By Topic

Software Engineering (MySEC), 2011 5th Malaysian Conference in

Date 13-14 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 96
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (31 KB)  
    Freely Available from IEEE
  • Welcome

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Organizing committee

    Publication Year: 2011 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (170 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2011 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Reduce fault density for top 3 requirement faults

    Publication Year: 2011 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (590 KB) |  | HTML iconHTML  

    The earliest phase of a software development life cycle is requirement engineering. This phase consists of eliciting, analyzing, documenting, and validating requirements from users/customers by business analyst. Activities in this phase are recognized as a crucial activity as it can incur high cost if correction is to be done at a later stage. In reducing requirement errors, MIMOS take the initiatives by introducing process performance metrics to optimize the quality of requirement engineering. Data of requirement process performance metric from 13 medium skills of projects developed in year 2008 was collected and analyzed. Results showed that the errors can be categorized into 3 requirement faults type; missing, incomplete and incorrect requirement. The errors captured impacted the overall performance for In-Process-Faults (IPF) requirement averaging at 0.26 faults/page for the top 3 faults. In 2009, requirement process performance aim to reduce the faults density from 0.26 faults/page to 0.19 faults/page for the top 3 requirement faults. Based on data from 2008, Causal Analysis and Resolution (CAR) was executed and proposed solution was identified. 6 medium skill projects were selected to execute the proposed solutions. These projects are being control and monitored to meet the goal set as well as to improve the quality of requirement engineering process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using activity theory in analyzing requirements for mobile phone application

    Publication Year: 2011 , Page(s): 7 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (161 KB) |  | HTML iconHTML  

    System analyst often faced difficulties in articulating user's need into software requirements due to the lack of framework emphasizing on socio-technical systems. Activity Theory is a theory that focuses the human practices of development process, both the individual and social levels. It provides a comprehensive unit of analysis of the objects to be studied. This paper describes a case study involving the use of Activity Theory to analyze requirements comprehensively for a mobile ticketing solution. The research starts by eliciting the requirements using survey, observation and content analysis method, analyzing them and then mapping them into activity diagrams. To present the requirements in a detailed manner, decomposition of activities is being done before demonstrating the system features using graphical user interface. The result of this paper shows the application of Activity Theory that is ideally suited to handle mobile application requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing multiple types of spatial and non spatial databases integration model using formal specification approach

    Publication Year: 2011 , Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (323 KB) |  | HTML iconHTML  

    Most developer prefers not to use formal specification (FS) approach in designing a database system. In recent years, these approaches have been seen as rivals, a new consensus has been developed in which software developers are agreed it as complementary. Theoretically this approach can reduce the overall development time, use to provide an unambiguous and precise supplement to natural language descriptions. Focus to this point, it can be rigorously validated and verified leading to the early detection of specification errors or debugs during software development process. Correcting errors at the early development stage is cheaper than modifying a delivered system. A FS could be verified in order to explore the consequences of this specification and potentially find mistakes. After it was done, we have greater confidence that the testing of such system against the actual user requirement specification. This paper discusses the FS of spatial and non spatial Information Databases Integration (SIDIF) model as a case study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on acceptance of customised Software Process Improvement (SPI) model for Malaysia's SME

    Publication Year: 2011 , Page(s): 25 - 30
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (101 KB) |  | HTML iconHTML  

    Currently, a number of specific international standards are made available within software engineering discipline to support Software Process Improvement (SPI) such as Capability Maturity Model Integration (CMMI), ISO/IEC 15504, ISO/IEC 90003 and ISO/IEC 12207. Some suggest on integrating and harmonizing these standards to reduce risks and enhance practicality, however there is no official initiative being made to date to implement this reality. Integrated Software Process Assessment (iSPA) is a proposed initiative being developed on the premise to harmonize and integrate a number of existing software process assessments and practices including improvement standards, models and benchmarks. A survey was conducted on thirty software practitioners to measure the strength and weaknesses of their organization's current software process. The survey also attempts to evaluate the acceptance and needs of implementation of a customized SPI model for Malaysia's SME. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlled vocabulary based software requirements classification

    Publication Year: 2011 , Page(s): 31 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    The nature of software requirements is very much subjective and multi-faceted. The level of complexity increases along-with the volume, especially when the requirements are in natural language. In the primary phase of requirements engineering, it is mostly desirable to transform these user written requirements into more understandable form. Organizing the requirements in different groups may support further activities much easier than direct working. In this paper, we present a classifier that sufficiently transforms natural language written requirements into corresponding groups. The organization of these groups depends upon the inter-keywords association i.e., hierarchy of keywords. The classifier works best when requirements have been written using relative vocabulary i.e., controlled vocabulary. The overall structure of this technique is composed on three main components: 1) Repository: of keywords and their relationships as source data, 2) Mapping: Finding words in the requirements document with keywords of repository, and 3) Presentation: presenting classified (grouped) requirements in more meaningful ways. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirement engineering practice research framework for the public service organisation

    Publication Year: 2011 , Page(s): 37 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (189 KB) |  | HTML iconHTML  

    The requirement engineering (RE) practice was implemented without knowing by IT Personnel. This RE framework design purposely to identify the RE practice that implemented during software project requirement in Malaysian Public Sector. We determine the software requirement system (SRS) flow from the initial interview. We have a list of IT Personnel RE practice experience for the software project from the pilot test. We identified the problem arise and the RE practice implemented from the actual survey. The RE practice that identify will validate by the IT expert in Malaysian Public Sector. We plan to developed standards, tools, and methods can help to improve the current practice. Our expectation is the practice that can be as a guideline to IT Personnel using RE practice during software project requirement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pair analysis of requirements in software engineering education

    Publication Year: 2011 , Page(s): 43 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (187 KB) |  | HTML iconHTML  

    Requirements Analysis and Design is found to be one of the crucial subjects in Software Engineering education. Students need to have deeper understanding before they could start to analyse and design the requirements, either using models or textual descriptions. However, the outcomes of their analysis are always vague and error-prone. We assume that this issue can be handled if “pair analysis” is conducted where all students are assigned with partners following the concept of pair-programming. To prove this, we have conducted a small preliminary evaluation to compare the outcomes of solo work and “pair analysis” work for three different groups of students. The performance, efficacy and students' satisfaction and confidence level are evaluated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison study between traditional and object-oriented approaches to develop all projects in software engineering

    Publication Year: 2011 , Page(s): 48 - 54
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (135 KB) |  | HTML iconHTML  

    Here in this paper we explore comparative study to analyze the performance differences between Traditional software development models and Object-Oriented approach. Traditional approaches like waterfall, spiral lack flexibility to deal with object oriented models. The approach of using object - oriented techniques for designing a system is referred to as object oriented design. Object oriented development approaches are best suited to projects that will imply systems using emerging object technologies to construct, manage, and assemble those objects into useful computer applications. Object oriented design is the continuation of object-oriented analysis, continuing to center the development focus on object modeling techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based model of muscle contraction process as a bio-robotic process

    Publication Year: 2011 , Page(s): 55 - 60
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (182 KB) |  | HTML iconHTML  

    This paper introduces a new computational methodology to model muscle contraction process as a bio-robotic process using agent technology. In this work, we have focused on muscle myosin nanomotor as the driven motor of muscles and introduced the nanomotor as a physical intelligent agent. Then, the mechanism of the nanomotor was specified using subsumption architecture of agent technology and modeled with the Finite State Machine (FSM) diagram of Unified Modeling Language (UML). The proposed agent-based FSM model of the mechanism of muscle myosin nanomotor illustrated the internal intelligent and autonomous decision-making process of the nanomotor as a robot mechanism. In order to verify the proposed agent-based FSM model of the mechanism of the nanomotor, we developed its mathematical definitions (its Deterministic Finite Automaton (DFA) and grammar) and compared them with the natural behavior of the nanomotor inside the muscle cells. The comparison results indicated that the mechanism of muscle myosin nanomotor could be defined as a robot mechanism with its inputs, internal decision-making process, and outputs. As muscle contraction process is a set of the mechanisms of muscle myosin nanomotors, our proposed agent-based model of the mechanism of the nanomotor can introduce muscle contraction process as a general bio-robotic process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of UML MARTE, SoaML profiles for distributed embedded real-time systems development

    Publication Year: 2011 , Page(s): 61 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (157 KB) |  | HTML iconHTML  

    The successful implementation of Service-Oriented development of Distributed Embedded Real-time Systems (DERTS) in the recent years has proved the importance of Service-Orientation over previous paradigms. However, efforts are still needed on systematic Service-Oriented design of DERTS, especially on the modelling of DERTS. The UML standard profile MARTE can be used for modelling of embedded real-time system while UML standard profile SoaML can be used to represent Service-Oriented concepts. Therefore, a thorough investigation of both standard profiles is needed to determine which parts of these profiles are useful for Service-Oriented DERTS development. This paper investigates these profiles in order to highlight the portions of the two profiles and provides some suggestions that can be utilized for Service-Oriented modelling of DERTS. The results of this investigation would be useful in developing a Service-Oriented based meta-model for DERTS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Middleware framework for integration of heterogeneous hardware and software

    Publication Year: 2011 , Page(s): 66 - 69
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB) |  | HTML iconHTML  

    There is a significant amount of research on the integration of heterogeneous hardware and software concerning wireless sensor networks (WSN). Due to the limitations in terms of energy, memory capacity and computational power of the wireless sensors, various applications are designed to optimize the use of wireless sensors according to the needs of various business and industries such as environmental monitoring, asset tracking, health monitoring, military surveillance and industrial automation and control. These applications sometimes interacts with one another hence lays the need to integrate data between the applications. The hardware itself is configured based on the requirements of the aforementioned applications considering the limitations of the sensors as various communication protocols and operating systems are used in different types of sensors. As a result of the heterogeneous nature of the hardware and applications concerning wireless sensor networks, a middleware is needed to reduce the effort and cost of integrating the heterogeneous hardware and software. This paper proposes an architectural design of a middleware that tackles the issues of data formatting for hardware and software integration and heterogeneous data integration concerning wireless sensor networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WSMO-M: NFP-aware web service discovery for mobile computing

    Publication Year: 2011 , Page(s): 70 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (210 KB) |  | HTML iconHTML  

    Nowadays, the significant advancement of mobile technologies has led to the possibility of accessing web services in a pervasive way and semantic web service discovery approaches seem to be the most promising approach to perform semantic matching. The proliferation of web services with similar functionalities is increasing rapidly. Thus, differentiation of the characteristics of web service offered has become more crucial. Without considering non-functional properties (NFPs) such as user requirement and quality standard of web services, it may result to irrelevant services to the users' need in mobile computing. Mobile users may discover unusable web services invoked, due to the device compatibility issues and lack of quality standard information in service description. This paper proposes WSMO-M(Mobile), an enhancement of WSMO to describe NFPs as a context and Quality of Web Service (QoWS) information for mobile computing environment. Initially, for annotating web service description, the context and QoWS models are specified by using Web Service Modeling Ontology (WSMO). Semantic matchmaking and degree of match calculation are also presented to define the importance of non-functional properties in mobile computing during the discovery and selection of web services. Finally, this paper demonstrates the applicability of the enhancement through a simple case study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model transformation specification for automated formal verification

    Publication Year: 2011 , Page(s): 76 - 81
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    The development of model transformations is commonly an ad-hoc activity in MDE. Transformations are engineering artefacts, and can be developed in a disciplined way, like other software artefacts. A model transformation development process can produce transformations expressed in many different styles; transformation patterns can be used to underpin such different properties to be constructed. This paper introduces a systematic approach to development of model transformation specifications that are amenable to automated formal verification of its properties. The paper introduces a process for planning transformation and a language for capturing structural and behavioural characteristics of a model transformation, that supports templates which, when instantiated, automatically produce equivalent formal specification with analysis capabilities. The approach is illustrated with a small example, UML Class to Relational Database transformation, and verification using Alloy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systematic literature review of interoperable architecture for e-government portals

    Publication Year: 2011 , Page(s): 82 - 87
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (163 KB) |  | HTML iconHTML  

    One of the roles of e-government portals is to provide a one-stop service to users. In order to fulfill this role, it requires collaboration with other government agencies and businesses to provide an effective one-stop center for users to access and perform various services. Current e-government portals are mostly lack of interoperability whereby users still need to access government services from various portals or websites. Interoperability is a technical requirement to achieve government services collaboration and integration. There are many challenges and approaches to achieve better interoperability in e-government portals. Architecture-based and model-based approaches are essential research areas that can improve interoperability starting from the planning stages. Architecture provides overall overview of e-government components and relationship between components. This paper systematically reviews current architecture-based approaches to find a suitable approach and its requirements to produce a better architecture for e-government portal based on the lessons learned from the previous works. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From uni-directional model transformation to incremental model synchronization

    Publication Year: 2011 , Page(s): 88 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (239 KB) |  | HTML iconHTML  

    Model driven architecture is an approach to develop software based on transforming models automatically. In this approach, models co-exist and can be modified independently in different stages of software development, but the consistency between models should be preserved by appropriate propagation of changes to the related models. However, most approaches do not support complete synchronization for uni-directional transformations. This paper proposes a new method for incremental synchronization of models that are related to each other by a uni-directional transformation. For this aim, traces of transformation are used for delete and update change propagation. Also, a knowledge base is generated automatically that encompasses patterns of transformation and employed for propagating insertion in source and target models. The knowledge base contains rules defined based on source and target metamodels that produced and evaluated automatically. The proposed method was evaluated by applying it to synchronize a class diagram as a source model and a relational database diagram as a target one. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing model checking approach for multi agent system verification

    Publication Year: 2011 , Page(s): 95 - 100
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    During requirement specification process of software development activities, many existing systems or business process requirements have been captured using natural language or specialized tools such as UML. However, the capturing of informal requirements into formalized properties has not been taken into attention by software developers due to time and budget constraints. It is critical for the informally captured requirements to be formally specified in order to perform system verification. Formal verification checks whether a system model meets the formal specifications while validation checks whether the developed system fulfills its intended purpose. Therefore, in this paper, we present our studies of formal verification of multi agent system using model checking approach. We have utilized model checking tool in order to execute the formal verification procedures based on a particular basic theory to verify certain kind of properties of requirement specifications. We show an example of how model checking tool could support the verification of Universiti Teknologi Malaysia (UTM) multi agent online application system and conclude that the propose model checking approach will benefit multi agent system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecting a plug-in based TSM client application

    Publication Year: 2011 , Page(s): 101 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    There were several existing KISTERS TSM Client Applications (TCA) which used the Time Series Management (TSM) system. Each application was developed using different technologies; these applications contained significant features and were important to the success of the operation. However, they posed a set of problems to the operation, including difficulty in adding a new feature and lack of integration. This paper describes how we have designed and implemented the new TCA including the problems we face. The new TCA is developed based on the Eclipse platform, which enables us to integrate every existing client application into a single and extendable application that can be run as a standalone application as well as a web application using the same source. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forward engineering the object oriented analysis and design

    Publication Year: 2011 , Page(s): 107 - 112
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    Current object oriented modeling languages either concentrating on application domain characteristics or system functionalities but not on both. Hence the absence of a common modeling language to represent application domain and system functionalities will disintegrate the analysis and design phases. This paper proposes a framework which uses Unified Modeling Language (UML) as the common modeling language in the two phases thereby integrating both phases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying refactoring through formal model based on data flow graph

    Publication Year: 2011 , Page(s): 113 - 118
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (195 KB) |  | HTML iconHTML  

    Identifying refactoring is an important step of bad smell removal process. Many developers have problem identifying refactoring, e.g., novice developers are not sure which refactorings should be applied. Even skilled developers may need to spend a lot of time doing this manually. Identifying refactoring techniques can alleviate these problems for developers. In our previous work, we proposed refactoring filtering conditions (RFC) that identify candidate refactorings for removing long method bad smell. These conditions analyze internal structure inside a method with data flow analysis. Our research improves these RFC based on more refined data flow analysis and presents its formal description. This research also demonstrates an approach of using the improved RFC of three refactorings. Moreover, we conducted an experiment to compare the efficiency of the results of our approach with that of our previous work and that of developer suggestion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.