The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 2 Issue 1

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Computing knowledge and Skills Demand: A Content Analysis of Job Adverts in Botswana

Abstract: This paper presents the results of a content analysis of computing job adverts to assess the types of skills required by employers in Botswana. Through the study of job adverts for computing professionals for one year (i.e., January 2008 to December 2008), we identified the types of skills required by employers for early career positions. The job adverts were collected from 7 major newspapers (published both daily and weekly) that are circulated throughout the country. The findings of the survey have been used for the revision and development of curricula for undergraduate degree programmes at the Department of Computer Science, University of Botswana. The content analysis focused on the identification of the most sought after types of qualifications (i.e., degree types), job titles, skills, and industry certifications. Our analysis reveals that the majority of the adverts did not set a preference to a particular type of computing degree. Furthermore, our findings indicate that those job titles and computing skills which are on high demand are not consistent with previous studies carried out in the developed countries. This requires further investigation to identify reasons for these differences from the perspective of the practices in the IT industry. It also requires further investigation regarding the degree of mismatch between the employers computing skills demands and the knowledge and skills provided by academic programmes in the country.

Author 1: Y. Ayalew
Author 2: Z. A. Mbero
Author 3: T. Z. Nkgau
Author 4: P. Motlogelwa
Author 5: A. Masizana-Katongo
Author 6:

Keywords: computing job adverts; job adverts in Botswana; content analysis

PDF

Paper 2: Open Source Software in Computer Science and IT Higher Education: A Case Study

Abstract: The importance and popularity of open source software has increased rapidly over the last 20 years. This is due to a variety of advantages open source software has to offer and also the wide availability of the Internet in the early nineties. We identify and describe important open source software characteristics and then present a case study using open source software to teach three Computer Science and IT courses for one academic year. We compare fulfilling our educational requirements and goals with open source software and with proprietary software. We present some of the advantages of using Open Source Software (OSS). Finally we report on our experiences of using open source software in the classroom and describe the benefits and drawbacks of using this type of software over common proprietary software from both a financial and educational point of view.

Author 1: Dan R Lipsa
Author 2: Robert S. Laramee

Keywords: open source software (OSS), free software

PDF

Paper 3: Analyzing the Load Balance of Term-based Partitioning

Abstract: In parallel (IR) systems, where a large-scale collection is indexed and searched, the query response time is limited by the time of the slowest node in the system. Thus distributing the load equally across the nodes is very important issue. Mainly there are two methods for collection indexing, namely document-based and term-based indexing. In term-based partitioning, the terms of the global index of a large-scale data collection are distributed or partitioned equally among nodes, and then a given query is divided into sub-queries and each sub-query is then directed to the relevant node. This provides high query throughput and concurrency but poor parallelism and load balance. In this paper, we introduce new methods for terms partitioning and then we compare the results from our methods with the results from the previous work with respect to load balance and query response time.

Author 1: Ahmad Abusukhon
Author 2: Mohammad Talib

Keywords: Term-partitioning schemes, Term-frequency partitioning, Term-lengthpartitioning, Node utilization, Load balance

PDF

Paper 4: A Genetic Algorithm for Solving Travelling Salesman Problem

Abstract: In this paper we present a Genetic Algorithm for solving the Travelling Salesman problem (TSP). Genetic Algorithm which is a very good local search algorithm is employed to solve the TSP by generating a preset number of random tours and then improving the population until a stop condition is satisfied and the best chromosome which is a tour is returned as the solution. Analysis of the algorithmic parameters (Population, Mutation Rate and Cut Length) was done so as to know how to tune the algorithm for various problem instances.

Author 1: Adewole Philip
Author 2: Akinwale Adio Taofiki
Author 3: Otunbanowo Kehinde

Keywords: Genetic Algorithm, Generation, Mutation rate, Population, Travelling Salesman Problem

PDF

Paper 5: Grid Approximation Based Inductive Charger Deployment Technique in Wireless Sensor Networks

Abstract: Ensuring sufficient power in a sensor node is a challenging problem now-a-days to provide required level of security and data processing capability demanded by various applications scampered in a wireless sensor network. The size of sensor nodes and the limitations of battery technologies do not allow inclusion of high energy in a sensor. Recent technologies suggest that the deployment of inductive charger can solve the power problem of sensor nodes by recharging the batteries of sensors in a complex and sensitive environment. This paper provides a novel grid approximation algorithm for efficient and low cost deployment of inductive charger so that the minimum number of chargers along with their placement locations can charge all the sensors of the network. The algorithm proposed in this paper is a generalized one and can also be used in various applications including the measurement of network security strength by estimating the minimum number of malicious nodes that can destroy the communication of all the sensors. Experimental results show the effectiveness of the proposed algorithm and impacts of the different parameters used in it on the performance measures.

Author 1: Fariha Tasmin Jaigirdar
Author 2: Mohammad Mahfuzul Islam
Author 3: Sikder Rezwanul Huq

Keywords: wireless sensor network; energy efficiency; network security; grid approximation; inductive charger.

PDF

Paper 6: PAV: Parallel Average Voting Algorithm for Fault-Tolerant Systems

Abstract: Fault-tolerant systems are such systems that can continue their operation, even in presence of faults. Redundancy as one of the main techniques in implementation of fault-tolerant control systems uses voting algorithms to choose the most appropriate value among multiple redundant and probably faulty results. Average (mean) voter is one of the commonest voting methods which is suitable for decision making in highly-available and long-missions applications in which the availability and speed of the system is critical. In this paper we introduce a new generation of average voter based on parallel algorithms which is called as parallel average voter. The analysis shows that this algorithm has a better time complexity (log n) in comparison with its sequential algorithm and is especially appropriate for applications where the size of input space is large.

Author 1: Abbas Karimi
Author 2: Faraneh Zarafshan
Author 3: Adznan b. Jantan

Keywords: Fault-tolerant; Voting Algorithm; Parallel- Algorithm; Divide and Conquer.

PDF

Paper 7: Solution of Electromagnetic and Velocity Fields for an Electrohydrodynamic Fluid Dynamical System

Abstract: We studied the temporal evolution of the electromagnetic and velocity fields in an incompressible conducting fluid by means of computer simulations from the Navier Stokes and Maxwell’s equations. We then derived the set of coupled partial differential equations for the stream function vector field and the electromagnetic field. These equations are first order difference equations in time and fetch simplicity in discretization. The spatial partial derivatives get converted into partial difference equations. The fluid system of equations is thus approximated by a nonlinear state variable system. This system makes use of the Kronecker Tensor product. The final system has taken account of anisotropic permittivity. The conductivity and magnetic permeability of the fluid are assumed to be homogeneous and isotropic. Present work in this paper describes characterization of magneto hydrodynamic anisotropic medium due to permittivity. Also an efficient and modified novel numerical solution using Tensor product has been proposed. This numerical technique seems to be potentially much faster and provide compatibility in matrices operation. Application of our characterization technique shall be very useful in tuning of permittivity in Liquid crystal polymer, Plasma and Dielectric lens antennas for obtaining wide bandwidth, resonance frequency reconfigure ability and better beam control.

Author 1: Rajveer S Yaduvanshi
Author 2: Harish Parthasarathy

Keywords: Permittivity tuning, Incompressible fluid, Navier-Maxwell’s coupled equations, resonance frequency reconfigure ability.

PDF

Paper 8: Survey of Wireless MANET Application in Battlefield Operations

Abstract: In this paper, we present a framework for performance analysis of wireless MANET in combat/battle field environment. The framework uses a cross-layer design approach where four different kinds of routing protocols are compared and evaluated in the area of security operations. The resulting scenarios are then carried out in a simulation environment using NS-2 simulator. Research efforts also focus on issues such as Quality of Service (QoS), energy efficiency, and security, which already exist in the wired networks and are worsened in MANET. This paper examines the routing protocols and their newest improvements. Classification of routing protocols by source routing and hop-by-hop routing are described in detail and four major categories of state routing are elaborated and compared. We will discuss the metrics used to evaluate these protocols and highlight the essential problems in the evaluation process itself. The results would show better performance with respect to the performance parameters such as network throughput, end-to-end delay and routing overhead when compared to the network architecture which uses a standard routing protocol. Due to the nature of node distribution the performance measure of path reliability which distinguishes ad hoc networks from other types of networks in battlefield conditions, is given more significance in our research work.

Author 1: Dr C Rajabhushanam
Author 2: Dr. A. Kathirvel

Keywords: MANET; routing; protocols; wireless; simulation

PDF

Paper 9: An Efficient Resource Discovery Methodology for HPGRID Systems

Abstract: An efficient resource discovery mechanism is one of the fundamental requirements for grid computing systems, as it aids in resource management and scheduling of applications. Resource discovery activity involves searching for the appropriate resource types that match the user’s application requirements. Classical approaches to Grid resource discovery are either centralized or hierarchical, and it becomes inefficient when the scale of Grid systems increases rapidly. On the other hand, the Peer-to-Peer (P2P) paradigm emerged as a successful model as it achieves scalability in distributed systems. Grid system using P2P technology can improve the central control of the traditional grid and restricts single point of failure. In this paper, we propose a new approach based on P2P techniques for resource discovery in grids using Hypercubic P2P Grid (HPGRID) topology connecting the grid nodes. A scalable, fault-tolerant, self-configuring search algorithm is proposed as Parameterized HPGRID algorithm, using isomorphic partitioning scheme. By design, the algorithm improves the probability of reaching all the working nodes in the system, even in the presence of non-alive nodes (inaccessible, crashed or nodes loaded by heavy traffic). The scheme can adapt to a complex, heterogeneous and dynamic resources of the grid environment, and has a better scalability

Author 1: D.Doreen Hephzibah Miriam
Author 2: K.S.Easwarakumar

Keywords: Peer-to-Peer; Grid; Hypercube; Isomorphic partitioning; Resource Discovery

PDF

Paper 10: Virtualization Implementation Model for Cost Effective & Efficient Data Centers

Abstract: Data centers form a key part of the infrastructure upon which a variety of information technology services are built. They provide the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous increase in the demand for energy consumption. These data centers not only consume a tremendous amount of energy but are riddled with IT inefficiencies. Data center are plagued with thousands of servers as major components. These servers consume huge energy without performing useful work. In an average server environment, 30% of the servers are “dead” only consuming energy, without being properly utilized. This paper proposes a five step model using an emerging technology called virtualization to achieve energy efficient data centers. The proposed model helps Data Center managers to properly implement virtualization technology in their data centers to make them green and energy efficient so as to ensure that IT infrastructure contributes as little as possible to the emission of greenhouse gases, and helps to regain power and cooling capacity, recapture resilience and dramatically reducing energy costs and total cost of ownership.

Author 1: Mueen Uddin
Author 2: Azizah Abdul Rahman

Keywords: Virtualization; Energy Efficient Data Centre; Green IT; Carbon Footprints; Physical to Live Migration; Server Consolidation.

PDF

Paper 11: L Band Propagation Measurements for DAB Service Planning in INDIA

Abstract: The nature of variations of L band satellite signal strength for direct reception -both in fixed as well as in mobile reception are important technical parameters for the planning of satellite broadcast and communication services network. These parameters have been assessed through a field experiment using simulated satellite conditions. Variation of signal strength due to vegetation; urban structures; etc. as well as the building penetration loss along with the Standard Deviation of each of these variations has been assessed based on the data collected during the fixed and mobile reception. This paper gives an insight into the propagation in ‘L’ band under the simulated satellite conditions.

Author 1: P K Chopra
Author 2: S. Jain
Author 3: K.M. Paul
Author 4: S. Sharma

Keywords: Satellite, L-band, Signal, Mobile, Antenna, Attenuation.

PDF

Paper 12: Universal Simplest possible PLC using Personal Computer

Abstract: Need of industrial automation and control is not closed yet. PLC, the programmable logic controller as available in 2009 with all standardized possible features, discussed here concisely. This work on PLC gives a simplest form built in any computer hardware and software for immediate flexible need of the product in a small environment any number inputs and output logic permitted by a computer. At first, the product logic is implemented using simple available computer using a PCIMCIA card having 8255 parallel I/O device, RS232 etc. software like Java, C, C++, and Visual Basic. Further work continuing with all coming generations and variation in the mentioned technology. Expert engineer having these skills may fabricate a small operating PLC within one month. This is a view of preliminary work. Further up gradation of this work comes in term of Visual programming tool (computer aided design) and also universal make in terms of all operating system and computer available in the world. Sensors and module for data to logic conversion is not emphasized in this work. Connectivity has to be as per standard. Immediate use of this work as an education technology kit. The work in this huge technology area should not be accused because this is need in some way.

Author 1: B K Rana

Keywords: PLC, prototype, Java, Visual Basic, education technology

PDF

Paper 13: Simulation of Packet Telephony in Mobile Adhoc Networks Using Network Simulator

Abstract: Packet Telephony has been regarded as an alternative to existing circuit switched fixed telephony. To propagate new idea regarding Packet Telephony researchers need to test their ideas in real or simulated environment. Most of the research in mobile ad-hoc networks is based on simulation. Among all available simulation tools, Network Simulator (ns2) has been most widely used for simulation of mobile ad-hoc networks. Network Simulator does not directly support Packet Telephony. The authors are proposing a technique to simulate packet telephony over mobile ad-hoc network using network simulator, ns2.

Author 1: Dr P.K Suri
Author 2: Sandeep Maan

Keywords: Network Simulator; Mobile Ad-hoc Networks; Packet Telephony; Simulator; Voice over Internet Protocol.

PDF

Paper 14: A Novel Approach to Implement Fixed to Mobile Convergence in Mobile Adhoc Networks

Abstract: Fixed to Mobile Convergence, FMC is one of the most celebrated applications of wireless networks, where a telephonic call from some fixed telephonic infrastructure is forwarded to a mobile device. Problem of extending the reach of fixed telephony over a mobile ad-hoc network working in license free ISM band has been eluding the research fraternity. Major hindrance to FMC implementation comes from very nature of mobile ad-hoc networks. Due to the dynamic nature and limited node range in mobile ad-hoc networks, it is very difficult to realize QoS dependent applications, like FMC, over them. In this work authors are proposing complete system architecture to implement fixed to mobile convergence in a mobile ad-hoc network. The mobile ad-hoc network in the problem can hold a number of telephonic calls simultaneously. The proposed system is then implemented using network simulator, ns2. The results obtained are then compared with the predefined standards for implementation of FMC.

Author 1: Dr P.K Suri
Author 2: Sandeep Maan

Keywords: Mobile Ad-hoc Networks; Packet Telephony; Voice over Internet Protocol; Fixed to Mobile Convergence; Quality of Service

PDF

Paper 15: IPS: A new flexible framework for image processing

Abstract: Image processing is a discipline which is of great importance in various real applications; it encompasses many methods and many treatments. Yet, this variety of methods and treatments, though desired, stands for a serious requirement from the users of image processing software; the mastery of every single programming language is not attainable for every user. To overcome this difficulty, it was perceived that the development of a tool for image processing will help to understanding the theoretical knowledge on the digital image. Thus, the idea of designing the software platform Image Processing Software (IPS) for applying a large number of treatments affecting different themes depending on the type of analysis envisaged, becomes imperative. This software has not come to substitute the existing software, but simply a contribution in the theoretical literature in the domain of Image Processing. It is implanted in the MATLAB platform: effective and simplified software specialized in image treatments in addition to the creation of Graphical User Interfaces (GUI) [5][6]. IPS is aimed to allow a quick illustration of the concepts introduced in the theoretical part. This developed software enables users to perform several operations. It allows the application of different types of noise on images, to filter images color and intensity, to detect edges of an image and to apply image thresholding by defining a variant threshold, to cite only a few.

Author 1: Otman ABDOUN
Author 2: Jaafar ABOUCHABAKA

Keywords: Otman ABDOUN, Jaafar ABOUCHABAKA

PDF

Paper 16: Improved Off-Line Intrusion Detection Using A Genetic Algorithm And RMI

Abstract: This article proposes an optimization of using Genetic Algorithms for the Security Audit Trail Analysis Problem, which was proposed by L. Mé in 1995 and improved by Pedro A. Diaz-Gomez and Dean F. Hougen in 2005. This optimization consists in filtering the attacks. So, we classify attacks in “Certainly not existing attacks class”, “Certainly existing attacks class” and “Uncertainly existing attacks class”. The proposed idea is to divide the 3rd class to independent sub-problems easier to solve. We use also the remote method invocation (RMI) to reduce resolution time. The results are very significant: 0% false+, 0%false-, detection rate equal to 100%. We present also, a comparative study to confirm the given improvement.

Author 1: Ahmed AHMIM
Author 2: Nacira GHOUALMI
Author 3: Noujoud KAHYA

Keywords: component; intrusion detection system; Genetic Algorithm; Off-Line Intrusion Detection; Misuse Detection;

PDF

Paper 17: Automatic Facial Feature Extraction and Expression Recognition based on Neural Network

Abstract: In this paper, an approach to the problem of automatic facial feature extraction from a still frontal posed image and classification and recognition of facial expression and hence emotion and mood of a person is presented. Feed forward back propagation neural network is used as a classifier for classifying the expressions of supplied face into seven basic categories like surprise, neutral, sad, disgust, fear, happy and angry. For face portion segmentation and localization, morphological image processing operations are used. Permanent facial features like eyebrows, eyes, mouth and nose are extracted using SUSAN edge detection operator, facial geometry, edge projection analysis. Experiments are carried out on JAFFE facial expression database and gives better performance in terms of 100% accuracy for training set and 95.26% accuracy for test set.

Author 1: S P Khandait
Author 2: Dr. R.C.Thool
Author 3: P.D.Khandait

Keywords: Edge projection analysis, Facial features, feature extraction, feed forward neural network, segmentation SUSAN edge detection operator.

PDF

Paper 18: Coalesced Quality Management System

Abstract: Developing software in a stipulated time frame and within a budget is not good enough if the product developed is full of bugs and today end users are demanding higher quality software than ever before. Project lifecycle starts with pre-Project work all the way through to post-Project. Projects need to be set up correctly from the beginning to ensure success. As the software market matures, users want to be assured of quality. In order to check such unpleasant incidents or potential problems lurking around the corner for software development teams, we need a quality framework, that not only to assess the common challenges that are likely to come in the way while executing the projects but also to focus on winning the deal during proposal stage. Our research paper is an honest appraisal of the reasons behind the failure of projects and an attempt to address valuable pointers for the successes of future projects. “Coalesced Quality Management Framework (CQMF)” is a theoretical model to bring the best of Quality to the work products developed and to gain the firsthand knowledge of all the projects, defects, and quality metrics and report to the Management so that missed deadlines and enhancement of budget are avoided providing an opportunity to deliver the end product to the satisfaction of the customer. With this framework the project stakeholders and the management constantly validate what is built and verify how it is being built.

Author 1: A Pathanjali Sastri
Author 2: K. Nageswara Rao

Keywords: Quality Assurance, Operational Excellence, Coalesced Quality Management System, Business Analyst, phase gate reviews

PDF

Paper 19: Detection of Routing Misbehavior in MANETs with 2ACK scheme

Abstract: The Routing misbehavior in MANETs (Mobile Ad Hoc Networks) is considered in this paper. Commonly routing protocols for MANETs [1] are designed based on the assumption that all participating nodes are fully cooperative. Routing protocols for MANETs are based on the assumption which are, all participating nodes are fully cooperative. Node misbehaviors may take place, due to the open structure and scarcely available battery-based energy. One such routing misbehavior is that some nodes will take part in the route discovery and maintenance processes but refuse to forward data packets. In this, we propose the 2ACK [2] scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their effect. The basic idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. To reduce extra routing overhead, only a few of the received data packets are acknowledged in the 2ACK scheme.

Author 1: Chinmaya Kumar Nayak
Author 2: G K Abani Kumar Dash
Author 3: Kharabela parida
Author 4: Satyabrata Das

Keywords: MANET; routing in MANETS; misbehavior of nodes in MANETS; credit based scheme; reputation based scheme; the2ACK scheme; network security.

PDF

Paper 20: Framework for Automatic Development of Type 2 Fuzzy, Neuro and Neuro-Fuzzy Systems

Abstract: This paper presents the design and development of generic framework which aids creation of fuzzy, neural network and neuro fuzzy systems to provide expert advice in various fields. The proposed framework is based on neuro fuzzy hybridization. Artificial neural network of the framework aids learning and fuzzy part helps in providing logical reasoning for making proper decisions based on inference of domain expert’s knowledge. Hence by hybridizing neural network and fuzzy logic we obtain advantages of both the fields. Further the framework considered type 2 fuzzy logic for more human like approach. Developing a neuro fuzzy advisory system is tedious and complex task. Much of the time is wasted in developing computational logic and hybridizing the two methodologies. In order to generate a neuro fuzzy advisory system quickly and efficiently, we have designed a generic framework that will generate the advisory system. The resulting advisory system for the given domain is interactive with its user and asks question to generate fuzzy rules. The system also allows provision of training sets for neural network by its users in order to train the neural network. The paper also describes a working prototype implemented based on the designed framework; which can create a fuzzy system, a neural network system or a hybrid neuro fuzzy system according to information provided. The working of the prototype is also discussed with outputs in order to develop a fuzzy system, a neural network system and a hybrid neuro fuzzy system for a domain of course selection advisory. The generated systems through this prototype can be used on web or on desktop as per the user requirement.

Author 1: Mr. Jeegar A Trivedi
Author 2: Dr. Priti Srinivas Sajja

Keywords: Artificial Neural Network; Fuzzy Logic; Type 2 Fuzzy Logic; Neuro Fuzzy Hybridization.

PDF

Paper 21: A study on Feature Selection Techniques in Bio-Informatics

Abstract: The availability of massive amounts of experimental data based on genome-wide studies has given impetus in recent years to a large effort in developing mathematical, statistical and computational techniques to infer biological models from data. In many bioinformatics problems the number of features is significantly larger than the number of samples (high feature to sample ratio datasets) and feature selection techniques have become an apparent need in many bioinformatics applications. This article provides the reader aware of the possibilities of feature selection, providing a basic taxonomy of feature selection techniques, discussing its uses, common and upcoming bioinformatics applications.

Author 1: S Nirmala Devi
Author 2: Dr. S.P Rajagopalan

Keywords: Bio-Informatics; Feature Selection; Text Mining; Literature Mining; Wrapper; Filter Embedded Methods.

PDF

Paper 22: Software Effort Prediction using Statistical and Machine Learning Methods

Abstract: Accurate software effort estimation is an important part of software process. Effort is measured in terms of person months and duration. Both overestimation and underestimation of software effort may lead to risky consequences. Also, software project managers have to make estimates of how much a software development is going to cost. The dominant cost for any software is the cost of calculating effort. Thus, effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. There are various effort estimation models, but it is difficult to determine which model gives more accurate estimation on which dataset. This paper empirically evaluates and compares the potential of Linear Regression, Artificial Neural Network, Decision Tree, Support Vector Machine and Bagging on software project dataset. The dataset is obtained from 499 projects. The results show that Mean Magnitude Relative error of decision tree method is only 17.06%. Thus, the performance of decision tree method is better than all the other compared methods.

Author 1: Ruchika Malhotra
Author 2: Ankita Jain

Keywords: oftware effort estimation, machine learning, decision tree, linear regression

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org