Archive

Software Effort and Cost Estimation using Software Requirement Specification
Ayman Hussein Odeh

Abstract
Process of estimating the effort required for the software development process is difficult and very complicated. There are many techniques to estimate the effort and cost of producing software, this article is based on a correct reading and mathematical analysis of the software problem, extract the variables needed as input and output for the required software, and applying the Software Science Metrics on the variables and their relationship to estimate unique and used operators and operators. Finally depending on these metric calculate the size and the time and effort ... etc. expected to produce software.
Download Full Text

A Novel Message Driven Local Repair Algorithm for MANET
A. E. Narayanan, A. Vincent Jeyakumar

Abstract
Mostly MANET is used for emergency situation like disaster management which has the task of supplying QoS in an effort to provide the right information to the right place at the right time. In this scenario with the capability to send and receive reliable real-time video and voice packets, the involved network must be able to provide a certain level of QoS. So that the QoS impact in the face of network failures must be minimized in MANET like temporary emergency networks. In such a situation, when an intermediate node fails the network has no built in protocol to respond to this link breakage, the connection will have to be rerouted from the source and QoS will have to be re-established. This global fault-tolerance method means the source will have to recomputed and renegotiate a new QoS path which, depending on the network size, could be costly in terms of computation and communication time necessary for path negotiation (negotiation includes implementation of the new path). In contra, the proposed fault-tolerant algorithm makes it possible for the Intermediate nodes to efficiently repair the failed connection locally and reroute the packets to the destination.
Download Full Text

Information Retrieval Configuration File Text Categorization Algorithm for Improving Business Intelligence
V. Jayaraj and V. Mahalakshmi

Abstract
Globalization has changed the very face of the business nature and many innovative techniques have emerged to cater to the need of the evolving business needs. With the aid of these new technologies, the raw information is mined to extract useful meaningful data to help the business grow. Plethora of information are textual based document and, the information in most cases are stored in an unordered manner, from this unordered collection of text document, the process of extracting information or deriving knowledge is termed as Text Mining. This paper proposes an methodology to implement the text mining technology to enhance the scope of Business Intelligence. A novel algorithm named information retrieval configuration file is proposed to extract useful information from a set of documents and employs a new technique in extraction where the information gained is relevant and efficient for business needs. This paper mainly focuses on the development of a new algorithm after analyzing and comparing it with the existing algorithm like support vector machine and hidden markov model.
Download Full Text

Modeling of UPFC and DG by the Current Based Model
B. Raja Rajeswari , P. Bhaskara Prasad , P. Bala Chennaiah

Abstract
This paper deals with the steady state modeling of unified power flow controller (UPFC). Since current limitations are determinant to FACTS apparatus design, the proposed current based model (CBM) assumes the current as variable, allowing easy manipulation of current restrictions in optimal power flow evaluations. The performances of current based model (CBM) and of the power injection model (PIM) are compared through a Quasi-Newton optimization approach. The performance of a medium size network with 39 busbars is studying from the point of view network having only UPFC and the network having UPFC and DG. For the Two networks active power losses, reactive power losses are compared.
Download Full Text

Bibliometric Analysis of Literature Published in Emerald Journals on Cloud Computing
Jayaprakash

Abstract
The present study is based on the bibliometric analysis of publications on cloud computing appeared in the emerald journals from 2000 to 2014. The bibliographical details of each publication on a cloud computing were downloaded from the emerald website and recorded in MS-excel for calculation. This study has undertaken total 781 publications, published on cloud computing which were appeared in different journals of emerald publication. Maximum number of articles 287 (37%) contributed by single author. Majority of the contribution among the published literature to cloud computing is from Library Hi Tech News and Library Hi Tech journals respectively.
Download Full Text

end faq