C: Software & Data Engineering

C: Software & Data Engineering (217)

GJCST: C

That e-governance is the concept and structure of the system and the functions and activities of all activities and processes in e-business on the one hand the level of e-government and business on the other. Because the government sector as a significant proportion of the total economic sectors in most countries of the world, and the fact that dealing with the public sector is not limit...
Paper Information
Authors Dr.Yasser Elmalik Ahmed Seleman
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

Developing high-quality reliability models is one of the key concerns in the domain of software reliability. The enhanced software reliability model ought to give superior predictions of upcoming malfunction manners, calculate helpful quantities and be extensively relevant. Hence, an extremely significant purpose of existing software reliability study is to build up broad prediction mode...
Paper Information
Authors K.Venkata Subba Reddy, Prof. I. Ramesh Babu
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 17

Home Automation increases safety, time- saving and right resources utilization and deploys software engineering holistic view through achieving high quality and cost effectiveness. This article presents an Optical Wireless Home Automation System that allows the user to control home appliances by using Android application, mobile phones and optical hardware. The implementation of this pro...
Paper Information
Authors Mohamed Al-Jaafreh, Tahseen Al-Ramadin, Malek Al-Ksasbeh, Ahmed Saidan
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 12

In Software Engineering, an important activity is measuring of the Software in different ways. For Measuring the Software, appropriate metrics are needed. Using Software metrics we are able to attain the various qualitative and quantitative aspects of Software. To measure the Software in terms of quality, size, efforts, efficiency, and reliability, performance etc. we have different metr...
Paper Information
Authors Preety Verma Dhaka, Dr. Amita Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Day to day Social network information growth pursues an exponential pattern, and Present DB management systems cannot manage efficiently such a huge volume of data. It is essential to employ a “big data” solution for Social network problems. One of the most important problems in Social network is finding User likeness (ULi). Current methods for finding ULi ar...
Paper Information
Authors D. Ravikiran, Dr. S.V.N Srinivasu
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 36

Clustering is a technique in data mining which divides given data set into small clusters based on their similarity. K-means clustering algorithm is a popular, unsupervised and iterative clustering algorithm which divides given dataset into k clusters. But there are some drawbacks of traditional k-means clustering algorithm such as it takes more time to run as it has to calculate distanc...
Paper Information
Authors Juhi Katara, Naveen Choudhary
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

This paper proposes an overview of the approach to design management computer applications using advanced programming languages and having the Visual Basic demonstration as support, which is one of the most popular object-oriented programming languages, in the area of programmer training. After a brief introduction to the Visual Basic syntax instructions for working with files, the descr...
Paper Information
Authors Dr. Dan Mircea Tranu00c4u0192
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 21

Virtual classroom is an irreplaceable part of distant learning systems and an important direction in the online education research field. A number of research works have been carried out in this area and many of them have been successfully implemented. However, most of them are video tutorial-based learning portal and video streaming classroom. In this paper, a model of real-time interac...
Paper Information
Authors Md Zobair Khondaker Rion, Md Mahmudul Hasan
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 13

Sufficient warehousing management is critical for procurement, storage and delivery of software component. Therefore it is important to find and implement the optimized warehousing system. In Component based software Engineering, it is considered a two-level multi product warehousing control system which controls the requirement of user and fast development of system in the age of hard c...
Paper Information
Authors Dr.P.K.Suri, Karambir
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 27

Distributed Denial of Service (DDoS) attacks is large-scale cooperative attacks launched from a large number of compromised hosts called Zombies are a major threat to Internet services. As the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security methodologies do not provide effective defense against...
Paper Information
Authors Sumathi Rani Manukonda, Dr. Koppula Srinivas Rao
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 25