i-manager's Journal on Software Engineering (JSE)


Volume 9 Issue 2 October - December 2014

Research Paper

Design and Implementation of a Social Networking Site

Hana Esmaeel* , Mustafa Laith Hussein**, Afkar Abdul-Ellah***, AbdulJabbar****
* Senior Lecturer, Department of Information & Communicafion, Coliege of Information Engineering, Al Nahrain University, Iraq.
**-***-**** Department of Informatlon & Communlcatlon, College of Information Engineering, AI Nahraln UnI_versity, Iraq
Esmaeel,H,R., Hussein,M,L., Abdul-Ellah,A., and Jabbar,A. (2014). Design and Implementation of a Social Networking Site. i-manager’s Journal on Software Engineering,9(2), 1-8. https://doi.org/10.26634/jse.9.2.3322

Abstract

The paper is concerned with the design and Implementation of a Social Networking Site (SNS). The proposed system is designed and implemented using PHP(Hypertext Preprocessor), My SQL(My Structured Query Language)and JavaScript and tested using XAMPP server. Users can create their own account in SNS and enjoy the benefit from the services provided by it, like friend request, messages, and comment on any post of friends. The proposed system allows the user to add, remove friends and display their profile. The system enables the user to post on his profile and other network members profile. They can join the friends In groups according to the user's hobbies (sport, art, reading and cars). The friends can share ideas by post and comment features. The proposed system provides the users with Member directory that shows all users that are already registered in SNS and allow them to find and add friends. Administrator has a privilege access to the data base to display update, add, or delete all the content of the database.

Research Paper

Artificial Neural Networks Based Power System State Estimation

Manjula S. Sureban* , Shekhappa G. Ankaliki **
*PG. Scholar, Department of Electrical and Electronics Engineering, SDM College of Engineering & Technology, Dharwad, India
** Professor, Department of Electrical and Electronics Engineering, SDM College of Engineering & Technology, Dharwad, India
Sureban,M.S., and Ankaliki,S. (2014). Artificial Neural Networks Based Power System State Estimation. i-manager’s Journal on Software Engineering,9(2),9-16. https://doi.org/10.26634/jse.9.2.3323

Abstract

Increased Interconnectlon of the power system along with deregulated structure to satisfy growing demand has brought new challenges for power system state estlmatlon. The estlmatlon of power system stofe [1,3] in such interconnected system has become complex due to comp/exity in modelling and uncertalntles. This makes ANN a ideal candldate for state estimation, since if can accurately map the relationshlp between the measured varlable and other state variables of the power system with reduced computational resources as compared to weighted least square approach[2]. Using only load bus parameters for various operating condifions with an ANN other states of the power system can be accurately estimated. This paper dlscusses an approach to estimate the state of power system using ANN in MATLAB.

Research Paper

Software Defined Network Based Forensic System ForConcealed Communication Detection

Shantala C.P* , K.V Viswanatha**
* Research Scholar, C.M.R University, Bangalore, Karnataka, India
** Dean, PG Studies, C.M.R University, Bangalore, Karnataka, India.
Shantala.C.P., and Viswanatha.K.V.(2014). Software Defined Network Based Forensic System For Concealed Communication Detection. i-manager’s Journal on Software Engineering,9(2), 17-23. https://doi.org/10.26634/jse.9.2.3324

Abstract

The popularity of steganography has Increased in private network due to data exfllfrafion of corporate sensitive data and If Is Important to detect such malicious activity. In vi'deo a large amount of data can be hidden which is becoming Increasingly a concern of Interest . If Is very hard to defect the Inside affacker in the organization network who can extract the sensitive Information from organization and fransfer that information In hidden format through the video sfeganography To ensure privacy and security the authors have proposed an effective sfeganalysis method to defect hidden data in video by using the SDN framework pollcy. With the help of the SDN framework administrator of private network can look at the whole network and control the network by programming The main objective of this paper Is to prevent the illegal data transmission from the compromised private network by the mallclous users. Keywords: Steganography, Data Exfiltration, and Software Defined Network.

Research Paper

Web Information Extraction Using Deep Learning Algorithm

J. Sharmila* , Dr. A.Subramani**
* Research Scholar, Manonmanium Sundaranar University, Tirunelveli, India.
** Research Supervisor, Professor & Head Department of Computer Applications, K.S.R. College of Engineering, Thiruchengode, Tamilnadu, India.
Sharmila.J.,, and Subramani.A.(2014). Web Information Extraction Using Deep Learning Algorithm. i-manager’s Journal on Software Engineering,9(2), 24-35. https://doi.org/10.26634/jse.9.2.3325

Abstract

Web mining related research is getting more important nowadays because of the large amount of data that is managed through the internet. Web usage is increasing in an uncontrollable manner. A specific system is needed for controlling such large amount of data in the web space. Web mining is classified into three major divisions: Web content mining, web usage mining and web structure mining. Tak-Lam Wong and Wai Lam have proposed a web content mining approach in a research with the help of Bayesian networks. In their approach, they discuss on extracting web information and attribute discovery based on the Bayesian approach. Inspired from their research, the authors intend to propose a web content mining approach, based on a deep learning algorithm. The deep learning algorithm provides the advantage over Bayesian networks because Bayesian network is not considered in any learning architecture alike the proposed technique. In the proposed approach, three features are considered for extracting the web content. The features used are: concept feature that deals with the semantic relations on the web, format feature that deals with the format of the content and title feature, which deals with the web title. The above listed features produce some model parameters, which are given as the input to the deep learning algorithm. The process continues according to the deep learning algorithm and finally extracts content according to the input provided. There are a lot of approaches that have been developed in the area of Web Information Extraction (IE), which are concerned with harvesting useful information for any further analysis from web pages. Learning algorithms such as those for Deep Belief Networks have recently been proposed to tackle this problem with notable success. In this paper, a method has been proposed for information extraction from the Web using Deep Learning Algorithm.

Research Paper

Elimination of Equivalent Mutant Problem Using MUJAVA

M.Naveen Kumar Reddy* , S.Munwar**, Srinivasulu Asadi***
* M.Tech Scholar, Department of Software Engineering, Sree Vidyanikethan Engineering College (Autonomous), Tirupati, India.
** Assistant Professor, Department of Information Technology, Sree Vidyanikethan Engineering College, (Autonomous), Tirupati, India
*** Associate Professor, Department of Information Technology, Sree Vidyanikethan Engineering College, (Autonomous), Tirupati, India
Reddy,N,K.M., Munwar.S., and Srinivasulu.A. (2014). Elimination of Equivalent Mutant Problem Using MUJAVA. i-manager’s Journal on Software Engineering,9(2),36-42. https://doi.org/10.26634/jse.9.2.3326

Abstract

Mutation testing is a fault-based technique. Mutation testing is performed at the final stage of the software, that is, before the delivery of the software to the customer. Mutation testing is a technique which measures the adequacy of a test case by seeding artificial defects(mutants) into a program. If a test case fails to detect a mutant, it may also fail to detect real faults or defects. A mutation over the original program may not change the semantics of the program; hence it is hard to detect the changes by a test case. This problem should be got rid of. There also exists another type of mutants which keep the program semantics unchanged and thus cannot be detected by any test case, this issue must be considered by generating more number of mutants. To deal with this problem, the authors introduce MUJAVA, by applying various mutations. MUJAVA supports two level mutant operators (Traditional mutation operators and class level mutation operators). For evaluating the effectiveness of the proposed methodology open source system will be considered and experiments will be implemented using MUJAVA testing tool.