i-manager's Journal on Software Engineering (JSE)


Volume 8 Issue 3 January - March 2014

Article

Agile Large-Scale Software Development: Success Factors, Challenges and Solutions

Amro Mohammad Hani Al-Said Ahmad*
Department of Computer Science, Amman, Jordan.
Ahmad,A.M,H,A. (2014). Agile Large-Scale Software Development: Success Factors, Challenges and Solutions. i-manager’s Journal on Software Engineering, 8(3), 1-12. https://doi.org/10.26634/jse.8.3.2807

Abstract

Many challenges and obstacles have been arising when Agile methods are being used in large-scale projects. But as software engineers, we always try to find ways to overcome the problems and challenges. As Agile has been presented as a very good method that deals with change (that considers a big and serious challenge in traditional SE methodologies) it must not be ignored by project managers and team leaders in large-scale projects. This study presents a number of recommendations and solution that highlights on using modern communications technologies and social media websites in the process of maintaining the element of permanent connection between the team members, and it helps sharing the domain knowledge between team members to deal with social skills, Agile training, documentation, decision making, and testing. The study has been divided into three main subjects: first is how to gain success in largescale projects and how to gain success attributes upon using Agile method, the second is the challenges faced upon using Agile in the global distributed environment project, the third is to suggest a recommendation to overcome each challenge that certainly will help the project manager to deal if any challenge occurs.

Research Paper

Design and VLSI Implementation of Multilayered Neural Network Architecture Using Parallel Processing and Pipelining Algorithm for Image Compression

Murali Mohan* , Sathyanarayana**
* Associate Professor, Department of ECE, Sri Venkateswara College of Engineering & Technology, Chittoor, A.P, India.
** Professor, Department of ECE, College of Engineering, S.V. University, Tirupati, A.P, India.
Sriramula,M,M., and Pabbisetti,S. (2014). Design and VLSI Implementation of Multilayered Neural Network Architecture Using Parallel Processing and Pipelining Algorithm for Image Compression. i-manager’s Journal on Software Engineering, 8(3),13-25. https://doi.org/10.26634/jse.8.3.2808

Abstract

In this paper, an optimized high speed parallel processing architecture with pipelining for multilayer neural network for image compression and decompression is implemented on FPGA (Field-Programmable Gate Array). The multilayered feed forward neural network architecture is trained using 20 sets of image data based to obtain the appropriate weights and biases that are used to construct the proposed architecture. Verilog code developed is simulated using ModelSim for verification. The FPGA implementation is carried out using Xilinx ISE 10.1. The implementation is performed on Virtex-5 FPGA board. Once interfacing is done, the corresponding programming file for the top module is generated. The target device is then configured, programming file is generated and can be successfully dumped on Virtex-5. The design is then analyzed using Chip Scope Pro. The Chip Scope output is observed. The output is successfully compared with VCS (Verliog Compiler Simulator) simulation output. The design is optimized for power of 1.01485 W and memory of 540916 KB.

Research Paper

Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points

Narayanan Prasanth N* , Azarudeen K**, Gulam Ahamed Kabeer M***, Gulam Peer Mohamed J****
* Assistant Professor, Department of Information Technology, National College of Engineering, Maruthakulam.
**-**** Student, Department of Information Technology, National College of Engineering, Tirunelveli, India.
Prasanth,N.N., Azarudeen.K., Kabeer,G,A.M., and Mohamed,G,P.J. (2014). Enhanced Graphical Password Based Authentication Using Persuasive Cued Click-Points. i-manager’s Journal on Software Engineering, 8(3),26-30. https://doi.org/10.26634/jse.8.3.2809

Abstract

This paper introduces and presents the result of a systemic study of the persuasive cued click point graphical password scheme, including usability and security evaluation and implementation consideration. An important usability goal for the knowledge-based authentication system is to support user in selecting a better password thus increasing security by expanding the effective password space. They use persuasion to influence user choice in click based graphical password, encouraging users to select more random and hence more difficult to guess click-points.

Research Paper

Face Recognition by Fuzzy Rule-Based Local Binary Pattern

O. Rama Devi* , L. S. S. Reddy**, E. V. Prasad***
* Assistant. Professor, PVP Siddhartha Institute of Technology, Vijayawada
** Vice Chancellor , K.L University, Vaddeswaram
*** Director, LBR college of Engineering, Mylavaram
Devi,R.O., Reddy.L.S.S., and Prasad.E.V. (2014). Face Recognition by Fuzzy Rule-Based Local Binary Pattern. i-manager’s Journal on Software Engineering. 8(3),31-34. https://doi.org/10.26634/jse.8.3.2810

Abstract

A novel efficient and robust methodology for quick face recognition by using Fuzzy Rule based Local Binary Pattern (FRLBP) has been presented. The face image is said to be divided into a number of 3x3 regions, called as micro patterns, indicating the structure of the gray level pixels within a neighborhood to describe the spatial context of the image to reduce the impact of gray level uncertainty representation of images. The gray level pixel is represented as fuzzy number to evaluate the membership degree of the central pixel to the others within a neighborhood. A Local texture distributor for each of the 3x3 neighborhood, called LBP descriptor, is obtained by applying fuzzy Rules from which the FRLBP feature distributions are extracted. Use of fuzzy contributes to more than a single bin in the distribution of LBP values in the feature vector. The recognition is performed using a nearest neighbor classifier in the computed feature space with Chi square as a dissimilarity measure. Experiments clearly show that the use of FRLBP leads to improved reliable face recognition than to the original methods, LBP and Rule Based LBP.

Research Paper

Mining business agreements to forecast and categorize service events

A.V.L.N.Sujith*
Assistant Professor, Sree Vidyanikethan Engineering College, Tirupathi.
Sujith.A.V.L.N. (2014). Mining business agreements to forecast and categorize service events. i-manager’s Journal on Software Engineering, 8(3), 35-41. https://doi.org/10.26634/jse.8.3.2811

Abstract

The authors perform the investigation of the problem of business service, selection and categorization based on an expanded notion of reputation and trust. It is widely recognized now that the collaborative design of the significance of the services is the central principle of computing services. Specifically, the importance of understanding human behavior as a basis for service science is well-recognized, but is not necessarily reflected in the technical approaches. In particular, the quality of a service engagement depends on the mutual anticipations of the participants. In specific, the quality of experience that a customer derives from a service engagement would depend on how the customer potentials are refined and met by the provider during the service engagement. Indeed, this is well-known in marketing theory as the service quality GAPS model, as a basis of customer satisfaction. Here we propose a post mining process for mining business service contract agreements.