International Journal of Software Engineering and Technologies (IJSET)
Latest Publications


TOTAL DOCUMENTS

22
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

Published By Institute Of Advanced Engineering And Science

2302-4038, 2302-4038

Author(s):  
K Sridhar Patnaik ◽  
Pooja Jha

A software project faces its top expense on defect removal; thereby delaying the schedules. There has been increasing demand for high quality software. Here, high quality software means, delivering defect free software and meeting the predictable results within time and cost constraints. Software defect prediction strives to improve software quality and testing efficiency. The research work presented here is an empirical study and analyzes importance of different metrics used in the organization. The paper examines the impact of LSL and USL, known as organization baselines, on various projects and proposes four metrics for capability analysis metrics. These can prove beneficial for categorizing the process of software development. These metrics aim to improve the ongoing software development process and are helpful in determining the quality of these processes in terms of their specification limits. Also, the paper attempts to justify the probability of the values related to the data provided by normal distribution or Gaussian distribution.


Author(s):  
Nagaraj G Cholli ◽  
Khalid Amin Shiekh ◽  
G N Srinivasan

Software rejuvenation has become a new horizon for increasing the system reliability and availability in a long run. One of the concept in software rejuvenation policy involves rebooting the system by suspending the disk and capturing the images of processes currently running in the system. In our rejuvenation policy we make use an intelligent time and load algorithm for deciding the optimal rejuvenation period. Since at any given time there can be n number of processes running in the system with different physical memory utilizations and variable workloads running, it becomes very vital to thoroughly test the system with highly chaotic and disruptive workloads. For this we use some non-traditional form of testing which we call non deterministic system testing (NDST) to test different features and conditions of system


Author(s):  
Made Sudarma ◽  
Putu Sutramiani

One of the cultural heritage which are now starting to be forgotten is the papyrus library. Balinese papyrus is one of the media to write the ideas from minstrels in ancient times. Currently, many of ancient literature that written in papyrus very difficult to identify because the writings were beginning to rot or fade influenced by age. The introduction of Balinese scripts on papyrus can be done first by performing papyrus digitalization. The papyruses are scanned to become one image file. Further the papyrus image is done by Thresholding since prior to the thinning process it is required a binary image. The application of Thinning Zhang-Suen method is very effective because from the original image with 2 sub iteration until yielding in 1 pixel. The benefits of this research is to improve the quality of the image and further segmented to read papyrus making it easier to read text on the papyrus.


Author(s):  
Sanket Suresh Naik Dessai ◽  
Varuna Eswer

Efficiency of a processor is a critical factor for an embedded system. One of the deciding factors for efficiency is the functioning of the L1 cache and Translation Lookaside Buffer (TLB). Certain processors have the L1 cache and TLB managed by the operating system, MIPS32 is one such processor. The performance of the L1 cache and TLB necessitates a detailed study to understand its management during varied load on the processor. This paper presents an implementation of embedded testing procedure to analyse the performance of the MIPS32 processor L1 cache and TLB management by the operating system (OS). The implementation proposed for embedded testing in the paper considers the counting of the respective cache and TLB management instruction execution, which is an event that is measurable with the use of dedicated counters. The lack of hardware counters in the MIPS32 processor results in the usage of software based event counters that are defined in the kernel. This paper implements embedding testbed with a subset of MIPS32 processor performance measurement metrics using software based counters. Techniques were developed to overcome the challenges posed by the kernel source code. To facilitate better understanding of the testbed implementation procedure of the software based processor performance counters; use-case analysis diagram, flow charts, screen shots, and knowledge nuggets are supplemented along with histograms of the cache and TLB events data generated by the proposed implementation. In this testbed twenty-seven metrics have been identified and implemented to provide data related to the events of the L1 cache and TLB on the MIPS32 processor. The generated data can be used in tuning of compiler, OS memory management design, system benchmarking, scalability, analysing architectural issues, address space analysis, understanding bus communication, kernel profiling, and workload characterisation.


Author(s):  
Akash Naren ◽  
Manoj Kumar D S

This paper utilizes Smartphone sensing of vehicle dynamics to determine driver phone use, which can facilitate many traffic safety applications. Our system uses embedded sensors in smart phones, i.e., accelerometers and gyroscopes, to capture differences in centripetal acceleration due to vehicle dynamics These differences combined with angular speed can determine whether the phone is on the left or right side of the vehicle. Despite noisy sensor readings from Smartphone, our approach can achieve a classification accuracy of over 90 percent with a false positive rate of a few percent. We also find that by combining sensing results in a few turns, we can achieve better accuracy (e.g., 95 percent) with a lower false positive rate.


Author(s):  
Made Sudarma ◽  
I Wayan Agus Surya Darma

Papyrus script is a cultural heritage in Bali. As we know, that the papyrus is a cultural matter which is rich in valuable cultural values. Issues or problems encountered today is that the papyrus are not well maintained. Thus, many papyrus becomes damaged because it is not stored properly. Papyrus script was written using Balinese script’s characters which having different features compared with Latin’s characters. Balinese script can be recognized with feature extraction owned by each Balinese script. KNN is a classification algorithm based on nearest neighborhood. KNN can be used to classify Balinese script’s features so that the test Balinese script’s features which having nearest neighborhood value with the trained Balinese script’s features will be recognized as the same Balinese script


Author(s):  
Junaid Rashid ◽  
Waqar Mehmood ◽  
Muhammad Wasif Nisar

This Survey paper shows the recent state of model comparison as it’s applies to Model Driven engineering. In Model Driven Engineering to calculate the difference between the models is a very important and challenging task. There are number of tasks involved in Model differencing that firstly starts with identifying and matching the elements of the model. In this paper we discuss how model matching is accomplished, the strategies, techniques and the types of the model. In this paper we also discuss the future direction. We find out that many of the latest model comparison strategies are geared near enabling Meta model and similarity based matching. Therefore model versioning is the most dominant application of the model comparison. Recently to work on comparison for versioning has begun to deteriorate, giving way to different applications. Ultimately there is wide change among the tools in the measure of client exertion needed to perform model comparisons, as some require more push to encourage more sweeping statement and expressive force.


Author(s):  
Harsimran Kaur ◽  
Ashish Sharma

Software Requirement Analysis is one of the most important and critical activity of software development, that affects the development cost and success of end product. This paper proposes to add both formal and informal specifications of NFR to Request for Proposal document. It ought the developers to focus on each NFR right from the beginning of development process. In this paper NFRs are specified informally by extended use case and formally by proposed extension to Formal Reference Model. The paper claims that the proposed add-ons related to NFRs are qualitative one and can be considered as standard add-ons in RFP documents to deal with NFRs. It shall act as important step during early planning system for designing and implementing proposed software. The complete procedure is illustrated using a general case of cafeteria ordering framework.


Author(s):  
Normi Sham Awang Abu Bakar ◽  
Iqram Mahmud

The Android Market is the official (and primary) storefor Android applications. The Market provides users with average user ratings, user reviews, descriptions, screenshots,and permissions to help them select applications. Generally, prior to installation of the apps, users need to agree on the permissions requested by the apps, they are not given any other option. Essentially, users may not aware on some security issues that may arise from the permissions. Some apps request the right to manipulate sensitive data, such as GPS location, photos, calendar, contact, email and files. In this paper, we explain the sources of sensitive data, what the malicious apps can do to the data, and apply the empirical software engineering analysis to find the factors that could potentially influence the permissions in Android apps. In addition, we also highlight top ten most implemented permissions in Android apps and also analyse the permissions for the apps categories in Android.


Author(s):  
Venkata Prakash ◽  
Manoj Kumar D.S

Ongoing development of haptic technology has the capacity to offer considerable development in protection and performance in demanding environments where imaginative and prescient and listening to are compromised. studies concerning the cognitive psychology of contact is missing and may be useful in the development of expectancies approximately human overall performance for the refinement and implementation of haptic generation. This have a look at examines haptic-spatial reminiscence the usage of a unique evaluation approach primarily based on finger anatomy. Similarly, proof is provided for a serial-role effect for haptic-spatial reminiscence this is analogous to the conventional serial-function effect established inside the verbal consider of phrase lists. lengthy-time period memory for visible-spatial responsibilities.


Sign in / Sign up

Export Citation Format

Share Document