By Topic

Software Engineering and Mobile Application Modelling and Development (ICSEMA 2012), International Conference on

Date 19-21 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 27
  • Table of contents

    Publication Year: 2012 , Page(s): 1 - 2
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (37 KB)  

    The following topics are dealt with: component usability enhancement; MANET; network datasets; software project success prediction; knowledge engineering; secured cost-effective multicloud storage; open source middleware migration; CMMI; software asset management system; wireless sensor networks; software development process; information retrieval; technical debt minimization; mobile interface; re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A methodology to enhance usability of components using “AND” relationship

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (880 KB)  

    Component methodology helps in increasing the productivity of the system. Though reusing the existing components helps in developing the systems within time and budget. However because of the risk of effective reuse, developers are bound to develop the system from scratch. The components which are not reused can be reconfigured such that it can increase the reusability thereby increasing the produ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on genetic-fuzzy based automatic intrusion detection on network datasets

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (222 KB)  

    The intrusion detection aims at distinguishing the attack data and the normal data from the network pattern database. It is an indispensable part of the information security system. Due to the variety of network data behaviors and the rapid development of attack fashions, it is necessary to develop a fast machine-learning-based intrusion detection algorithm with high detection rates and low false-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evolutionary algorithmic approach to construct Connected Dominating Set in MANETs

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (394 KB)  

    A virtual backbone of a MANETs is typically the Connected Dominating Set (CDS) of the graph representation of the network. The CDS in the MANETs helps to increase the efficiency of the network and extends the life span of the network. While existing CDS protocols are successful in constructing CDS of small size, they either require localized information beyond immediate neighbors, lack the mechani... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to predict software project success by cascading clustering and classification

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (376 KB)  

    Generation of successful project is the core challenge of the day. Prediction of software project success is therefore one of the vital activities of software engineering community. Data mining techniques enable one to predict the success of the company by estimating the degree of success of their projects. This paper presents an empirical study of several projects developed at various software in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ontological approach for effective knowledge engineering

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (368 KB)  

    Ontologies are efficient way of getting a better idea about a particular domain. There are various forms of ontologies. Certain ontologies are reusable and are available online. Some other ontology can be developed for a specific purpose and are used to yield precise results in the field of knowledge engineering and automated tasks. If we want to gather information between different ontologies of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic DNA sequence generation for secured cost-effective multi -cloud storage

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (439 KB)  

    The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in cloud. The algorithm which has been proposed here is based on binary coding and co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Best practices and case study for open source middleware migration: Egate to apache camel migration

    Publication Year: 2012 , Page(s): 1 - 7
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (453 KB)  

    Many legacy systems use message oriented middleware to communicate between themselves. Message oriented middleware are considered to be the most effective technology for enterprise integration. There are a lot of proprietary middleware solutions in the market that involve huge licensing costs, difficult maintenance procedures and niche skill sets. The usage of open source middleware to replace the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CMMI for educational institutions

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (243 KB)  

    We all know that Education constitutes one of the important foundations of any society. There are various levels of teaching institutes from the Ivy League to ordinary colleges. This gradation is a very informal and there are no formal mechanisms to classify (assess) and improve the standards in an institution. There are bodies like Washington Accord (International Engineering Alliance, www.washin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of software asset management system to facilitate software reuse

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (615 KB)  

    The main intent of this paper is to highlight the design and development of a web based centralised software asset management system. It is used for archiving and maintaining in-house developed and open source domain-specific software assets. This system will aid in effective organisational software asset management and software reusability that will in turn improve the software development time, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy utilization strategies using novel approach in wireless sensor networks

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (440 KB)  

    Wireless Sensor Networks, emerged as a promising technology, offering unique benefits and supporting diverse applications, in terms of sensing. The challenging issue in these networks is optimal utilization of energy of its node, which maximizes its lifetime. In this proposed algorithm, energy efficient strategies are focused to optimize the energy consumption of the node. The cross layer approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the quality of test data under the influence of vigilance parameter in flexfis

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (337 KB)  

    In this paper, we determine the influence of the vigilance parameter using a modified version of vector quantization used in Flexible Fuzzy Inference System (FLEXFIS) specifically for Takagi Sugeno fuzzy model. FLEXFIS adopts a single pass incremental learning approach for the antecedent parts of the rules' learning process. In order to achieve this learning process, an evolving version of vector ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact analysis of volatility and security on requirement defects during software development process

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (255 KB)  

    The production of high quality software is one of the major challenges of any software organization. It is essential to develop quality artifacts at every phase of software development since quality is not a state and is a continual process. Requirement analysis is deemed to be the most significant activity which influences the acceptance and thereby the success level of the project. This paper pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metrics for information retrieval: A case study

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (211 KB)  

    The domain of information retrieval (IR)has used clustering methods in a big way. Clustering is a technique that groups a set of documents into clusters or subsets. How efficiently and effectively the relevant documents are extracted from World Wide Web is a challenging issue. In this work, we compare and analyse the effectiveness of similarity measures such as City Block distance, Cosine similari... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimizing Technical Debt: Developer's viewpoint

    Publication Year: 2012 , Page(s): 1 - 5
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (440 KB)  

    Often we find it difficult to adapt to any changes during later phases of a software development project. Primary reason for this is rigidity in design and code which do not allow major changes to be incorporated. This inflexibility substantially increases the cost of post-delivery enhancement and maintenance and is termed as Technical Debt. As Technical Debt cannot be eliminated completely, we ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile interface to content management system based on HTML5 and Drupal: A case study

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (344 KB)  

    The paper describes a case study of providing a content management system for maintaining and updating high volume of content in various forms like text, data, audio, video etc and providing a facility for user to access from anywhere using mobile devices. The application requires a cross platform application development environment and the paper describes the experience and challenges in developi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model to specify real time system using Z and Alloy languages: A comparative approach

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (332 KB)  

    Choice of a particular specification language depends on the type of product. Z and Alloy both are formal specification languages used for specifying the software requirements in a succinct manner. Alloy language is designed specifically for automatic analysis of any real time system. This paper proposes comparison between the effectiveness of Z and Alloy languages. An Automated Teller Machine (AT... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Money laundering detection using TFA system

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (439 KB)  

    Banks are faced with the challenge of adapting to the ever-changing risk and methods related to money laundering. Money laundering is a complex, dynamic and distributed process. Some Anti-Money Laundering (AML) Systems simply transforms vast quantities of data into vast numbers of reports that do not facilitate timely detection or effective interdiction. Transaction Flow Analysis (TFA) system is p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-stage scheduling scheme for massively parallel systems

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (226 KB)  

    Multi-stage scheduling has been proposed as a hierarchical scheduling technique to achieve load balancing in massively parallel multiprocessor networks. Existing hierarchical approaches can not easily map on multiprocessor system because they do not incorporate the inherent parallelism of a multiprocessor system when task allocation is made. In this paper a hierarchical based novel scheduling sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Node reputed distributed control risk-aware mitigation of routing attacks

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (564 KB)  

    The topological nature of MANET(Mobile Ad-hoc Network) itself demands high security due to its mobility movement, but designing a risk aware routing path for MANET is an complex task because of its Dynamic nature. In this proposal, designing an Dynamic routing path decider to find less risk aware routing path for effective communication. The efficiency of the through put and Routing failures can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of space time block coded spatial modulation

    Publication Year: 2012 , Page(s): 1 - 7
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (345 KB)  

    Space time block code combined with spatial modulation forms the space time block coded spatial modulation (STBC-SM), is proposed in MIMO transmission scheme. In STBC-SM, information bits get transferred through symbol pair and antenna pair selections, i.e. transmitted through time, space domain and spatial domain. Advantage of STBC-SM is high spectral efficiency which is given by antenna domain a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison of cascade and feed forward neural network for face recognition system

    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (366 KB)  

    In this paper a neural network classifier is used for face recognition. The performance of a neural network to a large extent depends on its architecture. Two different architectures are investigated and presented in this paper. The cascade architecture (CASNN) and feed forward neural architecture (FFNN) are investigated. The feature extraction is performed using principal component analysis (PCA)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of mobile adhoc network under black hole attack

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (239 KB)  

    Mobile ad-hoc network is a collection of wireless mobile nodes which forms a temporary network without any fixed infrastructure or centralized administration. Mobile ad-hoc networks are widely used in the tactical battlefield, emergency search and rescue missions. They are also well used in civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portability of mobile applications using PhoneGap: A case study

    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (2)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (300 KB)  

    With the advancement of Mobile Computing, mobile applications can be developed and deployed for eGovernance purposes. e-Governance applications have challenges like handling of large volume of data, high number of concurrent users, security and others. In addition, the users in the Governance should be given a choice of the mobile devices they use and so this requires a high portability of the mob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software quality measurement for reusability

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (425 KB)  

    Software Quality attributes are the overall factors that affect runtime behavior, system design, and user experience. They represent areas of concern that have the potential for application wide impact across layers and tiers. Quality attributes such as maintainability, reusability & testability are useful to find out the how much extent software is useful to undergo changes during the usage p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.