Version-8 (May-June 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8 Ver-9
- Citation
- Abstract
- Reference
Keywords: GQM. Software Metrics, Requirement Factor values, Software requirements.
[1] Gibbs, W W., Software Chronics Crises, Scientific American, 1994.
[2] Basili, V., Caldiera, G., Rombach, H.D.: The Goal Question Metric Approach, Encyclopedia of Software Engineering, John Wiley & Sons, New York,1994, ISBN 0-471-54004-8
[3] Basili, V.R., Rombach, H.D.: The TAME Project: Towards Improvement-Oriented Software Environments, IEEE Transactions on Software Engineering, vol. 14, no. 6, June 1988.
[4] Dominik Richter, Michael Hohenstein, Stefan Templin and Gero Zimmer, "GQM Best Practice, Technical report"
[5] Peter Hantos, Xerox Corporation ," Strengths and Weaknesses of the GQM Approach in Developing Software Size Metrics", 13th International Forum On COCOMO And Software Cost Modeling.
[6] Aziz Deraman, Jamaiah H. Yahaya, Zaiha Nadiah Zainal Abidin and Noorazean Mohd Ali (2014), "Software Ageing Measurement Framework Based on GQM Structure", Journal of Software and Systems
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Test Exude: Approach for Test Case Reduction |
Country | : | India |
Authors | : | Vaibhav Chaurasia, Thirunavukkarasu K. |
: | 10.9790/0661-16381623 |
Keywords: Delegate Set, SDLC, Test Case, Test Case Reduction, TestExude, Test Suite
[1] Antonia Bertolino, Software Testing Research: Achievements, Challenges, Dreams Future of Software Engineering, IEEE, 2007, 0-7695-2829-5/07.
[2] Juha Itkonen, Nika V. Mantyla and Casper Lassenius, The Role of the Tester's Knowledge in Exploratory Software Testing, IEEE Computer Society, vol. 39, no. 5, 2013, 707-724.
[3] (2014) The Wikipedia website. [Online]. Available: http://en.wikipedia.org/wiki/Test_case.
[4] (2014) The Wikipedia website. [Online]. Available: http://en.wikipedia.org/wiki/Test_suite.
[5] (2014) The Wikipedia website. [Online]. Available:http://en.wikipedia.org/wiki/Knowledge.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A New Travel Time Prediction Method for Intelligent Transportation System |
Country | : | Bangladesh |
Authors | : | Lutfun Nahar, Zinnia Sultana |
: | 10.9790/0661-16382430 |
Keywords: ATIS (Advanced Travellers Information Systems), Chain Average (CA), Intelligent Transportation System (ITS), K-means Clustering, Naïve Bayesian (NBC), Successive Moving Average (SMA)
[1] M. Chen and S. Chien. "Dynamic freeway travel time prediction using probe vehicle data:Link-based vs. Path-based". J. of Transportation Research Record, TRB Paper No. 01-2887, Washington, D.C. 2001
[2] C. H. Wei and Y. Lee. "Development of Freeway Travel Time Forecasting Models by Integrating Different Sources of Traffic Data". IEEE Transactions on Vehicular Technology.Vol. 56, 2007
[3] W. Chun-Hsin, W. Chia-Chen, S. Da-Chun, C, Ming-Hua and H. Jan-Ming. "Travel Time Prediction with Support Vector Regression". IEEE Intelligent Transportation Systems Conference, 2003
[4] J. Kwon and K. Petty. "A travel time prediction algorithm scalable to freeway networks with many nodes with arbitrary travel routes". Transportation Research Board 84th Annual Meeting, Washington, D.C. 2005
[5] D. Park and L. Rilett. "Forecasting multiple-period freeway link travel times using modular neural networks". J. of Transportation Research Record, vol. 1617, pp.163-170. 1998
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Elliptic curve, RSA key generation, Elliptic curve cryptography, Diffie-Hellman key exchange, Authentication, Encryption, Decryption.
[1] Bai Qing-hai, Zhang Wen-bo, Jiang Peng, Lu Xu1, "Research on Design Principles of Elliptic Curve Public Key Cryptography and Its Implementation" IEEE 2012
[2] Sonali Nimbhorkar, Dr.L.G.Malik, "Prospective Utilization of Elliptic Curve Cryptography for Security Enhancement", International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 1, January 2013.
[3] Whitfield Diffie and Martin E. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory 22(1976), no.6, 644-654.
[4] Miller V. "Use of Elliptic Curves in Cryptography". In Cryptology Springer-Verlag, 1986, 417-426.
[5] Koblitz N. "Elliptic Curve Cryptosystems". Mathematics of computation, 1987, 48(177):203-209.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Manet, Aodv, Dsdv, Dsr, Lar
[1]. Basu Dev Shivahare, Charu Wahi, Shalini Shivhare, ―Comparison Of Proactive And Reactive Routing Protocols In Mobile AdHoc Network Using Routing Protocol Property,‖ IJETAE, Volume 2, Issue 3, pp. 356-359, March 2012.
[2]. C. E. Perkins and P. Bhagwat, ―Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,‖ SIGCOMM, Oct. 1994, pp. 234–44.
[3]. Davesh Singh Som, Dhananjaya Singh, ―Performance Analysis and Simulation of AODV,DSR and TORA Routing Protocols in MANETs,‖ IJRTE, Volume-1, Issue-3, August 2012, pp 122-127.
[4]. David Oliver Jörg, ―Performance Comparison Of MANET Routing Protocols In Different Network Sizes,‖ 2003.
[5]. Basu Dev Shivahare, Charu Wahi, Shalini Shivhare, ―Comparison Of Proactive And Reactive Routing Protocols In Mobile AdHoc Network Using Routing Protocol Property,‖ IJETAE, Volume 2, Issue 3, pp. 356-359, March 2012.
[6]. C. E. Perkins and P. Bhagwat, ―Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,‖ SIGCOMM, Oct. 1994, pp. 234–44.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: malware, anti-virus, matlab
[1]. Mitchell T M, Machine learning,Singapore,Mc Graw Hill,1997
[2]. Distler,Malware analysis:An introduction,SANS institute,2007
[3]. Michael Hael Ligh, Steven Adair, Blake Harstein & Matthew Richard, Malware analyst's cookbook & DVD:Tools and techniques for fighting malicious code(Wiley Publishing Inc.,Indianapolis,Indiana,2011) 90-92
[4]. Michael Hael Ligh, Steven Adair, Blake Harstein & Matthew Richard, Malware analyst's cookbook & DVD:Tools and techniques for fighting malicious code(Wiley Publishing Inc.,Indianapolis,Indiana,2011) 288-290
[5]. Egele M,Scholte T,Kirda E,Kruegel C,A survey on automated dynamic malware analysis techniques and tools,ACM computing,Vol 44(2),Article6.2012,42
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Modulo Search Trees (Plain and Z-Overlapped) |
Country | : | India |
Authors | : | Prasad V Chaugule |
: | 10.9790/0661-16384751 |
Keywords: Modulo search tree, Overlapping constant, Z-Overlapped Modulo search tree
[1]. Kenneth H Rosen, Discrete Mathematics and its Application with Combinatorics and Graph Theory (India, Tata McGraw-Hill Publishing Company Limited New Delhi, 2007).
[2]. C. L. Liu, Elements of Discrete Mathematics (McGraw Hill International Edition, 1985).
[3]. Seymour Lipschutz, G A Vijaylakshmi Pai, Data Structures (India, Tata McGraw-Hill Education Private Limited New Delhi, 2006)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Ranking Algorithm of Web Documents using Ontology |
Country | : | India |
Authors | : | Gurdeep Kaur, Poonam Nandal |
: | 10.9790/0661-16385255 |
Keywords: Semantic Web, ranking algorithm, ontology, relevant data.
[1] A.Kemafor, A. Maduko, and A. Sheth. "SemRank: Ranking Complex Relationships Search Results on the Semantic Web." Proceeding WWW '05 Proceedings of the 14th International Conference on World Wide Web. 117-27, 2005.
[2] A. Pisharody and H.E. Michel, "Search Engine Technique Using Keyword Relations," Proc. Int'l Conf. Artificial Intelligence (ICAI '05), pp. 300-306, 2005.
[3] B. Aleman-Meza, C. Halaschek, "A Context-Aware Semantic Association Ranking," Proc. First Int'l Workshop Semantic Web and Databases (SWDB '03), pp. 33-50, 2003.
[4] C. Junghoo, H. Garcia-Molina, and L. Page, "Efficient Crawling through URL Ordering," Computer Networks and ISDN Systems, vol. 30, no. 1, pp. 161-172, 1998.
[5] Cohen, S., J. Mamou, "A Semantic Search Engine." Proc. of Proc. 29th Int'l Conf. Very Large Data Bases. 45-56, 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A basic issue in aligning DNA and protein sequences is to find similar characters between two or more sequences in order to detect relations between newly defined sequences and well-known sequences stored in genetic databanks. Local Sequences Alignment (LSA) algorithmshave been developedto reveal similar regions between compared sequences. LSA algorithms produced optimal alignment using similarity matrix with scoring scheme. Match, mismatch, and gap penalties are identified using substation matrix and affine gap function. The accuracy of the results relies on selecting the best values for these parameters. This paper mainly set out to validate statically parameters for calculating possible alignments.Estimated values are tested using real dataset and the optimal alignment was recorded as well as the parameters. Perfect symmetric results were obtained, when comparing mathematically and statically estimation for the LSA parameters.
Keywords: Local Sequences Alignment, DNA, Protein, Substation Matrix, Scoring Scheme.
[1] S. B. Needleman and C. D. Wunsch, "A general method applicable to the search for similarities in the amino acid sequence of two proteins," Journal of molecular biology, vol. 48, pp. 443-453, 1970.
[2] T. Smith and M. Waterman, "Identification of common molecular subsequences," J. Mol. Bwl, vol. 147, pp. 195-197, 1981.
[3] D. Díaz, F. J. Esteban, P. Hernández, J. A. Caballero, G. Dorado, and S. Gálvez, "Parallelizing and optimizing a bioinformatics pairwise sequence alignment algorithm for many-core architecture," Parallel Computing, vol. 37, pp. 244-259, 2011.
[4] Y. Zhang, S. Misra, D. Honbo, A. Agrawal, W. Liao, and A. Choudhary, "Efficient pairwise statistical significance estimation for local sequence alignment using GPU," in Computational Advances in Bio and Medical Sciences (ICCABS), 2011 IEEE 1st International Conference on, 2011, pp. 226-231.
[5] S. Brenner, "Optimal Pairwise Alignment," in Introduction to computational biology: an evolutionary approach, B. Haubold and T. Wiehe, Eds., ed: Springer, 2006, pp. 11-42.