Journal of Software Engineering & Intelligent Systems

ISSN: 2518-8739 (Online)

DECEMBER 2017 | VOLUME. 2  ISSUE. 3
Title:

INTELLIGENT CLASSIFICATION OF LEARNING OBJECTS USING INFORMATION CONTENT, INTRA DOCUMENT TERMS AND DOMAIN VOCABULARY

Authors:

Imran Ihsan, Faisal Fayyaz Kiyani

Abstract:

LMS, databases of learning objects, are used by teachers to store, search, and retrieve learning objects. Classification of these learning objects is a tedious job. Metadata standards are available in order to specify a learning object; however, a taxonomic path is normally left for the developer of the application to decide. A common taxonomic path consists of various domains and sub-domains in the form of a hierarchy. Annotators decide to place a particular learning object in a specified domain but this is a time consuming and laborious work. Automatic and intelligent classification of these learning objects in their respective domain is a great challenge. Each learning object has a pedagogical content and that content can be measured by various techniques. In this paper, we will try to find Information Content in a learning object and classifying it using intra-terms co-occurrences and their frequencies. By using this inverse co-occurrence factor and calculated information content, an intelligent and automatic classification of learning objects can be achieved by tagging it as positive or negative for a particular domain.

Keywords: learning object; metadata; taxonomy; co-occurrence; information content;
Available: INTELLIGENT CLASSIFICATION OF LEARNING OBJECTS USING INFORMATION CONTENT, INTRA DOCUMENT TERMS AND DOMAIN VOCABULARY by Imran Ihsan, Faisal Fayyaz Kiyani is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

INTERACTION BETWEEN TEAM OF REQUIREMENT ENGINEERS AND THE STAKEHOLDERS TO OBTAIN SECURITY REQUIREMENTS OF AN IT PROJECT

Authors:

Muhammad Sadiq, Muhammad Ashfaq

Abstract:

Security Requirements are most important part of overall requirements but they are often not given due importance. Different guidelines are proposed by research for elicitation of security requirements. Security Requirements are often considered as non-functional only but studies reveal that most of the security requirements belongs to functional part. Different methods are proposed to stream processes of security requirement elicitation, SQUARE proposed by SEI is most popular of those. SQUARE methodology consists of nine steps which uses different traditional techniques and define framework for security requirement engineering. SQUARE method is difficult to integrate with current RE practices and in small organization so a scaled down version was proposed named SQUARE Lite which has only four steps. A survey conducted by paper shows that SQUARE Lite is quite feasible for integration in current environment as many of its proposed guidelines already being practiced indirectly.

Keywords: requirements engineering; security requirements; SQUARE; requirements elicitation; stakeholders; IT projects;
Available: INTERACTION BETWEEN TEAM OF REQUIREMENT ENGINEERS AND THE STAKEHOLDERS TO OBTAIN SECURITY REQUIREMENTS OF AN IT PROJECT by Muhammad Sadiq, Muhammad Ashfaq is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

COMPARATIVE ANALYSIS OF SCRUM AND XP IN PAKISTANI SOFTWARE INDUSTRY

Authors:

Muhammad Ibrahim, Muhammad Janas Khan, Abdus Salam

Abstract:

Agile methodologies promise to improve the productivity of software projects. Scrum and Extreme Programming (XP) are the most important agile methodologies. Both of the methodologies have a different framework and different style of implementations. These methodologies inherit the principles of agility. In order to implement these methodologies, the focus is on the agile manifesto. This research work presents exclusive evidence from Pakistani Software Industry for the comparison between Scrum and XP. The main focus of the research is to examine the similarities and differences by using a comparison between Scrum and XP in Pakistani Software Industrial context. The study is aimed to improve the quality of products and services, efficiency, and effectiveness of the developmental process and bring agility to the software development organization. The research is also focused to evaluate the challenges faced by software houses in the implementation of Scrum and XP. This study provides a solution to those challenges. A set of guidelines is presented to ensure the possibility of using both of them in one project.

Keywords: agile software development; traditional software development; XP; scrum; Pakistan; feature driven development;
Available: COMPARATIVE ANALYSIS OF SCRUM AND XP IN PAKISTANI SOFTWARE INDUSTRY by Muhammad Ibrahim, Muhammad Janas Khan, Abdus Salam is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

SIZE OPTIMIZATION OF STEEL TRUSSES USING A GENETIC ALGORITHM IN MATLAB

Authors:

Ersilio Tushaj

Abstract:

An important aspect of any engineering design problem is to achieve efficiency and efficacy. This can be in terms of energy consumption, performance, time, total weight and costs. In many cases, there are multiple solutions to a problem and you should select the one which satisfies better the criteria. This engineering design process is known as optimization. Optimization plays an important role in various engineering applications. Engineers are in continuity, challenged to design structures that use the least amount of resources and satisfy the structural requirements. The optimal design of structures can be decomposed into three major categories: topology, shape and size optimization. These methods have evolved with time and they may be divided in two maxi-groups: deterministic and non-deterministic algorithms. Size optimization of non-deterministic methods with genetic algorithms (GA) are investigated in this article and applied to some steel trusses in MATLAB soft R2017a. This is done by building an algorithm consisting in scripts and sub-functions, which are applied to the trusses for different constraints on stresses, displacements and buckling, depending on the case analyzed. Different values for the GA parameters are analyzed in such way to achieve the best design. The results are put in comparison with previous studies.

Keywords: genetic algorithm; steel trusses; structural optimization; engineering; optimization; performance;
Available: SIZE OPTIMIZATION OF STEEL TRUSSES USING A GENETIC ALGORITHM IN MATLAB by Ersilio Tushaj is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

ADAPTATION OF SCRUM ACTIVITIES AND ARTIFACTS TO MILTON'S KNOWLEDGE MANAGEMENT MODEL

Authors:

Zeinab Tavakoli, Taghi Javdani Gandomani, Majid Ghasemi

Abstract:

Application of specific activities and artifacts in Agile methodologies implies a different viewpoint toward development process in these methods. This viewpoint is fixed in minds due to obligation to Agile dominant principles and values in order to retain dynamicity of these methods. In fact, foundation of Agile methods is made by implicit knowledge which only in case of proper management leads to keeping of dynamic nature of these methods. Milton's model is one of the models of knowledge management. This model is based on the sharing of knowledge between actions groups. Therefore, the present study is an attempt to attain this goal through adaptation of activities and artifacts of Scrum Agile methodologies to one of the well-known knowledge management models.

Keywords: knowledge management; Agile methodologies; implicit knowledge; Scrum; Milton's knowledge management model;
Available: ADAPTATION OF SCRUM ACTIVITIES AND ARTIFACTS TO MILTON'S KNOWLEDGE MANAGEMENT MODEL by Zeinab Tavakoli, Taghi Javdani Gandomani, Majid Ghasemi is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

A SHORT REVIEW OF REQUIREMENTS GATHERING IN AGILE SOFTWARE DEVELOPMENT

Authors:

Israr Ghani, Muhammad Irfan Khan, Adila Firdaus Arbain

Abstract:

Collecting, understanding, and managing requirements is a critical aspect in all the development methods. This is true for agile methods as well. In particular, several agile practices deal with requirements in order to implement them correctly and satisfy the needs of the client. These practices focus on a continuous interaction with the client, customer and end user to address the requirements evolution over time, estimate and prioritize them, and deliver the most valuable functionalities first. Understanding and satisfying every individual client necessities have been perceived as a squeezing challenge for programming enterprises. In order to produce high quality software products and meeting stakeholder's requirement is a major challenge in software requirement. Poor pre-requisites and changes to necessities are one of the causes for project overrun and quality issues in the delivered software. The research shares some of the existing studies that deal with this question "How different existing agile methodologies manage requirements and how collaboration issue affects these steps in a project?"

Keywords: requirements engineering; team collaboration; communication; agile software development; software quality; requirement management;
Available: A SHORT REVIEW OF REQUIREMENTS GATHERING IN AGILE SOFTWARE DEVELOPMENT by Israr Ghani, Muhammad Irfan Khan, Adila Firdaus Arbain is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

A SURVEY OF AGILE DEVELOPMENT METHODS AND TOOLS IN CLOUD ENVIRONMENT

Authors:

Muhammad Younas, Dayang N.A. Jawawi, Israr Ghani, Muhammad Irfan Khan, Imran Ghani

Abstract:

Agile processes such as Scrum and eXtreme Programming (XP) are different from conventional software development life cycles (SDLC) like waterfall and spiral. The iterative development by making use of short development cycles, continuous integration of software versions, frequent feedback, customer involvement, team collaboration and adaptive planning to requirement volatility are the factors that make these processes different and popular. However, the environments where agile processes are executed are traditional (desktop or Intranet based), which require prolonged manual setup time to requirements, design, build, test and deploy a software project causing major delays. The traditional environments are also expensive, face issues related to timely availability and scalability, and hard to react to change (on-demand customization). This bring into account the need of a new end-to-end approach to support agile-based software production supported by major processing power, build, deploy and test capabilities. Based on our investigation, this can take place efficiently by making use of cloud service models such as Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Thus, this paper attempts to investigate the above-mentioned issues and shares the findings obtained from the existing literature.

Keywords: agile software development; cloud computing; survey; XP; SCRUM; agile tools;
Available: A SURVEY OF AGILE DEVELOPMENT METHODS AND TOOLS IN CLOUD ENVIRONMENT by Muhammad Younas, Dayang N.A. Jawawi, Israr Ghani, Muhammad Irfan Khan, Imran Ghani is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

COMPUTER-AIDED DIAGNOSIS PSORIASIS LESION AND OTHER SKIN LESIONS USING SKIN TEXTURE FEATURES AND COMBINATION

Authors:

Tanya Shakir Jarad, Ali J. Dawood, Zainab Hafedh Meteab

Abstract:

Psoriasis is one of the weakening and persisting incendiary skin lesions. Frequently confused as a casual skin thickness, it is evaluated that approximately 125 million people overall endures because of this disease. The case is exacerbated when there is no known cure in the status norm. The common classification of psoriasis has been considered as unexpectedly separated, scaly and erythematous plaque at patient's skin. This lesion could follow anyplace on the human body. Diagnosis of psoriasis requires an experienced specialist in the field of dermatology because of the presence of other skin diseases similar to a large extent which lead to majority cases of an error in diagnosis. The purpose of this study is to establish a diagnosis system of psoriasis lesion to ease the role of the physician in diagnosis by providing better and more reliable results, to support the expert's decision to diagnose the lesion, especially doctors with little experience. In this paper, the researcher is interested in the diagnosis psoriasis lesion by using texture features and combination. Aggregate 220 image samples (70 healthy, 50 other skin lesions and 100 diseased) of psoriasis patients are used in our database. Machine learning approaches like Artificial Neural Network (ANN) classifier and Support Vector Machin (SVM) are used to obtain optimized performance. The proposed Computer-Aided Diagnosis (CADx) system shows optimal performance of 90.9% accuracy, 86.9% sensitivity and 87.7% specificity for texture feature combine RGB-Local Binary Pattren, Color Coocurrance Matrix and Gabor filter algorithms. CADx system became a tool for physicians and therefore it is important to have accurate and reliable CADx system. The presented texture features powerful in psoriasis disease classification. The experiments for all the aforementioned feature combination models using a combination of color and texture provide accurate results than using the single feature.

Keywords: classification; texture features; combination; color-texture feature; Psoriasis lesion disease; color images;
Available: COMPUTER-AIDED DIAGNOSIS PSORIASIS LESION AND OTHER SKIN LESIONS USING SKIN TEXTURE FEATURES AND COMBINATION by Tanya Shakir Jarad, Ali J. Dawood, Zainab Hafedh Meteab is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

OPTIMIZED ENERGY INGESTION IN IOT ENABLED SENSOR NODES: A SURVEY

Authors:

Muhammad Ayzed Mirza, Muhammad Asif Habib, Muhammad

Abstract:

This survey reviews the energy effective mechanisms that direct the Internet of Thing (IoT) evolution while examining the specific areas for energy optimization in wireless sensor nodes. This paper emphasizes the progress in evolving energy techniques which target to reform the skeleton of IoT. Energy dissipation of an IoT sensor node on its layer-based structure is discussed in the paper. An energy saving technique is surveyed under the relationship of IoT and the cognitive radio networks in mobility aspects. In addition, a feedback based energy profiling and reduction of control frame size techniques are discussed that in what manners do they help to reduce energy dissipation. In this paper, we focused on the need of energy optimization for sensor nodes by considering the heterogeneous nature of IoT node for the future needs.

Keywords: cognitive radio networks; internet of things; wireless sensor networks; energy efficiency; security; routing;
Available: OPTIMIZED ENERGY INGESTION IN IOT ENABLED SENSOR NODES: A SURVEY by Muhammad Ayzed Mirza, Muhammad Asif Habib, Muhammad is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

AN IMPROVED LIGHTWEIGHT PRIVACY PRESERVING AUTHENTICATION SCHEME FOR SIP-BASED-VOIP USING SMART CARD

Authors:

Saeed Ullah Jan, Fawad Qayum, Sohail Abbas, Ghulam Murtaza Khan, Ajab Khan, Siffat Ullah Khan

Abstract:

Secure information sharing has become very popular in immigration, military applications, healthcare, education and foreign affairs for the past few years. The security and privacy of such type of information cannot easily be compromised because the secure communication utilizes both wireless and wired communication media for exchanging sensitive information. Voice over IP (VoIP) offers many unique capabilities to its users. An important robust dynamism behind the use of IP telephony is cost savings, especially for businesses with large data networks. By transporting voice traffic over IP-based networks, businesses can decrease or abolish the toll charges related to carrying calls over the Public Switched Telephone Network (PSTN). Session Initiation Protocol (SIP) promises simple and efficient management of multimedia sessions amongst several users. To improve the security, integrity, authenticity and privacy issues while sharing sensitive information, numerous authentication schemes or set-of-rules have been recommended by different researchers in recent times. These authentication schemes are vulnerable to prospective security flaws e.g. replay attack, masquerading, insider attack, impersonation, password guessing, server spoofing, Denning Sacco and denial-of-service (DoS). Further, these schemes also fail to deliver mutual authentication. Almost, no researcher claims with conviction about a foolproof secure authentication scheme. This research mainly focuses on designing VoIP system based on SIP scheme that caters all the weaknesses in these schemes having low computation costs and low communication complexity and low storage overhead and shows a significant balance between performance and security. The proposed protocol also offers mutual authentication and reliable information delivery between user and server. A provable formal security analysis for the scheme will also be established mathematically, using BAN logic of authentication.

Keywords: biohashing; transmission latency; π-calculus; public-key-infrastructure; discrete-logarithmic-function; big numeral-factorization-complication;
Available: AN IMPROVED LIGHTWEIGHT PRIVACY PRESERVING AUTHENTICATION SCHEME FOR SIP-BASED-VOIP USING SMART CARD by Saeed Ullah Jan, Fawad Qayum, Sohail Abbas, Ghulam Murtaza Khan, Ajab Khan, Siffat Ullah Khan is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

MULTI-CLASSIFIER METHOD BASED ON VOTING TECHNIQUE FOR MAMMOGRAM IMAGE CLASSIFICATION

Authors:

Mohamed Alhaj Alobeed, Ali Ahmed, Ashraf Osman Ibrahim

Abstract:

Breast cancer is the disease most common malignancy affects female population and the number of affected people is the second most common leading cause of cancer deaths among all cancer types in the developing countries. Nowadays, there is no sure way to prevent breast cancer, because its cause is not yet fully known. But there are some ways that might lower risk such as early detection of breast cancer can play an important role in reducing the associated morbidity and mortality rates. The basic idea of this paper is to a propose classification method based on multi-classifier voting method that can aid the physician in a mammogram image classification. The study emphasis of five phases starting in collect images, pre-processing (image cropping of ROI), features extracting, classification and end with testing and evaluating. The experimental results show that the voting achieves accuracy of 87.50 % which is a good classification result compared to individual ones.

Keywords: mammograms; breast cancer; multi classifier voting; early detection; image classification;
Available: MULTI-CLASSIFIER METHOD BASED ON VOTING TECHNIQUE FOR MAMMOGRAM IMAGE CLASSIFICATION by Mohamed Alhaj Alobeed, Ali Ahmed, Ashraf Osman Ibrahim is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

A NEW CENTRALIZED-DISTRIBUTED LAYERS MODEL TO ENHANCE THE SECURITY OF IOT

Authors:

Hazem M. Bani-Abdoh, Fuad M. Fatfath

Abstract:

Internet of Things (IoT) is an emerging technology that penetrates into every aspect of human being. IoT is a network of connected IP devices. Since, IoT is mainly encompassed networking of IP devices, it emerges concept of sharing, thus, it must encounter challenges to privacy and security/threats. IoT covers different devices, these devices are governed with different technologies. These diverse technologies are associated with security or securing IoT networks. This research investigates the concept of IoT, its challenges, and the privacy and security issues. In addition, this research proposes a new centralized-distributed layers model (SIAM) to enhance the security of IoT. This model manages all of the collaboration's and heterogeneity's concerns. In reality, SIAM is able to represent different rules included in different types of independent organizations. It is also able to express the security policies for centralized and distributed structures as in IoT scenarios. SIAM includes the core concepts of the context and collaboration.

Keywords: internet of things; IoT; security model; privacy; security; IP devices;
Available: A NEW CENTRALIZED-DISTRIBUTED LAYERS MODEL TO ENHANCE THE SECURITY OF IOT by Hazem M. Bani-Abdoh, Fuad M. Fatfath is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

MOBILE CONTEXT AWARENESS FOR MANAGING CONTEXT HEALTHCARE DATA: A SURVEY

Authors:

Hala Ahmed, Mohammed Elmogy, Ahmed Atwan

Abstract:

Context awareness was introduced in several fields in routine human activities. Healthcare systems are the most important ones among context-aware applications. The existence and awareness of the context made mobile device users conscious of physical environments or situations. Smart devices, armed with multiple sensors, can sense and react based on their environment, and become context-aware agents. Smart devices are ideal assistants that provide accurate solutions for the critical aspects of healthcare, and medical staff works as well as the closer up to date state of the patient. In addition, hospital's staff members can communicate with the patients reliably and suitably by using smart devices offers. But the applications of healthcare have lack of standardization in handling the context and the perceived sensors data. To perceive the context, we can rely on sensors, which may be physical or virtual. More generally, our research will concern on contextual applications of healthcare that aroused increasingly important interest. To improve the user experience, the advantage of contextual data is aimed to take by context-aware applications. A useful tool to reason about context is proved by using case-based reasoning (CBR) and fuzzy techniques to deal with lack of standardization in handling the context and uncertainty of data. On the other side, it could be interesting to analyse how context reasoning relates to CBR. To assess how CBR can be integrated with contextual information is the primary concern of our research study. So, in this paper, we concrete on the mobile application of healthcare that deals with contextual data by using CBR techniques to analyse the context data. It gives a perfect situation in a right way or prediction for providing accurate solutions for the critical aspect of healthcare and medical staff work. It can overcome the problem of the standardization for dealing with context data.

Keywords: case-based reasoning (CBR), nearest neighbor algorithm (NNA), geographical positioning system (GPS), context data management (CDM), profile translation based proactive adaption using context management (PTPACM)
Available: MOBILE CONTEXT AWARENESS FOR MANAGING CONTEXT HEALTHCARE DATA: A SURVEY by Hala Ahmed, Mohammed Elmogy, Ahmed Atwan is available under cc by-nc 4.0 License. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF


Archive

Volume 4:
Issue 1   New
Volume 3:
Issue 3
Issue 2
Issue 1
Volume 2:
Issue 3
Issue 2
Issue 1
Volume 1:
Issue 2
Issue 1
Journal PicsCaomei Publishers © 2016-2019
f t