i-manager's Journal on Software Engineering (JSE)


Volume 10 Issue 4 April - June 2016

Article

Computer Forensics: An Overview

K.V.N. Rajesh* , K.V.N. Ramesh**
* HOD, Department of Information Technology, Vignan’s Institute of Information Technology, Visakhapatnam, India.
** Project Manager, Tech Mahindra, Visakhapatnam, India.
Rajesh, K. V. N., and Ramesh, K. V. N. (2016). Computer Forensics: An Overview. i-manager’s Journal on Software Engineering, 10(4), 1-5. https://doi.org/10.26634/jse.10.4.6056

Abstract

Computer Forensics involves identification of computer crimes and finding solutions for them by using analytical and investigative techniques. These analytical and investigative techniques involve the acquisition, analysis and documentation of computer data related to crimes. This paper describes the computer forensics, security issues in computer and network, types of computer crimes, examples of computer crimes, tools of computer forensics, cyber laws, courses and career in computer forensics.

Research Paper

Data Mining Approach For Advancement of “Association Rule Mining” Using “R Programming”

Rahul Kumar Vij* , Parveen Kalra**, C. S. Jawalkar ***
*PG Scholar, Department of Production and Industrial Engineering, PEC University of Technology, Chandigarh, India.
**Professor, Department of Production and Industrial Engineering, PEC University of Technology, Chandigarh, India.
***Assistant Professor, Department of Production and Industrial Engineering, PEC University of Technology, Chandigarh, India.
Vij, R. K., Kalra, P., and Jawalkar, C. S. (2016). Data Mining Approach For Advancement of “Association Rule Mining” Using “R Programming. i-manager’s Journal on Software Engineering, 10(4), 6-12. https://doi.org/10.26634/jse.10.4.6057

Abstract

Over the years, data study was focused on finding proofs using rough datasets which made data mining to jump into, to show its strengths. This field gave the researchers a pictorial view of trends and patterns that can help in predictive maintenance. Algorithms available in past are unable to handle rough datasets; especially when major issues were processing data in advance and making an understandable model. Association rules were made to predict the correlation between the attributes. The current study mainly focuses on the trends followed by the “car evaluation dataset attributes” to give a suitable rating for a car. Arules library in “R” is used to reflect the same as well as some preprocessing is done. The results are then compared with “Step Induction Association Rule Mining” i.e. advancement done as well as orange classifier. The results clearly reflect that rules formed can help in predictive analysis of a car by knowing its features and specifications and the step induction rules give more clarity about the predictions.

Review Paper

A Review of Techniques for Real time Authentication

Sabarinathan E.* , E. Manoj**
* Research Scholar, Erode, Tamilnadu, India.
** UG Scholar, Department of Electrical and Electronics Engineering, Coimbatore Institute of Technology, Coimbatore, Tamilnadu, India.
Sabarinathan, E., and Manoj, E. (2016). A Review of Techniques for Real time Authentication. i-manager’s Journal on Software Engineering, 10(4), 13-29. https://doi.org/10.26634/jse.10.4.6058

Abstract

The Development of multimedia applications makes digital media to bring about conveniences to the people by easy processing of data. At the same time, it enables the illegal attackers to attack the works. For the protection of data, there has been growing interest in developing effective techniques to discourage the unauthorized duplication of digital data. Among Cryptography and Steganography, only the watermarking provides the copyright protection and authentication. This paper is a comprehensive review of diverse image processing methods and enormous number of interrelated solicitations in various disciplines, including various watermarking techniques. In this paper, different existing techniques are discussed along with their drawbacks, also explaining their future scope.

Review Paper

Mining Fuzzy Association Rules Using Various Algorithms: A Survey

O. Gireesha* , O. Obulesu**
* PG Scholar, Department of Information Technology, Sree Vidyanikethan Engineering College, Tirupati, India.
** Assistant Professor, Department of Information Technology, Sree Vidyanikethan Engineering College, Tirupati, India.
Gireesha, O., and Obulesu, O. (2016). Mining Fuzzy Association Rules Using Various Algorithms: A Survey. i-manager’s Journal on Software Engineering, 10(4), 30-36. https://doi.org/10.26634/jse.10.4.6059

Abstract

The discovery of Association Rules (AR) acquire an imperative rule in Data Mining, which tries to find correlation among the attributes in a database. Classical Association Rules are meant for Boolean data and they suffer from a sharp boundary problem in handling quantitative data. Thereby, Fuzzy Association Rules (FAR) with fuzzy minimum support and confidence is introduced. In Fuzzy Association Rule Mining (FARM), determining fuzzy sets, tuning membership functions and automatic design of fuzzy sets are prominent objectives. Hence, FARM can be viewed as a multi-objective optimization problem. In this paper, different algorithms for FARM are discussed with merits and demerits.

Research Paper

Accomplishing Bi-Directional Vertical Architectural Scalability with Software Stability

M.E. Fayad* , Shivanshu K. Singh**, Rafael Capilla***
* Professor, Department of Computer Engineering, Charles W. Davidson College of Engineering, San Jose State University, San Jose, USA.
** Software/Data Engineering and DevOps, Athos, San Francisco, California, USA.
*** Associate Professor, University Rey Juan Carlos of Madrid (Spain), USA.
Fayad, M. E., Singh, S. K., and Capilla, R. (2016). Accomplishing Bi-Directional Vertical Architectural Scalability with Software Stability. i-manager’s Journal on Software Engineering, 10(4), 37-42. https://doi.org/10.26634/jse.10.4.6060

Abstract

While moving away from traditional approaches to build software and design software architecture, the authors realized that it is sensible to migrate to a platform of better fundamental approach. This refers to the way one looks at the analysis and design of any software. This helps one to weave into the system's architecture itself like different qualities such as adaptability, extensibility, scalability and stability over time, than worrying about them at a much later stage. Such architecture will compel developers to find fixes to address the issues related to such quality factors; this approach usually culminates in creating projects that incur very high costs and unprecedented consequences that are bad and unwanted.