAAS. That is why,we have developed a
new IAAS architecture that deals separately with item filtration and justification extraction that
accompanied the item during recommendation generation (Figure 7). And we haveimproved the reviews by
adding users’ reviews on the items. The user’s notices include the Documentary Unit (DU), the user Group
(G), the Justification (J) and the weight (a); noted A=(DU,G,J,a).
AN APPROACH TO IMPROVEMENT THE USABILITY IN SOFTWARE PRODUCTSijseajournal
One of the significantaspects of software quality is usability. It is one of the characteristics that judge by
the success or failure of software applications. The most important risk facing the software applications is
usability which may lead to the existence of a gap between users and systems. This may lead to system
failure because of Poor design. This is due to the design is not based on the desires and requirements of the
customer. To overcome these problems, this paper proposed an approach to improve usability of software
applications to meet the needs of the customer and interacts with the user easily with an efficient and
effective manner.The proposed approach is based prototyping technique due to itssimplicity and it does not
require additional costs to elicit precise and complete requirement and design.
Analysis and Design of Information Systems Financial Reports with Object Orie...ijceronline
Micro, Small and Medium Enterprises (SMEs) are a group effort proved resistant to a wide range of economic crisis shocks. But in the operation of their business financial management is still not transparent and are also still mixed between business finance and personal finance. So that needs to be done with good financial management. In this research, analysis and information system design financial reports as a basis for the development of the system. Software development life cycle (SDLC) using the model of the object oriented approach. With object-oriented approach, the tools used by the notation Unified Modelling Language (UML). In object-oriented approach all systems applications are Viewed as a collection of objects that allow organisasi interloking and end users to Easily understand logical entities. Object-oriented approach Provides the benefits of the reuse of codes and saves the time for developing quality product.
The software development process heavily relies on requirement engineering as it forms the base for entire process. Although software engineering is full of methods for requirement analysis, the problem we face is which method to select and how to apply it. It is expected that we should be able to get clear and complete idea about what is expected by the user from the proposed system. This puts emphasis on requirement analysis process. The method we need to adopt should enable us to get clear and complete set of requirements. The requirement engineering process dependent on abilities of the persons carrying out the process also the nature of system puts certain constraints on the process. . This paper is an attempt to look at certain problems posed by the requirement engineering process and possible corrective measures against it to help improve overall software quality.
Testing and verification of software model through formal semantics a systema...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
The Artificial Intelligence approach is used for Iris recognition by understanding the distinctive and measurable characteristics of the human body such as a person’s face, iris, DNA, fingerprints, etc. AI methods analyzed the attributes like iris images. Privacy and Security being a major concern nowadays, Recognition Technique can find numerous applications.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
ABSTRACT FACTORY AND SINGLETON DESIGN PATTERNS TO CREATE DECORATOR PATTERN OB...ijait
Software Design Patterns are reusable designs providing common solutions to the similar kind of problems
in software development. Creational patterns are that category of design patterns which aid in how objects
are created, composed and represented. They abstract the creation of objects from clients thus making the
application more adaptable to future requirements changes. In this work, it has been proposed and
implemented the creation of objects involved in Decorator Design Pattern. (Decorator Pattern Adds
Additional responsibilities to the individual objects dynamically and transparently without affecting other
objects). This enhanced the reusability of the application design, made application more adaptable to
future requirement changes and eased the system maintenance. Proposed DMS (Development Management
System) web application is implemented using .NET framework, ASP.NET and C#.
Maintaining the quality of the software is the major challenge in the process of software development.
Software inspections which use the methods like structured walkthroughs and formal code reviews involve
careful examination of each and every aspect/stage of software development. In Agile software
development, refactoring helps to improve software quality. This refactoring is a technique to improve
software internal structure without changing its behaviour. After much study regarding the ways to
improve software quality, our research proposes an object oriented software metric tool called
“MetricAnalyzer”. This tool is tested on different codebases and is proven to be much useful.
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ijseajournal
Software development process presents various types of models with their corresponding phases required to be accordingly followed in delivery of quality products and projects. Despite the various expertise and skills of systems analysts, designers, and programmers, systems failure is inevitable when a suitable development process model is not followed. This paper focuses on the Iterative and Incremental Development (IID)model and justified its role in the analysis and design software systems. The paper adopted the qualitative research approach that justified and harnessed the relevance of IID in the context of systems analysis and design using the Vocational
Career Information System (VCIS) as a case study. The paper viewed the IID as a change-driven software development process model. The results showed some system specification, functional specification of system and design specifications that can be used in implementing the VCIS using the IID model. Thus, the paper concluded that in systems analysis and design, it is imperative to consider a suitable development process that reflects the engineering mind-set, with heavy emphasis on good analysis and design for quality assurance.
A Review of Feature Model Position in the Software Product Line and Its Extra...CSCJournals
The software has become a modern asset and competitive product. The product line that has long been used in manufacturing and construction industries nowadays has attracted a lot of attention in software industry. Most importance of product line engineering approach is in cost and time issues involved in marketing. Feature model is one of the most important methods of documenting variability in product line that shows product features and their dependencies. Because of the magnitude and complexity of the product line, build and maintain feature models are complex and time-consuming work. In this article feature model importance and position in product line is discussed and feature model extraction methods are reviewed and compared.
A Compound Metric for Identification of Fault Prone Modulesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Local Service Search Engine Management System LSSEMSYogeshIJTSRD
Local Services Search Engine Management System LSSEMS is a web based application which helps user to find serviceman in a local area such as maid, tuition teacher, plumber etc. LSSEMS contain data of serviceman maid, tuition teacher, plumber etc. . The main purpose of LSSEMS is to systematically record, store and update the serviceman records. Kaushik Mishra | Aditya Sharma | Mohak Gund "Local Service Search Engine Management System (LSSEMS)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advances in Engineering, Science and Technology - 2021 , May 2021, URL: https://www.ijtsrd.com/papers/ijtsrd42462.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/42462/local-service-search-engine-management-system-lssems/kaushik-mishra
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IJCSEA Journal
Software metrics are increasingly playing a central role in the planning and control of software development projects. Coupling measures have important applications in software development and maintenance. Existing literature on software metrics is mainly focused on centralized systems, while work in the area of distributed systems, particularly in service-oriented systems, is scarce. Distributed systems with service oriented components are even more heterogeneous networking and execution environment. Traditional coupling measures take into account only “static” couplings. They do not account for “dynamic” couplings due to polymorphism and may significantly underestimate the complexity of software and misjudge the need for code inspection, testing and debugging. This is expected to result in poor predictive accuracy of the quality models in distributed Object Oriented systems that utilize static coupling measurements. In order to overcome these issues, we propose a hybrid model in Distributed Object Oriented Software for measure the coupling dynamically. In the proposed method, there are three steps such as Instrumentation process, Post processing and Coupling measurement. Initially the instrumentation process is done. In this process the instrumented JVM that has been modified to trace method calls. During this process, three trace files are created namely .prf, .clp, .svp. In the second step, the information in these file are merged. At the end of this step, the merged detailed trace of each JVM contains pointers to the merged trace files of the other JVM such that the path of every remote call from the client to the server can be uniquely identified. Finally, the coupling metrics are measured dynamically. The implementation results show that the proposed system will effectively measure the coupling metrics dynamically.
IMPLEMENTATION OF DYNAMIC COUPLING MEASUREMENT OF DISTRIBUTED OBJECT ORIENTED...IJCSEA Journal
Software metrics are increasingly playing a central role in the planning and control of software development projects. Coupling measures have important applications in software development and maintenance. Existing literature on software metrics is mainly focused on centralized systems, while work in the area of distributed systems, particularly in service-oriented systems, is scarce. Distributed systems with service oriented components are even more heterogeneous networking and execution environment. Traditional coupling measures take into account only “static” couplings. They do not account for “dynamic” couplings due to polymorphism and may significantly underestimate the complexity of software and misjudge the need for code inspection, testing and debugging. This is expected to result in poor predictive accuracy of the quality models in distributed Object Oriented systems that utilize static coupling measurements. In order to overcome these issues, we propose a hybrid model in Distributed Object Oriented Software for measure the coupling dynamically. In the proposed method, there are three steps
such as Instrumentation process, Post processing and Coupling measurement. Initially the instrumentation process is done. In this process the instrumented JVM that has been modified to trace method calls. During this process, three trace files are created namely .prf, .clp, .svp. In the second step, the information in these file are merged. At the end of this step, the merged detailed trace of each JVM contains pointers to the merged trace files of the other JVM such that the path of every remote call from the client to the server can be uniquely identified. Finally, the coupling metrics are measured dynamically. The implementation results show that the proposed system will effectively measure the coupling metrics dynamically.
Similar to A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT BASED HEALTHCARE APPLICATIONS (20)
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT BASED HEALTHCARE APPLICATIONS
1. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
DOI: 10.5121/ijsea.2018.9105 55
A SOFTWARE REQUIREMENT ENGINEERING
TECHNIQUE USING OOADA-RE AND CSC FOR IOT
BASED HEALTHCARE APPLICATIONS
Aviral Srivastava, Fenil Patel and Prof. M Sivagami
Vellore Institute of Technology, Chennai campus,India
ABSTRACT
This Internet of things is one of the most trending technology with wide range of applications. Here we are
going to focus on Medical and Healthcare applications of IOT. Generally such IOT applications are very
complex comprising of many different modules. Thus a lot of care has to be taken during the requirement
engineering of IOT applications. Requirement Engineering is a process of structuring all the requirements
of the users. This is the base phase of software development which greatly affects the rest of the phases.
Thus our best should be given in the engineering of requirements because if the effort goes down here, it
will greatly affect the quality of the end product. In this study we have presented an approach to improve
the requirements engineering phase of IOT applications development by using Object Oriented Analysis
and Design Approach(OOADA) along with Constraints Story Card(CSC) templates.
KEYWORDS
Constraint Story Cards, OOADA-RE, Medical and Healthcare in IoT, Requirements Engineering
1. INTRODUCTION
This Internet of Things suggest only one phrase: Any service anywhere! In IoT, the information is
shared and gathered among various devices and cloud, making it possible to store and analyze the
data for various applications. IoT in Health care systems shows a lot of promise in improve the
quality and efficiency of the care provided. The patient data will be collected through multiple
sensors which will be recorded and analyzed using microprocessors and controllers.Fig 1 [1]
illustrates the use of IoT in Medical and Healthcare. The increased connectivity of the system
through cloud computing gives doctors and caregivers the ability to access realt time information
and assist them to make informed decisions. The diseases can be managed efficiently and can be
prevented from going out of hand through continuous patient monitoring and providing the
caregivers with real time information. Building such a complex system demands a great amount
of attention. The first step in developing the system will be the requirements engineering.
Requirements engineering is a step in software development cycle where all the requirements of
the user and system are structured. During this step the goals and functionalities of the end
product are described. The designers and developers use these specifications as the road map.
Thus it is very important that the requirements defined are clear, easy to understand and
consistent. OOADA is a requirement engineering activity used to create a model of functional
requirements of the system. In OOADA, first step is to find and organize the objects then later on
the actions are identified defined for the objects. Section 2 deals with Related Work, section 3
with the proposed RE technique and section 4 applies the proposed technique in Medical IoT
applications.
2. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
56
Figure 1. IoT in Medical and Healthcare
2. RELATED WORK
The Requirements engineering is the first step in most of the software development cycles.
J.M.A. Shari [2] et al have actually concluded that the requirement engineering step has the
maximum effect on the final product and the poor RE leads to end product with poor quality. H.
Nakajo et al [3] proposed an OOADA-RE(Object Oriented Design and Analysis Requirements
Engineering) Software Engineering technique stating this as a process in which different
processes and techniques are applied to identify and structure the requirements of the desired
system. As explained earlier it is very important to specify clear, easy to understand and
consistent requirements during this phase, because it is more expensive to fix the errors and
modify the system requirements in the later phases of the software development cycle.
There are many approaches for specifying requirements and transforming them into UML
diagrams.[4] Amit Raj, et al presented a approach where they transformed the requirements
specified in Object Management Group’s standard Semantics of Business Vocabulary and Rules
(SBVR) framework into UML models. M.G Illieva et al .[5] introduced another approach where
the used natural language processing to remove ambiguity, contradiction in the requirements
specifications and to map them to UML diagrams.
3. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
57
Another popular approach for requirements specification was scenario based requirements
engineering. The author N.M.Ian F. Alexander [6] introduced the Software Requirements
Engineering technique which defines the requirements in terms of scenarios. The problem with
this approach was that it was difficult to map the scenarios into uml diagrams. The OOADA-RE
approach was introduced by A.Zeaaraoui et al [7] in order to fill this gap. Using this approach it
was more convinient to build UML diagrams.
The UML diagrams from this approach were lacking associations. Walid Dahhane et al [8]
introduced Constraint Story Cards(CSC) template approach for creating associations between the
objects. Discussing about the work done in requirements engineering of IoT, there has not been
much work done which uses the concepts of OOADA and CSC and in this paper we have
presented the same.
3. PROPOSED WORK
A new software Requirements Engineering technique has been introduced for IoT based health-
care applications using OOADA-RE and Constraint Story Cards(CSC). In this section we have
demonstrated the step by step procedure to use OOADA-RE and CSC for requirements
engineering of minimal Health-care IoT application.
Figure 2. User stories
4. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
58
Figure 3. Generated Object Model from User Stories in Fig.2
3.1. OOADA-RE
In OOADA-RE we use user story templates such as: ”As a <role>, I want to <action> <object>,
so that <business values>”. [7]
This templates can be used to map the requirements to the class diagrams. Using the story
templates defined by the users in the figure 2 [7] using the above mentioned template, we can
generate the class diagrams as illustrated in the figure 3 [7]. We first identify the objects from the
user defined stories and organize it. Then in the next step we identify all the actions defined for
the objects and map the objects and actions onto the diagram.
3.1.1. Advantages and limitations of OOADA-RE in contrast with other techniques
As discussed in the Section 2, many various types of techniques have been proposed for
effectively specifying requirements and transforming them to UML diagrams. The major
drawback of scenario based approaches is the non-possibility to map scenarios from this
approaches into object model diagrams. Generally scenarios describes functional nature of the
5. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
59
system and cannot be effectively mapped to object models. On the other hand, OOADA-RE
approach makes it possible to map the requirements into object models by using the templates
which can help in identifying classes, attributes etc.
Long paragraph based approaches for defining requirements and use cases many times lead to
ambiguity which in turn affects the quality as well as build time of systems. On the other hand,
OOADA-RE with the help of minimal user story templates minimize such ambiguities in the
requirements.
Dependency among the classes is one of the most important part of any object class diagram. The
major drawback of the OOADA-RE method is that it does not deal with the dependencies. The
Constraint Story Card templates described in the subsequent section deals with this drawback.
3.2. Constraints Story Card Templates
The class diagrams generated by OOADA-RE lack associations between the classes. Associations
are very important part of any class diagram. They defined how all the objects interact with each
other. Constraint Story Cards(CSC) templates are used for filling this gap. In CSC there are four
templates for 4 types of associations[8]:
• Simple Association template
• Inheritance template
• Aggregation template
• Composition template
The four templates uses a generic formula which has following arguments:
• Source Object - Source object of the association.
• Role - Association role between the objects.
• Association Expression - for example ’has’, ’is a’, ’is composed of’.
• Cardinality - Cardinality can be expressed by numbers or words like ’one’, ’many’.
• Target Object - Target Object of the association.
4. CASE STUDY
We demonstrated the proposed Software Requirements Engineering Technology. Any IoT
application requires these classes and more classes can be added (as per the requirements) later:
(Doctors, Patients, readingsReport, reportReview, Admin). readingReports class holds the reports
generated from the sensor readings. reportReview class holds the reviews given by doctors on the
generated readingReports.
• Step 1: Forming User Stories
In this step we will gather all the functional requirements of our IOT application through
meetings, workshops, interviews etc. The we will format the gathered information as user stories.
Here we will use a part of user stories for creating a Medical IOT application. The box in figure 4
contains some user stories for the application.
6. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
60
Figure 4. Sample user stories
Step 2: OOADA-RE
We start by categorizing the entities. For example the entities into object, actions or business
values. For first user sroty i.e ”As a Doctor, I want to generate report from gathered sensor
readings, for reviewing.” Doctor is an object, GenerateReport is an action and ”for reviewing” is
the business value. Then we decide what actions must be added to the object to fulfill the user’s
requirements. In our case the requirements specify that the Doctors should be able to generate
report and review report, therefore we will include this two actions for Doctor object. Similarly
we can generate a class diagram from this data by creating their objects and adding actions to
them.We can generate the class diagram as illustrated in figure 4. Now we will use CSC
templates to create the association between the classes.
Figure 5. Transformation of user stories to object model using the OOADA-RE approach.
7. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
61
Step 3: Using CSC template for class association As we can see that figure 5 lacks association,
which are very crucial. These associations define how the objects interact with each other. It is
very important to capture these interactions during the requirement engineering phase as they will
be very helpful during the development and implementation phases. As explained earlier there are
four CSC templates Simple, Inheritance, Aggregation and Composition.
Simple Association Template
This template deals with simple associations. For example, a doctor can be associated
with many patients and a patient can be associated with many doctors. We can express
such associations using following template:
[Role] <Source Object> has or verb <cardinality> [Role] <Target Object>
For example:
Doctor treats|has one or many Patient.
Inheritance Template
This deals with the inheritance association i.e parent-child relationship between classes.
The inheritance association uses IS-a relationship.
<Source Object> <is a> <Target Object>.
For example:
Doctor is a Person.
Patient is a Person.
Aggregation Template
Aggregation is a special form of association where objects have life cycle as well as
ownership. We use following template for aggregation.
[Role] <Source Object> contains <cardinality> [Role] <Target Object>.
For example:
IOT Application contains many Sensor Modules.
Composition Template
Composition is a special form of aggregation where if parent object is destroyed, child
object cease to exist. It is actually a strong type of aggregation aslo known as death
relationship. We use following template for composition.
[Role] <Source Object> < is composed of > <cardinality> [Role] <Target Object>.
For example:
Patient report is composed of one or many Doctor Reviews.
We can use this templates to introduce associations in our OOADA-RE generated class diagram.
This templates can also be used for big complex applications. For our simple IOT application
example, the final class diagram will be as shown in Fig 6.
8. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
62
Figure 6. Final Class Diagram using OOADA-RE and CSC.
Step 4: Implementation and generating code: In this step we transit from requirements
engineering to implementation phase. But before doing that we must detail out diagram with
proper datatypes, attributes etc.
We have seen OOADA-REs usage in Requirements Engineering which helps us developing the
structure and model for RE and showed the break they present when moving to construction, we
have seen Constraint Story Cards aimed to handle associations. In this paper, we have suggested
the combination of OOADA-RE and CSC for IoT (Medical and Healthcare) applications which
will follow the roadmap of OOADA but the users shall be given the better templates for user
stories; the association between classes can be well drawn. Hence, we propose this method to be
working better than the rest two separately or individually.
5. CONCLUSIONS AND FUTURE WORK
For complex application using IOT deserves great amount of attention in requirements
engineering. In this paper we introduced a step by step procedure to model the requirements of
users to a proper detailed class diagrams using Object Oriented Analysis and Design
Approach(OOADA) and Constraint Story Card(CSC) templates. In this paper we concentrated on
IOT applications for Medical and Healthcare, in the future we will make this more generic for all
IOT applications.
REFERENCES
[1] M. H. K. M. H. K.-S. K. S. M. RIAZUL ISLAM, DAEHAN KWAK (2015), “The internet of things
for health care: A comprehensive survey,” in IEEE Access (Volume : 3), pp. 678–708, IEEE.
9. International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
63
[2] J. M. A. Shari Lawrence Pfleeger (1998), “Software engineering: Theory and practice,”.
[3] H. Nakajo, T. Kume (1991), “A case history analysis of software error cause effect relationships,”
Transactions on Software Engineering, pp. 830–838.
[4] S. H. Amit Raj, T. V. Prabhakar (2008), “Transformation of sbvr business design to uml models,”
ISEC ’08 Proceedings of the 1st India software engineering conference, pp. 29–38.
[5] O. O. M. G. Ilieva (2005), “Automatic transition of natural language software requirements
specification into formal presentation,” Natural Language Processing and Information Systems. NLDB
2005. Lecture Notes in Computer Science, vol 3513., Springer, Berlin, Heidelberg.
[6] N. M. Ian F. Alexander (2004), “Scenarios,stories, use cases: Through the systems development life-
cycle,”.
[7] M. B. T. B. A.ZEAARAOUI, Z.BOUGROUN (2012), “Object-oriented analysis and design approach
for requirements engineering,” in Second International Conference on the Innovative Computing
Technology (INTECH 2012), pp. 133–137.
[8] E. H. E. T. B. Walid DAHHANE*, Adil ZEAARAOUI (2014), “An automated object-based approach
to transforming requirements to class diagrams,” 2014 Second World Conference on Complex Systems
(WCCS),pp. 158–163.