International Journal of Modern Education and Computer Science (IJMECS)

IJMECS Vol. 6, No. 2, Feb. 2014

Cover page and Table of Contents: PDF (size: 562KB)

Table Of Contents

REGULAR PAPERS

E-Learning in Web 3.0

By Maria Dominic Sagayaraj Francis Anthony Pilomenraj

DOI: https://doi.org/10.5815/ijmecs.2014.02.02, Pub. Date: 8 Feb. 2014

Web 2.0 is about social networking and collaboration between the creator and the user. Web 3.0 is termed as intelligent web or semantic web with technologies like big data, linked data, cloud computing, 3D visualization, augmented reality and more to make passive learner into active learner in the learning process. This paper identifies the characteristics of the different generations of web and its effect on the different generations of e-learning and also identifies the various issues related with web 3.0. Finally a study is made on the user preferences and recorded in this paper.

[...] Read more.
Design New Intelligent PID like Fuzzy Backstepping Controller

By Arzhang Khajeh Farzin Piltan Mohammad Reza Rashidian Afsaneh Salehi Ehsan pouladi

DOI: https://doi.org/10.5815/ijmecs.2014.02.03, Pub. Date: 8 Feb. 2014

The minimum rule base Proportional Integral Derivative (PID) Fuzzy backstepping Controller is presented in this research. The popularity of PID Fuzzy backstepping controller can be attributed to their robust performance in a wide range of operating conditions and partly to their functional simplicity. The process of setting of PID Fuzzy backstepping controller can be determined as an optimization task. Over the years, use of intelligent strategies for tuning of these controllers has been growing. PID methodology has three inputs and if any input is described with seven linguistic values, and any rule has three conditions we will need 7 × 7 × 7 = 343 rules. It is too much work to write 343 rules. In this research the PID-like fuzzy controller can be constructed as a parallel structure of a PD-like fuzzy controller and a PI-like controller to have the minimum rule base. However backstepping controller is work based on cancelling decoupling and nonlinear terms of dynamic parameters of each link, this controller is work based on manipulator dynamic model and this technique is highly sensitive to the knowledge of all parameters of nonlinear robot manipulator’s dynamic equation. This research is used to reduce or eliminate the backstepping controller problem based on minimum rule base fuzzy logic theory to control of flexible robot manipulator system and testing of the quality of process control in the simulation environment of MATLAB/SIMULINK Simulator.

[...] Read more.
An Analysis of Application Level Security in Service Oriented Architecture

By Said Nabi M. N. A. Khan

DOI: https://doi.org/10.5815/ijmecs.2014.02.04, Pub. Date: 8 Feb. 2014

In computing, the software elements like objects and components emphasize on reusability using design tools of abstraction and separation of concerns. Software architecture has appeared as an initial idea to develop huge, complicated and heterogeneous distributed systems successfully. Service Oriented Architecture (SOA) combines services together to make systems having a greater impact on the way software systems are developed. SOA addresses the need of standards-based, loosely connected, and distributed computing which is protocol independent. It is not easy to ensure the secure transaction of data, where the movement of data occurs through loosely connected services. A number of techniques have been proposed in the contemporary literature to guide the SOA implementation in distributed system. These techniques offer certain benefits, but pose some challenges alongside such as the use of meta-data as framework and standard, contract documents, security patterns and security adviser, etc. The objective of this research is to provide a comprehensive analysis of various approaches used to provide application level security to the web services in SOA. These approaches have been compared based on a number of parameters. In addition, we critically evaluate different security methods used in SOA. The study also discusses some future directions in this domain.

[...] Read more.
Research on Cultivation of Ethnic Minorities IT Talents in Nationalities Universities

By Shuang Liu Peng Chen

DOI: https://doi.org/10.5815/ijmecs.2014.02.05, Pub. Date: 8 Feb. 2014

To promote cultural and information undertakings of the ethnic minorities such as digital publication and network governance, a series of experience training programs for nationalities universities are established to cultivate high-quality IT technology talents. Here, Dalian Nationalities University is taken as an example. These training programs adopted a so called "four-phrases, five capabilities" training method. That is, four phrases consist of professional quality training, professional basic theory strengthening, job skills training and job practice, centering on training five capabilities of professional morality, software programming fundamentals, language competence, software engineering and project practice. Based on the training method, one well-rounded and multiple perspective assessment method are put forward. This assessment system integrated academic knowledge evaluation and professional competence assessment, adopting various forms such as coding, competition, discussion, peer review online and deliverables exhibition. These practice training courses break through the knowledge barrier and put emphasis on professional competence cultivation, which improves teaching quality and assesses learning effects objectively and fairly during teaching process.

[...] Read more.
Performing Inquisitive Study of PM Traits Desirable for Project Progress

By Sobia Zahra Ambreen Nazir Asra Khalid Ayesha Raana Nadeem Majeed

DOI: https://doi.org/10.5815/ijmecs.2014.02.06, Pub. Date: 8 Feb. 2014

The accountability of a project’s success/failure lies on shoulders of a PM (project manager). Undoubtedly, project management is tough task to bring about and this is the most challenging role within the project. The project manager role varies from project to project and may include communication & negotiation with stakeholders, along with leadership and management of the project. Therefore he must possess both hard and soft skills besides education and expertise to drive his team towards excellence. This scientific documentation presents an ideal blend of responsibilities and skills essential for a project manager to cope with the changing project environment. Technical skills necessary for an IT project manager, further elaborates this study.

[...] Read more.
Software Testing Resource Allocation and Release Time Problem: A Review

By Md. Nasar Prashant Johri Udayan Chanda

DOI: https://doi.org/10.5815/ijmecs.2014.02.07, Pub. Date: 8 Feb. 2014

Software testing Resource allocation and release time decisions are vital for the software systems. The objective behind such critical decisions may differ from firm to firm. The motive of the firm may be maximization of software reliability or maximization of number of faults to be removed from each module or it may be minimization of number of faults remaining in the software or minimization of testing resources. Taking into consideration these different aims, various authors have investigated the problem of resource allocation and release time problem. In this paper we investigate various software release policies and resource allocation problem, for example, policies based on the dual constraints of cost and reliability.

[...] Read more.
Suitability and Contribution of Agile Methods in Mobile Software Development

By Asra Khalid Sobia Zahra Muhammad Fahad Khan

DOI: https://doi.org/10.5815/ijmecs.2014.02.08, Pub. Date: 8 Feb. 2014

Boom of mobile app market is phenomenal and so are the challenges for developing these mobile applications. With changing mobile market technology and trends, various technical constraints for building these mobile apps also cropped up with time. Tradition development approaches are unable to tackle these challenges and technical limitations of mobile market. Analyzing this situation researchers have proposed numerous agile practices to develop people oriented mobile app which embrace their changing needs. This paper provides a brief overview of some effective and commonly used agile approaches that adds value to mobile software business. Suitability of these approaches to fit mobile needs is also discussed in this paper. It is suggested that agile innovations offer a solution for mobile applications and examine developer who are in quest of building high quality products.

[...] Read more.