oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 11 )

2018 ( 44 )

2017 ( 62 )

2016 ( 97 )

Custom range...

Search Results: 1 - 10 of 15000 matches for " Nasib Singh Gill "
All listed articles are free for downloading (OA Articles)
Page 1 /15000
Display every page Item
Aspect-Oriented Requirements Engineering for Advanced Separation of Concerns: A Review
Narender Singh,Nasib Singh Gill
International Journal of Computer Science Issues , 2011,
Abstract: Software engineering was introduced to cope with software crisis with two fundamental principles: separation of concerns and modularity. Many programming paradigms have been proposed and used while considering the fundamental principles from the early days. Complex software systems were successfully modularized but complete separation of concerns is still impossible to achieve using todays most popular programming paradigms such as object-oriented programming. There are some concerns which could not be separated properly in a single class or module due to their highly coupling with other classes or modules behaviors. We call such unmodularized concerns as crosscutting concerns and these are responsible for scattering and tangling. Aspects are the natural evolution of the object-oriented paradigm. They provide a solution to some difficulties encountered with object-oriented programming, sometimes scattering and tangling. Hence, Aspect-Oriented Software Development (AOSD) is another step towards achieving improved modularity during software development. It gives emphasis to the separation of crosscutting concerns i.e. advanced separation of concerns and encapsulation of crosscutting concerns in separate modules, known as aspects. It later uses composition mechanism to weave them with other core modules at loading time, compilation time, or run-time. Aspect-Oriented Requirements Engineering (AORE) is an early phase in AOSD that supports separation of crosscutting concerns at requirements level. It does not replace but rather complements any of the existing requirements methodologies. Over the last few years, several research efforts have been devoted to this area. Several techniques for crosscutting concern identification have already been proposed. In this paper, an attempt is made to review the existing approaches and understand their contribution to requirements engineering.
Financial Statement Fraud Detection using Text Mining
Rajan Gupta,Nasib Singh Gill
International Journal of Advanced Computer Sciences and Applications , 2013,
Abstract: Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information) i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement fraud by analyzing the hidden clues in the qualitative information (text) present in financial statements.
A COMPARISON AMONG VARIOUS TECHNIQUES TO PRIORITIZE THE REQUIREMENTS
Ritu,Dr. Nasib Singh Gill
International Journal of Computer Science and Management Studies , 2012,
Abstract: In commercial software system development, softwarevendors often face the many difficulties to deal with largeamount of requirements that enter the company every day. Itis not possible to satisfy all the requirements in givenconstraint like time, cost, etc. hence there is a need to selectthe requirements that are more important. Requirementsprioritization is a way that can play important role in theselection of requirements. Selecting the right order ofrequirements for product release depends on how successfullythe requirements are prioritized. There are differentrequirement prioritization methods available with differentcharacteristics. In this paper, we take a closer look of 9different Requirement Prioritization techniques, namedasFuzzy Analytical hierarchy process(FAHP), ClassicalAnalytical hierarchy process(AHP), Hierarchy Analyticalhierarchy process, minimal spanning tree, bubble sort, binarysearch tree, priority groups, planning game, and 100 pointmethod. The Criteria used that are used for comparison are:required completion time, ease of use, reliability, and requirednumber of comparison.
A REVIEW ON ADVANCED TRAFFIC CONTROL TECHNIQUES IN MOBILE AD-HOC NETWORK
Babita,Dr. Nasib Singh Gill
International Journal of Computer Science and Management Studies , 2012,
Abstract: A mobile ad hoc network (MANET) is a dynamicdistributed system of wireless nodes that moveindependently of each other. The operating transmissionrange of the nodes is limited and as a result, MANETroutes are often multi-hop in nature. Any node in aMANET can become a source or destination, and eachnode can function as a router, forwarding data for its peers.MANET routing protocols are either proactive or reactivein nature. Proactive routing protocols determine andmaintain routes between any pair of nodes irrespective oftheir requirement. The reactive on-demand routingprotocols determine a route only when required. As thenetwork topology changes dynamically, reactive ondemandrouting has been preferred over proactive routing.In this Paper, we will review the routing protocol in theMANET.
Prevention and Detection of Financial Statement Fraud – An Implementation of Data Mining Framework
Rajan Gupta,Nasib Singh Gill
International Journal of Advanced Computer Sciences and Applications , 2012,
Abstract: Every day, news of financial statement fraud is adversely affecting the economy worldwide. Considering the influence of the loss incurred due to fraud, effective measures and methods should be employed for prevention and detection of financial statement fraud. Data mining methods could possibly assist auditors in prevention and detection of fraud because data mining can use past cases of fraud to build models to identify and detect the risk of fraud and can design new techniques for preventing fraudulent financial reporting. In this study we implement a data mining methodology for preventing fraudulent financial reporting at the first place and for detection if fraud has been perpetrated. The association rules generated in this study are going to be of great importance for both researchers and practitioners in preventing fraudulent financial reporting. Decision rules produced in this research complements the prevention mechanism by detecting financial statement fraud.
AN IMPLEMENTATION OF ADVANCED TRAFFIC CONTROL TECHNIQUES IN MANET
Babita,Dr. Nasib Singh Gill
International Journal of Computer Science and Management Studies , 2012,
Abstract: Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which form an arbitrary topology. Secured ad hoc routing protocols are a necessity forsecuring the routing of data. To have security in the routing, one should sacrifice the performance of the data transmission. This shows that in the secure routing protocols, the usage of security techniques like digital signatures, authentications and hash chains have major impacts on the performance since it will use moreprocessing power and time. Secure routing protocols available today (such as SAODV) still need further optimizations to minimize the processing overhead, delays and to maximize the routing throughputs.
POSITION BASED ROUTING IN VANET BASED ON GEOGRAPHIC APPROACH
Manju Rani,Dr. Nasib Singh Gill
International Journal of Computer Science and Management Studies , 2012,
Abstract: Vehicular Ad hoc Network (VANET) is a wireless networkthat is formed on the fly between a collection of carsconnected by wireless links. VANET has gained a greatamount of attention during recent years and is used for alarge number of safety (accident warning, weathernotification) and non-safety (multimedia, gaming)applications. Vehicular Network is one of the most growingtype of wireless network. In such system lot work is beingdone. There are number of issues with Vanet like thesecurity, congestion, intelligent system etc. We are alsotaking one of such problem of vanet called the intelligentsystem. In vehicular network the complete automation isalways the main problem. While working with vanet thegeographical area selection is also a problem. It can be acity, mountain area etc. We are trying to represent thesolution for the same problem. We have proposed thesystem in a city area. In this system we have selected a 4x4road area with 2 lane system. Automated traffic lights arepresent on each turn. We are providing the system toperform a vehicular traffic formation without any collision.Both the vehicle and light system is automated here.
COMPARATIVE STUDY OF VARIOUS VANET ROUTING PROTOCOLS
Manju Rani,Dr. Nasib Singh Gill
International Journal of Computer Science and Management Studies , 2012,
Abstract: Vehicular Ad-hoc Network (VANET) represents a challenging class of mobile ad-hoc networks that enables vehicles to intelligently communicate with each other and with roadside infrastructure. Routing of data in a vehicular ad hoc network is a challenging task due to the changing topology of such a network. In case of highway traffic position-based routing approaches can very well deal withthe high mobility of network nodes. In this paper we analyze a position-based routing approach, a map-based routing approach and topology-based adhoc routing strategies. A comparison is made between these protocols strategies on the basis of type and sub type of protocol type, overhead, mobility model and propagation model.
Inheritance Hierarchy Based Reuse & Reusability Metrics in OOSD
Nasib S. Gill,,Sunil Sikka
International Journal on Computer Science and Engineering , 2011,
Abstract: Reuse and reusability are two major aspects in object oriented software which can be measured from inheritance hierarchy. Reusability is the prerequisite of reuse but both may or may not bemeasured using same metric. This paper characterizes metrics of reuse and reusability in Object Oriented Software Development (OOSD). Reuse metrics compute the extent to which classes have been reused and reusability metrics computes the extent to which classes can be reused. In this paper five new metrics namely- Breadth of Inheritance Tree (BIT), Method Reuse Per Inheritance Relation (MRPIR),Attribute Reuse Per Inheritance Relation (ARPIR), Generality of Class (GC) and Reuse Probability (RP) have been proposed. These metrics help to evaluate reuse and reusability of object oriented software.Four extensively validated existing object oriented metrics, namely- Depth of Inheritance Tree (DIT), Number of Children (NOC), Method Inheritance Factor (MIF) and Attribute Inheritance Factor (AIF)have been selected and investigated for comparison with proposed metrics. All metrics can be computed from inheritance hierarchies and classified according to their characteristics. Further, metrics areevaluated against a case study. These metrics are helpful in comparing alternative inheritance hierarchies at design time to select best alternative, so that the development time and cost can be reduced.
Correlating Dimensions of Inheritance Hierarchy with Complexity & Reuse
Nasib S. Gill,Sunil Sikka
International Journal on Computer Science and Engineering , 2011,
Abstract: Inheritance is the vital feature of any object oriented software which provides reuse of exiting classes for designing new classes. Higher reuse provides higher productivity and greater quality.Inheritance hierarchy is one of the very important artifacts targeted for measurement of reuse and reusability. Reuse through inheritance hierarchy can be measured from two dimensions- Depth and Breadth. Higher depth and breadth may increase complexity of software which makes the software difficult to understand and maintain. This paper aimed to correlate the depth and breadth of inheritance hierarchy with reuse and complexity of inheritance hierarchy using design oriented metrics.
Page 1 /15000
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.