-
Security Requirement Analysis of Blockchain-based E-Voting Systems
Authors:
Sanil S. Gandhi,
Arvind W. Kiwelekar,
Laxman D. Netak,
Hansraj S. Wankhede
Abstract:
In democratic countries such as India, voting is a fundamental right given to citizens of their countries. Citizens need to physically present and cast their vote in ballot-paper-based voting systems. Most of the citizens fail to fulfill this constraint and have stayed away from their fundamental duty. Electronic-voting systems are often considered one efficient alternative in such situations. Blo…
▽ More
In democratic countries such as India, voting is a fundamental right given to citizens of their countries. Citizens need to physically present and cast their vote in ballot-paper-based voting systems. Most of the citizens fail to fulfill this constraint and have stayed away from their fundamental duty. Electronic-voting systems are often considered one efficient alternative in such situations. Blockchain Technology is an emerging technology that can provide a real solution as it is characterized by immutable, transparent, anonymous, and decentralized properties. This paper presents a security requirement analysis for e-voting systems and evaluates blockchain technology against these requirements.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
i-Pulse: A NLP based novel approach for employee engagement in logistics organization
Authors:
Rachit Garg,
Arvind W Kiwelekar,
Laxman D Netak,
Akshay Ghodake
Abstract:
Although most logistics and freight forwarding organizations, in one way or another, claim to have core values. The engagement of employees is a vast structure that affects almost every part of the company's core environmental values. There is little theoretical knowledge about the relationship between firms and the engagement of employees. Based on research literature, this paper aims to provide…
▽ More
Although most logistics and freight forwarding organizations, in one way or another, claim to have core values. The engagement of employees is a vast structure that affects almost every part of the company's core environmental values. There is little theoretical knowledge about the relationship between firms and the engagement of employees. Based on research literature, this paper aims to provide a novel approach for insight around employee engagement in a logistics organization by implementing deep natural language processing concepts. The artificial intelligence-enabled solution named Intelligent Pulse (I-Pulse) can evaluate hundreds and thousands of pulse survey comments and provides the actionable insights and gist of employee feedback. I-Pulse allows the stakeholders to think in new ways in their organization, helping them to have a powerful influence on employee engagement, retention, and efficiency. This study is of corresponding interest to researchers and practitioners.
△ Less
Submitted 24 May, 2021;
originally announced June 2021.
-
Redefining measures of Layered Architecture
Authors:
Sanjay Thakare,
Arvind W Kiwelekar
Abstract:
Layered architecture represents the software structure in the form of layers. Every element in the software is assigned to one of the layers such that the relationship amongst the elements is maintained. A set of design principles rules the process of construction of the layered architecture. Various statistical measures have been defined to check whether the layered architecture of a given softwa…
▽ More
Layered architecture represents the software structure in the form of layers. Every element in the software is assigned to one of the layers such that the relationship amongst the elements is maintained. A set of design principles rules the process of construction of the layered architecture. Various statistical measures have been defined to check whether the layered architecture of a given software is following these design principles or not. In this paper, we redefine the measures of layered architecture based on the relationship between the software components. The measures check for the violations committed regarding the back calls, skip calls, and cyclic structures. Further, we also introduce a new measure to verify the logical separation amongst the layers. The system's current architecture is extracted from the source code and represented using a three-tier layered structure, which is the defacto standard architecture of Java applications. The redefined measures are applied to determine the conformance of layering principles in the system. We evaluate five different software systems for their architecture consistency. The results obtained on our redefined measures are compared to those obtained by applying the standard set of measures. A quantitative analysis of the proposed measures is performed, and we conclude that they can determine the consideration of layering principles followed during the development of a software system.
△ Less
Submitted 6 June, 2021;
originally announced June 2021.
-
Discovery of Layered Software Architecture from Source Code Using Ego Networks
Authors:
Sanjay Thakare,
Arvind W Kiwelekar
Abstract:
Software architecture refers to the high-level abstraction of a system including the configuration of the involved elements and the interactions and relationships that exist between them. Source codes can be easily built by referring to the software architectures. However, the reverse process i.e. derivation of the software architecture from the source code is a challenging task. Further, such an…
▽ More
Software architecture refers to the high-level abstraction of a system including the configuration of the involved elements and the interactions and relationships that exist between them. Source codes can be easily built by referring to the software architectures. However, the reverse process i.e. derivation of the software architecture from the source code is a challenging task. Further, such an architecture consists of multiple layers, and distributing the existing elements into these layers should be done accurately and efficiently. In this paper, a novel approach is presented for the recovery of layered architectures from Java-based software systems using the concept of ego networks. Ego networks have traditionally been used for social network analysis, but in this paper, they are modified in a particular way and tuned to suit the mentioned task. Specifically, a dependency network is extracted from the source code to create an ego network. The ego network is processed to create and optimize ego layers in a particular structure. These ego layers when integrated and optimized together give the final layered architecture. The proposed approach is evaluated in two ways: on static versions of three open-source software, and a continuously evolving software system. The distribution of nodes amongst the proposed layers and the committed violations are observed on both class level and package level. The proposed method is seen to outperform the existing standard approaches over multiple performance metrics. We also carry out the analysis of variation in the results concerning the change in the node selection strategy and the frequency. The empirical observations show promising signs for recovering software architecture layers from source codes using this technique and also extending it further to other languages and software.
△ Less
Submitted 6 June, 2021;
originally announced June 2021.
-
Classifications of the Summative Assessment for Revised Blooms Taxonomy by using Deep Learning
Authors:
Manjushree D. Laddha,
Varsha T. Lokare,
Arvind W. Kiwelekar,
Laxman D. Netak
Abstract:
Education is the basic step of understanding the truth and the preparation of the intelligence to reflect. Focused on the rational capacity of the human being the Cognitive process and knowledge dimensions of Revised Blooms Taxonomy helps to differentiate the procedure of studying into six types of various cognitive processes and four types of knowledge dimensions. These types are synchronized in…
▽ More
Education is the basic step of understanding the truth and the preparation of the intelligence to reflect. Focused on the rational capacity of the human being the Cognitive process and knowledge dimensions of Revised Blooms Taxonomy helps to differentiate the procedure of studying into six types of various cognitive processes and four types of knowledge dimensions. These types are synchronized in the increasing level of difficulty. In this paper Software Engineering courses of B.Tech Computer Engineering and Information Technology offered by various Universities and Educational Institutes have been investigated for Revised Blooms Taxonomy RBT. Questions are a very useful constituent. Knowledge intelligence and strength of the learners can be tested by applying questions.The fundamental goal of this paper is to create a relative study of the classification of the summative assessment based on Revised Blooms Taxonomy using the Convolutional Neural Networks CNN Long Short-Term Memory LSTM of Deep Learning techniques in an endeavor to attain significant accomplishment and elevated precision levels.
△ Less
Submitted 18 April, 2021;
originally announced April 2021.
-
A Decentralized and Autonomous Model to Administer University Examinations
Authors:
Yogesh N Patil,
Arvind W Kiwelekar,
Laxman D Netak,
Shankar B Deosarkar
Abstract:
Administering standardized examinations is a challenging task, especially for those universities for which colleges affiliated to it are geographically distributed over a wide area. Some of the challenges include maintaining integrity and confidentiality of examination records, preventing mal-practices, issuing unique identification numbers to a large student population and managing assets require…
▽ More
Administering standardized examinations is a challenging task, especially for those universities for which colleges affiliated to it are geographically distributed over a wide area. Some of the challenges include maintaining integrity and confidentiality of examination records, preventing mal-practices, issuing unique identification numbers to a large student population and managing assets required for the smooth conduct of examinations. These challenges aggravate when colleges affiliated to universities demand academic and administrative autonomy by demonstrating best practices consistently over a long period.
In this chapter, we describe a model for decentralized and autonomous examination system to provide the necessary administrative support. The model is based on two emerging technologies of Blockchain Technology and Internet of Things (IoT). We adopt a software architecture approach to describe the model. The prescriptive architecture consists of {\em architectural mappings} which map functional and non-functional requirements to architectural elements of blockchain technology and IoT. In architectural mappings, first, we identify common use-cases in administering standardized examinations. Then we map these use-cases to the core elements of blockchain, i.e. distributed ledgers, cryptography, consensus protocols and smart-contracts and IoT. Such kind of prescriptive architecture guide downstream software engineering processes of implementation and testing
△ Less
Submitted 20 March, 2021;
originally announced April 2021.
-
Blockchain-based Security Services for Fog Computing
Authors:
Arvind W. Kiwelekar,
Pramod Patil,
Laxman D. Netak,
Sanjay U Waikar
Abstract:
Fog computing is a paradigm for distributed computing that enables sharing of resources such as computing, storage and network services. Unlike cloud computing, fog computing platforms primarily support {\em non-functional properties} such as location awareness, mobility and reduced latency. This emerging paradigm has many potential applications in domains such as smart grids, smart cities, and tr…
▽ More
Fog computing is a paradigm for distributed computing that enables sharing of resources such as computing, storage and network services. Unlike cloud computing, fog computing platforms primarily support {\em non-functional properties} such as location awareness, mobility and reduced latency. This emerging paradigm has many potential applications in domains such as smart grids, smart cities, and transport management.
Most of these domains collect and monitor personal information through edge devices to offer personalized services. A {\em centralized} server either at the level of cloud or fog, has been found ineffective to provide a high degree of security and privacy-preserving services.
Blockchain technology supports the development of {\em decentralized} applications designed around the principles of immutability, cryptography, consistency preserving consensus protocols and smart contracts. Hence blockchain technology has emerged as a preferred technology in recent times to build trustworthy distributed applications.
The chapter describes the potential of blockchain technology to realize security services such as authentication, secured communication, availability, privacy and trust management to support the development of dependable fog services.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
A Software Architecture Teacher's Dilemmas
Authors:
Arvind W Kiwelekar
Abstract:
An instructor teaching a course on Software Architecture needs to be more reflective to engage students productively in the learning activities. In this reflective essay, the author identifies a few decisive moments referred to as instructional dilemmas at which a teacher reflects upon choices and their consequences so that meaningful learning happens. These situations are referred to as dilemmas…
▽ More
An instructor teaching a course on Software Architecture needs to be more reflective to engage students productively in the learning activities. In this reflective essay, the author identifies a few decisive moments referred to as instructional dilemmas at which a teacher reflects upon choices and their consequences so that meaningful learning happens. These situations are referred to as dilemmas because they offer two options to instructors. Some of these dilemmas arise from the inherent nature of Software Architecture as a discipline, while the source of others is the background knowledge of learners. The paper suggests a set of principles and small-teaching methods to make teaching and learning more effective in such situations.
△ Less
Submitted 23 January, 2021;
originally announced January 2021.
-
Recovery and Analysis of Architecture Descriptions using Centrality Measures
Authors:
Sanjay Thakare,
Arvind W Kiwelekar
Abstract:
The necessity of an explicit architecture description has been continuously emphasized to communicate the system functionality and for system maintenance activities. This paper presents an approach to extract architecture descriptions using the {\em centrality measures} from the theory of Social Network Analysis. The architecture recovery approach presented in this paper works in two phases. The f…
▽ More
The necessity of an explicit architecture description has been continuously emphasized to communicate the system functionality and for system maintenance activities. This paper presents an approach to extract architecture descriptions using the {\em centrality measures} from the theory of Social Network Analysis. The architecture recovery approach presented in this paper works in two phases. The first phase aims to calculate centrality measures for each program element in the system. The second phase assumes that the system has been designed around the layered architecture style and assigns layers to each program element. Two techniques to assign program elements are presented. The first technique of layer assignment uses a set of pre-defined rules, while the second technique learns the rules of assignment from a pre-labelled data set. The paper presents the evaluation of both approaches.
△ Less
Submitted 23 January, 2021;
originally announced January 2021.
-
A Two-Systems Perspective for Computational Thinking
Authors:
Arvind W Kiwelekar,
Swanand Navandar,
Dharmendra K. Yadav
Abstract:
Computational Thinking (CT) has emerged as one of the vital thinking skills in recent times, especially for Science, Technology, Engineering and Management (STEM) graduates. Educators are in search of underlying cognitive models against which CT can be analyzed and evaluated. This paper suggests adopting Kahneman's two-systems model as a framework to understand the computational thought process. K…
▽ More
Computational Thinking (CT) has emerged as one of the vital thinking skills in recent times, especially for Science, Technology, Engineering and Management (STEM) graduates. Educators are in search of underlying cognitive models against which CT can be analyzed and evaluated. This paper suggests adopting Kahneman's two-systems model as a framework to understand the computational thought process. Kahneman's two-systems model postulates that human thinking happens at two levels, i.e. fast and slow thinking. This paper illustrates through examples that CT activities can be represented and analyzed using Kahneman's two-systems model. The potential benefits of adopting Kahneman's two-systems perspective are that it helps us to fix the biases that cause errors in our reasoning. Further, it also provides a set of heuristics to speed up reasoning activities.
△ Less
Submitted 6 December, 2020;
originally announced December 2020.
-
Use-cases of Blockchain Technology for Humanitarian Engineering
Authors:
Arvind W. Kiwelekar,
Sanil S. Gandhi,
Laxaman D. Netak,
Shankar B. Deosarkar
Abstract:
Humanitarian Engineers need innovative methods to make technological interventions for solving societal problems. The emerging blockchain technology has the enormous potential to provide effective interventions in various developmental sectors, including Agriculture, Education, Health, and Transportation. In these sectors, mediators have been considered as one of the impediments for developmental…
▽ More
Humanitarian Engineers need innovative methods to make technological interventions for solving societal problems. The emerging blockchain technology has the enormous potential to provide effective interventions in various developmental sectors, including Agriculture, Education, Health, and Transportation. In these sectors, mediators have been considered as one of the impediments for developmental work. Blockchain technology facilitates peer-to-peer business transactions, thus eliminating the role of mediators. Hence, the blockchain technology is emerging as an alternative to conventional mediator-centred solutions adopting client-server based Internet technologies. A combination of blockchain technology with other technologies can be used to address domain-specific challenges. For example, the combination of blockchain technology and Internet-of-Thing (IoT) has the potential to monitor the usage of scarce resources such as the level of ground-water and amount of energy consumption. The aims of this chapter are twofold. Firstly, it describes the primary building blocks of blockchain technology. Secondly, it illustrates various use-case scenarios of blockchain technology in the fields of Agriculture, Energy Health and others.
△ Less
Submitted 30 November, 2020;
originally announced December 2020.
-
Deep Learning Techniques for Geospatial Data Analysis
Authors:
Arvind W. Kiwelekar,
Geetanjali S. Mahamunkar,
Laxman D. Netak,
Valmik B Nikam
Abstract:
Consumer electronic devices such as mobile handsets, goods tagged with RFID labels, location and position sensors are continuously generating a vast amount of location enriched data called geospatial data. Conventionally such geospatial data is used for military applications. In recent times, many useful civilian applications have been designed and deployed around such geospatial data. For example…
▽ More
Consumer electronic devices such as mobile handsets, goods tagged with RFID labels, location and position sensors are continuously generating a vast amount of location enriched data called geospatial data. Conventionally such geospatial data is used for military applications. In recent times, many useful civilian applications have been designed and deployed around such geospatial data. For example, a recommendation system to suggest restaurants or places of attraction to a tourist visiting a particular locality. At the same time, civic bodies are harnessing geospatial data generated through remote sensing devices to provide better services to citizens such as traffic monitoring, pothole identification, and weather reporting. Typically such applications are leveraged upon non-hierarchical machine learning techniques such as Naive-Bayes Classifiers, Support Vector Machines, and decision trees. Recent advances in the field of deep-learning showed that Neural Network-based techniques outperform conventional techniques and provide effective solutions for many geospatial data analysis tasks such as object recognition, image classification, and scene understanding. The chapter presents a survey on the current state of the applications of deep learning techniques for analyzing geospatial data.
The chapter is organized as below: (i) A brief overview of deep learning algorithms. (ii)Geospatial Analysis: a Data Science Perspective (iii) Deep-learning techniques for Remote Sensing data analytics tasks (iv) Deep-learning techniques for GPS data analytics(iv) Deep-learning techniques for RFID data analytics.
△ Less
Submitted 30 August, 2020;
originally announced August 2020.
-
Role of Ontology Training to Software Engineering Students
Authors:
Arvind W Kiwelekar
Abstract:
Students of software engineering struggle to develop a systems perspective because most of the software engineering methodologies focus on developing a particular aspect of a system. Lack of unified coverage to the topic of systems modelling is identified as the root cause behind this problem. The paper explains the role of ontology in building systems perspective. A case for the necessity of onto…
▽ More
Students of software engineering struggle to develop a systems perspective because most of the software engineering methodologies focus on developing a particular aspect of a system. Lack of unified coverage to the topic of systems modelling is identified as the root cause behind this problem. The paper explains the role of ontology in building systems perspective. A case for the necessity of ontology training as a means to overcome this problem is presented. The course content for a typical course on ontology is also described in the paper.
△ Less
Submitted 17 October, 2019;
originally announced October 2019.
-
On Which Skills do Indian Universities Evaluate Software Engineering Students?
Authors:
Hansaraj S. Wankhede,
Sanil S. Gandhi,
Arvind W Kiwelekar
Abstract:
Universities conduct examinations to evaluate acquired skills and knowledge gained by students. An assessment of skills and knowledge levels evaluated during Software Engineering examinations is presented in this paper. The question items asked during examinations are analyzed from three dimensions that are cognitive levels, knowledge levels and knowledge areas. The Revised Bloom's Taxonomy is use…
▽ More
Universities conduct examinations to evaluate acquired skills and knowledge gained by students. An assessment of skills and knowledge levels evaluated during Software Engineering examinations is presented in this paper. The question items asked during examinations are analyzed from three dimensions that are cognitive levels, knowledge levels and knowledge areas. The Revised Bloom's Taxonomy is used to classify question items along the dimensions of cognitive levels and knowledge levels. Question items are also classified in various knowledge areas specified in ACM/IEEE's Computer Science Curricula. The analysis presented in this paper will be useful for software engineering educators to devise corrective interventions and employers of fresh graduates to design pre-induction training programs.
△ Less
Submitted 8 January, 2016;
originally announced January 2016.
-
An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology
Authors:
Arvind W. Kiwelekar,
Rushikesh K. Joshi
Abstract:
A UML based metamodel for Bunge-Wand-Weber (BWW) ontology is presented. BWW ontology is a generic framework for analysis and conceptualization of real world objects. It includes categories that can be applied to analyze and classify objects found in an information system. In the context of BWW ontology, the metamodel is a representation of the ontological categories and relationships among them.…
▽ More
A UML based metamodel for Bunge-Wand-Weber (BWW) ontology is presented. BWW ontology is a generic framework for analysis and conceptualization of real world objects. It includes categories that can be applied to analyze and classify objects found in an information system. In the context of BWW ontology, the metamodel is a representation of the ontological categories and relationships among them. An objective behind developing an object-oriented metamodel has been to model BWW ontology in terms of widely used notions in software development. The main contributions of this paper are a classification for ontological categories, a description template, and representations through UML and typed based models.
△ Less
Submitted 21 April, 2010;
originally announced April 2010.