33 research outputs found

    Evaluation of software quality attributes for Vessel Tracking Management System (VTMS)

    Get PDF
    Software quality and assurance becomes inevitable as the non-functional requirements continue to gain more popularity than functional requirements. Even some system could resolve some problem, but if nonfunctional requirements been neglected, at that point the solution may be impractical.The system with least features and quality characteristics will lead to low demand and failed-to-market.The aim of this study was to evaluate the quality in use attributes for Vessel Tracking and Management System (VTMS) adopted from the latest ISO/IEC 25010 quality model in the perspective of users’ satisfaction.Five properties of quality in use are explicitly evaluated which are effectiveness, efficiency, satisfaction, freedom from risk and context coverage.A study was conducted through observation and survey to evaluate all five quality in use attributes of VTMS and to explore the relationship between each quality in use attribute to determine the overall users’ satisfaction.Generally, this study provides an early empirical evaluation of the practical value of case study method. Firstly, from the VTMS perspective, the system provide a great 100% in functions coverage (completeness) although there are two (2) functions need to take immediate action in terms of accuracy so make up total 98.4% for effectiveness.On the other hand, the efficiency which measure the response time for each VTMS main tasks was 92.83%.It is concluded that all five (5) quality in use attributes scores more than 75% which are above the MMEA’s minimum requirement on overall users’ satisfaction

    Stable vibration-based communication scheme using multi-step ASK and PPM techniques

    Get PDF
    In the information-oriented society, there are increasing needs to conduct data communication with nearby devices/people. In this light, vibration-based communication method was proposed as one of possible communication means between adjacent devices. This method has been expected to provide an intuitive and safe communication by propagating vibration to a receiver device. This study proposes two types of techniques, which are multi-step ASK (Amplitude Shift Keying) with pseudo clock and PPM (Pulse Position Modulation), to achieve a stable vibration-based communication simply using smart device functions. These proposed techniques are then evaluated through some experiments using several types of smart devices. In addition, the effectiveness of the proposed methods is discussed based on the experimental results

    Wi-Fi received signal strength-based hyperbolic location estimation for indoor positioning systems

    Get PDF
    Nowadays, Wi-Fi fingerprinting-based positioning systems provide enterprises the ability to track their various resources more efficiently and effectively. The main idea behind fingerprinting is to build signal strength database of target area prior to location estimation. This process is called calibration and the positioning accuracy highly depends on calibration intensity. Unfortunately, calibration procedure requires huge amount of time and effort, and makes large scale deployments of Wi-Fi based indoor positioning systems non-trivial. In this research we present a novel location estimation algorithm for Wi-Fi based indoor positioning systems. The proposed algorithm combines signal sampling and hyperbolic location estimation techniques to estimate the location of mobile users. The algorithm achieves cost-efficiency by reducing the number of fingerprint measurements while providing reliable location accuracy. Moreover, it does not require any additional hardware upgrades to the existing network infrastructure. Experimental results show that the proposed algorithm with easy-to-build signal strength database performs more accurate than conventional signal strength-based methods

    Improved extreme programming methodology with inbuilt security

    Get PDF
    Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as a candidate, Improve Extreme Programming Methodology by tightening security controls across the development stages without necessarily extending the process

    Machine learning: tasks, modern day applications and challenges

    Get PDF
    During the last decade, we have witnessed significant development in artificial intelligence (AI) capabilities and its application areas such as healthcare, self-driving cars, eLearning, military, smart cities, industry, etc. Machine learning algorithms learned from available data. Further, this learning laid the foundation to develop AI for the various systems around us. These machine learning algorithms are a collection of complex mathematical models and human intuitions. Over the last decade, we are able to develop algorithms which can produce better accuracies so better decision making can be achieved. Particularly in today’s scenarios, deep learning algorithms are breaking all records. These algorithms mimic the neural system of humans and successfully breaking several barriers in image classification, NLP, and robotics, etc. The contributions of this paper are in three folds. Firstly, we reviewed current state-of-the-art research and development work in the area of machine learning. Secondly, we identified a machine learning task and reviewed them. Thirdly, we related these developments with how they are affecting human societies with respect to their applications such as image classification, autonomous driving, and data fusion. This paper provides reader with the direction of what has been done and what can be done in machine learning to exploit open problems in this area

    Open source programmers' information seeking during software maintenance

    Get PDF
    Problem statement: Several authors have proposed information seeking as an appropriate case study for studying software maintenance and evolution that have provided empirical classifications of information seeking in commercial software evolution settings. Approach: However, there is minimal research in the literature describing the information seeking behavior of Open Source programmers, even though Open Source contexts would seem to exacerbate the information seeking problems to a certain extend; where team members are typically delocalized from each other and they are often forced into asynchronous communication. Results: This study reports on an empirical study that classifies Open-Source programmers' information needs generated through open-coding of questions that appear on developers' mailing lists. Based on the generated Information Seeking Schema (ISS), details of the information sought by programmers on 6 different mailing lists over several years are analyzed and discussed. Conclusion/Recommendations: The result shows several interesting findings that describe the programmers' information needs across the mailing lists. Firstly, there are a similar pattern of information artifact and attribute across all projects. Secondly, majority of the programmers' information seeking concentrated on the systems' implementations. Thirdly, the OS programmers have also shown to be team-oriented and they tended to rely on documentation more than what have previously reported. These results suggest the applicability of the ISS in evaluating OS programmers information seeking

    Source code analysis extractive approach to generate textual summary

    Get PDF
    Nowadays, obtain program features becomes a hot issue in source code comprehension. A large amount of efforts spent on source code understanding and comprehension to develop or maintain it. As a matter of fact, developers need a solution to rapidly detect which program functional need to revise. Hence, many studies in this field are concentrating on text mining techniques to take out the data by source code analysis and generate a code summary. However, in this paper, we attempt to overcome this problem by propose a new approach (Abstract Syntax Tree with predefined natural language text Template (AST-W-PDT)) to generates human readable summaries for Java methods role. This paper describes how we developed a tool that the java source code can be summarized from the methods role. In evaluating our approach, we found that the automatically generated summary from a java class 1) is helpful to the developers in order to understand the role of the methods and will be useful, and 2) the automatically generated summary is precise

    N/A and signature analysis for malwares detection and removal

    Get PDF
    Objectives: This study aimed to design an application that effectively scans, detects, and removes malware based on their signatures and behaviours. Methods/Statistical analysis: The rapid growth in the number and types of malware poses high security risks despite the numerous antivirus softwares with Signature-Based Detection (SBD) method. The SBD method depends on the signatures or malware names that are available in the algorithm database. Findings: Malware is a type of malicious software that poses security threats to the targeted system, resulting in information loss, resource abuse, or system damage. The antivirus software is one of the most commonly used security tools to detect and remove malware. However, the malware defences should focus on the malware signatures since there is no universal way of recognising all malware. Therefore, this study suggested N/A detection technique as the dynamic method (behaviour-based detection method) that depends on the Windows Registry (system database). Both static and dynamic detection methods were assessed in this study. Based on the experimental outcomes, SBD method detected and removed most of malware (only known viruses). Application/Improvements: Meanwhile, the N/A detection method detected and removed all injected malware (known and unknown Trojan horse) within a relatively low running time

    Measurement of software maintenance from user satisfaction perspective: a case study

    Get PDF
    The importance of software maintenance in a software development environment is a long term and continuous activity for improvement. The service quality of the software maintenance provided in which involving helpdesk, programmer and software analyst should be measured in order to satisfy users who use the software. In this paper, we propose a software measurement program for product improvement in order to maximize the user satisfaction where one government agency is selected as our case study. Our measurement plan is based on Goal Question Metric (GQM) approach. Results from this measurement program with some meaningful quantitative analysis has given an achievable roadmap for the organization to plan for next improvement activities toward their goals

    Wi-fi fingerprint database construction using Chebyshev wavelet functions

    Get PDF
    In this research we propose a new approach of constructing Wi-Fi fingerprints database using Chebyshev wavelet functions. Proposed algorithm combines the reference data collection procedure with path-loss prediction. Our algorithm requires only a few samples to be collected in a given region, and thus significantly reduces the calibration time. Next, the collected reference samples are used to construct area specific path-loss prediction function using Chebyshev wavelets. Once we have the path-loss function, we can predict the signal strength values at any point of the target area. One of the advantages of proposed algorithm is that it does not require any detailed information about target area, i.e. location of wireless access points, number of walls (floors, obstructions) between the transmitter and reference points and etc
    corecore