New user registration
Event organizer registration
Login via your institution account
Login via your organization account
Login via your publisher account
Login using your new user credentials
Forgot username or password?
Subscribe to SciArchives
Computer Science >
Computer Science (General)
International Journal of System and Software Engineering
Publisher:Publishing India Group
Editor in chief:Anuraag Awasthi
Your selection(s) could not be saved due to an internal error. Please try again.
Browse by Volumes
An Uml Based Safety Analysis For Safe Software
Author:Bandaru Esther Sunanda
Volume: 1 | Issue no: 2-2013 | Pagination: 34-39
Software safety involves with the assurance that software will execute within a system context without resulting in unacceptable risk. The Safety-Critical Systems have become more prominent as there are being used in medical field and for monitoring purpose. To improve the effectiveness of the electronics systems embedded computer systems are used which includes the safety-critical software. While controlling the embedded computer systems with the software failures may occur. Due to the advances in the technologies and the usage of embedded computer systems the complexity may increase leading to risks. This paper aims at the description of the already the existing methods and metrics used for analysis of the developed embedded system and analyse its failures.An application called the Railroad Crossing Control System (RCCS) is used and UML is used as a technique to identify the hazards and they are rectified using UML diagrams with the safety issues.
Comfortable Voter Design In Highly Effective Bandwidth Usage And Dynamic Threshold Selection For Safety Critical System
Author:Umamaheswararao Batta, Seetharamaiah Panchumarthy, Phanikumar Singamsetty
Volume: 1 | Issue no: 2-2013 | Pagination: 24-33
Safety and availability of safety critical systems are increased by using masking method. The main aim of this research paper is designing dynamic bandwidth selection for fuzzy voter for Railroad Crossing Control System (RCCS) and masking the faults. The failure of RCCS leads to damage of property and at-times loss of human life. Safety and availability of the safety critical system is calculated. The major limitation of existing fuzzy voters is uncertainties associated with the inputs and three values (a, b and c) are required as threshold. Only fixed factors are used for a particular set of information and acquainted information varies. In this paper, a dynamic fuzzy voter with three automatic values (a, b and c) are proposed in each voting cycle and existing standard weighted average voting algorithm, flexible weighted average voting algorithm , weighted average voting with soft threshold algorithm and Fuzzy weighted average voting are surveyed and their merits and demerits are discussed. Safety overall performance is empirically analyzed by using the fixed fluffy heavy average voter, powerful fluffy voters, fixed fluffy voter with ratings and fluffy powerful fluffy voter with ratings on a TMR system for 10000 voting periods and RMSE is measured for fixed and powerful fluffy voter. The approach uses some form of voting to avoid the classical fuzzy rules used for inference and compute scores that can be used as weighted factors directly instead of computing several rule outputsWe also briefly compare Static bandwidth fuzzy Weighted Average Voter, Dynamic bandwidth fuzzy Weighted Average Voter, Static fuzzy voter without weighted Average Voter and Dynamic fuzzy voter without Weighted Average Voter.
Propound Solutions For Increase Fault Tolerance In Web Services Composition
Author:Shabaninia Faridoon, Nematollahi Pantea
Volume: 1 | Issue no: 2-2013 | Pagination: 18-23
Web Services Business Process Execution Language (WS-BPEL) provides the language to specify business processes that are composed of Web services as well as exposed as Web services. In business processes and during service invocation, errors may occur from latent faults, e.g. partner services may not be available or not respond within time. We want to have reliable business processes hence we need to have reliable web services. To have reliable web services fault occurrences should be prevented. Objective of this paper is to present an architecture which ensures more reliable composed services. Therefore we propose an architecture which dynamically detect and recover failures using software fault tolerance patterns and mapping them to WS-BPEL .finally a Business Process is designed To implement attained proposition.Matters to be considered during this study is : Σ Dynamic Detect and recover failures. Σ Discover similar web service from "web service discover component" and replace it with failed web service. Σ Static Detect and recover failure types related to development phase. Σ Using human interaction methods to avoid invalid fault tolerance strategy.
Make Your Plan And Stick To It: The Importance Of Adherence To Planning And Process Efficiency In The Success Story Of A Software Project
Author:Nidhi Natrajan, Tuhin Chattopadhyay
Volume: 1 | Issue no: 2-2013 | Pagination: 10-17
Introduction: Software projects are becoming more and more complex, dynamic in the current global scenario and consequently understanding the factors which affect the success of such complex projects become critical. Lot of research work has been done in this area, and high failure rate of software projects was reported. Proper planning and effective development processare the factors considered for this study; this study tries to understand the impact of planning and processon the software project success. Design/methodology/approach: Project planning and process is measured through 8 items. An e-mail questionnaire was used to gather the data. Questionnaire measured all items on seven point likert scale, and bi-variate regression was applied to find the impact of planning and process on software project success. Findings: Project planning and process adapted in a software project has impact on the success of the software project. 77.5% of the variation of Software Project Success is explained by planning and process. Research limitations/implications: The data were collected from 150 respondents; the size of data can be increased for better result. Planning and processare only two factorsconsidered in the paper to understand the software project success; other factors could also be combined to understand it in a better way. It could be studied in other countries as well.Practical implications: The findings show the impact of planning and process on software project success, which will help project managers in handling the team in a better way, and management in providing improved working situation for the IT workers for good results in the software projects.Originality/value: Lot of work has been done to understand the factors affecting the success of software projects, but few studies have conducted such study, with special reference to planning and process, that to in Indian context.
Novel Algorithm For Image Segmentation Using Neural Network
Author:Sadegh Nezarat, Ali Ghareaghaji, Hamed Bazyar, Seyed Arsalan Hossini
Volume: 1 | Issue no: 2-2013 | Pagination: 1-8
The pulse-coupled neural network (PCNN) is widely used in image segmentation. However, the determination of parameter values in the PCNN framework is an unavoidable and trivial task that may cause neurons to behave unexpectedly, thus affecting segmentation performance. Therefore, this paper presents an efficient iterative algorithm using a modified PCNN for automatic image segmentation. In contrast to existing PCNN models, a new neural threshold was first established for the modified PCNN instead of a general dynamic threshold, allowing for greater efficiency in controlling the pulse output. Besides, a varying linking coefficient value was constructed for efficiently adjusting the neural behavior. By incorporating the Bayes clustering method, it thereby extends the feasibility of the model for the extraction of targets with inhomogeneous brightness, thus resulting in a simpler iterative algorithm for segmentation. Experiments on real-world infrared images demonstrate the efficiency of our proposed model. Moreover, compared with simplified PCNN models and classic segmentation methods, the proposed model shows fewer misclassification errors and higher segmentation performance.
An Empirical Study Of Software Testing Approaches
Volume: 1 | Issue no: 1-2013 | Pagination: 38-42
To design and develop software, it is required to follow a process model i.e. a defi ned set of activities which will result in cost-effective and systematic software which is to be delivered to the customer and among the various activities involved in the process model testing plays a vital role. Testing is a process to fi nd the weak points of software; it is not a phase where we try to proof that the developed software is error-free. Testing is performed with a negative attitude to fi gure out the remaining error, which are not yet uncovered even after conducting various reviews, audits and inspections. If testing is conducted in a better manner we can ensure that the software which an organization is going to release in market or delivering to a client will satisfy the requirements of them and will assure the product is good in term of quality also. Software undergoes through many levels and types of testing to develop a correct deliverable product. In this paper we'll study various kinds of testing like structural, functional, and their importance in practical environment.
Role Of Positional Error Analysis In Automatic Text Error Correction Of Punjabi
Volume: 1 | Issue no: 1-2013 | Pagination: 35-37
Positional analysis of typed text is useful in Natural Language Interfaces, spellchecker, OCR and language related technology development etc .Though considerable work has been done in the area for English and related languages, the Indian Language scenario is still far behind.. This paper focuses on the role of Positional analysis of the typed text in automatic text error correction in Punjabi, the world's 14th most widely spoken language, giving a statistical report about the role of naveen group, phonetically similar character pairs, shifted and unshifted modes of typing in language. Analysis is done on 20000 misspelled words generated by typists.
Blind Xpath Injection Attack: A Case Study
Volume: 1 | Issue no: 1-2013 | Pagination: 30-34
Extensible Mark-up Language (XML) is adopted by different organizations as a data exchange format for web services and internet applications. The XML is much prone to hacker's attack. The common hacking technique for XML is XPath injection. The attacker can exploit the XPath to manipulate the database. XPath Injection attack can even bypass the system security and results can be disastrous. In this communication Blind XPath code injection problem is being reviewed using a case study. This article discusses the extent of the problem and few principals for managing and solving XML deployment.
Wireless Network Security Spread Spectrum Techniques
Volume: 1 | Issue no: 1-2013 | Pagination: 26-29
Wireless LANs enable users to communicate without the need of wires. In this technology two or more devices use radio frequency to transfer and receive data over air. WLAN network uses a wireless Access Point (AP) to transmit and receive data from users. The major difference between wired LAN and WLAN is WLAN transmits data by using radio waves instead of transmitting electrical signals over a wire. Nowadays wireless networks are gaining popularity as one can use them in many areas such as in classrooms or in workplace due to flexibility and portability of wireless devices. Since wireless devices transmit radio signals over a wider area, so security become major concern. Anyone with proper Wi-Fi device and wireless NIC can intercept radio signals from the nearby wireless network. Therefore, it is important to enhance the network security in order to protect the information of the network. Many security protocols have been designed to protect the wireless networks. But later it has been found that theses protocols were not able to provide complete security. In this paper some of threats that can be made at physical layer and countermeasure using spread spectrum techniques are discussed.
A New Approach To Design Of Cpg Model For Stable Humanoid Locomotion Using Neural Oscillators
Volume: 1 | Issue no: 1-2013 | Pagination: 18-25
In this paper, we propose a new model using central pattern generators (CPG) for the stable motion of Humanoid robot. After that we compare the proposed model with the existing Taga's model of humanoid robot. The Matsuoka Neural Oscillators are used to generate the required signals to realize the coordinated movement of a musculoskeletal model of humanoid robot with five links. The proposed design of the CPG is verified through simulation.
Contact and support
Terms and conditions
Frequently asked questions
Copyright © 2015
All rights reserved. SciArchives.