Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396338
M. Tanveer
Agile Process is an established methodology mostly adopted by small organizations as a software process model because of its fast and effective response to client requirements during the software development cycle. For that matter, most of the agile practices are focused on team needs and are very effective in implementing client requirements. However, multi-portfolio and team based corporations employ Rational Unified Professing (RUP) model which is good in handling very complex processes but slower in terms of abrupt client interventions. A hybrid approach could be adopted to bring more accountability along with overcoming RUP's undesired delays. This paper analyses the strength and weakness of both Agile and RUP. Finally, an eclectic approach is suggested combining the best practices of both Agile and RUP in management, communication and predictability.
{"title":"Agile for large scale projects — A hybrid approach","authors":"M. Tanveer","doi":"10.1109/NSEC.2015.7396338","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396338","url":null,"abstract":"Agile Process is an established methodology mostly adopted by small organizations as a software process model because of its fast and effective response to client requirements during the software development cycle. For that matter, most of the agile practices are focused on team needs and are very effective in implementing client requirements. However, multi-portfolio and team based corporations employ Rational Unified Professing (RUP) model which is good in handling very complex processes but slower in terms of abrupt client interventions. A hybrid approach could be adopted to bring more accountability along with overcoming RUP's undesired delays. This paper analyses the strength and weakness of both Agile and RUP. Finally, an eclectic approach is suggested combining the best practices of both Agile and RUP in management, communication and predictability.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129322885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396340
Maham Jahangir, Nazish Yaqoob, Seemab Latif
VOIP (Voice over IP Protocol) is an emerging field including a lot of wholesale companies in market striving to give cost effective wholesale VoIP termination and business VoIP services to its clients. The VOIP wholesaler processes bulk of calls per day therefore, have to manage a large amount of data i.e. calls, clients, contracts and its account managers. Sales Management Systems are used to manage such records. This research focuses on one of such systems i.e. a sales management system for VOIP wholesaler. The system is deployed by a software house in Islamabad, Pakistan to a VOIP wholesaler to manage his business. The end user of the system faced difficulties while using the system. The system has different design issues. The purpose of this research is the identification and correction of these design issues to improve usability and user's experience. The design issues are highlighted after interviewing client, project manager and general issues which are not in accordance with HCI's (Human Computer Interaction) principles. The design issues are related to the interface of the system its color scheme and information display. The objective is to provide the most relevant and important information to the client on minimum clicks.
VOIP (Voice over IP Protocol)是一个新兴的领域,包括市场上许多批发公司都在努力为其客户提供具有成本效益的批发VOIP终端和商业VOIP服务。因此,VOIP批发商每天要处理大量的电话,必须管理大量的数据,即电话、客户、合同及其客户经理。销售管理系统用于管理这些记录。本研究的重点是其中一个这样的系统,即VOIP批发商的销售管理系统。该系统由巴基斯坦伊斯兰堡的一家软件公司部署给一家VOIP批发商,用于管理他的业务。系统的最终用户在使用系统时遇到了一些困难。该系统有不同的设计问题。本研究的目的是识别和纠正这些设计问题,以提高可用性和用户体验。在采访了客户、项目经理和不符合HCI(人机交互)原则的一般问题后,突出了设计问题。设计问题涉及到系统的界面、配色方案和信息显示。我们的目标是以最少的点击量向客户提供最相关和最重要的信息。
{"title":"Identification and improvement of design issues of a sales management system for VOIP wholesaler","authors":"Maham Jahangir, Nazish Yaqoob, Seemab Latif","doi":"10.1109/NSEC.2015.7396340","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396340","url":null,"abstract":"VOIP (Voice over IP Protocol) is an emerging field including a lot of wholesale companies in market striving to give cost effective wholesale VoIP termination and business VoIP services to its clients. The VOIP wholesaler processes bulk of calls per day therefore, have to manage a large amount of data i.e. calls, clients, contracts and its account managers. Sales Management Systems are used to manage such records. This research focuses on one of such systems i.e. a sales management system for VOIP wholesaler. The system is deployed by a software house in Islamabad, Pakistan to a VOIP wholesaler to manage his business. The end user of the system faced difficulties while using the system. The system has different design issues. The purpose of this research is the identification and correction of these design issues to improve usability and user's experience. The design issues are highlighted after interviewing client, project manager and general issues which are not in accordance with HCI's (Human Computer Interaction) principles. The design issues are related to the interface of the system its color scheme and information display. The objective is to provide the most relevant and important information to the client on minimum clicks.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396345
Anbreen Kausar, Rakhshenda Javaid, N. I. Rao, Muhammad Junaid Khan
The work presents an algorithm for recognition of isolated airstrips in multiscale Google satellite images. First, strong straight lines are detected by Radon Transform and airstrip detection is accomplished by detecting longest straight lines in multiresolution images at different altitudes. Later normalized crosscorrelation is used to find the degree of similarity among multiscale airstrip patterns. Finally, support vector machines are used to recognize airstrips. The proposed technique shows promising results in classifying airstrips from other commonly appearing objects in optical images taken from satellites i.e. roads, canals, large buildings, etc. Algorithm is dually tested on multiresolution images captured using various cameras at different heights and have produced similar results.
{"title":"Automatic recognition of isolated airstrips in multiscale satellite images using radon transformation and support vector machine","authors":"Anbreen Kausar, Rakhshenda Javaid, N. I. Rao, Muhammad Junaid Khan","doi":"10.1109/NSEC.2015.7396345","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396345","url":null,"abstract":"The work presents an algorithm for recognition of isolated airstrips in multiscale Google satellite images. First, strong straight lines are detected by Radon Transform and airstrip detection is accomplished by detecting longest straight lines in multiresolution images at different altitudes. Later normalized crosscorrelation is used to find the degree of similarity among multiscale airstrip patterns. Finally, support vector machines are used to recognize airstrips. The proposed technique shows promising results in classifying airstrips from other commonly appearing objects in optical images taken from satellites i.e. roads, canals, large buildings, etc. Algorithm is dually tested on multiresolution images captured using various cameras at different heights and have produced similar results.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396339
Mehreen Ahmed, Mahum Adil, Seemab Latif
Human Computer Interactivity plays a vital role in a web application's success. A survey evaluation was undertaken of a web application prototype named "My Portfolio", directed towards the students of different universities. The aim of the survey was to find the shortcomings in the interface design, whether it followed the design principles and if the web application is user-friendly. A questionnaire, consisting of 16 questions was distributed among the students. The questions were made after studying some basic Human Computer Interaction design principles. The overall assessment of the web application was very positive and some evaluators mentioned that they liked the simplicity and color scheme of the application. We summarize the findings of our study and discuss the issues that need to be resolved in the next prototype.
{"title":"Web application prototype: State-of-art survey evaluation","authors":"Mehreen Ahmed, Mahum Adil, Seemab Latif","doi":"10.1109/NSEC.2015.7396339","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396339","url":null,"abstract":"Human Computer Interactivity plays a vital role in a web application's success. A survey evaluation was undertaken of a web application prototype named \"My Portfolio\", directed towards the students of different universities. The aim of the survey was to find the shortcomings in the interface design, whether it followed the design principles and if the web application is user-friendly. A questionnaire, consisting of 16 questions was distributed among the students. The questions were made after studying some basic Human Computer Interaction design principles. The overall assessment of the web application was very positive and some evaluators mentioned that they liked the simplicity and color scheme of the application. We summarize the findings of our study and discuss the issues that need to be resolved in the next prototype.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122398276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396336
Amna Rahman, Mehreen Sirshar, Aliya Khan
According to analysis reports on road accidents of recent years, it's renowned that the main cause of road accidents resulting in deaths, severe injuries and monetary losses, is due to a drowsy or a sleepy driver. Drowsy state may be caused by lack of sleep, medication, drugs or driving continuously for long time period. An increase rate of roadside accidents caused due to drowsiness during driving indicates a need of a system that detects such state of a driver and alerts him prior to the occurrence of any accident. During the recent years, many researchers have shown interest in drowsiness detection. Their approaches basically monitor either physiological or behavioral characteristics related to the driver or the measures related to the vehicle being used. A literature survey summarizing some of the recent techniques proposed in this area is provided. To deal with this problem we propose an eye blink monitoring algorithm that uses eye feature points to determine the open or closed state of the eye and activate an alarm if the driver is drowsy. Detailed experimental findings are also presented to highlight the strengths and weaknesses of our technique. An accuracy of 94% has been recorded for the proposed methodology.
{"title":"Real time drowsiness detection using eye blink monitoring","authors":"Amna Rahman, Mehreen Sirshar, Aliya Khan","doi":"10.1109/NSEC.2015.7396336","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396336","url":null,"abstract":"According to analysis reports on road accidents of recent years, it's renowned that the main cause of road accidents resulting in deaths, severe injuries and monetary losses, is due to a drowsy or a sleepy driver. Drowsy state may be caused by lack of sleep, medication, drugs or driving continuously for long time period. An increase rate of roadside accidents caused due to drowsiness during driving indicates a need of a system that detects such state of a driver and alerts him prior to the occurrence of any accident. During the recent years, many researchers have shown interest in drowsiness detection. Their approaches basically monitor either physiological or behavioral characteristics related to the driver or the measures related to the vehicle being used. A literature survey summarizing some of the recent techniques proposed in this area is provided. To deal with this problem we propose an eye blink monitoring algorithm that uses eye feature points to determine the open or closed state of the eye and activate an alarm if the driver is drowsy. Detailed experimental findings are also presented to highlight the strengths and weaknesses of our technique. An accuracy of 94% has been recorded for the proposed methodology.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130294442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396343
K. Mehmood, H. Afzal, A. Majeed, Hassan Latif
With the increased usage of internet and mobile phones, number of spams has also increased in both these areas. The Spam in both these areas is an increasing threat and sometimes cause huge financial as well as data/confidentiality loss. Therefore, actions need to be taken to stop these spams on both media. This paper analyses various techniques that are currently being used in Spam filtering in the context of mobile text messages. The contents of SMS are unique in nature so some techniques might be effective while some might not be. Some of mostly used algorithms and techniques are discussed in this paper. Furthermore, we have performed automatic spam filtering using machine learning algorithms on Roman Urdu text messages and achieved an accuracy of 92.2% on a manually curated corpus of 8449 messages. The SMS corpus has also been made available for future research works.
{"title":"Contributions to the study of bi-lingual Roman Urdu SMS spam filtering","authors":"K. Mehmood, H. Afzal, A. Majeed, Hassan Latif","doi":"10.1109/NSEC.2015.7396343","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396343","url":null,"abstract":"With the increased usage of internet and mobile phones, number of spams has also increased in both these areas. The Spam in both these areas is an increasing threat and sometimes cause huge financial as well as data/confidentiality loss. Therefore, actions need to be taken to stop these spams on both media. This paper analyses various techniques that are currently being used in Spam filtering in the context of mobile text messages. The contents of SMS are unique in nature so some techniques might be effective while some might not be. Some of mostly used algorithms and techniques are discussed in this paper. Furthermore, we have performed automatic spam filtering using machine learning algorithms on Roman Urdu text messages and achieved an accuracy of 92.2% on a manually curated corpus of 8449 messages. The SMS corpus has also been made available for future research works.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115031178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396344
Faisal Javeed, Aqdas Naz, T. N. Qureshi, A. Basit, N. Iltaf
In last decade researchers have a growing attention in domain of Wireless Sensor Networks (WSNs) due to numerous increasing automated industry and battle field applications. WSNs comprises of hundreds or even thousands of unsystematically deployed energy lacking sensor units. These sensors are aimed to transfer data from the field to distant Base Station (BS). This operation necessitate excessive energy. Minimizing energy expenditure and spreading WSN lifetime are prodigious tasks. Development of energy saving routing mechanism is one of the main issues in WSNs. In practical scenario almost all the WSNs are heterogenous or become heterogenous after small life span. Practically efficiency of every protocol changes with diverse heterogeneity environment. There is a dire need for testing of routing protocols underling varying heterogeneous parameters to cope with the practical scenario problems. In this paper performance of DEEC (Distributed Energy-Efficient Clustering), DDEEC (Developed DEEC), TDEEC (Threshold DEEC) and BEENISH (Balanced Energy Efficient Network Integrated Super Heterogenous) are evaluated with respect to varying heterogeneity metrics. Testing shows the variable behaviour of protocols with changing environment. However BEENISH performs the best in all cases and performance is sustained in varying heterogeneous scenarios.
{"title":"A review on variant clustering designs in heterogeneous WSNs","authors":"Faisal Javeed, Aqdas Naz, T. N. Qureshi, A. Basit, N. Iltaf","doi":"10.1109/NSEC.2015.7396344","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396344","url":null,"abstract":"In last decade researchers have a growing attention in domain of Wireless Sensor Networks (WSNs) due to numerous increasing automated industry and battle field applications. WSNs comprises of hundreds or even thousands of unsystematically deployed energy lacking sensor units. These sensors are aimed to transfer data from the field to distant Base Station (BS). This operation necessitate excessive energy. Minimizing energy expenditure and spreading WSN lifetime are prodigious tasks. Development of energy saving routing mechanism is one of the main issues in WSNs. In practical scenario almost all the WSNs are heterogenous or become heterogenous after small life span. Practically efficiency of every protocol changes with diverse heterogeneity environment. There is a dire need for testing of routing protocols underling varying heterogeneous parameters to cope with the practical scenario problems. In this paper performance of DEEC (Distributed Energy-Efficient Clustering), DDEEC (Developed DEEC), TDEEC (Threshold DEEC) and BEENISH (Balanced Energy Efficient Network Integrated Super Heterogenous) are evaluated with respect to varying heterogeneity metrics. Testing shows the variable behaviour of protocols with changing environment. However BEENISH performs the best in all cases and performance is sustained in varying heterogeneous scenarios.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127526181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396342
Pir Masoom Shah, M. A. Shah
Complex adaptive network (CANs) is the collection of the interacting agents. These agents work under the influence of each other. One change in the behavior of an agent in a CAN can lead to the change in whole network. CANs are dynamic network as they have ability to adapt and grow in its environment. This paper survey different aspects of CANs like security, synchronization, agent base modeling and architecture of CANs. We group different attributes and show how team work among the nodes or agents in a CAN can lead to a larger adaptation in a network.
{"title":"Complex and adaptive networks: A survey on performance enhancements attributes","authors":"Pir Masoom Shah, M. A. Shah","doi":"10.1109/NSEC.2015.7396342","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396342","url":null,"abstract":"Complex adaptive network (CANs) is the collection of the interacting agents. These agents work under the influence of each other. One change in the behavior of an agent in a CAN can lead to the change in whole network. CANs are dynamic network as they have ability to adapt and grow in its environment. This paper survey different aspects of CANs like security, synchronization, agent base modeling and architecture of CANs. We group different attributes and show how team work among the nodes or agents in a CAN can lead to a larger adaptation in a network.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396341
Sidra Aslam, M. A. Shah
Cloud computing has become popular due to its attractive features. The load on the cloud is increasing tremendously with the development of new applications. Load balancing is an important part of cloud computing environment which ensures that all devices or processors perform same amount of work in equal amount of time. Different models and algorithms for load balancing in cloud computing has been developed with the aim to make cloud resources accessible to the end users with ease and convenience. In this paper, we aim to provide a structured and comprehensive overview of the research on load balancing algorithms in cloud computing. This paper surveys the state of the art load balancing tools and techniques over the period of 2004-2015. We group existing approaches aimed at providing load balancing in a fair manner. With this categorization we provide an easy and concise view of the underlying model adopted by each approach.
{"title":"Load balancing algorithms in cloud computing: A survey of modern techniques","authors":"Sidra Aslam, M. A. Shah","doi":"10.1109/NSEC.2015.7396341","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396341","url":null,"abstract":"Cloud computing has become popular due to its attractive features. The load on the cloud is increasing tremendously with the development of new applications. Load balancing is an important part of cloud computing environment which ensures that all devices or processors perform same amount of work in equal amount of time. Different models and algorithms for load balancing in cloud computing has been developed with the aim to make cloud resources accessible to the end users with ease and convenience. In this paper, we aim to provide a structured and comprehensive overview of the research on load balancing algorithms in cloud computing. This paper surveys the state of the art load balancing tools and techniques over the period of 2004-2015. We group existing approaches aimed at providing load balancing in a fair manner. With this categorization we provide an easy and concise view of the underlying model adopted by each approach.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116694511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/NSEC.2015.7396337
Shahab U. Ansari, M. Hussain, A. Rashid, Suleman Mazhar, S. M. Ahmad
This paper presents a parallel stabilized mixed Galerkin method for three-dimensional steady-state Darcy flow using OpenMP for shared memory architecture. In finite element problems, the computational complexity increases with increasing number of elements needed for large and complex geometry. Shared memory architecture offers a platform for solving such large and complex problems for practical applications. In parallel solvers, the mesh reordering has proved to be an important preprocessing operation to enhance performance. The objective of this study is to compare the performance of octree-based mesh reordering with multilevel-based reordering in the parallel solution. The reported results include execution time, speedup and efficiency of the solution using hexahedral and tetrahedral meshes of various sizes. The numerical results suggest that the octree-based mesh reordering outperforms multilevel-based method with tetrahedral meshes.
{"title":"Parallel stabilized mixed Galerkin method for three-dimensional Darcy flow using OpenMP","authors":"Shahab U. Ansari, M. Hussain, A. Rashid, Suleman Mazhar, S. M. Ahmad","doi":"10.1109/NSEC.2015.7396337","DOIUrl":"https://doi.org/10.1109/NSEC.2015.7396337","url":null,"abstract":"This paper presents a parallel stabilized mixed Galerkin method for three-dimensional steady-state Darcy flow using OpenMP for shared memory architecture. In finite element problems, the computational complexity increases with increasing number of elements needed for large and complex geometry. Shared memory architecture offers a platform for solving such large and complex problems for practical applications. In parallel solvers, the mesh reordering has proved to be an important preprocessing operation to enhance performance. The objective of this study is to compare the performance of octree-based mesh reordering with multilevel-based reordering in the parallel solution. The reported results include execution time, speedup and efficiency of the solution using hexahedral and tetrahedral meshes of various sizes. The numerical results suggest that the octree-based mesh reordering outperforms multilevel-based method with tetrahedral meshes.","PeriodicalId":113822,"journal":{"name":"2015 National Software Engineering Conference (NSEC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114725796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}