Friday, September 6, 2019
E-Bussiness Essay Example for Free
E-Bussiness Essay Intermediary analysis, competitor analysis, demand analysis, opportunities +threats, SLEPT factors, resource analysis Demand analysis Examines current and projected customer use of each digital channel and different services within diff. target markets it can be determined by asking for each market: What % of cust. Bus. Have acces to the int. ââ¬â what % of members of the buying unit in this bus. Have acces to the int. ââ¬â what % of cust. Are prepared to purch. Ur product online. Customer demand analysis 2 parts: org. arket (internet access , visit site , purchase influenced , buy online) Customer market( Same ) segmentation Is the identification of diff. groups within a target market in order to develop diff. product offerings and comm. For the groups Stages in target marketing strategy: 1- segmentation(informed by market research and informs market segment definition) 2- target marketing (evaluates and select target segments it is informed by demand analysis and informs select online targeting and target segments) 3- positioning ( identify proposition for each segment ,informs core brand proposition,online value prop. 4- planning (deploy resources to achieve plan, informed by evaluation of resources and informs online marketing mix restructuring) Diff types of segmentation variables 1. behavior 2. attitude and preferences 3. lifestyle and psychographics 4. demographic profile data 5. unknown Questions To help develop a customer centric strategy for e-marketing -who are our customers -how are their need changing -which do we target -how can we add value -how do we become first choice(positioning ,differential advantage, online value proposition) 6 Iââ¬â¢s The difference btwn new media and traditional media has been developed as the 6 Iââ¬â¢s: -Interactivity: (enables companies to communicate with customers in a new way) pull marketing, the consumer is pro active with interacting with companies thru actively seeking info thru search engines. Push marketing, comm. Are broadcasts from an advisor to consumer . In interactivity we have dialogue not monologue(2 way feedback) -Intelligence: the int. can be used as a low cost method of collecting marketing research (everytime a user clicks on a link this is recorded and can be analyzed with the web analytics tool) Individualization: It is as personalization and it is an important aspect of achieving customer relationship management online thru extranets , thru B2B , it is an example of mass customization where generic customer info is supplied for particular segments, this means in a traditional media u send same msg to all the customers but in new media u can send diff. sgs to each customer and have diff feedback from them. -Integration: how the int. can be used as an integrated comm. Tool : as an intermediary btwn company and customer we can have a web an email a phone a mail or a person , the int. can be used as a direct response tool , the website can have a direct response or a call back facility , the int. an be used to support the buyi ng decision and to support customer service. -Industry restructuring: disintermediation, reintermediation and countermediation are key concepts of industry restructuring that should be considered by any company developing an e marketing strat. -Independence of location: to be globalized , the int. makes it possible to sell a country without a local sale or customer service force. Pââ¬â¢s Used to provide new opportunities for the marketer 7 Pââ¬â¢s(marketing mix) Product: quality and branding Promotion: sales promotion , direct marketing Price: list discounts , positioning Place: trade channels , segmented channels People: individuals on marketing activities, recruitment, training Process: customer focus , business led Physical evidence: sales and staff contact experience of brand , product packaging Different price points Subscription: sign Pay-per-view: a fee for a single download or viewing session Bundling: diff channels or content can be ffered as individual products or gr oup at a reduced price compared to pay per view Implications of the internet 1. Increase price transparency and its implications on differential pricing. Supplier can use the tech. for differential pricing , they must use it with precaution to donââ¬â¢t let price discrimination. Pricing is only one variable. 2. downward pressure on price. Purchase of some products that have not traditionally been thought as commodities may become more price sensitive. 3. new pricing approaches. There is two approaches: dynamic pricing . prices can be updated in real time according to the customer. Aggregated buying is a form of customer union where buyers purchase the same num. of items at the same price. 4. alternative pricing structures: basic price, discounts. Main elements of promotional mix Advertising(implemented by ads payperclick) Selling(virtual sales staff, chat) Sales promotion(rewards , coupons) Public relations(blogs , feeds, newsletter) Sponsorship Direct mail Exhibitions Merchandising Packaging (virtual tools , word of mouth) People process and physical evidence Some tactics by which people can be replaced or there work automated: 1. auto responders 2. mail notification 3. call back facility 4. frequently asked quests 5. on site search engines 6. virtual assistants Questions that need to be solved when specifying actions 1. what level of investment in the internet channel is sufficient to deliver these services 2. what training of staff is required. 3. what new responsibilities are required for effective internet marketing 4. are changes in org. structure requir ed to deliver int. based services? 5. what activities are involved in creating and maintaining the website. Barriers and risks of e-proc -competition issues. Eg: in exchanges using collaborative purchasing -possible negative perception from suppliers eg: their margins reduced further from eauctions -negotiated procurement benefits may be shared with other exchange users who may be competitors -creation of catalogues can be a long pricess and costly to suppliers -culture profile within orgs eg: resistance to change SCM Processes Processes thru which inputs are transferred to outputs. Upstream: Suppliers then supplier warehouse(can go directly to manufacturer the B2B company) then independent wholesaler then B2B retailer then distributor then manufacturer the B2B company. Suppliers can go directly to manufacturer the B2B company or can pass also thru supplier agent. Downstream: Manufacturer The B2B company can go directly to customers or pass thru B2B agent. Or go thru the company warehouse(can go directly to customers) then independent wholesaler then B2B retailer then distributor then customers. Drivers of procurement Control: improving compliance , achieving centralization, raising standards and improved auditing of data. Cost: improved buying leverage thru increased supplier competition. Process: rationalization and standardization of e-proc processes giving reduced cycle time Individual performance: knowledge sharing,value-added productivity and productivity improvements Supplier mgt: reduced supplier numbers , supplier mgt and selection integration. Benefits of e-supply chain 1. Increased efficiency of individual processes: if b2b co. Adopts e-procurement it will benefit from reduced cycle time and cost 2. Reduced complexity of the supply chain: B2B co. Will offer the facility to sell direct from its e-commerce site so it will reduce cost of channel dist. 3. Improved data integration: reduce cost of paper preocessing 4. Reduce cost thru outsourcing: lower costs thru price competition and reduced spend on manu capacity and holding. 5. Innovation: more flexible in delivering a more diverse range of products and reduce time market to achieve better customer responsiveness Push and Pull Push: a supply chain that emphasizes distribution of a product to passive customers. (Supplier manu. Distributor retailer customer) Aim is to optimize the production process for cost and efficiency Pull: an emphasis on using the supply chain to deliver value to customers who are actively invovled in product and service specification. Aim is to enhance product and service quality. Types of e-procurement E-sourcing: finding potential new suppliers using the int during the ingo gathering step of procurement process E-tendering: process of screenin suppliers and sending suppliers requests for info E-informing: qualification of suppliers for suitability E-reverse auctions: enable the purchasing company to buy goods and services that have lowest prices E-MRO and ERP: involve the purchase and supply of products which are the core of the mode e-proc apps. Vertical integration Extent to which supply chain act. Are undertaken and controlled within the org. Characteristics: majority of manu in-house and distant relationships with suppliers Virtual integration: majority of supply chain activities are undertaken and controlled outside the org. By third parties Charac: total reliance on third parties and close relationships with suppliers Vertical disintegration: move to outsourcing and network of suppliers, helps in cost reduction The value chain Model that considers how supply chain activities can add value to products and services delivered to the customer Virtual value chain involves electronic commerce used to mediate traditional value chain activities such as market research, procurement, logstics.. alternatives: traditional value chain model that distiguishes between primary actvts that contribute directly to getting goods and services to the customer and support activities to take place. And revised chain model Exp: if a retailer shares info electronically with a supplier about a product, this can enhance the value chain of both parties since the time for ordering can be reduced and lower costs. Types of intermediaries for e-proc -traditional manufac which produce physical goods that are sold to other customers -direct sales manu: they bypass intermed and sell direct to end consumers via web -value-added proc partners: act as intermed to sell product and services to other businesses(travel agents) -online hubs: industry specific vertical portal that generate revenues via B2B exchange -knowledge experts whos produce info goods -online info services provide unique info to end users -online retailers include startup e-businesses -portal communities seek to aggregate diff online info services into an integrated customer experience ex: online bill payment Systems Stock control system: relates mainly to production-related procurement CD or web-based catalogue: paper catalogues have been replaced by electronic forms that make it quicker to find suppliers E-mail or database-based workflow systems: integrate the entry of the order by the originator. Order-entry on website: the buyer often has the opportunity to order directly on the suppliers website Accounting systems: networked accounting sustems enable staff in the buying department to enter an order which can then be used by accounting staff to make payment when the invoice arrives Integrated e-procurement or ERP: these aim to integrate all the facilities above and will aolso include integration with supploers systems What is logistics? Logistics is the time related positioning of resource, or the strategic management of the total supply chain. It is used to refer not to all supply chain activities but specifically to the management of logistics or inbound(mgt of material resources entering an org from its suppliers) and outbound log. (Mgt of resources supplied from an org to its customers and intermediaries) Virtual organization Org which uses info and communications tech to allow it to operate withouy clearly defined physical boundaries btwn diff functions. CHARACTERISTICS: -lack of physical structure: virtual org have littlr or no physical existence. -reliance on knowledge: the lack of physical facilities and contacts means that knowledge is the key driving force. -Use of comm. Tech: they rely on IT -Mobile work: reliance on comm tech means that they do not rely only on plant or office to work. -Boundaryless and inclusive: they have fuzzy boundaries. Flexible: can be pulled together quickly Value network Or external value chain which is the links betwn an org and its strategic and non strategic partners that form its ext ernal value chain. Partners of a VN: supply-side partners: suppliers ,b2b exchanges, wholesalers Partners that fulfil primary or core value chain activites Sell-side partners: b2b exchanges,wholesalers,distributors,and customers Value chain partners who supply services that mediate the internal and external value chain Types of procurement Production related proc: relate to manufacturing of products. Operating procurement: thats supports the operations of the whole business and includes office supplies ,furniture,info systems..
Thursday, September 5, 2019
Evaluation of Code Smells Detection Using Meta-heuristics
Evaluation of Code Smells Detection Using Meta-heuristics Evaluation of code smells detection using Meta-heuristicsà Optimization algorithm Ragulraja.M Abstract-The development of software systems over many years leads to needless complexity and inflexibility inà design which leads to a large amount of effort for enhancements and maintenance. To take code smells detection as aà distributed optimization problem. The intention is that to aggregates different methods in parallel way to achieve aà common goal detection of code smells. To this conclusion, it utilized Parallel Evolutionary algorithms (P-EA) whereà numerous evolutionary algorithms with adaptation are executed in parallel cooperative manner, to find unanimityà between detection of code smells. An experimental results to compare the execution of our cooperative P-EA method withà random search, two genetic based approaches and two bad designs detection techniques are found to provide theà statistical measure of results witness to support the claim that cooperative P-EA is more economic and potential than theà art detection approaches based on benchmark of open source systems, whereas the results are generated in terms ofà precision and recall incurred on various code smells types. In this approach should corroborate on an extra code smellsà types with the objective of resolve the common applicability of our methodology. Keywords-Parallel Evolutionary Algorithm, Software Metrics, Code smells, Software Quality Engineering. I.INTRODUCTION Software maintenance projects are veryà costly. The total maintenance costs of Softwareà project are estimated to 40%-70% of the total cost of the lifecycle of the project consequently, reducing theà effort spent on maintenance can be seen as a naturalà way of reducing the overall costs of a softwareà project. This is one of the main reasons for the recentà interest in concepts such as refactoring and codeà smells. Hence, researchers have proposed severalà approaches to reduce defects in software .Suggestedà solutions include improvement of clarity in softwareà design, effective use of process and product metrics,à achievement of extensibility and adaptability in theà development process. The research focusing on theà study of bad software designs also called bad smellsà or code smells. To avoid these codes smellsà developers to understand the structure of source code. The large systems of existing work in badà smells or code smells detection relies on declarativeà rule specification. In these specifications, rules areà manually constructed to identify symptoms that canà be used for categorization code smells with objectà oriented metrics information. Each code smell, rulesà are defined in the form of metrics combinations. Many studies reported that manual categorizationà with declarative rule specification can be large. Theseà need a threshold value to specify the code smells. Further problem is that translation from symptoms toà rules is not obvious because there is no unanimityà symptom based description of bad smells. When unanimity occurs, the correlation of symptoms couldà be consociated with code smells types, it leads toà precise identification of code smells types. To handle these problems, we plan to extendà an approach based on use of genetic programming toà provide detection rules from the examples of codeà smells detection with metric combinations. However,à the quality of the rules depends on the behavioralà aspects of code smells, and it is not easy to confirmà that coverage also because there is still someà precariousness involves in detected code smells dueà to the difficulty to evaluate the coverage of the baseà of code smell examples. In another past work, we proposed techniqueà based on an artificial immune system metaphor toà detect code smells by deviation with well designedà systems. Thus, we believe in that an effective methodà will be to merge with detection algorithms toà discover consensus when detecting code smells. We intend to provide code smells detection as aà distributed optimization problem.The implementationà of our approach can be established by combiningà Optimization process in parallel manner to encounterà consensus involving detection of code smells. II. RELATED WORKS: There are various studies that have mainlyà based on the code smells detection in softwareà engineering using different methods. Theseà methodologies range from fully automatic detectionà to direct manual inspection. However,there is noà work that focuses on merging various detectionà algorithms to find unanimity when identifying codeà smells. In this work, the classification existingà approach for detection of code smells into variousà broad categories: symptom based approaches, manualà approaches, metric based approaches, search basedà approaches and cooperative based approaches. 2.1 Manual approaches: The software maintainers should manuallyà inspect the program to detect existing codeà anomalies. In addition, they mentioned particularà refactoringà ¢Ã¢â ¬Ã
¸s for each code smells type. Theà technique is to create a set of ââ¬Å"reading techniquesâ⬠à which help a reviewer to ââ¬Å"readâ⬠a design artifact forà calculating related information. The demerits ofà existing manual approaches is that they are finally aà human centric process which involves a great humanà effort and strong analysis and interpretation attemptà from software maintainers to find design fragmentsà that are related to code smells.Furthermore, theseà methods are time consuming, error prone and focusà on programs in their contexts. Another significantà issue is that locating code smells manually has beenà prescribed as more a human intuition than an accurateà science. 2.2 Metric based approaches: The ââ¬Å"detection strategyâ⬠mechanism forà formulating metric based rules for finding deviationsà from well design code. Detection strategies permits toà maintainer to directly find classes or methodsà subjected by a particular design smells. Theseà detection strategies for capturing about ten importantà flaws of object oriented design found in literature. Ità is accomplished by evaluating design quality of anà object oriented system via quantifying deviationsà from good design heuristics and principles byà mapping these design defects to class level metricsà such as complexity, coupling and cohesion by defining rules. Unfortunately, multi metrics neitherà encapsulate metrics in a more abstract construct,norà do they permit a negotiable combination of metrics. In common, the effectiveness of combining metric orà threshold is not clear, that is for each code smell,à rules that are declared in terms of metricà combinations need an important calibration effort toà find the fixing of threshold values for each metric. 2.3 Search based approaches: This approach is divined by contributions inà the domain of search based software engineering. SBSE uses search based approaches to resolveà optimizations problems in software engineering. Once the task is consider as a search problem, severalà search algorithms can be employed to solve thatà problem. Another approach is based on search basedà techniques, for the automatic identification ofà potential code smells in code. The detection focusedà on thenotion that more code deviates from goodà codes, the more likely it is bad. In another work,à detections rule will be produced and is described as aà combination of metrics or thresholds that betterà similar to known an examples of bad smells. Then,à the correction solutions, a combination of refactoringà operations, should reduce the number of bad smellsà detected using the detection rules. 2.4 Cooperative based approaches: Some cooperative approaches to referenceà software engineering problems have been proposedà recently, in this program and test cases co-evolve,à regulating each other with the aim of fixing theà maximum number of bugs in the programs. Theà objective is to improve the effectiveness of obtainedà test cases by evaluating their capabilities to avoidà mutants.The P-EA proposal is vary from existing coevolutionaryà approaches, this proposal based on twoà populations that are referencing the same problemà from various perspectives. Finally, the genetic basedà approaches are executed in parallel in our P-EAà framework. III. PROPOSED SCHEME In this paper, we suggested a new searchà based approach for detection of code smells. In thisà approach a parallel metaheuristic optimizationà algorithm adaptation, two genetic populations areà involves simultaneously with the target of eachà depending on the current population of other in aà parallel cooperative manner. Both populations areà generated, on the similar open source systems toà evaluate, and the solutions are punished based on theà intersection between the results of two populationsà are found. We extend our approach to various codeà smells types in order to resolve about commonà applicability ofcooperative parallel search basedà software engineering. Moreover, in this work we notà only focus on the detection of code smells but alsoà concentrate automated the correction of code smells. Furthermore, in this paper we consider theà essential need of code smells during the detectionà procedure using existing code changes, classes andà coupling complexity. Hence, the detected code smellsà will be ranked based on the severity score and also anà important score. We will measure also the use ofà more than two algorithms executed in parallelà manner as a part our work to generate results of moreà accuracy than art detection approach. The negativeà impact on the code smells can be removed byà applying more than two algorithms in cooperativeà manner ità ¢Ã¢â ¬Ã
¸s difficult to find the consensus betweenà the code smells. The research work will direct ourà approach to several software engineering problemsà such as software testing and quality assurance. IV. PROPOSED ARCHITECTURE Fig 1:system architecture 1. Metrics Evaluation 2. Evolutionary Algorithms 3. Code Smell Detection 4.1 METRICS EVALUATION 4.1.1 CK METRIC SUITE Chidember and kemerer proposed a six metricà suite used for analyzing the proposed variable. The sixà metric suite are: 1. Weighted Method Per Class(WMC): Consider a class C1 with methods M1â⬠¦.Mnà that are included in class. Let C1,C2â⬠¦Cn be the sum ofà complexity. WMC=à £ M 2. Depth Of Inheritance(DIT): The maximum length from the node to theà root of the tree. 3. Number Of Children(NOC): Number of immediate subclasses subordinatedà to a class in the class hierarchy. 4. Coupling Between Objects(CBO): It is a count of the number of other classes toà which it is coupled. 5. Response For a Class (RFC) It is the number of methods of the class plusà the number of methods called by any of thoseà methods. 4.1.2 Lack Of Cohesion of Methods (LCOM)à Measure the dissimilarity of methods in aà class via instanced variables. 4.2 EVOLUTIONARY ALGORITHMS The fundamental think of both algorithms isà to explore the search space by devising a populationà of candidate solutions, also called individuals,à germinate towards a ââ¬Å"goodâ⬠solution of a uniqueà problem. To measure the solutions, the fitnessà function in both algorithms has two components. Forà the first component of the fitness function, GPà evaluates the detection rules based on the coverage ofà code-smells examples. In GP, a solution is combinedà of terminals and functions. Hence, while applying GPà to clear particular problem, they should be carefullyà collected and fashioned to fulfil the requirements ofà the current problem. Afterwards, evaluating largeà parameters concerned to the code-smells detectionà problem, the terminal set and the function set areà recognized as follows. The terminals fit to differentà quality metrics with their threshold values (constantà values). The functions that can be used between theseà metrics ar e Union (OR) and Intersection (AND). The second algorithm run in parallel isà genetic algorithm that generates detectors from welldesignedà code examples. For GA, detectors defendà generated artificial code fragments dignified by codeà elements. Thus, detectors are mentioned as a vectorà where each dimension is a code element. We defendà these elements as sets of predicates. All predicateà type represents to a construct type of an objectorientedà system. Then, a set of best solutions areà collected from P-EA algorithms in each iteration,à Bothalgorithms interact with one other victimizingà the second component of the fitness function calledà intersection function. 4.3 CODE SMELLS DETECTION Code smells are design flaws that can beà solved by refactoringà ¢Ã¢â ¬Ã
¸s. They are considered as flagsà to the developer that some parts of the design may beà inappropriate and that it can be improved. For theà purpose of this work, we discuss a few representativeà code smells. There are a lot of code smells mentionedà in the development of this work. A thorough catalogà of code smells can be found in Fowlers refactoringà book. As this work focuses on program analysis, code smells discussed in this work include those thatà require analyses. Though this work develops only aà subset of the code smells, it provides some groundsà which can be adapted to other types of code smells. The set of best solutions from each algorithm isà stored and a new population of individuals isà generated by repetitively choosing pairs of parentà individuals from population p and employing theà crossover operator to them. We admit both the parentà and child variants in the new population pop. Then,à we apply the mutation operator, with a probabilityà score, for both parent and child to assure the solutionà diversity; this produces the population for the nextà generation. While applying change operators, noà individuals are transformed between the parallelà GA/GP. Both algorithms exit when the terminationà criterion is met, and issue the best set of rules andà detectors. At last, developers can use the best rulesà and detectors to find code-smells on new system toà evaluate. V. EXPERIMENTAL RESULTS Fig 2: The impact of the nmber of code smell example on detectionà results Fig 3: Average execution time comparison on the different system. VI. THREATS TO VALIDITY: Conclusion validity related with theà statistical relationship between the treatment andà outcome. The Wilcoxon rank sum test was used withà a 95 percent confidence level to test its importantà differences exist between the measurements forà different treatments. This test makes no suppositionà that the data is normally distributed and is suitable forà ordinal data, so we can be assured that the statisticalà relationships observed are significant. Theà comparison with other techniques not based onà heuristic search; consider the parameters obtainedà with the tools. This can be regarded as a threat thatà can be addressed in the future by developing theà impact of various parameters on the quality of resultsà of DÃâ°COR and JDeodorant. Internal validity is related with the casualà relationship between the treatment and outcome. Toà consider the internal threats to validity in theà utilization of stochastic algorithms since thisà experimental work based on 51 independentà simulation runs for each problem instance and theà obtained results are statistically analyzed by using theà Wilcoxon rank sum test with a 95 percent fairà comparison between CPU times. VII. CONCLUSION AND FUTURE WORK In this approach a parallel metaheuristicà optimization algorithm adaptation, two geneticà populations are involves simultaneously with theà target of each depending on the current population ofà other in a parallel cooperative manner. Bothà populations are generated, on the similar open sourceà systems to evaluate, and the solutions are punishedà based on the intersection between the results of twoà populations are found.Moreover, in this work we notà only focus on the detection of code smells but alsoà concentrate automated the correction of codeà smells.Furthermore, in this paper we consider theà essential need of code smells during the detectionà procedure using existing code changes, classes andà coupling complexity. Hence, the detected code smellsà will be ranked based on the severity score and also anà important score. We will measure also the use ofà more than two algorithms executed in parallelà manner as a part our work to generate result s of moreà accuracy than art detection approach. Future workà should corroborate our method with remaining codeà smell types with the objective conclude about theà common applicability of our methodology. We willà assess also the use of more than the algorithmà accomplish simultaneously as a part of our rest of ourà future work. Another future issue direction attachedà to our approach is to adapt our cooperative parallelà evolutionary approach to various softwareà engineering problems such as software testing andà the following release problem. VIII. REFERENCES 1) WaelKessentini,MarouaneKessentini,HouariSahraoà ui, Slim Bechikh:â⬠A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detectionâ⬠IEEE Trans. Softw. Eng.,vol. 40,à no. 9, Sep 2014. 2) N. Moha, Y. G. Gu_eh_eneuc, L. Duchien, and A.à F. Le Meur, ââ¬Å"DECOR: A method for the specificationà and detection of code and design smells,â⬠IEEEà Trans. Softw. Eng., vol. 36, no. 1, pp. 20ââ¬â36,à Jan./Feb. 2010. 3) Chidamber, S., Kemerer, C.: ââ¬Å¾A metrics suite forà object oriented designà ¢Ã¢â ¬Ã
¸,IEEE Trans. Softw. Eng.,à 1994, 20, (6), pp. 476ââ¬â493.à 4) Mark Harman and AfshinMansouri.:â⬠Search Basedà Software Engineering: Introduction to the Specialà Issue of the IEEE Transactions on Softwareà Engineeringâ⬠,â⬠IEEE Trans. Softw. Eng., vol. 36, no.à 6,Nov./Dec. 2010.à 5) F. Khomh, S. Vaucher, Y. G. Gu_eh_eneuc, and H.A. Sahraoui, ââ¬Å"A bayesian approach for the detectionà of code and design smells,â⬠in Proc. Int. Conf.à Quality Softw., 2009, 305ââ¬â314. 6) R. Marinescu, ââ¬Å"Detection strategies: Metrics-basedà rules for detecting design flaws,â⬠in Proc. 20th Int.à Conf. Softw. Maintenance, 2004, pp. 350ââ¬â359. 7) M. Kessentini, W. Kessentini, H. A. Sahraoui, M.à Boukadoum, and A. Ouni, ââ¬Å"Design defectsà detection and correction by example,â⬠in Proc. IEEEà 19th Int. Conf. Program Comprehension, 2011, pp.à 81ââ¬â90. 8) T. Burczy_nskia, W. Ku_sa, A. Dà »ugosza, and P.à Oranteka,ââ¬Å"Optimization and defect identificationà using distributed evolutionary algorithms,â⬠Eng.à Appl. Artif. Intell., vol. 4, no. 17, pp. 337ââ¬â344, 2004. 9) A. Ouni, M. Kessentini, H. A. Sahraoui, and M.à Boukadoum, ââ¬Å"Maintainability defects detection andà correction: A multiobjective approach,â⬠Autom.à Softw. Eng., vol. 20, no. 1, pp. 47ââ¬â79, 2012. 10) O. Ciupke, ââ¬Å"Automatic detection of designà problems in objectoriented reengineering,â⬠in Proc.à Int. Conf. Technol. Object-OrientedLanguage Syst.,à 1999, pp. 18ââ¬â32. 12) G. Travassos, F. Shull, M. Fredericks, and V. R.à Basili, ââ¬Å"Detecting defects in object-oriented designs:à Using reading techniques to increase softwareà quality,â⬠in Proc. Int. conf. Object-Orientedà Program.,Syst., Languages, Appl., 1999, pp. 47ââ¬â56. 13) M. Harman, S. A. Mansouri, and Y. Zhang,à ââ¬Å"Search-based software engineering: Trends,à techniques and applications,â⬠ACM Comput. Surv.,à vol. 45, no. 1, 61 pages. 14) A. Arcuri, X. Yao, ââ¬Å"A novel co-evolutionaryà approach to automatic software bug fixing,â⬠in Proc.à IEEE Congr. Evol. Comput., 2008, pp. 162ââ¬â168. 15) M. J. Munro, ââ¬Å"Product metrics for automaticà identification of ââ¬Å¾Bad Smellà ¢Ã¢â ¬Ã
¸ design problems in Javaà source-code,â⬠in Proc. IEEE 11th Int. Softw. Metricsà Symp., 2005, pp. 15ââ¬â15.à 16) W. Banzhaf, ââ¬Å"Genotype-phenotype-mapping andà neutral variation: A case study in geneticà programming,â⬠in Proc. Int. Conf. Parallel Problemà Solving from Nature, 1994, pp. 322ââ¬â332. 17) W. H. Kruskal and W. A. Wallis, ââ¬Å"Use of ranks inà one-criterion variance analysis,â⬠J. Amer. Statist.à Assoc., vol. 47, no. 260, pp. 583ââ¬â621, 1952. 18) W. J. Brown, R. C. Malveau, W. H. Brown, andà T. J. Mowbray, ââ¬Å"Anti Patterns: Refactoring Software,à Architectures, and Projects in Crisisâ⬠. Hoboken, NJ,à USA: Wiley, 1998. 19) N. Fenton and S. L. Pfleeger, ââ¬Å"Software Metrics:à A Rigorous and Practical Approachâ⬠. Int. Thomsonà Comput. Press, London, UK, 1997.à 20) Emerson Murphy-Hill, Chris Parnin, and Andrewà P. Blackâ⬠How We Refactor, and How We Knowà Itâ⬠,IEEE Trans. Softw. Eng.,vol. 38,no. 1, Jan./Feb.à 2012. 21) M. Fowler, K. Beck, J. Brant, W. Opdyke, and D.à Roberts, ââ¬Å"Refactoring: Improving the Design ofà Existing Codeâ⬠. Reading, MA,USA: Addisonà Wesley, 1999.
Wednesday, September 4, 2019
Calculators Essays -- Essays Papers
Calculators Calculators in the Classroom As the world changes and grows, more things are created to make people's everyday lives easier. One tool that can be used in school to help facilitate math is the calculator. This technology allows students to use a machine to obtain answers instead of using PPA (Paper and Pencil Arithmetic). Like any technology, there is fear on how to best use it to help facilitate growth in students. If the calculator is used properly in the classroom, it can be a beneficial tool for pupils. The calculator enables students to concentrate on math instead of focusing on tedious tasks that are not used in everyday life such as long division. If the calculator becomes a tool that elementary students use more often in the classroom, it will only help them become better students of mathematics over time. One of the many things that prevent the calculator from being more widely used in the elementary school are the many negative myths about calculators and how they adversely affect students in elementary schools. One belief that is held by many parents and teachers is that calculators hinder studentsââ¬â¢ ability to grow as thinkers. People believe that the calculator is doing the work instead of the students. This idea is absurd. Pupils need to push the buttons on the machine and in the correct order to come up with the right answer (Lambdin, Lindquist, Reys, Smith & Suydam, 2001). In fact the calculator enables the student to use more of their intellect because the machine allows the student to free itself from performing arduous tasks which allows the student to focus on how he or she obtained the answer (Lambdin et al, 2001). Another impediment to using ca... ...ad to be done so the results would be precise. This one experiment involving a tool of mathematics integrated science and math. This is just one way that the calculators can be used to benefit elementary students. If the calculator is used properly in the classroom, it can be a great tool that benefits students and teachers. This machine allows teachers to focus on other school subjects that they would have spent on teaching aspects of mathematics that are no longer used today. The tool is beneficial to the pupil because if it is used properly, it allows the student to spend time on how they came to answer instead of reaching the answer and leaving class because time ran out. As teachers and students use the calculator on regular basis, more people will see that in fact it is a tool that is necessary for the student to grow and not a hindrance.
Tuesday, September 3, 2019
Seide :: essays research papers
ââ¬Å¾Seideââ¬Å" von Alessandro Baricco Alessandro Baricco Geboren 1958 in Turin, studierte Philosophie und Musik. Er schrieb Musikkritiken und Essays à ¼ber Musik, bevor er mit seinen Roman ââ¬Å¾Seideââ¬Å" (1997), ââ¬Å¾Land aus Glasââ¬Å" (1998) und ââ¬Å¾Novecentoââ¬Å" (1999) den großen Druchbruch erzielte. Mit seiner erfolgreichen Fernseh-Literatursendung ââ¬Å¾Pickwickââ¬Å" und der Grà ¼ndung einer Kreatività ¤tsuniversità ¤t in Turin, der ââ¬Å¾Scuola Holdenââ¬Å", ist Baricco endgà ¼ltig zum Kultautor avanciert. ââ¬Å¾Seideââ¬Å", ist ein literarischer Bestseller, der in wunderschà ¶ner, poetischer Sprache eine leise Geschichte à ¼ber das Begehren erzà ¤hlt. Alessandro Baricco erzà ¤hlt in einer Parabel à ¼ber das Glà ¼ck und seine Unerreichbarkeit. Hauptperson des Buches ist Hervà © Joncour, der als Seidenhà ¤ndler arbeitet und ein ruhiger und ausgeglichener Mensch. Verheiratet ist er mit Hà ©là ¨ne, die als hà ¼bsche Frau mit einer wundervollen Stimme beschrieben wird. Obwohl Hervà © seine Frau liebt, sucht er doch nach Glà ¼ck und Leidenschaft, die er schließlich in Japan, verkà ¶rpert in einer mà ¤dchenhaften Frau, deren Augen nicht asiatisch geschnitten sind, findet. Dieser Frau begehrt er wie er noch keine andere Frau begehrt hat. Doch er sehnt sich nur nach ihr, weil sie fà ¼r ihn unerreichbar ist. Die Sehnsucht nach dieser Frau verfolgt ihn jahrelang, bis er endlich bemerkt, daß er das große Glà ¼ck und die Liebe bereits in seiner eigenen Frau gefunden, jedoch nie wahrgenommen hat. Doch erst als seine Frau stirbt, begreift er es. Um sich davor zu bewahren, unglà ¼cklich zu sein, verbringt er die Tage damit, seinen à ¼blichen Gewohnheiten nach zugehen. Doch manchmal ging er auch zu einem See hinunter, ââ¬Å¾... denn es schien ihm, als zeichne sich auf dem Wasser das unerklà ¤rliche, schwerelose Schauspiel dessen ab, was sein Leben gewesen war.ââ¬Å" Nur zweimal in seinem Leben hat er sich so gefà ¼hlt. Beim ersten Mal, als ihm klar wurde, daß er die rà ¤tselhafte Frau, die er so sehr begehrte, nicht mehr wiedersehen wird und nach dem Tod seiner Frau, als er seine große Liebe verlor. Hervà © Joncour, ein Seidenhà ¤ndler, lebt mit seiner Frau Hà ©là ¨ne ein ruhiges Leben in Lavilledieu. Nur einmal im Jahr fà ¤hrt er durch die ganze Welt, um Larven von Seidenraupen einzukaufen. Và ¶llig unerwartet bricht eine Seuche unter den Seidenraupen in Afrika auf und Hervà © fà ¤hrt nach Japan, um seine Einkà ¤ufe zu erledigen. Dort begegnet er Hara Kei, einen reichen japanischen Aristokraten, mit den er fortan seine Geschà ¤fte fà ¼hrt und einer Frau, die sein Leben fà ¼r immer verà ¤ndern sollte. Er wechselt kein einziges Wort mit ihr und doch spà ¼rt der Gewissheit, sie wieder zu sehen. Ein Jahr spà ¤ter bricht Hervà © wieder auf, um nach Japan zu reisen.
Monday, September 2, 2019
Essay --
From my previous journal I stated that I was very interested in finishing the rest of the books in the Odyssey. Well I have finished all of them and got some of my questions answered in class and I got some question that I did not know I did not understand answered too. In book 4 I left off with wondering why Athena protects Telemachus when sheââ¬â¢s still upset with. When finishing up the rest of the Odyssey there are many things that are many happening. You have everything from; ââ¬Å"all of the gods are accepting that Poseidon has gathered again on Mount Olympus to discuss Odysseusââ¬â¢s fateâ⬠in book 5. To ââ¬Å"Athena makes the Ithacans forget the massacre of their children and recognize Odysseus as king, and making Peace being restoredâ⬠in book 24. How one man goes through all of this is amazing to me. The Odyssey is nothing more than Odysseus telling us his story and all the things that he had gone through. Odysseus encounters many things that people do not believe to be true because all of his crew is dead and no one had ever donââ¬â¢t anything like he is saying that he has. Because his crew is dead there is no one to help tell all of the great adventures that they endeared. The main question I feel that never truly gets answered in the reading is that of wither or not the stories are true. Does it really take someone who loves his family 20 years to make it home? To return to his wife and son? And are the wife and son still there waiting for him to return. We know in the reading that they are but how does he know this? Is it because thatââ¬â¢s how it was back then or why? Why did it take him the seven years for him to build a boat to leave the island of Cyclopes and start to make is way back home. When he finally manages to get the boat made to ... ... I keep saying this but I really donââ¬â¢t know wither or not I can take this story ad being true I things some of the things could have happened but not all of them. Iââ¬â¢m not sure why I find it so hard to believe but I do. While reflecting on this reading I have really stopped to think about what I am reading and if I believe it to be true or not. Could the Odyssey be written different so that itââ¬â¢s more understandable? Or should we already be able to understand the text? I feel that the book could take a whole semester to cover it we were to truly take the time to truly read it not just read it and go on. I can see myself rereading the books and trying to understand more and looking for things that I have missed the first time though. Works Cited Brian Wilkie, J. H. (2001). Lliterature of the Western World Vol. 1. New Jersey: Prentice Hall. The Odyssey, pages 273-594
Sunday, September 1, 2019
Determining of the equilibrium constant for the formation of FeSCN2+ Essay
Determining of the equilibrium constant for the formation of FeSCN2+ Introduction The objective of this experiment was to determine the equilibrium concentration and then determine Kc. A dilution calculation was formed to determine the concentration of SCN- and Fe(SCN)2+. Each cuvette was filled to the same volume and can be seen in table 1. Then the absorbances were recorded from each cuvette and can be seen in table 1. A Beerââ¬â¢s law plot was made from the data that was recorded from the optical absorbance. During the second part of the experiment Fe (NO3)3 was added and diluted with HNO3 . All of the cuvettes were mixed with the same solutions in the second part of the experiment, which can be seen in table 2. A dilution calculation was made to determine the initial concentration of Fe3+and SCN-. Then the formula Abs + b/ slope was used to determine the equilibrium concentration which lead to the calculation of each Kc per trial. Chemical reaction Fe3+ + SCN- FeSCN2+ à Conclusion: An acid and a base were mixed together throughout the experiment, which resulted in a bright orange color. It was determined that using the colorimeter at 565nm the would give the optimum wavelength because it was the closest absorbance to 430nm. All of the cuvettes were filled to 3mL so there would not be another dependent variable. Whenever Fe3+ would come in contact with SCN- there would be a color change. Relatively all of the Kc were close to each other as they should be because the only variable that affects a change Kc and the temperature was kept consent throughout the experiment. The average Kc from all five trials is 1.52 x 10 2.
Epidemiology and Communicable Diseases: HIV
Epidemiology & Communicable Diseases HIV or the Human Deficiency virus is like other viruses including the flu, but the one thing that makes this virus so different than any other is that the body is unable to clear this one out completely. Once someone is infected, there is no cure. Over time, HIV can also hide or mask itself in the body's cells. The cells within a person's body that fght off infection are called CD4 cells or T cells. HIV attacks these cells and copies or replicates itself inside these cells, then destroys them.HIV over time will estroy so many of these cells that the body is unable to fght off infection anymore. When this starts happening, AIDS or Acquired Immunodeficiency Syndrome happens which is the final stage of HIV. HIV is transmitted through someone's blood or bodily fluids which can encompass semen, breast milk, vaginal fluids, and rectal mucous (AIDS. GOV, 2013) and usually it is passed from one person to another through sexual contact; however, HIV can al so be transmitted through childbirth or IV drug use. Healthcare workers are also at risk from infected bodily fluids.Fluids from an nfected person can deliver the virus to someone else's bloodstream. Within 2-4 weeks, and up to as late as 3 months, exposure to HIV can happen with a sudden onset of flu like symptoms including fever, chills, rash, night sweats, muscle aches, sore throat, fatigue, swollen lymph nodes or ulcers in the mouth (CDC, 2013). Sometimes no signs or symptoms of infection are present in someone with HIV. Certain individuals may feel sick as HIV turns into AIDS or have occasional bouts of sickness, but not really know or feel they are infected.When HIV progresses to HIV, he flu like sign and symptoms mentioned earlier can become far more severe. Many of the complications stemming from HIV are opportunistic infections, which happen in patients with a weakened immune system (CDC, 2013). ââ¬Å"Some of these opportunistic infections include tuberculosis, salmonellos is, cytomeglaovirus, candidiasis, cryptococcal meningitis, toxoplasmosis, cryptosporiosis, Wasting Syndrome, neurological problems, and kidney disease (Mayo Clinic, 2013). Specific skin cancers including Kaposi's Sarcoma and lymphomas also happen in patients who are HIV positiveâ⬠(Mayo Clinic, 2013).Antivirals are the treatment for HIV and presently there is no known cure. Treatment most often involves combinations of different drugs to avoid creating strains of the virus that are immune to single drug treatments (Mayo Clinic, 2013). The number of CD4 or T cells monitors treatment response. The viral load should be undetectable while undergoing antiviral therapy. The count is checked when treatment starts and usually monitored every 3-6 months. Even if someone has an undetectable viral load, the spreading of HIV is still a possibility.According to estimates and numbers provided by the CDC, about one and half million people 13 years of age and younger is HIV positive. Demograph ics also show that almost 20% of people who are infected do not know they have the virus. The CDC estimates that now every year, there are about 50,000 new cases diagnosed (2013). At risk groups include gay men, bisexual people, and African Americans (CDC, ) Young Atrican American males are at greatest risk tor contracting HIV among various ethnicities and races (CDC, 2013).An individual's risk for HIV or social determinants of health related to HIV is income, education, geographic region, overty, gender orientation, early childhood experiences, and alcohol or substance abuse. The CDC states, ââ¬Å"that by reducing the number od new HIV infections and improving the health and well-being of those already infected with HIV depends on changing the social determinants that place people at risk of infectionâ⬠(CDC, 2-13). The epidemiological triangle of HIV consists of three things: the person, the causative agent, or the environment (Smith, 169).The causative agent that causes AID S is HIV or the virus itself. The host is a person in the case of HIV and the environment is the either the host or the agent, but a factor that influences interaction between the two. The epidemiological triangle consists of three things: the person, the causative agent, or the environment (Smith, 169). In the triangle for HIV, the agent that causes AIDS is HIV or the virus. The host is a person in the case of HIV. The environment is neither the host nor the agent, but something that influences interaction between the two (Smith, 169).The host factors for HIV include age, sex, ethnic background, race, sexual orientation, education, and economic status (Smith, 169). The agent actors or causative agent for HIV are the virus itself and the mode of transmission, life cycle and virulence of the virus (Smith, 169). The environmental factors for HIV include social and economic considerations including family, community, political organization, public policy, regulations, institutions, wor kplace, occupation, economic status, technology, mobility, housing population density, attitudes, customs, culture, health practices, health services (Smith 169-170).A community health nurse with an emphasis on HIV/AIDS would work in a community or public health setting, educating t risk groups about safe sex practices and the dangers of sharing needles. Ideally, the nurse would connect patients to support groups and services, teach patients or people in the community about the prevention of the spreading of the disease, and help administer treatments and medications. Some important issues that nurses are bringing to the forefront in todays world include implementing strategies to keep HIV patients engaged in routine HIV medical and nursing care, incorporating prevention research findings to help reduce transmission locally and globally, carrying out outine HIV testing in health care settings, ensuring access to antiretroviral drugs, and preparing for emerging issues in HIV care suc h as diabetes, liver disease, obesity and elder careâ⬠(Kirton, 2007, p. 8). The Global Fund to fight AIDS, Tuberculosis and Malaria is a national organization that channels a portion of its funds to the international financing for he fght against HIV and AIDS. It also gives funds to strengthening health systems, as most are inadequate to educate and inform communities and people about the prevention of HIV. Programs supported by the Global Fund give to communities with lifesaving ntiviral therapies and counseling on the prevention of the virus.
Subscribe to:
Posts (Atom)