C: Software & Data Engineering

C: Software & Data Engineering (217)

GJCST: C

The Convergence of location-aware devices, wireless communication, such as the increasing accuracy of GPS technology and geographic information system functionalities enables the deployment of new services such as location-based services (LBS). Achieve high quality or such services, spatio–temporal data mining techniques are needed. Our work concentrates on the developme...
Paper Information
Authors Mr. M.Jayakameswaraiah, Dr. S.Ramakrishna
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 33

Traditionally organizations invested more in decision support systems. With the evolution of business intelligence tools many organizations were able to get analytical reports based on OLAP systems. Now with the frequently changing trends in customer behaviour and customer markets there is a huge necessity for enterprises to get analytical reports beyond OLAP system based analysis. There...
Paper Information
Authors Lt. Dr. Santhosh Baboo & P Renjith Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23

Today‘s business environment is very much dynamic, and organizations are constantly changing their software requirements to adjust with new environment. They also demand for fast delivery of software products as well as for accepting changing requirements. In this aspect, traditional plan-driven developments fail to meet up these requirements. Though traditional software de...
Paper Information
Authors A B M Moniruzzaman, Dr. Syed Akhter Hossain
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 18

Cohesion is a very important quality attribute in software. As we know that there are number of cohesion metrics are proposed in the literature to measure the cohesion of software systems. These metrics gives undefined values for a large number of classes which comes under special cases. Because of this reason, these metrics became non-applicable for these classes as they are unable to g...
Paper Information
Authors Jaspreet Kaur, Rupinder Kaur
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 40

Serialization is a process of converting an object into a stream of data so that it can be easily transmittable over the network or can be continued in a persistent storage location. This storage location can be a physical file, database or Network Stream. This paper concludes some the work that is going on in the field of Object Serialization. This paper presents Object Serialization Te...
Paper Information
Authors Surbhi, Rama Chawla
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 49

A model clone is a set of similar or identical fragments in a model of the system. Understanding and Identifying model clones are important aspects in software evolution. During the Evolution of the Software product Cloning is often a strategic means for the same. Clone detection techniques play an important role in software evolution research where attributes of the same code entity are...
Paper Information
Authors Yachna Arora, Er. Sarita Choudhary
Read Journal Click Here
Read Paper Click Here
Page No. 50 to 53

In order for the initial result of this research to be obtained scientifically, a decision was made on setting the limits of the universe of users to be studied. For this end, the research was centered on the users of a Rio de Janeiro, Brazil, college and the EXCEL and MATLAB software were used. The Fuzzy Logic was employed to assess IPod usability. The methodology presented here by is u...
Paper Information
Authors Luciana Ju00c3u00a1come Basto Cordeiro, Luiz Fernando Ribeiro Parente Filho, Rodrigo Costa dos Santos, Walter Gassenferth, Maria Augusta Soares Machado
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 46

Modern business activities rely on extensive email exchange. Email leakage have became widespread throughout the world, and severe damage has been caused by these leakages it constitutes a problem for organization. We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties).If the data distributed to the third parties ...
Paper Information
Authors Rama Rajeswari Mulukutla, P.Poturaju
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 39

The scope of this study was to discover the association between facial expressions of students in an academic lecture and the level of comprehension shown by their expressions. This study focused on finding the relationship between the specific elements of learner’s behavior for the different emotional states and the relevant expression that could be observed from indivi...
Paper Information
Authors Dr. M. Mohamed Sathik, G.Sofia
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 33

Today, that business has different rules and regulation and supplied threats; organizations must go well beyond securing their data, and managing their database. Essentially, Data have to be perpetually monitored to be aware of who what, to all their data. Database auditing involves monitoring database to be aware of what user of proceedings. In this article we will offer a novel procedu...
Paper Information
Authors Elham Iskandarnia
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 11