SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012



       A Resolved Retrieval Technique For
             Software Components

                       Swathy vodithala1, P.Niranjan Reddy2 and M.Preethi3




 Abstract___Retrieval is a major area in software
repository because reuse is only effective if it is                         II. Related work
easier to locate than to write from scratch. In this        A. Keyword Search
paper we are describing the classical methods for
retrieving the reusable components and also                 Keyword search requires assigning to each
proposed a retrieval mechanism which serves the             object a number of relevant keywords or indices
best. The advantages of signature and behavioural
algorithms have been unified in order to retrieve           [1].
the best components.
                                                            Ex: The following keywords are associated with
.                                                           objects [5].
Keywords: Repository, Retrieval technique,
Signature matching, Behavioral matching                           OBJECT1 -KW1, KW2, KW3.
                                                                  OBJECT2 –KW3, KW4, KW5.
             I. Introduction
                                                            If we search the objects based on KW3, then the
 The software engineering has been widely used
                                                            result would be OBJECT1 & OBJECT2.This
area nowadays, since it accepts even the other
technical areas into it which strengthens this              involves a lot of irrelevant objects. The other
stream. There are three major areas in software             disadvantages with the keyword method is the
engineering which has to be focused when                    high cost associated with manual indexing,
considering the components for software reuse.              which requires skilled personnel and ambiguous
These are described as a) classifying the                   nature of keywords that can lead to substantial
components needed .b) describing the                        disagreement over the choice of keywords
components wanted .c) finding the appropriate
components. Finding the component includes a
major area of search techniques and retrieval               B. Full-text Retrieval
techniques. In this paper we have surveyed
different types of retrieval mechanisms.
However, finding and reusing appropriate                    The high cost of manual indexing has made it
software components is often very challenging,              attractive to automate the indexing process. The
particularly when faced with a large collection of          simplest kind of automatic indexing is illustrated
components. A classified collection is not useful           by fill-text retrieval systems. Such systems work
if it does not provide the search-and-retrieval             on the basis of a simple mechanism:
mechanism to use it. At different times, different          "Store the fill text of all documents in the
                                                            collection in a computer so that every character
software reuse classification and retrieval
                                                            of every word in every sentence of every object
techniques     have    been      proposed     and
                                                            can be located by the machine. Then, when a
implemented. . Retrieval should allow users to
                                                            person wants information from that stored
formulate high-level queries about component
                                                            collection, the computer is instructed to search
capabilities and takes account of the context in
                                                            for all documents containing certain specified
which a query is performed to assist query
                                                            words and word combinations, which the user
formulation [10].
                                                            has specified "[1].




                                                                                                          653
                                       All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012


C. Hypertext Search                                       E. Attribute value

Hypertext represents one of the newest forms of           The attribute value classification scheme uses a
computer-based support for reading documents              set of attributes to classify a component [8]. For
[1]. Rather than being constrained to the linear          example, a book has many attributes such as the
order of conventional documents, users are able           author, the publisher, its ISBN number and it’s
to move through a hypertext document by                   classification code in the Dewey Decimal
following links represented on the screen by              system. These are only example of the possible
buttons. The basic building blocks in hypertext           attributes. Depending upon who wants
are nodes and links. Each node is associated with         information about a book, the attributes could be
a unit of information, and nodes can be of                concerned with the number of pages, the size of
different types. The node type depends on                 the paper used, the type of print face, the
various criteria, for example, the class of data          publishing date, etc. Clearly, the attributes
stored (plain text, graphics, audio or an                 relating to a book can be:
executable program), or the domain object it              · Multidimensional. The book can be classified
represents (diary entry, account, financial               in different places using different attributes
statement). Links define an invoice to a detailed         · Bulky. All possible variations of attributes
customer profile screen. Links are accessed from          could run into many tens, which may not be
the source node and can be traversed to access            known at the time of classification [9].
the destination node. Current hypertext systems
provide users with sophisticated user interface
tools that enable them to inspect node contents,          F. Faceted
and to navigate through the network by selecting
a path to follow.                                         Faceted classification schemes are attracting the
                                                          most attention within the software reuse
                                                          community [8, 9]. Like the attribute
D. Enumerated classification                              classification method, various facets classify
                                                          components, however, there are usually a lot
Enumerated classification uses a set of mutually          fewer facets than there are potential attributes (at
exclusive classes, which are all within a                 most, 7).proposed a faceted scheme that uses six
hierarchy of a single dimension [8]. A prime              facets.
illustration of this is the Dewey Decimal system          · The functional facets are: Function, Objects and
used to classify books in a library. Each subject         Medium
area, e.g., Biology, Chemistry etc, has its own           · The environmental facets are: System type,
classifying code. As a sub code of this is a              Functional area, setting.
specialist subject area within the main subject.
These codes can again be sub coded by author.
                                                          G. Signature matching.
This classification method has advantages and
disadvantages pivoted around the concepts of a
unique classification for each item. The                  Signature matching compares names, parameters
classification scheme will allow a user to find           and return types of component methods to the
more than one item that is classified within the          user query.
same section/subsection assuming that if more              Consider the signatures presented in Figures 1
than one exists. For example, there may be more           and 2 for a stack of integers and a queue of
than one book concerning a given subject, each            integers, respectively [7].
written by a different author. This type of
classification schemes is one, and will not allow         Create: => Stack
flexible classification of components into more           Push: Stack x Integer =>Stack
than one place [9]. As such, enumerated                   Pop: Stack => Stack
classification by itself does not provide a good          Top: Stack => Integer
classification scheme for reusable software               Empty: Stack => Boolean
components.
                                                          Figure 1: Signature of a Stack




                                                                                                          654
                                     All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012


Create: =>Queue                                           program determines a context in which the
Enqueue: Queue x Integer:=>Queue                          behaviour of a component is exhibited. The
Dequeue: Queue =>Queue                                    behaviour of a component C is derived from the
Front: Queue => Integer                                   set of response sequences by removing those
Empty: Queue => Boolean                                   responses which are proper extensions of other
                                                          responses. Thus, the behaviour of a component
Figure 2: Signature of a Queue                            C is the set of guaranteed responses to a
                                                          program p.
These signatures are isomorphic up to renaming,
and thus exemplify what we have come to refer             P: Response       Behavior
to as the vocabulary problem. Software reusers
implicitly associate distinct semantics with              In general, Behavioral matching executes each
particular names, for example, pop and enqueue.           component with input data in order to retrieve
Thus, by the choice of names, a component                 the components that present the expected
developer can mislead reusers as to the semantics         behavior.
of components, or provide no means of
discriminating between components. Figure 3,
for example, appears to be equally applicable as                          III. Proposed work
a signature for both stack and queue, primarily
due to the neutral nature of the names used.               The disadvantage of the behavioral algorithm is
                                                          as follows: when sent a program, the component
Create: Sequence                                          will respond by executing each call in the
Insert: Sequence x Integer =>Sequence                     program and producing a corresponding output
Remove: Sequence =>Sequence                               sequence called response. However, here we
Current: Sequence => Integer                              have a set of predefined responses. If the
Empty: Sequence => Boolean                                program’s response is matched with the
                                                          predefined response which is already defined,
Figure 3: Signature of a sequence.                        then the component will be retrieved. But at
                                                          times a call is rejected where execution stops and
H. Behavioural matching.                                  there are various reasons for this. The method
                                                          name called may not be the name of an operation
                                                          in the component's interface, or the supplied
Behavioural retrieval works by exploiting the             input may not satisfy the operation's
executability of software components. Programs            preconditions [4].
are executed using components, and the                              The disadvantage of the signature
responses of components are recorded. Retrieval           matching is as follows: signature match is
is achieved by selecting those components whose           entirely based on function types, but not on the
responses (with respect to the program) are               behaviour. If we consider the functions strcpy ( )
closest to a pre-determined set of desired                and strcat ( ), they have same signature but
responses. This idea was originally called                opposite in nature.
``behavioural matching''. A component is                  (Most of the functions have same signature but
represented as a relation between programs and            different behaviours) [2].
responses. This is because in general, a program                 With the description above, we can say
execution can yield several responses (due to             that alone signature matching and behavioural
non-determinism) and a response may be evoked             matching would not yield good results.
by more than one program. Formally, a                              The proposed algorithm is the
component C can be declared as [4]:                       “combination of both the signature and
                                                          behavioural matching”.If we consider the
C: program  Response.                                   behaviours along with the signatures the
                                                          disadvantage of signature matching can be
                                                          minimized. Similarly, if we consider the
A program p belongs to program is modeled as a            signatures along with the behaviours the
sequence of calls on the component's interface. A         disadvantage of behavioural matching can be
response is a sequence of values in                       minimized that is all the names of the methods
correspondence with a program. In effect, each            are properly filtered before having behavioural
                                                          match.


                                                                                                        655
                                     All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
 International Journal of Advanced Research in Computer Engineering & Technology
                                                     Volume 1, Issue 4, June 2012


                                                           Stern School of Business Working Paper IS-93-
EXAMPLE:    COMPONENTS               TO     FIND           47
ADDITION OF TWO NUMBERS                                    [2]       “Specification matching of software
                                                           Components” Amy moormann zaremski and
Firstly, we search for a component with                    Jeannette m. wing
signature                                                  [3] “Signature matching: A key to reuse”Amy
          int name (int ,int)                              moormann zaremski and Jeannette m. wing.
i.e... a function which takes two integer                  [4] ”Examining behavioral matching”Steven
arguments and returns a integer value.                     Atkinson.Software       Verification  Research
                                                           Centre.Department of Computer Science
                                                           University of Queensland
 This may give a list of functions as                      [5] “Building Software Reuse Library with
        int sum (int ,int)                                 Efficient Keyword based Search Mechanism”
        int add ( int ,int)                                Rajender Nath and Harish Kumar. technia –
        int sub (int, int)                                 international journal of computing science and
        int mul (int, int)                                 Communication Technologies, VOL. 2, NO. 1,
        int div (int ,int)                                 July 2009. (ISSN 0974-3375)
        int avg (int, int)                                 [6]         “Facets of Software Component
The resulted list has functions with various               Repository” Vaneet kaur and shivani goel. /
behaviors. Then we apply the behavioural                   International Journal on Computer Science and
matching to find the addition of two numbers.              Engineering (IJCSE)
Here the response of a function is checked                 [7] “Component Classification and Retrieval
against the predefined responses and the opposite          Using Data Mining Techniques” Proceedings of
behaviours are removed. The resulted list would            National Conference on Challenges &
be as                                                      Opportunities in Information Technology
            int sum (int,int)                              (COIT-2007) RIMT-IET, Mandi Gobindgarh.
            int add (int,int)                              March 23, 2007. Achala Sharma, Daman Deep
            int avg (int,int)                              Kaur
                                                            [8] “An Integrated Classification Scheme for
The Expected behaviour is seen in all the above            Efficient Retrieval of Components” Dr C.v.guru
functions .Again here, the sum( ),add( ) comes             Rao and P.Niranjan. Journal of Computer
under the “EXACT MATCH” and avg( ) comes                   Science 4 (10): 821-825, 2008 ISSN 1549-3636
under the “RELAXED MATCH”.                                 © 2008 Science Publications
                                                           [9] “A mock-up tool for software component
                                                           reusesRepository”          P.Niranan       and
IV. Conclusion and future scope                            Dr.c.v.GuruRao.
                                                           [10] ”Supporting reuse by task-relevant and
 In this paper we explained all the basic retrieval        personalized information” Yunwen Ye and
techniques along with their strengths and                  Gerhard Fischer .ijcse’02.
weakness. We also proposed a matching
technique which combines both the behavioural
and signature matching .This serves the best               First Author           SWATHY VODITHALA
when compared with the individual algorithms.                               received her              B.Tech
The future scope involves the unification of basic                          degree in computer science and
techniques with the other technological                                     engineering in 2005 from
disciplines which are relevant to optimize the                              KITS, huzurabad (Jawaharlal
search as well to retrieve the software                                     Nehru              Technological
components.                                                                 University).     And     M.Tech
                                                                            degree in software engineering
                                                           from KITS, Warangal (kakatiya university) in
                                                           2011.she worked with computer science
References                                                 department for 2 years in KITS, huzurabad as an
[1]   “Supporting search for reusable software             Assistant Professor. At present, she is working as
objects” Tomas isakowitz and Robert j.                     an Assistant Professor in computer science
Kauffman.Center for Digital Economy Research               department at KITS, Warangal.



                                                                                                         656
                                      All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

IRJET- Survey on Text Error Detection using Deep Learning
IRJET-  	  Survey on Text Error Detection using Deep LearningIRJET-  	  Survey on Text Error Detection using Deep Learning
IRJET- Survey on Text Error Detection using Deep LearningIRJET Journal
 
FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION
FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION
FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION cscpconf
 
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODELEXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODELijaia
 
A Distributed Audio Personalization Framework over Android
A Distributed Audio Personalization Framework over AndroidA Distributed Audio Personalization Framework over Android
A Distributed Audio Personalization Framework over AndroidUniversity of Piraeus
 
Retrieval of textual and non textual information in
Retrieval of textual and non textual information inRetrieval of textual and non textual information in
Retrieval of textual and non textual information ineSAT Publishing House
 
Different Similarity Measures for Text Classification Using Knn
Different Similarity Measures for Text Classification Using KnnDifferent Similarity Measures for Text Classification Using Knn
Different Similarity Measures for Text Classification Using KnnIOSR Journals
 
Summarization using ntc approach based on keyword extraction for discussion f...
Summarization using ntc approach based on keyword extraction for discussion f...Summarization using ntc approach based on keyword extraction for discussion f...
Summarization using ntc approach based on keyword extraction for discussion f...eSAT Publishing House
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Miningijsc
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya pptMaurya Shah
 
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET Journal
 
IRJET- Automated Document Summarization and Classification using Deep Lear...
IRJET- 	  Automated Document Summarization and Classification using Deep Lear...IRJET- 	  Automated Document Summarization and Classification using Deep Lear...
IRJET- Automated Document Summarization and Classification using Deep Lear...IRJET Journal
 
IRJET - Text Detection in Natural Scene Images: A Survey
IRJET - Text Detection in Natural Scene Images: A SurveyIRJET - Text Detection in Natural Scene Images: A Survey
IRJET - Text Detection in Natural Scene Images: A SurveyIRJET Journal
 
Top 5 MOST VIEWED LANGUAGE COMPUTING ARTICLE - International Journal on Natur...
Top 5 MOST VIEWED LANGUAGE COMPUTING ARTICLE - International Journal on Natur...Top 5 MOST VIEWED LANGUAGE COMPUTING ARTICLE - International Journal on Natur...
Top 5 MOST VIEWED LANGUAGE COMPUTING ARTICLE - International Journal on Natur...kevig
 
Modeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector QuantizationModeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector QuantizationTELKOMNIKA JOURNAL
 
Anupam Srivastava
Anupam SrivastavaAnupam Srivastava
Anupam Srivastavaanupam328
 
DOMAIN BASED CHUNKING
DOMAIN BASED CHUNKINGDOMAIN BASED CHUNKING
DOMAIN BASED CHUNKINGkevig
 
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural NetworkSentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Networkkevig
 

Tendances (20)

IRJET- Survey on Text Error Detection using Deep Learning
IRJET-  	  Survey on Text Error Detection using Deep LearningIRJET-  	  Survey on Text Error Detection using Deep Learning
IRJET- Survey on Text Error Detection using Deep Learning
 
FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION
FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION
FAST FUZZY FEATURE CLUSTERING FOR TEXT CLASSIFICATION
 
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODELEXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
 
A Distributed Audio Personalization Framework over Android
A Distributed Audio Personalization Framework over AndroidA Distributed Audio Personalization Framework over Android
A Distributed Audio Personalization Framework over Android
 
Retrieval of textual and non textual information in
Retrieval of textual and non textual information inRetrieval of textual and non textual information in
Retrieval of textual and non textual information in
 
Different Similarity Measures for Text Classification Using Knn
Different Similarity Measures for Text Classification Using KnnDifferent Similarity Measures for Text Classification Using Knn
Different Similarity Measures for Text Classification Using Knn
 
Summarization using ntc approach based on keyword extraction for discussion f...
Summarization using ntc approach based on keyword extraction for discussion f...Summarization using ntc approach based on keyword extraction for discussion f...
Summarization using ntc approach based on keyword extraction for discussion f...
 
Y24168171
Y24168171Y24168171
Y24168171
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya ppt
 
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
 
IRJET- Automated Document Summarization and Classification using Deep Lear...
IRJET- 	  Automated Document Summarization and Classification using Deep Lear...IRJET- 	  Automated Document Summarization and Classification using Deep Lear...
IRJET- Automated Document Summarization and Classification using Deep Lear...
 
H42054550
H42054550H42054550
H42054550
 
IRJET - Text Detection in Natural Scene Images: A Survey
IRJET - Text Detection in Natural Scene Images: A SurveyIRJET - Text Detection in Natural Scene Images: A Survey
IRJET - Text Detection in Natural Scene Images: A Survey
 
Top 5 MOST VIEWED LANGUAGE COMPUTING ARTICLE - International Journal on Natur...
Top 5 MOST VIEWED LANGUAGE COMPUTING ARTICLE - International Journal on Natur...Top 5 MOST VIEWED LANGUAGE COMPUTING ARTICLE - International Journal on Natur...
Top 5 MOST VIEWED LANGUAGE COMPUTING ARTICLE - International Journal on Natur...
 
Modeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector QuantizationModeling Text Independent Speaker Identification with Vector Quantization
Modeling Text Independent Speaker Identification with Vector Quantization
 
I6 mala3 sowmya
I6 mala3 sowmyaI6 mala3 sowmya
I6 mala3 sowmya
 
Anupam Srivastava
Anupam SrivastavaAnupam Srivastava
Anupam Srivastava
 
DOMAIN BASED CHUNKING
DOMAIN BASED CHUNKINGDOMAIN BASED CHUNKING
DOMAIN BASED CHUNKING
 
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural NetworkSentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
 

En vedette (6)

Soc460
Soc460Soc460
Soc460
 
Genome res. 2002-kent-656-64
Genome res. 2002-kent-656-64Genome res. 2002-kent-656-64
Genome res. 2002-kent-656-64
 
Soc 492 15
Soc 492 15Soc 492 15
Soc 492 15
 
Genome
GenomeGenome
Genome
 
Sociology 656
Sociology 656Sociology 656
Sociology 656
 
Soc488h
Soc488hSoc488h
Soc488h
 

Similaire à 653 656

A Case Study Of A Reusable Component Collection
A Case Study Of A Reusable Component CollectionA Case Study Of A Reusable Component Collection
A Case Study Of A Reusable Component CollectionJennifer Strong
 
Software component reuse repository
Software component reuse repositorySoftware component reuse repository
Software component reuse repositorySandeep Singh
 
Bt8901 objective oriented systems1
Bt8901 objective oriented systems1Bt8901 objective oriented systems1
Bt8901 objective oriented systems1Techglyphs
 
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITYA FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITYcscpconf
 
A Methodology To Manage Victim Components Using Cbo Measure
A Methodology To Manage Victim Components Using Cbo MeasureA Methodology To Manage Victim Components Using Cbo Measure
A Methodology To Manage Victim Components Using Cbo Measureijseajournal
 
Feature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documentsFeature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documentsIJECEIAES
 
Open Archives Initiative Object Reuse and Exchange
Open Archives Initiative Object Reuse and ExchangeOpen Archives Initiative Object Reuse and Exchange
Open Archives Initiative Object Reuse and Exchangelagoze
 
An efficient tool for reusable software
An efficient tool for reusable softwareAn efficient tool for reusable software
An efficient tool for reusable softwareprjpublications
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models IJECEIAES
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachAIRCC Publishing Corporation
 
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHINFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHijcsit
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET Journal
 
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET Journal
 
Software_Engineering_Presentation (1).pptx
Software_Engineering_Presentation (1).pptxSoftware_Engineering_Presentation (1).pptx
Software_Engineering_Presentation (1).pptxArifaMehreen1
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...ASAITHAMBIRAJAA
 

Similaire à 653 656 (20)

A Case Study Of A Reusable Component Collection
A Case Study Of A Reusable Component CollectionA Case Study Of A Reusable Component Collection
A Case Study Of A Reusable Component Collection
 
L035478083
L035478083L035478083
L035478083
 
Software component reuse repository
Software component reuse repositorySoftware component reuse repository
Software component reuse repository
 
Bt8901 objective oriented systems1
Bt8901 objective oriented systems1Bt8901 objective oriented systems1
Bt8901 objective oriented systems1
 
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITYA FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
 
A Methodology To Manage Victim Components Using Cbo Measure
A Methodology To Manage Victim Components Using Cbo MeasureA Methodology To Manage Victim Components Using Cbo Measure
A Methodology To Manage Victim Components Using Cbo Measure
 
Feature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documentsFeature selection, optimization and clustering strategies of text documents
Feature selection, optimization and clustering strategies of text documents
 
OOPS_Unit_1
OOPS_Unit_1OOPS_Unit_1
OOPS_Unit_1
 
Open Archives Initiative Object Reuse and Exchange
Open Archives Initiative Object Reuse and ExchangeOpen Archives Initiative Object Reuse and Exchange
Open Archives Initiative Object Reuse and Exchange
 
Unit 1 OOSE
Unit 1 OOSE Unit 1 OOSE
Unit 1 OOSE
 
An efficient tool for reusable software
An efficient tool for reusable softwareAn efficient tool for reusable software
An efficient tool for reusable software
 
Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models Finding Bad Code Smells with Neural Network Models
Finding Bad Code Smells with Neural Network Models
 
L5 m256 block2_unit5
L5 m256 block2_unit5L5 m256 block2_unit5
L5 m256 block2_unit5
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
 
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACHINFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
INFORMATION RETRIEVAL BASED ON CLUSTER ANALYSIS APPROACH
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
 
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET- Semantics based Document Clustering
IRJET- Semantics based Document Clustering
 
Software_Engineering_Presentation (1).pptx
Software_Engineering_Presentation (1).pptxSoftware_Engineering_Presentation (1).pptx
Software_Engineering_Presentation (1).pptx
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

653 656

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 A Resolved Retrieval Technique For Software Components Swathy vodithala1, P.Niranjan Reddy2 and M.Preethi3 Abstract___Retrieval is a major area in software repository because reuse is only effective if it is II. Related work easier to locate than to write from scratch. In this A. Keyword Search paper we are describing the classical methods for retrieving the reusable components and also Keyword search requires assigning to each proposed a retrieval mechanism which serves the object a number of relevant keywords or indices best. The advantages of signature and behavioural algorithms have been unified in order to retrieve [1]. the best components. Ex: The following keywords are associated with . objects [5]. Keywords: Repository, Retrieval technique, Signature matching, Behavioral matching OBJECT1 -KW1, KW2, KW3. OBJECT2 –KW3, KW4, KW5. I. Introduction If we search the objects based on KW3, then the The software engineering has been widely used result would be OBJECT1 & OBJECT2.This area nowadays, since it accepts even the other technical areas into it which strengthens this involves a lot of irrelevant objects. The other stream. There are three major areas in software disadvantages with the keyword method is the engineering which has to be focused when high cost associated with manual indexing, considering the components for software reuse. which requires skilled personnel and ambiguous These are described as a) classifying the nature of keywords that can lead to substantial components needed .b) describing the disagreement over the choice of keywords components wanted .c) finding the appropriate components. Finding the component includes a major area of search techniques and retrieval B. Full-text Retrieval techniques. In this paper we have surveyed different types of retrieval mechanisms. However, finding and reusing appropriate The high cost of manual indexing has made it software components is often very challenging, attractive to automate the indexing process. The particularly when faced with a large collection of simplest kind of automatic indexing is illustrated components. A classified collection is not useful by fill-text retrieval systems. Such systems work if it does not provide the search-and-retrieval on the basis of a simple mechanism: mechanism to use it. At different times, different "Store the fill text of all documents in the collection in a computer so that every character software reuse classification and retrieval of every word in every sentence of every object techniques have been proposed and can be located by the machine. Then, when a implemented. . Retrieval should allow users to person wants information from that stored formulate high-level queries about component collection, the computer is instructed to search capabilities and takes account of the context in for all documents containing certain specified which a query is performed to assist query words and word combinations, which the user formulation [10]. has specified "[1]. 653 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 C. Hypertext Search E. Attribute value Hypertext represents one of the newest forms of The attribute value classification scheme uses a computer-based support for reading documents set of attributes to classify a component [8]. For [1]. Rather than being constrained to the linear example, a book has many attributes such as the order of conventional documents, users are able author, the publisher, its ISBN number and it’s to move through a hypertext document by classification code in the Dewey Decimal following links represented on the screen by system. These are only example of the possible buttons. The basic building blocks in hypertext attributes. Depending upon who wants are nodes and links. Each node is associated with information about a book, the attributes could be a unit of information, and nodes can be of concerned with the number of pages, the size of different types. The node type depends on the paper used, the type of print face, the various criteria, for example, the class of data publishing date, etc. Clearly, the attributes stored (plain text, graphics, audio or an relating to a book can be: executable program), or the domain object it · Multidimensional. The book can be classified represents (diary entry, account, financial in different places using different attributes statement). Links define an invoice to a detailed · Bulky. All possible variations of attributes customer profile screen. Links are accessed from could run into many tens, which may not be the source node and can be traversed to access known at the time of classification [9]. the destination node. Current hypertext systems provide users with sophisticated user interface tools that enable them to inspect node contents, F. Faceted and to navigate through the network by selecting a path to follow. Faceted classification schemes are attracting the most attention within the software reuse community [8, 9]. Like the attribute D. Enumerated classification classification method, various facets classify components, however, there are usually a lot Enumerated classification uses a set of mutually fewer facets than there are potential attributes (at exclusive classes, which are all within a most, 7).proposed a faceted scheme that uses six hierarchy of a single dimension [8]. A prime facets. illustration of this is the Dewey Decimal system · The functional facets are: Function, Objects and used to classify books in a library. Each subject Medium area, e.g., Biology, Chemistry etc, has its own · The environmental facets are: System type, classifying code. As a sub code of this is a Functional area, setting. specialist subject area within the main subject. These codes can again be sub coded by author. G. Signature matching. This classification method has advantages and disadvantages pivoted around the concepts of a unique classification for each item. The Signature matching compares names, parameters classification scheme will allow a user to find and return types of component methods to the more than one item that is classified within the user query. same section/subsection assuming that if more Consider the signatures presented in Figures 1 than one exists. For example, there may be more and 2 for a stack of integers and a queue of than one book concerning a given subject, each integers, respectively [7]. written by a different author. This type of classification schemes is one, and will not allow Create: => Stack flexible classification of components into more Push: Stack x Integer =>Stack than one place [9]. As such, enumerated Pop: Stack => Stack classification by itself does not provide a good Top: Stack => Integer classification scheme for reusable software Empty: Stack => Boolean components. Figure 1: Signature of a Stack 654 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Create: =>Queue program determines a context in which the Enqueue: Queue x Integer:=>Queue behaviour of a component is exhibited. The Dequeue: Queue =>Queue behaviour of a component C is derived from the Front: Queue => Integer set of response sequences by removing those Empty: Queue => Boolean responses which are proper extensions of other responses. Thus, the behaviour of a component Figure 2: Signature of a Queue C is the set of guaranteed responses to a program p. These signatures are isomorphic up to renaming, and thus exemplify what we have come to refer P: Response  Behavior to as the vocabulary problem. Software reusers implicitly associate distinct semantics with In general, Behavioral matching executes each particular names, for example, pop and enqueue. component with input data in order to retrieve Thus, by the choice of names, a component the components that present the expected developer can mislead reusers as to the semantics behavior. of components, or provide no means of discriminating between components. Figure 3, for example, appears to be equally applicable as III. Proposed work a signature for both stack and queue, primarily due to the neutral nature of the names used. The disadvantage of the behavioral algorithm is as follows: when sent a program, the component Create: Sequence will respond by executing each call in the Insert: Sequence x Integer =>Sequence program and producing a corresponding output Remove: Sequence =>Sequence sequence called response. However, here we Current: Sequence => Integer have a set of predefined responses. If the Empty: Sequence => Boolean program’s response is matched with the predefined response which is already defined, Figure 3: Signature of a sequence. then the component will be retrieved. But at times a call is rejected where execution stops and H. Behavioural matching. there are various reasons for this. The method name called may not be the name of an operation in the component's interface, or the supplied Behavioural retrieval works by exploiting the input may not satisfy the operation's executability of software components. Programs preconditions [4]. are executed using components, and the The disadvantage of the signature responses of components are recorded. Retrieval matching is as follows: signature match is is achieved by selecting those components whose entirely based on function types, but not on the responses (with respect to the program) are behaviour. If we consider the functions strcpy ( ) closest to a pre-determined set of desired and strcat ( ), they have same signature but responses. This idea was originally called opposite in nature. ``behavioural matching''. A component is (Most of the functions have same signature but represented as a relation between programs and different behaviours) [2]. responses. This is because in general, a program With the description above, we can say execution can yield several responses (due to that alone signature matching and behavioural non-determinism) and a response may be evoked matching would not yield good results. by more than one program. Formally, a The proposed algorithm is the component C can be declared as [4]: “combination of both the signature and behavioural matching”.If we consider the C: program  Response. behaviours along with the signatures the disadvantage of signature matching can be minimized. Similarly, if we consider the A program p belongs to program is modeled as a signatures along with the behaviours the sequence of calls on the component's interface. A disadvantage of behavioural matching can be response is a sequence of values in minimized that is all the names of the methods correspondence with a program. In effect, each are properly filtered before having behavioural match. 655 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Stern School of Business Working Paper IS-93- EXAMPLE: COMPONENTS TO FIND 47 ADDITION OF TWO NUMBERS [2] “Specification matching of software Components” Amy moormann zaremski and Firstly, we search for a component with Jeannette m. wing signature [3] “Signature matching: A key to reuse”Amy int name (int ,int) moormann zaremski and Jeannette m. wing. i.e... a function which takes two integer [4] ”Examining behavioral matching”Steven arguments and returns a integer value. Atkinson.Software Verification Research Centre.Department of Computer Science University of Queensland This may give a list of functions as [5] “Building Software Reuse Library with int sum (int ,int) Efficient Keyword based Search Mechanism” int add ( int ,int) Rajender Nath and Harish Kumar. technia – int sub (int, int) international journal of computing science and int mul (int, int) Communication Technologies, VOL. 2, NO. 1, int div (int ,int) July 2009. (ISSN 0974-3375) int avg (int, int) [6] “Facets of Software Component The resulted list has functions with various Repository” Vaneet kaur and shivani goel. / behaviors. Then we apply the behavioural International Journal on Computer Science and matching to find the addition of two numbers. Engineering (IJCSE) Here the response of a function is checked [7] “Component Classification and Retrieval against the predefined responses and the opposite Using Data Mining Techniques” Proceedings of behaviours are removed. The resulted list would National Conference on Challenges & be as Opportunities in Information Technology int sum (int,int) (COIT-2007) RIMT-IET, Mandi Gobindgarh. int add (int,int) March 23, 2007. Achala Sharma, Daman Deep int avg (int,int) Kaur [8] “An Integrated Classification Scheme for The Expected behaviour is seen in all the above Efficient Retrieval of Components” Dr C.v.guru functions .Again here, the sum( ),add( ) comes Rao and P.Niranjan. Journal of Computer under the “EXACT MATCH” and avg( ) comes Science 4 (10): 821-825, 2008 ISSN 1549-3636 under the “RELAXED MATCH”. © 2008 Science Publications [9] “A mock-up tool for software component reusesRepository” P.Niranan and IV. Conclusion and future scope Dr.c.v.GuruRao. [10] ”Supporting reuse by task-relevant and In this paper we explained all the basic retrieval personalized information” Yunwen Ye and techniques along with their strengths and Gerhard Fischer .ijcse’02. weakness. We also proposed a matching technique which combines both the behavioural and signature matching .This serves the best First Author SWATHY VODITHALA when compared with the individual algorithms. received her B.Tech The future scope involves the unification of basic degree in computer science and techniques with the other technological engineering in 2005 from disciplines which are relevant to optimize the KITS, huzurabad (Jawaharlal search as well to retrieve the software Nehru Technological components. University). And M.Tech degree in software engineering from KITS, Warangal (kakatiya university) in 2011.she worked with computer science References department for 2 years in KITS, huzurabad as an [1] “Supporting search for reusable software Assistant Professor. At present, she is working as objects” Tomas isakowitz and Robert j. an Assistant Professor in computer science Kauffman.Center for Digital Economy Research department at KITS, Warangal. 656 All Rights Reserved © 2012 IJARCET