i-manager's Journal on Software Engineering (JSE)


Volume 2 Issue 4 April - June 2008

Article

Ensuring Software Quality in Engineering Environments

Tom Page*
Tom Page (2008). Ensuring Software Quality in Engineering Environments. i-manager’s Journal on Software Engineering, 2(4), 1-5. https://doi.org/10.26634/jse.2.4.489

Abstract

This paper is a summary of a survey carried out on behalf of the Systems Engineering Research Centre (SERC). This survey was part of the Engineering Applications Software research programme. It covers the software quality assurance tools available and their use and application, in support of software quality, within the engineering research community.

There are hundreds of tools, many of which are methodology dependent, now available to support different phases of software development and they can be considered to contribute, to some degree, to software quality. There is also a class of tools which directly supports the Quality Assurance function and which is applicable, in most cases, irrespective of the development methods. There are the tools for validation, verification and testing of software systems. It is this class of tools that is covered in this paper.

The survey investigated the different tools that are available, their cost, effectiveness and the learning effort required to use them. Furthermore, it considered their use in the engineering environment and the benefits that can be gained as a result.

Research Paper

An Automatic Template Based Question Answering System to Improve E-Learning

Ashish Gupta * , Ankush Mittal **
Ashish Gupta and Ankush Mittal (2008). An Automatic Template Based Question Answering System to Improve E-Learning. i-manager’s Journal on Software Engineering, 2(4),70-78. https://doi.org/10.26634/jse.2.4.499

Abstract

This paper presents a fully automatic closed domain question answering system designed specifically to improve student's learning experience through E-Learning. The question answering system allows students to access course data available on distance education web sites in a very effective manner by allowing them to ask questions in natural language. It uses various natural language processing tools to give students relevant and quick answers. The question answering system has been designed to fully utilize the domain knowledge specific to a course to improve accuracy and speed of the system. It also utilizes domain knowledge to disambiguate ambiguous terms used in question. The system has been designed considering the requirements of students and can handle variety of questions types generally asked by students. This is achieved by implementing template based approach of answer extraction.  Many templates for factual type question have been implemented. The system can be targeted to any domain or subject by providing the domain knowledge in the form of domain keywords at initial setup. Word sense disambiguation algorithm is evaluated on Semcor corpus and has shown significant performance. Results for question answering system have been taken on course material of operating system with various types question including FAQ’s, expert and naïve questions.

Article

Software Development and Design Cycle Time Reduction Modeling

Kumar Saurabh*
Kumar Saurabh (2008). Software Development and Design Cycle Time Reduction Modeling. i-manager’s Journal on Software Engineering, 2(4),6-12. https://doi.org/10.26634/jse.2.4.490

Abstract

Increasing software developers' productivity and reducing the software development process' cycle time are key goals for organizations responsible for building software applications. During the early days of commercial software development, cost and performance were the factors that received the most attention as an area for improvement. In the 1980's quality and productivity have received a great deal of attention. It appears that, in the 1990's reducing software development time will be one of the primary goals of large and small software companies alike. To this end it is appropriate to examine the factors that affect software cycle time. Is it enough to try and improve programmer productivity or are there additional product or process improvements that might be considered? Assuming there are several factors that impact software development time, what are they and how much of an impact does each factor have? This paper examines the software development cycle. It motivates the importance of software cycle time reduction. A definition for software cycle time is proposed. The  objective  of  our research    has  been  to  provide  decision  makers  with  a model that will enable the prediction of the impact a set of  process  improvements  will  have  on  their  software development cycle time.  This paper describes our initial results  of  developing  such  a  model  and  applying  it  to assess  the  impact  of  software  assessments.

Article

Combining XML, Web Services, and the Semantic Web to Bind Document

Balasubramanian D* , Boopathy R.**, Jeyabalaraja V***, Thirumal S****
Balasubramanian D, Boopathy R, Jeyabalaraja V and Thirumal S (2008). Combining XML, Web Services, and the Semantic Web to Bind Document. i-manager’s Journal on Software Engineering, 2(4), 13-25. https://doi.org/10.26634/jse.2.4.492

Abstract

A paradigm for uniting the diverse strands of XML-based Web technologies by allowing them to be in-corporated within a single document. This overcomes the distinction between programs and data to make XML truly self-describing.” A  proposal  for  a  lightweight yet  power- ful functional XML vocabulary called \Semantic f XML” is detailed, based on the well-understood functional program-ming paradigm and resembling the embedding of Lisp di-rectly in XML. Infosets are made \dynamic,” since docu-ments can now directly embed local processes or Web Ser-vices into their Infoset. An optional typing regime for info-sets is provided by Semantic Web ontologies. By regarding Web Services as functions and the Semantic  Web as pro-viding types, and tying it all together within a single XML vocabulary, the Web can compute. In this light, the real Web 2.0 can be considered the transformation of the Web from a universal information space to a universal computation space.

Article

Applying Behavioral Patterns for Efficient Communication in Wireless Networks

Guru Baskar T* , Manickam P**
Guru Baskar T and Manickam P (2008). Applying Behavioral Patterns for Efficient Communication in Wireless Networks. i-manager’s Journal on Software Engineering, 2(4), 26-32. https://doi.org/10.26634/jse.2.4.493

Abstract

A pattern is useful for making the design decision regarding object oriented approach. Among the three classifications of patterns, how the Behavior patterns could influence the Architecture in wireless communication specifically Ad hoc Wireless networks. The efficient key management, Routing information and network topology should be informed and updated dynamically among the set of nodes so that efficient communication will be handled.

Research Paper

An Intelligent Decision Support System for Network Intrusion Detection

Jeya S* , Ramar K**
Jeya S and Ramar K (2008). An Intelligent Decision Support System for Network Intrusion Detection. i-manager’s Journal on Software Engineering, 2(4), 33-40. https://doi.org/10.26634/jse.2.4.494

Abstract

Intrusion detection systems monitor computer networks looking for evidence of malicious actions. The attacks detection can be classified into either misuse or anomaly detection. The misuse detection can not detect unknown intrusions whereas the anomaly detection can give false positive. Combining the best feature of misuse and anomaly detection one intelligent intrusion detection system (IIDS) is proposed which is able to detect not only the known intrusions but also the unknown intrusions. For detecting the unknown intrusions the proper knowledge base is to be formed after preprocessing the packets captured from the network. The preprocessing is the combination of partitioning and feature extraction. The partitioning of packets is based on the network services and extraction of attack feature is added to the knowledge base. The preprocessed attacks can be classified by using mining classification which will be given to rule builder. The network intrusion detection system should be adaptable to all type of critical situations arise in network. This is helpful for identification of complex anomalous behaviors. This work is focused on the TCP/IP network protocols and network based IDS.

Research Paper

Identifying Interesting Itemsets for Positive and Negative Association Rule Mining on an Encoded Temporal Database

Balasubramania C* , Duraiswamy K **, Chandrasekar C***
Balasubramanian C, Duraiswamy K and Chandrasekar C (2008). Identifying Interesting Itemsets for Positive and Negative Association Rule Mining on an Encoded Temporal Database. i-manager’s Journal on Software Engineering, 2(4), 41-47. https://doi.org/10.26634/jse.2.4.495

Abstract

The principle of data mining is better to use complicative primitive patterns and simple logical combination than simple primitive patterns and complex logical form. This paper overviews the concept of temporal database encoding, association rules mining. It proposes an innovative approach of data mining to reduce the size of the main database by an encoding method which in turn reduces the memory required. The use of the anti-Apriori algorithm reduces the number of scans over the database. A graph based approach uses Apriori for temporal mining. Also a basic algorithm using pruning facility for identifying potentially frequent and infrequent interesting item sets, and thereafter positive and negative association rule mining are focused. The objective involved is to obtain lower complexities of computations involved, time and space with effective identification of interesting itemsets, association rule mining.

Research Paper

Classification of Cardiac Signals Using Artificial Neural Network and Fuzzy Equivalence Relation

B. Anuradha* , V.C. Veera Reddy**
Anu Radha B and V.C.Veera Reddy (2008). Classification of Cardiac Signals Using Artificial Neural Network and Fuzzy Equivalence Relation. i-manager’s Journal on Software Engineering, 2(4), 48-56. https://doi.org/10.26634/jse.2.4.496

Abstract

Electrocardiography deals with the electrical activity of the heart. The condition of cardiac health is given by ECG and heart rate. A study of the nonlinear dynamics of electrocardiogram (ECG) signals for arrhythmia characterization is considered. The statistical analysis of the calculated features indicate that they differ significantly between normal heart rhythm and the different arrhythmia types and hence, can be rather useful in ECG arrhythmia detection. The discrimination of ECG signals using non-linear dynamic parameters is of crucial importance in the cardiac disease therapy and chaos control for arrhythmia defibrillation in the cardiac system. The four non-linear parameters considered for cardiac arrhythmia classification of the ECG signals are Spectral entropy, Poincaré plot geometry, Largest Lyapunov exponent and Detrended fluctuation analysis which are extracted from heart rate signals. The inclusion of Artificial Neural Networks (ANNs) in the complex investigating algorithms yield very interesting recognition and classification capabilities across a broad spectrum of biomedical problem domains. ANN classifier was used for the classification and an accuracy of 90.56% was achieved. Linguistic variables (fuzzy sets) are used to describe ECG features, and fuzzy conditional statements to represent the reasoning knowledge and rules. Good results have been achieved with this method and an overall accuracy of 93.13% is obtained.

Research Paper

Traceback System to Identify the Source of the Spoofed IP Packets in Multi ISP Domains

Murali Bhaskaran V* , Natarajan A.M**
Murali Bhaskaran V and Natarajan A.M (2008). Traceback System to Identify the Source of the Spoofed IP Packets in Multi ISP Domains. i-manager’s Journal on Software Engineering, 2(4), 57-63. https://doi.org/10.26634/jse.2.4.497

Abstract

Internet Protocol (IP) packet traceback system is to identify the origin of sequences of IP packets when the source addresses of these packets are spoofed. IP packet traceback is usually performed with the help of routers and gateways. Several approaches have been proposed to trace IP packets to their origin. The packet marking approach enables routers to probabilistically mark packets with partial path information and tries to reconstruct the complete path from the marked packets. In most of these approaches, routers and victims (affected systems) are considerably overloaded for marking the packet and reconstructing the trace path and also more marked packets are required. This paper focuses on tracing the approximate source of attack instead of traceback the entire path in multi domain system, without computation by victim.  It is assumed that Internet topology has been grouped as ISP domains.

Research Paper

Quantum Query Complexity to Determine Radius of a Graph

Manjula Gandhi S* , R. Prabhakar**
Manjula Gandhi S and R. Prabhakar (2008). Quantum Query Complexity to Determine Radius of a Graph. i-manager’s Journal on Software Engineering, 2(4), 64-69. https://doi.org/10.26634/jse.2.4.498

Abstract

Algorithms are the key concepts of computer science. Classical computer science provides a vast body of concepts and techniques which may be reused to great effect in quantum computing. Many of the triumphs of quantum computing have come by combining existing ideas from computer science with the ideas from quantum mechanics. The problem of determining quantum query complexity for obtaining the Radius of a graph is considered both in a classical system and in a quantum system.

Algorithms are the key concepts of computer science. Classical computer science provides a vast body of concepts and techniques which may be reused to great effect in quantum computing. Many of the triumphs of quantum computing have come by combining existing ideas from computer science with the ideas from quantum mechanics. The problem of determining quantum query complexity for obtaining the Radius of a graph is considered both in a classical system and in a quantum system.