The Comprehensibility of a Z Specification Language and Its Implementation in JAVA for Implementing Atomic Read/Write Shared Memory in Mobile Ad hoc Network
DOI:
https://doi.org/10.47604/ijts.1543Keywords:
Z Specification Language, Formal Specification, GUI, Java Language, Mobile Ad Hoc Network.Abstract
Comprehensibility is often raised as a problem with formal notations; yet formal methods practitioners dispute this. In a survey, one interview said "formal specifications are no more difficult to understand than code". Measurement of comprehension is necessarily. In this paper, a comprehension of Z specification with that of its implementation in JAVA for atomic object Read/Write shared memory in mobile ad hoc network is performed.
Downloads
References
Barmade , M.M. Nashipudinath, "An efficient strategy to detect outliertransactions," International Journal of Soft Computing and Engineering (IJSCE), vol. 6, no. 174-178, p. 3, 2014.
Z. He, X. Xu, J.Z. Huang, S. Deng, "Fp-outlier: frequent pattern based outlier detection," Computer Science and Information Systems, vol. 2,no. 1, pp. 103-118, 2017.
F. Hendrikx, K. Bubendorfer, R. Chard, "Reputation systems: a survey and taxonomy," Journal of Parallel and Distributed Computing, vol. 75, pp. 184-197, 2015.
Dobson, A. J., and A. G. Barnett. , An Introduction to Generalized LinearModels, Chapman and Hall/CRC. ,Taylor & Francis Group, 2018.
A . Manna, A . Sengupta, C. Mazumdar, "A survey of trust models for enterprise information systems," Procedia Comput. Sci., vol. 85, p. 527- 534, 2016.
R. Malaga, "Web-based reputation management systems: problems and suggested solutions," Electronic Commerce Research, p. 403-417, 2016.
G. D'Angelo, S. Rampone, F. Palmieri, "An artificial intelligence-based trust model for pervasive computing," Proceedings of the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), p. 701-706, 2015.
G. D'Angelo, S. Rampone, F. Palmieri, "Developing a trust model for pervasive computing based on apriori association rules learning and Bayesian classification," Soft Comput., p. 6297-6315, 2017.
J. Weng, C. Miao, A. Goh, "Protecting Online Rating Systems from Unfair Ratings," International Conference on Trust, Privacy and Securityin Digital Business, p. 50-59, 2015.
C .Chiang,J.E.Urban, "Validating Software Specification against User Claims", Proceedings of the Twenty-Third Annual International Computer Software and Applications Conference _OMPSAC( 2015),2015,PP:104-109.
DOLEV, S., Gilbert, S.LYNCH, N.A., SHVARTSMAN, A.A., Welch, J.L.: " Geoquorums: Implementing Atomic Memory in Mobile Ad Hoc Networks". In: Proceeding of the 17th International Conference on Distributed Computing, PP. 306-320 (2019).
Haas, Z.J., Liang, B.: "Ad Hoc Mobile Management with Uniform Quorum Systems". IEEE/ACM Transactions on Networking 7(2), PP: 228-240 (2018).
T. Hara, "Location Management of Replication Considering Data Update in Ad Hoc Networks, in : The 20th International Conference AINA, 2016, PP. 753-758 .
T. Hara, A. " Replication Management for Data Sharing In Mobile Ad Hoc Networks", Journal of The Interconnection Networks and communication 7(1) (2019), PP.75-90 .
Y Sawai, M. Shinohara, A. Kanzaki, T. Hara, S. Nishio, " Ensuring Consistency Management Among Replicas Using A Quorum System in Ad Hoc Networks", MDM (2018 ) , PP.128-132.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Reham.A.Shihata
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.