Software Engineering

ISSN Online: 2376-8037 ISSN Print: 2376-8029

Archive Home / Archive

Volume 7, Issue 2, June 2019

  • Authors: Moshammad Sharmin Akter, Mohammad Anwar Hossain

    Abstract: Computer technology is growing quickly. Now a day it is the time of internet. Data communication and networking have changed the way we do business and the personal communication. Communication can easily isolate the world through the way of communication. When we communicate, we are sharing information. A routing mechanism needs to add the entire computer system with a higher degree of facility for a network. Routing is the most important part for giving a performance to the network. Network administrators need to performance evaluation based on different criteria for each type of routing protocols. Interior gateway protocols are EIGRP, OSPF, RIP and IS-IS. This paper focuses on the performance of these prominent routers. We chose only three protocols for IPv6 network. These are EIGRPv6, OSPFv3 and RIPng. These protocols are used in IPv6 network in terms of data transfer rate and converge time. These calculate in specific source to destination at simulation environment of cisco. We use ping command in command promote to verify the network connection. It also shows the real time comparison in different perspective. We get the result to use the simulation software cisco packet tracer.

    Received: Jun. 13, 2019 Accepted: Jul. 11, 2019 Published: Jul. 23, 2019

    DOI: 10.11648/j.se.20190702.11 View: Downloads:

  • Authors: Omar Masmali, Omar Badreddin

    Abstract: Model Driven Software Engineering (MDSE) promotes the use of models, rather than code, as the primary development artifacts. Models tend to be more understandable than code and can represent systems are variable levels of abstraction. MDSE promises improved code quality and engineers’ productivity. Many of those benefits have been well examined and evaluated. However, the potential implications of MDSE on software security and reliability is not well understood. Model-Driven Security (MDS) is an approach that can support the process of modeling security requirements at a high level of abstraction in the early stage of software development. In this paper, we conduct a systematic study on MDS methodologies and concepts. The scope of the review is ten years from 2008 to 2018. The study reports on the frequencies of publication over this time period to identify the MDS forums based on seven classifications: online databases, year of publications, type of publication (journal or conference paper), the geographical distribution of the researchers, the main contribution of each paper, MDS approaches, and the security concepts. The majority of studies focused on extensions to existing UML languages suggesting some limitations in the current UML standard support for security. Most studies report on empirical evaluations, and UML Class Diagrams were the most extended language.

    Received: Jun. 24, 2019 Accepted: Jul. 15, 2019 Published: Aug. 5, 2019

    DOI: 10.11648/j.se.20190702.12 View: Downloads:

  • Authors: Taufiq Iqbal, Bahruni

    Abstract: So far, many repository developments have been carried out, but still in the repository analysis built by other parties (other countries), besides that, the use of complex repository software and requires expensive architecture. This research is needed so that later the research results can develop a repository architecture which is a new technology that is better and more efficient and can be used by universities in Indonesia, especially in AMIK Indonesia. This study aims to prove the existing theories of the repository and digital library architecture to be adapted to the development of current knowledge and technology by using the Big Data model and using the Open Archive Initiative (OAI) and designing a new repository to facilitate universities for online publications as needed, so that user limitations on publishing management become complex, and develop existing research results, in developing repositories that are more flexible than existing repositories and digital libraries. Broadly speaking, this research is divided into three stages, namely pre-development data collection, development and implementation, and post-development data collection. Pre-development data collection is intended to get the provision of preliminary studies about the core of the problem at hand, while the development and implementation phase focuses on modeling software design into a diagram and making programming code to implement the design that has been made. While the stages of post-development data collection are for reforming the application made, drawing conclusions, and suggestions for the topic of subsequent research. The proposed system allows users to see publication information and repositories also equipped with the Open Archive Initiative (OAI) module so that it can be crawled by indexing machines. From the results of the study, it can be concluded that pre-development data collection, development and implementation, and post-development data collection have been carried out. The use of this repository can bring benefits including the ability to send data so that it can be indexed on various indexing websites. The repository application that researchers build can be installed on web hosting. The repository is built with framework Codeigniter, node.js and uses supporting programming languages such as HTML, CSS, Jquery, JavaScript, JSON, AJAX, Bootstrap as media in designing interfaces. This repository application is named with T-REPOSITORY.

    Received: Jun. 30, 2019 Accepted: Jul. 24, 2019 Published: Aug. 7, 2019

    DOI: 10.11648/j.se.20190702.13 View: Downloads: