Volume 3 Issue 3- March 2013
S.No | Title | Page |
---|---|---|
1. | Integrated Framework of Software Engineering
and Common Criteria Practices Khairunnisa Osman Abstract
Software developers are usually familiar with software engineering deliverables but face difficulties in providing the deliverables that must be in line with the Common Criteria requirement. The software engineering deliverables lack the security requirements to be the evidences in the Common Criteria evaluation and certification. Therefore, the main aim is to develop a framework between Common Criteria and software engineering deliverables. This project objective are to investigate the practices of software engineering and Common Criteria, consolidate the deliverables between software engineering and Common Criteria and solicit an evaluation of the integrated framework design by the developers of the software, evaluators and certifiers of Common Criteria. The investigation on the software engineering practices using the technique of Systematic Literature Review has been conducted and it was found that the ISO/IEC 12207:2008 as the latest standard practices among software developers in developing software. The consolidation used Causal, Semantic and Concept mapping between the process of Software Engineering and Common Criteria to see the similarities between both processes and deliverables before being integrated into the framework. The development of the framework was conducted after the similarities between the processes and deliverables of Software Engineering and Common Criteria are found. The evaluation used a questionnaire that was distributed among experts in Common Criteria and Software Engineering and it found that the framework gives a perceived ease of adoption and less apprehensiveness to the experts especially, in assisting the evaluation and certification of software products using the Common Criteria. Keywords— Put your keywords here, keywords are separated by comma. |
64-70 Full Text PDF |
2. | Small World Phenomena Jie Cheng, Mehdi R. Zargham, Shuguo Rang Abstract
This paper offers an overview study of small world problem. We emphasize on introducing the basic concepts, and the empirical analysis and results of related literatures. We surveyed from Milgram’s original experiments on small world problem to the current empirical study conducted by Leskovec on the large data sets on Microsoft messenger to uncover the structure and model of small world network. Keywords— small world, six degree separation, random graph, power-law distribution. |
71-75 Full Text PDF |
3. | GUI Regression Test Selection Based on Event
Interaction Graph Strategy Bouchaib Falah,Rahima Nouasse,Yassine Laghlid Abstract
Testing is an efficient mean for assuring the quality of software. Nowadays, Graphical User Interfaces (GUIs) make up a big part of applications being developed. Within the scope of regression testing, some test cases from the original GUI are usable and others are unusable. This paper presents an algorithm that drops the unusable test cases and creates new test cases based on the main differences between the two GUIs, which are represented as uncovered edges. Furthermore, the algorithm creates a new test suite for the modified version by combining the usable test cases and the new created test cases. |
76-79 Full Text PDF |
4. | Computer Simulation of Interactions between
Copper and Aluminum Nano-films Zhiyong Ling, Long Qian, Guanggui Cheng, Zhongqiang Zhang, Dongjian Sun Abstract
Nowadays it has become feasible to simulate the dynamics of molecular systems on a computer. The aim of computer simulations of molecular systems is to compute macroscopicbehavior from microscopicinteractions. Interactions between closely spaced copper and aluminum nano-films have been carried out by using Lennard-Jones (L-J) potential with Molecular dynamics simulations. The interfacial distance between copper and aluminum nano-films is narrowing from 15 Å to 4Å. The interaction strength firstly keeps almost unchanged in the range of 7 Å to 15 Å. When the distance is less than 7 Å the interaction strength decreases quickly. It is found that the critical distance is around 7 Å. Moreover, the interaction strength increases with the increasing temperature in the range of 4 Å to 7 Å. The interaction also varies with different surface morphologies, the interaction energy of rectangle surface is much more greater than triangle surface at the same spacing. However, it is little affected by the approaching velocity of the two films in the range of 6 Å to 15 Å. When the distance is less than 6 Å, interaction energy decreases sharply. The larger the velocity, the larger the interaction energy. At last, we found that electric field does not affect the interaction energy. |
80-83 Full Text PDF |
5. | Roadmap to Testing the Cloud
Techniques, Methodology, and Tools Bouchaib Falah, Abir-Ezzahra El Ayadi, Othmane Atif Abstract
Cloud computing has recently received a significant attention and started attracting companies, general users, and developers. With the increase of the popularity of this paradigm, the importance of testing the cloud started to emerge. Many authors came up with paper about testing technologies applied to the cloud, however; there is no clear methodology to follow in order to complete a cloud test. This paper presents an overview of cloud computing, cloud testing techniques and tools. It presents a roadmap to testing the cloud. This consists of a five-step process to test cloud services in a logical and effective way. This work has for a goal to provide new testers on the cloud with the necessary information to start their test. Keywords – Cloud computing; testing; testing the cloud, cloud testing; cloud testing tools; functional testing; non-functional testing |
84-89 Full Text PDF |
6. | Visualization of Behavioral Model using WEKA Rajesh Soni Abstract
The pictorial presentation is very useful for understanding the dataset. The visualization of India dataset of adult dataset have been done using freeware tool WEKA. Different attributes are presented graphically to understand their characteristics. |
90-93 Full Text PDF |
7. | A Study on Routing Protocols in Wireless Sensor
Networks Dr Kuppala Kondaiah, Dr. R.Bulli Babu ,Syed Umar Abstract
Wireless sensor networks are catching up as the primary mode for monitoring and collecting data in physically challenging environments. They find applications in various fields varying from environment monitoring, military applications to monitoring patients in hospitals. The low cost, ad hoc deployment, distributed sensing, and adaptability of wireless sensors have given them a big advantage over other methods. The constraints due to their inherent features make routing in wireless sensor networks a big challenge. This paper covers a number of routing protocols being used in the current systems. The stress is on energy aware routing where the network optimizes between efficient routing and maximizing life of the network. |
94-98 Full Text PDF |
8. | TPM: A More Trustworthy Solution to Computer
Security Angela Francis, Renu Mary Daniel, Vinodh Ewards S. E. Abstract
Ensuring the trustworthiness in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analysing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. In this paper, we discuss the approaches used earlier for establishing trust and their limitations, and focus on the need for hardware-based root of trust as software-only solutions are inadequate to ensure complete trust. |
99-103 Full Text PDF |
9. | Diagnosis of Failures in Zigbee Based Wireless
Sensor Networks Mumtaz M.Ali AL-Mukhtar, Teeb Hussein Hadi Abstract
In this work, based on the characteristics of ZigBee protocol, ZigBee technology is used to model and simulate a wireless sensor network. Nodes failures and their effect on the traffic are considered in different scenarios for cluster-tree topology to certify the reliability of this communication network. The parameters: throughput, delay, data traffic sent, and data traffic received are measured during these scenarios. These scenarios are performed taking into account the specific features and recommendations of the IEEE 802.15.4/ZigBee standard using OPNET Modeler 14.5. Simulation results quantify the impact of a ZigBee device failure on the performance factors. Keywords: Wireless Sensor Network (WSN), WSN Failure, Cluster-Tree Topology, IEEE 802.15.4. ZigBee |
104-108 Full Text PDF |
10. | Energy Efficient Fault Tolerant Scheme for
Wireless Sensor Networks (EEFSWSN) Saurabh Mondal, Debajyoty Banik Abstract
Sensor Network has been identified as the most important technology for the next century. Despite of its potential application, wireless sensor network encounters resource restrictions such as low computational power, reduced bandwidth and specially limited power resource. In wireless sensor networks, fault-tolerant and energy efficiency are two important topics. Some link failures may happen during data transmission. In this Paper, we address fault tolerance in wireless sensor networks in power efficiency perspective. In order to make the presentation self-contained, we start by providing a short summary of sensor networks and classical fault tolerance techniques. Then we have discussed about the faults in different layers, have studied failures, errors. Therefore, failures have been classified. Some fault detection and recovery techniques are discussed. Thus we have proposed some methods to make our WSN fault tolerant. Among the different techniques we have chosen a graph based technique to deal with the fault tolerance in WSN. Our simulation result depicts that our proposed scheme is better than the existing algorithms. Keywords— Fault tolerance, fitness function, multiple fit neighbors. |
109-115 Full Text PDF |
11. | Malicious Hardware Suraj Sawant, Yogesh Vadam, Avadhut Bambarkar, Harsha Redkar Abstract
Virus attacking has been evolute since 1983, but all viruses were operates as software. Some of them been caught by antivirus, here we are introducing virus through hardware, hence antivirus won't be able to detect virus in hardware. Advanced attacking system, finding ghost drivers in any operating system, crashing down the system will be new applications in this project. In this we are implementing new hardware which contains microcontroller to send commands to operating system and virtual bridge will be responsible for connecting hardware and operating system. This technology of hardware virus is totally new and simultaneously we've found protection system too which will prevent this attack from being used with wrong intentions. Keywords— malicious hardware, virus attack, microcontroller, |
116-117 Full Text PDF |
12. | Design and Topology issues for Wireless
Sensor Networks A.Hemanth Kumar, Dr Syed Umar, N.Srinath Abstract
Wireless Sensor Networks (WSN) are highly distributed self organized systems. WSN have been deployed in various fields. This paper focuses on various issues such as routing challenges and design issues, topology issues and Quality of Service support issues associated with WSN. Topology issues include geographic routing, sensor hole problems and sensor coverage issues. Quality of Service aims at providing better networking services over current technologies. Keywords— Design issues, Latency, reliability, Geographic routing sensor holes, Sensor coverage topology, sensor connective topology, Quality of Service, Jitter, routing. |
118-123 Full Text PDF |
13. | Study on Smart Dust (MOTE) Technology V.Veena Madhuri , Dr Syed Umar , P.Veeraveni Abstract
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The WSN is built of "nodes" -from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. A sensor node, also known as a mote (chiefly in North America), is a node which is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. A mote is a node but a node is not always a mote. We compare and contrast the selected WSN motes under these different headings, highlighting the individual mote’s performance under each category. Keywords— Wireless Sensor Networks, Middleware, Mobile Agents, Motes, smart dust. |
124-128 Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net