{"title":"Computing Education: A Discussion Paper on Teaching and Assessing Ethics","authors":"P. Oriogun, Babatunde Ogunleye-Johnson","doi":"10.1109/ACSEAC.2012.11","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.11","url":null,"abstract":"The need to teach and assess ethics in computing education cannot be overemphasized. This is not unconnected to the ubiquitous nature of computing products and services, which has made ethical considerations of their use a focal point in the twenty-first century. The pervasiveness of computers in everyday life is a fact that defines the twenty-first century. However, as important and useful as the transformational field of computing is in this age, it's potential for harm and as catalyst for disaster or catastrophe has increased. Therefore, there is urgent need to review the inclusion of ethics teaching and assessment in the educational training of computing students in order to guard against the perceived negative tendencies of computing. This paper seeks to contribute to the discussion on the need to advance the teaching and assessment of ethics in the computing disciplines. This, we believe is necessary to better prepare students for the incredibly demanding and complex world that awaits them after graduation.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122421913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring User Requirements Dependency: The Organizational Perspective","authors":"Mesfin Kifle","doi":"10.1109/ACSEAC.2012.17","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.17","url":null,"abstract":"In organizational environment, user requirements are key system aspects that need to be realized in the system-to-be context. Aiming to support transformational development, organizations insist to acquire software business applications that satisfy business goals and processes strategically. A software product quality for an organization depends on how well it fits to the organizational goals and business processes. In system problem decomposition, requirements dependency is critically important to measure cohesion and coupling properties of business applications. It can also be used to set acceptance criteria. The more software engineering techniques are getting far from organizational settings the gap between the business requirements and application increases. Such gaps can be minimized by employing context sensitive methods. In this paper, a heuristic method is presented to measure user requirements intentional and flow dependency by considering goal-scenario modeling. The method is designed by aligning business goals, processes, and scenario concepts.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security-Oriented Design for Web-Based Systems: A Critical Review","authors":"Marriette Katarahweire, J. Balikuddembe","doi":"10.1109/ACSEAC.2012.15","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.15","url":null,"abstract":"Security of web-based systems still remains a key challenge for most IT executives, for software is vulnerable at various stages and most severely weakened in the operational environment. In the past, models and tools or even design techniques have been devised to tackle this challenge. But we still see the reemergence of the same security issues that afflict both traditional and modern web-based systems. Our major goal is to examine what has been done to date in managing this risk, particularly during the software development process and at the deployment stage, so as to establish the research gap upon which further research can revolve. Our findings show that available literature has not extensively addressed how current security mitigating mechanisms can enhance the development of secure web-based systems. Hence, future work directed at bridging this perspective will perhaps provide more insight in advanced techniques that can help manage this problem.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132128306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maxwell Omwenga Momanyi, J. Sansa-Otim, Agnes F. N. Lumala
{"title":"Robust Mobile Cloud Services through Offline Support","authors":"Maxwell Omwenga Momanyi, J. Sansa-Otim, Agnes F. N. Lumala","doi":"10.1109/ACSEAC.2012.27","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.27","url":null,"abstract":"Cloud computing improves the efficiency of mobile applications. This is because data storage and processing are moved from the low resourced mobile devices to the cloud. Mobile cloud computing however, faces the challenge of intermittent cellular network connection since it is through the connection that services are reached. In this paper we argue that providing mobile cloud applications with temporary off-line file storage increases their robustness without burdening the low resourced mobile handset. We develop a module that offers off-line support which we plug into a mobile cloud calendar and we call it MobiCal.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indoor Navigation Using a Mobile Phone","authors":"Brett Ausmeier, T. Campbell, S. Berman","doi":"10.1109/ACSEAC.2012.26","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.26","url":null,"abstract":"This paper describes the Innovation system for indoor navigation using a mobile phone. A tool such as this requires a method of storing building data and routing information on the phone, as well as the ability to automatically track phone location as users walk around. We describe two alternative approaches to mapping building data along with a routing database design that make the project viable despite the limited storage, processing power and battery life of the phone. In particular, we compare GUI building plan annotation on a desktop computer with pedometer-based mapping of a building using the accelerometer on a mobile phone. Experiments indicate that users found plan annotation usable and database size scaled well for large buildings. The accelerometer-based approach to mapping a building was not acceptable due to inaccurate distance estimates, however this was adequate for tracking and directing users through a building, since small imprecisions were easily accommodated by users - they appreciated that directions would not give exact distances and were able to follow instructions to their destination in all test cases.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shamim Ripon, Sk. Jahir Hossain, Keya Azad, M. Hassan
{"title":"Logic Verification of Product-Line Variant Requirements","authors":"Shamim Ripon, Sk. Jahir Hossain, Keya Azad, M. Hassan","doi":"10.1109/ACSEAC.2012.14","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.14","url":null,"abstract":"Formal verification of variant requirements has gained much interest in the software product line (SPL) community. Feature diagrams are widely used to model product line variants. However, there is a lack of precisely defined formal notation for representing and verifying such models. This paper presents an approach to modeling and verifying SPL variant feature diagrams using first-order logic. It provides a precise and rigorous formal interpretation of the feature diagrams. Logical expressions can be built by modeling variants and their dependencies by using propositional connectives. These expressions can then be validated by any suitable verification tool. A case study of a Computer Aided Dispatch (CAD) system variant feature model is presented to illustrate the verification process.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132399481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiences in Creating Inclusive Information and Communications Technologies (IICT): Democratizing Software Development in Social Development","authors":"C. Hanyane","doi":"10.1109/ACSEAC.2012.13","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.13","url":null,"abstract":"Crowd sourcing, citizen journalism and social networks are Information and Communications Technologies (ICT) that have ushered in civil society's participation in the ICT equation. However, the participation of civil society has been limited to creating content and, to some extent, capturing data about events around the community. An area that has been neglected is the inclusion of these new players in the software development life cycle. Democratizing software development by including civil society in the software development life cycle will increase the variety of software applications and generate more buy-in of applications that improve livelihoods. Such an approach will lead to the emergence of Inclusive Information and Communication Technologies (IICT). The challenges that arise when developing IICTs include, inter alia, ownership of IICT, computer illiteracy of beneficiary communities, balkanized nature of communities in place and the well-known challenge of the communication gap between software developers and user communities. My approach to addressing these challenges was to develop the Integrated Development Spatial Planning Framework (IDSPF), a systems development methodology that seeks to demystify software development for grassroots communities by using participatory techniques that are familiar to stakeholders who implement socio economic development projects.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130013401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Raboanary, J. Raboanary, Heriniaina Andry Raboanary, Tantely Mahefatiana Raboanary
{"title":"Topological Structure of Knowledge","authors":"T. Raboanary, J. Raboanary, Heriniaina Andry Raboanary, Tantely Mahefatiana Raboanary","doi":"10.1109/ACSEAC.2012.25","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.25","url":null,"abstract":"In this paper, we introduce a model of knowledge based on information structures. We show this model captures the intuitive knowledge. Then we show that it is equivalent to the Kripke model. Finally, we put a Topology on this structure. This approach could give a new insight on the area of Artificial Intelligence and other areas such as Game theory, economics, and social sciences.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Laboratory Development for Teaching Power Systems via Interactive Experiment Environment","authors":"J. S. Djeumen, J. Le Roux, D. Nicolae","doi":"10.1109/ACSEAC.2012.18","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.18","url":null,"abstract":"The creation and testing of computer-simulated interactive environment laboratory for use in the power systems field education will provide a highly interactive and powerful learning environment for all undergraduate power engineering students. This experiment will prepare students to approach their practical with more confidence and to better understand the theory in the class room. The study of electrical power systems requires a solid background on advanced mathematics, but many engineering students lack this required background. Using this tool, undergraduate students may improve their performance. MATLAB, particularly its Graphical User Interface (GUI)software has been used to design the interactive environment to calculate the fault currents and voltages that occur for different types of fault on the power systems transmission line. The manipulation on the internal connection of the power system components are the main focus. This paper describes the design of an interactive environment experiment for studying power systems fault analysis and the program will make the practical experiments in power engineering more attractive and understandable to undergraduate students.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heriniaina Andry Raboanary, J. Raboanary, T. Raboanary
{"title":"Using a Genetic Algorithm for Mining Patterns from Endgame Databases","authors":"Heriniaina Andry Raboanary, J. Raboanary, T. Raboanary","doi":"10.1109/ACSEAC.2012.24","DOIUrl":"https://doi.org/10.1109/ACSEAC.2012.24","url":null,"abstract":"Tic-tac-toe and Fanorona games are ones that can be played at an extremely high level by computer engines. Endgame databases are powerful tools to create these engines. These Endgame databases contain precious information's about how to play the game. Unfortunately, it is quite impossible for human players to learn the game strategies from endgame databases, which are only made of raw sequences of bits. The work presented here is the use of genetic algorithms to extract human friendly knowledge from these databases.","PeriodicalId":395297,"journal":{"name":"2012 African Conference for Sofware Engineering and Applied Computing","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114518018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}