Comparison between Traditional Approach and Object-Oriented Approach in Software Engineering Development
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 6
Abstract
This paper discusses the comparison between Traditional approaches and Object-Oriented approach. Traditional approach has a lot of models that deal with different types of projects such as waterfall, spiral, iterative and v-shaped, but all of them and other lack flexibility to deal with other kinds of projects like Object-Oriented. Object–oriented Software Engineering (OOSE) is an object modeling language and methodology. The approach of using object – oriented techniques for designing a system is referred to as object–oriented design. Object–oriented development approaches are best suited to projects that will imply systems using emerging object technologies to construct, manage, and assemble those objects into useful computer applications. Object oriented design is the continuation of object-oriented analysis, continuing to center the development focus on object modeling techniques.
Authors and Affiliations
Nabil Mohammed Ali Munassar , Dr. A. Govardhan
Real Time Computation for Robotic Arm Motion upon a Linear or Circular Trajectory
The computation method proposed in this paper, named ADNIA (Analysis Differential Numeric Interpolate Algorithms), computes waypoints Cartesian coordinates for TCP (tool centre point) of a robotic arm, for a motion on an...
Laguerre Kernels –Based SVM for Image Classification
Support vector machines (SVMs) have been promising methods for classification and regression analysis because of their solid mathematical foundations which convey several salient properties that other methods hardly prov...
Development of knowledge Base Expert System for Natural treatment of Diabetes disease
The development of expert system for treatment of Diabetes disease by using natural methods is new information technology derived from Artificial Intelligent research using ESTA (Expert System Text Animation) Syste...
Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study
Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platfor...
Clustering-based Spam Image Filtering Considering Fuzziness of the Spam Image
If there are pros, corns are always there. As email becomes a part of individual’s need in our busy life with its benefits, it has negative aspect too by means of email spamming. Nowadays images with embedded text called...