فهرست مطالب

Journal of Advances in Computer Engineering and Technology
Volume:4 Issue: 1, Winter 2018

  • تاریخ انتشار: 1396/11/12
  • تعداد عناوین: 6
|
  • Zahra Baatmaanghelich, Ali Rezaee *, Sahar Adabi Pages 1-6

    One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics of these systems, formal methods are used for specification, description and verification. The goal of this research is to turn a business process graphical diagram into a formal based model. In this work, BPMN has been extended to add time and probability information and then has been transferred to probabilistic real-time CSP area. This mapping can be employed as a basic model for modeling different system characteristics. This mapping, then, is modeled using a case study in pervasive healthcare domain and verified in a model checking tool. 

    Keywords: Formal methods, CSP, BPMN, Pervasive healthcare, Model checking
  • Amin Moradbeiky *, Amid Khatibi Bardsiri Pages 7-12
    Software project management has always faced challenges that have often had a great impact on the outcome of projects in future. For this, Managers of software projects always seek solutions against challenges. The implementation of unguaranteed approaches or mere personal experiences by managers does not necessarily suffice for solving the problems. Therefore, the management area of software projects requires tools and means helping software project managers confront with challenges. The estimation of effort required for software development is among such important challenges. In this study, a neural-network-based architecture has been proposed that makes use of PSO algorithm to increase its accuracy in estimating software development effort. The architecture suggested here has been tested by several datasets. Furthermore, similar experiments were done on the datasets using various widely used methods in estimating software development. The results showed the accuracy of the proposed model. The results of this research have applications for researchers of software engineering and data mining.
    Keywords: Development effort estimation, Nerual Networks, Particle swarm optimization, software project
  • Marzieh Faridi Masouleh * Pages 13-20
    Business intelligent (BI) technologies have been adopted by different types of organizations. The banking sector is among the service industry that has been largely influenced by technology currently. This has been manifested in the way the operations of banking have evolved from the pure exchange of cheques, cash, as well as other negotiable platforms to the application of IT (information Technology) to transact business in this service industry. The study conducted on impacts of business technologies adoption among Iranian Banks revealed that the adoption has made banking industry in Iran to be competitive and have improved operational efficiencies. However, in terms of Risk reduction, BI technologies if not used appropriately it can lead to the downfall of these banks. BI solutions allow banking industry in Iran to use the available data to exploit the competitive advantage as well as have an improved understanding of the demands and needs of customers by facilitating effective communication.
    Keywords: Business intelligent, improved marketing, Information Technology, data
  • Rahimeh Habibi *, Ali Haroun Abadi Pages 21-26
    Today, e-commerce has occupied a large volume of economic exchanges. It is known as one of the most effective business practices. Predicted trust which means trusting an anonymous user is important in online communities. In this paper, the trust was predicted by combining two methods of multiplex network and community detection. In modeling the network in terms of a multiplex network, the relationships between users were different in each layer and each user had a rank in each layer. Then, the ratings of two layers including the weight of each layer were aggregated and four effective features of the Trust were achieved. Then, the network was divided into overlapping groups via community detection’ algorithms, each group representative was considered as the community centers and other features were extracted through similar comments. At the end, 48J decision tree algorithm was used to advance the work. The proposed method was assessed on Epinions data set and accuracy of trust was 96%.
    Keywords: Trust, Community Detection, Multiplex Network, Social network
  • Ramin Saljoughinejad *, Vahid Khatibi Pages 27-40
    The literature review shows software development projects often neither meet time deadlines, nor run within the allocated budgets. One common reason can be the inaccurate cost estimation process, although several approaches have been proposed in this field. Recent research studies suggest that in order to increase the accuracy of this process, estimation models have to be revised. The Constructive Cost Model (COCOMO) has often been referred as an efficient model for software cost estimation. The popularity of COCOMO is due to its flexibility; it can be used in different environments and it covers a variety of factors. In this paper, we aim to improve the accuracy of cost estimation process by enhancing COCOMO model. To this end, we analyze the cost drivers using meta-heuristic algorithms. In this method, the improvement of COCOMO is distinctly done by effective selection of coefficients and reconstruction of COCOMO. Three meta-heuristic optimization algorithms are applied synthetically to enhance the process of COCOMO model. Eventually, results of the proposed method are compared to COCOMO itself and other existing models. This comparison explicitly reveals the superiority of the proposed method.
    Keywords: COCOMO 81, effort estimation, software project, Accuracy, Optimization
  • Ali Shlig *, Amer Saleem Elameer Pages 42-50
    the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to solve this Steganography may be characterized as the science of concealing or embedding “data” done a transmission medium. Its final objectives, which would undetectability, heartiness Furthermore ability of the stowed away data, are those principle Components that recognize it from cryptography. In this paper an investigation for advanced picture Cryptosystem with versatile Steganography need been exhibited. The issue from claiming information hidey need been struck starting with two directions. Those to start with methodology tries should succeed those focused on Steganalytic strike. The worth of effort keeps tabs basically on the 1st request facts built focused on strike.
    Keywords: Steganography, networks, applications