International Journal of Information Technology and Computer Science @ijitcs
Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1227

Evaluation of Software Quality in Test-driven Development: A Perspective of Measurement and Metrics
Статья научная
A software product is expected to be subjected to critical evaluation on its quality attributes in order to ascertain that target quality requirements are met, and that those quality attributes responsible for revealing software quality are not omitted in the software development process. Software metrics are essential to accomplish the task. This paper has carried out an exploratory study of software measurement and software metrics in tandem. The study took into cognizance the interwoven nature of the duo in measuring and revealing software quality. The study formulated a model that expressed the mutual bonding that propels both measurement and metrics to describing software quality in numeric quantities of software attributes. The study identified six software attributes whose values are considered enough quantities to reveal the quality of a software product. The identification enabled the study to create a model equation aimed at giving a numeric value for the complete evaluation of a software system. The result of the implementation of the six software attributes into the model equation showed that two software products employed in the study are of high-quality, having quality values of 0.93 and 0.86 respectively. The attributes produced values that confirmed the maintainability (25 seconds & 20 seconds respectively) and reliability (0.78 & 0.80 respectively) of both software products among other differing features that characterize them.
Бесплатно

Evaluation of TSP for Emergency Routing
Статья научная
The paper considers the symmetric traveling salesman problem and applies it to sixty-four (64) districts of Bangladesh (with geographic coordinates) as a new instance of the problem of finding an optimized route in need of emergency. It approached three different algorithms namely Integer Linear Programming, Nearest-neighbor, and Metric TSP as exact, heuristic, or approximate methods of solving the NP-hard class of problem to model the emergency route planning. These algorithms have been implanted using computer codes, used IBM ILOG CPLEX parallel optimization, visualized using Geographic Information System tools. The performance of these algorithms also has been evaluated in terms of computational complexity, their run-time, and resulted tour distance using exact, approximate, and heuristic methods to find the best fit of route optimization in emergence thus contributing to the field of combinatorial optimization.
Бесплатно

Статья научная
The localization of sensor nodes in a Wireless Sensor Network (WSN) can be examined by the resultant network parameters of covered sensing area and superimposed area. The measurement of covered sensing area is out of the total surface area how much geographical area can be sensed by the placed sensors and superimpose area is out of the total coverage area how much area is sensed or covered by more than one sensor node. A Wireless Sensor Network can be claimed to be productive only if it produces a good degree of coverage area with respect to less superimposing area and with the use of minimum sensor count also a degree of connectivity. To ensure the performance it is important to place the sensor nodes in a Wireless Sensor Network in its appropriate location. The placement of sensor nodes in 3D Wireless Sensor Network deals with complex mathematical modeling and higher sensor count compared to 2D Wireless Sensor Network. In this paper computation of actual covered area and superimposing area are highlighted after designing a network with a particular node placement method for Hilly Surfaces.
Бесплатно

Evaluation of oil viscosity based various empirical correlations for Azerbaijan crude oils
Статья научная
In the oil industry, the evaluation of oil viscosity is one of the important issues. Generally, the viscosity of crude oil depends on pressure and temperature. In this study, the prediction issue of oil viscosity has been viewed applying empirical correlations as Beggs-Robinson, Labedi, modified Kartoatmodjo, Elsharkawy and Alikhan, Al-Khafaji. Original field data reports have been obtained from Guneshli oil field of Azerbaijan sector of Caspian Basin. The correlation models used in the evaluation of viscosity of Azerbaijan oil have been implemented in the Python software environment. The obtained values on empirical correlations have been compared to experimental data obtained from Guneshli oil field. Statistical analysis in terms of percent absolute deviation (% AD) and the percent absolute average deviation (% AAD), mean absolute error (% MAE), correlation coefficient (% ), root mean square error (% RMSE) are used to subject the evaluation of the viscosity correlations. According to statistical analysis, it has been known that the Beggs-Robinson model has shown the lowest value on AAD (10.5614%), MAE (12.4427 %), RMSE (20.0853 %). The Labedi model has presented the worst result on every four criterions. Even though the Elsharkawy-Alikhan model has presented the highest result (99.9272%) on correlation coefficient, in the evaluation of viscosity of Azerbaijan crude oil, the Beggs-Robinson model can be considered more acceptable.
Бесплатно

Evaluation of the Design Metric to Reduce the Number of Defects in Software Development
Статья научная
Software design is one of the most important and key activities in the system development life cycle (SDLC) phase that ensures the quality of software. Different key areas of design are very vital to be taken into consideration while designing software. Software design describes how the software system is decomposed and managed in smaller components. Object-oriented (OO) paradigm has facilitated software industry with more reliable and manageable software and its design. The quality of the software design can be measured through different metrics such as Chidamber and Kemerer (CK) design metrics, Mood Metrics & Lorenz and Kidd metrics. CK metrics is one of the oldest and most reliable metrics among all metrics available to software industry to evaluate OO design. This paper presents an evaluation of CK metrics to propose an improved CK design metrics values to reduce the defects during software design phase in software. This paper will also describe that whether a significant effect of any CK design metrics exists on total number of defects per module or not. This is achieved by conducting survey in two software development companies.
Бесплатно

Evaluation of the Extended CBD Model: A Case Study using IMS Application
Статья научная
A large number of projects failed because of concentrating on developing new software. The Main drawbacks of new software development are more costly, and need maintenance. Reuse is solution of these problems that caused the widespread usage of object oriented (OO) development. Object oriented development is the backbone of component-based development (CBD). CBD facilitates reuse of the existing components (by customizing) with the new ones. Main advantages of reusable components are more reliable, saved time and reduced cost. CBD approach is different from traditional/new software development. Several models have been proposed for traditional software development such as Waterfall, Rapid Application Development (RAD), Evolutionary, Rational Unified Process (RUP) and agile. Whereas the popular CBD models, for customized development, are V, Y, Umbrella and W. Almost all software development companies, both the new software and customized software have to be developed. Therefore majority of the software development companies face problem to select and implement an appropriate process model for the both kinds of developments. To address this problem, the existing RUP and CBD models do work to some extent but the authors intend to propose an extended CBD model that it equally offers its benefits for new and customized developments. The experimental data is taken from a case study to develop IP Multimedia Sub System (IMS)-based examination application using iPhone to evaluate the proposed model. The results provide evidence that the extended CBD model can be equally beneficial for the development of both new and customization components for IMS-based applications.
Бесплатно

Event-Coverage and Weight based Method for Test Suite Prioritization
Статья научная
There are many challenges in testing of Graphical User Interface (GUI) applications due to its event driven nature and infinite input domain. Testing each and every possible combination of input require creating number of test cases to satisfy the adequacy criteria of GUI testing. It is not possible to test each and every test case within specified time frame. Therefore it is important to assign higher priority to test cases which have higher fault revealing capability than other test cases. Various methods are specified in literature for test suite prioritization of GUI based software and some of them are based on interaction coverage and weight of events. Weight based methods are defined namely fault prone weight based method, random weight based method and equal weight based method in which fault prone based method is most effective. In this paper we have proposed Event-Coverage and Weight based Method (EC-WBM) which prioritizes GUI test cases according to their event coverage and weight value. Weight value will be assigned based on unique event coverage and fault revealing capability of events. Event coverage based method is used to evaluate the adequacy of test cases. EC-WBM is evaluated for 2 applications one is Notepad and another is Calculator. Fault seeding method is used to create number of versions of application and these faults are evaluated using APFD (Average percentage of fault detection). APFD for prioritized test cases of Notepad is 98% and APFD for non-prioritized test cases is 62%.
Бесплатно

Experimental Analysis of Browser based Novel Anti-Phishing System Tool at Educational Level
Статья научная
In the phishing attack, the user sends their confidential information on mimic websites and face the financial problem, so the user should be informed immediately about the visiting website. According to the Third Quarter Phishing Activity Trends Report, there are 55,282 new phishing websites have been detected in the month of July 2014. To solve the phishing problem, a browser based add-on system may be one of the best solution to aware the user about the website type. In this paper, a novel browser based add-on system is proposed and compared its performance with the existing anti-phishing tools. The proposed anti-phishing tool 'ePhish' is compared with the existing browser based anti-phishing toolbars. All the anti-phishing tools have been installed in computer systems at an autonomous college to check their performance. The obtained result shows that if the task is divided into a group of systems, it can give better results. For different phishing features, the add-on system tool show around 97 percentage successful results at different case conditions. The current study would be very helpful to countermeasure the phishing attach and the proposed system is able to protect the user by phishing attacks. Since the system tool is capable of handling and managing the phishing website details, so it would be helpful to identify the category of the websites.
Бесплатно

Expert Finding System using Latent Effort Ranking in Academic Social Networks
Статья научная
The dynamic nature of social network and the influence it has on the provision of immediate solutions to a simple task made their usage prominent and dependable. Whether it is a task of getting a solution to a trivial problem or buying a gadget online or any other task that involves collaborative effort, interacting with people across the globe, the immediate elucidation that comes into anyone’s mind is the social network. Question Answer systems, Feedback systems, Recommender systems, Reviewer Systems are some of the frequently needed applications that are used by people for taking a decision on performing a day to day task. Experts are needed to maintain such systems which will be helpful for the overall development of the web communities. Finding an expert who can do justice for a question involving multiple domain knowledge is a difficult task. This paper deal with an expert finding approach that involves extraction of expertise that is hidden in the profile documents and publications of a researcher who is a member of academic social network. Keywords extracted from an expert’s profile are correlated against index terms of the domain of expertise and the experts are ranked in the respective domains. This approach emphasizes on text mining to retrieve prominent keywords from publications of a researcher to identify his expertise and visualizes the result after statistical analysis.
Бесплатно

Extend Web Service Security Negotiation Framework in Privacy
Статья научная
Nowadays web service privacy gets high attention especially in the fields of finance and medical. Privacy preserves access rights to personally identifiable information. Different models have been proposed for enforcing privacy in web service environment. Getting a privacy level for protecting data transferred between consumer and provider in a web service environment is still a problem. Negotiation helps participants to get a privacy level. This paper extends web service security negotiation framework in a multilateral web service environment for negotiating privacy. A repaired genetic negotiation framework used to conduct the privacy negotiation. In privacy negotiation, the negotiation communication structure uses a broker for negotiation; where each participant sends its attributes to the broker. Negotiation using this communication structure decreases the number of messages transferred so less execution time. The genetic-based Negotiation is compared to traditional time-based negotiation. Through experimental results, genetic based negotiation outperforms traditional time-based negotiation.
Бесплатно

Статья научная
We describe the programming language FOBS-X (Extensible FOBS). FOBS-X is interpreted, and is intended as a universal scripting language. One of the more interesting features of FOBS-X is its ability to be extended, allowing it to be adopted to new scripting environments. FOBS-x is structured as a core language that is parsed by the interpreter, and an extended language that is translated to the core by macro expansion. The syntax of the language can easily be modified by writing new macros. The library for FOBS-X is reconfigurable, allowing the semantics of the language to be modified, and adapted to facilitate the interaction with interfaces to new scripting environments. This paper focuses on the tools used for the semantic extension of the language. A tool called FEDELE has been developed, allowing the user to add library modules to the FOBS-X library. In this way the semantics of the language can be enhanced, and the language can be adapted.
Бесплатно

Extension of K-Modes Algorithm for Generating Clusters Automatically
Статья научная
K-Modes is an eminent algorithm for clustering data set with categorical attributes. This algorithm is famous for its simplicity and speed. The K-Modes is an extension of the K-Means algorithm for categorical data. Since K-Modes is used for categorical data so 'Simple Matching Dissimilarity' measure is used instead of Euclidean distance and the 'Modes' of clusters are used instead of 'Means'. However, one major limitation of this algorithm is dependency on prior input of number of clusters K, and sometimes it becomes practically impossible to correctly estimate the optimum number of clusters in advance. In this paper we have proposed an algorithm which will overcome this limitation while maintaining the simplicity of K-Modes algorithm.
Бесплатно

Extraction of Root Words using Morphological Analyzer for Devanagari Script
Статья научная
In India, more than 300 million people use Devanagari script for documentation. In Devanagari script, Marathi and Hindi are mainly used as primary language of Maharashtra state and national language of India respectively. As compared with English script, Devanagari script is reach of morphemes. Thus the lemmatization of Devanagari script is quite complex than that of English script. There is lack of resources for Devanagari script such as WordNet, ontology representation, parsing the keywords and their part of speech. Thus the overall task of information retrieval becomes complex and time consuming. Devanagari script document always carries suffixes which may cause problem in accurate information retrieval. We propose a method of extracting root words from Devanagari script document which can be used for information retrieval, text summarization, text categorization, ontology building etc. An attempt is made to design the Morphological Analyzer for Devanagari script. We have designed CORPUS containing more than 3000 possible stop words and suffixes for Marathi language. Morphological Analyzer can acts as a preliminary stage for developing any information retrieval application in Devanagari script. We have conducted the experiments on randomly selected Marathi documents and we found the accuracy of designed morphological analyzer is up to 96%.
Бесплатно

FBSEM: A Novel Feature-Based Stacked Ensemble Method for Sentiment Analysis
Статья научная
Sentiment analysis is the process of determining the attitude or the emotional state of a text automatically. Many algorithms are proposed for this task including ensemble methods, which have the potential to decrease error rates of the individual base learners considerably. In many machine learning tasks and especially in sentiment analysis, extracting informative features is as important as developing sophisticated classifiers. In this study, a stacked ensemble method is proposed for sentiment analysis, which systematically combines six feature extraction methods and three classifiers. The proposed method obtains cross-validation accuracies of 89.6%, 90.7% and 67.2% on large movie, Turkish movie and SemEval-2017 datasets, respectively, outperforming the other classifiers. The accuracy improvements are shown to be statistically significant at the 99% confidence level by performing a Z-test.
Бесплатно

FPGA Based High Accuracy Synchronous Acquisition Design for Binocular Vision System
Статья научная
This paper proposes a coarse-to-fine two-level synchronous data acquisition and transmission system for binocular stereo vision, which satisfies strict synchronous requirement of stereo vision. Specifically, this synchronization system design contains: coarse level synchronous based on hardware circuit design and the fine level synchronous based on hardware description language (HDL) design. The former includes the synchronization design of clock and external trigger. The latter utilizes a multi-level synchronous control strategy from field-level to pixel-level, which consists of field-synchronous acquisition of the two-channel video inputs, two-channel Ping-pong buffers switch control module, and pixel-synchronous bit-splicing and PCI transmission module. The experiments of synchronous acquisition and display demonstrate the high reliability and great performance of this synchronous system.
Бесплатно

Статья научная
This paper presents, a high speed FPGA implementation of fully digital controller for three-phase Z-Source Inverter (ZSI) with two switching strategies include simple boost control and maximum boost control. In this method total of blocks are based on proposed digital circuits only with combinational logic and using pipelining technique. Since it is vital to have a high speed and effective ZSI controller, a novel digital design for pulse width modulation control have been implemented for simple and maximum boost control of the ZSI. The proposed digit controllers have been successfully synthesized and implemented by Quartus II 9.1V and Cyclone II FPGA, to target device EP2C20F484C6. Achieved result demonstrates that the proposed method has features including reconfigurable, low-cost, high speed and also it is very accurate.
Бесплатно

Статья научная
In this paper we present a logical circuits design for approximate content matching implemented as finite state machines (FSM). As network speed increases the software based network intrusion detection and prevention systems (NIDPS) are lagging behind requirements in throughput of so called deep package inspection - the most exhaustive process of finding a pattern in package payloads. Therefore, there is a demand for hardware implementation. Approximate content matching is a special case of content finding and variations detection used by "evasion" techniques. In this research we will enhance the k-differentiate problem with "ability" to detect a generalized Levensthein edit distance i.e. transposition of two neighboring characters. The proposed designs are based on automata theory using the concept of state reduction and complexity minimization. The main objective is to present the feasibility of the hardware design and the trade-off between the simple next state and output functions of NFA and reduced number of required memory elements (flip-flops) of DFA.
Бесплатно

Facial Expression Classification Using Artificial Neural Network and K-Nearest Neighbor
Статья научная
Facial Expression is a key component in evaluating a person's feelings, intentions and characteristics. Facial Expression is an important part of human-computer interaction and has the potential to play an equal important role in human-computer interaction. The aim of this paper is bring together two areas in which are Artificial Neural Network (ANN) and K-Nearest Neighbor (K-NN) applying for facial expression classification. We propose the ANN_KNN model using ANN and K-NN classifier. ICA is used to extract facial features. The ratios feature is the input of K-NN classifier. We apply ANN_KNN model for seven basic facial expression classifications (anger, fear, surprise, sad, happy, disgust and neutral) on JAFEE database. The classifying precision 92.38% has been showed the feasibility of our proposal model.
Бесплатно

Factors Affecting Software Cost Estimation in Developing Countries
Статья научная
Cost is the main driving factor for all projects. When it is done correctly, it helps in the successful completion of the project. In this research we have discussed various factors that affect the estimation procedure. These include team structure, team culture, managerial style, project type (Core application or integrated application), client’s working environment. Accurate estimation is far difficult in developing countries where most of the organizations follow local standards. These inaccurate estimations lead to late delivery, less profit or in worst case complete failure. Software requirement gathering, development, maintenance, quality assurance and cost of poor quality are major groups responsible for overall cost in software production process. The exact proportion among them varies significantly in consecutive software releases, which is caused by many factors. The ever increasing need for the reliability of the software systems, especially mission critical applications in the public safety domain, raises the bar for the accuracy of prediction and estimation techniques. The accuracy of estimations in many areas brings about more concerns regarding techniques already used in the software industry. Widely deployed techniques, such as Wideband Delphi method, stress the engineering and technical aspects of the process of how estimates are prepared.
Бесплатно

Статья научная
Data on the web is constantly growing which may affect users’ ability to find relevant information within a reasonable time limit. Some of the factors previously studied that affect users searching behaviour are task difficulty and topic familiarity. In this paper, we consider a set of implicit feedback parameters to investigate how document difficulty and document familiarity affects users searching behaviour in a task-specific context. An experiment was conducted and data was collected from 77 undergraduate students of Computer science. Users’ implicit features and explicit ratings of document difficulty and familiarity were captured and logged through a plugin in Firefox browser. Implicit feedback parameters were correlated with user ratings for document difficulty and familiarity. The result showed no correlation between implicit feedback parameters and the rating for document familiarity. There was, however, a negative correlation between user mouse activities and document difficulty ratings. Also, the dataset of all the participants in the experiment was grouped according to task type and analysed. The result showed that their behaviour varies according to task type. Our findings provide more insight into studying the moderating factors that affect user searching behaviour.
Бесплатно