scispace - formally typeset
Search or ask a question

Showing papers by "Mayank Dave published in 2006"


Journal Article
TL;DR: This paper addresses the issue of most appropriate component retrieval from a component repository with Genetic Algorithm based second step and finds that initial population will be precise as compared to random, which will help in early convergence.
Abstract: Software reuse has become very popular in the software development because of its immense advantages, which results in improving software product quality, decreased product cost and schedule. Reusable components stored in a repository are useful in developing early prototypes with better quality. One of the most fundamental problems in software reusability is locating and retrieving software components from a large repository. To reuse a software component, you first have to find it. Retrieval of component should be less time consuming and efficient. This paper addresses the issue of most appropriate component retrieval from a component repository. Appropriateness here is precision and quality. Two-step process is used for retrieval of appropriate component from repository. The initial step is Keyword based retrieval for finding all candidate components according to the user requirement. Keyword based search is used to narrow down the search space, which further improves initial population for Genetic Algorithm based second step. As Genetic Algorithms are applied to only extracted candidate components, initial population will be precise as compared to random, which will help in early convergence. Thirty-two attributes of reusable component are considered for selecting the appropriate component. A Fitness function is calculated on the basis of weight vectors and attribute vectors associated with each component to select the appropriate component.

10 citations


Journal ArticleDOI
TL;DR: This paper reviews various issues and techniques involved in the security of mobile ad hoc networks and concludes that the security solutions applied in traditional networks are not directly suitable for protecting them.
Abstract: In mobile ad hoc networks (MANET), the communicating nodes do not rely on fixed infrastructure which results into several challenges. The power and computational resources are limited in these netw...

5 citations