i-manager's Journal on Software Engineering (JSE)


Volume 1 Issue 4 April - June 2007

Article

Metrics in Component Based Software Development Using Frameworks &Middleware

R. Thirumalai Selvi* , Balasubramanian N.V**, George T. Manohar***, Adham Sheriff A ****
*Sr .Lecturer ,Dept of Computer Applications Velammal Engg College,Chennai,India
**Professor,Computer Sci &Engg ,RMK Engg College ,Chennai ,India.
***Dept of Electrical Engg IIT Madras, Chennai ,India
****Lecturer ,Dept of Computer Applications Velammal Engg College,Chennai,India
Thirumalai Selvi R, Balasubramanian N.V, George T. Manohar and Adham Sheriff A (2007). Metrics in Component Based Software Development Using Frameworks &Middleware. i-manager’s Journal on Software Engineering, 1(4),12-18. https://doi.org/10.26634/jse.1.4.719

Abstract

Increasing demand for quality software that meets the criteria of being economical, portable, efficient, reliable, robust, and upgradable has been met with the component based approach to software development. A further constraint today is the availability of trained man-power pool. A component is used on either an “as-is” basis (adoption) or on a “parameterized” basis (adaption). New components are added to the pool when necessary. The term “template” is frequently used for components. Component Based Software Engineering (CBSE) has thus emerged as the new effective paradigm in the 90’s. Measurement techniques in CBSE have, however, been rather limited. Even the so called ‘global’ methods like Mark II Function Points are not quite suitable when it comes to CBSE. The paper reviews the research work of various authors in the area of metrics in CBSE. Many of these authors have focused on extending Object-Oriented metrics like C-K metrics. Three areas under close scrutiny are complexity, customizability, and reusability. These authors have based their approaches more on theoretical aspects, while empirical studies have been neglected. Even the Verner- Tate empirical studies are based on the Fourth Generation Language Paradigm of the 80’s (where traditional metrics can be applied with relative ease). Today we would not accept them as CBSE. The authors’ suggestion is to include architectural styles, architectural patterns, and frameworks while studying metrics. Two examples are OMG’s CORBA and Microsoft’s DCOM. A number of frameworks are available in the Open Source community. The paper presents the findings of a small study of projects undertaken by students in the web publishing area. It is the authors’ contention that metrics must be specific to the framework used for implementation. It is a relatively simple task to mount an instrument in a framework such as TYPO3 (Open Source Web Content Management System Framework) for measurement purposes. This is illustrated in our paper. It would take a number of such studies to validate various metric models proposed by authors in the area of CBSE.

Research Paper

Quadratic Residue Integrity Standard

Vinu V Das *
Researcher and Lecturer in the Department of Computer Sience and Engineering, MES College of Engineering, Kuttippurom, Kerala, India
Vinu V Das (2007). Quadratic Residue Integrity Standard. i-manager’s Journal on Software Engineering, 1(4), 81-84. https://doi.org/10.26634/jse.1.4.757

Abstract

This paper presents a new and efficient algorithm that provides a high degree of integrity for the packets, which are encrypted using Quadratic Residue Cryptography. This standard, evolved from the base of Quadratic Residuosity Problem, provides security for the bit in the information super highway. Even though a number of Quadratic Residue encryption techniques are available, there is no algorithm for ensuring its integrity. Quadratic Residue Integrity Standard will nullify the same.

Research Paper

Rule Based Network Security Using Genetic Algorithm

Jeya S* , Ramar K**
*Associate professor in the K.S.R College of Engineering, Tiruchengode.
**Head. CSE Department, National Engineering College, Kovilpatti, Tamil Nadu, India.
Jeya S and Ramar K (2007). Rule Based Network Security Using Genetic Algorithm. i-manager’s Journal on Software Engineering, 1(4), 85-91. https://doi.org/10.26634/jse.1.4.760

Abstract

This paper describes a technique of applying Genetic Algorithm (GA) to network security. As the transmission of data over the Internet increases, the need to protect connected systems also increases. Rule based network security is the latest technology used for this purpose. Although the field of network security is still developing, the systems that do exist are still not complete, in the sense that they are not able to detect all types of intrusions. Some attacks which are detected by various tools available today cannot be detected by other products, depending on the types and methods that they are built on. Using a Genetic Algorithm is one of the methods that detect intrusions. The focus of this paper is to introduce the application of GA, in order to improve the effectiveness of network security. Unlike other implementations of the same problem, this implementation considers both temporal and spatial information of network connections in encoding the network connection information into rules in network security. This is helpful for identification of complex anomalous behaviors. This work is focused on the TCP/IP network protocols.

Article

DUAL HASH PROTOCOL - A protocol for Authentication with Non-repudiation in Multicast Stream

Guru Baskar T* , Manickam P**
*,** Senior Lecturer in the Department of Applied Sciences.Sethu Institute of Technology
Guru Baskar T and Manickam P (2007). DUAL HASH PROTOCOL - A protocol for Authentication with Non-repudiation in Multicast Stream. i-manager’s Journal on Software Engineering, 1(4), 19-22. https://doi.org/10.26634/jse.1.4.722

Abstract

Multicast communication is widely adopted in real-time applications today such as Audio, Video and Data transfer. Though various types of protocols for multicasting communication exist, they are not fully satisfied regarding with security. Still a lot of research works is being carried out to support the security services like confidentiality, authentication, non-repudiation, integrity and access-control.

Most of the applications need the source authentication of the multicast information even after packet loss like video conferencing. In this paper, we first present the structure and applications of multicast communication. Then, we focus some of the recent authentication techniques for multicast stream flow. Finally, we will discuss about our proposed Protocol that authenticates the source of the multicast flow with non-repudiation and tolerates packet loss using redundant hash-chaining technique.

Research Paper

Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection

Jacinth Salome* , Ramya Ravishankar**
*,** Lecturer ,Velammal Engg College ,Red Hills Road ,Puzhal ,Chennai
Jacinth Salome and Ramya Ravishankar (2007). Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection. i-manager’s Journal on Software Engineering, 1(4), 23-30. https://doi.org/10.26634/jse.1.4.731

Abstract

A prototype of  intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques. The anomaly-based components are developed using fuzzy data mining techniques. They look for deviations from stored patterns of normal behavior. Genetic algorithms are used to tune the fuzzy membership functions and to select an appropriate set of features. The misuse detection components look for previously described patterns of behavior that are likely to indicate an intrusion. Both network traffic and system audit data are used as inputs for both components.

Research Paper

IAPP for IEEE802.11 WLAN with Improved Range

Krishna Naik K* , M. N. Giri Prasad**
*Assistant Professor and Head in the department of Information Technology at Sree Visvesvaraya Institute of Technology and Science, Mahabubnagar, India.
** Professor and Head,in the department of Electronics and Communication at J.N.TUniversity College of Engineering, Pulivendula, India
Krishna Naik K and Giri Prasad M.N (2007). IAPP for IEEE802.11 WLAN with Improved Range. i-manager’s Journal on Software Engineering, 1(4), 31-38. https://doi.org/10.26634/jse.1.4.740

Abstract

A methodology has been proposed to extend the desirers of people with large covered WLAN with the help of IAPP protocol and self designed antennas. The IAPP is a communication protocol used by the management entity of an AP to communicate with other APs and which will provide a unified solution for both intra and intersubnet handoff processes. The proposed enhancement relies on the access point's interoperability with other APs, provided by the IP-based IAPP, so as to enable the intra and intersubnet link-layer frame buffering-and-forwarding. IAPP is an IEEE 802.11f standard which is a part of IEEE 802.11 is designed for the enforcement of unique association throughout an ESS and for secure exchange of stations security context between current AP and new AP during the handoff period. It is simulated with self-designed IAPP software which is portable to different operating systems and wireless chipsets using well-defined external interface. The performance of IAPP measured, compared and explained with the help of graphical representations.

Research Paper

On-line Network Reconfiguration and Service Restoration in Radial Distribution Systems Using Genetic Algorithm

P. V. Prasad* , Sreenivasulu N**
*Associate Professor, Chaithanya Bharathi Institute of Technology ,Hyderabad,India.
**Associate Professor, J.N.T.U.College of Engineering ,Anatapur,India
*** Principal ,Vaagdevi Institute of Technology ,Proddatur,India
Dr. P.Venkata Prasad, S. Sivanagaraju and Sreenivasulu N (2007). On-line Network Reconfiguration and Service Restoration in Radial Distribution Systems Using Genetic Algorithm. i-manager’s Journal on Software Engineering, 1(4),39-45. https://doi.org/10.26634/jse.1.4.742

Abstract

Electrical distribution network reconfiguration is a complex optimization process aimed at finding a radial operating structure that minimizes the system power loss while satisfying operating constraints. Network reconfiguration for time varying loads is very complex and extremely non-linear optimization, which can be effectively, solved using Genetic Algorithm (GA). Because of the faults and after isolating the fault, there are unfaulted sections, which are left without supply. It is required to quickly restore supply to these unfaulted sections of distribution systems. During a fault, switches are used for fault isolation and service restoration. This paper presents a simple method to solve online network reconfiguration problem for loss reduction and service restoration using GA. By using the proposed algorithm, a more efficient online network reconfiguration can be obtained to reduce losses. The loads can be restored as much as possible by transferring de-energized loads to other supporting distribution feeders without violating operating constraints. The effectiveness of the proposed method is demonstrated with 16-node test system. The method suggested is very simple for feeder reconfiguration and service restoration.

Research Paper

Block Cipher Design after AES and the New Cipher Nahrainfish

Sufyan T. Faraj Al-Janabi*
Associate Professor, College of Computers ,Anbar University ,Iraq
Sufyan T. Faraj Al-Janabi. (2007). Block Cipher Design after AES and the New Cipher Nahrainfish.i-manager’s Journal on Software Engineering, 1(4), 46-61. https://doi.org/10.26634/jse.1.4.744

Abstract

This Work presents some deeper insights on the state-of-the-art in block cipher design. This is mainly done by assessment of the evaluation process of the AES (Advanced Encryption Standard). We conclude (with may be a little bit surprising result) that the required security level, for a block cipher to be used for the present and foreseeable future, may be under estimated during AES evaluation. In accordance, we propose a new block cipher that we call Nahrainfish, which we believe that it offers the required security level without a big sacrifice in efficiency and other related criteria. Instead of building Nahrainfish totally from scratch, we have made a benefit mainly from some AES finalists to develop the new cipher by an over-engineering approach leading to the required higher security level. Nahrainfish is a classical Feistel network based on a novel combination of both key-dependent S-boxes and data-dependent rotations. It operates on 128-bit blocks and accepts a variable key length up to 1024 bits. The paper also includes some important notes on the security and performance of the cipher.

Research Paper

New Techniques for Face Image Recognition Identification and Labeling

Milhled Alfaouri* , Nada N. Al-Ramahi**
*Associate Professor, at the Department of Communication and Electronics Engineering, Philadelphia University Amman Jordan.
Milhled Alfaouri and Nada N. Al-Ramahi (2007). New Techniques for Face Image Recognition Identification and Labeling. i-manager’s Journal on Software Engineering, 1(4), 62-69. https://doi.org/10.26634/jse.1.4.752

Abstract

This paper presents a dynamic programming algorithm for identification and labeling for intrinsic and extrinsic factors of face appearance. The novelty of the proposed technique is based on a new combination of mapping network, called wavenet-network (WN) and Inverse Discrete Multi-Wavelet Transform (IDMW). Wavenet is induced by combining the wavelet transform model with the basic concept of neural networks. The new mapping network called wavenets is proposed as an alternative method to feed forward neural networks to approximate the arbitrary nonlinear functions. Wavenet (WN) was employed to make approximation to the images before passing through the Inverse Discrete Multi-Wavelet Transform (IDMW) decomposition to extract image descriptive features. These features are used in neural networks of the proposed image identification algorithm to define the test image. A successful identification rate of: 99% was achieved with this approach for the intrinsic factors and 93% was achieved with this approach for the extrinsic factors. The algorithm is implemented using MATLAB programming languages version 7.

Research Paper

Uni-Distance Encoding scheme for reduction of Bus Transition Activity

Samta Gajbhiye* , Kamal K Mehta**, Sharma H.R***
*Sr. Lecturer, (CSE) at Shri Shankaracharya College of Engineering & Technology, Bhilai
**Assistant Professor & HoD (CSE) Shri Shankaracharya College of Engg & Tech BHILAI (C.G.).
*** Professor & HoD (CSE) Shri Chatrapathi Sivaji College of Engg & Tech Durg(C.G.).
Samta Gajbhiye, Kamal K Mehta and Sharma H.R (2007). Uni-Distance Encoding scheme for reduction of Bus Transition Activity. i-manager’s Journal on Software Engineering, 1(4), 70-74. https://doi.org/10.26634/jse.1.4.754

Abstract

Consumption of power has become an important issue for modern COMPUTING systems [1]. Research result shows that off chip busses consumes considerable amount of power.  Researchers suggested that one effective way to reduce power consumption is to reduce bus activities [2]. Power dissipation in CMOS circuits during inactive periods (static power) has become a significant part of the total power dissipation. Transition on high capacitance busses in VLSI systems results in considerable dissipation. Various coding schemes have been proposed in literature to encode data in order to reduce the number of bus transition [3][4][5]. Few method gives tremendous result 50% reduction in I/O average power dissipation and 25% reduction in I/O average power dissipation. In this paper we derived a new coding method, which leads to extremely easy practical way, which reduces number of bus transition. In this proposed scheme all bits of communication system is considered at once, and there is no need to divide bus systems into segments. Simulation result of proposed scheme shows that our concept reduces transition activities by 24.

Research Paper

Effect of Selfish Nodes in a Mari Topology Based Adhoc Wireless Ndetworks – A Proposed Solution

Subramanyam M.V* , K. Satya Prasad**
*HOD of ECE Dept .R.G.M College of Engg and Tech,Nandyal,Kurnool
**Principal and prof of ECE ,JNTU College of Engg,Kakinada ,Godavari ,India
Subramanyam M.V and K. Satya Prasad (2007). Effect of Selfish Nodes in a Mari Topology Based Adhoc Wireless Ndetworks – A Proposed Solution. i-manager’s Journal on Software Engineering, 1(4),75-80. https://doi.org/10.26634/jse.1.4.756

Abstract

A mobile ad hoc network is a self-organizing and rapidly deployable network in which neither a wired backbone nor a centralized control exists, without using any pre-defined topology and pre-defined infrastructure. The goal of an ad-hoc wireless network is to enable communication between any two wireless connected nodes in the network. Using intermediate nodes in the network as forwarding agents enables communication between nodes that are beyond direct communication range. Ad hoc wireless networks are also more prone to security threats and misbehaving nodes. One more problem that we cannot predict in the ad hoc wireless network is misbehaving nodes. Generally a good network must contain all the nodes with cooperative in nature. If any node that has a strong motivation to deny packet forwarding to others, while at the same time using their services to deliver own data, leads more complication and problems in the ad hoc wireless networks. These nodes are some time called as selfish nodes.

In this paper we propose a Path Management Protocol on Ad hoc Wireless Network (PMP-ANT) designed based on the MARI topology, to cope with misbehavior nodes. In this approach we use PMP-ANT protocol to detect misbehaving nodes and to isolate them from the network, so that misbehavior will not pay off but result in denied service and thus cannot continue. PMP-ANT detects misbehaving nodes by means of direct observation and second-hand information about several types of misbehavior and also using the reputation system and Trust records.