Friday, September 6, 2019

E-Bussiness Essay Example for Free

E-Bussiness Essay Intermediary analysis, competitor analysis, demand analysis, opportunities +threats, SLEPT factors, resource analysis Demand analysis Examines current and projected customer use of each digital channel and different services within diff. target markets it can be determined by asking for each market: What % of cust. Bus. Have acces to the int. – what % of members of the buying unit in this bus. Have acces to the int. – what % of cust. Are prepared to purch. Ur product online. Customer demand analysis 2 parts: org. arket (internet access , visit site , purchase influenced , buy online) Customer market( Same ) segmentation Is the identification of diff. groups within a target market in order to develop diff. product offerings and comm. For the groups Stages in target marketing strategy: 1- segmentation(informed by market research and informs market segment definition) 2- target marketing (evaluates and select target segments it is informed by demand analysis and informs select online targeting and target segments) 3- positioning ( identify proposition for each segment ,informs core brand proposition,online value prop. 4- planning (deploy resources to achieve plan, informed by evaluation of resources and informs online marketing mix restructuring) Diff types of segmentation variables 1. behavior 2. attitude and preferences 3. lifestyle and psychographics 4. demographic profile data 5. unknown Questions To help develop a customer centric strategy for e-marketing -who are our customers -how are their need changing -which do we target -how can we add value -how do we become first choice(positioning ,differential advantage, online value proposition) 6 I’s The difference btwn new media and traditional media has been developed as the 6 I’s: -Interactivity: (enables companies to communicate with customers in a new way) pull marketing, the consumer is pro active with interacting with companies thru actively seeking info thru search engines. Push marketing, comm. Are broadcasts from an advisor to consumer . In interactivity we have dialogue not monologue(2 way feedback) -Intelligence: the int. can be used as a low cost method of collecting marketing research (everytime a user clicks on a link this is recorded and can be analyzed with the web analytics tool) Individualization: It is as personalization and it is an important aspect of achieving customer relationship management online thru extranets , thru B2B , it is an example of mass customization where generic customer info is supplied for particular segments, this means in a traditional media u send same msg to all the customers but in new media u can send diff. sgs to each customer and have diff feedback from them. -Integration: how the int. can be used as an integrated comm. Tool : as an intermediary btwn company and customer we can have a web an email a phone a mail or a person , the int. can be used as a direct response tool , the website can have a direct response or a call back facility , the int. an be used to support the buyi ng decision and to support customer service. -Industry restructuring: disintermediation, reintermediation and countermediation are key concepts of industry restructuring that should be considered by any company developing an e marketing strat. -Independence of location: to be globalized , the int. makes it possible to sell a country without a local sale or customer service force. P’s Used to provide new opportunities for the marketer 7 P’s(marketing mix) Product: quality and branding Promotion: sales promotion , direct marketing Price: list discounts , positioning Place: trade channels , segmented channels People: individuals on marketing activities, recruitment, training Process: customer focus , business led Physical evidence: sales and staff contact experience of brand , product packaging Different price points Subscription: sign Pay-per-view: a fee for a single download or viewing session Bundling: diff channels or content can be ffered as individual products or gr oup at a reduced price compared to pay per view Implications of the internet 1. Increase price transparency and its implications on differential pricing. Supplier can use the tech. for differential pricing , they must use it with precaution to don’t let price discrimination. Pricing is only one variable. 2. downward pressure on price. Purchase of some products that have not traditionally been thought as commodities may become more price sensitive. 3. new pricing approaches. There is two approaches: dynamic pricing . prices can be updated in real time according to the customer. Aggregated buying is a form of customer union where buyers purchase the same num. of items at the same price. 4. alternative pricing structures: basic price, discounts. Main elements of promotional mix Advertising(implemented by ads payperclick) Selling(virtual sales staff, chat) Sales promotion(rewards , coupons) Public relations(blogs , feeds, newsletter) Sponsorship Direct mail Exhibitions Merchandising Packaging (virtual tools , word of mouth) People process and physical evidence Some tactics by which people can be replaced or there work automated: 1. auto responders 2. mail notification 3. call back facility 4. frequently asked quests 5. on site search engines 6. virtual assistants Questions that need to be solved when specifying actions 1. what level of investment in the internet channel is sufficient to deliver these services 2. what training of staff is required. 3. what new responsibilities are required for effective internet marketing 4. are changes in org. structure requir ed to deliver int. based services? 5. what activities are involved in creating and maintaining the website. Barriers and risks of e-proc -competition issues. Eg: in exchanges using collaborative purchasing -possible negative perception from suppliers eg: their margins reduced further from eauctions -negotiated procurement benefits may be shared with other exchange users who may be competitors -creation of catalogues can be a long pricess and costly to suppliers -culture profile within orgs eg: resistance to change SCM Processes Processes thru which inputs are transferred to outputs. Upstream: Suppliers then supplier warehouse(can go directly to manufacturer the B2B company) then independent wholesaler then B2B retailer then distributor then manufacturer the B2B company. Suppliers can go directly to manufacturer the B2B company or can pass also thru supplier agent. Downstream: Manufacturer The B2B company can go directly to customers or pass thru B2B agent. Or go thru the company warehouse(can go directly to customers) then independent wholesaler then B2B retailer then distributor then customers. Drivers of procurement Control: improving compliance , achieving centralization, raising standards and improved auditing of data. Cost: improved buying leverage thru increased supplier competition. Process: rationalization and standardization of e-proc processes giving reduced cycle time Individual performance: knowledge sharing,value-added productivity and productivity improvements Supplier mgt: reduced supplier numbers , supplier mgt and selection integration. Benefits of e-supply chain 1. Increased efficiency of individual processes: if b2b co. Adopts e-procurement it will benefit from reduced cycle time and cost 2. Reduced complexity of the supply chain: B2B co. Will offer the facility to sell direct from its e-commerce site so it will reduce cost of channel dist. 3. Improved data integration: reduce cost of paper preocessing 4. Reduce cost thru outsourcing: lower costs thru price competition and reduced spend on manu capacity and holding. 5. Innovation: more flexible in delivering a more diverse range of products and reduce time market to achieve better customer responsiveness Push and Pull Push: a supply chain that emphasizes distribution of a product to passive customers. (Supplier manu. Distributor retailer customer) Aim is to optimize the production process for cost and efficiency Pull: an emphasis on using the supply chain to deliver value to customers who are actively invovled in product and service specification. Aim is to enhance product and service quality. Types of e-procurement E-sourcing: finding potential new suppliers using the int during the ingo gathering step of procurement process E-tendering: process of screenin suppliers and sending suppliers requests for info E-informing: qualification of suppliers for suitability E-reverse auctions: enable the purchasing company to buy goods and services that have lowest prices E-MRO and ERP: involve the purchase and supply of products which are the core of the mode e-proc apps. Vertical integration Extent to which supply chain act. Are undertaken and controlled within the org. Characteristics: majority of manu in-house and distant relationships with suppliers Virtual integration: majority of supply chain activities are undertaken and controlled outside the org. By third parties Charac: total reliance on third parties and close relationships with suppliers Vertical disintegration: move to outsourcing and network of suppliers, helps in cost reduction The value chain Model that considers how supply chain activities can add value to products and services delivered to the customer Virtual value chain involves electronic commerce used to mediate traditional value chain activities such as market research, procurement, logstics.. alternatives: traditional value chain model that distiguishes between primary actvts that contribute directly to getting goods and services to the customer and support activities to take place. And revised chain model Exp: if a retailer shares info electronically with a supplier about a product, this can enhance the value chain of both parties since the time for ordering can be reduced and lower costs. Types of intermediaries for e-proc -traditional manufac which produce physical goods that are sold to other customers -direct sales manu: they bypass intermed and sell direct to end consumers via web -value-added proc partners: act as intermed to sell product and services to other businesses(travel agents) -online hubs: industry specific vertical portal that generate revenues via B2B exchange -knowledge experts whos produce info goods -online info services provide unique info to end users -online retailers include startup e-businesses -portal communities seek to aggregate diff online info services into an integrated customer experience ex: online bill payment Systems Stock control system: relates mainly to production-related procurement CD or web-based catalogue: paper catalogues have been replaced by electronic forms that make it quicker to find suppliers E-mail or database-based workflow systems: integrate the entry of the order by the originator. Order-entry on website: the buyer often has the opportunity to order directly on the suppliers website Accounting systems: networked accounting sustems enable staff in the buying department to enter an order which can then be used by accounting staff to make payment when the invoice arrives Integrated e-procurement or ERP: these aim to integrate all the facilities above and will aolso include integration with supploers systems What is logistics? Logistics is the time related positioning of resource, or the strategic management of the total supply chain. It is used to refer not to all supply chain activities but specifically to the management of logistics or inbound(mgt of material resources entering an org from its suppliers) and outbound log. (Mgt of resources supplied from an org to its customers and intermediaries) Virtual organization Org which uses info and communications tech to allow it to operate withouy clearly defined physical boundaries btwn diff functions. CHARACTERISTICS: -lack of physical structure: virtual org have littlr or no physical existence. -reliance on knowledge: the lack of physical facilities and contacts means that knowledge is the key driving force. -Use of comm. Tech: they rely on IT -Mobile work: reliance on comm tech means that they do not rely only on plant or office to work. -Boundaryless and inclusive: they have fuzzy boundaries. Flexible: can be pulled together quickly Value network Or external value chain which is the links betwn an org and its strategic and non strategic partners that form its ext ernal value chain. Partners of a VN: supply-side partners: suppliers ,b2b exchanges, wholesalers Partners that fulfil primary or core value chain activites Sell-side partners: b2b exchanges,wholesalers,distributors,and customers Value chain partners who supply services that mediate the internal and external value chain Types of procurement Production related proc: relate to manufacturing of products. Operating procurement: thats supports the operations of the whole business and includes office supplies ,furniture,info systems..

Thursday, September 5, 2019

Evaluation of Code Smells Detection Using Meta-heuristics

Evaluation of Code Smells Detection Using Meta-heuristics Evaluation of code smells detection using Meta-heuristics  Optimization algorithm Ragulraja.M Abstract-The development of software systems over many years leads to needless complexity and inflexibility in  design which leads to a large amount of effort for enhancements and maintenance. To take code smells detection as a  distributed optimization problem. The intention is that to aggregates different methods in parallel way to achieve a  common goal detection of code smells. To this conclusion, it utilized Parallel Evolutionary algorithms (P-EA) where  numerous evolutionary algorithms with adaptation are executed in parallel cooperative manner, to find unanimity  between detection of code smells. An experimental results to compare the execution of our cooperative P-EA method with  random search, two genetic based approaches and two bad designs detection techniques are found to provide the  statistical measure of results witness to support the claim that cooperative P-EA is more economic and potential than the  art detection approaches based on benchmark of open source systems, whereas the results are generated in terms of  precision and recall incurred on various code smells types. In this approach should corroborate on an extra code smells  types with the objective of resolve the common applicability of our methodology. Keywords-Parallel Evolutionary Algorithm, Software Metrics, Code smells, Software Quality Engineering. I.INTRODUCTION Software maintenance projects are very  costly. The total maintenance costs of Software  project are estimated to 40%-70% of the total cost of the lifecycle of the project consequently, reducing the  effort spent on maintenance can be seen as a natural  way of reducing the overall costs of a software  project. This is one of the main reasons for the recent  interest in concepts such as refactoring and code  smells. Hence, researchers have proposed several  approaches to reduce defects in software .Suggested  solutions include improvement of clarity in software  design, effective use of process and product metrics,  achievement of extensibility and adaptability in the  development process. The research focusing on the  study of bad software designs also called bad smells  or code smells. To avoid these codes smells  developers to understand the structure of source code. The large systems of existing work in bad  smells or code smells detection relies on declarative  rule specification. In these specifications, rules are  manually constructed to identify symptoms that can  be used for categorization code smells with object  oriented metrics information. Each code smell, rules  are defined in the form of metrics combinations. Many studies reported that manual categorization  with declarative rule specification can be large. These  need a threshold value to specify the code smells. Further problem is that translation from symptoms to  rules is not obvious because there is no unanimity  symptom based description of bad smells. When unanimity occurs, the correlation of symptoms could  be consociated with code smells types, it leads to  precise identification of code smells types. To handle these problems, we plan to extend  an approach based on use of genetic programming to  provide detection rules from the examples of code  smells detection with metric combinations. However,  the quality of the rules depends on the behavioral  aspects of code smells, and it is not easy to confirm  that coverage also because there is still some  precariousness involves in detected code smells due  to the difficulty to evaluate the coverage of the base  of code smell examples. In another past work, we proposed technique  based on an artificial immune system metaphor to  detect code smells by deviation with well designed  systems. Thus, we believe in that an effective method  will be to merge with detection algorithms to  discover consensus when detecting code smells. We intend to provide code smells detection as a  distributed optimization problem.The implementation  of our approach can be established by combining  Optimization process in parallel manner to encounter  consensus involving detection of code smells. II. RELATED WORKS: There are various studies that have mainly  based on the code smells detection in software  engineering using different methods. These  methodologies range from fully automatic detection  to direct manual inspection. However,there is no  work that focuses on merging various detection  algorithms to find unanimity when identifying code  smells. In this work, the classification existing  approach for detection of code smells into various  broad categories: symptom based approaches, manual  approaches, metric based approaches, search based  approaches and cooperative based approaches. 2.1 Manual approaches: The software maintainers should manually  inspect the program to detect existing code  anomalies. In addition, they mentioned particular  refactoringà ¢Ã¢â€š ¬Ã… ¸s for each code smells type. The  technique is to create a set of â€Å"reading techniques†Ã‚  which help a reviewer to â€Å"read† a design artifact for  calculating related information. The demerits of  existing manual approaches is that they are finally a  human centric process which involves a great human  effort and strong analysis and interpretation attempt  from software maintainers to find design fragments  that are related to code smells.Furthermore, these  methods are time consuming, error prone and focus  on programs in their contexts. Another significant  issue is that locating code smells manually has been  prescribed as more a human intuition than an accurate  science. 2.2 Metric based approaches: The â€Å"detection strategy†mechanism for  formulating metric based rules for finding deviations  from well design code. Detection strategies permits to  maintainer to directly find classes or methods  subjected by a particular design smells. These  detection strategies for capturing about ten important  flaws of object oriented design found in literature. It  is accomplished by evaluating design quality of an  object oriented system via quantifying deviations  from good design heuristics and principles by  mapping these design defects to class level metrics  such as complexity, coupling and cohesion by defining rules. Unfortunately, multi metrics neither  encapsulate metrics in a more abstract construct,nor  do they permit a negotiable combination of metrics. In common, the effectiveness of combining metric or  threshold is not clear, that is for each code smell,  rules that are declared in terms of metric  combinations need an important calibration effort to  find the fixing of threshold values for each metric. 2.3 Search based approaches: This approach is divined by contributions in  the domain of search based software engineering. SBSE uses search based approaches to resolve  optimizations problems in software engineering. Once the task is consider as a search problem, several  search algorithms can be employed to solve that  problem. Another approach is based on search based  techniques, for the automatic identification of  potential code smells in code. The detection focused  on thenotion that more code deviates from good  codes, the more likely it is bad. In another work,  detections rule will be produced and is described as a  combination of metrics or thresholds that better  similar to known an examples of bad smells. Then,  the correction solutions, a combination of refactoring  operations, should reduce the number of bad smells  detected using the detection rules. 2.4 Cooperative based approaches: Some cooperative approaches to reference  software engineering problems have been proposed  recently, in this program and test cases co-evolve,  regulating each other with the aim of fixing the  maximum number of bugs in the programs. The  objective is to improve the effectiveness of obtained  test cases by evaluating their capabilities to avoid  mutants.The P-EA proposal is vary from existing coevolutionary  approaches, this proposal based on two  populations that are referencing the same problem  from various perspectives. Finally, the genetic based  approaches are executed in parallel in our P-EA  framework. III. PROPOSED SCHEME In this paper, we suggested a new search  based approach for detection of code smells. In this  approach a parallel metaheuristic optimization  algorithm adaptation, two genetic populations are  involves simultaneously with the target of each  depending on the current population of other in a  parallel cooperative manner. Both populations are  generated, on the similar open source systems to  evaluate, and the solutions are punished based on the  intersection between the results of two populations  are found. We extend our approach to various code  smells types in order to resolve about common  applicability ofcooperative parallel search based  software engineering. Moreover, in this work we not  only focus on the detection of code smells but also  concentrate automated the correction of code smells. Furthermore, in this paper we consider the  essential need of code smells during the detection  procedure using existing code changes, classes and  coupling complexity. Hence, the detected code smells  will be ranked based on the severity score and also an  important score. We will measure also the use of  more than two algorithms executed in parallel  manner as a part our work to generate results of more  accuracy than art detection approach. The negative  impact on the code smells can be removed by  applying more than two algorithms in cooperative  manner ità ¢Ã¢â€š ¬Ã… ¸s difficult to find the consensus between  the code smells. The research work will direct our  approach to several software engineering problems  such as software testing and quality assurance. IV. PROPOSED ARCHITECTURE Fig 1:system architecture 1. Metrics Evaluation 2. Evolutionary Algorithms 3. Code Smell Detection 4.1 METRICS EVALUATION 4.1.1 CK METRIC SUITE Chidember and kemerer proposed a six metric  suite used for analyzing the proposed variable. The six  metric suite are: 1. Weighted Method Per Class(WMC): Consider a class C1 with methods M1†¦.Mn  that are included in class. Let C1,C2†¦Cn be the sum of  complexity. WMC=ÃŽ £ M 2. Depth Of Inheritance(DIT): The maximum length from the node to the  root of the tree. 3. Number Of Children(NOC): Number of immediate subclasses subordinated  to a class in the class hierarchy. 4. Coupling Between Objects(CBO): It is a count of the number of other classes to  which it is coupled. 5. Response For a Class (RFC) It is the number of methods of the class plus  the number of methods called by any of those  methods. 4.1.2 Lack Of Cohesion of Methods (LCOM)  Measure the dissimilarity of methods in a  class via instanced variables. 4.2 EVOLUTIONARY ALGORITHMS The fundamental think of both algorithms is  to explore the search space by devising a population  of candidate solutions, also called individuals,  germinate towards a â€Å"good† solution of a unique  problem. To measure the solutions, the fitness  function in both algorithms has two components. For  the first component of the fitness function, GP  evaluates the detection rules based on the coverage of  code-smells examples. In GP, a solution is combined  of terminals and functions. Hence, while applying GP  to clear particular problem, they should be carefully  collected and fashioned to fulfil the requirements of  the current problem. Afterwards, evaluating large  parameters concerned to the code-smells detection  problem, the terminal set and the function set are  recognized as follows. The terminals fit to different  quality metrics with their threshold values (constant  values). The functions that can be used between these  metrics ar e Union (OR) and Intersection (AND). The second algorithm run in parallel is  genetic algorithm that generates detectors from welldesigned  code examples. For GA, detectors defend  generated artificial code fragments dignified by code  elements. Thus, detectors are mentioned as a vector  where each dimension is a code element. We defend  these elements as sets of predicates. All predicate  type represents to a construct type of an objectoriented  system. Then, a set of best solutions are  collected from P-EA algorithms in each iteration,  Bothalgorithms interact with one other victimizing  the second component of the fitness function called  intersection function. 4.3 CODE SMELLS DETECTION Code smells are design flaws that can be  solved by refactoringà ¢Ã¢â€š ¬Ã… ¸s. They are considered as flags  to the developer that some parts of the design may be  inappropriate and that it can be improved. For the  purpose of this work, we discuss a few representative  code smells. There are a lot of code smells mentioned  in the development of this work. A thorough catalog  of code smells can be found in Fowlers refactoring  book. As this work focuses on program analysis, code smells discussed in this work include those that  require analyses. Though this work develops only a  subset of the code smells, it provides some grounds  which can be adapted to other types of code smells. The set of best solutions from each algorithm is  stored and a new population of individuals is  generated by repetitively choosing pairs of parent  individuals from population p and employing the  crossover operator to them. We admit both the parent  and child variants in the new population pop. Then,  we apply the mutation operator, with a probability  score, for both parent and child to assure the solution  diversity; this produces the population for the next  generation. While applying change operators, no  individuals are transformed between the parallel  GA/GP. Both algorithms exit when the termination  criterion is met, and issue the best set of rules and  detectors. At last, developers can use the best rules  and detectors to find code-smells on new system to  evaluate. V. EXPERIMENTAL RESULTS Fig 2: The impact of the nmber of code smell example on detection  results Fig 3: Average execution time comparison on the different system. VI. THREATS TO VALIDITY: Conclusion validity related with the  statistical relationship between the treatment and  outcome. The Wilcoxon rank sum test was used with  a 95 percent confidence level to test its important  differences exist between the measurements for  different treatments. This test makes no supposition  that the data is normally distributed and is suitable for  ordinal data, so we can be assured that the statistical  relationships observed are significant. The  comparison with other techniques not based on  heuristic search; consider the parameters obtained  with the tools. This can be regarded as a threat that  can be addressed in the future by developing the  impact of various parameters on the quality of results  of DÉCOR and JDeodorant. Internal validity is related with the casual  relationship between the treatment and outcome. To  consider the internal threats to validity in the  utilization of stochastic algorithms since this  experimental work based on 51 independent  simulation runs for each problem instance and the  obtained results are statistically analyzed by using the  Wilcoxon rank sum test with a 95 percent fair  comparison between CPU times. VII. CONCLUSION AND FUTURE WORK In this approach a parallel metaheuristic  optimization algorithm adaptation, two genetic  populations are involves simultaneously with the  target of each depending on the current population of  other in a parallel cooperative manner. Both  populations are generated, on the similar open source  systems to evaluate, and the solutions are punished  based on the intersection between the results of two  populations are found.Moreover, in this work we not  only focus on the detection of code smells but also  concentrate automated the correction of code  smells.Furthermore, in this paper we consider the  essential need of code smells during the detection  procedure using existing code changes, classes and  coupling complexity. Hence, the detected code smells  will be ranked based on the severity score and also an  important score. We will measure also the use of  more than two algorithms executed in parallel  manner as a part our work to generate result s of more  accuracy than art detection approach. Future work  should corroborate our method with remaining code  smell types with the objective conclude about the  common applicability of our methodology. We will  assess also the use of more than the algorithm  accomplish simultaneously as a part of our rest of our  future work. Another future issue direction attached  to our approach is to adapt our cooperative parallel  evolutionary approach to various software  engineering problems such as software testing and  the following release problem. VIII. REFERENCES 1) WaelKessentini,MarouaneKessentini,HouariSahrao  ui, Slim Bechikh:†A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection† IEEE Trans. Softw. Eng.,vol. 40,  no. 9, Sep 2014. 2) N. Moha, Y. G. Gu_eh_eneuc, L. Duchien, and A.  F. Le Meur, â€Å"DECOR: A method for the specification  and detection of code and design smells,† IEEE  Trans. Softw. Eng., vol. 36, no. 1, pp. 20–36,  Jan./Feb. 2010. 3) Chidamber, S., Kemerer, C.: „A metrics suite for  object oriented designà ¢Ã¢â€š ¬Ã… ¸,IEEE Trans. Softw. Eng.,  1994, 20, (6), pp. 476–493.   4) Mark Harman and AfshinMansouri.:†Search Based  Software Engineering: Introduction to the Special  Issue of the IEEE Transactions on Software  Engineering†,† IEEE Trans. Softw. Eng., vol. 36, no.  6,Nov./Dec. 2010.   5) F. Khomh, S. Vaucher, Y. G. Gu_eh_eneuc, and H.A. Sahraoui, â€Å"A bayesian approach for the detection  of code and design smells,† in Proc. Int. Conf.  Quality Softw., 2009, 305–314. 6) R. Marinescu, â€Å"Detection strategies: Metrics-based  rules for detecting design flaws,† in Proc. 20th Int.  Conf. Softw. Maintenance, 2004, pp. 350–359. 7) M. Kessentini, W. Kessentini, H. A. Sahraoui, M.  Boukadoum, and A. Ouni, â€Å"Design defects  detection and correction by example,† in Proc. IEEE  19th Int. Conf. Program Comprehension, 2011, pp.  81–90. 8) T. Burczy_nskia, W. Ku_sa, A. D »ugosza, and P.  Oranteka,â€Å"Optimization and defect identification  using distributed evolutionary algorithms,† Eng.  Appl. Artif. Intell., vol. 4, no. 17, pp. 337–344, 2004. 9) A. Ouni, M. Kessentini, H. A. Sahraoui, and M.  Boukadoum, â€Å"Maintainability defects detection and  correction: A multiobjective approach,† Autom.  Softw. Eng., vol. 20, no. 1, pp. 47–79, 2012. 10) O. Ciupke, â€Å"Automatic detection of design  problems in objectoriented reengineering,† in Proc.  Int. Conf. Technol. Object-OrientedLanguage Syst.,  1999, pp. 18–32. 12) G. Travassos, F. Shull, M. Fredericks, and V. R.  Basili, â€Å"Detecting defects in object-oriented designs:  Using reading techniques to increase software  quality,† in Proc. Int. conf. Object-Oriented  Program.,Syst., Languages, Appl., 1999, pp. 47–56. 13) M. Harman, S. A. Mansouri, and Y. Zhang,  Ã¢â‚¬Å"Search-based software engineering: Trends,  techniques and applications,† ACM Comput. Surv.,  vol. 45, no. 1, 61 pages. 14) A. Arcuri, X. Yao, â€Å"A novel co-evolutionary  approach to automatic software bug fixing,† in Proc.  IEEE Congr. Evol. Comput., 2008, pp. 162–168. 15) M. J. Munro, â€Å"Product metrics for automatic  identification of „Bad Smellà ¢Ã¢â€š ¬Ã… ¸ design problems in Java  source-code,† in Proc. IEEE 11th Int. Softw. Metrics  Symp., 2005, pp. 15–15.   16) W. Banzhaf, â€Å"Genotype-phenotype-mapping and  neutral variation: A case study in genetic  programming,† in Proc. Int. Conf. Parallel Problem  Solving from Nature, 1994, pp. 322–332. 17) W. H. Kruskal and W. A. Wallis, â€Å"Use of ranks in  one-criterion variance analysis,† J. Amer. Statist.  Assoc., vol. 47, no. 260, pp. 583–621, 1952. 18) W. J. Brown, R. C. Malveau, W. H. Brown, and  T. J. Mowbray, â€Å"Anti Patterns: Refactoring Software,  Architectures, and Projects in Crisis†. Hoboken, NJ,  USA: Wiley, 1998. 19) N. Fenton and S. L. Pfleeger, â€Å"Software Metrics:  A Rigorous and Practical Approach†. Int. Thomson  Comput. Press, London, UK, 1997.   20) Emerson Murphy-Hill, Chris Parnin, and Andrew  P. Black† How We Refactor, and How We Know  It†,IEEE Trans. Softw. Eng.,vol. 38,no. 1, Jan./Feb.  2012. 21) M. Fowler, K. Beck, J. Brant, W. Opdyke, and D.  Roberts, â€Å"Refactoring: Improving the Design of  Existing Code†. Reading, MA,USA: Addison  Wesley, 1999.

Wednesday, September 4, 2019

Calculators Essays -- Essays Papers

Calculators Calculators in the Classroom As the world changes and grows, more things are created to make people's everyday lives easier. One tool that can be used in school to help facilitate math is the calculator. This technology allows students to use a machine to obtain answers instead of using PPA (Paper and Pencil Arithmetic). Like any technology, there is fear on how to best use it to help facilitate growth in students. If the calculator is used properly in the classroom, it can be a beneficial tool for pupils. The calculator enables students to concentrate on math instead of focusing on tedious tasks that are not used in everyday life such as long division. If the calculator becomes a tool that elementary students use more often in the classroom, it will only help them become better students of mathematics over time. One of the many things that prevent the calculator from being more widely used in the elementary school are the many negative myths about calculators and how they adversely affect students in elementary schools. One belief that is held by many parents and teachers is that calculators hinder students’ ability to grow as thinkers. People believe that the calculator is doing the work instead of the students. This idea is absurd. Pupils need to push the buttons on the machine and in the correct order to come up with the right answer (Lambdin, Lindquist, Reys, Smith & Suydam, 2001). In fact the calculator enables the student to use more of their intellect because the machine allows the student to free itself from performing arduous tasks which allows the student to focus on how he or she obtained the answer (Lambdin et al, 2001). Another impediment to using ca... ...ad to be done so the results would be precise. This one experiment involving a tool of mathematics integrated science and math. This is just one way that the calculators can be used to benefit elementary students. If the calculator is used properly in the classroom, it can be a great tool that benefits students and teachers. This machine allows teachers to focus on other school subjects that they would have spent on teaching aspects of mathematics that are no longer used today. The tool is beneficial to the pupil because if it is used properly, it allows the student to spend time on how they came to answer instead of reaching the answer and leaving class because time ran out. As teachers and students use the calculator on regular basis, more people will see that in fact it is a tool that is necessary for the student to grow and not a hindrance.

Tuesday, September 3, 2019

Seide :: essays research papers

„Seideâ€Å" von Alessandro Baricco Alessandro Baricco Geboren 1958 in Turin, studierte Philosophie und Musik. Er schrieb Musikkritiken und Essays à ¼ber Musik, bevor er mit seinen Roman „Seideâ€Å" (1997), „Land aus Glasâ€Å" (1998) und „Novecentoâ€Å" (1999) den großen Druchbruch erzielte. Mit seiner erfolgreichen Fernseh-Literatursendung „Pickwickâ€Å" und der Grà ¼ndung einer Kreatività ¤tsuniversità ¤t in Turin, der „Scuola Holdenâ€Å", ist Baricco endgà ¼ltig zum Kultautor avanciert. „Seideâ€Å", ist ein literarischer Bestseller, der in wunderschà ¶ner, poetischer Sprache eine leise Geschichte à ¼ber das Begehren erzà ¤hlt. Alessandro Baricco erzà ¤hlt in einer Parabel à ¼ber das Glà ¼ck und seine Unerreichbarkeit. Hauptperson des Buches ist Hervà © Joncour, der als Seidenhà ¤ndler arbeitet und ein ruhiger und ausgeglichener Mensch. Verheiratet ist er mit Hà ©là ¨ne, die als hà ¼bsche Frau mit einer wundervollen Stimme beschrieben wird. Obwohl Hervà © seine Frau liebt, sucht er doch nach Glà ¼ck und Leidenschaft, die er schließlich in Japan, verkà ¶rpert in einer mà ¤dchenhaften Frau, deren Augen nicht asiatisch geschnitten sind, findet. Dieser Frau begehrt er wie er noch keine andere Frau begehrt hat. Doch er sehnt sich nur nach ihr, weil sie fà ¼r ihn unerreichbar ist. Die Sehnsucht nach dieser Frau verfolgt ihn jahrelang, bis er endlich bemerkt, daß er das große Glà ¼ck und die Liebe bereits in seiner eigenen Frau gefunden, jedoch nie wahrgenommen hat. Doch erst als seine Frau stirbt, begreift er es. Um sich davor zu bewahren, unglà ¼cklich zu sein, verbringt er die Tage damit, seinen à ¼blichen Gewohnheiten nach zugehen. Doch manchmal ging er auch zu einem See hinunter, „... denn es schien ihm, als zeichne sich auf dem Wasser das unerklà ¤rliche, schwerelose Schauspiel dessen ab, was sein Leben gewesen war.â€Å" Nur zweimal in seinem Leben hat er sich so gefà ¼hlt. Beim ersten Mal, als ihm klar wurde, daß er die rà ¤tselhafte Frau, die er so sehr begehrte, nicht mehr wiedersehen wird und nach dem Tod seiner Frau, als er seine große Liebe verlor. Hervà © Joncour, ein Seidenhà ¤ndler, lebt mit seiner Frau Hà ©là ¨ne ein ruhiges Leben in Lavilledieu. Nur einmal im Jahr fà ¤hrt er durch die ganze Welt, um Larven von Seidenraupen einzukaufen. Và ¶llig unerwartet bricht eine Seuche unter den Seidenraupen in Afrika auf und Hervà © fà ¤hrt nach Japan, um seine Einkà ¤ufe zu erledigen. Dort begegnet er Hara Kei, einen reichen japanischen Aristokraten, mit den er fortan seine Geschà ¤fte fà ¼hrt und einer Frau, die sein Leben fà ¼r immer verà ¤ndern sollte. Er wechselt kein einziges Wort mit ihr und doch spà ¼rt der Gewissheit, sie wieder zu sehen. Ein Jahr spà ¤ter bricht Hervà © wieder auf, um nach Japan zu reisen.

Monday, September 2, 2019

Essay --

From my previous journal I stated that I was very interested in finishing the rest of the books in the Odyssey. Well I have finished all of them and got some of my questions answered in class and I got some question that I did not know I did not understand answered too. In book 4 I left off with wondering why Athena protects Telemachus when she’s still upset with. When finishing up the rest of the Odyssey there are many things that are many happening. You have everything from; â€Å"all of the gods are accepting that Poseidon has gathered again on Mount Olympus to discuss Odysseus’s fate† in book 5. To â€Å"Athena makes the Ithacans forget the massacre of their children and recognize Odysseus as king, and making Peace being restored† in book 24. How one man goes through all of this is amazing to me. The Odyssey is nothing more than Odysseus telling us his story and all the things that he had gone through. Odysseus encounters many things that people do not believe to be true because all of his crew is dead and no one had ever don’t anything like he is saying that he has. Because his crew is dead there is no one to help tell all of the great adventures that they endeared. The main question I feel that never truly gets answered in the reading is that of wither or not the stories are true. Does it really take someone who loves his family 20 years to make it home? To return to his wife and son? And are the wife and son still there waiting for him to return. We know in the reading that they are but how does he know this? Is it because that’s how it was back then or why? Why did it take him the seven years for him to build a boat to leave the island of Cyclopes and start to make is way back home. When he finally manages to get the boat made to ... ... I keep saying this but I really don’t know wither or not I can take this story ad being true I things some of the things could have happened but not all of them. I’m not sure why I find it so hard to believe but I do. While reflecting on this reading I have really stopped to think about what I am reading and if I believe it to be true or not. Could the Odyssey be written different so that it’s more understandable? Or should we already be able to understand the text? I feel that the book could take a whole semester to cover it we were to truly take the time to truly read it not just read it and go on. I can see myself rereading the books and trying to understand more and looking for things that I have missed the first time though. Works Cited Brian Wilkie, J. H. (2001). Lliterature of the Western World Vol. 1. New Jersey: Prentice Hall. The Odyssey, pages 273-594

Sunday, September 1, 2019

Determining of the equilibrium constant for the formation of FeSCN2+ Essay

Determining of the equilibrium constant for the formation of FeSCN2+ Introduction The objective of this experiment was to determine the equilibrium concentration and then determine Kc. A dilution calculation was formed to determine the concentration of SCN- and Fe(SCN)2+. Each cuvette was filled to the same volume and can be seen in table 1. Then the absorbances were recorded from each cuvette and can be seen in table 1. A Beer’s law plot was made from the data that was recorded from the optical absorbance. During the second part of the experiment Fe (NO3)3 was added and diluted with HNO3 . All of the cuvettes were mixed with the same solutions in the second part of the experiment, which can be seen in table 2. A dilution calculation was made to determine the initial concentration of Fe3+and SCN-. Then the formula Abs + b/ slope was used to determine the equilibrium concentration which lead to the calculation of each Kc per trial. Chemical reaction Fe3+ + SCN- FeSCN2+ Â  Conclusion: An acid and a base were mixed together throughout the experiment, which resulted in a bright orange color. It was determined that using the colorimeter at 565nm the would give the optimum wavelength because it was the closest absorbance to 430nm. All of the cuvettes were filled to 3mL so there would not be another dependent variable. Whenever Fe3+ would come in contact with SCN- there would be a color change. Relatively all of the Kc were close to each other as they should be because the only variable that affects a change Kc and the temperature was kept consent throughout the experiment. The average Kc from all five trials is 1.52 x 10 2.

Epidemiology and Communicable Diseases: HIV

Epidemiology & Communicable Diseases HIV or the Human Deficiency virus is like other viruses including the flu, but the one thing that makes this virus so different than any other is that the body is unable to clear this one out completely. Once someone is infected, there is no cure. Over time, HIV can also hide or mask itself in the body's cells. The cells within a person's body that fght off infection are called CD4 cells or T cells. HIV attacks these cells and copies or replicates itself inside these cells, then destroys them.HIV over time will estroy so many of these cells that the body is unable to fght off infection anymore. When this starts happening, AIDS or Acquired Immunodeficiency Syndrome happens which is the final stage of HIV. HIV is transmitted through someone's blood or bodily fluids which can encompass semen, breast milk, vaginal fluids, and rectal mucous (AIDS. GOV, 2013) and usually it is passed from one person to another through sexual contact; however, HIV can al so be transmitted through childbirth or IV drug use. Healthcare workers are also at risk from infected bodily fluids.Fluids from an nfected person can deliver the virus to someone else's bloodstream. Within 2-4 weeks, and up to as late as 3 months, exposure to HIV can happen with a sudden onset of flu like symptoms including fever, chills, rash, night sweats, muscle aches, sore throat, fatigue, swollen lymph nodes or ulcers in the mouth (CDC, 2013). Sometimes no signs or symptoms of infection are present in someone with HIV. Certain individuals may feel sick as HIV turns into AIDS or have occasional bouts of sickness, but not really know or feel they are infected.When HIV progresses to HIV, he flu like sign and symptoms mentioned earlier can become far more severe. Many of the complications stemming from HIV are opportunistic infections, which happen in patients with a weakened immune system (CDC, 2013). â€Å"Some of these opportunistic infections include tuberculosis, salmonellos is, cytomeglaovirus, candidiasis, cryptococcal meningitis, toxoplasmosis, cryptosporiosis, Wasting Syndrome, neurological problems, and kidney disease (Mayo Clinic, 2013). Specific skin cancers including Kaposi's Sarcoma and lymphomas also happen in patients who are HIV positive† (Mayo Clinic, 2013).Antivirals are the treatment for HIV and presently there is no known cure. Treatment most often involves combinations of different drugs to avoid creating strains of the virus that are immune to single drug treatments (Mayo Clinic, 2013). The number of CD4 or T cells monitors treatment response. The viral load should be undetectable while undergoing antiviral therapy. The count is checked when treatment starts and usually monitored every 3-6 months. Even if someone has an undetectable viral load, the spreading of HIV is still a possibility.According to estimates and numbers provided by the CDC, about one and half million people 13 years of age and younger is HIV positive. Demograph ics also show that almost 20% of people who are infected do not know they have the virus. The CDC estimates that now every year, there are about 50,000 new cases diagnosed (2013). At risk groups include gay men, bisexual people, and African Americans (CDC, ) Young Atrican American males are at greatest risk tor contracting HIV among various ethnicities and races (CDC, 2013).An individual's risk for HIV or social determinants of health related to HIV is income, education, geographic region, overty, gender orientation, early childhood experiences, and alcohol or substance abuse. The CDC states, â€Å"that by reducing the number od new HIV infections and improving the health and well-being of those already infected with HIV depends on changing the social determinants that place people at risk of infection† (CDC, 2-13). The epidemiological triangle of HIV consists of three things: the person, the causative agent, or the environment (Smith, 169).The causative agent that causes AID S is HIV or the virus itself. The host is a person in the case of HIV and the environment is the either the host or the agent, but a factor that influences interaction between the two. The epidemiological triangle consists of three things: the person, the causative agent, or the environment (Smith, 169). In the triangle for HIV, the agent that causes AIDS is HIV or the virus. The host is a person in the case of HIV. The environment is neither the host nor the agent, but something that influences interaction between the two (Smith, 169).The host factors for HIV include age, sex, ethnic background, race, sexual orientation, education, and economic status (Smith, 169). The agent actors or causative agent for HIV are the virus itself and the mode of transmission, life cycle and virulence of the virus (Smith, 169). The environmental factors for HIV include social and economic considerations including family, community, political organization, public policy, regulations, institutions, wor kplace, occupation, economic status, technology, mobility, housing population density, attitudes, customs, culture, health practices, health services (Smith 169-170).A community health nurse with an emphasis on HIV/AIDS would work in a community or public health setting, educating t risk groups about safe sex practices and the dangers of sharing needles. Ideally, the nurse would connect patients to support groups and services, teach patients or people in the community about the prevention of the spreading of the disease, and help administer treatments and medications. Some important issues that nurses are bringing to the forefront in todays world include implementing strategies to keep HIV patients engaged in routine HIV medical and nursing care, incorporating prevention research findings to help reduce transmission locally and globally, carrying out outine HIV testing in health care settings, ensuring access to antiretroviral drugs, and preparing for emerging issues in HIV care suc h as diabetes, liver disease, obesity and elder care† (Kirton, 2007, p. 8). The Global Fund to fight AIDS, Tuberculosis and Malaria is a national organization that channels a portion of its funds to the international financing for he fght against HIV and AIDS. It also gives funds to strengthening health systems, as most are inadequate to educate and inform communities and people about the prevention of HIV. Programs supported by the Global Fund give to communities with lifesaving ntiviral therapies and counseling on the prevention of the virus.