Journal of Software Engineering and Applications

Journal Information
ISSN / EISSN : 19453116 / 19453124
Current Publisher: Scientific Research Publishing, Inc. (10.4236)
Total articles ≅ 908
Archived in
SHERPA/ROMEO
Filter:

Latest articles in this journal

Xaveria Youh Djam, Yisa Henry Kimbi
Journal of Software Engineering and Applications, Volume 13, pp 129-142; doi:10.4236/jsea.2020.136009

Abstract:
The advent of technology has opened unprecedented opportunities in health care delivery system as the demand for intelligent and knowledge-based systems has increased as modern medical practices become more knowledge-intensive. As a result of this, there is greater need to investigate the pervasiveness of software faults in Safety critical medical systems for proper diagnosis. The sheer volume of code in these systems creates significant concerns about the quality of the software. The rate of untimely deaths nowadays is alarming partly due to the medical device used to carry out the diagnosis process. A safety-critical medical (SCM) system is a complex system in which the malfunctioning of software could result in death, injury of the patient or damage to the environment. The malfunctioning of the software could be as a result of the inadequacy in software testing due to test suit problem or oracle problem. Testing a SCM system poses great challenges to software testers. One of these challenges is the need to generate a limited number of test cases of a given regression test suite in a manner that does not compromise its defect detection ability. This paper presents a novel five-stage fault-based testing procedure for SCM, a model-based approach to generate test cases for differential diagnosis of Tuberculosis. We used Prime Path Coverage and Edge-Pair Coverage as coverage criteria to ensure maximum coverage to identify feasible paths. We analyzed the proposed testing procedure with the help of three metrics consisting of Fault Detection Density, Fault Detection Effectiveness and Mutation Adequacy Score. We evaluated the effectiveness of our testing procedure by running the suggested test cases on a sample historical data of tuberculosis patients. The experimental results show that our developed testing procedure has some advantages such as creating mutant graphs and Fuzzy Cognitive Map Engine while resolving the problem of eliminating infeasible test cases for effective decision making.
Alessia Goffi, Gloria Bordogna, Daniela Stroppiana, Mirco Boschetti, Pietro Alessandro Brivio
Journal of Software Engineering and Applications, Volume 13, pp 104-128; doi:10.4236/jsea.2020.136008

Abstract:
The paper proposes a scalable fuzzy approach for mapping the status of the environment integrating several distinct models exploiting geo big data. The process is structured into two phases: the first one can exploit products yielded by distinct models of remote sensing image interpretation defined in the scientific literature, and knowledge of domain experts, possibly ill-defined, for computing partial evidence of a phenomenon. The second phase integrates the partial evidence maps through a learning mechanism exploiting ground truth to compute a synthetic Environmental Status Indicator (ESI) map. The proposal resembles an ensemble approach with the difference that the aggregation is not necessarily consensual but can model a distinct decision attitude in between pessimistic and optimistic. It is scalable and can be implemented in a distributed processing framework, so as to make feasible ESI mapping in near real time to support land monitoring. It is exemplified to map the presence of standing water areas, indicator of water resources, agro-practices or natural hazard from remote sensing by considering different models.
Boris A. Kobrinskii
Journal of Software Engineering and Applications, Volume 13, pp 15-23; doi:10.4236/jsea.2020.132002

Abstract:
The fuzzy of symptoms (including visual images), representations and assessments in medicine correspond to the peculiarities of the picture of the world of the patient and the physician taking into account the influence of reflection. The continuum of intermediate characteristics of the signs creates serious difficulty for their assessment by physicians. Experts’ confidence factors not only for linguistic features, but also for visual images can help increase the hypothesis quality in intelligent medical diagnostic systems.
Stéphane Kouamo, Claude Tangha, Olaf Kouamo
Journal of Software Engineering and Applications, Volume 13, pp 1-13; doi:10.4236/jsea.2020.131001

Abstract:
Faultless authentication of individuals by fingerprints results in high false rejections rate for rigorously built systems. Indeed, the authors prefer that the system erroneously reject a pattern when it does not meet a number of predetermined correspondence criteria. In this work, after discussing existing techniques, we propose a new algorithm to reduce the false rejection rate during the authentication-using fingerprint. This algorithm extracts the minutiae of the fingerprint with their relative orientations and classifies them according to the different classes already established; then, make the correspondence between two templates by simple probabilities calculations from a deep neural network. The merging of these operations provides very promising results both on the NIST4 international data reference and on the SOCFing database.
Nwabueze Ekwonwune Emmanuel, Chibunna Enyinnaya Victor, Emmanuel Nwabueze Ekwonwune, Victor Chibunna Enyinnaya
Journal of Software Engineering and Applications, Volume 13, pp 25-40; doi:10.4236/jsea.2020.133003

Abstract:
The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA); integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.
E. O. Aliyu, A. O. Adetunmbi, B. A. Ojokoh
Journal of Software Engineering and Applications, Volume 13, pp 77-90; doi:10.4236/jsea.2020.135006

Abstract:
In this paper, a method to initiate, develop and visualize an abstract syntax tree (AST) in C++ source code is presented. The approach is in chronological order starting with collection of program codes as a string and split into individual characters using regular expression. This will be followed by separating the token grammar using best first search (BFS) algorithm to determine node having lowest value, lastly followed by graph presentation of intermediate representation achieved with the help of graph visualization software (GraphViz) while former is implemented using python programming language version 3. The efficacy of our approach is used in analyzing C++ code and yielded a satisfactory result.
Yasser Ali AlShehri
Journal of Software Engineering and Applications, Volume 13, pp 91-103; doi:10.4236/jsea.2020.136007

Abstract:
Software programs are always prone to change for several reasons. In a software product line, the change is more often as many software units are carried from one release to another. Also, other new files are added to the reused files. In this work, we explore the possibility of building a model that can predict files with a high chance of experiencing the change from one release to another. Knowing the files that are likely to face a change is vital because it will help to improve the planning, managing resources, and reducing the cost. This also helps to improve the software process, which should lead to better software quality. Also, we explore how different learners perform in this context, and if the learning improves as the software evolved. Predicting change from a release to the next release was successful using logistic regression, J48, and random forest with accuracy and precision scored between 72% to 100%, recall scored between 74% to 100%, and F-score scored between 80% to 100%. We also found that there was no clear evidence regarding if the prediction performance will ever improve as the project evolved.
Christos Tzimopoulos, George Papaevangelou, Kyriakos Papadopoulos, Christos Evangelides, George Arampatzis
Journal of Software Engineering and Applications, Volume 13, pp 41-66; doi:10.4236/jsea.2020.134004

Abstract:
In this article, we examine the solution of the fuzzy linear vertical infiltration equation, which represents the water movement in porous media in that part which is called the vadose zone. This zone is very important for semi-arid areas, due to complex phenomena related to the moisture content in it. These phenomena concern the interchange of moisture content between the vadose zone and the atmosphere, groundwater and vegetation, transfer of moisture and vapor and retention of moisture. The equation describing the problem is a partial differential parabolic equation of second order. The calculation of water flow in the unsaturated zone requires the knowledge of the initial and boundary conditions as well as the various soil parameters. But these parameters are subject to different kinds of uncertainty due to human and machine imprecision. For that reason, fuzzy set theory was used here for facing imprecision or vagueness. As the problem concerns fuzzy differential equations, the generalized Hukuhara (gH) derivative was used for total derivatives, as well as the extension of this theory for partial derivatives. The results are the fuzzy moisture content, the fuzzy cumulative infiltration and the fuzzy infiltration rate versus time. These results allow researchers and engineers involved in Irrigation and Drainage Engineering to take into account the uncertainties involved in infiltration.
Raymond Okon, Ebele Leticia Eleberi, Kanayo Kizito Uka
Journal of Software Engineering and Applications, Volume 13, pp 67-75; doi:10.4236/jsea.2020.134005

Abstract:
Institutional repositories are essential research infrastructure for research-based universities. A properly dimensioned institutional repository has the potential to increase research impact and enhance the visibility of an institution through its scholarly outputs. The aim of the study is to design and develop a web-based digital repository for scholarly materials and publications in a tertiary institution. The motivation for carrying out this project is to provide a lasting solution to the need for an effective, efficient, reliable and easily accessible system for storing and retrieving scholarly materials, which will make study and research work less cumbersome and stressful for academic staff and students, thereby enabling them to easily carry out their day-to-day activities, especially as it concerns obtaining relevant scholarly information quickly. The system will be developed using open source software and OOADM (Object Oriented Analysis and Design Methodology). Findings obtained from system validation tests show that the system is a viable solution to the major challenges encountered in the management and sharing of scholarly information at the institution.
Omar H. Alhazmi, Mohammed Zubair Khan
Journal of Software Engineering and Applications, Volume 13, pp 143-160; doi:10.4236/jsea.2020.137010

The publisher has not yet granted permission to display this abstract.
Back to Top Top