Journal of Software Engineering and Applications

Journal Information
ISSN / EISSN : 1945-3116 / 1945-3124
Published by: Scientific Research Publishing, Inc. (10.4236)
Total articles ≅ 969
Archived in

Latest articles in this journal

Devin Staton, Jeremy Bellah
Journal of Software Engineering and Applications, Volume 15, pp 59-74;

Golf is played by millions around the world because of its accessibility to all age groups and the social nature of competition. One of the most popular ways to play with peers is through recurring league competitions. However, league play requires extensive management because of the information handling and coordination involved. This paper presents the development of a web application which facilitates league management by automating and consolidating management processes. Using this application, golfers can easily create and join leagues of peers, store player information, organize competitions, and update scores throughout play. While some golf league applications already exist, none of these alternatives provide sufficient flexibility and automation at no cost. To address this need, the presented application enables the simultaneous management of multiple leagues and courses. The application also automatically generates teams for each competition based on player handicaps. To reduce management workload, responsibilities are distributed amongst all players and scores can be input and viewed live. While existing alternatives address some of these needs, there are none which provide all these features on one platform. By automating these processes and consolidating them into one application, golfers will be able to focus on the competitive and social experience of their leagues.
Hironobu Sone, Yoshinobu Tamura, Shigeru Yamada
Journal of Software Engineering and Applications, Volume 15, pp 183-196;

Open source software (OSS) has become an indispensable part of society, not only for personal use but also for corporate use. Projects developed and operated by OSS are called open source projects, and the number of such projects is increasing. On the other hand, because anyone can participate in an open source project, the progress of the project is uncertain due to differences in project members’ skills, development environments, and time zones of activity. Therefore, many users and companies need to understand the development and operation status of open source project. Then, the developers carefully make decisions on upgrading or installing new OSS. In this paper, we focus on the maintenance effort estimation for open source projects considering uncertainty. Also, we evaluate the project quantitatively using Earned Value Management (EVM). Moreover, we examine the appropriateness of the model for predicting the maintenance effort expeditures. Furthermore, we discuss the appropriateness of this EVM method.
Alcínia Zita Sampaio, Augusto M. Gomes
Journal of Software Engineering and Applications, Volume 15, pp 131-149;

The implementation of Building Information modelling (BIM) methodology in the construction industry has been covering wide applicability with recognized benefits in designing, constructing and operating buildings. A recent short course organized in the University of Lisbon, actualized with the most relevant achievement based in master research, was offered to professionals of the industry, namely, architects and civil engineers coming from diverse engineering areas, environment, construction, maintenance, consult and patrimonial enterprises and also from public organizations like city councils. The proposed action covers the areas of construction (conflict analysis, planning and materials take-off), structures (interoperability, analyses and transfer of information between software) and the most recent Heritage Building Information Modelling (HBIM) topic. The course aims to contribute to the dissemination of the potential of BIM in the areas of designing, construction and refurbishing of historical buildings. The participants followed the course with great interest and satisfaction, formulating several questions directed to the particular activity of each of the attendees.
Ioannis Karamitsos, Maria Papadaki, Marinos Themistocleous, Cornelius Ncube
Journal of Software Engineering and Applications, Volume 15, pp 165-182;

The adoption of Blockchain has caused the organization to rethink how it operates and adds value to its current processes. Some scholars refer to Blockchain as the Black Swan of the 21st century, which will have a greater impact than the introduction of the Internet. Currently, there is little discussion about Blockchain technology and the value model approach and how organizations can close the gap between strategy and operational planning to successfully implement this technology in organizations. This paper explores the relationship and implications of Blockchain technology in relation to the value chain model in education. This paper proposes a value modeling approach for implementing Blockchain in the education sector and demonstrates how a solution works in practice. The novelty of the research will be from both theoretical and practical perspectives. The study will appraise enhancement that can be made within the existing literature on Blockchain and the value chain model, and how the alignment of the two concepts can be used to improve the use of the current value chain model in the education sector.
George Jones, Amanda E. Wakefield, Jeff Triplett, Kojo Idrissa, James Goebel, Dima Kozakov, Sandor Vajda
Journal of Software Engineering and Applications, Volume 15, pp 197-207;

Within the last few decades, increases in computational resources have contributed enormously to the progress of science and engineering (S & E). To continue making rapid advancements, the S & E community must be able to access computing resources. One way to provide such resources is through High-Performance Computing (HPC) centers. Many academic research institutions offer their own HPC Centers but struggle to make the computing resources easily accessible and user-friendly. Here we present SHABU, a RESTful Web API framework that enables S & E communities to access resources from Boston University’s Shared Computing Center (SCC). The SHABU requirements are derived from the use cases described in this work.
Alex Tserkovny
Journal of Software Engineering and Applications, Volume 15, pp 19-58;

The article presents an approach toward an implementation of a fuzzy logic-based decision-making process by Autonomous Intelligent Actor (AIA) (© A. Tserkovny), when an input information is defined for its “strategic targeting” by a human operator in terms of a fuzzy incident geometry, whereas its “tactical” behavior (a navigation in space) is directed by fuzzy conditional inference rules. For implementing both elements of AIA decision-making a fuzzy logic [1] for formal geometric reasoning with extended objects is used. This fuzzy logic based fuzzification of axioms of an incidence geometry and a predicate apparatus [2] for AIA space orientation are also presented. The approach, offered in the article, extends predicates of a counter positioning of two objects and their mutual navigation into their fuzzy counterparts. The latter allows AIA to make certain “tactical” decisions.
Jorge Cervantes-Ojeda, María Del Carmen Gómez-Fuentes
Journal of Software Engineering and Applications, Volume 15, pp 1-17;

QualiTeam is a web application to support the teaching-learning process on Software Quality Assurance, Quality Control and Testing introductory concepts. It has two main objectives: to facilitate the understanding of concepts learned in theory and to facilitate the monitoring of SW projects that students develop. The system gives the teacher control and the students a guide on the activities that must be carried out throughout a software project development. QualiTeam is a tool conceived to help in the challenge of providing students with concrete examples with which they can practice and clarify the topics taught in the classroom. With it, students can apply concepts that, in the initial training of a software engineer, are generally taught only at a theoretical level such as: review process, change requests, trouble reports, document version control and testing documentation management. QualiTeam is free and available online. It has been in operation for 5 years, through which improvements have been made until achieving a quite stable version.
Charles W. Butler
Journal of Software Engineering and Applications, Volume 15, pp 150-164;

This paper applies software analytics to open source code. Open-source software gives both individuals and businesses the flexibility to work with different parts of available code to modify it or incorporate it into their own project. The open source software market is growing. Major companies such as AWS, Facebook, Google, IBM, Microsoft, Netflix, SAP, Cisco, Intel, and Tesla have joined the open source software community. In this study, a sample of 40 open source applications was selected. Traditional McCabe software metrics including cyclomatic and essential complexities were examined. An analytical comparison of this set of metrics and derived metrics for high risk software was utilized as a basis for addressing risk management in the adoption and integration decisions of open source software. From this comparison, refinements were added, and contemporary concepts of design and data metrics derived from cyclomatic complexity were integrated into a classification scheme for software quality. It was found that 84% of the sample open source applications were classified as moderate low risk or low risk indicating that open source software exhibits low risk characteristics. The 40 open source applications were the base data for the model resulting in a technique which is applicable to any open source code regardless of functionality, language, or size.
Senghor Abraham Gihonia, Rostin Makengo Mabela, René Gilles Bokolo, Eddy Kimba, Matondo Katshitshi, Matshitshi Kalombo, Michel Tshodi, Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications, Volume 15, pp 116-129;

Malicious activities or policy violations have been a concern for the past years. For example, many people have been victims of robbery on vehicles. A conceptual diagram of an Intrusion Detection System (IDS) [1] [2] for vehicles with remote signaling using an Arduino controller and radio-frequency technology is proposed in this paper. To address malicious activities on vehicles, two aspects are considered here, namely: notifier and detector. Firstly, an object-oriented C module that puts on and off a controller (installed inside the vehicle) and an anti-theft electronic editing that powered using an alternator and supported by a back-up battery are implemented. Secondly, a magnetic intrusion sensor, controlled by a proximity detector using radio-frequency technology, has been installed on each vehicle door. To enable IDS, a user needs to activate the monitoring system when leaving their vehicle. This is done using a remote system. In case the user does not activate the monitoring system while leaving the vehicle, a 5-meter-proximity detector will automatically lock the system and set off the monitoring system whenever the user is outside the detection zone. The detection zone is a 5-meter radius area centered at the controller. Here, monitoring consists of geolocating any intruders within the detection zone. This means, if any of the vehicle doors is opened while the system is still locked, the controller will activate the vehicle alarm for a few seconds, thereafter send an SMS notification to the owner. The system automatically unlocks as soon as the proximity detector is within the detection zone. The contribution of this paper, as compared to other similar work, is to reinforce the electronic implementation of IDS.
Chandra Amaravadi
Journal of Software Engineering and Applications, Volume 15, pp 103-115;

The field of information systems has historically suffered from a pre-dominance of behavioral approaches. As a result, it is not surprising that in spite of decades of research, dozens of conferences and journals and thousands of researchers, very few breakthroughs have been achieved. This paper advocates a technical approach that focuses on improving existing systems in organizations by viewing them from the point of roles i.e. functions fulfilled by IS in organizations. These are understood as: 1) supporting operations, 2) providing information, 3) supporting decision making, 4) providing knowledge, 5) supporting knowledge and clerical work, and 6) supporting organizational design. It is generally agreed that the field’s understanding of fulfilling roles “1”, “2”, “3” and “6” is mature while understanding of areas “3” (for unstructured decisions), “4”, and “5” are still incomplete. The challenges in these areas are difficult problems that we refer to as grand challenges and discuss in this paper.
Back to Top Top