Accepted Papers

  • Operational Profile Modeling as a Risk Assessment Tool for Software Quality Techniques
    Omar AlShathry , Imam Mohammed Bin Saud University , Saudi Arabia

    A major share of software project investment is assigned to activities concerning the detection and removal of defects. Software project managers tend to apply the most efficient QA techniques to assure low defect density within their software project. However, the criteria of selecting a QA technique based on its efficiency is not always safe and cost effective. Software defects vary in their severity in terms of the magnitude of their negative impact on both the testing process and the whole project. Some defects would make intense implications if it passed to the operational use as it belongs to significant functional components of the software. The consideration of potential risk with some defects types should be taken into account when selecting a QA technique to avoid future failure. In this paper, we build on previous work of software quality optimization by proposing a model whereby QA decisions are normalized by the risk associated with their defects detection and removal activities.

  • Analysis of Various Attacks and Prevention of Dos Attack In P2P SIP Networks
    Pooja Nandu and Narendra Shekoker , D. J. Sanghvi college of engineering , India

    Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP. The main motivation for peer-to-peer (P2P) SIP is higher robustness as well as easy configuration and maintenance as compared to client-server SIP. However, these advantages come at the price of security. Securing against adversary nodes which intentionally interrupt functionality of the network remains a major research problem. So evaluation of attacks is of utmost importance for enhancing security and standardization of P2PSIP network communication. In this survey we analyze the security challenges of using a P2P network as a substrate for SIP communication by analyzing the attacks that can be launched against them. The proposed system presents the evaluation of different attacks that can be launched against the services (access control, routing, bootstrap, storage, communication, and resource management) of P2PSIP architecture. Assessment of attacks using security parameters (integrity, confidentiality, non-repudiation, availability, authenticity) shows that out of all the attacks DOS attack is the most dangerous attack and multiple layer security mechanism is proposed to prevent the DOS attack. With these solutions, P2PSIP networks will be more robust against flooding DOS attacks.

  • Rich Internet Applications Platforms and Tools - A Paradigm shift in Web User Experience
    Niranjan Mantha and Jitendra Maan , Tata Consultancy Services , India

    There has been a paradigm shift in the recent past where in the businesses started orchestrating the technical evolution as per the changing business needs. Earlier the webpages were more of static content and involved lot of traversing through pages to complete a transaction, now the web applications are very much dynamic, interactive and help the user complete the same transaction in a few clicks. The Rich Internet Ap-plication technologies added more twist to these changing terrains by providing desktop like features, sandbox security and many more features there by creating a revolution to the User Experience in the Web World.

  • A Study on User Interface Design to Increase Software Usability
    Sathish Kumar and Kamalraj Ramalingam , SNS College of Technology , India

    This article reviews how the user interface of a software can increase the usability of the software by helping all kind of users without consideration of age. Users can be divided into several categories. This article focuses how to design an interface that is suitable for all these users. The problems faced by the different set of users are concentrated here and the solution for those problems have been tried to be figured out on the basis of several previous researches. Then the common issues of all the users is discussed and based on that principles to satisfy all the needs is concluded. The difficulties faced by the users with physical impairments is also taken into consideration and the a study on the previous researches to overcome their issues is made.

  • Selection & Implementation of Component in Component based Development using Analytical Network Process
    Mahima Gupta and Devendra Somwanshi , Poornima College of Engineering , India

    Software companies are developing interest in making product that is reliable, need short development time and cost effective which moves them toward Component Based Development. In Component Based Development the selection of component is the most crucial part due to its 'Black-Box' nature. Many researches have been done in this field but they have their shortcomings like inadequate address of Non-functional requirements, use of Hierarchical Process, no learning from previous selection, no practical implementation. This paper presents the Component selection method using Analytical Network Process and its implementation for the selection of a component namely Payment Gateway for a commercial website. It not only makes the process automatic but also allows us to give preference to particular specification depending upon our situation and make the decision accordingly.

AIRCC Library


Technically Sponsored by