The document contains a JNTU online examination for the subject Ooad (Object Oriented Analysis and Design). It has 30 multiple choice questions related to use case diagrams, activity diagrams, state machine diagrams, and other UML diagrams. Some of the questions ask about basic concepts like actors, use cases, relationships between diagrams. Other questions test understanding of specific diagram elements, modeling techniques, and how different diagrams are used.
The document contains questions for an online examination for the subject JNTU OOOAD (Mid 2). It includes 50 multiple choice questions related to use case diagrams, activity diagrams, and modeling system behavior and requirements using UML diagrams. The questions cover concepts such as use cases, actors, relationships between use cases, modeling system behavior, activity states, transitions, forking/joining in activity diagrams, and forward/reverse engineering.
The document contains multiple choice questions about use case diagrams, the unified process, object-oriented analysis and design principles, and UML. Some key points covered are:
- A use case diagram models the behavior of a system and shows relationships like association, generalization, and dependency.
- The unified process has phases like inception, elaboration, construction, and transition.
- Object-oriented principles include encapsulation, inheritance, polymorphism, and abstraction.
- UML diagrams like class and use case diagrams are used in analysis and design.
Automatic analysis of smoothing techniques by simulation model based real tim...ijesajournal
The pivotal research work that has been carried out and described in this literature acknowledges the
importance of various smoothing techniques for processing 3D human faces from 2.5D range face images.
The smoothing techniques have been developed and implemented using MATLAB-Simulink for real time
processing in embedded system. In addition, the significance of smoothed 2.5D range image over original
face range image has been discovered as well as its time complexity has also been reported with array of
experiments. The variations in time complexities are also accomplished using different optimization levels
and execution modes. A set of filtering techniques such as, Max filter, Min filter, Median filter, Mean filter,
Mid-point filter and Gaussian filter, have been designed and illustrated using Simulink model. The model
takes depth face image (i.e. the range face image) as input in real time and presents the improvement over
original face images. In the design flow, the performance of every block has also been characterized by
range face images from Frav3D, GavabDB, and Bosphorus databases. In the experimental section of this
research article, an array of performance analysis for these smoothing techniques with variation of
frameworks is explained.
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERScsandit
Currently, there is a growing interest from the scientific and/or industrial community in respect
to methods that offer solutions to the problem of fiducial points detection in human faces. Some
methods use the SVM for classification, but we observed that some formulations of optimization
problems were not discussed. In this article, we propose to investigate the performance of
mathematical formulation C-SVC when applied in fiducial point detection system. Futhermore,
we explore new parameters for training the proposed system. The performance of the proposed
system is evaluated in a fiducial points detection problem. The results demonstrate that the
method is competitive.
The document is a past exam paper from the University of Pune for the subject "Advanced Operating System". It contains 12 questions divided into two sections. The questions cover topics related to operating system concepts such as processes, memory management, file systems, I/O systems and more. Some key questions ask students to explain process management calls like fork(), compare kernel architectures, describe mailboxes in multitasking OS, explain disc caching and block device operations, compare elevator algorithms, and describe the virtual file system (VFS) and file system calls.
FREE- REFERENCE IMAGE QUALITY ASSESSMENT FRAMEWORK USING METRICS FUSION AND D...sipij
The document presents a new no-reference image quality assessment framework that uses metrics fusion and dimensionality reduction. It extracts features from three existing no-reference metrics operating in different domains (DCT, DWT, spatial). Singular value decomposition is used to select the most relevant features, which are then input to a relevance vector machine to predict overall quality scores. Experimental results on two databases show the proposed method performs well in terms of correlation, monotonicity and accuracy for both single-database and cross-database evaluations.
Image restoration based on morphological operationsijcseit
This document discusses image restoration using morphological operations. It begins with an abstract describing mathematical morphology and its applications to tasks like noise suppression, feature extraction, and image restoration. It then covers 6 morphological operations (erosion, dilation, opening, closing, boundary extraction, and region filling) and provides mathematical definitions and illustrations of their effects. Examples of applying these operations to grayscale images using different structuring element shapes are shown. The document concludes that morphological operations are effective for image restoration by applying dilation and erosion with the same factor to remove noise while retaining object shapes.
The document describes a C++ program called ListMyPolygons that allows users to input polygon details, store the polygon vertices in matrices, and perform transformations on the polygons. It discusses the design of the matrix, polygon, and user interface classes. The matrix class stores vertex coordinates and supports operations for transformations. Polygon classes are derived from an abstract base class and store vertex matrices. The user interface allows inputting polygons, reviewing/modifying them via transformations, and deleting polygons. While the program works for most polygons, determining regular polygons from vertices proved unreliable.
The document contains questions for an online examination for the subject JNTU OOOAD (Mid 2). It includes 50 multiple choice questions related to use case diagrams, activity diagrams, and modeling system behavior and requirements using UML diagrams. The questions cover concepts such as use cases, actors, relationships between use cases, modeling system behavior, activity states, transitions, forking/joining in activity diagrams, and forward/reverse engineering.
The document contains multiple choice questions about use case diagrams, the unified process, object-oriented analysis and design principles, and UML. Some key points covered are:
- A use case diagram models the behavior of a system and shows relationships like association, generalization, and dependency.
- The unified process has phases like inception, elaboration, construction, and transition.
- Object-oriented principles include encapsulation, inheritance, polymorphism, and abstraction.
- UML diagrams like class and use case diagrams are used in analysis and design.
Automatic analysis of smoothing techniques by simulation model based real tim...ijesajournal
The pivotal research work that has been carried out and described in this literature acknowledges the
importance of various smoothing techniques for processing 3D human faces from 2.5D range face images.
The smoothing techniques have been developed and implemented using MATLAB-Simulink for real time
processing in embedded system. In addition, the significance of smoothed 2.5D range image over original
face range image has been discovered as well as its time complexity has also been reported with array of
experiments. The variations in time complexities are also accomplished using different optimization levels
and execution modes. A set of filtering techniques such as, Max filter, Min filter, Median filter, Mean filter,
Mid-point filter and Gaussian filter, have been designed and illustrated using Simulink model. The model
takes depth face image (i.e. the range face image) as input in real time and presents the improvement over
original face images. In the design flow, the performance of every block has also been characterized by
range face images from Frav3D, GavabDB, and Bosphorus databases. In the experimental section of this
research article, an array of performance analysis for these smoothing techniques with variation of
frameworks is explained.
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERScsandit
Currently, there is a growing interest from the scientific and/or industrial community in respect
to methods that offer solutions to the problem of fiducial points detection in human faces. Some
methods use the SVM for classification, but we observed that some formulations of optimization
problems were not discussed. In this article, we propose to investigate the performance of
mathematical formulation C-SVC when applied in fiducial point detection system. Futhermore,
we explore new parameters for training the proposed system. The performance of the proposed
system is evaluated in a fiducial points detection problem. The results demonstrate that the
method is competitive.
The document is a past exam paper from the University of Pune for the subject "Advanced Operating System". It contains 12 questions divided into two sections. The questions cover topics related to operating system concepts such as processes, memory management, file systems, I/O systems and more. Some key questions ask students to explain process management calls like fork(), compare kernel architectures, describe mailboxes in multitasking OS, explain disc caching and block device operations, compare elevator algorithms, and describe the virtual file system (VFS) and file system calls.
FREE- REFERENCE IMAGE QUALITY ASSESSMENT FRAMEWORK USING METRICS FUSION AND D...sipij
The document presents a new no-reference image quality assessment framework that uses metrics fusion and dimensionality reduction. It extracts features from three existing no-reference metrics operating in different domains (DCT, DWT, spatial). Singular value decomposition is used to select the most relevant features, which are then input to a relevance vector machine to predict overall quality scores. Experimental results on two databases show the proposed method performs well in terms of correlation, monotonicity and accuracy for both single-database and cross-database evaluations.
Image restoration based on morphological operationsijcseit
This document discusses image restoration using morphological operations. It begins with an abstract describing mathematical morphology and its applications to tasks like noise suppression, feature extraction, and image restoration. It then covers 6 morphological operations (erosion, dilation, opening, closing, boundary extraction, and region filling) and provides mathematical definitions and illustrations of their effects. Examples of applying these operations to grayscale images using different structuring element shapes are shown. The document concludes that morphological operations are effective for image restoration by applying dilation and erosion with the same factor to remove noise while retaining object shapes.
The document describes a C++ program called ListMyPolygons that allows users to input polygon details, store the polygon vertices in matrices, and perform transformations on the polygons. It discusses the design of the matrix, polygon, and user interface classes. The matrix class stores vertex coordinates and supports operations for transformations. Polygon classes are derived from an abstract base class and store vertex matrices. The user interface allows inputting polygons, reviewing/modifying them via transformations, and deleting polygons. While the program works for most polygons, determining regular polygons from vertices proved unreliable.
Face Alignment Using Active Shape Model And Support Vector MachineCSCJournals
The document proposes improvements to the classical Active Shape Model (ASM) algorithm for face alignment. The improvements include: 1) Combining Sobel filtering and 2D profiles to build texture models, 2) Applying Canny edge detection for enhancement, 3) Using Support Vector Machines (SVM) to classify landmarks for more accurate localization, and 4) Automatically adjusting 2D profile lengths based on image size. Experimental results on two face databases show the proposed ASM-SVM method achieves better alignment accuracy than the classical ASM and other methods.
International Journal of Computational Engineering Research(IJCER)ijceronline
This document summarizes a research paper on a face feature recognition system using central moments. The system involves three main steps:
1. Extracting shape features of the face (eyes, nose, mouth) using image processing techniques.
2. Computing central moment values to represent the shape features of each facial component.
3. Recognizing faces by comparing the central moment values of input faces to those stored in a database.
The system was tested on 30 images with 10 used for training and 10 for testing. Results showed the system could successfully identify faces by matching their central moment-based features to those in the database.
Two-dimensional Block of Spatial Convolution Algorithm and SimulationCSCJournals
This paper proposes an algorithm based on sub image-segmentation strategy. The proposed scheme divides a grayscale image into overlapped 6×6 blocks each of which is segmented into four small 3x3 non-overlapped sub-images. A new spatial approach for efficiently computing 2-dimensional linear convolution or cross-correlation between suitable flipped and fixed filter coefficients (sub image for cross-correlation) and corresponding input sub image is presented. Computation of convolution is iterated vertically and horizontally for each of the four input sub-images. The convolution outputs of these four sub-images are processed to be converted from 6×6 arrays to 4×4 arrays so that the core of the original image is reproduced. The present algorithm proposes a simplified processing technique based on a particular arrangement of the input samples, spatial filtering and small sub-images. This results in reducing the computational complexity as compared with other well known FFT-based techniques. This algorithm lends itself for partitioned small sub-images, local image spatial filtering and noise reduction. The effectiveness of the algorithm is demonstrated through some simulation examples.
In stereo vision, the epipolar geometry is the intrinsic projective geometry between the two views. The
essential and fundamental matrices relate corresponding points in stereo images. The essential matrix
describes the geometry when the used cameras are calibrated, and the fundamental matrix expresses the
geometry when the cameras are uncalibrated. Since the nineties, researchers devoted a lot of effort to
estimate the fundamental matrix. Although it is a landmark of computer vision, in the current work, three
derivations of the essential and fundamental matrices have been revised. The Longuet-Higgins' derivation
of the essential matrix where he draws a mapping between the position vectors of a 3D point; however, the
one-to-one feature of that mapping is lost when he changed it to a relation between the image points. In the
two other derivations, we demonstrate that the authors established a mapping between the image points
through the misuse of mathematics.
ABSTRACT: a rigorous work on static and dynamic appearance based classification systems for face is on but, it is proving to be a challenging task for researchers to design a proper system since human face is complex one. Decades of work was and is focussed on how to classify a face and on how to increase the rate of classification but, little attention was paid to overcome redundancy in image classification. This paper presents a novel idea which focuses on redundancy check and its elimination. The paper after drawing inferences from previous work gives out a novel idea for exact face classification and elimination of redundancy.
This document provides a tutorial for using the educational version of RISA-2D software to analyze 2D structures. It walks through analyzing a sample truss structure in 14 steps, including drawing the model geometry, applying loads and boundary conditions, performing the analysis, and reviewing the results. The tutorial demonstrates how to model a simple 2-member truss, apply a 9 kip vertical load at one joint, fix another joint, and analyze the truss to obtain member forces and reactions. Graphical displays are provided throughout to illustrate each step of the process.
This document discusses two methods for graphing piecewise-defined functions on a graphing calculator: the division method and the multiplication method. The division method graphs each section of the function separately, while the multiplication method can graph the entire function as one statement. The multiplication method connects the separate sections together when graphed in connected mode, while the division method does not connect the sections. Both methods assign a value of 0 when the input is not in the defined interval, but this results in different graph appearances depending on whether the sections are connected or not connected.
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONijcsit
This document proposes a new method called Symmetrical Weighted 2D Principal Component Analysis (SW2DPCA) for facial expression recognition. SW2DPCA aims to reduce the dimensionality of the feature space extracted from face images using Gabor filters, while removing redundant information. It does this by decomposing the training images into odd and even symmetrical components, and applying weighted PCA to equalize the variance of principal components. The method is tested on the JAFFE database, achieving a recognition accuracy of 95.24% - higher than the 2DPCA baseline method.
This document describes methods for automating Mekko Graphics charts in PowerPoint using VBA or C#. It provides the interface definitions and code samples for checking if a shape is a Mekko chart, opening and editing charts, getting and setting chart data, and refreshing charts. VBA and C# code samples are given to demonstrate how to select a chart and refresh it using the automation methods.
This document discusses various shape features that can be used for machine vision and image segmentation. It covers thresholding techniques, identifying object boundaries using chain codes and Fourier descriptors, and describing regions using basic descriptors like area and perimeter or moment invariants. Segmentation is described as an important but difficult task, and thresholding, discontinuities and region similarity are presented as common segmentation approaches. Examples are provided to illustrate different shape feature extraction methods.
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// MonkeyBusiness é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
www.monkeybusiness.com.br
www.macacosmebloguem.com.br
www.facebook.com/mkbusiness
www.twitter.com/mkbusiness
Desfiles, casamentos estranhos e outras curiosidadesMonkeyBusiness
Apresentação com dados, informações e algumas curiosidades do setor de moda e vestuário.
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// Monkey Business é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
A empresa anunciou um novo produto que combina hardware e software para fornecer uma solução completa para clientes. O produto oferece recursos avançados de inteligência artificial e aprendizado de máquina para automatizar tarefas complexas. Analistas esperam que o produto tenha um bom desempenho no mercado e gere receita significativa para a empresa no próximo ano fiscal.
Apresentação com a história, dados, números e estatísticas do Campeonato Paulista de Futebol e tudo o que aconteceu na 110ª edição de 2012.
Direção de Criação: Alexandre Franzolim
Direção de Arte: Denis Dias
Roteiro: Thiago Duran
Design: Denis Dias, Thales Dias, Tainá Freitas, Ana Carolina Donegá
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// Monkey Business é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
A empresa de tecnologia anunciou um novo sistema operacional para computadores pessoais. O novo sistema é mais rápido e seguro que o anterior, com melhorias na interface do usuário e recursos adicionais de privacidade. A nova versão estará disponível para download gratuito a partir do final do ano.
Save The Day - Cartão de Feliz Ano Novo 2011MonkeyBusiness
As apresentações caíram em mãos erradas mas o macaco magenta salva o dia no cartão de ano novo de 2010 da MonkeyBusiness.
Apresentação feita pela MonkeyBusiness
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// MonkeyBusiness é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
Postado aqui por MonkeyBusiness - Nós fazemos a sua apresentação:
www.monkeybusiness.com.br
www.macacosmebloguem.com.br
www.facebook.com/mkbusiness
www.twitter.com/mkbusiness
A TellFree é uma operadora de comunicações multimídia que oferece soluções completas de comunicação unificada, como e-mail, mensagens instantâneas e telefonia IP. Ela atua nos mercados corporativo, varejo e wholesale, oferecendo produtos como Business Solution, Business Point e Business Centrex. Suas soluções visam proporcionar comunicação simplificada e segurança aos clientes.
A Campus Party Brasil 2011 reuniu mais de 4700 campuseiros acampados e 95 mil visitantes. O evento ofereceu mais de 600 horas de atividades em quatro zonas temáticas: Inovação, Ciência, Criatividade e Entretenimento Digital. Palestrantes como Al Gore, Tim Berners-Lee e Steve Wozniak compartilharam suas experiências. O evento também promoveu a cultura empreendedora com competições e prêmios para novos projetos.
Apresentação do Fabio Seixas, CEO e criador do Camiseteria no TEDxFIAP 2011.
Apresentação feita pela MonkeyBusiness
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// MonkeyBusiness é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
Postado aqui por MonkeyBusiness - Nós fazemos a sua apresentação:
www.monkeybusiness.com.br
www.macacosmebloguem.com.br
www.facebook.com/mkbusiness
www.twitter.com/mkbusiness
Apresentação para o programa de treinees da Vivo 2011
Apresentação feita pela MonkeyBusiness
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// MonkeyBusiness é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
Postado aqui por MonkeyBusiness - Nós fazemos a sua apresentação:
www.monkeybusiness.com.br
www.macacosmebloguem.com.br
www.facebook.com/mkbusiness
www.twitter.com/mkbusiness
A União Europeia está enfrentando desafios sem precedentes devido à pandemia de COVID-19 e à invasão russa da Ucrânia. Isso destacou a necessidade de fortalecer a autonomia estratégica da UE em áreas como a segurança, defesa e energia. A Comissão Europeia propôs novas medidas para tornar a UE menos dependente de outros países nestas áreas vitais.
O documento discute a produção diária de lixo e emissões de gases de efeito estufa no planeta, com mais de 5 milhões de toneladas de lixo residencial e 90 milhões de toneladas de gases de efeito estufa. Ele também aborda soluções como geração de energia renovável, eficiência energética, novas tecnologias e educação ambiental. Finalmente, levanta premissas sobre as energias e modelo de desenvolvimento econômico dominantes e a relação da sociedade com os recursos naturais até 2050
Face Alignment Using Active Shape Model And Support Vector MachineCSCJournals
The document proposes improvements to the classical Active Shape Model (ASM) algorithm for face alignment. The improvements include: 1) Combining Sobel filtering and 2D profiles to build texture models, 2) Applying Canny edge detection for enhancement, 3) Using Support Vector Machines (SVM) to classify landmarks for more accurate localization, and 4) Automatically adjusting 2D profile lengths based on image size. Experimental results on two face databases show the proposed ASM-SVM method achieves better alignment accuracy than the classical ASM and other methods.
International Journal of Computational Engineering Research(IJCER)ijceronline
This document summarizes a research paper on a face feature recognition system using central moments. The system involves three main steps:
1. Extracting shape features of the face (eyes, nose, mouth) using image processing techniques.
2. Computing central moment values to represent the shape features of each facial component.
3. Recognizing faces by comparing the central moment values of input faces to those stored in a database.
The system was tested on 30 images with 10 used for training and 10 for testing. Results showed the system could successfully identify faces by matching their central moment-based features to those in the database.
Two-dimensional Block of Spatial Convolution Algorithm and SimulationCSCJournals
This paper proposes an algorithm based on sub image-segmentation strategy. The proposed scheme divides a grayscale image into overlapped 6×6 blocks each of which is segmented into four small 3x3 non-overlapped sub-images. A new spatial approach for efficiently computing 2-dimensional linear convolution or cross-correlation between suitable flipped and fixed filter coefficients (sub image for cross-correlation) and corresponding input sub image is presented. Computation of convolution is iterated vertically and horizontally for each of the four input sub-images. The convolution outputs of these four sub-images are processed to be converted from 6×6 arrays to 4×4 arrays so that the core of the original image is reproduced. The present algorithm proposes a simplified processing technique based on a particular arrangement of the input samples, spatial filtering and small sub-images. This results in reducing the computational complexity as compared with other well known FFT-based techniques. This algorithm lends itself for partitioned small sub-images, local image spatial filtering and noise reduction. The effectiveness of the algorithm is demonstrated through some simulation examples.
In stereo vision, the epipolar geometry is the intrinsic projective geometry between the two views. The
essential and fundamental matrices relate corresponding points in stereo images. The essential matrix
describes the geometry when the used cameras are calibrated, and the fundamental matrix expresses the
geometry when the cameras are uncalibrated. Since the nineties, researchers devoted a lot of effort to
estimate the fundamental matrix. Although it is a landmark of computer vision, in the current work, three
derivations of the essential and fundamental matrices have been revised. The Longuet-Higgins' derivation
of the essential matrix where he draws a mapping between the position vectors of a 3D point; however, the
one-to-one feature of that mapping is lost when he changed it to a relation between the image points. In the
two other derivations, we demonstrate that the authors established a mapping between the image points
through the misuse of mathematics.
ABSTRACT: a rigorous work on static and dynamic appearance based classification systems for face is on but, it is proving to be a challenging task for researchers to design a proper system since human face is complex one. Decades of work was and is focussed on how to classify a face and on how to increase the rate of classification but, little attention was paid to overcome redundancy in image classification. This paper presents a novel idea which focuses on redundancy check and its elimination. The paper after drawing inferences from previous work gives out a novel idea for exact face classification and elimination of redundancy.
This document provides a tutorial for using the educational version of RISA-2D software to analyze 2D structures. It walks through analyzing a sample truss structure in 14 steps, including drawing the model geometry, applying loads and boundary conditions, performing the analysis, and reviewing the results. The tutorial demonstrates how to model a simple 2-member truss, apply a 9 kip vertical load at one joint, fix another joint, and analyze the truss to obtain member forces and reactions. Graphical displays are provided throughout to illustrate each step of the process.
This document discusses two methods for graphing piecewise-defined functions on a graphing calculator: the division method and the multiplication method. The division method graphs each section of the function separately, while the multiplication method can graph the entire function as one statement. The multiplication method connects the separate sections together when graphed in connected mode, while the division method does not connect the sections. Both methods assign a value of 0 when the input is not in the defined interval, but this results in different graph appearances depending on whether the sections are connected or not connected.
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONijcsit
This document proposes a new method called Symmetrical Weighted 2D Principal Component Analysis (SW2DPCA) for facial expression recognition. SW2DPCA aims to reduce the dimensionality of the feature space extracted from face images using Gabor filters, while removing redundant information. It does this by decomposing the training images into odd and even symmetrical components, and applying weighted PCA to equalize the variance of principal components. The method is tested on the JAFFE database, achieving a recognition accuracy of 95.24% - higher than the 2DPCA baseline method.
This document describes methods for automating Mekko Graphics charts in PowerPoint using VBA or C#. It provides the interface definitions and code samples for checking if a shape is a Mekko chart, opening and editing charts, getting and setting chart data, and refreshing charts. VBA and C# code samples are given to demonstrate how to select a chart and refresh it using the automation methods.
This document discusses various shape features that can be used for machine vision and image segmentation. It covers thresholding techniques, identifying object boundaries using chain codes and Fourier descriptors, and describing regions using basic descriptors like area and perimeter or moment invariants. Segmentation is described as an important but difficult task, and thresholding, discontinuities and region similarity are presented as common segmentation approaches. Examples are provided to illustrate different shape feature extraction methods.
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// MonkeyBusiness é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
www.monkeybusiness.com.br
www.macacosmebloguem.com.br
www.facebook.com/mkbusiness
www.twitter.com/mkbusiness
Desfiles, casamentos estranhos e outras curiosidadesMonkeyBusiness
Apresentação com dados, informações e algumas curiosidades do setor de moda e vestuário.
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// Monkey Business é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
A empresa anunciou um novo produto que combina hardware e software para fornecer uma solução completa para clientes. O produto oferece recursos avançados de inteligência artificial e aprendizado de máquina para automatizar tarefas complexas. Analistas esperam que o produto tenha um bom desempenho no mercado e gere receita significativa para a empresa no próximo ano fiscal.
Apresentação com a história, dados, números e estatísticas do Campeonato Paulista de Futebol e tudo o que aconteceu na 110ª edição de 2012.
Direção de Criação: Alexandre Franzolim
Direção de Arte: Denis Dias
Roteiro: Thiago Duran
Design: Denis Dias, Thales Dias, Tainá Freitas, Ana Carolina Donegá
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// Monkey Business é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
A empresa de tecnologia anunciou um novo sistema operacional para computadores pessoais. O novo sistema é mais rápido e seguro que o anterior, com melhorias na interface do usuário e recursos adicionais de privacidade. A nova versão estará disponível para download gratuito a partir do final do ano.
Save The Day - Cartão de Feliz Ano Novo 2011MonkeyBusiness
As apresentações caíram em mãos erradas mas o macaco magenta salva o dia no cartão de ano novo de 2010 da MonkeyBusiness.
Apresentação feita pela MonkeyBusiness
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// MonkeyBusiness é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
Postado aqui por MonkeyBusiness - Nós fazemos a sua apresentação:
www.monkeybusiness.com.br
www.macacosmebloguem.com.br
www.facebook.com/mkbusiness
www.twitter.com/mkbusiness
A TellFree é uma operadora de comunicações multimídia que oferece soluções completas de comunicação unificada, como e-mail, mensagens instantâneas e telefonia IP. Ela atua nos mercados corporativo, varejo e wholesale, oferecendo produtos como Business Solution, Business Point e Business Centrex. Suas soluções visam proporcionar comunicação simplificada e segurança aos clientes.
A Campus Party Brasil 2011 reuniu mais de 4700 campuseiros acampados e 95 mil visitantes. O evento ofereceu mais de 600 horas de atividades em quatro zonas temáticas: Inovação, Ciência, Criatividade e Entretenimento Digital. Palestrantes como Al Gore, Tim Berners-Lee e Steve Wozniak compartilharam suas experiências. O evento também promoveu a cultura empreendedora com competições e prêmios para novos projetos.
Apresentação do Fabio Seixas, CEO e criador do Camiseteria no TEDxFIAP 2011.
Apresentação feita pela MonkeyBusiness
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// MonkeyBusiness é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
Postado aqui por MonkeyBusiness - Nós fazemos a sua apresentação:
www.monkeybusiness.com.br
www.macacosmebloguem.com.br
www.facebook.com/mkbusiness
www.twitter.com/mkbusiness
Apresentação para o programa de treinees da Vivo 2011
Apresentação feita pela MonkeyBusiness
// MonkeyBusiness is an brazilian agency that is specialized in presentations. All our energy is focused on creating memorable slides, which hold the attention of your audience and express your ideas.
// MonkeyBusiness é uma agência especializada em apresentações. Toda nossa energia é focada em criar slides inesquecíveis, que prendem a atenção do seu público e vendem suas idéias.
Postado aqui por MonkeyBusiness - Nós fazemos a sua apresentação:
www.monkeybusiness.com.br
www.macacosmebloguem.com.br
www.facebook.com/mkbusiness
www.twitter.com/mkbusiness
A União Europeia está enfrentando desafios sem precedentes devido à pandemia de COVID-19 e à invasão russa da Ucrânia. Isso destacou a necessidade de fortalecer a autonomia estratégica da UE em áreas como a segurança, defesa e energia. A Comissão Europeia propôs novas medidas para tornar a UE menos dependente de outros países nestas áreas vitais.
O documento discute a produção diária de lixo e emissões de gases de efeito estufa no planeta, com mais de 5 milhões de toneladas de lixo residencial e 90 milhões de toneladas de gases de efeito estufa. Ele também aborda soluções como geração de energia renovável, eficiência energética, novas tecnologias e educação ambiental. Finalmente, levanta premissas sobre as energias e modelo de desenvolvimento econômico dominantes e a relação da sociedade com os recursos naturais até 2050
A Yellow Monkey é uma agência de publicidade especializada em atender pequenos e médios empreendedores de forma criativa e rápida. Sua missão é ajudar esses clientes a incrementarem seus negócios através de comunicação objetiva. A agência oferece serviços completos de planejamento e criação de campanhas de marketing digital, sites, identidade visual, promoções e comunicação tradicional.
The document contains questions about object-oriented analysis and design (OOAD) concepts and UML diagrams. It asks about topics like design subsystems, use case design, identifying design elements, distribution mechanisms, and sequence diagrams. The questions cover activities in OOAD workflows like use case realization refinement, identifying design mechanisms, and describing distribution.
This document contains a quiz with multiple choice questions about software engineering concepts like software types, frameworks, models, and methodologies. It covers topics like software definition, categories, system software examples, software engineering principles, process models (waterfall, RAD, agile), requirements engineering tasks, software design concepts (architecture, interfaces, components), testing levels, and validation vs verification. The questions are at a foundational level, testing basic understanding of key SE terms and ideas.
What are the diagrams defined in the UML Standard. Give a one or two.pdffedosys
There are two main categories of UML diagrams: structural diagrams and behavioral diagrams. Structural diagrams depict the static aspects of a system and include class, object, deployment, and component diagrams. Class diagrams show classes, attributes, methods, and relationships, while object diagrams emphasize object attributes and relationships. Deployment diagrams focus on component topology and component diagrams on component relationships. Behavioral diagrams illustrate dynamic aspects and change with conditions. They include use case diagrams for actors, use cases, and relationships; sequence diagrams for event sequences; collaboration diagrams for communication (similar to sequence diagrams); statechart diagrams for system responses to factors; and activity diagrams for system workflow.
Object Oriented Analysis and Design one marks Q & Aeeducations ever
The document contains 50 multiple choice questions related to object oriented analysis and design. The questions cover topics such as the expansion of common acronyms like UML, classes and objects, behavior, inheritance, validation, design phases, prototypes, rapid application development approaches, reuse strategies, modeling diagrams, patterns, properties of associations, coupling and cohesion, testing techniques, and usability testing. An answer key is provided with the correct response for each question.
This document outlines the learning objectives and content for a Systems Analysis and Design course. It covers logical modeling techniques including functional decomposition diagrams, use case diagrams, and data flow diagrams (DFDs). Students will learn to produce logical models using these techniques, including how to draw context diagrams, diagram 0 DFDs, and lower-level balanced and leveled DFDs. The document provides examples and exercises for students to practice applying these modeling skills.
This presentation delivered for undergraduate students under the university relations programme of 99X Technology. This presentation covers basic concepts of Unified Modelling Language including some hands-on activities.
Systems Analysis and Design 9th Edition Kendall Test Bankhosixabuc
The document contains sample questions and answers from a test bank for a systems analysis and design textbook. It includes multiple choice, true/false, and short answer questions that cover topics like system modeling, organizational structures, management levels, data flow diagrams, entity-relationship diagrams, and use case modeling. The questions assess understanding of concepts like open and closed systems, external entities, associative entities, management decision making, and defining system scope and boundaries.
The document discusses UML diagrams that can be used to model J2EE applications, including use case diagrams, class diagrams, package diagrams, sequence diagrams, collaboration diagrams, state diagrams, activity diagrams, component diagrams, and deployment diagrams. It provides examples of each diagram type using a case study of an online bookstore system. The use case diagram shows use cases and actors, the class diagram shows classes and relationships, and other diagrams demonstrate how specific interactions, workflows, and system configurations can be modeled through different UML diagrams.
The document discusses various topics related to software engineering including software risk analysis, software design, software testing, and McCabe's cyclomatic complexity metric. Some key points:
- Software risk estimation involves assessing risk probability and impact. An example risk calculation is shown.
- Module coupling and cohesion are discussed in the context of software design. High cohesion and low coupling are preferred for a good design.
- Software testing types include unit testing, integration testing, and validation testing. Techniques like equivalence partitioning and boundary value analysis can be used to generate test cases.
- McCabe's cyclomatic complexity metric is used to measure the number of independent paths in a program and is calculated based on the number
This document contains 33 multiple choice questions related to software engineering concepts and processes. The questions cover topics such as software life cycle models, software requirements, quality assurance, testing methods, maintenance types, and object-oriented design principles.
The document contains a confidential database system exam with two sections - objective questions and structured questions. The objective questions section contains 40 multiple choice questions testing various database concepts like the three schema architecture, entity-relationship modeling, relational algebra, SQL, normalization, and transactions. The structured questions section contains two essay questions, with the first asking about database architecture, properties, relationships and creating tables from given schemas. The second asks about database transaction properties, data definition language statements, normalization forms, and generating output from SQL statements on a sample table.
topic : UML DIAGRAMS
content : Use Case Diagram
Class Diagram
Interaction diagram
Activity diagram
Case Study
details :
Use Case Diagram ::
1 Dynamic in nature.
2 It is used to model the system/subsystem of the application.
3 Built in early stage of development and developed by analyst
4 Involves interaction between user and system.
Class Diagram ::
1 Class diagram is a static diagram.
2 Class diagram used for different aspects of a system.
3 The class diagram describe the attributes and operations of a class.
4 It is also known as structural diagram.
The document discusses use cases and software architecture. It provides an overview of use cases, their benefits, and challenges. It then discusses how use cases relate to software architecture and different architectural views. The document proposes a methodology for developing use cases with 12 steps, including defining the system boundary, prioritizing use cases, describing use cases, and knowing when to stop. It also discusses challenges with complex use cases and proposes a technique called "use case chains" to reduce complexity.
This document outlines the components required for a case tools laboratory project. The project must include 9 components: developing a problem statement, use cases, a domain model with class diagram, sequence diagrams, state charts and activity diagrams, an architecture diagram, and testing each layer of the system. It also provides 15 suggested domains for mini-projects and lists recommended modeling tools.
This document contains 6 questions related to software engineering. Question 1 asks about the differences between software and software engineering, characteristics of good software, and myths related to software engineering. It also asks to explain the phases of the software development life cycle and differences between waterfall and incremental models. Question 2 asks about types of requirements, tasks in requirements engineering, software configuration management activities, and types of software maintenance. Question 3 asks about system design objectives, importance of software design, principles of interface design, and benefits of design documents. Question 4 asks about software testing, areas tested in black box testing, agile techniques, roles in Scrum, and aspects of agile methodology like task boards and user stories. Questions 5 and 6 provide case studies
UML is a standard modeling language used to specify, visualize, and document software systems. It uses mainly graphical notations to model object-oriented systems. There are several types of UML diagrams used to model different aspects of a system, including structural diagrams like class diagrams, behavioral diagrams like sequence diagrams, and architectural diagrams. Common UML diagrams include use case diagrams, class diagrams, sequence diagrams, and state diagrams.
Spreadsheet Modeling and Decision Analysis A Practical Introduction to Busine...rikujoxizi
The document discusses key concepts from Chapter 1 of the textbook, including:
- The essence of decision analysis is choosing the best course of action among alternatives.
- Modeling fits into the problem-solving process by helping to generate and evaluate alternatives to analyze the problem.
- The goal of modeling is to help decision makers make good choices, not ensure optimality or determine feasibility.
This document provides an overview of the Unified Modeling Language (UML) for object-oriented data modeling. It describes UML as a complete language for capturing and communicating knowledge about a subject. The document outlines the goals of UML, the advantages it provides, and how it can be used. It also describes the different categories of UML diagrams including structural diagrams for describing static relationships and behavioral diagrams for describing dynamic relationships. Use case models and how they represent user interactions with a system are discussed. An example use case diagram for an order placement process is included.
This document provides an overview of the Unified Modeling Language (UML) for object-oriented data modeling. It describes UML as a complete language for capturing and communicating knowledge about a subject. The document outlines the goals of UML, the advantages it provides, and how it can be used. It also describes the different categories of UML diagrams including structural diagrams for describing static relationships and behavioral diagrams for describing dynamic relationships. Use case models and how they represent user interactions with a system are discussed. An example use case diagram for an order placement process is included.
1. mail us v4uonline09@gmail.com
JNTU ONLINE EXAMINATIONS [Mid 2 - ooad]
v4uonline.com
1. Realization of a use case is specified by _ _ _ _ _ _ _ _ _ _ [01D01]
a. A collaboration
b. A component
c. A node
d. An activity
2. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ relationship between use cases means that the base use case explicitly incorporates
the behavior of another use case at a location specified in the base. [01D02]
a. Exclude
b. Extend
c. Include
d. Abstract
3. _ _ _ _ _ _ _ _ _ captures the intended behavior of a system [01M01]
a. Use Case
b. Component
c. Class
d. Interface
4. A Use case captures _ _ _ _ _ _ _ _ _ _ of a system [01M02]
a. Structure
b. Organization
c. Behavior
d. Construction
5. Extend relationship is rendered using _ _ _ _ _ _ _ _ _ _ [01M03]
a. Dependency relationship
b. Generalization relationship
c. Realization relationship
d. Association relationship
6. A use case is rendered as [01S01]
a. A dashed ellipse
b. A rounded rectangle
c. An ellipse
d. A circle
7. The names of use cases are generally given as [01S02]
a. Noun phrases
b. Verb pharases
c. Adjectives
d. Adverbs
8. Actors are connected to use cases only by [01S03]
a. Association relationship
b. Generalization relationship
c. Realization relationship
d. Dependency relationship
9. _ _ _ _ _ _ _ _ _ _ represents a role that plays within a system [01S04]
a. Use case
b. Component
c. Actor
d. Activity
10. The behavior of a use case is specified by _ _ _ _ _ _ _ _ _ _ _ [01S05] v4uonline.com
a. Flow of events
b. Classes
c. Components
d. Nodes
11. _ _ _ _ _ _ _ _ _ _ provide services to the system under design [02D01]
a. Use Case
b. Primary Actor
c. Supporting Actor
d. Use Case Diagram
12. _ _ _ _ _ _ _ _ uses the services of the system under design to fulfill the goals [02D02]
a. Primary Actor
b. Supporting Actor
c. Offstage Actor
2. d. Secondary Actor
13. _ _ _ _ _ _ are the stories of using a system to meet the goals [02M01]
a. Use Cases
b. Components
c. Collaborations v4uonline.com
d. Activities
14. The idea of use cases to describe the functional requirements was introduced by [02M02]
a. Grady Booch
b. Ivar Jacobson
c. James Rambaugh
d. Meilir Page Jones
15. _ _ _ _ _ _ _ _ state ``what must always'' be true beginning a scenario in the use case [02M03]
a. Pre-conditions
b. Primary conditions
c. Post-conditions
d. Secondary conditions
16. _ _ _ _ _ _ _ _ _ _ is used to graphically represent the flow of events of a use case [02S01]
a. Class diagram
b. Use case diagram
c. sequence diagram
d. Activity diagram
17. _ _ _ _ _ _ _ _ _ _ _ _ is used to structure the behavioral things in a model [02S02]
a. Use case
b. Class
c. Component
d. Node
18. _ _ _ _ _ _ defines a promise or contract of how a system will behave [02S03]
a. Use Case
b. Component
c. Collaboration
d. Activity
19. Extension scenarios are also called as [02S04]
a. Primary Flows
b. Basic Flows
c. Alternative Flows
d. Main Flows
20. Which of the following is used to organize the use cases [02S05]
a. Component
b. Collaboration
c. Generalization
d. Association
21. Which of the following is a valid actor for credit card validation system? [03D01]
a. Transaction
b. Account
c. Retail Institution
d. Bill
22. In a Use Case Diagram, use cases are adorned with _ _ _ _ _ _ _ _ _ _ _ _ _ to assert non-functional requirements
[03D02]
a. Notes
b. Stereotypes
c. Tagged values
d. Constraints
23. Which of the following diagram view the whole system as a block box? [03M01]
a. Class Diagram
b. Use Case Diagram
c. Component Diagram
d. Deployment Diagram
24. Actors similar to one another are organized using _ _ _ _ _ _ _ _ relationship [03M02]
a. Dependency
b. Generalization
c. Realization
d. Association
25. Which of the following is NOT present in a Use Case Diagram? [03M03]
a. Note
3. b. Actor
c. Constraint
d. Collaboration
26. _ _ _ _ _ _ _ diagram is used to model the requirements of a system [03S01]
a. Component Diagram
b. Activity Diagram
c. Use Case Diagram
d. State Chart Diagram
27. In Use Case Diagrams, common behavior of actors are generally named as [03S02]
a. Use Cases
b. Roles
c. Primary actors
d. Secondary actors
28. _ _ _ _ _ relationship is NOT present in a Use Case Diagram [03S03]
a. Dependency Relationship
b. Generalization Relationship
c. Association Relationship
d. Realization Relationship
29. The behavior of a system is modeled using _ _ _ _ _ _ _ _ _ _ [03S04]
a. Component Diagram
b. Deployment Diagram
c. Class Diagram
d. Use Case Diagram
30. Use Case Diagrams are used to model _ _ _ _ _ view of a system [03S05]
a. Design View
b. Process View
c. Implementation View
d. Use Case View
31. In an Activity Diagram, transitions belongs to [04D01]
a. Trigger Oriented Transitions
b. Self Transitions
c. Internal Transitions
d. Completion Transitions
32. Which of the following is NOT present in an Activity Diagram? [04D02]
a. Action States
b. Objects
c. Events
d. Notes
v4uonline.com
33. In UML, activity state is graphically rendered as [04M01]
a. A Circle
b. An Ellipse
c. A lozenge shape
d. A Rectangle
34. Executable non atomic computations are called as [04M02]
a. Action States
b. Activity States
c. Transitions
d. Simple States
35. Activity diagram is a special kind of [04M03]
a. Use Case Diagram
b. State Chart Diagram
c. Interaction Diagram
d. Component Diagram
36. Executable atomic computations are called as [04S01]
a. Action States
b. Activity States
c. Composite States
d. Concurrent States
37. Activity diagram is used to model _ _ _ _ _ aspects of a system [04S02]
a. Static aspects
b. Dynamic aspects
c. Structured aspects
d. Deployment aspects
38. _ _ _ _ _ is a path from one activity state to the next activity state [04S03]
4. a. Action State
b. Activity State
c. Transition
d. Fork
39. In UML, transition is graphically rendered as [04S04]
a. A Directed line
b. A Dashed Directed line
c. A Solid line
d. A Dashed Solid line
40. _ _ _ _ _ _ _ _ _ may have two or more incoming transitions and one outgoing transition [04S05]
a. Fork
b. Join
c. Branch
d. Swim lane
41. While modeling an operation, use forking and joining only if the operation is owned by [05D01]
a. A Class
b. A Use Case
c. An Active Class
d. An Interface
42. Animation of a model against the execution of a deployed system is an example of [05D02]
a. Business Engineering
b. Forward Engineering
c. Reverse Engineering
d. Temporal Engineering
43. Objects placed in an Activity Diagram are connected to the activity or transition using _ _ _ _ _ _ _ _ _ _ _ _
relationship [05M01]
a. Association
b. Generalization
c. Dependency
d. Realization
44. Forward Engineering is possible for an Activity Diagram especially if the context of the diagram is _ _ _ _ _ _ _ _ _
[05M02]
a. An Operation
b. A Workflow
c. A Class
d. A Use Case
45. Pre-conditions of an initial state and post-conditions of a final state of the workflow are important in modeling _ _
_ _ _ _ [05M03]
a. Boundaries of the workflow
b. Swim lanes of the workflow
c. Sequences of the workflow
d. Semantics of the workflow
46. Which of the following diagram is used to model business workflows? [05S01]
a. Use Case Diagram
b. State Chart Diagram
c. Component Diagram
d. Activity Diagram
47. _ _ _ _ _ _ _ _ _ is used to represent concurrent flows in an Activity Diagram [05S02]
a. Slide bar
b. Synchronization bar
c. Swim lane
d. Branch
48. In an Activity Diagram, organizing the activities into groups is called [05S03]
a. Forking
b. Joining
c. Swim lane
d. Synchronization
49. _ _ _ _ _ _ _ _ _ diagram is used to model an operation [05S04]
a. Component Diagram
b. Use Case Diagram
c. Activity Diagram
d. State Chart Diagram
50. Forward Engineering is the process of translating [05S05]
a. Model to Model
b. Code to Model
5. c. Model to Code
d. Code to Code
51. Consider the example of autonomous robot. Then which of the following is an example of an External Event.
[06D01]
a. Battery fault
b. Collision
c. Hardware fault
d. Movement fault
52. Call Events are handled by [06D02]
a. A State Machine
b. A Use Case
c. A Process
d. A Method
53. Internal event occurs when [06M01]
a. The User Presses a Button
b. A method is invoked via a message
c. The System changes the state
d. The operation of the object is completed
54. Which of the following is a change event [06M02]
a. After ( 2 sec )
b. At 11:30 AM
c. Before ( 3 sec )
d. When (11:30AM)
55. In UML Exceptions are modeled as [06M03]
a. Stereo Typed Interfaces
b. Stereo Typed Use Cases
v4uonline.com
c. Stereo Typed classes
d. Stereo Typed Active classes
56. _ _ _ _ _ _ _ _ _ _ are used to model records of activities that describe what happened in the past or what needs
to be done later. [06S01]
a. Process
b. Events
c. State Machines
d. Components
57. The Relationship between two states is called _ _ _ _ _ _ _ _ _ _ _ [06S02]
a. Event
b. Action
c. Transition
d. Transformation
58. In UML signals are modeled as [06S03]
a. Classes
b. Active classes
c. Stereo Typed classes
d. Stereo Typed Active classes
59. In UML _ _ _ _ _ _ _ _ _ _ keyword is used to model time events [06S04]
a. When
b. After
c. Before
d. At
60. Which of the following is an Asynchronous Event [06S05]
a. Call Event
b. Time Event
c. Signal Event
d. Change Event
61. A sequential state machine may have [07D01]
a. At most one initial state and one final state
b. At least one initial state and one final state
c. At most one initial state more than one final state
d. More than one initial state and at most one final state
62. _ _ _ _ _ is used to show which one, out of a set of transitions actually fires on a particular occasion [07D02]
a. Event Trigger
b. Action
c. Guard Condition
d. Activity
6. 63. Transitions that are handled without causing a change in state are called [07M01]
a. Self Transitions
b. Internal Transitions
c. External Transitions
d. Deferred Transitions
64. Which of the following is used to model the life time of an object [07M02]
a. Use Case
b. Class
c. State Machine
d. Interface
65. Events that can cause transitions to fire are known as [07M03]
a. Deferred Events
b. Call Events
c. Triggers
d. Change Events
66. State that is active after the completion of the transition is called [07S01]
a. Source State
b. Target State
c. History State v4uonline.com
d. Final State
67. Which of the following is present in a nested concurrent state machine [07S02]
a. Initial State
b. Final State
c. History State
d. Concurrent sub state
68. The relationship between two states is called [07S03]
a. Event Trigger
b. Guard Condition
c. Transition
d. Action
69. Events that are not handled in that state but are postponed and queued for handling by the object in another state
are called as [07S04]
a. Deferred Events
b. Trigger Events
c. Call Events
d. Change Events
70. A state that is nested inside another state is called [07S05]
a. History State
b. Sub State
c. Composite State
d. Nested State
71. The behavior of an active class is specified by [08D01]
a. A Use Case
b. A Collaboration
c. A State Machine
d. An Interaction
72. The collaboration of active and passive objects is specified Using [08D02]
a. Activity Diagrams
b. State Chart Diagrams
c. Interaction Diagrams
d. Component Diagrams
73. Process view primarily addresses [08M01]
a. Performance
b. Distribution
c. Behavior
d. Functionality
74. In UML, processes are modeled as [08M02]
a. Stereotyped Classes
b. Stereotyped Active Classes
c. Stereotyped Use Cases
d. Stereotyped Components
75. Which of the following is true regarding a process [08M03]
a. It is light weight
b. It cannot initiate a control activity
c. It is modeled by a class
7. d. It represents an independent flow of control
76. In UML _ _ _ _ _ _ _ _ _ is used to model each independent flow of control [08S01]
a. Use Case
b. Activity
c. Active Object
d. Action
77. Which of the following is wrong with respect to a thread [08S02]
a. Threads are light weight
b. Threads are modeled using stereotyped active classes
c. Threads are nested inside another thread
d. Threads can initiate a control activity
78. _ _ _ _ _ _ _ _ _ is used to model common families of processes or threads [08S03]
a. Use case
b. Class
c. Active class
d. Interface
79. Graphically an active class is rendered as a rectangle with [08S04]
a. Dashed Lines
b. Thick Lines
c. Dotted Lines
d. Solid Lines
80. In UML, asynchronous message is rendered as _ _ _ _ _ _ _ [08S05]
a. Full Arrow
b. Half Arrow
c. Active Class
d. Interface
81. Absolute time of an event is modeled as [09D01]
a. Timing Constraint
b. Timing Mark
c. Timing Expression
d. Timing Semantics
82. Which of the following diagram is used to model object Migration [09D02]
a. Activity Diagram
b. Object Diagram
c. Collaboration Diagram
d. Sequence diagram
83. The allocation of an object to a new node is rendered as [09M01]
a. a ``move'' stereotyped message
b. a ``copy'' stereotyped message
c. a ``allocate'' stereotyped message
d. a ``place'' stereotyped message
84. _ _ _ _ _ _ _ _ _ _ _ _ _ is denotation for the time at which an event occurs [09M02]
a. Timing mark
b. Timing constraint
c. Timing Expression
d. Timing response
85. Graphically, location is rendered as [09M03]
a. A Constraint
b. A tagged value
c. A stereotype
d. an expression
86. Graphically, a timing constraint is rendered as [09S01]
a. A Constraint
b. A Tagged value
c. A Stereotype
d. An Expression
87. Diagram is used to model the distribution of objects [09S02]
a. Activity Diagram
b. Object Diagram
c. Interaction Diagram v4uonline.com
d. State Chart Diagram
88. The deployment view of a system is modeled using [09S03]
a. Component Diagram
b. Activity Diagram
8. c. Development Diagram
d. Use case Diagram
89. Time critical systems are called as [09S04]
a. Concurrent Systems
b. Sequential Systems
c. Distributed Systems
d. Real time Systems
90. Which of the following evaluates to an absolute value of Time? [09S05]
a. Timing mark
b. Timing Constraint
c. Timing Expression
d. Timing Location
91. A state machine whose actions are all attached to states is called [10D01]
a. Activity diagram
b. Mealy machine
c. Moore machine
d. Component diagram
92. State independent means that the object responds [10D02]
a. The same way to an event
b. The same way to a different event
c. In a different way to the same event
d. The same way to all events
93. Which of the following is not present in a State Chart Diagram? [10M01]
a. Fork
b. Event
c. Action
d. Object
94. Forward Engineering of a state chart diagram is possible especially if the context of the diagram is [10M02]
a. A Class
b. A State
c. A Component
d. A Node
95. State chart Diagrams are needed [10M03]
a. When a class has complex life cycle
b. When the execution of scenario is to be traced
c. To allocate classes and objects to modules
d. To allocate processes to processors
96. Which of the following diagram is used to model the dynamic aspects of a system? [10S01]
a. State Chart Diagram
b. Class Diagram
c. Component Diagram
d. Deployment Diagram
97. Executable atomic computations are called as [10S02]
a. States
b. Actions v4uonline.com
c. Activities
d. Transitions
98. diagram is used to model reactive objects. [10S03]
a. Class Diagram
b. Object Diagram
c. Sate Chart Diagram
d. Sequence Diagram
99. In UML, a state is graphically rendered as [10S04]
a. Rectangle
b. Lozenge shape
c. Rounded rectangle
d. Ellipse
100. diagram is used to show the state space of a given class. [10S05]
a. Component Diagram
b. Class Diagram
c. State Chart Diagram
d. Deployment Diagram
101. Which of the following is WRONG with respect to components and classes? [11D01]
a. Both participate in generalization
9. b. Both have instances
c. Both participate in interactions
d. Both represent physical things
102. Which of the following is used to bridge logical and physical models [11D02]
a. Component
b. Use case
c. Interface
d. Collaboration
103. The path name of a component is the name [11M01]
a. Prefixed by the name of the component
b. Suffixed by the name of the component
c. Prefixed by the name of the package in which it lives
d. Suffixed by the name of the package in which it lives
104. An interface that a component realizes is called as [11M02]
a. Import interface
b. Elided interface
c. Export interface
d. Dependent interface
105. In practice, component names are [11M03]
a. Short nouns
b. Verbs
c. Adverbs
d. Adjectives
106. In UML, physical things are modeled as [11S01]
a. Use Cases
b. Components
c. Collaborations
d. Classes
107. Graphically, a component is rendered as [11S02]
a. A Rectangle
b. A Rounded Rectangle
c. A Rectangle with tabs
d. A Rectangle with compartments
108. _ _ _ _ _ _ _ is a collection of operations used to specify a service of a component [11S03]
a. Use Case
b. Class
c. Interface
d. Collaboration
109. Which of the following represents physical packaging of logical elements [11S04]
a. Class
b. Component
c. Use Case
d. Collaboration
110. _ _ _ _ _ _ _ is used to model physical and replaceable part of a system [11S05]
a. Use Case
b. Interface
c. Component
d. Node
111. Which of the following stereotype is used to specify a component that represents a source code? [12D01]
a. Library
b. Document
c. File
d. Executable
112. Which of the following is an example of execution component [12D02]
a. EJB
b. J2EE
c. COM+ Object
d. CORBA
113. _ _ _ _ _ _ _ is used to specify new kinds of components [12M01]
a. Tagged value
b. Interface
c. Stereotype
d. Class
114. _ _ _ _ _ _ _ _ is used to model Application Programming Interfaces [12M02]
10. a. Use Case
b. Node
c. Component
d. Class
115. Creating a new system by adding new components and replacing old ones is called [12M03]
a. Unary replaceability
b. Binary replaceability
c. Ternary replaceability
d. N-Aray replaceability
116. Components that are necessary and sufficient to form an executable system are called [12S01]
a. Deployment Components
b. Work Product Components
c. Execution Components
d. Primary Components
117. Components are organized using [12S02]
v4uonline.com
a. Generalization
b. Use Case
c. Interface
d. Class
118. _ _ _ _ _ _ stereotype is used to specify a component that represents a database table [12S03]
a. File
b. Table
c. DB Table
d. Database
119. Components that are essentially the residue of the deployment process are called [12S04]
a. Work Product Components
b. Deployment Components
c. Secondary Components
d. Execution Components
120. _ _ _ _ _ _ _ _ is used to model source code [12S05]
a. Component
b. Document
c. Interface
d. Class
121. A set of objects or components that are allocated to a node as a group is called [13D01]
a. Distribution unit
b. Execution unit
c. Package
d. Subsystem
122. The relationship between a node and component can be shown explicitly using [13D02]
a. Association relationship
b. Dependency relationship
c. Aggregation relationship
d. Realization relationship
123. _ _ _ _ _ _ _ is an important building block in modeling the physical aspects of a system [13M01]
a. Class
b. Use Case
c. Node
d. Interface
124. Which of the following relationship is NOT present between nodes [13M02]
a. Generalization
b. Association
c. Dependency
d. Realization
125. _ _ _ _ _ _ _ _ _ is used to model the distribution of components [13M03]
a. Node
b. Package
c. Use case
d. Collaboration
126. Which of the following represents a computational resource? [13S01]
a. Component
b. Node
c. Use Case
d. State
11. 127. Graphically a node is rendered as [13S02]
a. Cube
b. Two rectangles
c. Rectangle
d. Rectangle with tabs
128. In practice node names are [13S03]
a. Verbs
b. Short nouns
c. Adverbs
d. Adjectives
129. _ _ _ _ _ _ is used to model processors [13S04]
a. Component
b. Node
c. Use case
d. Class
130. _ _ _ _ _ _ _ is used to organize the nodes [13S05] v4uonline.com
a. Component
b. Node
c. Package
d. Stereo type
131. _ _ _ _ _ _ is used to model the actions that cause components migrate [14D01]
a. Use Case Diagram
b. Deployment Diagram
c. Interaction Diagram
d. Component Diagram
132. Component Diagram is a special kind of _ _ _ _ [14D02]
a. Class Diagram
b. Component Diagram
c. Deployment Diagram
d. Sequence Diagram
133. Which of the following diagram is used to model adaptable systems [14M01]
a. State Chart Diagram
b. Activity Diagram
c. Component Diagram
d. Use Case Diagram
134. _ _ _ _ _ _ _ is used to indicate the version number of the source code file [14M02]
a. Stereotype
b. Constraint
c. Tagged Value
d. Version
135. Which of the following is used to model the seams in a system [14M03]
a. Component
b. Node
c. Use Case
d. Interface
136. _ _ _ _ _ _ diagram is used to model a physical database [14S01]
a. Class Diagram
b. Component Diagram
c. Deployment Diagram
d. Sequence Diagram v4uonline.com
137. Which of the following is NOT present in a Component Diagram? [14S02]
a. Interface
b. Realization relationship
c. Constraint
d. Class
138. Component diagrams are commonly used to model [14S03]
a. Physical database
b. Vocabulary of the system
c. Logical database
d. Context of the system
139. _ _ _ _ _ _ diagram is used to model static implementation view of a system [14S04]
a. Component Diagram
b. Deployment Diagram
c. State Chart Diagram
d. Activity Diagram
12. 140. Which of the following shows the set of components and their relationship [14S05]
a. Deployment Diagram
b. Component Diagram
c. Use Case Diagram
d. State Chart Diagram
141. Which of the following element is NOT present in a deployment diagram? [15D01]
a. Note
b. Constraint
c. Component
d. Tagged value
142. Deployment Diagram is a special kind of [15D02]
a. Component Diagram
b. Use Case Diagram
c. Class Diagram
d. Sequence Diagram
143. Which of the following relationship is not present in a deployment diagram? [15M01]
a. Dependency
b. Association
c. Generalization
d. Aggregation
144. The static deployment view of a system primarily addresses [15M02]
a. Performance
b. Throughput
c. Installation
d. Functionality
145. Deployment diagram is used to model [15M03]
a. The vocabulary of a system
b. The behavior of a system
c. The static aspects of a system
d. The executables and libraries
146. _ _ _ _ _ _ diagram shows the systems topology and distribution of components. [15S01]
a. Component Diagram
b. Use Case Diagram
c. Deployment Diagram
d. Activity Diagram
147. Which of the following diagram is used to model embedded systems [15S02]
a. Deployment Diagram
b. Component Diagram
c. State Chart Diagram
d. Use Case Diagram
148. _ _ _ _ _ diagram is used to model physical aspects of an object-oriented system [15S03]
a. Activity Diagram
b. Deployment Diagram
c. State Chart Diagram
d. Use Case Diagram
149. Graphically a node is rendered as [15S04]
a. A rectangle
b. A box
c. A circle
d. A cube
150. _ _ _ _ _ _ _ _ _ _ diagram is used to model Client-Server systems [15S05]
a. State Chart Diagram
b. Activity Diagram
c. Deployment Diagram
d. Object Diagram
151. _ _ _ _ _ _ _ _ defines the stakeholders view of the product to be developed [16D01]
a. Supplementary specification
b. Glossary
c. Vision
d. Use Case model
152. Non-functional requirements of Library System are captured in [16D02]
a. Glossary
b. Vision
c. Supplementary Specification
d. Use Case Model
13. 153. Which of the following is a functional requirement? [16M01]
a. Reliability
b. Usability
c. Performance
d. Behavior
154. Which of the following process model is best suited for developing object-oriented systems? [16M02]
a. Waterfall model
b. Unified Process model
c. Prototype model
d. Spiral model
155. The terms and definitions of library system are captured in [16M03]
a. Supplementary specification v4uonline.com
b. Glossary
c. Vision
d. Use Case model
156. _ _ _ _ _ _ _ _ are the capabilities and conditions to which the system must conform [16S01]
a. Stakeholders
b. Software
c. Requirements
d. End Users
157. Object -oriented analysis emphases on [16S02]
a. Investigation of the requirements
b. Finding and describing the objects
c. Finding the conceptual solution
d. Defining objects and their collaborations
158. _ _ _ _ _ _ _ _ are the mechanisms to discover and record requirements [16S03]
a. Classes
b. Use Cases
c. Objects
d. Interfaces
159. Which of the following is a valid use case for library system? [16S04]
a. Book
b. Issue Book
c. Student
d. Register
160. Which of the following is a valid actor for library system? [16S05]
a. Student
b. Book
c. Journal
d. Account
161. Which of the following is a quality attribute? [17D01]
a. Functionality
b. Usability
c. Interface
d. Implementation
162. _ _ _ _ _ _ _ _ diagram illustrates input and output events related to the system under discussion [17D02]
a. Use Case diagram
b. Sequence diagram
c. Class diagram
d. Activity diagram
163. _ _ _ _ _ _ _ _ are the primary mechanisms in the Unified Process to describe system behavior [17M01]
a. Classes
b. Use Cases
c. Supplementary specifications
d. Components
164. In the UML, the system as a whole can be represented by a [17M02]
a. Class
b. Use Case
c. Supplementary specification
d. Component
165. _ _ _ _ _ _ _ _ language is used to express constraints in models [17M03]
a. Constraint language
b. Object constraint language
c. Class Constraint language
d. Use Case Constraint language
14. 166. The scenario of a use case is graphically represented using [17S01]
a. Use Case diagram
b. Class diagram
c. Sequence diagram
d. Activity diagram
167. The name of a system event starts with [17S02]
a. A Verb
b. A Noun
c. An Adverb
d. An Adjective
168. Sequence diagrams are part of [17S03]
a. Use Case model
b. Domain model
c. Design model
d. Implementation model
169. The elements of an interface are [17S04]
a. Mehods
b. Attributes
c. Operations
d. Classes
170. Metadata is stored in [17S05]
a. Data dictionary
b. Vision document
c. Supplementary specification
d. Requirements specification
171. On a domain model with n different conceptual classes, there can be [18D01]
a. n(n+1) associations
b. n(n-1) associations
c. 2n associations
d. 2n+1 associations
172. The domain model of Library System consists [18D02]
a. Book class with attributes title, price v4uonline.com
b. Book class with attribute author and operation getAuthor
c. Book class with attributes title, author, price and operation getTitle
d. Book class with attributes title, author, price and operations getTitle, getAuthor
173. _ _ _ _ _ _ _ _ model visualizes the conceptual classes in the problem domain [18M01]
a. Use Case model
b. Domain model
c. Design model
d. Implementation model
174. Using UML, a domain model is illustrated with a set of [18M02]
a. Use Case diagrams
b. Class diagrams with no operations
c. Sequence diagrams
d. Component diagrams
175. Conceptual class consists only [18M03]
a. Attributes
b. Operations
c. Events
d. Responsibilities
176. Which of the following conceptual class presents in the domain model of Library System? [18S01]
a. Register
b. Issue Book
c. Book Return
d. Check Account
177. In Library system, the multiplicity of the association between student and book corresponds to [18S02]
a. One-to-many
b. Many-to-one
c. One-to-one
d. Many-to-many
178. Multiplicity ``l..*'' represents [18S03]
a. Zero or more
b. One or more
c. Many
d. Exactly one
15. 179. In class box attributes are shown in [18S04]
a. First compartment
b. Second compartment
c. Third compartment
d. Fourth compartment
180. Which of the following is a strategy for identifying conceptual classes? [18S05]
a. Identifying noun phrases
b. Identifying verb phrases
c. Identifying adjectives
d. Identifying adverbs
181. _ _ _ _ _ _ _ _ diagram illustrates use case realizations [19D01]
a. Class diagram
b. Component diagram
c. Sequence diagram
d. Activity diagram
182. Attribute visibility from object A to object B exists when [19D02]
a. A is an attribute of B
b. B is an attribute of A
c. A is a parameter of a method B
d. B is a parameter of a method A
183. A use case is realized by [19M01]
a. A Collaboration
b. An Interface
c. A Component
d. A Node
184. _ _ _ _ _ _ _ _ is used to denote a collection of instances [19M02]
a. Named instance
b. Anonymous instance
c. Multiobject
d. Multiinstance
185. Forward engineering of a collaboration diagram is possible especially if the context of the diagram is [19M03]
a. An operation
b. A subsystem
c. A system
d. A workflow
186. Sequence diagram is used to model [19S01]
a. Workflows
b. Flows of control by time ordering
c. Flows of control by organization
d. Life time of an object
187. _ _ _ _ _ _ _ _ distinguishes a sequence diagram from collaboration diagram [19S02]
a. Lifeline
b. Focus of control
c. Path
d. Message
188. Which of the following is not present in a sequence diagram? [19S03]
a. Life line
b. Object
c. Sequence number
d. Focus of control
189. _ _ _ _ _ _ _ _ is an instance of an association [19S04]
a. Multiplicity
b. Role
c. Link
d. Navigation
190. Which of the following diagram is used to represent structural organization of objects [19S05]
a. Sequence diagram
b. Collaboration diagram
c. Class diagram
d. Activity diagram
191. _ _ _ _ _ _ _ _ is a contract or obligation of a class [20D01]
a. Operation
b. Responsibility
c. Attribute
d. Event
16. 192. Navigability in the association implies [20D02]
a. Usability
b. Visibility
c. Operability
d. Adaptability
193. Non software things are modeled using [20M01]
a. Classes
b. Use Cases
c. Components
d. Collaborations
194. _ _ _ _ _ _ _ _ relationship exists between the classes Student and Library [20M02]
a. Generalization
b. Aggregation
c. Dependency
d. Realization
195. _ _ _ _ _ _ _ _ relationship is used to model 'Inheritance' property of Object Oriented systems [20M03]
a. Dependency
b. Association
c. Generalization
d. Realization
196. By default methods are [20S01]
a. Private
b. Public
c. Protected
d. Undecided
197. The set of significant decisions about the organization of a software system is called [20S02]
a. Feasibility study
b. Requirement analysis
c. Software architecture
d. Design pattern
198. _ _ _ _ _ _ _ _ diagram is used to model the vocabulary of a system [20S03]
a. Class diagram
b. Component diagram
c. Use Case diagram
d. Deployment diagram
199. Which of the following class present in the class diagram of Library System? [20S04]
a. Student
b. Loan
c. Product Description
d. Fraud agent
200. _ _ _ _ _ _ _ _ relationship exists between the classes Student and Book [20S05]
a. Dependency
b. Generalization
c. Association
d. Aggregation
v4uonline.com
we are not responsible for any consequences ... we dont create these bits we just gather from the database
If u have any queries or suggestions or any other help ... mail us v4uonline09@gmail.com
special thanks to sri,vj,rcky,arn,108,b0