Sunday, January 31, 2021

USING CONCEPT ALGEBRA FOR MAPPING SOFTWARE PRACTICES TO ESSENCE FRAMEWORK

 Author :  Murat Pasa Uysal

Affiliation :  Baskent University

Country :  Turkey

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 13, September, 2018

Abstract :

As a relatively new framework suggested for core problems of software development, one important issue for Essence Framework (EF) is mapping software development practices to the EF’s conceptual domain. There are several works describing systematic procedures, however, a review of literature cannot suggest a study using formal method(s). In this paper, a software practice mapping method is proposed, which adopts and employs Concept Algebra principles in a Scrum case. The results are promising, however, more empirical evidences are needed to support the solution.

Keyword :  Software Engineering Practice, Essence Framework, Concept Algebra

For More Detailshttps://airccj.org/CSCP/vol8/csit89302.pdf

Thursday, January 28, 2021

SOFTWARE ENGINEERING IN GLOBALLY DISTRIBUTED TEAMS

 Author :  Manasés Jesús Galindo Bello

Affiliation :  Department of Applied Computer Science, Hochschule Fulda

Country :  Germany

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 13, September, 2018

Abstract :

Software engineering principles are brought into practice by Information Technology companies all around the world. Software can be developed by local teams which members have different cultural backgrounds, as well as by teams distributed across countries. To save costs and be close to markets and customers, companies offshore or outsource the personnel. Although developing software in distributed teams offers multiple benefits, there are also stiff challenges that engineers and managers have to deal with, e.g. communication and collaboration may get affected because of geographic distance, different time zones and distinct cultural backgrounds among team members. If not addressed on time and effectively, these challenges generate misunderstanding and conflict among the team which eventually may impact the projects deadlines and quality of the software. This paper presents the most common software engineering practices, challenges and tools in global teams, as well as practical cases in the industrial and academic realms.

Keyword :  Collaboration, Management, Culture, Conflict, Challenges

For More Details https://airccj.org/CSCP/vol8/csit89301.pdf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR

Author :  Karima Hadj-Rabah

Affiliation :  University of Sciences and Technology Houari Boumediene (USTHB)

Country :  Algeria

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.

Keyword :  Radar Interferometry (InSAR & DInSAR), Surface Deformation Gradient (SDG), Coherence, Resolution, Filtering

For More Detailshttps://airccj.org/CSCP/vol8/csit88810.pdf

Sunday, January 24, 2021

4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION

Author :  Adil AbdUlhur AboShana

Affiliation :  University of eötvös loránd

Country :  Hungary

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the method.

Keyword :  Lip Segmentation, Discrete cosine transform algorithm, kernel Discriminant Analysis , Discrete Hartley Transform, hidden Markov Model.

For More Detailshttps://airccj.org/CSCP/vol8/csit88809.pdf

Friday, January 22, 2021

MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJECTS

 Author :  Mohammad Alshayeb

Affiliation :  King Fahd University of Petroleum and Minerals Dhahran 31261

Country :  Saudi Arabia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality.

Keyword :  Agile Process, Waterfall Process, Capstone Project, Software Engineering

For More Details :  https://airccj.org/CSCP/vol8/csit88808.pdf

Thursday, January 21, 2021

PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES

Author :  Mohammad Alshayeb

Affiliation :  King Fahd University of Petroleum

Country :  Saudi Arabia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.

Keyword :  Student engagement, social media, instructional technology

For More Detailshttps://airccj.org/CSCP/vol8/csit88807.pdf

Wednesday, January 20, 2021

A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC

Author :  Eman Mohamed Nabil Alkholy

Affiliation :  Helwan University, Cairo

Country :  Egypt

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.

Keyword :  Question-answering, Neutral language processing, Fuzzy Logic, Answer Extraction, Evaluation Metrics

For More Detailshttps://airccj.org/CSCP/vol8/csit88806.pdf

Tuesday, January 19, 2021

DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS

Author :  Akella Amarendra Babu

Affiliation :  St. Martin’s Engineering College, Dhulapally, Secunderabad

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.

Keyword :  Natural Language processing, word distance measurements, pronunciation dictionaries.

For More Details https://airccj.org/CSCP/vol8/csit88805.pdf

Monday, January 18, 2021

INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS

 Author :  Alla Defallah Alrehily

Affiliation :  King Abdulaziz University

Country :  Saudi Arabia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.

Keyword :  Subjective Assessments, E-Examination, WordNet, semantic similarity

For More Details https://airccj.org/CSCP/vol8/csit88804.pdf

Sunday, January 17, 2021

TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC

Author :  Amira GHERBOUDJ

Affiliation :  AbdelhamidMehri University Constantine 2

Country :  Algeria

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.

Keyword :  Optimization, metaheuristic, swarm intelligence, binary problems, African Buffalo Optimization, knapsack problems

For More Detailshttps://airccj.org/CSCP/vol8/csit88803.pdf

Friday, January 15, 2021

DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN

Author :  Enoch Agyepong

Affiliation :  Cyber Operations Team, Airbus, Corsham

Country :  UK

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa on million list of domain names, only 15% of the domain names were treated as non-human generated.

Keyword :  Domain Generated Algorithm, malicious domain names, Domain Name Frequency Analysis & malicious DNS

For More Detailshttps://airccj.org/CSCP/vol8/csit88802.pdf

Monday, January 11, 2021

GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING CONTENT USING BLOCKCHAIN

 Author :  Ahmed Gomaa

Affiliation :  University of Scranton, Scranton

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.

Keyword :  Blockchain, Cryptocurrency, Digital Rights Management, Public Key, Private Key

For More Detailshttps://airccj.org/CSCP/vol8/csit88801.pdf

Sunday, January 10, 2021

IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM

 Author :  Suryakanthi Tangirala

Affiliation :  University of Botswana, Gaborone

Country :  Botswana

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 6, April, 2018

Abstract 

This paper discusses the importance of verb suffix mapping in Discourse translation system. In discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora resolution, cohesion links like pronouns are identified between portions of text. These binders make the text cohesive by referring to nouns appearing in the previous sentences or nouns appearing in sentences after them. In Machine Translation systems, to convert the source language sentences into meaningful target language sentences the verb suffixes should be changed as per the cohesion links identified. This step of translation process is emphasized in the present paper. Specifically, the discussion is on how the verbs change according to the subjects and anaphors. To explain the concept, English is used as the source language (SL) and an Indian language Telugu is used as Target language (TL).

Keyword :  MT: Machine Translation, SL-Source language, TL: target Language, POS-Parts of Speech, GNP-Gender Number Person.

For More Details https://airccj.org/CSCP/vol8/csit88612.pdf

Wednesday, January 6, 2021

EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-TYPE EQUATIONS

Author :  MOHAMMED O. AL-AMR

Affiliation :  University of Mosul

Country :  Iraq

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 6, April, 2018

Abstract :

In this paper, based on the definition of conformable fractional derivative, the functional variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional space-time fractional KdV-type equations in mathematical physics, namely the (3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)- dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony (GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave solutions, have many potential applications in mathematical physics and engineering. The simplicity and reliability of the proposed method is verified

Keyword :  Functional Variable Method, Fractional Partial Differential Equations, Exact Solutions, Conformable Fractional Derivative

For More Detailshttps://airccj.org/CSCP/vol8/csit88611.pdf

AUTOMATED PENETRATION TESTING: AN OVERVIEW

 Author :  Farah Abu-Dabaseh

Affiliation :  Princess Sumaya University for Technology

Country :  Jordan

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 6, April, 2018

Abstract :

The using of information technology resources is rapidly increasing in organizations, businesses, and even governments, that led to arise various attacks, and vulnerabilities in the field. All resources make it a must to do frequently a penetration test (PT) for the environment and see what can the attacker gain and what is the current environment's vulnerabilities. This paper reviews some of the automated penetration testing techniques and presents its enhancement over the traditional manual approaches. To the best of our knowledge, it is the first research that takes into consideration the concept of penetration testing and the standards in the area.This research tackles the comparison between the manual and automated penetration testing, the main tools used in penetration testing. Additionally, compares between some methodologies used to build an automated penetration testing platform.

Keyword :  Penetration test, Automation, Exploitation, Ethical hacker, Penetration testing standards.

For More Detailshttps://airccj.org/CSCP/vol8/csit88610.pdf

Monday, January 4, 2021

CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK

 Author :  Rishi Yadav

Affiliation :  Computer Science & Engineering, IIT BHU (Varanasi)

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 6, April, 2018

Abstract :

Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing attention of neuroscientists and computer scientists, since it opens a new window to explore functional network of human brain with relatively high resolution. BOLD technique provides almost accurate state of brain. Past researches prove that neuro diseases damage the brain network interaction, protein- protein interaction and gene-gene interaction. A number of neurological research paper also analyse the relationship among damaged part. By computational method especially machine learning technique we can show such classifications. In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal patient’s dataset. After proper processing the fMRI data we use the processed data to form classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve Bayes. We also compare the accuracy of our proposed method with existing methods. In future, we will other combinations of methods for better accuracy.

Keyword :  Brain Network, Dementia, Alzheimer’s disease, SVM, KNN, Fmri

For More Detailshttps://airccj.org/CSCP/vol8/csit88609.pdf

Sunday, January 3, 2021

VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT ANALYSIS AND STRUCTURAL EQUATION MODEL

 Author :  Imen Mguiris

Affiliation :  FST-University of Tunis ElManar

Country :  Tunisia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 6, April, 2018

Abstract :

In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several algorithms have been introduced to extract these rules. However, these algorithms suffer from the problems of utility, redundancy and large number of extracted fuzzy association rules. The expert will then be confronted with this huge amount of fuzzy association rules. The task of validation becomes fastidious. In order to solve these problems, we propose a new validation method. Our method is based on three steps. (i) We extract a generic base of non redundant fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis. (ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules using structural equation model.

Keyword :  Fuzzy Association Rules Validation, Fuzzy Formal Concept Analysis, Structural equation model

For More Details https://airccj.org/CSCP/vol8/csit88608.pdf

Friday, January 1, 2021

PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA

 Author :  Shaukat Ali Shahee

Affiliation :  Indian Institute of Technology Bombay, Mumbai, India

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 6, April, 2018

Abstract :

In many applications of data mining, class imbalance is noticed when examples in one class are overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the class imbalance. Further, the presence of within class imbalance where classes are composed of multiple sub-concepts with different number of examples also affect the performance of classifier. In this paper, we propose an oversampling technique that handles between class and within class imbalance simultaneously and also takes into consideration the generalization ability in data space. The proposed method is based on two steps- performing Model Based Clustering with respect to classes to identify the sub-concepts; and then computing the separating hyperplane based on equal posterior probability between the classes. The proposed method is tested on 10 publicly available data sets and the result shows that the proposed method is statistically superior to other existing oversampling methods.

Keyword :  Supervised learning, Class Imbalance, Oversampling, Posterior Distribution

For More Detailshttps://airccj.org/CSCP/vol8/csit88607.pdf