Behavioral Reflexion Models for Software Architecture

Abstract :-
In our approach, the system engineer is supported in producing architecture documentation that reflects the intended architecture. Furthermore, discrepancies between the implementation and documentation are identified. These discrepancies are then illustrated graphically in a reflexion model, which guides debugging activities. In this research, we are concerned with architecture representations of system behaviors and focus in particular on distributed systems. Continue reading Behavioral Reflexion Models for Software Architecture

Lifetime Estimation of Composite Bone Joint Screws

Bone screws are crucial elements in treating many types of open/closed fractures and arthroplasties in different joints in the body. The life time of many plates used in the fracture treatment are dependent on the screws function. The fracture of screws at any point of their lifetime will cause failure of the treatment for that specific pathology. This may lead to increase risk of new surgeries, osteomyelitis and less commonly septic arthritis. Continue reading Lifetime Estimation of Composite Bone Joint Screws

Visual Cryptographic Steganography in Images

Abstract :-
In today’s information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. Continue reading Visual Cryptographic Steganography in Images

The Routing Arbiter in the Post-NSFnet Service World

Abstract :-
In the wake of a fundamental change in the US-based Internet architecture, the Routing Arbiter (RA) is providing a stabilizing influence by maintaining coherent routing on a global scale. This is provided through the development and promotion of a globally coordinated Internet Routing Registry (IRR), the use of Route Servers (RS) at the National Science Foundation (NSF) Network Access Points (NAPs) and other exchange points, and the development and promotion of new protocols, tools, and operational practices that will facilitate the continued growth of the Internet. Continue reading The Routing Arbiter in the Post-NSFnet Service World

Successful Implementation of Integrated Ealth Information Systems: The Role And Impact Of Business Process Management

Abstract :-
These instructions give you guidelines for preparing papers for the International Journal of Computer Theory and Engineering (IJCTE). Use this document as a template if you are using Microsoft Word 6.0 or later. Otherwise, use this document as an instruction set. The electronic file of your paper will be formatted further at International Journal of Computer Theory and Engineering. Define all symbols used in the abstract. Do not cite references in the abstract. Do not delete the blank line immediately above the abstract; it sets the footnote at the bottom of this column. Continue reading Successful Implementation of Integrated Ealth Information Systems: The Role And Impact Of Business Process Management

Activity Representation from Video Using Statistical Models on Shape Manifolds

Abstract :-
Activity recognition from video data is a key computer vision problem with applications in surveillance, elderly care, etc. This problem is associated with modeling a representative shape which contains significant information about the underlying activity. In this dissertation, we represent several approaches for view-invariant activity recognition via modeling shapes on various shape spaces and Riemannian manifolds. The first two parts of this dissertation deal with activity modeling and recognition using Continue reading Activity Representation from Video Using Statistical Models on Shape Manifolds