There are various root causes of software failures. Few years ago, software used to fail mainly due to functionality related bugs. That used to happen due to requirement misunderstanding, code issues and lack of functional testing. A lot of work has been done in past on this and software engineering has matured over time, due to which software’s hardly fail due to functionality related bugs. To understand the most recent failures, we had to understand the recent software development methodologies and technologies. In this paper we have discussed background of technologies and testing progression over time. A survey of more than 50 senior IT professionals was done to understand root cause of their software project failures. It was found that most of the softwares fail due to lack of testing of non-functional parameters these days. A lot of research was also done to find most recent and most severe software failures. Our study reveals that main reason of software failures these days is lack of testing of non-functional requirements. Security and Performance parameters mainly constitute non-functional requirements of software. It has become more challenging these days due to lots of development in the field of new technologies like Internet of things (IoT), Cloud of things (CoT), Artificial Intelligence, Machine learning, robotics and excessive use of mobile and technology in everything by masses. Finally, we proposed a software development model called as T-model to ensure breadth and depth of software is considered while designing and testing of software.
The future of software engineering: Visions of 2025 and beyond IJECEIAES
In the current technological scenario of the industry and businesses, there has been increasing need of software within systems and also an increasing demand being put onto software-intensive systems. This in effect will lead to a significant evolution of software engineering processes over the next twenty years. This is due to the fact of emerging technological advancements like Industry 4.0 and Internet of Things in the IT field, among other new developments. This paper addresses and tries to analyses the key research challenges being faced by the software engineering field and articulates information that is derived from the key research specializations within software engineering. The paper analyses the past and current trends in software engineering. The future of software engineering is also looked with respect to Industry 4.0 which including emerging technological platforms like Internet of Things. The societal impact aspect of future trends in software engineering is also addressed in this paper.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
The future of software engineering: Visions of 2025 and beyond IJECEIAES
In the current technological scenario of the industry and businesses, there has been increasing need of software within systems and also an increasing demand being put onto software-intensive systems. This in effect will lead to a significant evolution of software engineering processes over the next twenty years. This is due to the fact of emerging technological advancements like Industry 4.0 and Internet of Things in the IT field, among other new developments. This paper addresses and tries to analyses the key research challenges being faced by the software engineering field and articulates information that is derived from the key research specializations within software engineering. The paper analyses the past and current trends in software engineering. The future of software engineering is also looked with respect to Industry 4.0 which including emerging technological platforms like Internet of Things. The societal impact aspect of future trends in software engineering is also addressed in this paper.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
In this presentation, Sreekar introduces the topic of IoT and talks about challenges and trends that will impact the space in the next five years. His interest area is embedded access control.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.
Learn how touch is becoming the new normal for how clinicians work and share information. Visit the Intel Health & Life Sciences Community for more conversations, blogs, videos, and white papers on the impact of mobility and touch in healthcare environments. For more on Healthcare IT engage here:
Twitter: www.twitter.com/IntelHealthIT
LinkedIn: http://www.linkedin.com/company/it-center?trk=company_name
Community: https://communities.intel.com/community/itpeernetwork/healthcare
Forensic the word which indicate the detective work, which searches for and attempting to discover information. Mainly search is carried out for collecting evidence for investigation which is useful in criminal, civil or corporate investigations. Investigation is applicable in presence of some legal rules.
As criminals are getting smarter to perform crime that is, using data hiding techniques such as encryption and steganography, so forensic department has become alert has introduced a new concept called as Digital Forensic, which handles sensitive data which is responsible and confidential.
Internet of things is one of the catch words now a day.
It promises a great future for the internet. Today common types
of communications are person to person, machine to person, or
person to machine. But Internet of things brings a new
technology where a type of communication is machine to
machine. Many technology and protocols have been studied for
this new communication. One of the new and emerging
technologies is VMware Pulse IoT center which provides IoT
device management in a pretty manner. It serves as management
glue between hardware. This paper will take a look on features,
benefits and working of VMware pulse IoT center including
summary of IoT solutions by VMware pulse IoT center.
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
With the advancements of technology, security is at risk. In this article, we discuss how the emergence of IoT and AI impacts cloud computing vulnerability.
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
Hyperparameter optimization using custom genetic algorithm for classificatio...IJECEIAES
Hyperparameter optimization is one of the main challenges in deep learning despite its successful exploration in many areas such as image classification, speech recognition, natural language processing, and fraud detections. Hyperparameters are critical as they control the learning rate of a model and should be tuned to improve performance. Tuning the hyperparameters manually with default values is a challenging and time-intensive task. Though the time and efforts spent on tuning the hyperparameters are decreasing, it is always a burden when it comes to a new dataset or solving a new task or improving the existing model. In our paper, we propose a custom genetic algorithm to auto-tune the hyperparameters of the deep learning sequential model to classify benign and malicious traffic from internet of things-23 dataset captured by Czech Technical University, Czech Republic. The dataset is a collection of 30.85 million records of malicious and benign traffic. The experimental results show a promising outcome of 98.9% accuracy.
In this presentation, Sreekar introduces the topic of IoT and talks about challenges and trends that will impact the space in the next five years. His interest area is embedded access control.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.
Learn how touch is becoming the new normal for how clinicians work and share information. Visit the Intel Health & Life Sciences Community for more conversations, blogs, videos, and white papers on the impact of mobility and touch in healthcare environments. For more on Healthcare IT engage here:
Twitter: www.twitter.com/IntelHealthIT
LinkedIn: http://www.linkedin.com/company/it-center?trk=company_name
Community: https://communities.intel.com/community/itpeernetwork/healthcare
Forensic the word which indicate the detective work, which searches for and attempting to discover information. Mainly search is carried out for collecting evidence for investigation which is useful in criminal, civil or corporate investigations. Investigation is applicable in presence of some legal rules.
As criminals are getting smarter to perform crime that is, using data hiding techniques such as encryption and steganography, so forensic department has become alert has introduced a new concept called as Digital Forensic, which handles sensitive data which is responsible and confidential.
Internet of things is one of the catch words now a day.
It promises a great future for the internet. Today common types
of communications are person to person, machine to person, or
person to machine. But Internet of things brings a new
technology where a type of communication is machine to
machine. Many technology and protocols have been studied for
this new communication. One of the new and emerging
technologies is VMware Pulse IoT center which provides IoT
device management in a pretty manner. It serves as management
glue between hardware. This paper will take a look on features,
benefits and working of VMware pulse IoT center including
summary of IoT solutions by VMware pulse IoT center.
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
With the advancements of technology, security is at risk. In this article, we discuss how the emergence of IoT and AI impacts cloud computing vulnerability.
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
Hyperparameter optimization using custom genetic algorithm for classificatio...IJECEIAES
Hyperparameter optimization is one of the main challenges in deep learning despite its successful exploration in many areas such as image classification, speech recognition, natural language processing, and fraud detections. Hyperparameters are critical as they control the learning rate of a model and should be tuned to improve performance. Tuning the hyperparameters manually with default values is a challenging and time-intensive task. Though the time and efforts spent on tuning the hyperparameters are decreasing, it is always a burden when it comes to a new dataset or solving a new task or improving the existing model. In our paper, we propose a custom genetic algorithm to auto-tune the hyperparameters of the deep learning sequential model to classify benign and malicious traffic from internet of things-23 dataset captured by Czech Technical University, Czech Republic. The dataset is a collection of 30.85 million records of malicious and benign traffic. The experimental results show a promising outcome of 98.9% accuracy.
Network security is one of the foremost anxieties of the modern time. Over
the previous years, numerous studies have been accompanied on the
intrusion detection system. However, network security is one of the foremost
apprehensions of the modern era this is due to the speedy development and
substantial usage of altered technologies over the past period. The
vulnerabilities of these technologies security have become a main dispute
intrusion detection system is used to classify unapproved access and unusual
attacks over the secured networks. For the implementation of intrusion
detection system different approaches are used machine learning technique
is one of them. In order to comprehend the present station of application of
machine learning techniques for solving the intrusion discovery anomalies in
internet of thing (IoT) based big data this review paper conducted. Total 55
papers are summarized from 2010 and 2021 which were centering on the
manner of the single, hybrid and collaborative classifier design. This review
paper also includes some of the basic information like IoT, big data, and
machine learning approaches are discussed.
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
Industry 4.0 or the fourth industrial revolution, which has been introduced by German government in 2012 [1], which is depends on the integration of different categories of electrical and electronic devices, from personal computers, smartphones, smartwatches, machinery robotics and enterprise resource planning systems, which can be integrated together and communicated with others to analyse the optimal criteria of potential solutions for improving productivity via internet [2]. however, the requirements of the new technology will force the old technology to retired. which will will force the big companies to change the specification of the industrial components to keep up with the latest processors. Ultimately, the goal of Industry 4.0 is to produce smarter and resource-efficient factories which are more productive and competitive says Mika Lomax [3]. Which mean that the Devices are getting smarter. "Not only does the IIoT enable real-time monitoring on smartphones and via emails, but, in plants, everyone has LCDs (liquid-crystal displays), TV screens and marquees showing the production staff useful information," says Kumar. "The technology in the modern HMI, including drivers and connectivity, is moving to message displays and marquees. This will enable programming and monitoring in these smart displays. Technology is pushing PLC and HMI functionality to text displays and it will all be connected to the IIoT."[4] The characteristics of high-technology industries include steady order quantities, standardized product features and high product value [3].
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxcowinhelen
Running head: INTERNET OF THINGS1
INTERNET OF THINGS10
Internet of Things
Ideation Process
Innovation technology is mainly concerned with the introduction of a new idea into the market. Any basic innovation technology has an ideation process as its basis. Ideation becomes the most basic step. During this stage, a thought is generated. From this thought, an idea is analyzed and provided. The analysis process is done purposefully to determine the feasibility of the implementation of the developed idea. Analysis also establishes the market demand of the idea that has been developed. It determines the possible profit, and this such of an idea would bring to the organization upon its implementation. This explanation will be discussed on the aspect of a new technology known as Internet of Things, which was designed with a main reason of providing internet faculties to all locations on the surface of the earth on each scale.
When an analysis has been completed, what follows afterwards is the aspect of idea implementation. Implementation of the idea is always followed by the testing of the idea (Gubbi et al., 2013). Here, the idea is tested for its validity to be established. The validity here is trying to answer the question of whether the idea is trying to answer the problem that led to its establishment and implementation. Validity also gives the corrections and accuracy on the assessment of the set system. In case the assessment gives the right thing that the set idea was meant to provide, then the idea is valued and worth to be used in the market. If a contrary occurs, then it becomes advisable for the idea to be scripted. Every system needs to pass the validity test for it to be reliable, although some experts argues that not all valid systems are reliable.
Alternative
Solution
s
Most cases of the idealization process require alternatives to limit any possible risk or loss. Sometimes, it is evident that the innovative idea may bring some critical challenges in the implementation process. Some aspects that should be considered in the process include budget, and other critical resources that are required in the implementation process. For instance, the IoT can be used to supply internet connectivity in case the other alternative fails or vice versa. It is recommended that any form of learning and research should be done to control any possible discrepancies in the IoT technology. Any other technology can be implemented if it depicts the same functionality as the one described by the IoT.
Overview
The IoT refers to ever-growing technology that provides IP addresses to all objects and substances that one may imagine associating with. The assigned objects can promote communication amongst themselves. This technology tries to improve communication among individuals on a large scale by using the internet. The data grouping as well as digitizing the concept of IoT, calls for construction of four c ...
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
IoT use cases span multiple industries and domains, including healthcare, education, real estate, entertainment, and social media. As this technology has use cases in many areas, the applications are as expansive as you can imagine. Now that you know what these problems are, it's time to look at the solutions. A solution that only an experienced IoT app development company in usa can provide. Contact the team today.
Consumer technology is invading the enterprise and IT must embrace it in order to encourage employee productivity and satisfaction. Info-Tech recommends that organizations allow personal mobile devices on their corporate networks. This research addresses the following:
•Understand differences in security and management between the three major platforms – BlackBerry, Apple iOS, and Google Android.
•Evaluate the organization's position on the mobile device security scale and determine if third-party infrastructure is necessary.
•Development and enforcement of a personal mobile acceptable use policy to encourage end-user compliance and foster success.
Embrace consumer technology in the enterprise, and focus on end-user compliance to leverage productivity and maximize the potential for success.
Industrial Control Systems Go Mobile in the CloudLockheed Martin
Industrial control systems are increasingly becoming interconnected with local area networks, wide area networks, extranet networks, and cloud computing environments. Cloud and mobile technologies provide a competitive advantage for global companies. In this research, a DevOps approach to cloud-based applications development was used to create a capability for industrial control systems management and reporting.
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
Running Head: TRENDS IN CYBERSECURITY1
TRENDS IN CYBERSECURITY 5
Trends in Cybersecurity
Student’s Name
Institution
Date
Top Trends in the cybersecurity industry
New components introduced into the ecosystem of computing allow new attack vectors: IoT is one of the components that attract cyber attacks, AI-based systems like assistants will invite attacks since first devices and software will not be built considering security protocols. The existing systems of cloud and mobile security will as well be open to attacks as in social engineering, ransomware and continued Advance Persistent Threat attacks (Qureshi, 2018). (All the old methods will be applied with more specialized goals and increased intensity). Expect high-profit applications like cryptocurrency to attract various attacks too. Developing protections in these areas is an ongoing struggle. In this document, we are going to look at some of the current trends in the cyber-security industry and emerging issues such Security and Privacy Merge, AI + ML = forensics and investigations and then focus the research on IoT security issues (Sharma, Tripathi & Panda, 2018).
Trend 1: Security and Privacy Merge
Even though everybody is still trying to comprehend the new privacy landscape and maybe because we have not grasped the new realities. Perhaps it is our ever-increasing focus on privacy overall and GDPR precisely.
What is evident is that there is an increase in companies seeking NAC solutions to keep up with all the new compliance regulations and it is very satisfying to hear that sigh of relief when a company has implemented their solution.
The global regulatory landscape has given way to the emerging trend of merging privacy and security roles. The new policies on privacy laws will require clear, tangible and operational IT security controls (Lin, 2017). While chief privacy officers and chief information security officers have clearly defined roles, it is important for these two roles and their teams to work closely together to leverage their unique skill sets and knowledge bases to ensure their organizations comply with their required regulations and protect their important, sensitive data and information.
Like peanut butter and jelly or milk and cookies, the security and privacy fields go better together. Both communities have started a slow but steady commingling in recent years, all with the goal of improving information protection measures on a large scale (Whitmore, Agarwal, & Da Xu, 2015). At the heart of the convergence of security and privacy is the recognition that information is an essential tool in every organization setting. As pressure keeps rising to protect data while also defending consumer and employee privacy, it's hard to imagine the two functions will remain siloed for much longer.
Trend 2: AI + ML = forensics and investigations
Artificial Intelligence (AI) and Machine Learning (ML) are going to be implemented into the arena of practical usage in cybersecuri.
the world of technology is changing at an unprecedented pace, and th.docxpelise1
the world of technology is changing at an unprecedented pace, and these changes represent business opportunities as well as challenges. Mass connectivity and faster speeds create opportunities for businesses to network more devices, complete more transactions, and enhance transaction quality. Internet Protocol version 6 (IPv6) and Internet of things (IoT) are two such technologies that represent significant opportunities for strategic cybersecurity technology professionals to create lasting value for their organizations.
IoT is the phenomenon of connecting devices used in everyday life. It provides an interactive environment of human users and a myriad of devices in a global information highway, always on and always able to provide information. IoT connections happen among many types of devices — sensors, embedded technologies, machines, appliances, smart phones — all connected through wired and wireless networks.
Cloud architectures such as software as a service have allowed for big data analytics and improved areas such as automated manufacturing. Data and real-time analytics are now available to workers through wearables and mobile devices.
Such pervasive proliferation of IoT devices gives hackers avenues to gain access to personal data and financial information and increases the complexity of data protection. Given the increased risks of data breaches, newer techniques in data loss prevention should be examined.
Increased bandwidth and increased levels of interconnectivity have allowed data to become dispersed, creating issues for big data integrity. In such a world, even the financial transactions of the future are likely to be different — Bitcoin and digital currency may replace a large portion of future financial transactions.
To survive and thrive, organizational technology strategists must develop appropriate technology road maps. These strategists must consider appropriate function, protection, and tamper-proofing of these new communications and transactions.
It will be impossible to protect data by merely concentrating on protecting repositories such as networks or endpoints. Cybersecurity strategists have to concentrate on protecting the data themselves. They will need to ensure that the data are protected no matter where they reside.:
Step2
Select Devices and Technologies
By now, you have an idea of your team members and your role on the team project. Now, it's time to get the details about the devices and technologies needed to be included in the Strategic Technology Plan for Data Loss Prevention.
You should limit the scope of this project by selecting a set of devices and technologies which are most appropriate for data loss prevention for your business mission and future success. Based on your prior knowledge of your company and based on the project roles you agreed upon in the previous step, perform some independent research on the following topics and identify a set of devices and technologies that you propose for.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed t-model to cover 4S quality metrics based on empirical study of root… (Dheeraj Chhillar)
1123
Performance and Security parameters mainly constitute the non-functional requirements. A software system‟s
utility is determined by both its functionality and non-functional characteristics, such as usability, flexibility,
performance, interoperability and security [1]. Customers can just ensure conformance to functional
requirements by verifying functionality and checking look and feel of software. Testing non-functional
requirements is a difficult task because it require use of tools and more technical knowledge. Based on our
research we have proposed a T model to design and test a software to ensure full test coverage of software
application. T-model ensures that breadth and depth of software application is being considered while
designing the software and same is being tested. Breadth and Depth parameters are explained in detail in
this paper.
2. SHIFTING OF TECHNOLOGY
Decades ago software were mainly window based and people used to work on desktops in isolation.
Then in last decade most of the applications switched to web based due to substantial increase in use of
internet. Shifting of technology is explained in Figure 1. In last few years due to increase in use of smart cell
phones people like to access everything from their cellphone or palmtop. Each and every web-based business
or application has started switching to mobile applications. People access everything from mobile phone be it
e-commerce, banking, hospitals, shopping, education, search services etc. These days‟ software architectures
are more flexible and interact a lot with outside applications. Architectures involve use of cloud to add more
scalability and flexibility. All code resides in cloud and anyone can access and code from anywhere in the
world. Applications involve micro services, rest services, web services to interact with other applications.
Latest research involves internet of things, smart devices, robotics, artificial intelligence, big data and
machine learning. A new scientific paradigm is born data intensive scientific discovery (DISD), also known
as big data problems. A large number of fields and sectors, ranging from economic and business activities to
public administration, from national security to scientific researches in many areas, involve with big data
problems [2]. Now internet, software and applications are tied to each and every individual directly or
indirectly. Every individual‟s personal, family, banking, private data is exposed on web or internet due to
excessive use of technology in everything they do. Now software has become integral part of each and every
individual. Data privacy has become the biggest concern in today‟s world. Cost of data has become way
more than hardware and software. Cybercrime & data theft is increasing exponentially. Most of the focus
these days is on software development and technology enhancement whereas security measures are majorly
compromised.
Figure 1. Shifting of technology
The trend of IoT in our modern society is explained in a recent report from Gartner, which estimated
that 63 million IoT devices will be attempting to connect to the network each second by 2020 [3]. Internet of
things systems data is stored in cloud which is accessed by users. This is called as cloud of things (CoT).
In Cloud of things data of all internets of things is uploaded to cloud and from their data is accessed by users
using mobile and desktops. This is shown in Figure 2 in the paper.
Window
based/Desktop
Application
Web Based
Applications &
Micro services
based architpecture
Mobile Based
Applications &
Cloud Based
Architectures
Artificial Intelligence,
Internet of Things, Big
Data, Machine Learning
& Robotics
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 2, April 2019 : 1122 – 1130
1124
Figure 2. A typical cloud of things (CoT) system [4]
At the time when internet was not much used, mainly standalone applications or window-based
applications were developed. At that time unit testing, component testing, integration testing, system testing,
black box and white box testing were mainly performed. Then when internet became prominent and web-
based applications were developed, main focus was on functional testing and some level of performance
testing also started. In past around 2 decades functional testing became mature over time and nowadays there
is hardly any software that fails due to lack of functional testing. A lot work was done in functional
automation testing as well. In current scenario where machine learning, internet of things, big data, artificial
learning & robotics is being used main concern has shifted to security testing. With the development of cloud
computing more and more enterprises host and deploy their servers and systems in the cloud and
deploy/migrate to the public cloud environment. In order to protect the security of the cloud computing
information system, the information security products need to be deployed in cloud computing environment.
Due to the characteristics of the cloud computing environment, the traditional information security products
cannot meet the security needs of cloud computing environment. In recent years, information security
product manufacturers and cloud computing service providers are committed to research and development of
the new cloud computing information security products [5]. Focus of testing has shifted from black box to
white box testing and to performance and security testing and data integrity. This is shows in Figure 3.
Figure 3. Shifting focus of testing
3. IT INDUSTRY SURVEY
A survey of 50 senior IT professionals was done to know root cause of software failures and to
figure out which phase is most time consuming. We used survey monkey tool to conduct the survey and also
used emails and manual form entry for the same. Around 10 questions were prepared to know the details of
current challenges, tools, root cause of failures & techniques used in software industry. Close to 70% result
showed that root cause of software failure these days is mainly security testing and performance testing.
Security testing and Performance testing is done by tools and most of the times it is compromised. There are
4. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed t-model to cover 4S quality metrics based on empirical study of root… (Dheeraj Chhillar)
1125
no set requirements specified to measure security and performance parameters. Industry is not mature enough
to gauge the after effects of lack of performance and security testing. Result of survey shown in Figure 4 and
Figure 5.
Figure 4. Survey result showing root cause of failure Figure 5. Survey result showing phase wise time
consumption
4. SOFTWARE FAILURES
Software defects could be classified mainly in 4 categories i.e. Functional Defects, Performance
Defects, Security Defects and Usability Defects. Functional testing is important in all types of technologies,
however due to the maturity in functional testing software hardly fails these days due to lack of functional
testing. A lot of mobile apps and web applications failed in past due to lack of performance testing as
performance requirements were not identified & elicited beforehand. These days‟ performance parameters
are also considered and a lot of research is being done in the field. There is still more research required to
simplify performance testing as tools used these days are really difficult to use. Next comes the failures due
to lack of security testing. Each and every organization and application are impacted due to this at some
level. Due to excessive use of technology in banking and data being shared online it has become most
important to ensure safety from cyber-attack and data breach. Majority of the software failures these days are
due to lack of performance & security testing. Some of the recent software failures are discussed in below
section outlining root cause of failures. The mosaic of technologies used in current Web applications
(e.g., HTML5 and JavaScript frameworks) increases the risk of security breaches. This situation has led to
significant growth in application-level vulnerabilities, with thousands of vulnerabilities detected and
disclosed annually in public databases such as the MITRE CVE-Common Vulnerabilities and Exposures.
The most common vulnerabilities found on these databases especially emphasize the lack of resistance to
code injection of the kind SQL Injection (SQLI) or Cross-Site Scripting (XSS), which have many variants.
This kind of vulnerabilities indeed appears in the top list of current Web applications attacks [6].
4.1. Ransomware
One of the most recent and major software failures that happened in June 2017 is ransomware [7].
Ransomware is considered as a type of malicious software which stops user from using his PC [8]. It is called
as ransomware, because it asks for payment to give you back your files and system. It holds your PC or file
for ransom. The malware shutting down computers worldwide is known as WannaCry. WannaCry was sent
to systems as a virus, which spreads among computers by its own via internet. It finds vulnerable machines
and infects them. 99 countrie's hospitals, automakers, IT Companies and all types of industry got impacted
with loss of millions of dollars. Cyberattackers hit 99 countries across the world and is known as one of the
biggest cyber-attack in history. It impacted major countries like USA, Russia, China, UK and India. In the
world of digitization, where every information is stored digitally, information can be accessed 24X7, can be
accessed via internet and easily retrieved at cheaper rate. Everything is done smoothly on one click,
effortlessly and efficiently maintained. Digitization has improved the life style of the computer users. But as
it is said “Every pillar has two sides”. Digitization has helped in decreasing crime if applied on whole, getting
things done easily and has decrease documentation work. But still it creates a problem of security for
personal and confidential information of an individual. Many thefts or cyber-attacks like spyware, malware,
Trojan, phishing, intruders, spam, virus occurs. Ransomware is also a theft. It is a kind of infection that if
transmitted, it‟s difficult to get out. It infects all essential data and file in user‟s computer system.
If ransomware get activated in user‟s system, it encrypts file like .doc, .xls,.mp3, etc. by the public key-
private key combination. A ransom is demanded pay ransom for your data and then only you will get those
files. It becomes difficult to detect that the data or files has been hijacked. WannaCry was sent to systems as
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 2, April 2019 : 1122 – 1130
1126
a virus, which spreads among computers by its own via internet. It finds vulnerable machines and
infects them.
4.1.1. Root cause of failure
It happened due to loophole in Microsoft Windows Security. Microsoft fixed this in windows prior
to this attack, however organizations did not upgrade it due to time taking process. As it required thorough
testing of complex systems, which takes lot of time. Risk based software testing was not done in mostly
organizations. Software should be tested after development and secure SDLC guidelines should be followed
in life cycle. Secure code analyzers to be included at the time of development.
4.2. Zomato failure
Zomato initially named as foodiebay was startup in 2008 by Mr. Deepinder Goyal. It is a restaurant
searching platform. Foodiebay, the initial name was named to Zomato in November 2010 to increase their
reach among people. Zomato covers a list of over 1, 20,000 restaurant and more than 100 million customers
worldwide. Currently it has more than 90 million monthly visits and has operations across the globe. It is
headquartered in Delhi. It was named among top 25 most promising internet companies in India by
SmartTechie Magazine [9]. Zomato encountered a security breach and was hacked. As per hackread blog and
timesofIndia news, data of 17 million users was stolen in May 2017. The user‟s information was put on dark
web for sale for just $1000. One of the cyber security company infySEC, from Chennai, India, was able to
pull user information from Zomato database as well. There is no denying the fact that multi-million-dollar
company having operations across the globe risked user information due to lack of secure systems. On 18th
May 2017, it encountered a security breach and was hacked. As per hackread blog and timesofIndia news,
data of 17 million users was stolen. The user‟s information was put on dark web for sale for just $1000. Later
company asked its users to change their passwords. Zomato CTO also confirmed that all affected users have
been logged out of the website and app. One of the cyber security company infySEC, from Chennai, India,
was able to pull user information from Zomato database as well.
4.2.1. Root cause of failure
There is no denying the fact those multi-million-dollar companies having operations across the
globe risked user information due to lack of secure systems.
4.3. Other recent software failures
Over the last few years technology has seen great advances but has also witnessed some really major
failures. There have been lots of ransomware attacks, data breaches and IT failures. Based on our research we
found that software failures mainly happen due to lack of security testing or performance testing. Table 1 lists
software failures of 2016-17 with their description and root causes of failures. We researched a lot of failures
and every second failure was due to either lack of performance testing OR security testing. We just outlined a
few of the most famous failures in Table 1 to reach at our conclusion.
Table 1. Recent Software Failure
S.No. Name Year Impact and Description Root Cause
1 Equifax [10] Jul-2017 Equifax, one of the largest credit bureaus in the U.S. Personal
information (including Social Security Numbers, birth dates,
addresses, and in some cases drivers' license numbers) of 143
million consumers; 209,000 consumers also had their credit
card data exposed.
Lack of Security
Testing
2 Yahoo Data
Breach
Sep-16 As per https://www.hackread.com/- Forensic experts of US
Securities and Exchange Commission (SEC) confirmed that
more than 32 million accounts were breached in a cookie
forging attack. Forged cookies allowed intruder to access user's
accounts without a password. Information like email address,
user names, passwords, date of births, security questions and
phone numbers were reportedly leaked.
Cookies were not
secure.
3 Bangladesh
Bank Hack
May-16 As per www.reuters.com/article/- $81 Million were stolen from
Bangladesh bank in few hours and deposited them into 4
accounts in Rizal Commercial Banking Corporation in
Phillipines. Unknown hackers used SWIFT (Society of
Worldwide Interbank Financial Telecommunication- to
communicate between member banks around the world)
credentials of Bangladesh Central Bank employees for
fraudulent money transfer requests.
Lack of secure
banking systems.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed t-model to cover 4S quality metrics based on empirical study of root… (Dheeraj Chhillar)
1127
Table 1. Recent Software Failure (continue)
S.No. Name Year Impact and Description Root Cause
4 Etherum,
Initital Coin
Offering
(ICO) data
breach
Jul-17 As per https://thehackernews.com/2017/10/etherparty-
ethereum-ico.html- Etherum is one of the most popular
cryptocurrencies after Bitcoin. There had been lots of
cryptocurrency & ICO hacking done in past. Most recently
there was an etherum related breach, in which US$8.4 million
were stolen from Veritaseum ICO. It‟s been third time in a
week that hackers have stolen massive amount of etherum.
It is being done
possibly by exploiting
one of the
vulnerabilities in
company's software's
version 1.5 and above.
5 Canadian
Immigration
Site Crash
Nov-16 As per https://www.usatoday.com/- Americans crashed the
canadian immigration site on election day. There were around
200, 000 users on canada's immigration site when Donald
trump was declared as President of USA. Site was not able to
take the load and was reportedly crashed due to huge traffic.
Lack of Performance
testing.
6 IIT Delhi,
DU and other
Indian
Universities
hacked
Apr-17 As per http://www.hindustantimes.com/ Websites of Delhi
University, IIT Delhi and Aligarh Muslim University were
hacked in April 2017. Interface of major university websites
were changed with messages for government and citizens of
India. It was really an embarassment for Universities. The
Hackers identified themselves as Pakistan Haxors Crew (PHC)
in all 3 websites.
Lack of website
securities.
7 Website and
app failures
due to huge
traffic
Jun-16 As per http://metro.co.uk In June 2016, A popular british
clothing site ASOS website and app crashed after Brexit.
Lack of performance
testing for expected
and unexpected heavy
loads. Lack of
tracking of end user
performance
8 U.S. Largest
Department
Store App
Crash
Nov-16 As per https://dzone.com/articles/6-biggest-web-failures-of-
2016 On Black Friday, Macy's, the largest U.S. department
store website and app crashed due to heavy loads.
Lack of Performance
testing
9 Movie
Tickets
Website
Crash
Nov-16 As per https://movieweb.com, In November 2016, Fandango
movie tickets website crashed due to high demands for movie
tickets.
Lack of Performance
testing
10 Paytm app
crash
Dec-16 As per http://indiatoday.intoday.in, after announcing
demonitisation in India in Nov-16, people started using paytm
heavily. Paytm app was not able to handle load and crashed
several times and impacted lots of transaction.
Lack of Performance
testing
5. PROPOSED MODEL
A software development life cycle (SDLC) model is a set of activities, if performed in a manner will
produce desired product. A SDLC model specifies about the ways these activities are framed to produce
quality software [11].
The various life cycle models are-
a. The Waterfall Model
b. Prototype Model
c. Iterative Model
d. Spiral Model
e. Fish Model
f. V- Model
g. Object Oriented Modeling
All these models talk about set of activities like requirement analysis, designing, development,
testing and implementation in different manners. They simply focus on the software development and
sequence of steps to be performed while developing the software. None of them specified critical elements to
be considered while designing and testing of software. Survival of the software product these days require
fulfillment of all 4S Quality metrics at all levels of software development.
5.1. T-Model
In T-Model as shown in Figure 6 we considered breadth and depth as 2 arms of software product.
It looks like „T‟ alphabet so it is named as T-model. Horizontal component is considered as breadth arm of
the software and Verical component is taken as depth arm of the software. Both horizontal and vertical
sections should include security and performance design and testing considerations to ensure better quality of
the software application. Both breadth and depth arms are explained in brief in next section of the paper.
T-Model is proposed to architect the overall software product in such a way that 4S- safety, scalability,
stability and serviceability are considered at all levels of breadth and depth along with uncompromising on
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 2, April 2019 : 1122 – 1130
1128
functional requirement implementation. Functional requirements are base of the product and should be
outlined clearly and there are various SDLC models which ensure that requirements are specified clearly.
Customers are involved to approve look and feel of software and to test functionality of the application.
All interfaces should be designed appropriately to have better usability of the software application.
Figure 6. T-Model representation
5.1.1. Roles and responsibilites in T-Model
a. T-Model team should include a Product Manager, Engineering Manager, Infrastructure Manager, QA
Manager and Project Manager. All roles should spread across breadth and depth of application along with
their teams.
b. Product Manager should be domain expert and should have clear understanding of business requirements,
performance and security requirements.
c. Engineering Manager should decide on architecture of product, technology and database
d. Selection along with build deployments tools.
e. Infrastructure Manager should decide on all servers, patching so that performance and security
requirements will not be compromised. All servers should support scalability and security. All QA, Dev
and Production servers should be identified and hosted appropriately.
f. QA Manager should identify tools for functional automation, defect management tool, performance and
security testing tools.
g. Project Manager should work with all other managers and ensure that all teams work in conjunction
towards success of the project. All plans related to scope, cost, schedule, effort, resources, risk are
prepared, implemented and managed.
5.1.2. Breadth arm of T-Model
Breadth arm covers the Performance and Security parameters at User Interface (UI), Application
Programming Interface (API) and functionality level accessible by the users of the application. This arm
handles the customers who are less technical and it takes approval from customers on look and feel of
software user interface designs and functionality of the application. Most of the software programmers work
on this arm. Integration of horizontal and vertical arm is done in most compatible manner to ensure that the
outcome application will work effectively and efficiently.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Proposed t-model to cover 4S quality metrics based on empirical study of root… (Dheeraj Chhillar)
1129
5.1.3. Depth arm of T-Model
Depth arm covers the Performance and Security parameters at Architecture, database, cloud,
firewall, server level and all backend systems. In security landscape desktop, transport and network layers
and web applications should be protected using antivirus, encryption and firewalls. All web servers,
applications servers, database servers and backend servers should be security scanned and all patches should
be updated timely to ensure all vulnerabilities are handled.
5.1.4. Performance and security parameters in T-Model
The main focus of the T-model is on performance and security requirement specification, design,
development and testing at both breadth and depth arms without impacted functional requirement
specification, design, development, testing and implementation. Performance requirements at a minimum
should include access time, load time, number of concurrent users accessing application and latency time.
Stress test, load test, endurance test, peak test and various other tests are performed to ensure performance of
the application is intact. Usually tools are used to perform performance testing of applications, database and
APIs. Main attributes of performance testing are speed, scalability, stability and reliability. Attributes of
security testing includes Authentication, Authorization, Access Control and Audit control. There are various
networks defence mechanism available for web applications like firewall, intrusion detection system,
intrusion prevention system and application firewalls. If web applications would not be secure then chances
of sensitive data leakage, identity theft, defacement and application shutdown will increase significantly.
That will impact business, hurt brand image and goodwill of the company. Major threats for web application
include authentication, authorization attack, client-side attacks, command execution on the web site,
information disclosure and logical attacks to exploit a web application‟s logic flow. This is one of major
difference between T-model and other existing software development models.
5.1.5. 4S quality metrics
T-model mainly focus on coverage of all 4S quality metrics at breadth and depth arms. Based on
research we found 4S Quality metrics is most important to ensure successful release of the software product.
It touched all the major software quality attributes. 4S denotes Safety, Scalability, Stability and Serviceability
to test Security, Performance, Functionality and Usability respectively of the software product. There are a
lot of other quality attributes at each level of software testing, however these are considered as most critical
and could categorize all other attributes as well.
6. CONCLUSION
Research of most recent software failures and survey results of senior IT professionals showed that
main root cause of software failures these days is lack of security testing and performance testing. Security
testing and Performance testing is usually done by tools and most of the times it is compromised these days
due to lack of non-functional requirement specifications. Security testing is mainly done at the end to satisfy
auditors and not to find security issues from the time of architecture. Recent technologies and architectures
focusing on IOT, Cloud of things, big data, machine learning and Artificial intelligence lacks security testing
tool and techniques. There is lack of availability of penetration testing and testing mechanism for such
technologies. There are lots of tools available for security scanning and performance testing, however each
tool has its own pros and cons, be it a licensed vendor tool OR an open source tool. Today there is need of
“inhouse developed tools” to satisfy needs of testing non-functional requirements. The rapid changes in
software development technology stack requires more improvement in software testing as well to speed up
overall software product release. There is need of setting up of requirements specifications highlighting non-
functional requirements specific to security and performance parameters. Standardized automation interface
should be used supporting programming language familiar to team. It should be able to use and extend open
source interface drivers and support reuse of test harnesses and languages. Team should find or create drivers
for the interface your product has. In addition to vulnerability security scanning, auditing and reviewing,
more focus needs to be done on security and performance testing at architecture level, cloud, data and
application layers to ensure safety, scalability, stability and serviceability of the product. T-model is proposed
to consider security and performance parameters at requirement specification, design, development, testing
and deployment levels. Further research needs to be done to ensure that these parameters are considered
during continuous testing to ramp-up overall software testing process.