Volume-7 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Now a day there is much more amplified curiosity in combinatorial optimization. The p-median
problem which is a facility location problem, deals with discrete data and hence it is characterized as a
combinatorial optimization problem. It is NP-Hard in nature that ascertains the specified number of locations
as facilitators which serves the maximum locations. The p-median problem will be productive in several
applications areas such as mounting marketing strategies in Management Sciences and recognition of server
positions in computer networks. A new Metaheuristic approach with Neighbourhood Search (NS) technique has
been proposed in the present paper which unveil all possible combinations with the elements in the
neighbourhood of individual elements in the solution and recognizes the optimal solution i.e., which serves the
maximum locations so that the sum of the total distance from the each element to the facilities is minimized. The
proposed metaheuristic approach is an iterative one which contains two phases. Construction phase is the first
phase that structure the initial solution and based on the initial solution the second phase explore for the
optimal solution based on NS approach and then the probable solution space is computed to obtain the optimal
solution.
Keywords: Metaheuristic, neighbourhood, local search, neighbourhood search, hybridization.
Keywords: Metaheuristic, neighbourhood, local search, neighbourhood search, hybridization.
[1] R. Agrwal and R. Srikanth, Fast algorithms for mining association rules, Proceedings of the Very Large Data Bases Conference,
pp. 487-499, 1994.
[2] T. A. Feo and M. G. C. Resende, A probabilistic heuristic for a computationally difficult set covering problem, Operational
Reseach Letters, 8 (1989), pp.67-71.
[3] T. A. Feo and M. G. C. Resende, Greedy randomized adaptive search procedures, Journal of Global Optimization, 6 (1995), pp.
1609-1624.
[4] T. A. Feo and M. G. C. Resende, GRASP: An annotated bibliography, Essays and Surveys in Metaheuristics, Kluwer Acadamic
Publishers, 2002.
[5] M. D. H. Gamal and Salhi, A cellular heuristic for the multisource Weber Prolem, computers & Operations Research, 30 (2003),
pp.1609-1624.
[6] B. Geothals and M. J. Zaki, Advances in Frequent Item set Mining Implementations: Introduction to FIMI03, Proceedings of the
IEEEICDM workshop on Frequent Item set Mining Implementations, 2003.
[7] G. Grahne and J. Zhu, Efficiently using prefix-trees in mining frequent item-sets, Proceedings of the IEEEICDM Workshop on
Frequent Itemset Mining Implementations, 2003.
[8] J. Han, J. Pei and Y. Yin, Mining frequent patterns without candidate generation, Proceedings of the ACMSIGMOD International
conference on Management of Data, pp. 1-12, 2000.
[9] J. Han and M. Kamber, Data Mining: Concepts and Techniques, 2nd Ed., Morgan Kaufman Publishers, 2006
[10] O. Kariv and L. Hakimi, An algorithmic approach to network location problems, part ii: the p-medians, SIAM Journal of Applied
Mathematics, 37 (1979), pp.539-560
pp. 487-499, 1994.
[2] T. A. Feo and M. G. C. Resende, A probabilistic heuristic for a computationally difficult set covering problem, Operational
Reseach Letters, 8 (1989), pp.67-71.
[3] T. A. Feo and M. G. C. Resende, Greedy randomized adaptive search procedures, Journal of Global Optimization, 6 (1995), pp.
1609-1624.
[4] T. A. Feo and M. G. C. Resende, GRASP: An annotated bibliography, Essays and Surveys in Metaheuristics, Kluwer Acadamic
Publishers, 2002.
[5] M. D. H. Gamal and Salhi, A cellular heuristic for the multisource Weber Prolem, computers & Operations Research, 30 (2003),
pp.1609-1624.
[6] B. Geothals and M. J. Zaki, Advances in Frequent Item set Mining Implementations: Introduction to FIMI03, Proceedings of the
IEEEICDM workshop on Frequent Item set Mining Implementations, 2003.
[7] G. Grahne and J. Zhu, Efficiently using prefix-trees in mining frequent item-sets, Proceedings of the IEEEICDM Workshop on
Frequent Itemset Mining Implementations, 2003.
[8] J. Han, J. Pei and Y. Yin, Mining frequent patterns without candidate generation, Proceedings of the ACMSIGMOD International
conference on Management of Data, pp. 1-12, 2000.
[9] J. Han and M. Kamber, Data Mining: Concepts and Techniques, 2nd Ed., Morgan Kaufman Publishers, 2006
[10] O. Kariv and L. Hakimi, An algorithmic approach to network location problems, part ii: the p-medians, SIAM Journal of Applied
Mathematics, 37 (1979), pp.539-560
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Establish and Operate A District-Level Disease Surveillance Unit |
| Country | : | India |
| Authors | : | Rajesh Kumar |
| : | 10.9790/0661-0710609 ![]() |
|
Abstract:Integrated Disease Surveillance programme is a decentralized, state based surveillance programme in
the country. It is intended to detect early warning signals of impending outbreaks and help initiate an effective
response in a timely manner. It is also expected to provide essential data to monitor progress of on-going disease
control Programme and help allocate health resources more efficiently. All outbreaks cannot be predicted or
prevented. However, precautionary measures can be taken within the existing health infrastructure and service
delivery to reduce risks of outbreaks and to minimize the scale of the outbreak if it occurs. The effectiveness
with which national programmes are implemented and monitored, the alertness for identification of early
warning signals and the capacity for initiating recommended interventions in a timely manner are important to
achieve the above objectives.
..........,
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Imprecise Software Requirements: A Software Development Risk |
| Country | : | India |
| Authors | : | Kirandeep Kaur , Rekha Rani , Bharti Jyoti |
| : | 10.9790/0661-0711012 ![]() |
|
Abstract:Software Engineering is a profession to provide high quality software to the customers. It is a
systematic approach to analysis, design, implementation, maintenance and re engineering of software. But there
are many risks involved in creating high quality software like imprecise requirement gathering, poor
management, gold plating, lack of proper communication within the team etc. Risks have no exact values. They
are based upon uncertainties. A major contributor to project failure is the failure to spend the time at the
beginning of the project to clearly define the product requirements before beginning product development i.e.
gathering imprecise requirements.
Keywords:Software Engineering, Software Risk, Imprecise requirements.
Keywords:Software Engineering, Software Risk, Imprecise requirements.
[1] Shradhanand, Amarjeet Kaur, Dr. Satbir Jain, "Use of fuzzy logic in software development", Vol. 8, No. 2, pp: 238-244, 2007.
[2] Prajakta Chandrakant Dhote, "Handling ambiguous data during requirements verification using fuzzy logic", International Journal
of Computer Science and Communication, Vol. 2, No. 1, pp: 105-107, 2011.
[3] Alexandre Bern, Satya Jaya Aparna Pasi, Uolevi Nikula, Kari Smolander., "Contextual Factors Affecting the Software Development
Process – An Initial View", pp:1-8.
[4] Abhijit Chakraborty, Mrinal Kanti Baowaly, Ashraful Arefin, Ali Newaz Bahar., " The Role of Requirement Engineering in
Software Development Life Cycle", Journal of Emerging Trends in Computing and Information Sciences, ISSN : 2079-8407 , Vol.
3, No. 5, pp: 723-729, 2012.
[5] Lachana Raimingwong, "A Review of requirements processes, Problem and models", International Journal of Engineering Science
and Technology (IJEST), ISSN: 0975-5462, Vol. 4, No.06, 2012.
[6] Subhash K.Shinde , Varunakshi Bhojane , Pranita Mahajan., "NLP based Object Oriented Analysis and Design from Requirement
Specification", International Journal of Computer Applications, ISSN:0975 – 8887, Vol. 47, No.21, 2012.
[7] Saima Amber, Narmeen Shawoo, Saira Begum., "Determination of Risk During Requirement Engineering Process", Journal of
Emerging Trends in Computing and Information Sciences, ISSN: 2079-8407, Vol. 3, NO. 3, pp: 358-364, 2012.
[8] Namrata Kapoor, Nitin Bhatia, Sangeet Kumar, "Software risk analysis using fuzzy logic", international journal of computer
information system , Vol. 2, No.2, 2011.
[9] Eric S. K. Yu and John Mylopoulos, "Understanding "Why" in Software Process Modelling, Analysis, and Design", 16th
International Conference Software Engineering, pp: 1-10, 1994.
[2] Prajakta Chandrakant Dhote, "Handling ambiguous data during requirements verification using fuzzy logic", International Journal
of Computer Science and Communication, Vol. 2, No. 1, pp: 105-107, 2011.
[3] Alexandre Bern, Satya Jaya Aparna Pasi, Uolevi Nikula, Kari Smolander., "Contextual Factors Affecting the Software Development
Process – An Initial View", pp:1-8.
[4] Abhijit Chakraborty, Mrinal Kanti Baowaly, Ashraful Arefin, Ali Newaz Bahar., " The Role of Requirement Engineering in
Software Development Life Cycle", Journal of Emerging Trends in Computing and Information Sciences, ISSN : 2079-8407 , Vol.
3, No. 5, pp: 723-729, 2012.
[5] Lachana Raimingwong, "A Review of requirements processes, Problem and models", International Journal of Engineering Science
and Technology (IJEST), ISSN: 0975-5462, Vol. 4, No.06, 2012.
[6] Subhash K.Shinde , Varunakshi Bhojane , Pranita Mahajan., "NLP based Object Oriented Analysis and Design from Requirement
Specification", International Journal of Computer Applications, ISSN:0975 – 8887, Vol. 47, No.21, 2012.
[7] Saima Amber, Narmeen Shawoo, Saira Begum., "Determination of Risk During Requirement Engineering Process", Journal of
Emerging Trends in Computing and Information Sciences, ISSN: 2079-8407, Vol. 3, NO. 3, pp: 358-364, 2012.
[8] Namrata Kapoor, Nitin Bhatia, Sangeet Kumar, "Software risk analysis using fuzzy logic", international journal of computer
information system , Vol. 2, No.2, 2011.
[9] Eric S. K. Yu and John Mylopoulos, "Understanding "Why" in Software Process Modelling, Analysis, and Design", 16th
International Conference Software Engineering, pp: 1-10, 1994.
