You are on page 1of 2

Assignment-03

Title: Aim: Use of above to identify the object, morphism, overloading in function (if
any), and functional relations and any other dependencies (as per requirements).
Use of divide and conquer strategies to exploit distributed/parallel/concurrent processing of
the above to identify objects, polymorphisms, overloading in functions (if any), and
functional relations and any other dependencies (as per requirements).
System S is defined as collection of following set:
S = {Ip, Op, Ss, Su, A}
Mapping Functions f(x) X Y
F2(Ip1) → Op1 Ip1 Op1
F3(Ip2) → Op2 Ip2 Op2
F4(Op2) → Op3 Op2 Op3
F6(Ip2) → Su Op2 Su

Objects:
1) Input1: Ip1 = {Username, Password}
2) Input2: Ip2= {input user Facebook data}
3) Input3: Ip3= {Apply NLP and SVM}

1) Output1: Op1 = {Login}


2) Output2: Op2 = {Authentication success}
3) Output3: Op3 = {Result Seviourity(stress) Level}

Functional Dependency Graph:

F1 F2 F3 DB

F5 F4

F6
1) Function 1 = F1 = Login
2) Function 2 = F2 =Input Data form Facebook
3) Function 3 = F3 = NLP apply on user Post
4) Function 4 = F4 = SVM
5) Function 5 = F5 = Seviourity Level
6) Function 6 = F6 = Show Results

You might also like