Journal of Software Engineering & Intelligent Systems

ISSN: 2518-8739 (Online)
APRIL 2019 | VOLUME. 4  ISSUE. 1
Title:

INTRUSION PREVENTION SYSTEM ANALYSIS USING DATABASE RULE AND SIGNATURE ON UNIFIED THREAT MANAGEMENT

Authors:

Iyan Rahdian, Widya Silfianti

Abstract:

The use of the internet in the business world is making businesses more effective in improving services and cost effeciency. The internet enables computers to connect to each other with external networks. However, it has the risk of intrusion such as unknown IP addresses entering the network, causing slow connections between networks, even making web pages and applications unaccesible. Network security in this case is very important to detect and block intrusions; A solution to network security is needed such as the Unified Threat Management (UTM). One of the functions of UTM is Intrusion Prevention System (IPS), which has the function of analyzing intrusion using methods from database rules and signatures. IPS compares incoming data packets with patterns in database rules and signatures, if it has the same pattern then the package is considered as intrusion and is blocked, if the package does not have the same pattern as the pattern in the database rule and signatures, the data package is not considered as an intrusion. The use of IPS can provide information on intrusion and how to block them, making it easier to improve network security and accuracy in detecting systems infected with DDoS malware in 1000 tests performed, getting accuracy of about 98% with 12 false positives that occur during the experiment.

Keywords: network security; information system security; intruder prevention system (IPS); unified threat management (UTM);
Available: INTRUSION PREVENTION SYSTEM ANALYSIS USING DATABASE RULE AND SIGNATURE ON UNIFIED THREAT MANAGEMENT by Iyan Rahdian, Widya Silfianti is available under cc by-nc 4.0 License on 30th April 2019. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

ANALYSIS OF THE EFFECT OF ETHNICITY, COLOR AND GENDER ON MULTI VIEW FACE EMOTION RECOGNITION

Authors:

Farhad Goodarzi, Fakhrul Zaman Bin Rokhani, M. Iqbal Saripan

Abstract:

Based on existing literature, there are seven basic emotions that humans can express. Human facial expression degree varies among different people. In this paper, real time face emotion recognition system is presented. The multi-view facial emotion recognition system works with frontal, non-frontal and side face view. A 3D face pose estimation algorithm detects head rotations of yaw, roll, and pitch for emotion recognition. UPM3D-FE and BU3D-FE databases were used in this research. After detecting the face, geometrical facial features combined with texture features are extracted automatically from specific areas of the face in a novel approach. The features are tested on different classifiers to determine the performance of the method. The results show improvement over existing approaches in neutral, happy, sad, disgust, anger and surprise when using the neural networks with GLCM texture operators, also a real time system is achieved. Other analysis about the role of ethnicity, gender, shows that gender has almost no effect on emotion recognition and in BU3DFE database, middle east, and southeast Asians achieve the highest accuracy result and the lowest are black and white ethnicities.

Keywords: facial expressions; basic emotions; real time; 3D face pose; back propagation; texture operator;
Available: ANALYSIS OF THE EFFECT OF ETHNICITY, COLOR AND GENDER ON MULTI VIEW FACE EMOTION RECOGNITION by Farhad Goodarzi, Fakhrul Zaman Bin Rokhani, M. Iqbal Saripan is available under cc by-nc 4.0 License on 30th April 2019. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

IDENTIFICATION OF CHALLENGES DURING REQUIREMENTS IMPLEMENTATION IN GLOBAL SOFTWARE DEVELOPMENT: A SYSTEMATIC LITERATURE REVIEW

Authors:

Muhammad Yaseen, Rashid Naseem, Zahid Ali, Ghufran ullah

Abstract:

Context: Global Software Development (GSD) is the development across the globe in which the stakeholders are distributed geographically. In GSD, requirements gathering becomes difficult due to the distribution of clients and vendors. The study is related to challenges during requirements implementation in the context of GSD.
Objective: There is a need to address challenges during Requirements Implementation (RI) in GSD. The aim of the proposed research is to analyze these challenges in GSD.
Method: To achieve the goals, a Systematic Literature Review (SLR) is used as research methodology. In this study, all the SLR steps are performed, such as the protocol development, initial selection, final selection, quality assessment, data extraction and data synthesis.
Results: The list of identified challenges are “effective communication”, “collaboration and coordination”, “knowledge sharing”, “requirement management” and “organizational changes” which are more critical. The factors are analyzed using different continents such as, software company sizes and through different experimental methodologies. The identified factors like; “effective communication” and “organizational differences” are critically common in all sub continents, software company size and research methodologies.

Keywords: global software development; critical challenges; systematic literature review; requirement engineering; requirement implementation;
Available: IDENTIFICATION OF CHALLENGES DURING REQUIREMENTS IMPLEMENTATION IN GLOBAL SOFTWARE DEVELOPMENT: A SYSTEMATIC LITERATURE REVIEW by Muhammad Yaseen, Rashid Naseem, Zahid Ali, Ghufran ullah is available under cc by-nc 4.0 License on 30th April 2019. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

THEMATIC KNOWLEDGE FRAMEWORK ON HUMAN FACTOR IN SOFTWARE MAINTENANCE PRACTICE: A STUDY IN A MICRO SOFTWARE COMPANY

Authors:

Zeljko Stojanov

Abstract:

Due to the recognized constraints faced by micro software companies, knowledge management of human related issues becomes important for their efficiency, quality of their products and services, and competitiveness at the market. These companies do not have resources to implement the best practice proposals and international standards in their practice, and therefore, the most suitable way to assess their practice and organize knowledge is by using inductive participatory approaches that start from the real context. This article presents a lightweight inductive method for identifying and systematizing knowledge, and its implementation in a micro software company aimed at developing a thematic knowledge framework on human factor in software maintenance practice. The development of the thematic framework is based on joint work of researchers from the university and the programmers from the company, with the full support and commitment of the company management. The thematic framework contains themes related to programmers and software users as the main actors in software maintenance practice. The benefits for the company, the implications for practitioners from industry and researchers, and further research directions are also discussed.

Keywords: human factor; software maintenance; knowledge identification; knowledge systematization; thematic framework; micro software company;
Available: THEMATIC KNOWLEDGE FRAMEWORK ON HUMAN FACTOR IN SOFTWARE MAINTENANCE PRACTICE: A STUDY IN A MICRO SOFTWARE COMPANY by Zeljko Stojanov is available under cc by-nc 4.0 License on 30th April 2019. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF

Title:

NEW HYBRID AFRICAN BUFFALO OPTIMIZATION AND CUCKOO SEARCH METAHEURISTIC APPLIED ON TWO KNAPSACK PROBLEMS

Authors:

Amira Gherboudj

Abstract:

African Buffalo Optimization (ABO) and Cuckoo search (CS) are two recent metaheuristics based swarm intelligence. ABO is inspired by the buffalo’s behavior and lifestyle. CS is inspired by the cuckoo’s behavior and lévy flights mechanism. The aim of this contribution is threefold. The first aim is to propose a new hybrid metaheuristic between ABO and CS metaheuristics. The second aim is to propose two discrete binary versions of the proposed metaheuristic to cope with binary optimization problems. The third aim is to solve two knapsack problems: Single knapsack problem (KP) and multidimensional knapsack problem (MKP), which are NP-hard optimization problems. Computational results show the effectiveness of our algorithms and their ability to achieve best and promising solutions.

Keywords: hybrid metaheuristic; swarm intelligence; african buffalo optimization; cuckoo search; binary problems; knapsack problems;
Available: NEW HYBRID AFRICAN BUFFALO OPTIMIZATION AND CUCKOO SEARCH METAHEURISTIC APPLIED ON TWO KNAPSACK PROBLEMS by Amira Gherboudj is available under cc by-nc 4.0 License on 30th April 2019. Permissions beyond the scope of this license may be available at JSEIS.
Download PDF


Archive

Volume 4:
Issue 2   New
Issue 1
Volume 3:
Issue 3
Issue 2
Issue 1
Volume 2:
Issue 3
Issue 2
Issue 1
Volume 1:
Issue 2
Issue 1
Journal PicsCaomei Publishers © 2016-2019
f t