Augmenting SCA project management and automation framework
01 Oct 2017-Vol. 263, Iss: 4, pp 042018
...read more
Citations
More filters
[...]
TL;DR: A mathematical morphological method is used to reconstruct the image features for better segmentation and a graphical user interface is developed which will simplify the usage of this system.
Abstract: The eye disease is prominent in many nations including India and is said to affect up to 80% patients having diabetes. Diabetic Retinopathy is the medical term for denoting the damages to retina caused due to diabetes mellitus. Implying K means Clustering algorithm for coarse segmentation, hard distils are identified with better accuracy than the classical approaches. The variance based methods for segmenting hard distils are reviewed in the surveys and had to be improved. To remove the background features from the picture and conserve computational costs, a mathematical morphological method is used to reconstruct the image features for better segmentation. The results obtained for 96.4% sensitivity and 97.2% specificity. Along with this advantage, a graphical user interface is developed which will simplify the usage of this system. This model will divide the fragments into regions of interests having lesions and normal regions carrying normal features. After this segmentation, ophthalmologists will utilize the results to grade diabetic retinopathy and devise a treatment plan.
4 citations
[...]
TL;DR: The allocation of task and placement of virtual machine problems is explained in the single fog computing environment and the result shows that the proposed framework improves QoS in fog environment.
Abstract: In today's world, large group migration of applications to the fog computing is registered in the information technology world. The main issue in fog computing is providing enhanced quality of service (QoS). QoS management consists of various method used for allocating fog‐user applications in the virtual environment and selecting suitable method for allocating virtual resources to physical resource. The resources allocation in effective manner in the fog environment is also a major problem in fog computing; it occurs when the infrastructure is build using light‐weight computing devices. In this article, the allocation of task and placement of virtual machine problems is explained in the single fog computing environment. The experiment is done and the result shows that the proposed framework improves QoS in fog environment.
3 citations
[...]
20 Dec 2017
TL;DR: A cipher text-arrangement trait-based encryption (CP-ABE) plan with effective client repudiation for distributed storage framework that can withstand conspiracy assault performed by denied clients collaborating with existing clients is given.
Abstract: With the improvement of distributed computing, outsourcing information to cloud server pulls in loads of considerations. To ensure the security and accomplish adaptable fine-grained record access control, (ABE) was proposed and utilized as a part of distributed storage framework. Be that as it may, client repudiation is the essential issue in ABE plans. In this article, we give a cipher text-arrangement trait-based encryption (CP-ABE) plan with effective client repudiation for distributed storage framework. The issue of client repudiation can be explained productively by presenting the idea of client gathering. At the point when any client leaves, the gathering supervisor will redesign client’s PK with the exception of the individuals, who have been declined. Also, CP-ABE plan has substantial calculation cost, as it becomes straightly with the intricacy for the entrance structure. To diminish the calculation cost, we outsource high calculation burden to cloud administration suppliers without spilling document substance and mystery keys. Notably, our plan can withstand conspiracy assault performed by denied clients collaborating with existing clients.
Cites background from "Augmenting SCA project management a..."
[...]
[...]
[...]
[...]
[...]
[...]
TL;DR: Proposed model reduces the consumption of energy by using DVFS, one of the effective methods to lessen the vitality utilization in cloud computing.
Abstract: Power management has turned into a basic plan parameter as more transistors are coordinated on a solitary chip. Bringing down the supply voltage is one of the alluring ways to deal with spare intensity of the variable outstanding task at hand framework, and to accomplish long battery life. DVFS is one of the effective methods to lessen the vitality utilization. The principle thought behind DVFS plan is to powerfully scale the supply voltage of CPU, to give enough circuit speed to process the framework remaining burden so as to meet the time and execution, along these lines lessening power. The problem faced by users in cloud computing is energy consumption. Some resources in cloud stay idle for some time. This idleness of resources consume energy thereby causing more consumption of energy. Both the hardware and software reduces the energy consumptions. The results shows that proposed model reduces the consumption of energy by using DVFS.
References
More filters
[...]
TL;DR: This chapter motivates the need for value-based testing, describes practices supporting the management of value- based testing, outlines a framework forvalue-based test management, and illustrates the framework with an example.
Abstract: Testing is one of the most resource-intensive activities in software development and consumes between 30 and 50% of total development costs according to many studies. Testing is however often not organized to maximize business value and not aligned with a project’s mission. Path, branch, instruction, mutation, scenario, or requirement testing usually treat all aspects of software as equally important, while in practice 80% of the value often comes from 20% of the software. In order to maximize the return of investment gained from software testing, the management of testing needs to maximize its value contribution. In this chapter we motivate the need for value-based testing, describe practices supporting the management of value-based testing, outline a framework for value-based test management, and illustrate the framework with an example.
58 citations
[...]
01 Jan 2012
TL;DR: Intelligent Risk Analysis Model (IRAM) for reusability in developing component service oriented software, which are developed using eminent object oriented programming language paradigm Java is introduced.
Abstract: Software development has nowadays evolved into a extreme change that uses the best modules being run in various closed and open source software. Extracting the best component and fit them into an ongoing component based development software poses great challenges to run the software error free with desired outcomes. In this proposal we have introduced an `Intelligent Risk Analysis Model (IRAM) for reusability in developing component service oriented software, which are developed using eminent object oriented programming language paradigm Java. This model performs surfing operation into Java object oriented programming modules warehouse, which consists of several availability modules of various projects, and gives a list of suitable module. Those modules are tested on cohesion /coupling testing analysis to determine the individual strength and binding capacity of modules before performing Regression test. Final desirable outcomes are tested on performing regression test while integrating successful level module with domain being developed and proper deployment is made on successful expected outcome of the product. Risk analysis of software project is analyzed for transformation of reusability components risk before transformation Analysis, adaptable risk Analysis, and reusability risk Analysis for package in Java programming. In this paper IRAM model to focus Java package the domain and size of package, integration and dependency relationship of package, measuring the coupling and cohesion in risk metric for development and implementation of reusability package without any risk factor.
7 citations
Related Papers (5)
[...]
[...]
[...]