In current day world, monitoring your cherished elderly person is becoming a tough job. Monitorin... more In current day world, monitoring your cherished elderly person is becoming a tough job. Monitoring the health condition of the elderly person at home is a tough job. In particular, elderly patients should be regularly checked and their loved ones should be updated from time to time about their health condition at work. Thus, this is an innovative method that easily automates this process. This technology provides support to monitor the protection of the elderly who utilise sensors to watch their senior health and use the Internet, in case of any problems, to notify their loved one.
Wireless sensor networks pose new security and privacy challenges. One of the important challenge... more Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. However, they either cannot offer strong resilience against node capture attacks, or require too much memory for achieving the desired connectivity. The proposed Bloms algorithm outperforms others in terms of resilience against node capture. Bloms key distribution scheme with deployment knowledge provides a higher connectivity with a shorter transmission range and a lower memory requirement. This paper provides an overview of different approaches of key management schemes and limitations of those approaches. Keywords— Key management, Wireless Sensor Networks
Advances in Intelligent Systems and Computing, 2016
Process reuse has noticeable role in the software component reuse, increasing the prominence in e... more Process reuse has noticeable role in the software component reuse, increasing the prominence in enterprise software development. The research gap identified from the related work is to identify reusable components from the legacy system. In order to fill this research gap, a methodology to assess the reusability of components has been proposed using a heuristic function. The proposed methodology is realized and implemented using three domain applications for the assessment of reusability levels. The heuristic function hampers the non-reusable components from the assessed reusability levels and helps to identify the reusable components from the legacy systems.
International Journal of Computer Science and Informatics, 2013
One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.
International Conference on Software Engineering and Mobile Application Modelling and Development (ICSEMA 2012), 2012
ABSTRACT Component methodology helps in increasing the productivity of the system. Though reusing... more ABSTRACT Component methodology helps in increasing the productivity of the system. Though reusing the existing components helps in developing the systems within time and budget. However because of the risk of effective reuse, developers are bound to develop the system from scratch. The components which are not reused can be reconfigured such that it can increase the reusability thereby increasing the productivity of the system. This paper presents an approach to reconfigure the less frequently used or victim component using AND relationship, such that it can be effectively re-used in future. The proposed methodology is tested for Network domain application and the results shows considerable amount of reusability of the components.
2012 CSI Sixth International Conference on Software Engineering (CONSEG), 2012
ABSTRACT Rather than developing a new component from scratch, it is better to use the already ava... more ABSTRACT Rather than developing a new component from scratch, it is better to use the already available component upto the extent where it can be reused. The organization will get more productivity with the effective reuse. This also helps in reducing the effort of testing which forms a major share in the life cycle of software development. However the challenge is the effective reuse. There may be many components in the repository which can't be reused effectively. In this paper, an approach of modularization of components is used to reconfigure the victim components so that the reusability increases. It is a hierarchical nature of decomposition of a component such that the completeness criteria is satisfied. An HR Portal application is used to simulate the results of the proposed strategy.
In current day world, monitoring your cherished elderly person is becoming a tough job. Monitorin... more In current day world, monitoring your cherished elderly person is becoming a tough job. Monitoring the health condition of the elderly person at home is a tough job. In particular, elderly patients should be regularly checked and their loved ones should be updated from time to time about their health condition at work. Thus, this is an innovative method that easily automates this process. This technology provides support to monitor the protection of the elderly who utilise sensors to watch their senior health and use the Internet, in case of any problems, to notify their loved one.
Wireless sensor networks pose new security and privacy challenges. One of the important challenge... more Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. However, they either cannot offer strong resilience against node capture attacks, or require too much memory for achieving the desired connectivity. The proposed Bloms algorithm outperforms others in terms of resilience against node capture. Bloms key distribution scheme with deployment knowledge provides a higher connectivity with a shorter transmission range and a lower memory requirement. This paper provides an overview of different approaches of key management schemes and limitations of those approaches. Keywords— Key management, Wireless Sensor Networks
Advances in Intelligent Systems and Computing, 2016
Process reuse has noticeable role in the software component reuse, increasing the prominence in e... more Process reuse has noticeable role in the software component reuse, increasing the prominence in enterprise software development. The research gap identified from the related work is to identify reusable components from the legacy system. In order to fill this research gap, a methodology to assess the reusability of components has been proposed using a heuristic function. The proposed methodology is realized and implemented using three domain applications for the assessment of reusability levels. The heuristic function hampers the non-reusable components from the assessed reusability levels and helps to identify the reusable components from the legacy systems.
International Journal of Computer Science and Informatics, 2013
One of the goals of software design is to model a system in such a way that it is easily understa... more One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which the cost of hardware has decreased and conversely the cost of software development has increased sharply. The methodologies that allowed this change are model-based, thus relieving the human from detailed coding. Still there is a long way to achieve this goal, but work is being done worldwide to achieve this objective. This paper presents the drastic changes related to modeling and important challenging issues and techniques that recur in MBSD.
International Conference on Software Engineering and Mobile Application Modelling and Development (ICSEMA 2012), 2012
ABSTRACT Component methodology helps in increasing the productivity of the system. Though reusing... more ABSTRACT Component methodology helps in increasing the productivity of the system. Though reusing the existing components helps in developing the systems within time and budget. However because of the risk of effective reuse, developers are bound to develop the system from scratch. The components which are not reused can be reconfigured such that it can increase the reusability thereby increasing the productivity of the system. This paper presents an approach to reconfigure the less frequently used or victim component using AND relationship, such that it can be effectively re-used in future. The proposed methodology is tested for Network domain application and the results shows considerable amount of reusability of the components.
2012 CSI Sixth International Conference on Software Engineering (CONSEG), 2012
ABSTRACT Rather than developing a new component from scratch, it is better to use the already ava... more ABSTRACT Rather than developing a new component from scratch, it is better to use the already available component upto the extent where it can be reused. The organization will get more productivity with the effective reuse. This also helps in reducing the effort of testing which forms a major share in the life cycle of software development. However the challenge is the effective reuse. There may be many components in the repository which can't be reused effectively. In this paper, an approach of modularization of components is used to reconfigure the victim components so that the reusability increases. It is a hierarchical nature of decomposition of a component such that the completeness criteria is satisfied. An HR Portal application is used to simulate the results of the proposed strategy.
Uploads
Papers by Jubair Basha