Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140639
N. Minhas, Shahla Majeed, Ziaul Qayyum, Muhammad Aasem
The nature of software requirements is very much subjective and multi-faceted. The level of complexity increases along-with the volume, especially when the requirements are in natural language. In the primary phase of requirements engineering, it is mostly desirable to transform these user written requirements into more understandable form. Organizing the requirements in different groups may support further activities much easier than direct working. In this paper, we present a classifier that sufficiently transforms natural language written requirements into corresponding groups. The organization of these groups depends upon the inter-keywords association i.e., hierarchy of keywords. The classifier works best when requirements have been written using relative vocabulary i.e., controlled vocabulary. The overall structure of this technique is composed on three main components: 1) Repository: of keywords and their relationships as source data, 2) Mapping: Finding words in the requirements document with keywords of repository, and 3) Presentation: presenting classified (grouped) requirements in more meaningful ways.
{"title":"Controlled vocabulary based software requirements classification","authors":"N. Minhas, Shahla Majeed, Ziaul Qayyum, Muhammad Aasem","doi":"10.1109/MYSEC.2011.6140639","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140639","url":null,"abstract":"The nature of software requirements is very much subjective and multi-faceted. The level of complexity increases along-with the volume, especially when the requirements are in natural language. In the primary phase of requirements engineering, it is mostly desirable to transform these user written requirements into more understandable form. Organizing the requirements in different groups may support further activities much easier than direct working. In this paper, we present a classifier that sufficiently transforms natural language written requirements into corresponding groups. The organization of these groups depends upon the inter-keywords association i.e., hierarchy of keywords. The classifier works best when requirements have been written using relative vocabulary i.e., controlled vocabulary. The overall structure of this technique is composed on three main components: 1) Repository: of keywords and their relationships as source data, 2) Mapping: Finding words in the requirements document with keywords of repository, and 3) Presentation: presenting classified (grouped) requirements in more meaningful ways.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140719
M. Azeem, S. Khan
Offshore software development outsourcing (OSDO) is an emerging business approach adopted by many software development organizations in developed countries. Developing software at offshore locations has many benefits including access to large labor pool, low development cost and round-the-clock development. However, inspite of these benefits OSDO presents a variety of challenges to the software development organizations including temporal, geographical and intercultural differences. Intercultural differences cause many problems to vendors in OSDO relationships. This research seeks to identify the potential intercultural challenges faced by vendors in OSDO relationships by reviewing the literature in a systematic way. We have developed a systematic literature review (SLR) protocol, and are in the process of implementing the protocol. SLR is based on a structured protocol, and is therefore, different from ordinary literature review. SLR provides in-depth and more thorough results than ordinary literature review. The expected outcomes of this review will be the identification of intercultural challenges or barriers faced by vendor organisations in the establishment and maintenance of OSDO relationships.
{"title":"Intercultural challenges in offshore software development outsourcing relationships: A systematic literature review protocol","authors":"M. Azeem, S. Khan","doi":"10.1109/MYSEC.2011.6140719","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140719","url":null,"abstract":"Offshore software development outsourcing (OSDO) is an emerging business approach adopted by many software development organizations in developed countries. Developing software at offshore locations has many benefits including access to large labor pool, low development cost and round-the-clock development. However, inspite of these benefits OSDO presents a variety of challenges to the software development organizations including temporal, geographical and intercultural differences. Intercultural differences cause many problems to vendors in OSDO relationships. This research seeks to identify the potential intercultural challenges faced by vendors in OSDO relationships by reviewing the literature in a systematic way. We have developed a systematic literature review (SLR) protocol, and are in the process of implementing the protocol. SLR is based on a structured protocol, and is therefore, different from ordinary literature review. SLR provides in-depth and more thorough results than ordinary literature review. The expected outcomes of this review will be the identification of intercultural challenges or barriers faced by vendor organisations in the establishment and maintenance of OSDO relationships.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140712
Al-Fahim Mubarak Ali, S. Sulaiman, Sharifah Mashita Syed-Mohamad
Maintainability is an important attribute when developing software. One of the factors that negatively affect maintainability of software is cloning. Cloning is identical copies of the same instances or fragments. Code cloning happens due to rapid changes when programmers perform clone instances and copy-paste technique. Although copy and paste is widely used in code reusability approach, it significantly increases maintenance cost. Current code clone research focuses in detection and analysis of code clones in order to help software developers to identify code clones in a source code and reuse the source code in order to decrease the maintenance cost. Necessary measures needed in order to reduce issues caused by cloning during implementation. Therefore, there is a need in exploring problems and possibilities associated in code cloning. This paper proposes an enhancement of a generic pipeline model for code clone detection. With the support of a tool, we implement and apply the proposed approach.
{"title":"An enhanced generic pipeline model for code clone detection","authors":"Al-Fahim Mubarak Ali, S. Sulaiman, Sharifah Mashita Syed-Mohamad","doi":"10.1109/MYSEC.2011.6140712","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140712","url":null,"abstract":"Maintainability is an important attribute when developing software. One of the factors that negatively affect maintainability of software is cloning. Cloning is identical copies of the same instances or fragments. Code cloning happens due to rapid changes when programmers perform clone instances and copy-paste technique. Although copy and paste is widely used in code reusability approach, it significantly increases maintenance cost. Current code clone research focuses in detection and analysis of code clones in order to help software developers to identify code clones in a source code and reuse the source code in order to decrease the maintenance cost. Necessary measures needed in order to reduce issues caused by cloning during implementation. Therefore, there is a need in exploring problems and possibilities associated in code cloning. This paper proposes an enhancement of a generic pipeline model for code clone detection. With the support of a tool, we implement and apply the proposed approach.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140656
Muthukkaruppan Annamalai, M. M. Rosli
Semantic network is a promising technological platform that uses the internet and intranet, and related software technologies to explicitly integrate disparate applications in linked organisations such as enterprises. A primary element of the semantic network is ontology. The adoption of semantic network in enterprises is impeded by the lack of enduring methodologies for engineering reliable ontologies to support the evolving enterprise applications on the envisaged meaning-laden network. Consequently, the paper recognises the systematic and disciplined approach of Software Engineering (SE) as relevant course for Enterprise-strength Ontology Engineering (EsOE), and sets out to reflect EsOE in the light of SE. It identifies the common ground among the contemporary SE models, and suggests exploiting these commonalities to serve as a basis for EsOE. Following the idea of maturity models, the proposed high-level methodology is structured into three levels of realisation, each described by a process, namely, Engineering, Project-focus and Organisation-focus processes.
{"title":"Software engineering approach to enterprise-strength ontology engineering","authors":"Muthukkaruppan Annamalai, M. M. Rosli","doi":"10.1109/MYSEC.2011.6140656","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140656","url":null,"abstract":"Semantic network is a promising technological platform that uses the internet and intranet, and related software technologies to explicitly integrate disparate applications in linked organisations such as enterprises. A primary element of the semantic network is ontology. The adoption of semantic network in enterprises is impeded by the lack of enduring methodologies for engineering reliable ontologies to support the evolving enterprise applications on the envisaged meaning-laden network. Consequently, the paper recognises the systematic and disciplined approach of Software Engineering (SE) as relevant course for Enterprise-strength Ontology Engineering (EsOE), and sets out to reflect EsOE in the light of SE. It identifies the common ground among the contemporary SE models, and suggests exploiting these commonalities to serve as a basis for EsOE. Following the idea of maturity models, the proposed high-level methodology is structured into three levels of realisation, each described by a process, namely, Engineering, Project-focus and Organisation-focus processes.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140663
Siti Nor Asikin Kamalzaman, S. Sulaiman, Sharifah Mashita Syed-Mohamad
Nowadays, a lot of development of Web applications use prototyping approach such as throw-away prototyping and evolutionary prototyping. In order to fulfill the users' requirements, developers need to communicate with the users, therefore prototyping is widely used in software development to assist these developers. As we develop Web application and release them as a number of versions or releases of prototype, it constantly requires changes to evolve and meet users' specific requirements. Thus, prototyping approach may cause more maintenance cost to be incurred due to scope creep during software development. In addition, it provides the challenges to a maintenance team who is mostly not the actual development team, to manage and track maintenance process of such Web applications. This paper proposes a user-centered technique for managing and tracking modification requests in a Web application. We anticipate that the proposed technique can assist maintainers to manage and track modification of a Web application in more effective and efficient manner by capturing, classifying and validating the enhancement requests, problem report and modification requests directly from the users during the prototyping process itself. This in turn will avoid unexpected modification requests once we release the Web application and to allow the tracing of both enhancement and problem report during prototyping and modification requests and problem report during maintenance.
{"title":"User-centered technique for managing and tracking modification requests in prototype-based web applications","authors":"Siti Nor Asikin Kamalzaman, S. Sulaiman, Sharifah Mashita Syed-Mohamad","doi":"10.1109/MYSEC.2011.6140663","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140663","url":null,"abstract":"Nowadays, a lot of development of Web applications use prototyping approach such as throw-away prototyping and evolutionary prototyping. In order to fulfill the users' requirements, developers need to communicate with the users, therefore prototyping is widely used in software development to assist these developers. As we develop Web application and release them as a number of versions or releases of prototype, it constantly requires changes to evolve and meet users' specific requirements. Thus, prototyping approach may cause more maintenance cost to be incurred due to scope creep during software development. In addition, it provides the challenges to a maintenance team who is mostly not the actual development team, to manage and track maintenance process of such Web applications. This paper proposes a user-centered technique for managing and tracking modification requests in a Web application. We anticipate that the proposed technique can assist maintainers to manage and track modification of a Web application in more effective and efficient manner by capturing, classifying and validating the enhancement requests, problem report and modification requests directly from the users during the prototyping process itself. This in turn will avoid unexpected modification requests once we release the Web application and to allow the tracing of both enhancement and problem report during prototyping and modification requests and problem report during maintenance.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140699
Ali MohammadAliZadeh Ghazijahani, R. Atan
Communication among software and hardware engineers plays an important and significant role in successful completion of projects in the environments that hardware and software engineers cooperate to develop common products. In these environments communication is inevitable because both hardware and software engineers need to be aware of each other's main challenges and concerns with respect to the common project. The need for this communication is perceived to be even more in developing hardware-software interfaces and also in clarification of types and formats of the data that will be transferred between hardware and software components. In this paper, three different notations are proposed to help software and hardware engineers communicate each other in written and document-based way. By using these notations which are understandable by hardware and software engineers, the requirements relating to the data types and data formats will be depicted in uniform, detailed and accurate forms of documents. These notations that will be drawn by either hardware or software engineers in requirements phase, will describe the type and format of any interaction data at any size.
{"title":"Data format notations for technical communication among hardware and software engineers","authors":"Ali MohammadAliZadeh Ghazijahani, R. Atan","doi":"10.1109/MYSEC.2011.6140699","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140699","url":null,"abstract":"Communication among software and hardware engineers plays an important and significant role in successful completion of projects in the environments that hardware and software engineers cooperate to develop common products. In these environments communication is inevitable because both hardware and software engineers need to be aware of each other's main challenges and concerns with respect to the common project. The need for this communication is perceived to be even more in developing hardware-software interfaces and also in clarification of types and formats of the data that will be transferred between hardware and software components. In this paper, three different notations are proposed to help software and hardware engineers communicate each other in written and document-based way. By using these notations which are understandable by hardware and software engineers, the requirements relating to the data types and data formats will be depicted in uniform, detailed and accurate forms of documents. These notations that will be drawn by either hardware or software engineers in requirements phase, will describe the type and format of any interaction data at any size.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128201843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140687
Sabrina Ahmad, A. Muda, N. A. Muda, Zahriah Othman
This paper presents an approach to estimate the savings from implementing negotiation in requirements elicitation process. The aim of implementing negotiation is to minimize the possibility of introducing defects during the creation of requirements and to decrease later effort required to fix requirements defects. An empirical evaluation study is adopted through a role play experiment to evaluate the benefit of exercising negotiation. The net-gain and the return-on-investment show positive value which suggest that negotiation activities worth an investment. Based on the return-on-investment of 197 percent in average, this paper suggests that negotiation is a useful prevention activity to inhibit defects from occurring during the creation of requirements.
{"title":"An approach to estimate the savings from negotiation based on cost-benefit analysis model","authors":"Sabrina Ahmad, A. Muda, N. A. Muda, Zahriah Othman","doi":"10.1109/MYSEC.2011.6140687","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140687","url":null,"abstract":"This paper presents an approach to estimate the savings from implementing negotiation in requirements elicitation process. The aim of implementing negotiation is to minimize the possibility of introducing defects during the creation of requirements and to decrease later effort required to fix requirements defects. An empirical evaluation study is adopted through a role play experiment to evaluate the benefit of exercising negotiation. The net-gain and the return-on-investment show positive value which suggest that negotiation activities worth an investment. Based on the return-on-investment of 197 percent in average, this paper suggests that negotiation is a useful prevention activity to inhibit defects from occurring during the creation of requirements.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140706
T. N. M. Aris, S. A. Nazeer
Comprehending Object-Oriented Programming (OOP) concepts is a difficult task especially for novice students. This usually happens during the transition form learning fundamental concepts to object-oriented (OO) concepts. When given an OO problem to solve, novices find it hard to relate with objects. If novices can view the world based on real objects, this can help them solve their problem of comprehending the OO concepts. In this paper, we propose to design an agent model to understand the semantics of OO Java source codes. The agents are designed based on the Belief-Desire-Intention (BDI) architecture. Three agents namely GUI agent, semantic agent and novice agents are constructed. The GUI agent is controlled by the user to provide source codes examples. The semantic agent submits the source codes to the novice agent and explains the semantic or meaning of the source codes to the novice agent. The process involves source codes comparison technique. This model provides an OOP semantics knowledge representation based on intelligent agents.
{"title":"Object-oriented programming semantics education based on intelligent agents","authors":"T. N. M. Aris, S. A. Nazeer","doi":"10.1109/MYSEC.2011.6140706","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140706","url":null,"abstract":"Comprehending Object-Oriented Programming (OOP) concepts is a difficult task especially for novice students. This usually happens during the transition form learning fundamental concepts to object-oriented (OO) concepts. When given an OO problem to solve, novices find it hard to relate with objects. If novices can view the world based on real objects, this can help them solve their problem of comprehending the OO concepts. In this paper, we propose to design an agent model to understand the semantics of OO Java source codes. The agents are designed based on the Belief-Desire-Intention (BDI) architecture. Three agents namely GUI agent, semantic agent and novice agents are constructed. The GUI agent is controlled by the user to provide source codes examples. The semantic agent submits the source codes to the novice agent and explains the semantic or meaning of the source codes to the novice agent. The process involves source codes comparison technique. This model provides an OOP semantics knowledge representation based on intelligent agents.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122230946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140717
M. Faisal, M. Shahbaz, S. Tariq, Waqar Ahmad, Qaisar Abbas
Enterprise resource planning (ERP) / information systems are maintained the business-process integration, which provides past records for decision-making. By integrating the information of different departments, the ERP systems are capable for real time management of internal indispensable data that can solve certain problems with an appropriate decision. The decision-making capabilities are necessary for managers to perk up the quality of fabrication, sales, forecasting and business development. In this paper, the corporate managers' experiences are focused in view of the financial module towards the selected ERP systems. In order to do an empirical study, a group of financial managers and experts are involved from textile industries. A quantitative research (questionnaire) technique is adopted to investigate the non-functional requirements and users' understanding. During experimental analysis, we found that the selected ERP systems are unproductive to provide an appropriate knowledge for decision-making. Therefore, an acquisition of tacit knowledge would be required to improve the decision-support capabilities of ERP systems.
{"title":"Assessment of knowledge ability towards decision-making in information systems from managers perspective","authors":"M. Faisal, M. Shahbaz, S. Tariq, Waqar Ahmad, Qaisar Abbas","doi":"10.1109/MYSEC.2011.6140717","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140717","url":null,"abstract":"Enterprise resource planning (ERP) / information systems are maintained the business-process integration, which provides past records for decision-making. By integrating the information of different departments, the ERP systems are capable for real time management of internal indispensable data that can solve certain problems with an appropriate decision. The decision-making capabilities are necessary for managers to perk up the quality of fabrication, sales, forecasting and business development. In this paper, the corporate managers' experiences are focused in view of the financial module towards the selected ERP systems. In order to do an empirical study, a group of financial managers and experts are involved from textile industries. A quantitative research (questionnaire) technique is adopted to investigate the non-functional requirements and users' understanding. During experimental analysis, we found that the selected ERP systems are unproductive to provide an appropriate knowledge for decision-making. Therefore, an acquisition of tacit knowledge would be required to improve the decision-support capabilities of ERP systems.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114156448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140723
Sim Liew Fong, A. O. Elfaki, Md Gapar bin Md Johar, Kevin Loo Teow Aik
This Mobile Language Translator is an application to translate from English language to Bahasa Malaysia (Malaysia's National Language) and vice versa and English language to Bahasa Indonesia and vice versa. It provides categories of commonly used words and phrases. As such, tourists can rely on mobile phone for traveling purpose. The application, such as, mobile dictionary is used for word search and many more applications for a better traveling guide. This application is intended to overcome the language barrier among tourists, who are visiting our country. Subsequently, by using this application they are able to integrate with the local people and get the right information. There are many different hardware components found in mobile devices so their applications are developed using different software architectures. It is made more difficult because users of mobile applications have diverse preferences, so extensive improvements to traditional system development methodologies are required in order to keep up with this demand.
{"title":"Mobile language translator","authors":"Sim Liew Fong, A. O. Elfaki, Md Gapar bin Md Johar, Kevin Loo Teow Aik","doi":"10.1109/MYSEC.2011.6140723","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140723","url":null,"abstract":"This Mobile Language Translator is an application to translate from English language to Bahasa Malaysia (Malaysia's National Language) and vice versa and English language to Bahasa Indonesia and vice versa. It provides categories of commonly used words and phrases. As such, tourists can rely on mobile phone for traveling purpose. The application, such as, mobile dictionary is used for word search and many more applications for a better traveling guide. This application is intended to overcome the language barrier among tourists, who are visiting our country. Subsequently, by using this application they are able to integrate with the local people and get the right information. There are many different hardware components found in mobile devices so their applications are developed using different software architectures. It is made more difficult because users of mobile applications have diverse preferences, so extensive improvements to traditional system development methodologies are required in order to keep up with this demand.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}