i-manager's Journal on Software Engineering (JSE)


Volume 6 Issue 3 January - March 2012

Research Paper

Email Security Using Two Cryptographic Hybrids of Mediated and Identity-Based Cryptography

Sufyan T. Faraj Al-Janabi* , Hussein Khalid Abd-alrazzaq**
*-** College of Computer, University of Anbar, Ramadi, Iraq.
Al-Janabi, S. T. F. and Alrazzaq, A, K, H. (2012). Email Security Using Two Cryptographic Hybrids Of Mediated And Identity-Based Cryptography, i-manager’s Journal on Software Engineering, 6(3), 1-12. https://doi.org/10.26634/jse.6.3.1786

Abstract

The security of email can be considered one of the important issues for scientific research since the nineties of the last century. This is mainly comes from the wide use of e-mail for exchanging various kinds of information especially that some of them are important or sensitive. Although there have been several solutions offered to solve this problem but we still facing the fact that most email messages sent so far have been without any security. The main reason behind this is that, the previous systems relied on the traditional public key cryptography were so complicated from usability point of view for most users.  In this work, we exploit the use of Identity-Based Cryptography (IBC) for solving this usability problem. Indeed, to further increase the system strength, IBC has been combined with mediated RSA cryptography. Our proposal includes the deployment of the two promising hybrids of mediated IBC. In both of these hybrid cryptographic systems, all operations of encryption/decryption and signature/verification have been considered. The proposed system has met the design objectives either totally or partially.  We beileve that our proposed hybrids for mediated IBC can be very helpful in simplifing the use of e-mail security so that to increase the number of users of such systems.

Research Paper

A Heuristic Technique for Automated Test Cases Generation from UML Activity Diagram

A.V.K. Shanthi* , G. Mohan Kumar**
* Assistant Professor, Department of Electronic Sciences, Sathyabama University, Chennai, India.
** Principal, Park College of Engineering, Coimbatore, India. Description
Shanthi, A. V. K., and Kumar, A. (2012). A Heuristic Technique For Automated Test Cases Generation From Uml Activity Diagram. i-manager’s Journal on Software Engineering, 6(3),13-20. https://doi.org/10.26634/jse.6.3.1787

Abstract

In software development, testing plays an important role. Software testing is an important phase that ensures the quality of the software. This paper proposes a heuristic technique to test the software at the initial stage itself so that it will be easy for software testers to test the software in the later stages. Here test cases are an important entity or criteria by which software is being evaluated. Though Test cases can be generated by various approaches, Unified Modeling Languages attracts the recent researches and industrialists. This paper focus on test case generation by means of UML Activity diagram using Genetic Algorithm which best test cases are optimized and the test cases validated by prioritization.  The test cases generated using our approaches are capable of detecting more faults like synchronization faults, loop faults unlike the existing approaches A case study is used to illustrate the approach.

Research Paper

Mathematical Modeling of Markovian Queuing Network with Repairs, Breakdown and fixed Buffer

Mamatha . E* , C.S. Reddy**, Ramakrishna Prasad***
*-*** Department of Mathematics, SV University, Tirupati, AP, India.
** School of Advanced Sciences, VIT University, Vellore, India.
Mamatha, E., Reddy, S. C and Prasad, R. K. (2012). Mathematical Modeling Of Markovian Queuing Network With Repairs, Breakdown And Fixed Buffer. i-manager’s Journal on Software Engineering, 6(3),21-27. https://doi.org/10.26634/jse.6.3.1788

Abstract

Present days, various practical queuing systems extensively used in computing and communication have finite capacities and in such systems, servers are prone to failures. Queuing networks are widely used in the modeling of transaction processing systems, and their interactions among nodes in communication networks. The performance modeling of a multi-node system, with heterogeneous nodes, each node serving external as well as routed internal arrivals of jobs is considered in this paper. Results obtained using the analytical model are analyzed.

Research Paper

Improving Customer Relationship Management in Electronic Transaction Expansion in Banking Sector by using Data mining techniques

Bhaskar Reddy Muvva Vijay* , Luel Berhe Woldesamuel**
*-** Lecturer, Department of Computer Science and Information Systems, Ethiopian Institute of Technology, Mekelle University, Mekelle.
Vijay, M. R. B, and Woldesamuel, B. L. (2012). Improving Customer Relationship Management In Electronic Transaction Expansion In Banking Sector By Using Data Mining Techniques. i-manager’s Journal on Software Engineering, 6(3), 28-43. https://doi.org/10.26634/jse.6.3.1790

Abstract

Today, many businesses such as banks, insurance companies, and other service providers realize the importance of Customer Relationship Management (CRM) and its potential to help them acquire new customers retain existing ones and maximize their lifetime value. Data mining gives an opportunity, uses a variety of data analysis and modeling methods to specific trends and relationships in data detection. This helps to understand what a customer wants and anticipate what they will do. In this paper we examines, the application of k-means clustering and classification decision tree J48 algorithm of data mining on CRM in the case of EFT of POS service of the Dashen Bank S.C. These have been discovered within the framework of CRISP-DM model. The results demonstrate the final dataset consists of 110000 records in which different clustering models at k values of 6, 5, and 4 with different seed values have been traced and evaluated against their performances. Thus, the cluster model at k value of 6 with default seed value has shown a better performance by using Weka-3-7-2 tool.

Research Paper

Data Mining Techniques and Applications- A Review

Venkatesan Thillainayagam*
Assistant Professor, Department of Computer Applications, AVC College of Engineering, Tamilnadu, India.
Thillainayagam, V. (2012). Data Mining Techniques and Applications- A Review. i-manager’s Journal on Software Engineering, 6(3), 44-48. https://doi.org/10.26634/jse.6.3.1791

Abstract

Data mining is the process of extracting patterns from data. Basically Data mining is the analysis of observational data sets to find unsuspected associations and to sum up the data in new ways that are both clear and useful to the data owner .It is seen as an increasingly important tool by modern business to transform data into business intelligence giving an informational advantage. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by retrospective tools typical of decision support systems. The review paper discusses few of the data mining techniques, algorithms and some of the organizations which have adapted data mining technology to improve their businesses and found excellent results. Data mining tools can answer business questions that traditionally were too time consuming to resolve. Data mining is becoming increasingly common in both the private and public sectors. Industries such as banking, insurance, medicine, and retailing commonly use data mining to reduce costs, enhance research, and increase sales. To be successful, data mining still requires skilled technical and analytical specialists who can structure the analysis and interpret the output that is created.