Model Based Software Timing Analysis Using Sequence Diagramfor Commercial Applications
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: The verification of running time of a program is necessary in designing a system with real lifeconstrain. Verification defines lower and upper bounds which reflects control flow that depends on data as wellas instruction times execution. In previous days, the bounds were very wide due to a lack of efficient controlflow analysis and architectural modeling techniques. But in present days, significant progress have beenoccurred in both areas in a way such that execution cost of formal software analysis has become morepractical. In previous days various work has been done on code based complexity analysis for embeddedsoftware. This type of analysis is called as worst case execution time analysis(WCET). In our research we areapplying the concept of timing analysis for UML model based timing analysis, by which we can minimize theeffort of calculating timing from code snippet and it will also help the developer to identify the timingrequirement since requirement stage
Authors and Affiliations
Hrishikesh Mukherjee , Shrimann Upadhyay , Arup Abhinaa Achariya
Web Personalization Using Ontology: A Survey
This paper contains concept of ontologies on the basis of user behaviour being analysed. Ontologies are the structural frameworks for organizing information and are used in artificial intelligence, the Semantic...
Multi-Level Based Hybridized Intrusion Detection and Prevention System
Abstract: Global spread of Information Technologyincreases security challenges; over intrusion detection system against sophisticated attacks. This has become of paramount importance since single mode intrusion det...
Authentication of grayscale document images using shamir secret sharing scheme.
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in...
Security Suite for IT and Telecom Industries
Abstract: Security is the biggest concern nowadays faced by various companies as security threats are more prevalent. This „openness‟ is the reason because of which protecting networks and business data is even more diff...
Energy Consumption Using Network Stability And Multi-hop Protocol For Link Efficiency in Wireless Body Area Networks
Abstract: In this paper, we propose a minimum, power efficient and max throughput routing protocol for Wireless Body Area Networks (WBANs). We use multi-hop topology to achieve minimum energy consumption and longer...