Wednesday 25 September 2019

Multithreading in Game Development

Volume 13 Issue 4 April - June 2019

Research Paper

Multithreading in Game Development

Sainath Prasanna*, Shraddhaa Mohan**, Vallidevi Krishnamurthy ***
*_*** Department of Computer Science, SSN College of Engineering, Kalavakkam, Chennai, India.
Prasanna, S., Mohan, S., Krishnamurthy, V. (2019). Multithreading in Game Development. i-manager's Journal on Software Engineering, 13(4), 34-42. https://doi.org/10.26634/jse.13.4.16034

Abstract

In this paper, the use and importance of multithreading is discussed using the example of a basic game development in the java environment. This paper talks about how the concept of multithreading allows programmers to write simpler, more easily understandable code when it comes to making games or any other application that can be viewed as, being broken down into several independent tasks. In this paper, the difference in approaching a problem say game development in two ways - a single threaded model and a multithreaded model has been elucidated. With the experimentation, it has been concluded that in terms of performance and ease of development, multithreaded programming is better in all means.

Student Data Integration and Consolidation System

Volume 13 Issue 4 April - June 2019

Research Paper

Student Data Integration and Consolidation System

Nishith Khandor*, Dhruv Mehta**, Zirak Mistry***, Ayush Mittal****, Sagar Korde*****
*-***** K.J. Somaiya College of Engineering, Mumbai, Maharashtra, India.
Khandor, N., Dhruv, M., Mistry, Z., Mittal, A., & Korde, S. (2019). Student Data Integration and Consolidation System. i-manager's Journal on Software Engineering, 13(4), 24-33. https://doi.org/10.26634/jse.13.4.15934

Abstract

With the advent of Information Technology in today’s time, there is no dearth of increasing requirements for storing and retrieving data. As the data produced per year increases at an explosive rate, storing this data and representing it in a well-structured format and in a timely manner is one of the biggest issues today for the organizations and institutions. This paper proposes an approach to manage and access large amounts of distributed unstructured data of an organization in an efficient manner. Hence, a web-application has been designed to efficiently access and manage the data and to save precious time spent in accessing the distributed data. This system also makes an attempt to solve the problem of data availability and data accessibility, both of which are very important from an organization’s point of view that works with data on a day-to-day basis. Data security for organizations is very important and hence the system also incorporates a security feature with the help of the SSL technology which will ensure that data transfer remains private and integral over the internet during the client and server communication. Also the paper proposes the methodology which describes the basic features provided by the web-application along with a set of special features that can help reduce effort and provide useful analysis and data visualization based on the data of the organization.

Speech to 3D Scene Generation

Volume 13 Issue 4 April - June 2019

Review Paper

Speech to 3D Scene Generation

Manthan Turakhia*, Umang Nandu**, Prayesh Shah***, Siddharth Sharma****, Sagar Korde*****
*_*****Department of Information Technology, K. J. Somaiya College of Engineering, Mumbai, India.
Turakhia, M., Nandu, U., Shah, P., Sharma, S., & Korde, S. (2019). Speech to 3D Scene Generation. i-manager's Journal on Software Engineering, 13(4),16-23. https://doi.org/10.26634/jse.13.4.15903

Abstract

3D scenes and graphics are widely used in the creative industry. However, the entire task of imagination and then depicting the same as 3D graphics is done manually today, which consumes a lot of time, not to mention the inability to depict the scene precisely as imagined. We aim to reduce human efforts for the same by generating 3D scenes described by the user with precision.
On the other hand, some industries currently lack the use of appropriate technology to make their tasks easier and more captivating, such as the education industry. We intend to replace the existing methods of teaching and learning by using speech to 3D scene generation to depict exactly what the professor is trying to explain.

Time Estimation as Critical Factor of Software Failure: A Systematic Literature Review Protocol

Volume 13 Issue 4 April - June 2019

Research Paper

Time Estimation as Critical Factor of Software Failure: A Systematic Literature Review Protocol

Warda Shah*
City University of Science and Information Technology, Peshawar, Khyber, Pakistan.
Shah, W. (2019). Time Estimation as Critical Factor of Software Failure: A Systematic Literature Review Protocol. i-manager's Journal on Software Engineering, 13(4), 10-15. https://doi.org/10.26634/jse.13.4.15775

Abstract

Time estimation is always considered as one of the success factor for any software project. The study is related to software projects failure and the role of time estimation in the success of any software project. The objective of this research is to find all those factors that can effect timely delivery of software and increase the actual time estimation. Findings these factors are necessary so that actions can be taken in the beginning of the project. Systematic Literature Review (SLR) will be conducted to achieve the aforementioned goals. SLR being more formally planned is different from ordinary literature review. SLR protocol is developed and executed in different digital libraries and as a result of inclusion and exclusion criteria applied, we have finalized more than 20 papers. The final output will be the extraction of all those factors from different research studies that can influence the estimated time of projects. The results will help us to identify any research gap where more work is possible for successful and timely delivery of software projects.

The Effect of Attacker on three of Sampling Strategies in Active Learning

Volume 13 Issue 4 April - June 2019

Research Paper

The Effect of Attacker on three of Sampling Strategies in Active Learning

Ghofran M. Alqaralleh*, Mohammad A. Alshraideh**, Ali Rodan***
*_***Department of Computer Science, University of Jordan, Amman, Jordan.
Alqaralleh, G. M., Alshraideh, M. A., & Alrodan, A. (2019). The Effect of Attacker on three of Sampling Strategies in Active Learning. i-manager's Journal on Software Engineering, 13(4), 1-9. https://doi.org/10.26634/jse.13.4.16051

Abstract

Due to the importance of active learning, it is used in a lot of sensitive applications. But, these applications found in the environments where there are adversaries act to limit or prevent an accurate performance and destroy the normal activity of the application system. The active learning is vulnerable in the sampling stage in an adversarial environment such as the application of intrusion detection system, and attempt to sabotage the model at this stage is the guarantee for the failure or sabotage the work of the model and inaccuracy. The aim of the attacker is to maximally increase the learned model risk. In the sampling stage, the representative or most informative instances will be selected from unlabeled data to label based on the sampling strategy, but these unlabeled data not checked before being offered to the selecting process. So, the attacker will impact this stage to misguide the active learner through polluted the unlabeled instances. The contribution to this paper is studying the effect of the attacker on the strategies that used in the selection of most informative instances in active learning for network intrusion detection and whether the effect varies depending on the strategy that used. The experimental results showed that the expected model change strategy not significantly affected by the attack compared with other strategies.

A Case Study: Risk Rating Methodology for E-Governance Application Security Risks

Volume 13 Issue 3 January - March 2019

Case Study

A Case Study: Risk Rating Methodology for E-Governance Application Security Risks

B. S. Kumar*, V. Sridhar**, K. R. Sudhindra***
* Scientist `F', Electronics Test and Development Centre (ETDC), Bangalore, India.
** Department of Electronics and Communication Engineering, Nitte Meenakshi Institute of Technology, Bangalore, India.
*** Department of Electronics and Communication Engineering, B M S College of Engineering, Bangalore, Karnadaka, India.
Kumar, B. S., Sridhar, Sudhindra, K. R. (2019). A Case Study: Risk Rating Methodology for E-Governance Application Security Risks, i-manager's Journal on Software Engineering, 13(3), 39-44. https://doi.org/10.26634/jse.13.3.15546

Abstract

Over the last few years, e governance in India has made rapid progress and adopted global best practices in terms of citizen-centricity, reach, connectivity, efficiency, transparency, accountability and availability. Multiple modes and ease of access, seamless connectivity and availability, user friendliness and efficiency of e-governance services have opened up avenues making e-governance services most prone to serious security risks. International trends and domestic experiences show that the e-governance services are constant targets of organized crime by hackers and prominent government sites are being probed daily. The security threat landscape for e-governance applications constantly changes and new type of vulnerabilities keeps manifesting. In today's race to build cutting-edge e-governance business solutions, web applications are being developed and deployed with lesser attention to critical and widespread security threats. The government can no longer afford to tolerate security issues with high risk values, which could hinder delivery of services and impact the confidentiality, integrity and availability of information. To mitigate with appropriate countermeasures and security controls, it is required to evaluate and estimate risks associated with e-governance applications security issues that can be exploited. In this context, this paper outlines the risk rating methodology from e-governance perspective to estimate risk associated with security issues at application layer that are critical and widespread.

A Review on Software Testing and its Methodology

Volume 13 Issue 3 January - March 2019

Review Paper

A Review on Software Testing and its Methodology

Jannat Ahmad*, Abu ul Hassan**, Tahreem Naqvi***, Tayyaba Mubeen****
*,***-**** BS, Department of Computer Science, Superior College, Lahore, Pakistan.
** Faculty Member, Department of Computer Science, Superior College, Lahore, Pakistan.
Ahmad, J., Hassan, A. U., Naqvi, T., Mubeen, T. (2019). A Review on Software Testing and its Methodology, i-manager's Journal on Software Engineering, 13(3), 32-38. https://doi.org/10.26634/jse.13.3.15515

Abstract

Software Testing is very important and time intense portion of the software development life cycle as its persistence is to perceive failures in software, so that flaws may be improved and adjusted at the initial stage. Software Testing is a practice for approving that the product/software/program, that has been developed by programmers/coder, is an excellent or quality creation and to guarantee that the synthetic product is functioning and agreeing to the requirement, satisfying the consumer/client needs. There are many approaches to software testing. Testing is a procedure of training a program with precise intent of discovering errors before preceding its delivery to end user. Software Testing is the method of performing a program to locate an error. This paper defines generally used software testing techniques for identifying error and they are white box testing, black box testing and grey box testing. Software testing, in cooperation in terms of quality excellence and consistency, is very essential. In this article, authors describe the testing software and its objectives and testing altered software, debugging software. After a full explanation of software testing, test methods include Black Box and White Box and Gray Box delivered and the variances and advantages and disadvantages of the three methods calculated. And well methods have acknowledged three methods of software testing.