Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 888

Full-Text Articles in Computer Engineering

The Role Of Network Components In Improving The Reliability And Survivability Of Mobile Communication Networks, Dilmurod Davronbekov, Utkir Karimovich Matyokubov Sep 2020

The Role Of Network Components In Improving The Reliability And Survivability Of Mobile Communication Networks, Dilmurod Davronbekov, Utkir Karimovich Matyokubov

Acta of Turin Polytechnic University in Tashkent

This article compares the different architectures of mobile communication networks (MCN) and examines the survivability of the network. Typical survival strategies for improving MCN survivability, failure mitigation strategies for network elements, wireless network survival rates, failure scenarios at MCN levels, and survival indicators are presented. The importance of fiber-optic communication in the construction of communication lines between MCN components has been studied. The issue of designing MCNs in a cost-effective and highly viable way is considered, and the necessary expressions of the design process are given.


Web Based Service For Diabetes Patient Monitoring Sensors, M. Usha Rani Sep 2020

Web Based Service For Diabetes Patient Monitoring Sensors, M. Usha Rani

International Journal of Computer Science and Informatics

Diabetes mellitus is a major cause of blindness, renal failure, amputation, heart attacks and stroke. For a diabetes patient, many factors are to be considered. Change in the meal may cause unpredictable changes in blood sugar levels. The diabetes patient monitoring considers these factors and proposes a solution using the sensors like glucometer sensor, blood Pressure sensor and the RFID tag with arduino given to the individual patients. The internet of things integrates many technologies, such as Internet, Zigbee, Bluetooth, infrared, Wi-Fi, GPRS, 3G, etc., This paper provides low cost global connectivity between the patients personal device and the patient ...


Comparative Study Of Multi User Broadcast Authentication In Wireless Sensor Network, P. Prasuna Sep 2020

Comparative Study Of Multi User Broadcast Authentication In Wireless Sensor Network, P. Prasuna

International Journal of Computer Science and Informatics

Wireless sensor network (WSN) is an emerging technology consisting of spatially distributed sensor nodes, which can cooperatively monitor physical or environmental conditions. The major resource constrain of WSN are, low processing, energy and storage capabilities. Broadcast is widely used communication method in WSN environment. In most of the sensor networks, the sink node sends broadcast information to all other sensor nodes. Broadcast authentication is an important security mechanism in WSN, as it allows mobile users to broadcast messages to multiple sensor nodes in a secured way. While variety of multiuser broadcast authentication approaches are being developed, a lot of research ...


Empirical Study On Selection Of Team Members For Software Projects – Data Mining Approach, Sangita Gupta Sep 2020

Empirical Study On Selection Of Team Members For Software Projects – Data Mining Approach, Sangita Gupta

International Journal of Computer Science and Informatics

One of the essential requisites of any software industry is the development of customer satisfied products. However, accomplishing the aforesaid business objective depends upon the depth of quality of product that is engineered in the organization. Thus, generation of high quality depends upon process, which is in turn depends upon the people. Existing scenario in IT industries demands a requirement for deploying the right personnel for achieving desirable quality in the product through the existing process. The goal of this paper is to identify the criteria which will be used in industrial practice to select members of a software project ...


Vfg – Index: A Novel Graph Indexing Method, A. Pankaj Moses Monickaraj Sep 2020

Vfg – Index: A Novel Graph Indexing Method, A. Pankaj Moses Monickaraj

International Journal of Computer Science and Informatics

The latest advancements in science and technology have observed large quantity of complicated structures and schema less data such as proteins, circuits, images, Web, and XML documents which can be modeled into various types of which one of the most dominant now a days are graphs. This has caused Graph Mining, one of the budding areas of research happening throughout. In this paper, we investigate the various algorithms for Graph Indexing which makes use of Frequent Sub graph as a key term for indexing, of which one the most dominant is FG-index algorithm. This algorithm is tested with AIDS dataset ...


Managing Redundancy And Conflicts In Distributed Firewalls, Ms. Kruthi K. Kumar Sep 2020

Managing Redundancy And Conflicts In Distributed Firewalls, Ms. Kruthi K. Kumar

International Journal of Computer Science and Informatics

The use of firewall has been widespread in all the emerging technologies such as Service Oriented Architecture, web services, cloud computing and so on. The term security itself is the most important task that has to be maintained in the real-time applications. Policies are enrolled in the security of the firewall where the quality of policies is to be maintained. The network administrator defines the policy as a rule. Managing the firewall policies, maintaining the risk analysis and also the conflicting nature that arise in the network, lack of systematic analysis mechanisms and tools used are often error prone. The ...


Increasing Accuracy Of K-Nearest Neighbor Classifier For Text Classification, Falguni N. Patel Sep 2020

Increasing Accuracy Of K-Nearest Neighbor Classifier For Text Classification, Falguni N. Patel

International Journal of Computer Science and Informatics

k - Nearest Neighbor Rule is a well-known technique for text classification. The reason behind this is its simplicity, effectiveness, easily modifiable. In this paper, we briefly discuss text classification, k-NN algorithm and analyse the sensitivity problem of k value. To overcome this problem, we introduced inverse cosine distance weighted voting function for text classification. Therefore, Accuracy of text classification is increased even if any large value for k is chosen, as compared to simple k Nearest Neighbor classifier. The proposed weighted function is proved as more effective when any application has large text dataset with some dominating categories, using experimental ...


Ocl Formal Specification Based Metrics As A Measure Of Complexity And Fault-Proneness, A. Jalila, D. Jeya Mala, S. Balamurugan, K. Sabari Nathan Sep 2020

Ocl Formal Specification Based Metrics As A Measure Of Complexity And Fault-Proneness, A. Jalila, D. Jeya Mala, S. Balamurugan, K. Sabari Nathan

International Journal of Computer Science and Informatics

Formal specification of UML models in OCL is essential to improve software quality. Owing to the use of OCL in precise model specification, its application has been looked in different perspectives such as early measurement of module complexity. Moreover, when UML class diagrams are complemented with OCL, the metrics collected from OCL specification can serve as an indicator of fault-prone components. In the proposed approach an empirical study has been conducted on five soft real time case study applications. In this paper, existing metrics which are applicable to OCL expression are validated using module complexity. Moreover, a new metrics suite ...


Test Scenarios Generation Using Path Coverage, Vikas Panthi, D. P. Mohapatra Sep 2020

Test Scenarios Generation Using Path Coverage, Vikas Panthi, D. P. Mohapatra

International Journal of Computer Science and Informatics

Testing is one of the very important component of software development process. Properly generated test sequences may not only locate the defects in software, but also help in reducing the high cost associated with software testing. It is often desired that test sequences should be automatically generated to achieve required test coverage. Automatic test sequence generation is a major problem in software testing. The aim of this study is to generate test sequences for source code using ModelJunit. ModelJUnit is a extended library of JUnit. We have generate automatic test sequences and some testing criterion coverage such as node coverage ...


Dynamic Slicing Of Aspect-Oriented Uml Communication Diagram, Alina Mishra, Subhrakanta Panda, Dishant Munjal Sep 2020

Dynamic Slicing Of Aspect-Oriented Uml Communication Diagram, Alina Mishra, Subhrakanta Panda, Dishant Munjal

International Journal of Computer Science and Informatics

Aspect-oriented Programming (AOP) is a recent programming paradigm that focuses on modular implementations of various crosscutting concerns. The typical features of AOP such as join-point, advice, introduction, aspects etc. make it difficult for applying slicing. Program slicing is a method to extort statements that are relevant to a particular variable. Program slicing, as initially defined by Weiser is based on static dataflow examination on the flow graph of the program. Program slicing has been applied in parallel processing, program debugging, program integration,program understanding , software testing and maintenance etc.In this paper, we proposed a technique for dynamic slicing of ...


Aspect Mining Using Uml Communication Diagram, Subhrakanta Panda, Alina Mishra, Dishant Munjal Sep 2020

Aspect Mining Using Uml Communication Diagram, Subhrakanta Panda, Alina Mishra, Dishant Munjal

International Journal of Computer Science and Informatics

Aspect-Oriented Programming (AOP) focuses on precise constructs for modularization of the crosscutting concerns of a program. Crosscutting concerns can be defined as the functionalities that navigate the principal decomposition of software and therefore cannot be assigned to a single modular unit. Aspect mining attempts to find and isolate crosscutting concerns dwelling in legacy systems which in turn help in the adoption of an aspect-oriented design. Functionalities originally scattered across different modules and tangled with each other can be factored out into a distinct, separate unit, called an aspect. Identifying and refactoring the existing system into AOP considerably ease the debugging ...


Blackbox Testing Of Web Service, Kaushik Rana Sep 2020

Blackbox Testing Of Web Service, Kaushik Rana

International Journal of Computer Science and Informatics

Web Services and Service Oriented Computing (SOC) paradigm have received significant attention due to its wide spread adoption and promotion by major IT vendors. As more and more Service-Oriented Softwares are built to-day testing of web service have becomes crucial point. Web services are distributed, loosly coupled, autonomous, reusuable, discoverable, hides internal logic (Abstraction),minimize retaining information (Statelessness) and adhere to Service Level Aggrement (SLA).These inherent characterestics imposes great challenges to the tester.In this paper we try to impose hierarchical structure on Web Service Description Language(WSDL) in order to uncover more and more errors before its final ...


Model Based Test Case Prioritization Using Uml Activity Diagram And Evolutionary Algorithm, Prateeva Mahali, Arup Abhinna Acharya Sep 2020

Model Based Test Case Prioritization Using Uml Activity Diagram And Evolutionary Algorithm, Prateeva Mahali, Arup Abhinna Acharya

International Journal of Computer Science and Informatics

With the exponential growth in size and complexity of softwares, the testing activity is no more limited to testing phase of SDLC (Software Development Life Cycle). Testing process has been made iterative and incremental in Object Oriented development scenario. This leads to increase in effort and time required for testing as well as explosion in test case. But when it comes to regression testing, it has the additional issue of test case retesting which further increasing the effort and time. So a suitable prioritization technique should be used to address these issues. In this paper we had given a proposal ...


Performance Analysis Of Test Data Generation For Path Coverage Based Testing Using Three Metaheuristic Algorithms, Madhumita Panda, Partha Pratim Sarangi Sep 2020

Performance Analysis Of Test Data Generation For Path Coverage Based Testing Using Three Metaheuristic Algorithms, Madhumita Panda, Partha Pratim Sarangi

International Journal of Computer Science and Informatics

This paper discusses an approach to generate test data for path coverage based testing using Genetic Algorithms, Differential Evolution and Artificial Bee Colony optimization algorithms. Control flow graph and cyclomatic complexity of the example program has been used to find out the number of feasible paths present in the program and it is compared with the actual no of paths covered by the evolved test cases using those meta-heuristic algorithms. Genetic Algorithms, Artificial Bee Colony optimization and Differential Evolution are acting here as meta-heuristic search paradisms for path coverage based test data generation. Finally the performance of the test data ...


Critical Components Identification Using Mutation Based Components Impact Analysis, D. Jeyamala, K. Sabari Nathan, A. Jalila, S. Balamurugan Sep 2020

Critical Components Identification Using Mutation Based Components Impact Analysis, D. Jeyamala, K. Sabari Nathan, A. Jalila, S. Balamurugan

International Journal of Computer Science and Informatics

High quality software can be obtained by means of resolving the complexity of the software. According to Pareto principle, 20% of components lead to 80% of the problems [1]. So, we need to identify those 20% of the components during testing. Therefore, this research work suggested an automated software testing framework to identify critical components using mutant based dynamic impact analysis for Software under Test (SUT). Mutants are automatically generated by injecting faults in the components using Offutt mutation operators and they are utilised to identify their impact level over other components of the system. The generated mutants and original ...


Fault-Prone Components Identification For Real Time Complex Systems Based On Criticality Analysis, D. Jeyamala, S. Balamurugan, A. Jalila, K. Sabari Nathan Sep 2020

Fault-Prone Components Identification For Real Time Complex Systems Based On Criticality Analysis, D. Jeyamala, S. Balamurugan, A. Jalila, K. Sabari Nathan

International Journal of Computer Science and Informatics

Generally, complexity of Software affects the development and maintenance Cost. The Complexity of the software increases, when the number of Components increase, among these components, some are more critical than others which will lead to catastrophic effects on field use. Hence, it is needed to identify such critical components after coding to test them rigorously. In this paper, we presented a novel approach that helps to identify the critical components in the software based on Criticality Analysis. Criticality Analysis analyzes the critical value of each component based on their Sensitivity and Severity metrics.


Model Based Regression Testing Approach Of Serviceoriented Architecture(Soa) Based Application: A Case Study, Prachet Bhuyan, Abhishek Kumar Sep 2020

Model Based Regression Testing Approach Of Serviceoriented Architecture(Soa) Based Application: A Case Study, Prachet Bhuyan, Abhishek Kumar

International Journal of Computer Science and Informatics

Service-Oriented Architecture(SOA) is an approach for designing, deploying and managing services that represent reusable business functionality. SOA removes the gap between software and business. Reliability and fault-free implementation are major concern for SOA based applications. Traditional testing are no more beneficial for verifying and validating the quality of services in SOA systems. Regression testing is inevitable that is undertaken every time to provide confidence that modification do not introduce new bugs into previously validated code. In this paper we addressed the UML based regression testing method using UML use case diagram and UML activity diagram to generate a test ...


Generation Of Test Cases Using Activity Diagram, Ranjita Kumari Swain, Vikas Panthi, Prafulla Kumar Behera Sep 2020

Generation Of Test Cases Using Activity Diagram, Ranjita Kumari Swain, Vikas Panthi, Prafulla Kumar Behera

International Journal of Computer Science and Informatics

As Unified Modeling Language (UML) activity diagrams capture the key system behavior, the UML activity diagram is well suited for the system level testing of systems. In this paper, first an activity flow graph is derived from activity diagram. Then, all the required information is extracted from the activity flow graph (AFG). The activity flow graph (AFG) for the activity diagram is created by traversing the activity diagram from beginning to end, showing choices, conditions, concurrent executions, loop statements. From the graph different control flow sequence are identified by traversing the AFG by depth first traversal technique. Next, an algorithm ...


Mobile Devices Overview, M.Arjun Goud Sep 2020

Mobile Devices Overview, M.Arjun Goud

International Journal of Computer Science and Informatics

Now a day's mobile devices are multi-functional devices capable of hosting a broad range of applications for both business and consumer use. Personal Digital Assistants (PDA) and the ever-growing category of smart phones allow people to access the Internet for e-mail, instant messaging, text messaging and Web browsing, as well as work documents, contact lists and more. This paper presents an overview of mobile devices and also the operating systems used in the devices.


Domain Bounded English To Indian Sign Language Translation Model, Syed Faraz Ali, Gouri Sankar Mishra, Ashok Kumar Sahoo Sep 2020

Domain Bounded English To Indian Sign Language Translation Model, Syed Faraz Ali, Gouri Sankar Mishra, Ashok Kumar Sahoo

International Journal of Computer Science and Informatics

This is a proposal for the English text to Indian Sign Language translation model wherein the system will accept the input text and then translates the given words in sequence by making an avatar to display signs of each word. The translation here is corpus based. There is direct mapping between the English and ISL text. Since it is very inefficient to make signs for each word our domain is bounded by certain criteria for which the translator translates the given text. Like, the system which we propose is for railway reservation counters for enquiry.


Nlp Challenges For Machine Translation From English To Indian Languages, Mallamma V Reddy, Dr. M. Hanumanthappa Sep 2020

Nlp Challenges For Machine Translation From English To Indian Languages, Mallamma V Reddy, Dr. M. Hanumanthappa

International Journal of Computer Science and Informatics

This Natural Langauge processing is carried particularly on English-Kannada/Telugu. Kannada is a language of India. The Kannada language has a classification of Dravidian, Southern, Tamil-Kannada, and Kannada. Regions Spoken: Kannada is also spoken in Karnataka, Andhra Pradesh, Tamil Nadu, and Maharashtra. Population: The total population of people who speak Kannada is 35,346,000, as of 1997. Alternate Name: Other names for Kannada are Kanarese, Canarese, Banglori, and Madrassi. Dialects: Some dialects of Kannada are Bijapur, Jeinu Kuruba, and Aine Kuruba. There are about 20 dialects and Badaga may be one. Kannada is the state language of Karnataka. About ...


A Comparative Study Of Protein Tertiary Structure Prediction Methods, Chandrayani N.Rokde, Dr.Manali Kshirsagar Sep 2020

A Comparative Study Of Protein Tertiary Structure Prediction Methods, Chandrayani N.Rokde, Dr.Manali Kshirsagar

International Journal of Computer Science and Informatics

Protein structure prediction (PSP) from amino acid sequence is one of the high focus problems in bioinformatics today. This is due to the fact that the biological function of the protein is determined by its three dimensional structure. The understanding of protein structures is vital to determine the function of a protein and its interaction with DNA, RNA and enzyme. Thus, protein structure is a fundamental area of computational biology. Its importance is intensed by large amounts of sequence data coming from PDB (Protein Data Bank) and the fact that experimentally methods such as X-ray crystallography or Nuclear Magnetic Resonance ...


Theoretical Concepts & Applications Of Independent Component Analysis, Sonali Mishra, Nitish Bhardwaj, Dr. Rita Jain Sep 2020

Theoretical Concepts & Applications Of Independent Component Analysis, Sonali Mishra, Nitish Bhardwaj, Dr. Rita Jain

International Journal of Computer Science and Informatics

This paper deals with the study of Independent Component Analysis. Independent Component Analysis is basically a method which is used to implement the concept of Blind Source Separation. Blind Source Separation is a technique which is used to extract set of source signal from set of their mixed source signals. The various techniques which are used for implementing Blind Source Separation totally depends upon the properties and the characteristics of original sources. Also there are many fields nowadays in which Independent Component Analysis is widely used. This paper deals with the theoretical concepts of Independent Component Analysis, its principles and ...


A Comparative Analysis Of Ecdsa V/S Rsa Algorithm, Amanpreet Kaur, Vikas Goyal Sep 2020

A Comparative Analysis Of Ecdsa V/S Rsa Algorithm, Amanpreet Kaur, Vikas Goyal

International Journal of Computer Science and Informatics

Elliptic curve Cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focus on generation of elliptic curve and shows why finite fields are introduced. But for accurate observation we do analysis on category of cryptographic primitives used to solve given security problem. RSA & ECDSA both have basic criteria of production of keys and method of encryption and decryption in basic application as per security and other properties which are authentication ...


Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project, M. Sheshikala Sep 2020

Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project, M. Sheshikala

International Journal of Computer Science and Informatics

Unethical e-mail senders bear little or no cost for mass distribution of messages, yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way to distribute a massive amount of undesired messages to a tremendous number of users at a very low cost. These unwanted bulk messages or junk e-mails are called spam messages .Several machine learning approaches have been applied to this problem. In this paper, we explore a new approach based on ...


Data Warehousing Applications: An Analytical Tool For Decision Support System, Mohammed Shafeeq Ahmed Sep 2020

Data Warehousing Applications: An Analytical Tool For Decision Support System, Mohammed Shafeeq Ahmed

International Journal of Computer Science and Informatics

Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data warehouses (DW) can provide the information required by the decision makers. The data warehouse supports an on-line analytical processing (OLAP), the functional and performance requirements of which are quite different from those of the on-line transaction processing (OLTP) applications traditionally supported by the operational databases. Data warehouses provide on-line analytical processing (OLAP) tools for the interactive analysis of multidimensional data ...


Cloud Computing Applications And Security Issues: An Analytical Survey, Arati Kothari Sep 2020

Cloud Computing Applications And Security Issues: An Analytical Survey, Arati Kothari

International Journal of Computer Science and Informatics

Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing, distributed computing parallel computing and so on. Companies, such as Amazon, Google, Microsoft and so on, accelerate their paces in developing Cloud Computing systems and enhancing their services to provide for a larger amount of users. However, security and privacy issues present a strong barrier for ...


The Mathematical Analysis Of Column Oriented Database, Amit Kumar Dwivedi, Vijay Kumar Sharma Sep 2020

The Mathematical Analysis Of Column Oriented Database, Amit Kumar Dwivedi, Vijay Kumar Sharma

International Journal of Computer Science and Informatics

There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for database systems: business transactional data processing. However, there are a set of emerging applications for database systems for which the row-by-row layout performs poorly. These applications are more analytical in nature, whose goal is to read through the data to gain new insight and use it to drive decision making ...


Spinning Led Display Using Radio Frequency, Apeksha Sarode, Deepali Madhukar Salunke, Akshaydutta Laxmidutta Shukla, Manvi Mukesh Sonawadekar Sep 2020

Spinning Led Display Using Radio Frequency, Apeksha Sarode, Deepali Madhukar Salunke, Akshaydutta Laxmidutta Shukla, Manvi Mukesh Sonawadekar

International Journal of Computer Science and Informatics

The project consists of Spinning LED display using RF which displays the messages send by the user at the handheld device. if there are no inputs from the user for the system, the message that is programmed in the microcontroller will be displayed continuously. The circuit needs to be mounted on a mechanical structure that rotates at high speed. The display consists of 7 LEDs only in a vertical row. By moving them fast enough, message can be displayed which appears to be generated by a 7*n matrix of LEDs and not a single column of LEDs, where n ...


Linear Feedback Shift Register Based Unique Random Number Generator, Harsh Kumar Verma, Ravindra Kumar Singh Sep 2020

Linear Feedback Shift Register Based Unique Random Number Generator, Harsh Kumar Verma, Ravindra Kumar Singh

International Journal of Computer Science and Informatics

Linear Feedback Shift Register based Unique Random Number Generator is an enhancement of Random Number generator with the additional property that any number generated by a unique random number generator can’t be duplicated. As per users demand for not duplicated random numbers in some applications like transferring a random number over the network on the behalf of actual character of the message for security point of view, existence of unique random number generators are very essential. In this paper LFSR [1] (Linear Feedback Shift Register) is used to implement the proposed concept of unique random number generator. Using LFSR ...