i-manager's Journal on Software Engineering (JSE)


Volume 5 Issue 1 July - September 2010

Research Paper

Adaptive Resource Management in Application to Surveillance Networks using Stochastic Methodologies

Charles C. Castello* , Jeffrey Fan**
* Research Assistant, Applied Research Center, Florida International University.
** Assistant Professor, Electrical and Computer Engineering, Florida International University.
Charles C. Castello and Jeffrey Fan (2010). Adaptive Resource Management in Application to Surveillance Networks using Stochastic Methodologies. i-manager’s Journal on Software Engineering, 5(1), 1-6. https://doi.org/10.26634/jse.5.1.1201

Abstract

A wide range of applications have been developed in recent years pertaining to surveillance networks, which include defense, environmental protection, manufacturing, weather forecasting, and structural monitoring. The following research aims to present a novel method of resource allocation in surveillance networks (e.g. Wireless Sensor Networks) by using stochastic modeling techniques and reconfigurable System-on-a-Chip (SoC) systems. The basic idea behind the proposed framework is that a set amount of system resources (e.g. processing power, transmission bandwidth, system memory, etc.) can be dynamically allocated to different nodes within the system depending on the application or needs at any given time. The allocation of these resources is based on a stochastic approach which models resource demands by utilizing known and unknown random distributions. These distributions are analyzed using their associated polynomial expansions for known distributions and importance sampling for unknown distributions. An example of this would be using the Hermite Polynomial Chaos (PC) representation of random processes for Gaussian and log-normal distributions. The proposed framework results in intelligent surveillance networks with the ability to allocate resources in real-time.

Research Paper

UML Based Visualization of Objects for Partial Software Reengineering

Sumesh Sood* , Arvind Kalia**, Hardeep Singh***, Shalini Sood****
* Assistant Professor, Department of Computer Applications, Swami Satyanand College of Management & Technology, Punjab, India.
** Professor, Department of Computer Science, Himachal Pradesh University, Shimla, Himachal Pradesh, India.
*** Professor, Department of Computer Science & Engineering, Guru Nanak Dev University, Punjab, India.
**** Lecturer, Department of Mathematics, M G S M Janta College, Punjab, India.
Sumesh Sood, Arvind Kalia, Hardeep Singh and Shalini Sood (2010). UML Based Visualization of Objects for Partial Software Reengineering. i-manager’s Journal on Software Engineering, 5(1),51-57. https://doi.org/10.26634/jse.5.1.1210

Abstract

The law of software entropy dictates that even when a system start to function in a well-designed state, requirement of user changes and user demand new functionality. As the requirements of users change with the passage of time, it becomes mandatory to make changes in software. The new changes may result with the introduction of new bugs in the system. After some time it requires regular maintenance. To find whether software can be maintained, reengineer, or retire and build again, two metrics are proposed in this work. Proposed software reengineering metric (RRC and RRCM) can be used to calculate reengineering requirement cost of entire software and reengineering requirement cost of each Module. UML diagrams are used to identify different components of the software. The results obtained after applying the proposed metric become the basis for the decision whether there will be requirement of maintenance, reengineering or retirement of software.

Research Paper

A new greedy algorithm for multi-processor scheduling with gang scheduling

Sarath B. Siyambalapitiya* , M. Sandirigama**
* Research Student, Department of Statistics and Computer Science, University of Peradeniya, Sri Lanka.
** Head, Department of Computer Engineering, University of Peradeniya, Sri Lanka.
Sarath B. Siyambalapitiya and M. Sandirigama (2010). A New Greedy Algorithm for multi-processor scheduling with gang scheduling. i-manager’s Journal on Software Engineering, 5(1),7-12. https://doi.org/10.26634/jse.5.1.1202

Abstract

In this study, we propose some greedy algorithms for the multi-processor job scheduling problem. A given list of jobs are arranged according to the time duration for processing. Depending on the job processing times, some jobs are divided into multi-threads while others remain as single thread jobs. Multi-thread jobs are processed based on the concept of gang scheduling. A lower bound for the total processing time is computed. The results of the proposed algorithm is presented using a percentage gap from the optimal solution  using this lower bound.

Research Paper

Effects of Self-frequency Shift on Soliton Propagation

Dowluru Ravi Kumar * , B. Prabhakara Rao**
* Lecturer, Department of Technical Education, India.
** Professor & Director, Jawaharlal Nehru Technological University, India.
Dowluru Ravi Kumar and B. Prabhakara Rao (2010). Effects of Self-frequency Shift on Soliton Propagation. i-manager’s Journal on Software Engineering, 5(1),13-17. https://doi.org/10.26634/jse.5.1.1203

Abstract

Though the solitons are more robust than linear transmission systems, the effect of soliton self-frequency shift reduces the stability of the soliton transmission system. In this paper we investigated the propagation of ultra-short solitons in fiber-optic systems in the presence of the soliton self-frequency shift effect. We also demonstrated that both the self-frequency shift and the background instability can be effectively controlled using spectral filters of moderate strength together with nonlinear gain devices with gain proportional to the second and fourth power of the amplitude.

Research Paper

Improving Performance of Voice over IEEE 802.11e

Chenna Reddy P*
Associate Professor, Department of Computer Science and Engineering, JNTUA College of Engineering, Andhra Pradesh, India.
Chenna Reddy P (2010). Improving Performance of Voice over IEEE 802.11e.i-manager’s Journal on Software Engineering, 5(1), 18-22. https://doi.org/10.26634/jse.5.1.1204

Abstract

Quality of service is how well the network satisfies the user requirements. IEEE 802.11e is the quality of service extension of wireless LAN standard IEEE 802.11. IEEE 802.11e achieves quality of service by service differentiation using the parameters Arbitration interframe space and contention window. They are set to different initial values for different flows to achieve service differentiation. But the procedure used to change contention window is same for all the flows. In this paper the contention window is adjusted differently for different flows to improve the performance of voice. Network simulator, NS2, is used for simulation.

Research Paper

Random segmentation blocks algorithm for Gout Skin Detection and recognition

Hind R. Mohammed*
Assistant Professor, College of Mathematical and Computer Sciences, Kufa University, Iraq.
Hind R. Mohammed (2010). Random segmentation blocks algorithm for Gout Skin Detection and recognition. i-manager’s Journal on Software Engineering, 5(1),23-28. https://doi.org/10.26634/jse.5.1.1205

Abstract

Gout is a disease of antiquity but is increasing once again in prevalence despite availability of reasonably effective treatments. This may be related to a combination of factors, including diet, obesity, and diuretic use. Allergic reactions, noncompliance, drug interactions, and sometimes inefficacy all limit the effective use of current hypouricemic agents. The objective of this paper is to show  that for every color space there exists an optimum Gout skin detector scheme so that the performance of all these skin detectors schemes is the same, and then process the Random segmentation blocks  algorithm in order to recognition Gout skin  A theoretical proof is provided and experiments are presented which show that the separability of the skin and no skin classes is independence of color space and some parameters chosen (experimentation  for 80 gout image for different types and 80 other Dermatological disorders images) for testing are Energy, Entropy,  Average and  Variance. 160 patients were randomly placed in three groups and treated topically along 7-weeks with either gout in foot or hand or other parts body. The recognition results for testing program by Random segmentation blocks algorithm shows superior efficacy for gout skin detection (the testing stage contain all 160 images to recognized only gouts images).

Research Paper

Mathematical Modeling and Simulation of Computer Programming

Sankar S* , Yuvaraj**
* Senior Lecturer, Department of EEE, Panimalar Institute of Technology, Tamil Nadu, India.
** Asistant Professor, Department of CSE, Panimalar Institute of Technology, Tamil Nadu, India.
S. Sankar and Yuvaraj (2010). Mathematical Modeling and Simulation of Computer Programming. i-manager’s Journal on Software Engineering, 5(1),29-33. https://doi.org/10.26634/jse.5.1.1206

Abstract

This paper examines the application of Visual Basic Computer Programming Language to Simulate Numerical Iterations, the merit of Visual Basic as a Programming Language and the difficulties faced when solving numerical iterations analytically, this research paper encourage the uses of Computer Programming methods for the execution of numerical iterations and finally fashion out and develop a reliable solution using Visual Basic package to write a program for some selected iteration problems.

Research Paper

New secure communication protocols for mobile e-health system

Aramudhan M * , K. Mohan **
* Perunthalaivar Kamarajar Institute of Engineering and Technology, Nedungadu, Karaikal.
** Research Scholar, Sathyabama University, Chennai, India.
Aramudhan M and K. Mohan (2010). New secure communication protocols for mobile e-health system. i-manager’s Journal on Software Engineering, 5(1), 34-39. https://doi.org/10.26634/jse.5.1.1207

Abstract

E-health system has been used as communication system that enables to deliver medical service over the Internet. The medical information’s accessible in e-health systems are highly sensitive and distributed that demands strong authentication and authorization mechanisms for communication between the healthcare professionals, consumers and providers. Internet is an open system that provides anybody can access any information. Hence, e-health users demand safe communication and user privacy over Internet. This paper introduces two secure communication protocols based on message passing and Mobile agent for online e-health system. Certificate based Authentication and Attribute based Policy assigned Authorization framework (CAAPA) for Mobile e-health systems is proposed based on message passing technique. Token based Cross Verification (TCV) protocol is proposed for secure services in e-health System over Internet based on Mobile agent. Both protocols offer user friendly, well-built secure mechanism that gives confident to the users and healthcare professional to access the E-health system. CAAPA is efficient in terms of maintaining strong user privacy and the communication overhead is high. TCV is efficient in terms of maintaining strong user privacy and consumes less communication overhead.

Research Paper

Approach for Analyzing Clustering Technique in Software Maintenance for Object Oriented System

Dr. Anil Kumar Malviya* , N. Badal**
* Associate Professor, Department of Computer Science & Engineering, Kamla Nehru Institute of Technology (KNIT), Sultanpur
** Assistant Professor, Department of Computer Science & Engineering, KNIT, U.P, India.
Dr. Anil Kumar Malviya and N. Badal (2010). Approach for Analyzing Clustering Technique in Software Maintenance for Object Oriented System. i-manager’s Journal on Software Engineering, 5(1),40-44. https://doi.org/10.26634/jse.5.1.1208

Abstract

Object Oriented Software Engineering has been emerging field for software development process. Although maintenance may be turn out to be easier for Object Oriented System. But it is unlikely that the maintenance burden will be completely disappearing. Still, maintenance consumes a large portion of software development cost. Therefore it is worthwhile to develop Object Oriented System keeping maintainability as a key issue in design phase. This paper examines the role of clustering technique of data mining in maintenance of software system using object oriented metrics. The presented work evaluates the K-means clustering method by applying it to the commercial software system. The experimental work of software maintenance for the sample data is being simulated on Matlab.

Research Paper

Performance evaluation and comparison of routing algorithms in ZigBee/ IEEE 802.15.4

P. Anitha* , Chandrasekar C**
* KSR College of Engineering, Tiruchengode, India.
** Reader, Periyar University, Salem, India.
P. Anitha and Chandrasekar C (2010). Performance evaluation and comparison of routing algorithms in ZigBee/ IEEE 802.15.4.i-manager’s Journal on Software Engineering, 5(1), 45-50. https://doi.org/10.26634/jse.5.1.1209

Abstract

The real application in wireless Sensor network (WSN) requires connectivity between nodes to transmit the collected data to a sink node. The primary design goal of low rate wireless mesh personal area networks (LR-WMPANs) is low cost, low power consumption and support of simple devices such as sensors and actuators. Zigbee is a standard for wireless personal area network (WPAN) based on IEEE 802.15.4. It is a new standard uniquely designed for low rate wireless personal area networks. The main research objectives of this paper are to evaluate the adequateness of the IEEE 802.15.4 protocols for supporting WSN applications and the identification of open issues in the standard specifications. Zigbee uses Ad-hoc On-demand Distance Vector (AODV) as a routing protocol.  Finally, this paper presents a performance of the Ad-hoc On-demand Multipath Distance Vector (AOMDV) as a routing protocol, comparing experimental and simulation results. Performance comparison of AOMDV with AODV using ns-2 simulations shows that AOMDV is able to effectively cope with mobility-induced route failures.