3 resultados para software engineering practices

em Cochin University of Science


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The present study focuses on the biochemical aspects of six islands belonging to Lakshadweep Archipelago – namely Kavaratti, Kadamath, Kiltan, Androth, Agathy and Minicoy. Lakshadweep, which is an area biologically significant due to isolation from the major coastline, remains as one of the least studied areas in Indian Ocean. The work, processed out the distributional pattern of trace metals among the biotic (corols, sea weeds and sea grass) and abiotic component (sediments) of ecosystem. An effort is made to picturise the spatial distribution pattern of different forms of nitrogen and phosphorus in the various sedimentary environments of the study area. Studies on the biogeochemical and nutrient aspects of the concerned study area scanty. In Lakshadweep, the local life is very dependent on reefs and its resources. The important stress which produce a threatening effort on the existence for coral reefs are anthropogenic-namely-organic and inorganic pollution from sewage, agricultural and industrial waters, sediment damage from excessive land cleaning, and over exploitation particularly through destructive fishing methods. In addition these one other more localized or less service anthropogenic stress: pollution by oil and other hydrocarbons, complex organic molecular and heavy metal pollution, and destructive engineering practices.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Bank switching in embedded processors having partitioned memory architecture results in code size as well as run time overhead. An algorithm and its application to assist the compiler in eliminating the redundant bank switching codes introduced and deciding the optimum data allocation to banked memory is presented in this work. A relation matrix formed for the memory bank state transition corresponding to each bank selection instruction is used for the detection of redundant codes. Data allocation to memory is done by considering all possible permutation of memory banks and combination of data. The compiler output corresponding to each data mapping scheme is subjected to a static machine code analysis which identifies the one with minimum number of bank switching codes. Even though the method is compiler independent, the algorithm utilizes certain architectural features of the target processor. A prototype based on PIC 16F87X microcontrollers is described. This method scales well into larger number of memory blocks and other architectures so that high performance compilers can integrate this technique for efficient code generation. The technique is illustrated with an example