Volume 3 Issue 3- March 2013

 

S.No Title Page
1. Integrated Framework of Software Engineering and Common Criteria Practices
Khairunnisa Osman
Abstract

Software developers are usually familiar with software engineering deliverables but face difficulties in providing the deliverables that must be in line with the Common Criteria requirement. The software engineering deliverables lack the security requirements to be the evidences in the Common Criteria evaluation and certification. Therefore, the main aim is to develop a framework between Common Criteria and software engineering deliverables. This project objective are to investigate the practices of software engineering and Common Criteria, consolidate the deliverables between software engineering and Common Criteria and solicit an evaluation of the integrated framework design by the developers of the software, evaluators and certifiers of Common Criteria. The investigation on the software engineering practices using the technique of Systematic Literature Review has been conducted and it was found that the ISO/IEC 12207:2008 as the latest standard practices among software developers in developing software. The consolidation used Causal, Semantic and Concept mapping between the process of Software Engineering and Common Criteria to see the similarities between both processes and deliverables before being integrated into the framework. The development of the framework was conducted after the similarities between the processes and deliverables of Software Engineering and Common Criteria are found. The evaluation used a questionnaire that was distributed among experts in Common Criteria and Software Engineering and it found that the framework gives a perceived ease of adoption and less apprehensiveness to the experts especially, in assisting the evaluation and certification of software products using the Common Criteria.

Keywords— Put your keywords here, keywords are separated by comma.

64-70
Full Text PDF
2. Small World Phenomena
Jie Cheng, Mehdi R. Zargham, Shuguo Rang
Abstract

This paper offers an overview study of small world problem. We emphasize on introducing the basic concepts, and the empirical analysis and results of related literatures.   We surveyed from Milgram’s original experiments on small world problem to the current empirical study conducted by Leskovec on the large data sets on Microsoft messenger to uncover the structure and model of small world network.

Keywordssmall world, six degree separation, random graph, power-law distribution.

71-75
Full Text PDF
3. GUI Regression Test Selection Based on Event Interaction Graph Strategy
Bouchaib Falah,Rahima Nouasse,Yassine Laghlid
Abstract

Testing is an efficient mean for assuring the quality of software. Nowadays, Graphical User Interfaces (GUIs) make up a big part of applications being developed. Within the scope of regression testing, some test cases from the original GUI are usable and others are unusable.  This paper presents an algorithm that drops the unusable test cases and creates new test cases based on the main differences between the two GUIs, which are represented as uncovered edges. Furthermore, the algorithm creates a new test suite for the modified version by combining the usable test cases and the new created test cases. 
Keywords— regression testing; reusable test cases; event interaction Graph; flow

76-79
Full Text PDF
4. Computer Simulation of Interactions between Copper and Aluminum Nano-films
Zhiyong Ling, Long Qian, Guanggui Cheng, Zhongqiang Zhang, Dongjian Sun
Abstract

Nowadays it has become feasible to simulate the dynamics of molecular systems on a computer. The aim of computer simulations of molecular systems is to compute macroscopicbehavior from microscopicinteractions. Interactions between closely spaced copper and aluminum nano-films have been carried out by using Lennard-Jones (L-J) potential with Molecular dynamics simulations. The interfacial distance between copper and aluminum nano-films is narrowing from 15 Å to 4Å. The interaction strength firstly keeps almost unchanged in the range of 7 Å to 15 Å. When the distance is less than 7 Å the interaction strength decreases quickly. It is found that the critical distance is around 7 Å. Moreover, the interaction strength increases with the increasing temperature in the range of 4 Å to 7 Å. The interaction also varies with different surface morphologies, the interaction energy of rectangle surface is much more greater than triangle surface at the same spacing. However, it is little affected by the approaching velocity of the two films in the range of 6 Å to 15 Å. When the distance is less than 6 Å, interaction energy decreases sharply. The larger the velocity,  the larger the interaction energy. At last, we found that electric field does not affect the interaction energy.
Keywords- Computer Simulation;Nano-films;Molecular Dynamics;Interaction Strength

80-83
Full Text PDF
5. Roadmap to Testing the Cloud Techniques, Methodology, and Tools
Bouchaib Falah, Abir-Ezzahra El Ayadi, Othmane Atif
Abstract

Cloud computing has recently received a significant attention and started attracting companies, general users, and developers. With the increase of the popularity of this paradigm, the importance of testing the cloud started to emerge. Many authors came up with paper about testing technologies applied to the cloud, however; there is no clear methodology to follow in order to complete a cloud test. This paper presents an overview of cloud computing, cloud testing techniques and tools. It presents a roadmap to testing the cloud. This consists of a five-step process to test cloud services in a logical and effective way. This work has for a goal to provide new testers on the cloud with the necessary information to start their test.

Keywords – Cloud computing; testing; testing the cloud, cloud testing; cloud testing tools; functional testing; non-functional testing 

84-89
Full Text PDF
6. Visualization of Behavioral Model using WEKA
Rajesh Soni
Abstract

The pictorial presentation is very useful for understanding the dataset. The visualization of India dataset of adult dataset have been done using freeware tool WEKA. Different attributes are presented graphically to understand their characteristics.
Key word: Adult dataset, WEKA, Visualization, India etc.

90-93
Full Text PDF
7. A Study on Routing Protocols in Wireless Sensor Networks
Dr Kuppala Kondaiah, Dr. R.Bulli Babu ,Syed Umar
Abstract

Wireless sensor networks are catching up as the primary mode for monitoring and collecting data in physically challenging environments. They find applications in various fields varying from environment monitoring, military applications to monitoring patients in hospitals. The low cost, ad hoc deployment, distributed sensing, and adaptability of wireless sensors have given them a big advantage over other methods. The constraints due to their inherent features make routing in wireless sensor networks a big challenge. This paper covers a number of routing protocols being used in the current systems. The stress is on energy aware routing where the network optimizes between efficient routing and maximizing life of the network.
Keywords— Wireless Sensor Networks, Wireless Body Area
Networks.

94-98
Full Text PDF
8. TPM: A More Trustworthy Solution to Computer Security
Angela Francis, Renu Mary Daniel, Vinodh Ewards S. E.
Abstract

Ensuring the trustworthiness in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analysing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. In this paper, we discuss the approaches used earlier for establishing trust and their limitations, and focus on the need for hardware-based root of trust as software-only solutions are inadequate to ensure complete trust.
We discuss an emerging technology in the field of trusted computing, Trusted Platform Module (TPM) that provides a hardware-based root of trust. we also discuss about its scope, various applications, and the future work being done on it.

Keywords— Trust, Physical space, Cyber Space, Trusted Computing Base, Trusted Platform Module.

99-103
Full Text PDF
9. Diagnosis of Failures in Zigbee Based Wireless Sensor Networks
Mumtaz M.Ali AL-Mukhtar, Teeb Hussein Hadi
Abstract

In this work, based on the characteristics of ZigBee protocol, ZigBee technology is used to model and simulate a wireless sensor network. Nodes failures and their effect on the traffic are considered in different scenarios for cluster-tree topology to certify the reliability of this communication network. The parameters:  throughput, delay, data traffic sent, and data traffic received are measured during these scenarios. These scenarios are performed taking into account the specific features and recommendations of the IEEE 802.15.4/ZigBee standard using OPNET Modeler 14.5. Simulation results quantify the impact of a ZigBee device failure on the performance factors.

Keywords: Wireless Sensor Network (WSN), WSN Failure, Cluster-Tree Topology, IEEE 802.15.4. ZigBee

104-108
Full Text PDF
10. Energy Efficient Fault Tolerant Scheme for Wireless Sensor Networks (EEFSWSN)
Saurabh Mondal, Debajyoty Banik
Abstract

Sensor Network has been identified as the most important technology for the next century. Despite of its    potential application, wireless sensor network encounters resource restrictions such as low computational power, reduced bandwidth and specially limited power resource. In wireless sensor networks, fault-tolerant and energy efficiency are two important topics. Some link failures may happen during data transmission. In this Paper, we address fault tolerance in wireless sensor networks in power efficiency perspective. In order to make the presentation self-contained, we start by providing a short summary of sensor networks and classical fault tolerance techniques. Then we have discussed about the faults in different layers, have studied failures, errors. Therefore, failures have been classified. Some fault detection and recovery techniques are discussed. Thus we have proposed some methods to make our WSN fault tolerant. Among the different techniques we have chosen a graph based technique to deal with the fault tolerance in WSN. Our simulation result depicts that our proposed scheme is better than the existing algorithms.

Keywords— Fault tolerance, fitness function, multiple fit neighbors.

109-115
Full Text PDF
11. Malicious Hardware
Suraj Sawant, Yogesh Vadam, Avadhut Bambarkar, Harsha Redkar
Abstract

Virus attacking has been evolute since 1983, but all viruses were operates as software. Some of them been caught by antivirus, here we are introducing virus through hardware, hence antivirus won't be able to detect virus in hardware. Advanced attacking system, finding ghost drivers in any operating system, crashing down the system will be new applications in this project. In this we are implementing new hardware which contains microcontroller to send commands to operating system and virtual bridge will be responsible for connecting hardware and operating system. This technology of hardware virus is totally new and simultaneously we've found protection system too which will prevent this attack from being used with wrong intentions.

Keywords— malicious hardware, virus attack, microcontroller,
commands.

116-117
Full Text PDF
12. Design and Topology issues for Wireless Sensor Networks
A.Hemanth Kumar, Dr Syed Umar, N.Srinath
Abstract

Wireless Sensor Networks (WSN) are highly distributed self organized systems. WSN have been deployed in various fields. This paper focuses on various issues such as routing challenges and design issues, topology issues and Quality of Service support issues associated with WSN. Topology issues include geographic routing, sensor hole problems and sensor coverage issues. Quality of Service aims at providing better networking services over current technologies.

Keywords— Design issues, Latency, reliability, Geographic routing sensor holes, Sensor coverage topology, sensor connective topology, Quality of Service, Jitter, routing.

118-123
Full Text PDF
13. Study on Smart Dust (MOTE) Technology
V.Veena Madhuri , Dr Syed Umar , P.Veeraveni
Abstract

A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The WSN is built of "nodes" -from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. A sensor node, also known as a mote (chiefly in North America), is a node which is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. A mote is a node but a node is not always a mote. We compare and contrast the selected WSN motes under these different headings, highlighting the individual mote’s performance under each category.

Keywords—  Wireless Sensor Networks, Middleware, Mobile Agents, Motes, smart dust.

124-128
Full Text PDF

 

 

 

 

IJCSET Menu

Downloads