International Journal of System and Software Engineering
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

Published By Publishing India Group

2321-6107

Author(s):  
Sagar Pathane ◽  
Uttam Patil ◽  
Nandini Sidnal

The agricultural commodity prices have a volatile nature which may increase or decrease inconsistently causing an adverse effect on the economy. The work carried out here for predicting prices of agricultural commodities is useful for the farmers because of which they can sow appropriate crop depending on its future price. Agriculture products have seasonal rates, these rates are spread over the entire year. If these rates are known/alerted to the farmers in advance, then it will be promising on ROI (Return on Investments). It requires that the rates of the agricultural products updated into the dataset of each state and each crop, in this application five crops are considered. The predictions are done based on neural networks Neuroph framework in java platform and also the previous years data. The results are produced on mobile application using android. Web based interface is also provided for displaying processed commodity rates in graphical interface. Agricultural experts can follow these graphs and predict market rates which can be informed to the farmers. The results will be provided based on the location of the users of this application.


Author(s):  
Shahkar Riyaz Tramboo ◽  
S. M. K. Quadri

Software architecture is what defines a software system to be built. It starts early in the software development life cycle. The software architecture defines the data as well as the components of any software system along with the relation between them. It constitutes the blueprint that directs the development of the computer based software system. Being a critical activity of software development life cycle, any error in the design phase of software development can be critical to an organization dealing with the project and as such requires evaluation process that will not only analyze the architecture for its quality attributes but will benefit the software development organization by minimizing the risks associated with the software system to be built by pinpointing the errors early in the process of development. This paper highlights the architecture evaluation process with some examples of evaluation methods along with related work that has been previously done in the said field.


Author(s):  
Anjali Verma ◽  
Bhupesh Kr. Dewangan

Several authors have tried to address the problem of impact, effect, and relationship amongst the collection of coupling measures by introducing frameworks to characterize different approaches to coupling and the relative strengths of these, although, on their own, none of the frameworks could be considered comprehensive. There are three existing and quite different frameworks for object-oriented coupling. First, Eder et al. identify three different types of relationships. These relationships, interaction relationships between methods, component relationships between classes, and inheritance between classes, are then used to derive different dimensions of coupling which are classified according to different strengths. Second, Hitz and Montazeri approach coupling by deriving two different types of coupling: object level coupling and class level coupling which are determined by the state of an object and the state of an objects implementation respectively. Again different strengths of coupling are proposed. And third, Briand et al. (1997) constitute coupling as interactions between classes. The strength of the coupling is determined by the type of the interaction, the relationship between the classes, and the interactions locus of impact. As none of the frameworks has been used to characterize existing measures to the different dimensions of coupling identified, the negative aspects highlighted above are still very common ones.


Author(s):  
Vedpal ◽  
Naresh Chauhan

Test case prioritization technique creates the sequence of test cases for execution in such a way that the test cases with higher rate of fault detection are executed earlier than those test cases which have lower rate of fault detection. In this paper a new algorithm is proposed to prioritize the test cases based on coverage of object oriented programming factors. The factors are considered on the basis of complexity and probability of errors introduced by them. For the experimental validation and analysis the proposed test case prioritization algorithm is applied on two case studies. The analyzed case studies are implemented in C++ language. By using the presented algorithm it helps to reduce the cost and time for testing the software.


Author(s):  
Arti Chaturvedi ◽  
Manjari Gupta ◽  
Sanjay Kumar Gupta

Design Pattern Detection is a part of re-engineering process and thus gives significant information to the designer. Detection of design patterns is helpful for improving the software characteristics. Therefore, a reliable design pattern discovery is required. The problem of finding an isomorphic sub-graph is used to solve design pattern detection in past. It is noticed that ordering of vertices of the design pattern saves the time of process. In this paper we are doing ordering of vertices for few design patterns proposed by Gamma, Helm, Johnson, and Vlissides (1995) using an algorithm Greatest Constraint First proposed by Bonnici, Giugno, Pulvirenti, Shasha, and Ferro (2013). After getting this ordering, we use a matching algorithm that uses subgraph isomorphism conditions to check whether a particular design pattern exists in the system design or not (Bonnici et al., 2013). We redefine sub-graph isomorphism conditions in the context of the problem of mining design patterns from the system design.


Author(s):  
Sanjay Kumar ◽  
Pankaj Karki ◽  
Deepa Kumari ◽  
Amandeep Kaur ◽  
G. M. Walunjkar ◽  
...  

The project is to come up with a mechanism to allow the creation of a Virtual Distributed Disk (VDD). The VDD will be exposed as a device file but will actually be backed by multiple disks residing on multiple machines. Thus, the contents of a VDD can be distributed across multiple machines based on user specified policies. The focus of the project will be as follows: Allow creating, deleting, updating, and reading of any part of VDD. There will be a kernel module to handle various file related system calls and also a system to be able to write to and read from remote sections of the VDD when an application on any machine writes to or reads from it. A caching solution is provided to avoid remote file access as far as possible.


Author(s):  
Senthil Veerasamy

Information Technology is one among the high priority resource in the current competitive business scenario. Digital Infrastructure consists of Hardware, Software, Network, Protocols, Policies and Practices that together organize and deliver the increasing power to business and society. The Information Technology services such as Messaging services, Web services, Email services, Data services, Log Monitoring services and others are important for any business. The malfunction or failure of any IT resources during critical situations is not accepted by the stake holders of any business. The Service Level Agreement provides the relationship between the IT service provider and the business customers, it is an evidence of written document which properly addresses the issues. The issues and challenges of Information Technology infrastructure management in Small and Medium Business Enterprises are discussed in this paper.


Author(s):  
Dinesh S. Kapse ◽  
Vijay Bagdi

Internet security is a vital issue of recent times. It is necessary to protect our assets or valuable data from unauthorised person. There area number of techniques available, one of them is honeypot. Honeypots are modern approach to give high level security to our data. Honeypot can be deployed at victims site to attract and divert an attacker from their intended source or targets. Honeypots have the big advantage that they do not give the vital information to the unauthorised person because each traffic is observed by this security mechanism. This fact enables the system to log every byte that passes from network as well as from honeypot and it relates this data with other sources to find the real source of attack as well as attacker. In this paper the brief introduction of honeypots and the types and its uses are described. This paper would also give introduction about Kerberos. Finally we shall conclude by looking at the future of honeypot using Kerberos.


Author(s):  
Md. Akkas Ali

The present paper determines Distributed Minimum Spanning Tree (DMST) of very large graphs. It is very time consuming to calculate in a single machine. So the researcher has used parallel programming. One of the DMST algorithms that support parallel computing is Boruvkas algorithm. The researcher has used this algorithm. To avail the parallelism, we have used the MPI architecture.


Author(s):  
Jyoti Lakhani ◽  
Dharmesh Harwani

Inheritance is used for re-usability in an object oriented programming language. The complete re-usability is not possible with the simple inheritance process. On inheriting parent class, the child does not get a complete access to the inherited data. Only an instance of the values of inherited data has been accessible by the child class and it is true even for the public data. The present communication is a concept paper in which a special inheritance method has been conceptualized. This proposed method is called backward accessibility inheritance. Once inherited, the public data item of the parent class can be shared by the child class in all sense. This way the inherited data item can be truly reused by child class in terms of memory space, name and value. To control the accessibility of the data during the backward accessibility inheritance, concept of dominance has also been introduced.


Sign in / Sign up

Export Citation Format

Share Document