Extracting Code Resource from OWL by Matching Method Signatures using UML Design Document
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 2
Abstract
Software companies develop projects in various domains, but hardly archive the programs for future use. The method signatures are stored in the OWL and the source code components are stored in HDFS. The OWL minimizes the software development cost considerably. The design phase generates many artifacts. One such artifact is the UML class diagram for the project that consists of classes, methods, attributes, relations etc., as metadata. Methods needed for the project can be extracted from this OWL using UML metadata. The UML class diagram is given as input and the metadata about the method is extracted. The method signature is searched in OWL for the similar method prototypes and the appropriate code components will be extracted from the HDFS and reused in a project. By doing this process the time, manpower system resources and cost will be reduced in Software development.
Authors and Affiliations
Gopinath Ganapathy , S. Sagayaraj
An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive...
Algorithm to Match Ontologies on the Semantic Web
It has been recognized that semantic data and knowledge extraction will significantly improve the capability of natural language interfaces to the semantic search engine. Semantic Web technology offers a vast scale of sh...
Antenna Performance Improvement Techniques for Energy Harvesting: A Review Study
The energy harvesting is defined as using energy that is available within the environment to increase the efficiency of any application. Moreover, this method is recognized as a useful way to break down the limitation of...
Computerized Steganographic Technique using Fuzzy Logic
Steganography is the method of providing Computer security in which hiding the required information is done by inserting messages within other messages, which is a string of characters containing the useful information,...
Muscles Heating Analysis in Sportspeople to Prevent Muscle Injuries using Thermal Images
Muscle heating is the process that every athlete follows before any physical activity or sport which are the legs where greater force is exerted and in case a good heating routine is not practiced, the muscles can suffer...