Application Program Interface (API) allows programmers to use predefined functions instead of writing them from scratch.
Description of API elements that is Methods, Classes, Constructors etc. is provided through API Reference Documentation. Hence
API Reference Documentation acts as a guide to user or developer to use API’s. Different types of Knowledge Types are generated by
processing this API Reference Documentation. And this Knowledge Types will be used for Classification and Searching of Java API
Reference Documentation
TECHNIQUES FOR COMPONENT REUSABLE APPROACHcscpconf
To find out best reusable component is a difficult task for the user. The keyword based approach
does not provide accurate result, which is largely used in descriptive methods for component
retrieval. The keyboard based procedure is used for descriptive procedure broadly, it produces
the result is too formless. For retrieval approach of component, to make them as reusable smart
environment is used. In keyword search region, this will list out the components, the user must
select appropriate component manually. The class diagram provides the information about
structural description and contents of class effectively. That is class name, attributes, relationships, behavior operations and generalization etc. Repository is used for this information; this search result is better and produces high accuracy whenever it is compared with keyboard based search procedure
An Efficient Approach for Requirement Traceability Integrated With Software R...IOSR Journals
Abstract: Traceability links between requirements of a system and its source code are helpful in reducing
system conception effort. During software updates and maintenance, the traceability links become invalid since
the developers may modify or remove some features of the source code. Hence, to acquire trustable links from a
system source code, a supervised link tracing approach is proposed here. In proposed approach, IR techniques
are applied on source code and requirements document to generate baseline traceability links. Concurrently,
software repositories are also mined to generate validating traceability links i.e. Histrace links which are then
called as experts. Now a trust model named as DynWing is used to rank the different types of experts. DynWing
dynamically assigns weights to different types of experts in ranking process. The top ranked experts are then fed
to the trust model named as Trumo. Trumo validates the baseline links with top ranked experts and finds the
trustable links from baseline links set. While validating the links, Trumo is capable of discarding or re-ranking
the experts and finds most traceable links. The proposed approach is able to improve the precision and recall
values of the traceability links.
Index Terms: Traceability, requirements, features, source code, repositories, experts.
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
TECHNIQUES FOR COMPONENT REUSABLE APPROACHcscpconf
To find out best reusable component is a difficult task for the user. The keyword based approach
does not provide accurate result, which is largely used in descriptive methods for component
retrieval. The keyboard based procedure is used for descriptive procedure broadly, it produces
the result is too formless. For retrieval approach of component, to make them as reusable smart
environment is used. In keyword search region, this will list out the components, the user must
select appropriate component manually. The class diagram provides the information about
structural description and contents of class effectively. That is class name, attributes, relationships, behavior operations and generalization etc. Repository is used for this information; this search result is better and produces high accuracy whenever it is compared with keyboard based search procedure
An Efficient Approach for Requirement Traceability Integrated With Software R...IOSR Journals
Abstract: Traceability links between requirements of a system and its source code are helpful in reducing
system conception effort. During software updates and maintenance, the traceability links become invalid since
the developers may modify or remove some features of the source code. Hence, to acquire trustable links from a
system source code, a supervised link tracing approach is proposed here. In proposed approach, IR techniques
are applied on source code and requirements document to generate baseline traceability links. Concurrently,
software repositories are also mined to generate validating traceability links i.e. Histrace links which are then
called as experts. Now a trust model named as DynWing is used to rank the different types of experts. DynWing
dynamically assigns weights to different types of experts in ranking process. The top ranked experts are then fed
to the trust model named as Trumo. Trumo validates the baseline links with top ranked experts and finds the
trustable links from baseline links set. While validating the links, Trumo is capable of discarding or re-ranking
the experts and finds most traceable links. The proposed approach is able to improve the precision and recall
values of the traceability links.
Index Terms: Traceability, requirements, features, source code, repositories, experts.
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Website security is a critical issue that needs to be considered in the web, in order to run your online business healthy and
smoothly. It is very difficult situation when security of website is compromised when a brute force or other kind of attacker attacks on
your web creation. It not only consume all your resources but create heavy log dumps on the server which causes your website stop
working.
Recent studies have suggested some backup and recovery modules that should be installed into your website which can take timely
backups of your website to 3rd party servers which are not under the scope of attacker. The Study also suggested different type of
recovery methods such as incremental backups, decremental backups, differential backups and remote backup.
Moreover these studies also suggested that Rsync is used to reduce the transferred data efficiently. The experimental results show
that the remote backup and recovery system can work fast and it can meet the requirements of website protection. The automatic backup
and recovery system for Web site not only plays an important role in the web defence system but also is the last line for disaster
recovery.
This paper suggests different kind of approaches that can be incorporated in the WordPress CMS to make it healthy, secure and
prepared web attacks. The paper suggests various possibilities of the attacks that can be made on CMS and some of the possible
solutions as well as preventive mechanisms.
Some of the proposed security measures –
1. Secret login screen
2. Blocking bad boats
3. Changing db. prefixes
4. Protecting configuration files
5. 2 factor security
6. Flight mode in Web Servers
7. Protecting htaccess file itself
8. Detecting vulnerabilities
9. Unauthorized access made to the system checker
However, this is to be done by balancing the trade-off between website security and backup recovery modules of a website, as measures
taken to secure web page should not affect the user‟s experience and recovery modules
How is Mortgage Lending Influencing the Economic Growth in AlbaniaEditor IJCATR
Banks in Albania have been playing an important role in providing credit to the households especially to the
housing sector and thereby contributing to the aggregate demand in the sector. Moreover, Albanian banks also extend
various types of loans against the individuals and corporate before the financial crisis. After the crisis the banks become
more restricted due to increase of non-performing loans as well as the macroeconomic volatility which is higher in
emerging economies like Albania. In my study I will focus on the influence of mortgage loans and nonperforming loans
in the country economic growth during the interval 2008-2013 that corresponds with the after crisis period.
Software test-case generation is the process of identifying a set of test cases. It is necessary to generate the test sequence that satisfies the testing criteria. For solving this kind of difficult problem there were a lot of research works, which have been done in the past. The length of the test sequence plays an important role in software testing. The length of test sequence decides whether the sufficient testing is carried or not. Many existing test sequence generation techniques uses genetic algorithm for test-case generation in software testing. The Genetic Algorithm (GA) is an optimization heuristic technique that is implemented through evolution and fitness function. It generates new test cases from the existing test sequence. Further to improve the existing techniques, a new technique is proposed in this paper which combines the tabu search algorithm and the genetic algorithm. The hybrid technique combines the strength of the two meta-heuristic methods and produces efficient test- case sequence.
Different Approach of VIDEO Compression Technique: A StudyEditor IJCATR
The main objective of video compression is to achieve video compression with less possible losses to reduce the
transmission bandwidth and storage memory. This paper discusses different approach of video compression for better transmission of
video frames for multimedia application. Video compression methods such as frame difference approach, PCA based method,
accordion function, fuzzy concept, and EZW and FSBM were analyzed in this paper. Those methods were compared for performance,
speed and accuracy and which method produces better visual quality.
Multimedia Video transmission is over Wireless Local Area Networks is expected to be an important component of many
emerging multimedia applications. However, Wireless networks will always be bandwidth limited compared to fixed networks due to
background noise, limited frequency spectrum, and varying degrees of network coverage and signal strength One of the critical issues
for multimedia applications is to ensure that the Quality of Service (QoS) requirement to be maintained at an acceptable level. Modern
mobile devices are equipped with multiple network interfaces, including 3G/LTE WiFi. Bandwidth aggregation over LTE and WiFi
links offers an attractive opportunity of supporting bandwidth-intensive services, such as high-quality video streaming, on mobile
devices. Achieving effective bandwidth aggregation in wireless environments raises several challenges related to deployment, link
heterogeneity, Network congestion, network fluctuation, and energy consumption. In this work, an overview of schemes for video
transmission over wireless networks is presented where an acceptable quality of service (QoS) for video applications required realtime
video transmission is achieved
Parameter Estimation of Software Reliability Growth Models Using Simulated An...Editor IJCATR
The parameter estimation of Goel’s Okomotu Model is performed victimisation simulated annealing. The Goel’s Okomotu
Model is predicated on Exponential model and could be a easy non-homogeneous Poisson method (NHPP) model. Simulated
annealing could be a heuristic optimisation technique that provides a method to flee local optima. The information set is optimized
using simulated annealing technique. SA could be a random algorithmic program with higher performance than Genetic algorithmic
program (GA) that depends on the specification of the neighbourhood structure of a state area and parameter settings for its cooling
schedule.
A Comparative Analysis of Slicing for Structured ProgramsEditor IJCATR
Program Slicing is a method for automatically decomposing programs by analyzing their data flow and control flow.
Slicing reduces the program to a minimal form called “slice” which still produces that behavior. Program slice singles out all
statements that may have affected the value of a given variable at a specific program point. Slicing is useful in program
debugging, program maintenance and other applications that involve understanding program behavior. In this paper we have
discuss the static and dynamic slicing and its comparison by taking number of examples
IA Literature Review on Synthesis and Characterization of enamelled copper wi...Editor IJCATR
This paper discusses about the survey on the various magazines, conference papers and journals for understanding the
properties of enamelled copper wires mixed with nano fillers, fundamental methods for synthesis and characterization of carbon
nanotubes. From all these papers, it was noted that the research work carried out in an enamelled copper wires filled with nano fillers
has shown better results. It was also recorded that the research work was carried mostly with single metal catalysts and very little
amount of research work has been carried out on the synthesis of carbon nanotubes using bimetallic catalysts.
Designing of Semantic Nearest Neighbor Search: SurveyEditor IJCATR
Conventional spatial queries, such as range search and nearest neighbor retrieval, involve only conditions on objects’
geometric properties. Today, many modern applications call for novel forms of queries that aim to find objects satisfying both a spatial
predicate, and a predicate on their associated texts. For example, instead of considering all the restaurants, a nearest neighbor query
would instead ask for the restaurant that is the closest among those whose menus contain ―steak, spaghetti, brandy‖ all at the same
time. Currently the best solution to such queries is based on the IR2-tree, which, as shown in this paper, has a few deficiencies that
seriously impact its efficiency. Motivated by this, we develop a new access method called the spatial inverted index that extends the
conventional inverted index to cope with multidimensional data, and comes with algorithms that can answer nearest neighbor queries
with keywords in real time. As verified by experiments, the proposed techniques outperform the IR2-tree in query response time
significantly, often by a factor of orders of magnitude.
Spam filtering by using Genetic based Feature SelectionEditor IJCATR
Spam is defined as redundant and unwanted electronica letters, and nowadays, it has created many problems in business life such as
occupying networks bandwidth and the space of user’s mailbox. Due to these problems, much research has been carried out in this
regard by using classification technique. The resent research show that feature selection can have positive effect on the efficiency of
machine learning algorithm. Most algorithms try to present a data model depending on certain detection of small set of features.
Unrelated features in the process of making model result in weak estimation and more computations. In this research it has been tried
to evaluate spam detection in legal electronica letters, and their effect on several Machin learning algorithms through presenting a
feature selection method based on genetic algorithm. Bayesian network and KNN classifiers have been taken into account in
classification phase and spam base dataset is used.
Dielectric and Thermal Characterization of Insulating Organic Varnish Used in...Editor IJCATR
In recent days, a lot of attention was being drawn towards the polymer nanocomposites for use in electrical applications due
to encouraging results obtained for their dielectric properties. Polymer nanocomposites were commonly defined as a combination of
polymer matrix and additives that have at least one dimension in the nanometer range scale. Carbon nanotubes were of a special
interest as the possible organic component in such a composite coating. The carbon atoms were arranged in a hexagonal network and
then rolled up to form a seamless cylinder which measures several nanometers across, but can be thousands of nanometers long. There
were many different types, but the two main categories are single-walled nanotubes (SWNTs) and multi-walled nanotubes (MWNTs),
which are made from multiple layers of graphite. Carbon nanotubes were an example of a nanostructure varying in size from 1-100
nanometers (the scale of atoms and molecules). Nano composites were one of the fastest growing fields in nanotechnology. Extensive
literature survey has been done on the nanocomposites, synthesis and preparation of nano filler. The following objectives were set
based on the literature survey and understanding the technology.
Complete study of Organic varnish and CNT
Chemical properties
Electrical properties
Thermal properties
Mechanical properties
Synthesis and characterization of carbon nanotubes
Preparation of polymer nanocomposites
Study of characteristics of the nanocomposite insulation
Dimensioning an insulation system requires exact knowledge of the type, magnitude and duration of the electric stress while
simultaneously considering the ambient conditions. But, on the other hand, properties of the insulating materials in question must also
be known, so that in addition to the proper material, the optimum, e.g. the most economical design of the insulation system must be
chosen.
A Review on a web based Punjabi t o English Machine Transliteration SystemEditor IJCATR
The paper presents the transliteration of noun phrases from Punjabi to English using statistical machine translation
approach.Transliteration maps the letters of source scrip
ts to letters of another language.Forward transliteration converts an original
word or phrase in the source language into a word in the target language.Backward transliteration is the reverse process that
converts
the transliterated word or phrase back int
o its original word or phrase.Transliteration is an important part of research in NLP.Natural
Language Processing (NLP) is the ability of a
computer program to understand human speech as it is spoken.NLP is an important
component of AI.Artificial Intellig
ence is a branch of science which deals with helping machines find solutions to complex programs
in a human like fashion.The transliteration system is going to developed using SMT.Statistical Machine Translation (SMT) is a
data
oriented statistical framewo
rk for translating text from one natural language to another based on the knowledge
Design of STT-RAM cell in 45nm hybrid CMOS/MTJ processEditor IJCATR
This paper evaluates the performance of Spin-Torque Transfer Random Access Memory (STT-RAM) basic memory cell
configurations in 45nm hybrid CMOS/MTJ process. Switching speed and current drawn by the cells have been calculated and
compared. Cell design has been done using cadence tools. The results obtained show good agreement with theoretical results.
Top 20 API Testing Interview Questions.pdfAnanthReddy38
Magnitia’s Web services Testing Training will provide you complete knowledge on Web services, API and their functionality. This API Testing course enables you to develop robust automation Framework for API’s test cases and how to test Web services and REST API using SoapUI& Rest Assured.
API Development involves designing, building, and implementing Application Programming Interfaces (APIs) that enable seamless communication and data exchange between different software systems. There are various types of APIs, including RESTful APIs, SOAP APIs, GraphQL, and WebSocket APIs, each serving specific purposes. API specifications, such as OpenAPI Specification (OAS) and GraphQL Schema Definition Language (SDL), define the structure and behavior of APIs. Documentation plays a crucial role in API development, providing clear instructions, examples, and troubleshooting guidance for developers who want to integrate with the API.
Click Here For More Details: https://www.connectinfosoft.com/rest-api-development-service/
Multi-dimensional exploration of API usage - ICPC13 - 21-05-13Coen De Roover
Presented at the 21st IEEE International Conference on Program Comprehension (ICPC 2013), San Francisco (USA). Website of the paper: http://softlang.uni-koblenz.de/explore-API-usage/
Website security is a critical issue that needs to be considered in the web, in order to run your online business healthy and
smoothly. It is very difficult situation when security of website is compromised when a brute force or other kind of attacker attacks on
your web creation. It not only consume all your resources but create heavy log dumps on the server which causes your website stop
working.
Recent studies have suggested some backup and recovery modules that should be installed into your website which can take timely
backups of your website to 3rd party servers which are not under the scope of attacker. The Study also suggested different type of
recovery methods such as incremental backups, decremental backups, differential backups and remote backup.
Moreover these studies also suggested that Rsync is used to reduce the transferred data efficiently. The experimental results show
that the remote backup and recovery system can work fast and it can meet the requirements of website protection. The automatic backup
and recovery system for Web site not only plays an important role in the web defence system but also is the last line for disaster
recovery.
This paper suggests different kind of approaches that can be incorporated in the WordPress CMS to make it healthy, secure and
prepared web attacks. The paper suggests various possibilities of the attacks that can be made on CMS and some of the possible
solutions as well as preventive mechanisms.
Some of the proposed security measures –
1. Secret login screen
2. Blocking bad boats
3. Changing db. prefixes
4. Protecting configuration files
5. 2 factor security
6. Flight mode in Web Servers
7. Protecting htaccess file itself
8. Detecting vulnerabilities
9. Unauthorized access made to the system checker
However, this is to be done by balancing the trade-off between website security and backup recovery modules of a website, as measures
taken to secure web page should not affect the user‟s experience and recovery modules
How is Mortgage Lending Influencing the Economic Growth in AlbaniaEditor IJCATR
Banks in Albania have been playing an important role in providing credit to the households especially to the
housing sector and thereby contributing to the aggregate demand in the sector. Moreover, Albanian banks also extend
various types of loans against the individuals and corporate before the financial crisis. After the crisis the banks become
more restricted due to increase of non-performing loans as well as the macroeconomic volatility which is higher in
emerging economies like Albania. In my study I will focus on the influence of mortgage loans and nonperforming loans
in the country economic growth during the interval 2008-2013 that corresponds with the after crisis period.
Software test-case generation is the process of identifying a set of test cases. It is necessary to generate the test sequence that satisfies the testing criteria. For solving this kind of difficult problem there were a lot of research works, which have been done in the past. The length of the test sequence plays an important role in software testing. The length of test sequence decides whether the sufficient testing is carried or not. Many existing test sequence generation techniques uses genetic algorithm for test-case generation in software testing. The Genetic Algorithm (GA) is an optimization heuristic technique that is implemented through evolution and fitness function. It generates new test cases from the existing test sequence. Further to improve the existing techniques, a new technique is proposed in this paper which combines the tabu search algorithm and the genetic algorithm. The hybrid technique combines the strength of the two meta-heuristic methods and produces efficient test- case sequence.
Different Approach of VIDEO Compression Technique: A StudyEditor IJCATR
The main objective of video compression is to achieve video compression with less possible losses to reduce the
transmission bandwidth and storage memory. This paper discusses different approach of video compression for better transmission of
video frames for multimedia application. Video compression methods such as frame difference approach, PCA based method,
accordion function, fuzzy concept, and EZW and FSBM were analyzed in this paper. Those methods were compared for performance,
speed and accuracy and which method produces better visual quality.
Multimedia Video transmission is over Wireless Local Area Networks is expected to be an important component of many
emerging multimedia applications. However, Wireless networks will always be bandwidth limited compared to fixed networks due to
background noise, limited frequency spectrum, and varying degrees of network coverage and signal strength One of the critical issues
for multimedia applications is to ensure that the Quality of Service (QoS) requirement to be maintained at an acceptable level. Modern
mobile devices are equipped with multiple network interfaces, including 3G/LTE WiFi. Bandwidth aggregation over LTE and WiFi
links offers an attractive opportunity of supporting bandwidth-intensive services, such as high-quality video streaming, on mobile
devices. Achieving effective bandwidth aggregation in wireless environments raises several challenges related to deployment, link
heterogeneity, Network congestion, network fluctuation, and energy consumption. In this work, an overview of schemes for video
transmission over wireless networks is presented where an acceptable quality of service (QoS) for video applications required realtime
video transmission is achieved
Parameter Estimation of Software Reliability Growth Models Using Simulated An...Editor IJCATR
The parameter estimation of Goel’s Okomotu Model is performed victimisation simulated annealing. The Goel’s Okomotu
Model is predicated on Exponential model and could be a easy non-homogeneous Poisson method (NHPP) model. Simulated
annealing could be a heuristic optimisation technique that provides a method to flee local optima. The information set is optimized
using simulated annealing technique. SA could be a random algorithmic program with higher performance than Genetic algorithmic
program (GA) that depends on the specification of the neighbourhood structure of a state area and parameter settings for its cooling
schedule.
A Comparative Analysis of Slicing for Structured ProgramsEditor IJCATR
Program Slicing is a method for automatically decomposing programs by analyzing their data flow and control flow.
Slicing reduces the program to a minimal form called “slice” which still produces that behavior. Program slice singles out all
statements that may have affected the value of a given variable at a specific program point. Slicing is useful in program
debugging, program maintenance and other applications that involve understanding program behavior. In this paper we have
discuss the static and dynamic slicing and its comparison by taking number of examples
IA Literature Review on Synthesis and Characterization of enamelled copper wi...Editor IJCATR
This paper discusses about the survey on the various magazines, conference papers and journals for understanding the
properties of enamelled copper wires mixed with nano fillers, fundamental methods for synthesis and characterization of carbon
nanotubes. From all these papers, it was noted that the research work carried out in an enamelled copper wires filled with nano fillers
has shown better results. It was also recorded that the research work was carried mostly with single metal catalysts and very little
amount of research work has been carried out on the synthesis of carbon nanotubes using bimetallic catalysts.
Designing of Semantic Nearest Neighbor Search: SurveyEditor IJCATR
Conventional spatial queries, such as range search and nearest neighbor retrieval, involve only conditions on objects’
geometric properties. Today, many modern applications call for novel forms of queries that aim to find objects satisfying both a spatial
predicate, and a predicate on their associated texts. For example, instead of considering all the restaurants, a nearest neighbor query
would instead ask for the restaurant that is the closest among those whose menus contain ―steak, spaghetti, brandy‖ all at the same
time. Currently the best solution to such queries is based on the IR2-tree, which, as shown in this paper, has a few deficiencies that
seriously impact its efficiency. Motivated by this, we develop a new access method called the spatial inverted index that extends the
conventional inverted index to cope with multidimensional data, and comes with algorithms that can answer nearest neighbor queries
with keywords in real time. As verified by experiments, the proposed techniques outperform the IR2-tree in query response time
significantly, often by a factor of orders of magnitude.
Spam filtering by using Genetic based Feature SelectionEditor IJCATR
Spam is defined as redundant and unwanted electronica letters, and nowadays, it has created many problems in business life such as
occupying networks bandwidth and the space of user’s mailbox. Due to these problems, much research has been carried out in this
regard by using classification technique. The resent research show that feature selection can have positive effect on the efficiency of
machine learning algorithm. Most algorithms try to present a data model depending on certain detection of small set of features.
Unrelated features in the process of making model result in weak estimation and more computations. In this research it has been tried
to evaluate spam detection in legal electronica letters, and their effect on several Machin learning algorithms through presenting a
feature selection method based on genetic algorithm. Bayesian network and KNN classifiers have been taken into account in
classification phase and spam base dataset is used.
Dielectric and Thermal Characterization of Insulating Organic Varnish Used in...Editor IJCATR
In recent days, a lot of attention was being drawn towards the polymer nanocomposites for use in electrical applications due
to encouraging results obtained for their dielectric properties. Polymer nanocomposites were commonly defined as a combination of
polymer matrix and additives that have at least one dimension in the nanometer range scale. Carbon nanotubes were of a special
interest as the possible organic component in such a composite coating. The carbon atoms were arranged in a hexagonal network and
then rolled up to form a seamless cylinder which measures several nanometers across, but can be thousands of nanometers long. There
were many different types, but the two main categories are single-walled nanotubes (SWNTs) and multi-walled nanotubes (MWNTs),
which are made from multiple layers of graphite. Carbon nanotubes were an example of a nanostructure varying in size from 1-100
nanometers (the scale of atoms and molecules). Nano composites were one of the fastest growing fields in nanotechnology. Extensive
literature survey has been done on the nanocomposites, synthesis and preparation of nano filler. The following objectives were set
based on the literature survey and understanding the technology.
Complete study of Organic varnish and CNT
Chemical properties
Electrical properties
Thermal properties
Mechanical properties
Synthesis and characterization of carbon nanotubes
Preparation of polymer nanocomposites
Study of characteristics of the nanocomposite insulation
Dimensioning an insulation system requires exact knowledge of the type, magnitude and duration of the electric stress while
simultaneously considering the ambient conditions. But, on the other hand, properties of the insulating materials in question must also
be known, so that in addition to the proper material, the optimum, e.g. the most economical design of the insulation system must be
chosen.
A Review on a web based Punjabi t o English Machine Transliteration SystemEditor IJCATR
The paper presents the transliteration of noun phrases from Punjabi to English using statistical machine translation
approach.Transliteration maps the letters of source scrip
ts to letters of another language.Forward transliteration converts an original
word or phrase in the source language into a word in the target language.Backward transliteration is the reverse process that
converts
the transliterated word or phrase back int
o its original word or phrase.Transliteration is an important part of research in NLP.Natural
Language Processing (NLP) is the ability of a
computer program to understand human speech as it is spoken.NLP is an important
component of AI.Artificial Intellig
ence is a branch of science which deals with helping machines find solutions to complex programs
in a human like fashion.The transliteration system is going to developed using SMT.Statistical Machine Translation (SMT) is a
data
oriented statistical framewo
rk for translating text from one natural language to another based on the knowledge
Design of STT-RAM cell in 45nm hybrid CMOS/MTJ processEditor IJCATR
This paper evaluates the performance of Spin-Torque Transfer Random Access Memory (STT-RAM) basic memory cell
configurations in 45nm hybrid CMOS/MTJ process. Switching speed and current drawn by the cells have been calculated and
compared. Cell design has been done using cadence tools. The results obtained show good agreement with theoretical results.
Top 20 API Testing Interview Questions.pdfAnanthReddy38
Magnitia’s Web services Testing Training will provide you complete knowledge on Web services, API and their functionality. This API Testing course enables you to develop robust automation Framework for API’s test cases and how to test Web services and REST API using SoapUI& Rest Assured.
API Development involves designing, building, and implementing Application Programming Interfaces (APIs) that enable seamless communication and data exchange between different software systems. There are various types of APIs, including RESTful APIs, SOAP APIs, GraphQL, and WebSocket APIs, each serving specific purposes. API specifications, such as OpenAPI Specification (OAS) and GraphQL Schema Definition Language (SDL), define the structure and behavior of APIs. Documentation plays a crucial role in API development, providing clear instructions, examples, and troubleshooting guidance for developers who want to integrate with the API.
Click Here For More Details: https://www.connectinfosoft.com/rest-api-development-service/
Multi-dimensional exploration of API usage - ICPC13 - 21-05-13Coen De Roover
Presented at the 21st IEEE International Conference on Program Comprehension (ICPC 2013), San Francisco (USA). Website of the paper: http://softlang.uni-koblenz.de/explore-API-usage/
Performance assessment and analysis of development and operations based autom...IJECEIAES
Development and operations (DevOps), an accretion of automation tools, efficiently reaches the goals of software development, test, release, and delivery in terms of optimization, speed and quality. Diverse set of alternative automation tools exist for different phases of software development, for which DevOps adopts several selection criteria to choose the best tool. This research paper represents the performance evaluation and analysis of automation tools employed in the coding phase of DevOps culture. We have taken most commonly followed source code management tools-BitBucket, GitHub actions, and GitLab into consideration. Current work assesses and analyzes their performance based on DevOps evaluation criteria that too are categorized into different dimensions. For the purpose of performance evaluation, weightage and overall score is assigned to these criteria based on existing renowned literature and industrial case study of TekMentors Pvt Ltd. On the ground of performance outcome, the tool with the highest overall score is realized as the best source code automation tool. This performance analysis or measure will be a great benefit to our young researchers/students to gain an understanding of the modus operandi of DevOps culture, particularly source code automation tools. As a part of future research, other dimensions of selection criteria can also be considered for evaluation purposes.
An increasing number of researchers rely on computational methods to generate the results described in their publications. Research software created to this end is heterogeneous (e.g., scripts, libraries, packages, notebooks, etc.) and usually difficult to find, reuse, compare and understand due to its disconnected documentation (dispersed in manuals, readme files, web sites, and code comments) and a lack of structured metadata to describe it. In this talk I will describe the main challenges for finding, comparing and reusing research software, how structured metadata can help to address some of them, which are the best practices being proposed by the community; and current initiatives to aid their adoption by researchers within EOSC.
Impact: The talk addresses an important aspect of the EOSC infrastructure for quality research software by ensuring that software contributed to the EOSC ecosystem can be found, compared and reused by researchers. The talk also aims to address metadata quality of current research products, which is critical for successful adoption.
Presented at the EOSC symposium
We present a novel code search approach for answering queries focused on
API-usage with code showing how the API should be used.
To construct a search index, we develop new techniques for statically mining
and consolidating temporal API specifications from code snippets. In
contrast to existing semantic-based techniques, our approach handles partial
programs in the form of code snippets. Handling snippets allows us to consume
code from various sources such as parts of open source projects,
educational resources (e.g. tutorials), and expert code sites. To handle code
snippets, our approach (i) extracts a possibly \emph{partial} temporal
specification from each snippet using a relatively precise static analysis
tracking a generalized notion of typestate, and (ii) consolidates the
partial temporal specifications, combining consistent partial information to
yield consolidated temporal specifications, each of which captures a full(er)
usage scenario.
To answer a search query, we define a notion of relaxed inclusion
matching a query against temporal specifications and their corresponding code
snippets.
We have implemented our approach in a tool called PRIME and applied it to
search for API usage of several challenging APIs. PRIME was able to analyze
and consolidate thousands of snippets per tested API, and our results
indicate that the combination of a relatively precise analysis and
consolidation allowed PRIME to answer challenging queries effectively.
COLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLESijcsit
This paper proposes a Bibliographic system intends to exchange bibliographic information of survey/review articles by relying on Web service technology. It allows researchers and university students
to interact with system via single service using platform-independent standard named Web service to add,
search and retrieve bibliographic information of review articles in various science and technology fields
and build-up a dedicated database for these articles in each science and technology field. Additionally,
different implementation scenarios of the proposed system are presented and described, andrich features
that offered by such system are studied and described. However, this paper explains the proposed system
using computing area due to the existence of detailed taxonomy of this area, which allows defining the
system, their functionalities and features provided.However, the proposed system is not only confined to
computing area, it can support any other science and technology area without any need to modify this
system.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
When stars align: studies in data quality, knowledge graphs, and machine lear...
Classification and Searching in Java API Reference Documentation
1. International Journal of Computer Applications Technology and Research
Volume 3– Issue 7, 451 - 456, 2014
www.ijcat.com 451
Classification and Searching in Java API Reference
Documentation
Monali Metkar
K.K.W.I.E.E.R
Nashik,
University Of Pune, India
S. M. Kamalapur
K.K.W.I.E.E.R
Nashik,
University Of Pune, India
Abstract: Application Program Interface (API) allows programmers to use predefined functions instead of writing them from scratch.
Description of API elements that is Methods, Classes, Constructors etc. is provided through API Reference Documentation. Hence
API Reference Documentation acts as a guide to user or developer to use API’s. Different types of Knowledge Types are generated by
processing this API Reference Documentation. And this Knowledge Types will be used for Classification and Searching of Java API
Reference Documentation.
Keywords: API, API Reference Documentation, Knowledge Types, Classification, Searching.
1. INTRODUCTION
An Application Programming Interface (API) is a set of
commands, functions, and protocols. It also specifies the
interaction between the software components. In most
procedural languages, an API specifies a set of functions or
routines that accomplish a specific task or are allowed to
interact with a specific software component. For example,
consider following Constructor in Java:
AbstractAction()
Whenever user or developer is referring to an API and has
planned to use it for specific purpose API Reference
documentation works as a guide. API Reference
Documentation is an important part of programming with
APIs and it complements the API by providing information
about the API. So, it plays a crucial role in how developers
learn and use an A PI, and developers will expect the
information about API elements they should find therein By
considering the above example, if new developer wishes to
use “AbstractAction()” constructor in Java Program, he can
refer to API Reference Documentation of Java and he will
find the description of “AbstractAction()” constructor in
Constructor Summary as:
Creates an Action.
In above example Java Documentation is considered and Java
APIs are documented through Javadocs which is a set of web
pages such that one for each package or type in the API.
To enhance the quality of API reference documentation and
the efficiency with which the relevant information it contains
can be accessed, it’s necessary to first understand its contents
by analyzing it. Therefore, to reason about the quality and
value of Java API reference documentation, focus should be
about what knowledge it contains. Because Knowledge refers
to retrieve useful information from data and then use this
knowledge for specific purpose. By analyzing the contents of
Java API Reference Documentation, Knowledge is generated
and this knowledge can be categorized further.
Previous work focused separately on Studies of Knowledge
Categorization and of API reference Documentation and
Knowledge retrieval was done based on Experience,
Observations and Analysis.
So proposed system focuses on generation of Knowledge
Types, classification of API Reference Document according
to Knowledge Types and also on searching depending upon
Knowledge Types.
Section 2 focuses on Literature Review. Section 3 gives
Implementation Details with Block Diagram, Concept with
Example and Algorithms are highlighted in Section 4. Data
Set, Results obtained and Performance Measure are discussed
in Section 5 of Results. The paper ends with concluding
remarks.
2. LITERATURE REVIEW
The previous work mainly focused on the Knowledge
Categorization and API Reference Documentation Separately.
2.1 API Reference Documentation
Study of documentation needs for a domain-specific API,
using surveys and interviews of developers was done by
Nykaza et al.[6] This study identified, among other
requirements and the importance of an overview section in
API documentation.
Jeong et al. [10] conducted a lab study with eight participants
to assess the documentation of a specific service-oriented
architecture. This study identified 18 guidelines they believe
would lead to increased documentation quality for the system
under study, including “explaining starting points” for using
the API.
Robillard and DeLine [9] identified the obstacles faced by
developers when trying to learn new APIs through surveys
and interviews with Microsoft developers. The study showed
that many obstacles were related to aspects of the
2. International Journal of Computer Applications Technology and Research
Volume 3– Issue 7, 451 - 456, 2014
www.ijcat.com 452
documentation, but did not include the systematic analysis of
API documentation content.
Similarly, Shi et al. [8] studied API documentation evolution.
The authors apply data mining techniques over the source
repository of five open-source APIs. Their study provides
various quantitative measures of which parts of the API
documentation are most frequently revised, and how often
API documentation is changed consistently with the
corresponding elements.
2.2 Knowledge Categorization based on
Manual Methods
Researchers have applied Knowledge from one field to other
field, they also studied which are the different questions raised
in Software Project Development.
Mylopoulos et al.[5] discussed how knowledge representation
techniques from the field of Artificial Intelligence can be
applied to software engineering. The authors presented a
categorization of different knowledge types, presumably
derived from their experience.
Requirement and Design are the important stages in Software
Project Development. Herbsleb and Kuwana[4] classified
questions asked in design meetings to study the kinds of
knowledge that may benefit from explicit capture at the
requirements and design stages based on their general
experience.
Hou et al.[2] studied 300 questions related to two specific
Swing widgets (JButton and JTree) posted on the Swing
forum. They then mapped the questions to the different design
features of the widgets. Their classification focuses more on
the target of the question and less on discovering the different
types of knowledge provided to and sought by API users.
More recently, Ko et al.[1] observed 17 developers at
Microsoft for a 90 minutes session each, studying their
information needs as they perform their software engineering
tasks. From the observation data the authors collected 334
specific information needs, which they abstracted into 21
general information needs.
Kirk et al.[3] investigated the knowledge problems faced by
them and their students when trying to develop applications
by extending the JHotDraw framework.
Similarly to Ko et al.’s study, Sillito et al.[7] produced a
catalog of 44 types of questions developers ask during
software evolution tasks. The questions in the catalog do not
focus exclusively on API usage, but rather relate to software
evolution and maintenance tasks.
So, researchers focused on how different stages of Software
Project Development and tools required can be analyzed in
different ways and they classified the Questions raised in
different phases into different categories based on their
Experience, Observations. Knowledge Types was not
generated automatically.
Here, authors referred and studied API Reference
Documentation in different ways. So, Separate study of
Knowledge Categorization and API Reference Documentation
was done previously.
The proposed work focuses on generation of Knowledge
Types from Java API Reference Documentation,
Classification and Searching in Java API Reference
Documentation.
3. IMPLEMENTATION DETAILS
3.1 Block Diagram of the System
The following figure explains the Block Diagram of Proposed
System:
Figure 1: Block Diagram of the System
The System focuses on Java API Reference Documents
that is Javadocs. Input to the system is API Reference
Document of Java which is HTML Page.
This Java API Reference Document is then parsed by finding
Pattern for the Tags having Description.
After finding the Patterns, the required Text is retrieved from
the HTML page.
In the next step, Description of API elements is analyzed and
then Knowledge Types will be generated.
Following are the Knowledge Types that are to be generated:
1. Functionality and Behavior: This Knowledge Type
describes functionality and features of API. And also specifies
what happens when the API is used.
e.g.: protected boolean enabled
Specifies whether action is enabled; the default is true.
2. Directives: It is related to accessibility that is what users are
allowed or not allowed to do with the API element. Directives
Java API
Reference
Document
Parsing of
HTML file
Using
Pattern
Finding
Retrieve
Description of
Java API
Elements
Discover
Knowledge Types
from Description
Classify Java API
Reference
Document
according to
Knowledge Types
Searching of Java
API Reference
Document using
Knowledge Types
3. International Journal of Computer Applications Technology and Research
Volume 3– Issue 7, 451 - 456, 2014
www.ijcat.com 453
are clear contracts.
e.g.: public class AccessException extends
RemoteException
An AccessException is thrown by certain methods of
the java.rmi.Naming class (specifically bind, rebind,
and unbind) and methods of the
java.rmi.activation.ActivationSystem interface to indicate that
the caller does not have permission to perform the action
requested by the method call. If the method was invoked from
a non-local host, then an AccessException is thrown.
3. Control-Flow: How the API (or the framework) manages
the flow of control is described by this knowledge type. For
example by stating what events cause a certain callback to be
triggered?
e.g.: Set<String> getSupportedAnnotationTypes()
If the processor class is annotated
with SupportedAnnotationTypes, return an unmodifiable set
with the same set of strings as the annotation.
4. Code Examples: Code examples are provided for how to
use and combine elements to implement certain functionality
or design outcomes.
e.g.: public abstract class AbstractExecutorService extends
Object implements ExecutorService
Provides default implementations of ExecutorService
execution methods. This class implements the submit,
invokeAny and invokeAll methods using a RunnableFuture
returned by newTaskFor, which defaults to the FutureTask.
class provided in this package. For example, the
implementation of submit(Runnable) creates an associated
RunnableFuture that is executed and returned. Subclasses may
override the newTaskFor methods to return RunnableFuture
implementations other than FutureTask.
Extension example. Here is a sketch of a class that
customizes ThreadPoolExecutor to use a CustomTask class
instead of the default FutureTask:
public class CustomThreadPoolExecutor extends
ThreadPoolExecutor {
static class CustomTask<V> implements
RunnableFuture<V> {...}
protected <V> RunnableFuture<V>
newTaskFor(Callable<V> c) {
return new CustomTask<V>(c);
}
protected <V> RunnableFuture<V> newTaskFor(Runnable
r, V v) {
return new CustomTask<V>(r, v);
}
// ... add constructors, etc.
}
5. Environment: Aspects related to the environment in which
the API is used is described in this type, but not the API
directly, e.g., compatibility issues, differences between
versions, or licensing information.
e.g: public abstract class AbstractElementVisitor7<R,P>
extends AbstractElementVisitor6<R,P>
A skeletal visitor of program elements with default behavior
appropriate for the RELEASE_7 source version.
6.External References: It includes any pointer to external
documents, either in the form of hyperlinks, tagged ”see also”
reference, or mentions of other documents (such as standards
or manuals).
e.g: public interface DOMLocator
DOMLocator is an interface that describes a location (e.g.
where an error occurred).
See also the Document Object Model (DOM) Level 3 Core
Specification.
7. Non-information: A section of documentation containing
any complete sentence or self-contained fragment of text that
provides only uninformative boilerplate text.
e.g: DefinitionKindHelper()
After generating the Knowledge Types, the given Java API
Reference Document is classified according to the Knowledge
Types generated for class.
Also, searching of Document is done depending upon the
Knowledge Types.
3.2 Concept in detail with example:
a) Consider following HTML file as Input: In this example,
one of the class of Javadocs , named void AbstractAction is
taken into consideration.
Figure 2: Example of the API Reference Document
b) Parsing of HTML document is done using following
technique:
In this technique, initially all HTML Tags are fetched from
4. International Journal of Computer Applications Technology and Research
Volume 3– Issue 7, 451 - 456, 2014
www.ijcat.com 454
the HTML Page.
After fetching all the HTML Tags, the Tags having the
required descriptions are observed.
And then the required Text is retrieved from the all HTML
Tags.
For Example: To get the Description of Class , all HTML
Tags are observed.
And then Pattern is detected as: Description of the Class is
present under div tag having identity as <div class="block">.
But here, there will be multiple div tags in one HTML page
with same class=”block”.
So again, pattern is observed in all HTML pages of Java API
Reference Documents as: Description of the Class is always
present in the First tag having class=”block”.
And then Text is retrieved from this tag.
So after this First div tag, multiple div tags with class=
“block” may be present.
c) After separating the tags having the description, next step is
to generate Knowledge Types for the given API Reference
Document. Here description of one API elements of the API
Reference Document may fall under more than one
Knowledge Types.
To generate Knowledge Types, identity of each Knowledge
Type is observed.
For Example:
For generating the Functionality and Behavior Knowledge
Type, Description of API Elements is considered as it is.
Because Functionality and Behavior Knowledge Type
describes functionality and features of API. And also specifies
what happens when the API is used.
For above class, Following Knowledge Types are generated:
For Description of class: External References, Environment,
Functionality and Behavior.
For Constructor of class: Functionality and Behavior.
For Fields, Methods of class: Control Flow, Functionality and
Behavior.
d) After generating the Knowledge Types, depending upon
the Knowledge Types generated for class the given Java API
Reference Document is classified into respective Knowledge
Type category.
So here for above example of AbstractAction , this document
will be classified in External References, Environment
,Functionality and Behavior.
e) Knowledge Types generated will be used for searching.
For above example of AbstractAction , user can search for
“Code Example of AbstractAction” for getting Example of
AbstractAction.
3.3 Algorithms
3.3.1 Parsing of HTML Files to fetch Description:
a) Initially, one of the Javadocs pages that is Java API
Reference Document which is to be processed is taken as
input.
b) Source code of the Javadocs is HTML tags and hence the
actual input to the first step is HTML and JavaScript tags.
c) After taking HTML tags as input, the next step is to parse
the HTML tags to fetch the tags having description.
d) So, to fetch the description of API element from the current
page using Pattern Finding.
3.3.2 For Generation of Knowledge Types for the
Description of API elements:
a) After fetching the description of API elements in second
step, next step is to process this description.
b) To process the description of the API elements, the patterns
of the Descriptions are observed, that is whether the
descriptions are having some common words in them or they
are starting with same words or having some common format.
c) So, after finding some common patterns in the descriptions,
the Knowledge Types are generated.
That is description will be classified to the appropriate
Knowledge Type. For Example, Description of all API
elements will have common Knowledge Type as
Functionality and Behaviour.
3.3.3 For classification of Java API Reference
Document:
a) Here the Knowledge Types generated for Class are
observed first.
b) Depending on the Knowledge Types generated for Class ,
the document will be classified into the respective
Knowledge Types.
3.3.4 Searching using Knowledge Types
a) After classification of Documentation in above step, the
searching will be performed.
b) Here depending upon query given by user, the query will
be parsed and the searching of the query will be done
depending upon the Knowledge Types.
4. RESULTS
4.1 Data Set
The Data Set for the system are set of API Reference
Documents. The jdk-7u51-apidocs.zip file contains the set of
API Reference Documents for Java. The above said file can
be obtained by using following link:
http://www.oracle.com/technetwork/java/javase/documentatio
n/java-se-7-doc-download-435117.html
4.2 Results
4.2.1 Results of Classification:
Consider the API Reference Documentation in Figure 2 for
Class AbstractAction.
For API Reference Document in Figure 2, the document will
be classified as follows:
Table 1: Results obtained for AbstractAction and for
other Classes
5. International Journal of Computer Applications Technology and Research
Volume 3– Issue 7, 451 - 456, 2014
www.ijcat.com 455
4.2.2 Results of Searching:
When user wish to search query like “Code Examples of
AbstractAction” the results will show that respective
document.
So depending upon user requirement the Searching is done.
4.2.3 Performance Measure:
Following table shows Performance Measures:
Table 2: Performance Measure for different documents
tested by system
Sr.
No. Class Name
Knowledge
Types
generated Of
Class
Classification
of Document
Into Following
Knowledge
Types
1
AbstractActio
n (Java
Platform SE 7
)
External
References,
Environment,
Functionaliy
and Behavior
External
References
,Environment
,Functionaliy
and Behavior
2
AbstractAnno
tationValueVi
sitor6 (Java
Platform SE 7
)
Environment,
Functionality
and Behavior
Environment,
Functionality
and Behavior
3
BoxLayout
(Java Platform
SE 7 )
External
References,
Environment,
Control Flow,
Functionality
and Behavior
External
References,
Environment,
Control Flow,
Functionality
and Behavior
4
ButtonGroup
(Java Platform
SE 7 )
External
ReferencesEn
vironmentFun
ctionality and
Behavior
External
ReferencesEnvir
onmentFunction
ality and
Behavior
5
CellRenderer
Pane (Java
Platform SE 7
)
External
ReferencesCo
de
ExampleEnvir
onmentFuncti
onality and
Behavior
External
ReferencesCode
ExampleEnviro
nmentFunctiona
lity and
Behavior
6
DefaultButton
Model (Java
Platform SE 7
)
External
ReferencesEn
vironmentFun
ctionality and
Behavior
External
ReferencesEnvir
onmentFunction
ality and
Behavior
7
DefaultListCe
llRenderer
(Java Platform
SE 7 )
External
ReferencesEn
vironmentCon
trol
FlowFunction
ality and
Behavior
External
ReferencesEnvir
onmentControl
FlowFunctionali
ty and Behavior
8
DefaultRowS
orter (Java
Platform SE 7
)
External
ReferencesCo
ntrol
FlowFunction
ality and
Behavior
External
ReferencesCont
rol
FlowFunctionali
ty and Behavior
Java API
Reference
Document
Tested
Knowledge
Types
Expected
Knowledge
Types
Generated Precision
AbstractAction
(Java Platform
SE 7 ) 4 4 1.00
AbstractAnnotat
ionValueVisitor
6 (Java Platform
SE 7 ) 2 2 1.00
BoxLayout
(Java Platform
SE 7 ) 4 4 1.00
ButtonGroup
(Java Platform
SE 7 ) 4 3 0.75
CellRendererPa
ne (Java
Platform SE 7 ) 6 5 0.83
DefaultButtonM
odel (Java
Platform SE 7 ) 3 3 1.00
DefaultListCell
Renderer (Java
Platform SE 7 ) 5 4 0.80
DefaultRowSort
er (Java
Platform SE 7 ) 3 3 1.00
GroupLayout
(Java Platform
SE 7 ) 3 3 1.00
ImageIcon (Java
Platform SE 7 ) 4 3 0.75
6. International Journal of Computer Applications Technology and Research
Volume 3– Issue 7, 451 - 456, 2014
www.ijcat.com 456
5. CONCLUSION AND FUTURE WORK
API’s are used as interface for using predefine functions,
packages, classes etc. Developers read API reference
documentation to learn how to use the API and answer
specific questions they have during development tasks. Thus
API Reference Documentation provides guide to user for
referring to API. API Reference Documentation contains
description of API elements; this description will be analyzed
for generating Knowledge. This system focuses on
classification of description of API elements into different
Knowledge Types for Java API Reference Documentation.
After generating Knowledge Types, classification of the Java
API Reference Document is done according to Knowledge
Types. Java API Reference Document then can be searched
using the Knowledge Types. Other Types of Documentation
like MSDN, Documentation of Python can be considered for
parsing and processing further.
6. REFERENCES
[1] A. J. Ko, R. DeLine, and G. Venolia, “Information needs
in collocated software development teams,” in
Proceedings of the 29th International Conference on
Software Engineering, 2007, pp. 344–353.
[2] D. Hou, K. Wong, and J. H. Hoover, “What can
programmer questions tell us about frameworks?” in
Proceedings of the 13th International Workshop on
Program Comprehension, 2005, pp. 87–96.
[3] D. Kirk, M. Roper, and M. Wood, “Identifying and
addressing problems in object-oriented framework
reuse,” Empirical Software Engineering, vol. 12, pp.
243–274, June 2007.
[4] J. D. Herbsleb and E. Kuwana, “Preserving knowledge in
design projects: what designers need to know,” in
Proceedings of the Joint INTERACT ’93 and CHI ’93
Conferences on Human Factors in Computing Systems,
1993, pp. 7–14.
[5] J. Mylopoulos, A. Borgida, and E. Yu, “Representing
software engineering knowledge,” Automated Software
Engineering, vol. 4, no. 3, pp. 291–317, 1997.
[6] J. Nykaza, R. Messinger, F. Boehme, C. L. Norman, M.
Mace,and M. Gordon, “What programmers really want:
Results of a needs assessment for SDK documentation,”
in Proceedings of the 20th Annual ACM SIGDOC
International Conference on Computer Documentation,
2002, pp. 133–141.
[7] J. Sillito, G. C. Murphy, and K. D. Volder, “Asking and
answering questions during a programming change task,”
IEEE Transactions on Software Engineering, vol. 34, no.
4, pp. 434–451, July-August 2008.
[8] L. Shi, H. Zhong, T. Xie, and M. Li, “An empirical study
on evolution of API documentation,” in Proceedings of
the Conference on Fundamental Approaches to Software
Engineering, 2011, pp. 416–431.
[9] M. P. Robillard and R. DeLine, “A field study of API
learning obstacles,” Empirical Software Engineering,
vol. 16, no. 6, pp. 703–732, 2011.
[10] S. Y. Jeong, Y. Xie, J. Beaton, B. A. Myers, J. Stylos, R.
Ehret, J. Karstens, A. Efeoglu, and D. K. Busse,
“Improving documentation for eSOA APIs through user
studies,” in Proc. 2nd Int’l Symp. on End-User
Development, ser. LNCS, vol. 5435. Springer,2009, pp.
86–105.
[11] Walid Maalej and Martin P. Robillard , Patterns of
Knowledge in API Reference Documentation, IEEE
TRANSACTIONS ON SOFTWARE ENGINEERING,
VOL. 39, NO. X, XXXXXXX 2013.