Friday 14 October 2011

A Novel Metric For Measuring The Readability of Software Source Code

Author Bajeh, A. O.
ISSN 2079-8407
On Pages 492-497
Volume No. 2
Issue No. 10
Issue Date October 01, 2011
Publishing Date October 01, 2011
Keywords Software Metrics, Readability, Source Code, Maintainability, Measurement


Abstract

Software metrics gives developers and their client and users of Software information about the quality of their Software products. They are employed in taking decisions at various levels of Software Life Cycle (SLC). This paper presents a novel metric for measuring the readability of Software Source Code (SC). Maintenance changes (addition, removal or modification), though, are initially carried out on the Software design artifacts, they are eventually performed on the Software SC as the finished product. Thus this metric is relevant in estimating the readability quality of SCs. The metric is ratio scaled and size independent. Results showed that the metric objectively measures the readability of SC.to alleviate such impacts. 

Download Link
[Journal of Computing...]

An Examination of Privacy Policies of Global University Web Sites

Author Joanne Kuzma
ISSN 2079-8407
On Pages 485-491
Volume No. 2
Issue No. 10
Issue Date October 01, 2011
Publishing Date October 01, 2011
Keywords Privacy, privacy policies, consumer trust, universities, higher education, cookies, personal data


Abstract

Due to demand in online services, universities throughout the world are increasing the content of their Web sites and adding features, such as online applications and e-learning. However, adding online services requires that personal data is kept within computerized systems, thus putting personal private information at risk. Online consumers express concern about the risk of their personal private data and demand to know how organizations will protect their records. It is imperative that firms have mechanisms to guard their data and publish protection information within online privacy policies to mitigate user distrust. However, although industry privacy groups may recommend better protection and some countries may legislate its use; this is not universal in all university sites. This study analyzes 90 universities site throughout the world to determine the use of privacy protection. The results show a lack of use of certain privacy mechanisms. The research suggests methods for improving protection. 


Download Link
[Journal of Computing...]

A CBR-based Approach to ITIL-based Service Desk

Author Abtin Refahi Farjadi Tehrani , Faras Zuheir Mustafa Mohamed
ISSN 2079-8407
On Pages 476-484
Volume No. 2
Issue No. 10
Issue Date October 01, 2011
Publishing Date October 01, 2011
Keywords Incident Management, Problem Management, Service Desk, Knowledge management, Case-based Reasoning


Abstract

During the last 20 years ITIL (IT Infrastructure Library) has been evolving with the latest version published in 2007. Incident Management and Problem Management are two main activities of ITIL service operation framework which handles incidents and their root causes respectively. Service Desk systems are software tools that help IT organizations in handling incidents and problems. On the other hand since Knowledge Management emerged, many corporates adopted Knowledge Management. By adding a Knowledge Management structure to the ITIL framework in 2007 the path of utilization Knowledge Management in Service Desk system is smoothed, however, the number of Service Desk systems that have adopted a Knowledge Management structure is few and the adoption is not practical in many cases. In this paper we try to address this issue and focus on Knowledge Management structure utilization in Service Desk systems by integrating Case-based Reasoning and Service Desk structure. 


Download Link
[Journal of Computing...]

Impact of Agile Software Development on Quality within Information Technology Organizations

Author Robert Imreh , Mahesh S. Raisinghani
ISSN 2079-8407
On Pages 460-475
Volume No. 2
Issue No. 10
Issue Date October 01, 2011
Publishing Date October 01, 2011
Keywords Project Quality Management, Agile Software Development, Continuous Quality Improvement, Agile Quality Improvement Model


Abstract

Quality and an emphasis on quality are must have ingredients for an organization to be successful. Therefore, in the present environment of fast pace software development, quality plays an essential role when it comes to the long term viability of IT organizations. As a result of continuous quality improvement, IT organizations have defined and implemented various quality processes and software development methodologies in order to achieve a higher quality standard. Currently, one of the most popular software development methodology is known as the Agile Software Development Methodology. Some IT organizations have been successful with the implementation of this new framework, while other IT organizations have experienced less success or complete failure. The purpose of this study is to provide some answers to the following thesis question that has not been answered yet by currently available literature related to Agile Software Development: in what ways does the implementation of Agile Software Development Methodology impacts quality within IT organizations? According to Dybå & Dingsøyr (2008, p.14), Agile Software Development, the innovative “movement”, has a considerable impact on organizations specialized in IT software development, and poses several hurdles that ultimately impact quality within IT organizations. This study takes a look at the impact of Agile Software Development on quality within the organizational, methodical, and cultural framework and provides industry standard recommendations to alleviate such impacts.  

Download Link
[Journal of Computing...]

File Systems in Linux and FreeBSD: A Comparative Study

Author Kuo-pao Yang , Katie Wallace
ISSN 2079-8407
On Pages 456-459
Volume No. 2
Issue No. 9
Issue Date September 01, 2011
Publishing Date September 01, 2011
Keywords Extended File System; Fast File System; Bonnie++; Iozone.


Abstract

This paper compares file systems in Ubuntu Linux and FreeBSD and then analyzes the best utilization. The generic file systems, Extended File System (EXT2) of Linux and Fast File System (FFS) of FreeBSD operating systems, are evaluated using benchmark tests. It is proposed that a better file system could be assembled and implemented for improving performance and reducing bottleneck with consideration of modern intricacies. 

Download Link
[Journal of Computing...]

A Dark Side of Computing and Information Sciences: Characteristics of Online Groomers

Author Petter Gottschalk
ISSN 2079-8407
On Pages 447-455
Volume No. 2
Issue No. 9
Issue Date September 01, 2011
Publishing Date September 01, 2011
Keywords online grooming, interviews, sexual offender, relationships, pedophile


Abstract

The European Online Grooming Project from 2009 to 2011 involved researchers from Norway, Italy, Belgium and the UK. The project had three separate but interlinked phases. The first was a scooping project. The second and third phases involved interviews with convicted online groomers across Europe and dissemination activity respectively. The key features of grooming behavior the study identified do not apply to all groomers in all contacts they have with young people. These features of online grooming include factors that help maintain the behavior such as the online environment, dissonance and offenders perceptions of young people and their behavior. The research also identified salient behaviors in the grooming process such as: scanning the online environment for potential people to contact, the identity adopted by the groomer (be it their own or another); the nature of contact with the young person; the different ways in which the online groomer can intensify the process of grooming and the diverse range of outcomes toward the end of the process. In particular, it is clear from the research that not all episodes of online grooming result in a physical meeting. The first ‘type’ of groomer identified is the distorted attachment offender. Men in this group had offence supportive beliefs that involved seeing contact with the young person as a ‘relationship’. The second type is the adaptable online groomer. This group of men had offence supportive beliefs that involved their own needs and seeing the victim as mature and capable. Finally, the hyper-sexualized group of men was characterized by extensive indecent image collections of children and significant online contact with other sexual offenders or offender groups.  

Download Link
[Journal of Computing...]

Rough Set adaptive in the Model Based of Cellular Automata and Multi-Agents

Author Yasser F. Hassan
ISSN 2079-8407
On Pages 440-446
Volume No. 2
Issue No. 9
Issue Date September 01, 2011
Publishing Date September 01, 2011
Keywords Cellular Automata, Rough Set, Multiagents, Emergence, Traffic System


Abstract

The need for intelligent systems has grown in the past decade because of the increasing demand on humans and machines for better performance. The researchers of AI have responded to these needs with the development of intelligent hybrid systems. ....

Download Link
[Journal of Computing...]

Imparting Tutorials using online E-Commerce Application and Virtualization concept of Standalone PC Environment

Author N.Rakesh, S.K.Srivatsa
ISSN 2079-8407
On Pages 427-439
Volume No. 2
Issue No. 9
Issue Date September 01, 2011
Publishing Date September 01, 2011
Keywords HTTP, NAT, RMI, SSL, VoIP


Abstract

We have acquired knowledge about virtualization through various sources and tutorial materials, which overcomes network resources investment for communication purpose. Accordingly using this virtualization communication perception, people in corporate world have developed Desktop Virtualization sharing and learning respectively online from their desktop system....
Download Link
[Journal of Computing...]

Intelligent Widget Reconfiguration for Mobile Phones

Author Peter K.K. Loh, C.T. Lau, B.H. Chan
ISSN 2079-8407
On Pages 426-413
Volume No. 2
Issue No. 9
Issue Date September 01, 2011
Publishing Date September 01, 2011
Keywords mobile phone, context-aware, intelligent interface, widget reconfiguration, neural network, rules


Abstract

A significant amount of research work in user interface design exists with a proportion of this extendable to mobile phone platforms. Some investigate the effect of user ability on interface generation for mobile applications. Other works analyzed how different contexts and mobile platforms affect the generation of these interfaces....


Download Link

[Journal of Computing...]

Effectiveness of Telecentre using a Model of Unified Theory of Acceptance and Use of Technology (UTAUT): Structural Equation Modeling Approach


Author Abdulwahab, L, Zulkhairi Md Dahalin
ISSN 2079-8407
On Pages 402-412
Volume No. 2
Issue No. 9
Issue Date September 01, 2011
Publishing Date September 01, 2011
Keywords ICTs, Digital divide, Developing countries, Disadvantage communities, User acceptance


Abstract

In most of the developing countries, Telecentres’ have been set up in some unserved and underserved areas. The purpose of this initiative is to provide an avenue for communal access to reduce the effect of digital divide. Even though, ...

Download Link


[Journal of Computing...]

Development of a Social Networking Site with a Networked Library and Conference Chat

Author Adebiyi Marion , Ogunlade Omotayo
ISSN 2079-8407
On Pages 396-401
Volume No. 2
Issue No. 8
Issue Date August 01, 2011
Publishing Date August 01, 2011
Keywords Social networking, talk2me, profiles, conference chat, blogging, resource sharing


Abstract

Social networking is an act of interacting/ sharing fun and some information popularly called profiles with known or unknown people (called friends) freely online. A social network service is an online interface, service, platform, or page that enables users exchange information and relate socially....


Download Link:
[Journal of Computing...]

Authentication and Virus Detection Enhancement for Client and Server Applications

Author Ghossoon. M. W. Al-Saadoon
ISSN 2079-8407
On Pages 390-395
Volume No. 2
Issue No. 8
Issue Date August 01, 2011
Publishing Date August 01, 2011
Keywords Secret-key cryptography, Netbean Software, AES symmetric encryption, Tcpdump sniffer, and MD5 Hash Cryptography.


Abstract

Security issues are a core part of distributed computing systems, and are part of everyday life since they are used in web servers, email, mobile phones, bank transactions etc. Applications which send an unencrypted password over a communication channel are extremely vulnerable....


Download Link:
[Journal of Computing...]

An RFID based E-commerce solution for the implementation of secure unattended stores


Author Athul Rathore , Raul Valverde
ISSN 2079-8407
On Pages 376-389
Volume No. 2
Issue No. 8
Issue Date August 01, 2011
Publishing Date August 01, 2011
Keywords RFID, E-commerce, Unattended stores, Security Systems


Abstract

The present research concentrates on automation of retail process that involves customers. One can save on total man power required to manage a physical retail store and store tills if RFID at item level is implemented in a retail store. One can reduce number of persons at Security / Payment till required at store counter and exit. Although RFID can automate and reduce human errors at payment counters. A commercial transaction takes place the moment a customer (buyer) reaches the store exit gate....

Download Link:



Accelerating Fast Fourier Transformation for Image Processing using Graphics Processing Unit

Author Mohammad Nazmul Haque, Mohammad Shorif Uddin
ISSN 2079-8407
On Pages 367-375
Volume No. 2
Issue No. 8
Issue Date August 01, 2011
Publishing Date August 01, 2011
Keywords Fast Fourier Transformation, GPGPU, CUDA, Image Processing, Frequency Domain Image Processing


Abstract

In a number of imaging modalities, the Fast Fourier Transform (FFT) is being used for the processing of images in its frequency domain rather than spatial domain. It is an important image processing tool which is used to decompose an image into its sine and cosine components. ..


Download Link:


[Journal of Computing...]