Volume 8, Issue 2, March 2017

Comparative Analysis of Two Popular Agile Process Models: Extreme Programming and Scrum
Pages: 1-7 (7) | [Full Text] PDF (355K)
Faiza Anwer, Shabib Aftab, Syed Shah Muhammad Shah and Usman Waheed
Department of Computer Science, Virtual University of Pakistan

Abstract -
Since last two decades, agile software development methodologies have been one of the most debating topics for researchers. These are called light weight development methods because of informal, adaptive and flexible approach. These models are based on the collection of best practices which help to handle problems related to changing requirements, customer satisfaction, and product quality. A number of agile models are available to meet the needs of different projects. However Extreme Programming and Scrum are two most familiar and commonly used models. This study makes a valuable contribution by exploring these models in detail. In this paper a detailed comparison of Extreme programming and Scrum is conducted to find their similarities, differences and explores those features which complement each other.
 Index Terms - Extreme Programming, Scrum, Agile Models and Comparison
Design of a Fingerprint Biometric Authentication Technique for Electronic Examination
Pages: 8-15 (7) | [Full Text] PDF (595K)
Mohammed Babatunde Ibrahim, Abubakar Usman Othman, Olumide Sunday Adewale and Bukola Fatimah Balogun
Department of Computer Science, Federal University of Technology Minna, Nigeria
FederaUniversity of Technology Akure, Nigeria
Department of Computer Science, Kwara State University, Nigeria

Abstract -
The rapid growth of online examination using internet based tools in lieu with increasing reliance on technology and other shared resources has revolutionized the way authentication is being initiated and carried out in this information age. The unprecedented growth in electronic examination (e-exams) has underlined the need for more secure, faster and more suitable method of user’s verification than passwords can provide. Despite, the numerous advantages of biometric systems and its impact on various sectors across the globe, most users still face the issue of defining the right and accurate biometrics technology system in solving particular problems. This paper addresses the issue of accuracy by proposing an image enhancement approach that incorporates SecuGen fingerprint in conjunction with electronic learning environments to curb unethical conducts associated with electronic examination in a university environment. Minutiae points which are one of the unique features of fingerprints were extracted using the Crossing Number (CN) Concept by extracting the ridge endings and ridge bifurcations using the local neighborhoods of a ridge pixel from a 3 x 3 window. At authentication stage, the fingerprint is captured again with the extracted features compared with the templates stored in the database to determine a match before a student can login to write an examination.
 Index Terms - Fingerprint, Biometric, Electronic Examination, Learning and Authentication
A Survey of Embedded Cellular Technologies and Cellular Companies in Pakistan
Pages: 16-21 (6) | [Full Text] PDF (427K)
Rida Khalid and Irum Manzoor
Department of Computer Science and Engineering, University of Engineering and Technology, Lahore, Pakistan

Abstract -
A cellular network is a wireless communication network, in which different network entities play their role to establish a secure connection for transmission of data over a network. This paper provides an insight about different features required for an efficient transmission over a communication link for e.g. Wi-Fi, WiMAX, 3G and 4G. We have briefly explained the different cellular technologies used by cellular networks nowadays and their comparison based upon the data rates, speeds and currently used technologies. Finally, we have summarized the comparison of various cell phone service providers in Pakistan with the hope that the future of the struggling telecommunication industry in Pakistan will be bright for future generations to come.
 Index Terms - Comparison, Frequency, GSM, Organization, Subscribers and 3G
Psychiatric Outreach Expert (Rule-Based System)
Pages: 22-26 (5) | [Full Text] PDF (314K)
Abdulhameed Idris A., Oladejo Bolanle F. and Iwayemi Ayodeji
Department of Computer Science, University of Ibadan, Nigeria
Department of Computer Engineering, The Federal Polytechnic, Ile-Oluji, Nigeria

Abstract -
This paper presents a Psychiatric Outreach Expert system. It is used to know if the applicant needs the services of the “center for psychiatrically impaired elderly”. It also evaluates the regular patients to determine if they are still appropriate for the services rendered by the center. The language of implementation is the SWI-Prolog. Facts and rules were formulated from the knowledge acquired from the human expert. This paper therefore, discusses the task the Psychiatric Expert System (PES) performs, the problem-solving paradigm involved, the knowledge contained in the system, and the lessons learned from designing and building the system. In addition, it highlights some future works to be done to make the project more standard.
 Index Terms - Psychiatry, Psychiatric Expert System and Human Expert
Automatic Parallelization Model for Processors
Pages: 27-33 (7) | [Full Text] PDF (278K)
Asif Ali and Zahid Anwar
Department of Computer Science, COMSATS Institute of Information Technology, Vehari, Pakistan

Abstract -
Performance Improvements and decreasing execution time had been started half a century ago, along with the development of new chipsets and microprocessors with increased clock speeds, the software engineers have also developed ways to increase the performance of their developed systems by introducing new language constructs and other performance improvements. As we know there are many software modules that are complex like airline monitoring systems, multi-variable differential equations, AutoCAD 3D drawing, and HD graphics video games that require immense computations that a single processor could not perform. The solution to this problem is to utilize the ubiquitous commodity of modern world – The Multi-Core Processors. A major hurdle in utilizing this commodity is the overhead needed at the developer end to convert a single threaded application into a multi-threaded application. This paper intends to find a comprehensive model that could be used to overcome this hurdle by introducing new pragmas in existing code, or tweaking in the compiler so that automatic parallelization is introduced at the compiler level.
 Index Terms - Automatic Parallelization, Multi-Threaded Execution and Performance Improvements
An Improved KNN Classifier for Anomaly Intrusion Detection System Using Cluster Optimization
Pages: 34-38 (5) | [Full Text] PDF (575K)
Oladeji Patrick Akomolafe and Adeleke Ifeoluwa Adegboyega
Department of Computer Science, University of Ibadan

Abstract -
With the emergence of anomaly intrusion detection system, varieties of unknown intrusions that was not detected by the misuse or signature based intrusion detection system can now be identified. Anomaly intrusion detection system works by building profiles of normal system state or user behavior, applications and network traffic and continuously monitor the network's activity so that deviations from the established profiles of normal system state are interpreted as attacks or intrusions. Anomaly intrusion system is efficient but has its weaknesses due to problems arising during classification of known and unknown intrusions such as difficulty of building models of robust behaviours, high false alerts rate caused by incorrect classification of events in current existing system. This paper presents an improved, modified KNN classifier using clustering optimization which is more effective at curbing both known and known intrusions in existing anomaly intrusion detection system. In this paper, we input the attributes of the NSL-KDD training dataset to be classified by the improved KNN (Known Nearest Neighbor) classifier with clustering optimizer inclusive after its been verified by k-mean clustering algorithm and optimized by genetic algorithm respectively. We then evaluate the performance of the improved KNN classifier and compare with the existing KNN classifier and the result showed the existing classifier had a correctly classified test data instance of 98.7% efficiency and 0.2395% for the incorrectly classified instances while the newly developed classifier had a 99.6% efficiency for the correctly classified instances and 0.3222% for the incorrectly classified instances.
 Index Terms - Anomaly Intrusion Detection, High False Alerts, Known/Unknown Intrusions, Known Nearest Neighbor Classifier, KDD, Clustering Optimizer and Genetic Algorithm
Pipeline Infrastructure Vandalism Monitoring using Wireless Sensor Networks Technique
Pages: 39-42 (4) | [Full Text] PDF (433K)
Yunana Kefas, Adewale Olumide Sunday, Abdullahi Muhammad Bashir and Alfa A. Abraham
Federal University of Technology, Minna, Nigeria
Federal University of Technology, Akure, Nigeria

Abstract -
Wireless Sensor Networks are crucial substructure made up of microcontroller, sensing units and communication interfaces that is designed to enable the users possess the capability to measure, collect and responds to phenomenon within the surrounding been monitored. WSN are viewed as an edge between the physical and the virtual world. More so, the demand of fluid transportation from the production point to the region of end users has led to an increase in the number of pipelines that are fabricated globally. The paper presents architecture deployed to the pipeline structure to measure the flow rate, pressure and temperature at the inlet and outlet of the pipeline and then send the sensed data to the control centre via their communication links for immediate response. The simulation procedure carried out using MATLAB Simulink environment shows the capability of the system to detect leakage along the pipeline as evident in the flow and pressure measurement trend of the graphical output results.
 Index Terms - Wireless Sensor Networks, Pipeline, Pipeline Infrastructure, Nigeria and Monitoring