Global

The information supplied below is a philosophical account of the importance of statistics in biology. It is aimed at learners, who aspire to further their careers in biology through research. This paper brings recognition to UKZN and the Republic of South Africa.
This paper presents on domain feature modeling, domain architecture design and domain implementation in an enterprise. This paper demonstrates the accounting management feature modeling based on the extended (Feature-Oriented Domain Analysis) FODA method and system architecture of accounting management domain, integrates Aspect Object Oriented Programming technology with domain implementation, and designs a whippersnapper AOP framework based on the object proxy pattern to separates crosscutting concerns in the domain implementation phrase. Research result shows this method can effectively seal insulate and abstract variability in requirements of accounting management domain, instruct the designing and implementation of accounting management components, get the requirement of software reuse, resource sharing and collaboration in accounting management domain.
Unified Modeling language (UML) is one of the important modeling languages used for the visual representation of the research problem. In the present paper, UML model is designed for the Tea / Coffee Machine which is used for the purpose of the public in the hotels or restaurants’. The class and use case diagrams are designed & performance is evaluated as a sample program through a case study. Coffeemakers or coffee machines are cooking appliances used to brew coffee without having to boil water in a separate container. While there are many different types of coffeemakers using a number of different brewing principles, in the most common devices, coffee grounds are placed in a paper or metal filter inside a funnel, which is set over a glass or ceramic coffee pot, a cooking pot in the kettle family. Cold water is poured into a separate chamber, which is then heated up to the boiling point, and directed into the funnel.
Software form typically contains a lot of contradiction and uniformity checkers help engineers find them. Even if engineers are willing to tolerate inconsistencies, they are better off knowing about their existence to avoid follow-on errors and unnecessary rework. However, current approaches do not detect or track inconsistencies fast enough. This paper presents an automated approach for detecting and tracking inconsistencies in real time (while the model changes). Engineers only need to define consistency rules-in any language-and our approach automatically identifies how model changes affect these consistency rules. It does this by observing the behavior of consistency rules to understand how they affect the model. The approach is quick, correct, scalable, fully automated, and easy to use as it does not require any special skills from the engineers using it. We use this model to define generic prioritization criteria that are applicable to GUI, Web applications and Embedded Model. We evolve the model and use it to develop a unified theory. Within the context of this model, we develop and empirically evaluate several prioritization criteria and apply them to four stand-alone GUI and three Web-based applications, their existing test suites and mainly embedded systems. In this model we only run our data collection and test suite prioritization process on seven programs and their existing test suites. An experiment that would be more readily generalized would include multiple programs of different sizes and from different domains. We may conduct additional empirical studies with larger EDS to address this threat each test case has a uniform cost of running (processor time) monitoring (human time); these assumptions may not hold in practice. Second, we assume that each fault contributes uniformly to the overall cost, which again may not hold in practice.
Wireless IDS architectural metrics are used to compare the intended scope, architecture of wireless IDS, and how they match the deployment architecture. These metrics can be used to evaluate the architectural efficiency of a wireless IDS and can help in designing efficient wireless IDS. Wireless IDS analyze wireless specific traffic including scanning for external users trying to connect to the network through access points and play important role in security to wireless network. Design of wireless IDS is a difficult task as wireless technology is advancing every day, Architectural metrics can play an important role in the design of wireless IDS by measuring the areas concern with the architecture of a wireless IDS. In this paper we describe a set of architectural metrics that are relevant to wireless IDS. A “scorecard” containing the set of values is used as the centerpiece of testing and evaluating a wireless IDS. Evaluation of a wireless IDS can be done by assigning score to various architectural metrics concern with wireless IDS. We apply our architectural metrics scorecard based evaluation approach to three popular wireless IDS Snort-wireless, AirDefense Guard, and Kismet. Finally we discuss the results and the opportunities for further work in this area.
This paper describes a robotic application that tracks a moving object by utilizing a mobile robot with sensors and image processing. The robotic platform uses a visual camera to sense the movement of the desired object and a range sensor to help the robot detect and then avoid obstacles in real time while continuing to detect and follow the desired object. In terms of real-time obstacle avoidance capacity, this paper also presents an algorithm for this robotic application specifically. Experimental results show that the robotic and intelligent system can fulfill the requirements for detecting an object and avoiding obstacles simultaneously.
We have come across various chat applications to instantly communicate with people. We have used various types of chat application in web-based applications. All these chat applications support text messages to be sent between the users in the instant they press Enter key. But if some problem has to be explained using diagrams, that is where most of these chats are helpless. The chat application we intend to do solves this problem as we are going to integrate a paint like editor to the chat window, so that diagrams could also be drawn and sent through chat. This could be helpful to many of the professional institutions like schools, colleges and industrial units. So we intend to design this application for LAN of these organizations. The people could use many features of this chat application to communicate and brainstorm within a LAN. For this application we need design it on a Client-Server architecture. Though the primary focus of our application is on the feature of providing communication through diagrams and figures, we would also provide different features in our chat app like using predictive texting, providing themes, voice to smiley, etc. thus making an enhanced chat application.
The term telepresence was tossed by Marvin Minsky in an article in 1980, that focused on giving the remote participation a feeling of actually being present.
This paper presents the supersonic combustion of hydrogen fuel using cavity-based fuel injector with two-dimensional turbulent non-premixed combustion model. The present model is based on the standard k-epsilon (two equations) with standard wall functions which is P1 radiation model and a PDF (Probability Density Function) approach is created. The hydrogen fuel is injected just upstream of the cavity. The Contour of Mass fraction of OH indicates a little amount of OH around 0.001454 after combustion. A cavity flame holder is provided which injects hydrogen fuel in a supersonic hot air stream that facilitates enhanced mixing and combustion efficiency.
Kenyan Muslim women perceive of themselves as a marginalized lot in terms of participation in the public sphere. Each day to them is a struggle to be included in the decision making levels of the government. They are fighting for visibility and recognition especially in the political and governing processes. Kenyan Muslims women are adamant in negotiating for their political space. This struggle is even more intricate due to religion and their being a minority group. Consensus building has not fully succeeded in empowering women to be full partners in all decision making processes. In most Muslim Non-Governmental organizations, women are minimally involved in the organizational structures and are only useful in family matters. The public sphere is reserved for men.