Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Discipline
Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 1538

Full-Text Articles in Computer Engineering

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro Dec 2020

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Effect Of Catholyte Concentration On Current Production During Chocolate Industry Wastewater Treatment By A Microbial Fuel Cell, Diana Rahayuning Wulan, Suprihanto Notodarmojo Nov 2020

Effect Of Catholyte Concentration On Current Production During Chocolate Industry Wastewater Treatment By A Microbial Fuel Cell, Diana Rahayuning Wulan, Suprihanto Notodarmojo

Makara Journal of Technology

Microbial fuel cells (MFCs) use bacteria as a catalyst to oxidize organic and/or inorganic substrates and produce electric currents. Wastewater could function as an electron donor in the anode chamber and, thus, represents a very promising energy source. Catholytes, as electron acceptors, influence power production in MFCs by increasing the availability of electrons. The present research aims to determine the influence of catholyte concentration on current production in an aerobic two-chamber MFC. Aerobic treatment was carried out in the two-chamber MFC operated in an incubator at 37  1 °C with and without aeration in the cathode chamber. Wastewater from ...


Evaluation Of Il-17a And Il-17f Gene Expression In Peripheral Blood Mononuclear Cells In Different Clinical Stages Of Chronic Hepatitis B Infection In An Iranian Population, Tannaz Akbari Kolagar, Seyed Reza Mohebbi, Fatemeh Ashrafi, Shahrzad Shoraka, Hamid Asadzadeh Aghdaei, Mohammad Reza Zali Nov 2020

Evaluation Of Il-17a And Il-17f Gene Expression In Peripheral Blood Mononuclear Cells In Different Clinical Stages Of Chronic Hepatitis B Infection In An Iranian Population, Tannaz Akbari Kolagar, Seyed Reza Mohebbi, Fatemeh Ashrafi, Shahrzad Shoraka, Hamid Asadzadeh Aghdaei, Mohammad Reza Zali

Makara Journal of Technology

Hepatitis B virus (HBV) infection is one of the main causes of liver damage, which can also lead to chronic hepatitis B (CHB) infection. More than 240 million individuals worldwide are chronic carriers of HBV. Among individuals with CHB who are untreated, approximately 15% – 40% will progress to liver cirrhosis or cancer. The interactions between HBV and host immune response play significant roles in the progression of CHB. CHB can be generally divided into four different clinical phases: immune tolerance (IT), immune clearance, inactive carrier, and Hepatitis B surface antigen (HBsAg)-negative reactivation phase (ENEG). Many studies showed that interleukins ...


Redesign Of Product Packaging With Kansei Engineering: Empirical Study On Small-Medium Enterprises In Indonesia, Amalia Suzianti, A. Aldianto Nov 2020

Redesign Of Product Packaging With Kansei Engineering: Empirical Study On Small-Medium Enterprises In Indonesia, Amalia Suzianti, A. Aldianto

Makara Journal of Technology

Small-medium enterprises (SMEs) in Indonesia have been proven to be one of the important pillars of the national economy. Unfortunately, some problems hinder their development, and one of the critical problems is the quality of product packaging. The packages of SME products are considered poor, dirty, and unattractive. Packaging problem is one of the factors why consumers are less interested in buying and why SME products always lose in the competition with other products. This study discusses how to employ Kansei engineering to design better SME product packaging with a focus on psychological (affective) aspects. This research concludes that there ...


Effect Of Landfill Leachates On Some Water Quality Indicators Of Selected Surface Water And Groundwater At Ilokun, Ado-Ekiti, Nigeria, Olorunwa Omofunmi, Adesola Satimehin, Abraham Oloye, Okwunna Umego Nov 2020

Effect Of Landfill Leachates On Some Water Quality Indicators Of Selected Surface Water And Groundwater At Ilokun, Ado-Ekiti, Nigeria, Olorunwa Omofunmi, Adesola Satimehin, Abraham Oloye, Okwunna Umego

Makara Journal of Technology

This study was conducted to examine the impact of dumpsites on the quality of groundwater and surface water. The water samples and leachates were collected from dumpsites in respective zones. The physicochemical properties of the samples were examined and determined in accordance with the standards of the American Public Health Association. Results indicated that the groundwater and surface water that are close to the dumpsites have an electrical conductivity of 385 and 245 Sd/cm, total dissolved solids of 168 and 128 mg/L, a turbidity of 4.6 and 22 NTU, a total alkalinity of 103 and 50 mg ...


Microstrip Filters: A Review Of Different Filter Designs Used In Ultrawide Band Technology, Hussain Bohra, Giriraj Prajapati Nov 2020

Microstrip Filters: A Review Of Different Filter Designs Used In Ultrawide Band Technology, Hussain Bohra, Giriraj Prajapati

Makara Journal of Technology

In this study, optimization techniques applied in designing microstrip bandpass ultra-wideband (UWB) filters are presented. Optimization based on various defected ground structure techniques, resonator designs, and type of dielectric materials is discussed. Microstrip bandpass filters implemented at UWB frequency bands used in wireless communication systems have key features to control frequency response in passband and stopband. Optimization techniques are studied to attain optimum performance of bandpass microstrip filters to ensure minimum insertion loss, high selectivity, compactness, sharp transitions at cut-off frequencies, high return loss, and excellent linearity. Extensive study shows that proper selection of fabrication techniques and type of material ...


Effect Of Pvdf-Ca Ratio On Electrospun Membrane For Water–Oil Filtration Application, Mohamad Haziq Alias, Izan Izwan Misnon, Rajan Jose Nov 2020

Effect Of Pvdf-Ca Ratio On Electrospun Membrane For Water–Oil Filtration Application, Mohamad Haziq Alias, Izan Izwan Misnon, Rajan Jose

Makara Journal of Technology

Oil spillage and generation of industrial water–oil wastewater mixture ignite a focus on filtration technology. Electrospinning technique provides a versatile route in producing tunable diameter and pores in nanofiber filtration membrane development. In this work, polyvinylidene difluoride (PVDF) and cellulose acetate (CA) electrospun membrane at different concentration ratios were synthesized for water–oil filtration application. The polymeric solutions were characterized using viscometer and conductivity testing, whereas the membranes were analyzed using contact angle, tensile test, scanning electron microscopy (SEM), and filtration testing of oil (dichloromethane). Conductivity test showed a decreased conductivity along with decrement of CA ratio in the ...


Performance-Shaping Factors Of Personnel Performing Evacuation And Escape On Offshore Installations In Tropical, Norafneeza Norazahar, Nur Azizah Arryanie Morshidi, Arshad Ahmad, Wijayanuddin Mohd Ali Nov 2020

Performance-Shaping Factors Of Personnel Performing Evacuation And Escape On Offshore Installations In Tropical, Norafneeza Norazahar, Nur Azizah Arryanie Morshidi, Arshad Ahmad, Wijayanuddin Mohd Ali

Makara Journal of Technology

Performance-shaping factors (PSFs) are used to address the strengths and weaknesses of workers performing escape and evacuation activities. These PSFs are time, environmental factors as stressors, complexity of activities, experiences and training, interaction between workers and emergency equipment, workers’ physical conditions, and procedures. This paper presents a survey work on fitness for the duty of workers performing basic offshore survival and emergency response training. The training provides credible scenarios of escape and evacuation in case of an emergency of offshore installations in tropical waters. The survey is conducted among participants of the tropical basic offshore safety induction & emergency training with ...


Web Based Service For Diabetes Patient Monitoring Sensors, M. Usha Rani Sep 2020

Web Based Service For Diabetes Patient Monitoring Sensors, M. Usha Rani

International Journal of Computer Science and Informatics

Diabetes mellitus is a major cause of blindness, renal failure, amputation, heart attacks and stroke. For a diabetes patient, many factors are to be considered. Change in the meal may cause unpredictable changes in blood sugar levels. The diabetes patient monitoring considers these factors and proposes a solution using the sensors like glucometer sensor, blood Pressure sensor and the RFID tag with arduino given to the individual patients. The internet of things integrates many technologies, such as Internet, Zigbee, Bluetooth, infrared, Wi-Fi, GPRS, 3G, etc., This paper provides low cost global connectivity between the patients personal device and the patient ...


Comparative Study Of Multi User Broadcast Authentication In Wireless Sensor Network, P. Prasuna Sep 2020

Comparative Study Of Multi User Broadcast Authentication In Wireless Sensor Network, P. Prasuna

International Journal of Computer Science and Informatics

Wireless sensor network (WSN) is an emerging technology consisting of spatially distributed sensor nodes, which can cooperatively monitor physical or environmental conditions. The major resource constrain of WSN are, low processing, energy and storage capabilities. Broadcast is widely used communication method in WSN environment. In most of the sensor networks, the sink node sends broadcast information to all other sensor nodes. Broadcast authentication is an important security mechanism in WSN, as it allows mobile users to broadcast messages to multiple sensor nodes in a secured way. While variety of multiuser broadcast authentication approaches are being developed, a lot of research ...


Empirical Study On Selection Of Team Members For Software Projects – Data Mining Approach, Sangita Gupta Sep 2020

Empirical Study On Selection Of Team Members For Software Projects – Data Mining Approach, Sangita Gupta

International Journal of Computer Science and Informatics

One of the essential requisites of any software industry is the development of customer satisfied products. However, accomplishing the aforesaid business objective depends upon the depth of quality of product that is engineered in the organization. Thus, generation of high quality depends upon process, which is in turn depends upon the people. Existing scenario in IT industries demands a requirement for deploying the right personnel for achieving desirable quality in the product through the existing process. The goal of this paper is to identify the criteria which will be used in industrial practice to select members of a software project ...


Vfg – Index: A Novel Graph Indexing Method, A. Pankaj Moses Monickaraj Sep 2020

Vfg – Index: A Novel Graph Indexing Method, A. Pankaj Moses Monickaraj

International Journal of Computer Science and Informatics

The latest advancements in science and technology have observed large quantity of complicated structures and schema less data such as proteins, circuits, images, Web, and XML documents which can be modeled into various types of which one of the most dominant now a days are graphs. This has caused Graph Mining, one of the budding areas of research happening throughout. In this paper, we investigate the various algorithms for Graph Indexing which makes use of Frequent Sub graph as a key term for indexing, of which one the most dominant is FG-index algorithm. This algorithm is tested with AIDS dataset ...


Managing Redundancy And Conflicts In Distributed Firewalls, Ms. Kruthi K. Kumar Sep 2020

Managing Redundancy And Conflicts In Distributed Firewalls, Ms. Kruthi K. Kumar

International Journal of Computer Science and Informatics

The use of firewall has been widespread in all the emerging technologies such as Service Oriented Architecture, web services, cloud computing and so on. The term security itself is the most important task that has to be maintained in the real-time applications. Policies are enrolled in the security of the firewall where the quality of policies is to be maintained. The network administrator defines the policy as a rule. Managing the firewall policies, maintaining the risk analysis and also the conflicting nature that arise in the network, lack of systematic analysis mechanisms and tools used are often error prone. The ...


Increasing Accuracy Of K-Nearest Neighbor Classifier For Text Classification, Falguni N. Patel Sep 2020

Increasing Accuracy Of K-Nearest Neighbor Classifier For Text Classification, Falguni N. Patel

International Journal of Computer Science and Informatics

k - Nearest Neighbor Rule is a well-known technique for text classification. The reason behind this is its simplicity, effectiveness, easily modifiable. In this paper, we briefly discuss text classification, k-NN algorithm and analyse the sensitivity problem of k value. To overcome this problem, we introduced inverse cosine distance weighted voting function for text classification. Therefore, Accuracy of text classification is increased even if any large value for k is chosen, as compared to simple k Nearest Neighbor classifier. The proposed weighted function is proved as more effective when any application has large text dataset with some dominating categories, using experimental ...


Ocl Formal Specification Based Metrics As A Measure Of Complexity And Fault-Proneness, A. Jalila, D. Jeya Mala, S. Balamurugan, K. Sabari Nathan Sep 2020

Ocl Formal Specification Based Metrics As A Measure Of Complexity And Fault-Proneness, A. Jalila, D. Jeya Mala, S. Balamurugan, K. Sabari Nathan

International Journal of Computer Science and Informatics

Formal specification of UML models in OCL is essential to improve software quality. Owing to the use of OCL in precise model specification, its application has been looked in different perspectives such as early measurement of module complexity. Moreover, when UML class diagrams are complemented with OCL, the metrics collected from OCL specification can serve as an indicator of fault-prone components. In the proposed approach an empirical study has been conducted on five soft real time case study applications. In this paper, existing metrics which are applicable to OCL expression are validated using module complexity. Moreover, a new metrics suite ...


Test Scenarios Generation Using Path Coverage, Vikas Panthi, D. P. Mohapatra Sep 2020

Test Scenarios Generation Using Path Coverage, Vikas Panthi, D. P. Mohapatra

International Journal of Computer Science and Informatics

Testing is one of the very important component of software development process. Properly generated test sequences may not only locate the defects in software, but also help in reducing the high cost associated with software testing. It is often desired that test sequences should be automatically generated to achieve required test coverage. Automatic test sequence generation is a major problem in software testing. The aim of this study is to generate test sequences for source code using ModelJunit. ModelJUnit is a extended library of JUnit. We have generate automatic test sequences and some testing criterion coverage such as node coverage ...


Dynamic Slicing Of Aspect-Oriented Uml Communication Diagram, Alina Mishra, Subhrakanta Panda, Dishant Munjal Sep 2020

Dynamic Slicing Of Aspect-Oriented Uml Communication Diagram, Alina Mishra, Subhrakanta Panda, Dishant Munjal

International Journal of Computer Science and Informatics

Aspect-oriented Programming (AOP) is a recent programming paradigm that focuses on modular implementations of various crosscutting concerns. The typical features of AOP such as join-point, advice, introduction, aspects etc. make it difficult for applying slicing. Program slicing is a method to extort statements that are relevant to a particular variable. Program slicing, as initially defined by Weiser is based on static dataflow examination on the flow graph of the program. Program slicing has been applied in parallel processing, program debugging, program integration,program understanding , software testing and maintenance etc.In this paper, we proposed a technique for dynamic slicing of ...


Aspect Mining Using Uml Communication Diagram, Subhrakanta Panda, Alina Mishra, Dishant Munjal Sep 2020

Aspect Mining Using Uml Communication Diagram, Subhrakanta Panda, Alina Mishra, Dishant Munjal

International Journal of Computer Science and Informatics

Aspect-Oriented Programming (AOP) focuses on precise constructs for modularization of the crosscutting concerns of a program. Crosscutting concerns can be defined as the functionalities that navigate the principal decomposition of software and therefore cannot be assigned to a single modular unit. Aspect mining attempts to find and isolate crosscutting concerns dwelling in legacy systems which in turn help in the adoption of an aspect-oriented design. Functionalities originally scattered across different modules and tangled with each other can be factored out into a distinct, separate unit, called an aspect. Identifying and refactoring the existing system into AOP considerably ease the debugging ...


Blackbox Testing Of Web Service, Kaushik Rana Sep 2020

Blackbox Testing Of Web Service, Kaushik Rana

International Journal of Computer Science and Informatics

Web Services and Service Oriented Computing (SOC) paradigm have received significant attention due to its wide spread adoption and promotion by major IT vendors. As more and more Service-Oriented Softwares are built to-day testing of web service have becomes crucial point. Web services are distributed, loosly coupled, autonomous, reusuable, discoverable, hides internal logic (Abstraction),minimize retaining information (Statelessness) and adhere to Service Level Aggrement (SLA).These inherent characterestics imposes great challenges to the tester.In this paper we try to impose hierarchical structure on Web Service Description Language(WSDL) in order to uncover more and more errors before its final ...


Model Based Test Case Prioritization Using Uml Activity Diagram And Evolutionary Algorithm, Prateeva Mahali, Arup Abhinna Acharya Sep 2020

Model Based Test Case Prioritization Using Uml Activity Diagram And Evolutionary Algorithm, Prateeva Mahali, Arup Abhinna Acharya

International Journal of Computer Science and Informatics

With the exponential growth in size and complexity of softwares, the testing activity is no more limited to testing phase of SDLC (Software Development Life Cycle). Testing process has been made iterative and incremental in Object Oriented development scenario. This leads to increase in effort and time required for testing as well as explosion in test case. But when it comes to regression testing, it has the additional issue of test case retesting which further increasing the effort and time. So a suitable prioritization technique should be used to address these issues. In this paper we had given a proposal ...


Performance Analysis Of Test Data Generation For Path Coverage Based Testing Using Three Metaheuristic Algorithms, Madhumita Panda, Partha Pratim Sarangi Sep 2020

Performance Analysis Of Test Data Generation For Path Coverage Based Testing Using Three Metaheuristic Algorithms, Madhumita Panda, Partha Pratim Sarangi

International Journal of Computer Science and Informatics

This paper discusses an approach to generate test data for path coverage based testing using Genetic Algorithms, Differential Evolution and Artificial Bee Colony optimization algorithms. Control flow graph and cyclomatic complexity of the example program has been used to find out the number of feasible paths present in the program and it is compared with the actual no of paths covered by the evolved test cases using those meta-heuristic algorithms. Genetic Algorithms, Artificial Bee Colony optimization and Differential Evolution are acting here as meta-heuristic search paradisms for path coverage based test data generation. Finally the performance of the test data ...


Critical Components Identification Using Mutation Based Components Impact Analysis, D. Jeyamala, K. Sabari Nathan, A. Jalila, S. Balamurugan Sep 2020

Critical Components Identification Using Mutation Based Components Impact Analysis, D. Jeyamala, K. Sabari Nathan, A. Jalila, S. Balamurugan

International Journal of Computer Science and Informatics

High quality software can be obtained by means of resolving the complexity of the software. According to Pareto principle, 20% of components lead to 80% of the problems [1]. So, we need to identify those 20% of the components during testing. Therefore, this research work suggested an automated software testing framework to identify critical components using mutant based dynamic impact analysis for Software under Test (SUT). Mutants are automatically generated by injecting faults in the components using Offutt mutation operators and they are utilised to identify their impact level over other components of the system. The generated mutants and original ...


Fault-Prone Components Identification For Real Time Complex Systems Based On Criticality Analysis, D. Jeyamala, S. Balamurugan, A. Jalila, K. Sabari Nathan Sep 2020

Fault-Prone Components Identification For Real Time Complex Systems Based On Criticality Analysis, D. Jeyamala, S. Balamurugan, A. Jalila, K. Sabari Nathan

International Journal of Computer Science and Informatics

Generally, complexity of Software affects the development and maintenance Cost. The Complexity of the software increases, when the number of Components increase, among these components, some are more critical than others which will lead to catastrophic effects on field use. Hence, it is needed to identify such critical components after coding to test them rigorously. In this paper, we presented a novel approach that helps to identify the critical components in the software based on Criticality Analysis. Criticality Analysis analyzes the critical value of each component based on their Sensitivity and Severity metrics.


Model Based Regression Testing Approach Of Serviceoriented Architecture(Soa) Based Application: A Case Study, Prachet Bhuyan, Abhishek Kumar Sep 2020

Model Based Regression Testing Approach Of Serviceoriented Architecture(Soa) Based Application: A Case Study, Prachet Bhuyan, Abhishek Kumar

International Journal of Computer Science and Informatics

Service-Oriented Architecture(SOA) is an approach for designing, deploying and managing services that represent reusable business functionality. SOA removes the gap between software and business. Reliability and fault-free implementation are major concern for SOA based applications. Traditional testing are no more beneficial for verifying and validating the quality of services in SOA systems. Regression testing is inevitable that is undertaken every time to provide confidence that modification do not introduce new bugs into previously validated code. In this paper we addressed the UML based regression testing method using UML use case diagram and UML activity diagram to generate a test ...


Generation Of Test Cases Using Activity Diagram, Ranjita Kumari Swain, Vikas Panthi, Prafulla Kumar Behera Sep 2020

Generation Of Test Cases Using Activity Diagram, Ranjita Kumari Swain, Vikas Panthi, Prafulla Kumar Behera

International Journal of Computer Science and Informatics

As Unified Modeling Language (UML) activity diagrams capture the key system behavior, the UML activity diagram is well suited for the system level testing of systems. In this paper, first an activity flow graph is derived from activity diagram. Then, all the required information is extracted from the activity flow graph (AFG). The activity flow graph (AFG) for the activity diagram is created by traversing the activity diagram from beginning to end, showing choices, conditions, concurrent executions, loop statements. From the graph different control flow sequence are identified by traversing the AFG by depth first traversal technique. Next, an algorithm ...


Mobile Devices Overview, M.Arjun Goud Sep 2020

Mobile Devices Overview, M.Arjun Goud

International Journal of Computer Science and Informatics

Now a day's mobile devices are multi-functional devices capable of hosting a broad range of applications for both business and consumer use. Personal Digital Assistants (PDA) and the ever-growing category of smart phones allow people to access the Internet for e-mail, instant messaging, text messaging and Web browsing, as well as work documents, contact lists and more. This paper presents an overview of mobile devices and also the operating systems used in the devices.


Domain Bounded English To Indian Sign Language Translation Model, Syed Faraz Ali, Gouri Sankar Mishra, Ashok Kumar Sahoo Sep 2020

Domain Bounded English To Indian Sign Language Translation Model, Syed Faraz Ali, Gouri Sankar Mishra, Ashok Kumar Sahoo

International Journal of Computer Science and Informatics

This is a proposal for the English text to Indian Sign Language translation model wherein the system will accept the input text and then translates the given words in sequence by making an avatar to display signs of each word. The translation here is corpus based. There is direct mapping between the English and ISL text. Since it is very inefficient to make signs for each word our domain is bounded by certain criteria for which the translator translates the given text. Like, the system which we propose is for railway reservation counters for enquiry.


Nlp Challenges For Machine Translation From English To Indian Languages, Mallamma V Reddy, Dr. M. Hanumanthappa Sep 2020

Nlp Challenges For Machine Translation From English To Indian Languages, Mallamma V Reddy, Dr. M. Hanumanthappa

International Journal of Computer Science and Informatics

This Natural Langauge processing is carried particularly on English-Kannada/Telugu. Kannada is a language of India. The Kannada language has a classification of Dravidian, Southern, Tamil-Kannada, and Kannada. Regions Spoken: Kannada is also spoken in Karnataka, Andhra Pradesh, Tamil Nadu, and Maharashtra. Population: The total population of people who speak Kannada is 35,346,000, as of 1997. Alternate Name: Other names for Kannada are Kanarese, Canarese, Banglori, and Madrassi. Dialects: Some dialects of Kannada are Bijapur, Jeinu Kuruba, and Aine Kuruba. There are about 20 dialects and Badaga may be one. Kannada is the state language of Karnataka. About ...


A Comparative Study Of Protein Tertiary Structure Prediction Methods, Chandrayani N.Rokde, Dr.Manali Kshirsagar Sep 2020

A Comparative Study Of Protein Tertiary Structure Prediction Methods, Chandrayani N.Rokde, Dr.Manali Kshirsagar

International Journal of Computer Science and Informatics

Protein structure prediction (PSP) from amino acid sequence is one of the high focus problems in bioinformatics today. This is due to the fact that the biological function of the protein is determined by its three dimensional structure. The understanding of protein structures is vital to determine the function of a protein and its interaction with DNA, RNA and enzyme. Thus, protein structure is a fundamental area of computational biology. Its importance is intensed by large amounts of sequence data coming from PDB (Protein Data Bank) and the fact that experimentally methods such as X-ray crystallography or Nuclear Magnetic Resonance ...


Theoretical Concepts & Applications Of Independent Component Analysis, Sonali Mishra, Nitish Bhardwaj, Dr. Rita Jain Sep 2020

Theoretical Concepts & Applications Of Independent Component Analysis, Sonali Mishra, Nitish Bhardwaj, Dr. Rita Jain

International Journal of Computer Science and Informatics

This paper deals with the study of Independent Component Analysis. Independent Component Analysis is basically a method which is used to implement the concept of Blind Source Separation. Blind Source Separation is a technique which is used to extract set of source signal from set of their mixed source signals. The various techniques which are used for implementing Blind Source Separation totally depends upon the properties and the characteristics of original sources. Also there are many fields nowadays in which Independent Component Analysis is widely used. This paper deals with the theoretical concepts of Independent Component Analysis, its principles and ...