Model-to-model transformation (M2MT) is one of a proper approach in software development for specified transformation in declarative way. The proposed various mechanisms to define and write it, but most of the proposed mechanisms are either insufficiently formalised or complicated. The recent mechanisms make the writing of formal specification becomes difficult and error-prone. This paper aims to explore the ability of description logics (DL) to formalise a model or a system that will be used...
Multicast streams are the dominant application traffic pattern in many mission critical ad-hoc networks. The limited computation and communication resources, the large scale deployment and the unguaranteed connectivity to trusted authorities make known security solutions for wired and single-hop wireless networks inappropriate for such application environment. This paper promotes a novel Tiered Authentication scheme for Multicast traffic (TAM) for large scale dense ad-hoc networks. Nodes are...
A business rule is a policy, procedure, or standard that an organization has adopted. Business rules are very important in database design because they dictate controls that must be placed upon the data. Most business rules can be enforced through manual procedures that employees are directed to follow or logic placed in the application programs. However, each of these can be avoided - employees may forget or may choose not to follow a manual procedure, and databases can be updated directly by...
The MPEG-7 descriptors that were developed can be broadly classified into general visual descriptors and domain specific visual descriptors. The former include color, texture and shape while the latter are application dependent and includes identification of human faces and face recognition. Since the standardization of the domain-specific descriptors is still under development, this paper concentrates on those general descriptors which can be used in most applications. Fig 4.1 Three color...
Representative Values. These are also called as measures of location or measures of central tendency. They indicate the canter or most typical value of a data set lies. This includes three important measures they are mean, median and mode. Mean and median can only apply for quantitative data, but mode can be used with either quantitative or qualitative data. Mean This is the most commonly used measure which is the average of a data set. This is the sum of the observations divided by the number...
In a computer, its memory plays an important role in the computing world. Data or information that is needed for computing should be ready and active in physical devices. It can be called memory, for an instance, the Random Access Memory (RAM) is largely known as memory. In addition, the concept called the Clock cycle is normally used in the RAM. Information or instruction that needs to be eliminated will be lined up in memory before execution to avoid direct data entry and to avoid slowness of...
Description about Firewalls: For so many corporate networks the first method they use for protect from unauthorized access is firewalls. A firewall is combination of both software and hardware which divides LAN into so many ports with minimum of two ports for security reasons All the connection from LAN in organisation which initially passes to and from by firewall, where firewall which act as gatekeeper which gives valid access to valid requests and at end it will block all unauthorized...
According to the reference text, Metadata is structured information that describes, explains, locates, or otherwise makes it easier to retrieve, use, or manage an information resource. it is often called data about data or information about information. Metadata is commonly used for any formal scheme of resource description, applying to any type of object, digital or non-digital. Metadata is key to ensuring that resources will survive and continue to be accessible into the future. There are...
The explosion of mobile computing and communication devices is driving a ground-breaking change in our information society. We are moving towards the Everywhere Computing age (i.e. Mobile Computing) from Personal Computer age in which a user utilizes several electronic platforms through which he can access all the required information wherever and whenever needed. The nature of Everywhere Computing devices provides wireless networks one of the easiest solutions for interconnection and as an...
One Box of the Internet Explorer combines the search box within the location bar. Users can navigate to other web sites and view browsing history and favourites in the same location. Bing is set as a default search provider though various search providers can be customized. Multiple sites can be added to Pinned Sites which dock sites to the taskbar (click, hold & drag tab). Tab sandboxing feature prevents a single tab crash from taking down whole pages. InPrivate browsing feature provides...