Journal of Software Engineering & Intelligent Systems

ISSN: 2518-8739 (Online)

AUGUST 2016 | VOLUME. 1  ISSUE. 1
Title:

A PROPOSAL FOR E-LEARNING SOFTWARE FOR CHILDREN WITH CEREBRAL PALSY

Authors:

Muhammad Adeel Ghafoor, Zeeshan Tufail

Abstract:

Cerebral palsy (CP) is a disorder of physical body movement and posture caused by a lesion or injury of the immature brain. Many children with CP frequently develop learning disabilities. A child with learning disability has an average or above average level of intelligence. Other than that, the brain damage that leads to CP can also lead to other health issues, including vision, hearing and speak problems, and learning disabilities. As a result, the system or applications that must be developed for children with CP must focus on their limitations and requirements, which can give the user a useful way of learning process. This research paper focuses on an e-learning software system that enhances the learning capabilities of children with CP.

Keywords: E-learning Software; Software Engineering; Cerebral Palsy; Software Applications; Software Development;
Available: A PROPOSAL FOR E-LEARNING SOFTWARE FOR CHILDREN WITH CEREBRAL PALSY by Muhammad Adeel Ghafoor, Zeeshan Tufail is available under a cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

IDENTIFICATION OF CHANLLENGES AND ATTRIBUTES FOR VALUE-BASED SOFTWARE STAKEHOLDER ANALYSIS

Authors:

Muhammad Imran Babar, Masitah Ghazali, Dayang N.A. Jawawi, Falak Sher, Muhammad Jehanzeb

Abstract:

Value Based Software Engineering (VBSE) deals with the development of economic driven software systems. In such systems, a business idea is implemented in order to gain the market leverage. For the realization of an idea, the requirements must be highly valuable. The valuable requirements can only be obtained from a key set of valuable stakeholders. Researchers presented different stakeholder identification and quantification (SIQ) approaches. The current approaches do not provide low level details in order to carry out the SIQ process, and most of these approaches deal at a very high level of abstraction. This paper focuses on the problems of existing SIQ process and identifies the key stakeholder attributes in order to streamline the SIQ process. In this research, a survey is conducted in the software industry of Pakistan and Malaysia. The survey reports the problems faced by the software industry in the SIQ process. Moreover, the key stakeholder attributes are also reported which may be used to solve the key problems of the SIQ process.

Keywords: Value-based Software; Stakeholders; Stakeholder Problems; Stakeholder Attributes; Requirements Engineering; Software Process;
Available: IDENTIFICATION OF CHANLLENGES AND ATTRIBUTES FOR VALUE-BASED SOFTWARE STAKEHOLDER ANALYSIS by Muhammad Imran Babar, Masitah Ghazali, Dayang N.A. Jawawi, Falak Sher, Muhammad Jehanzeb is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

RISKS WITH CLOUD COMPUTING DATA RESIDENCY AND VIRTUALIZATION

Authors:

Zubair Ahmad, Akram M. Zeki, Akeem Olowo

Abstract:

Cloud computing helps organizations to shift focus from technology challenges to improving business performance. Cloud computing is widely adopted across many industry sectors. However, with adoption comes a security concern. Many approaches have been adopted or recommended to ensure privacy and prevention of data loss. Apart from security concerns of cloud computing, there are more other challenges like issues surrounding data residency in cloud computing, especially with regards to where the data is stored and what laws apply in global computing environment, legal issues involved in different countries may take weeks or months or even years to get sorted out? Further concerns, include knowing when data is breached, or if data remain in the cloud even after termination of service or if data is seized, making the business to face threat of availability by not being able to continue operations. In this paper we discuss broadly the risks associated with cloud computing data residency and virtualization and propose assessment solutions to secure the data.

Keywords: Data Residency; Virtualization; Data Security; Encryption; Tokenization Techniques; Virtualization Techniques;
Available: RISKS WITH CLOUD COMPUTING DATA RESIDENCY AND VIRTUALIZATION by Zubair Ahmad, Akram M. Zeki, Akeem Olowo is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

A PROPSAL FOR GAME DEVELOPMENT

Authors:

Muhammad Faisal Altaf, Muhammad Ali, Zeeshan Pervaiz

Abstract:

Salvage Life is First Person Shooting game. In which player will find him-self in a critical situation like any kind of terrorist attack. It may include bomb blast, firing, attack with weapons and captive situation. The story of Salvage Life is based upon post terrorist attack and player need to take first essential steps when this kind of attack happens. By playing this game players will know about their responsibilities as a citizen, steps to provide first aid and rules and regulations. Basic purpose of this game is to deliver awareness among the peoples about post terrorist attack and their responsibilities as a citizen.

Keywords: Game; Game Development; Terrorism; Serious Games; First Aid;
Available: A PROPSAL FOR GAME DEVELOPMENT by Muhammad Faisal Altaf, Muhammad Ali, Zeeshan Pervaiz is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

COMPARISON OF VOIP ON IPV4 ONLY NETWORK AND IPV6 ONLY NETWORK

Authors:

Muhammad Fawad

Abstract:

The world is moving from IPV4 and going straight to IPV6 because of certain shortcoming in IPV4 such as address space exhaustion, large routing table, security problems, mobility and the quality of service that it ensured. In the coming era every-thing should be a network demanding a huge address space. IPV6 is thought to be the most important protocol for networks because of its availability features and handling the limitation of IPV4 in a better way. The aim of this research is to examine the behavior of IPV4 and IPV6 under various traffic conditions. This will make possible the exchange of information between IPv4-only network hosts and IPv6-only network hosts. The performance metric will be throughput and end to end delay for both the cases.

Keywords: IPV4; IPV6; VOIP; Networking; Communication;
Available: COMPARISON OF VOIP ON IPV4 ONLY NETWORK AND IPV6 ONLY NETWORK by Muhammad Fawad is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF


Journal PicsCaomei Publishers © 2016-2019
f t