International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 7, No. 1, Dec. 2014

Cover page and Table of Contents: PDF (size: 195KB)

Table Of Contents

REGULAR PAPERS

TSSR: A Proposed Tool for Secure Software Requirement Management

By Mohammad Ubaidullah Bokhari Shams Tabrez Siddiqui

DOI: https://doi.org/10.5815/ijitcs.2015.01.01, Pub. Date: 8 Dec. 2014

This paper provides a unified framework in which entire design of the project can be captured right from the beginning of the software development. This paper discusses about the requirements which should be included in the development of the requirement management tools. As the requirements, criteria which have been discussed, we introduce a requirement management tool known as TSSR (Tool for Secure Software Requirement). This tool manages risk analysis, system requirements, security of the system and project, users/group restriction, encrypted database, traceability and extension of the tool to interact with external requirement management tools. The aim of this paper is to describe the TSSR framework and its four components: Planner, Modeller, Prover and Documenter which will be helpful in interacting and managing requirements with arbitrary number of external tools for secure software development.

[...] Read more.
Video Quality Analysis of Distributed Video Coding in Wireless Multimedia Sensor Networks

By Mortaza Nikzad Ali Bohlooli Kamal Jamshidi

DOI: https://doi.org/10.5815/ijitcs.2015.01.02, Pub. Date: 8 Dec. 2014

Multimedia communications in wireless sensor networks is a very challenging task. Video coding with high computational complexity and great contribution to the energy consumption of nodes and video transmission over erroneous wireless channel are the main reasons of these challenges. Distributed Video Coding has high potential for being deployed in these networks due to its unique features like as independent frame coding and low complexity encoding operations. The purpose of this study is to understand and evaluate the distributed video coding performance facing the transmission characteristics in wireless multimedia sensor networks. To this end, the comparative analysis of the coding in respect of main factors of video transmission (i.e., bit rate and error resiliency) in the Wireless Multimedia Sensor Networks (WMSN) has been done. We have used both the objective and subjective criteria for checking the video quality and applied the Gilbert-Elliot channel model for capturing the bit-level error in WMSN. Therefore, unlike previous works, our results are more realistic. In addition, based on this model we have investigated the impact of protection of frames by Reed-Solomon error control scheme. The results show that paying attention to coding parameters and protecting key frames, have a great impact on increasing the quality of the receiving video and will reduce the energy consumption and delays due to low number of requests from the feedback channel.

[...] Read more.
Mobile Computing Trends in Saudi Arabia: An Exploratory Study

By Mutlaq B. Alotaibi

DOI: https://doi.org/10.5815/ijitcs.2015.01.03, Pub. Date: 8 Dec. 2014

The main purpose of this research was to gain an understanding of the adoption behavior of mobile computing in Saudi Arabia. In particular, it aimed to acquire new insight into mobile computing trends, specifically in Saudi Arabia, in order to develop hypotheses and formulate precise criteria for mobile computing evaluation. In order to achieve these aims, the researcher created a focus group by recruiting eight participants with solid background knowledge of usability engineering and mobile computing. The focus group proposed a four-phase process: determination, qualification, categorization and evaluation of the mobile computing applications developed by Saudi organizations. During the determination phase, two hundred and twenty seven (n=227) mobile applications were determined as having been developed by organizations in Saudi Arabia. During the qualification phase, one hundred and forty two (n=142) mobile applications were qualified. Within the categorization phase, the experts categorized only the qualified applications into a two-level categorization hierarchy. Finally, in the evaluation phase, the qualified applications were evaluated in terms of purpose, platform, visual appearance, content, organization and usability. The results herein revealed that 43% of the mobile applications in Saudi Arabia were M-Government applications, while 57% were M-Business applications. In addition, the study proposed a sample of thirty six (n=36) applications as having statistical significance from all of the mobile applications in Saudi Arabia.

[...] Read more.
A Mobile-Based Fuzzy System for Diagnosing Syphilis (Sexually Transmitted Disease)

By Alaba T. Owoseni Isaac O. Ogundahunsi Seun Ayeni

DOI: https://doi.org/10.5815/ijitcs.2015.01.04, Pub. Date: 8 Dec. 2014

The high rate at which Africans die of syphilis yearly has been majorly attributed to the uneven ratio of the patients to competent medical practitioners who provide Medicare. This mortality rate has always drawn the attention of researchers and different approaches had been used to bring the rate down. This paper provides a software solution that personifies the expert-like way of providing diagnostic service to patients who suffer this disease. It is capable of making approximate diagnosis based on uncertainties. The system has been structured into five components: user interface, fuzzification, knowledge base, inference engine and defuzzification. The user interface uses a graphic user interface based method of human-computer interaction while the fuzzification component has transformed crisp quantities into fuzzy quantities using both interval-valued and S-curve membership functions. The reasoning has been achieved using root sum square (RSS) method and transformation of fuzzy values to scalar ones was through weighted average method. This system was tested and found effective.

[...] Read more.
SANB-SEB Clustering: A Hybrid Ontology Based Image and Webpage Retrieval for Knowledge Extraction

By Anna Saro Vijendran Deepa .C

DOI: https://doi.org/10.5815/ijitcs.2015.01.05, Pub. Date: 8 Dec. 2014

Data mining is a hype-word and its major goal is to extract the information from the dataset and convert it into readable format. Web mining is one of the applications of data mining which helps to extract the web page. Personalized image was retrieved in existing systems by using tag-annotation-demand ranking for image retrieval (TAD) where image uploading, query searching, and page refreshing steps were taken place. In the proposed work, both the image and web page are retrieved by several techniques. Two major steps are followed in this work, where the primary step is server database upload. Herein, database for both image and content are stored using block acquiring page segmentation (BAPS). The subsequent step is to extract the image and content from the respective server database. The subsequent database is further applied into semantic annotation based clustering (SANB) (for image) and semantic based clustering (SEB) (for content). The experimental results show that the proposed approach accurately retrieves both the images and relevant pages.

[...] Read more.
A New OWL2 Based Approach for Relational Database Description

By Naima S. Ougouti Hafida Belbachir Youssef Amghar

DOI: https://doi.org/10.5815/ijitcs.2015.01.06, Pub. Date: 8 Dec. 2014

Nowadays, the scientific community is more and more interested by the mediation problem within Peer-to-Peer (P2P) systems and by data sources migration within the semantic web. Data integration and interoperability become a necessity to meet the need for information exchange between heterogeneous information systems. They reflects the ability of an information system to collaborate with other systems sometimes of a very different nature and aims at developing architectures and tools for sharing, exchanging and controlling data. In this context we have proposed a new heterogeneous and distributed data management system in a P2P environment called MedPeer. Among this system functions, we have focused in this article on relational databases description through the use of ontologies. We thus propose Relational.OWL2E, a new approach that, starting from the relational schema, generates an ontology based on the OWL2 language. Our main contribution lies in the semantics we have added to relational databases concepts in representing attributes by rich XML schema datatypes, primary keys, unique keys, foreign keys and by associating to each class a set of synonyms in order to guide the process of discovering semantic correspondences.

[...] Read more.
An Empirical Study on Testing of SOA based Services

By Abhishek Kumar Manindra Singh

DOI: https://doi.org/10.5815/ijitcs.2015.01.07, Pub. Date: 8 Dec. 2014

Service-Oriented Architecture (SOA) removed the gap between software and business. Today, there is a business transformation among enterprises and they adopt a service based information technology (IT) model. So, testing is necessary for SOA based applications. This paper investigates different type of approaches and techniques that address the testing problems of SOA based services. Here we also investigate the differences between SOA and web services and traditional testing and SOA testing. Various testing levels are also discussed in detail. This paper also expresses various testing perspectives, challenges of SOA testing and review the many testing approaches and identify the problems that improve the testability of SOA based services.

[...] Read more.
Evaluating the Maintainability of a Software System by using Fuzzy Logic Approach

By Ritika Vern Sanjay Kumar Dubey

DOI: https://doi.org/10.5815/ijitcs.2015.01.08, Pub. Date: 8 Dec. 2014

Maintainability is an important quality attribute for almost every quality model. Maintainability of the software is considered as most expensive phase in software development life cycle as it consumes almost major part of the total effort allocated to the software system. Maintainability evaluation is complex due to its imprecise output. This paper proposes a maintainability model by considering its fuzzy aspects. Since fuzzy modeling deals with uncertainty and impreciseness so this paper uses fuzzy methodology and AHP technique to evaluate the maintainability of the model. Object oriented system has taken as case study for maintainability evaluation purpose.

[...] Read more.
A Proposed Process Model for Requirements Engineering using Delphi Techniques for Prioritisation

By Ishaya P. Gambo Abimbola H. Soriyan Rhoda N. Ikono

DOI: https://doi.org/10.5815/ijitcs.2015.01.09, Pub. Date: 8 Dec. 2014

Requirements engineering (RE) addresses the first software development step and lays the foundation for a successful system. Consequently, ability to identify problems and suggestions for improvements in the RE process opens up significant potential for increasing the success of software projects. Since RE process is naturally collaborative in nature, the intensiveness from both knowledge and human perspectives opens up the problem of decision making on requirements that can be facilitated by requirements prioritisation. In this regard, the paper opined the need for requirements prioritization techniques that will help the developers to obtain consensus among stakeholders using a suitable technique. In particular, the paper proposed a RE process model using Delphi technique. The Delphi technique was suggested in this paper to facilitate and enhance the process of requirements prioritisation in a multilevel prioritisation dimension. Therefore, the proposed model on implementation will contribute to the formulation of an interactive framework for requirements prioritisation to produce a requirement ordering which complies with the existing priorities.

[...] Read more.
A Mono Master Shrug Matching Algorithm for Examination Surveillance

By Sandhya Devi G Prasad Reddy P V G D Suvarna Kumar G Vijay Chaitanya B

DOI: https://doi.org/10.5815/ijitcs.2015.01.10, Pub. Date: 8 Dec. 2014

This paper proposes an unusual slant for Shrug recognition from Gesticulation Penetrated Images (GPI) based on template matching. Shrugs can be characterized with image templates which are used to compare and match shrugs. The proposed technique makes use of a single template to identify match in the candidates and hence entitled as mono master shrug matching. It does not necessitate erstwhile acquaintance of movements, motion estimation or tracking. The proposed technique brands a unique slant to isolate various shrugs from a given video. Additionally, this method is based on the reckoning of feature invariance to photometric and geometric variations from a given video for the rendering of the shrugs in a lexicon. This descriptor extraction method includes the standard deviation of the gesticulation penetrated images of a shrug. The comparison is based on individual and rational actions with exact definitions varying widely uses histogram based tracker which computes the deviation of the candidate shrugs from the template shrug. Far-reaching investigation is done on a very intricate and diversified dataset to establish the efficacy of retaining the anticipated method.

[...] Read more.