Call admission control (CAC) protocol will try to be fair, fast, reducing inconveniences, and maintaining quality of service (QoS) at the time of deciding whether a call request will be accepted or rejected into a network or communication system. A good CAC should have the ability to select the calls among the requested calls in such a way so that maximum fairness is justified by its performances at the sometime it should achieve some targets such as maximizing the revenue considering the constraints of the network system such as limited bandwidth. In the todaypsilas communication world the demand of bandwidth increases sharply due to the different users different types of service requirements such as audio, video, voice etc. from the same communication system. Besides need to deal with different tariff. So considering all these issues a CAC needs to decide which call requests should be admitted or not, which is obviously a critical and difficult task. In this paper a new CAC protocol is proposed that can select the best calls for the communication system, it can optimize the generated revenue from the network system, it can handle the different call admission situations in a fairness way, it can consider the different priorities based on class, can maximize the revenue of the communication system and also maintains the overall QoS for any network or communication system. Empirical results have shown its excellent performances for any network and communication platform.
{"title":"A new CAC protocol for optimizing revenue and ensuring QoS","authors":"Tania Taharima Chowdhary, Md. Shafiul Alam, Md. Mohiuddin Soel, Raiyan Kabir, Suman Ahmmed","doi":"10.1109/ICCITECHN.2007.4579382","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579382","url":null,"abstract":"Call admission control (CAC) protocol will try to be fair, fast, reducing inconveniences, and maintaining quality of service (QoS) at the time of deciding whether a call request will be accepted or rejected into a network or communication system. A good CAC should have the ability to select the calls among the requested calls in such a way so that maximum fairness is justified by its performances at the sometime it should achieve some targets such as maximizing the revenue considering the constraints of the network system such as limited bandwidth. In the todaypsilas communication world the demand of bandwidth increases sharply due to the different users different types of service requirements such as audio, video, voice etc. from the same communication system. Besides need to deal with different tariff. So considering all these issues a CAC needs to decide which call requests should be admitted or not, which is obviously a critical and difficult task. In this paper a new CAC protocol is proposed that can select the best calls for the communication system, it can optimize the generated revenue from the network system, it can handle the different call admission situations in a fairness way, it can consider the different priorities based on class, can maximize the revenue of the communication system and also maintains the overall QoS for any network or communication system. Empirical results have shown its excellent performances for any network and communication platform.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579409
A. Hossain
The ultimate objective of e-governance is to establish good governance. The elements of good governance can be identified as follows: a. Efficiency b. Reliability c. Accountability d. Accessibility and Transparency e. Visionary in decision making. All of these elements can be achieved through proper implementation of e-governance. Already Government of Bangladesh (GOB) takes several projects to implement it. Here we discuss about a GOB office named Bureau of Manpower Employment & Training (BEMT) who uses ICT very efficiently. Since 1976 BMET has been processing ldquolabour migrationrdquo manually. Measures to develop a congenial atmosphere in migration process and to develop institutional framework a computer database network has been established in 2004. Prospective job-seekers register their name and other particulars at DEMO. Selection of candidates for the overseas market is done from this database. Emigration clearance is also being provided from this database by BMET through computer network. Its capacity and activities are continued mainly to issuing emigration clearance for those who have been offered an overseas employment by either private companies or authorized agents. This system is running nonstop since 2004 without a single day interrupt or crash which is a remarkable achievement in context of a developing country like Bangladesh. Moreover, 4000/5000 job seeker registration done in every working day in 21 District Offices and around 3000-4000 clearance done in BMET head Office with departure checking in airports.
{"title":"A study on computerized Emigration Clearance system of Bangladesh: Step toward e-Governance","authors":"A. Hossain","doi":"10.1109/ICCITECHN.2007.4579409","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579409","url":null,"abstract":"The ultimate objective of e-governance is to establish good governance. The elements of good governance can be identified as follows: a. Efficiency b. Reliability c. Accountability d. Accessibility and Transparency e. Visionary in decision making. All of these elements can be achieved through proper implementation of e-governance. Already Government of Bangladesh (GOB) takes several projects to implement it. Here we discuss about a GOB office named Bureau of Manpower Employment & Training (BEMT) who uses ICT very efficiently. Since 1976 BMET has been processing ldquolabour migrationrdquo manually. Measures to develop a congenial atmosphere in migration process and to develop institutional framework a computer database network has been established in 2004. Prospective job-seekers register their name and other particulars at DEMO. Selection of candidates for the overseas market is done from this database. Emigration clearance is also being provided from this database by BMET through computer network. Its capacity and activities are continued mainly to issuing emigration clearance for those who have been offered an overseas employment by either private companies or authorized agents. This system is running nonstop since 2004 without a single day interrupt or crash which is a remarkable achievement in context of a developing country like Bangladesh. Moreover, 4000/5000 job seeker registration done in every working day in 21 District Offices and around 3000-4000 clearance done in BMET head Office with departure checking in airports.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579361
M. Abedin, A. Ahmadi, T. Koide, H. Mattausch
In this paper, fully parallel associative memory architecture with learning model is proposed. It uses a mixed digital-analog associative memory for reference pattern recognition and a learning model based on a short and long-term memory similar to that in human brain. In addition a ranking mechanism is used to manage the transition of reference vectors between two memories and an optimization algorithm is used to adjust the reference vectors components as well as their distribution continuously. The main advantage of the proposed model is no need to pre-training phase as well as its hardware-friendly structure which makes it implementable by an efficient LSI architecture without requiring a large amount of resources. The system was implemented on an FPGA platform and tested with real data of handwritten and printed English characters and the classification results found satisfactory.
{"title":"Fully parallel associative memory with human memory type learning model","authors":"M. Abedin, A. Ahmadi, T. Koide, H. Mattausch","doi":"10.1109/ICCITECHN.2007.4579361","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579361","url":null,"abstract":"In this paper, fully parallel associative memory architecture with learning model is proposed. It uses a mixed digital-analog associative memory for reference pattern recognition and a learning model based on a short and long-term memory similar to that in human brain. In addition a ranking mechanism is used to manage the transition of reference vectors between two memories and an optimization algorithm is used to adjust the reference vectors components as well as their distribution continuously. The main advantage of the proposed model is no need to pre-training phase as well as its hardware-friendly structure which makes it implementable by an efficient LSI architecture without requiring a large amount of resources. The system was implemented on an FPGA platform and tested with real data of handwritten and printed English characters and the classification results found satisfactory.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131390136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579397
M. Razzak, F. Ndiaye, S.A. Chowdhury, N. Mansoor
In this article, the development of an efficient and reliable multiple description coding (MDC) scheme over unreliable communication networks is described. A general framework of multiple description robust communication system with 2- and 4-channel cases is presented with a proposed block-based DC separation approach. The advantage of this system is that, if all the channels work, a high quality reconstruction can be achieved, while a lower but still acceptable quality can be achieved if some of the channels are lost. The peak signal-to-noise ratio (PSNR), mean squared error (MSE), bit rate, entropy and redundancy are also calculated with the proposed method to analyze the reconstruction quality. It is found that the proposed method gives comprehensive improvements over the other recently developed methods.
{"title":"Multiple description image transmission for diversity systems over unreliable communication networks","authors":"M. Razzak, F. Ndiaye, S.A. Chowdhury, N. Mansoor","doi":"10.1109/ICCITECHN.2007.4579397","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579397","url":null,"abstract":"In this article, the development of an efficient and reliable multiple description coding (MDC) scheme over unreliable communication networks is described. A general framework of multiple description robust communication system with 2- and 4-channel cases is presented with a proposed block-based DC separation approach. The advantage of this system is that, if all the channels work, a high quality reconstruction can be achieved, while a lower but still acceptable quality can be achieved if some of the channels are lost. The peak signal-to-noise ratio (PSNR), mean squared error (MSE), bit rate, entropy and redundancy are also calculated with the proposed method to analyze the reconstruction quality. It is found that the proposed method gives comprehensive improvements over the other recently developed methods.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"15 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113962368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579413
S. Redwan
This work has been done as a software engineering research-based course work using the principles of designing a user-interface. The objective of the research was to finding out how the current WIMP based operating systemspsila start menu can be made more usable to the users. In an imaginary WIMP based future operating system, the mouse and voice can be made more usable in regard of accessing the start menu. In this paper I propose a user-interface for the WIMP based start menu which I named dasiaInstant-access start menupsila. I have broadly described the possible dasialook and feelpsila and functionalities of such start menu and its accessibility features. I have listed all the user interface design principles that I have used to design my start menu. I have also mentioned briefly about the user interface metaphors I have used to design it. At the end, I have narrated the usability of my designed start menu along with the usability engineering attributes my start menu contains.
{"title":"Instant-access start menu for an imaginary WIMP based future operating system","authors":"S. Redwan","doi":"10.1109/ICCITECHN.2007.4579413","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579413","url":null,"abstract":"This work has been done as a software engineering research-based course work using the principles of designing a user-interface. The objective of the research was to finding out how the current WIMP based operating systemspsila start menu can be made more usable to the users. In an imaginary WIMP based future operating system, the mouse and voice can be made more usable in regard of accessing the start menu. In this paper I propose a user-interface for the WIMP based start menu which I named dasiaInstant-access start menupsila. I have broadly described the possible dasialook and feelpsila and functionalities of such start menu and its accessibility features. I have listed all the user interface design principles that I have used to design my start menu. I have also mentioned briefly about the user interface metaphors I have used to design it. At the end, I have narrated the usability of my designed start menu along with the usability engineering attributes my start menu contains.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579445
Tanvir Ahmed, Syed Nuruzzaman, Md. Nazimul Haque, M. Masum
Few real-world applications of mobile ad hoc networks have been developed or deployed outside the military environment, and no traces of actual node movement in a real ad hoc network have been available. In this paper we proposed a security scheme for an Ad Hoc City. We have designed an algorithm and corresponding packet structures to secure the pure ad hoc portion of the architecture. In order to achieve our goal, we have modified the Dynamic Source Routing Protocol (DSR) to adapt it in the environment under consideration. The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of Route Discovery and Route Maintenance. We have modified the Route Discovery and Route Maintenance phase in order to provide more security features.
{"title":"Modification of DSR and its implementation in Ad Hoc City","authors":"Tanvir Ahmed, Syed Nuruzzaman, Md. Nazimul Haque, M. Masum","doi":"10.1109/ICCITECHN.2007.4579445","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579445","url":null,"abstract":"Few real-world applications of mobile ad hoc networks have been developed or deployed outside the military environment, and no traces of actual node movement in a real ad hoc network have been available. In this paper we proposed a security scheme for an Ad Hoc City. We have designed an algorithm and corresponding packet structures to secure the pure ad hoc portion of the architecture. In order to achieve our goal, we have modified the Dynamic Source Routing Protocol (DSR) to adapt it in the environment under consideration. The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of Route Discovery and Route Maintenance. We have modified the Route Discovery and Route Maintenance phase in order to provide more security features.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130916753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579411
F. Khoshalhan, A. Kaldi
The right combination of skills is essential for organizational performance and, in turn, competitive advantage. Organizations currently spend a lot of time and energy on acquiring such a right mix. The skills brokerage model operates as an intermediary, and aims to provide the required human resources, possessing specific skills, for businesses and entrepreneurs. The model uses its relationships with skills providers such as universities, and relates the skilled human resources to the employers; hence, links the offer and demand. Performance measurement of the skills brokerage business can be done by means of the balanced scorecard (BSC), resulting in a framework for measuring both financial and strategic business objectives.
{"title":"Skills brokerage performance measurement through BSC","authors":"F. Khoshalhan, A. Kaldi","doi":"10.1109/ICCITECHN.2007.4579411","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579411","url":null,"abstract":"The right combination of skills is essential for organizational performance and, in turn, competitive advantage. Organizations currently spend a lot of time and energy on acquiring such a right mix. The skills brokerage model operates as an intermediary, and aims to provide the required human resources, possessing specific skills, for businesses and entrepreneurs. The model uses its relationships with skills providers such as universities, and relates the skilled human resources to the employers; hence, links the offer and demand. Performance measurement of the skills brokerage business can be done by means of the balanced scorecard (BSC), resulting in a framework for measuring both financial and strategic business objectives.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134268984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579365
M. Shoyaib, S. M. Baker, T. Jabid, F. Anwar, Haseena Khan
Mining bioinformatics data is an emerging area of research. Proteomics is one of the largest areas of focus in bioinformatics and data mining research. Protein structure prediction is one of the most crucial and decisive problem in all the areas of research. Protein secondary structure can be used for the determination of the tertiary structure via the fold recognition method. Hence, predicting the secondary structures from the proteinpsilas primary sequences has attracted the attention of many researchers. Experimental methods have proved to be complex and expensive. So to develop a simple and accurate method for structure prediction is of great importance. In this paper, a new method has been proposed based on the machine learning technique. The first step of this proposal is to find out frequent patterns of consecutive amino acids in a protein database. After this, a set of frequent words (feature set) is found. Then support vector machine (SVM) is used as a binary/tertiary classifier for the classification of protein secondary structure with these frequent words.
{"title":"Protein secondary structure prediction with high accuracy using Support Vector Machine","authors":"M. Shoyaib, S. M. Baker, T. Jabid, F. Anwar, Haseena Khan","doi":"10.1109/ICCITECHN.2007.4579365","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579365","url":null,"abstract":"Mining bioinformatics data is an emerging area of research. Proteomics is one of the largest areas of focus in bioinformatics and data mining research. Protein structure prediction is one of the most crucial and decisive problem in all the areas of research. Protein secondary structure can be used for the determination of the tertiary structure via the fold recognition method. Hence, predicting the secondary structures from the proteinpsilas primary sequences has attracted the attention of many researchers. Experimental methods have proved to be complex and expensive. So to develop a simple and accurate method for structure prediction is of great importance. In this paper, a new method has been proposed based on the machine learning technique. The first step of this proposal is to find out frequent patterns of consecutive amino acids in a protein database. After this, a set of frequent words (feature set) is found. Then support vector machine (SVM) is used as a binary/tertiary classifier for the classification of protein secondary structure with these frequent words.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134352409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579396
M. Khandaker, I. Islam, M. R. Amin
In case of single element antennas like Yagi-Uda, spiral, dipole, horn etc. have very little capability of variation antenna gain pattern. For better directivity, electronic tracking and reshaping of beam, array antenna is widely used in wireless network. Relative magnitude of feed currents, relative phases/separation between antenna elements, geometry of array are responsible for the shape of radiation pattern. In this paper linear array antenna with adaptive algorithm is used to achieve desired gain pattern at a desired angle of arrival (AOA). Linearly constraint minimum variance (LCMV) algorithm can be used quite comfortably for a desired gain incorporating Lagrange multiplier but side lobes can not be cancelled properly. This paper deals with combination of LCMV, sidelobe cancellation, LMS algorithm to achieve derided antenna gain pattern keeping sidelobe below a threshold level.
{"title":"Adaptive beamforming of linear array antenna system with provision of sidelobe cancellation","authors":"M. Khandaker, I. Islam, M. R. Amin","doi":"10.1109/ICCITECHN.2007.4579396","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579396","url":null,"abstract":"In case of single element antennas like Yagi-Uda, spiral, dipole, horn etc. have very little capability of variation antenna gain pattern. For better directivity, electronic tracking and reshaping of beam, array antenna is widely used in wireless network. Relative magnitude of feed currents, relative phases/separation between antenna elements, geometry of array are responsible for the shape of radiation pattern. In this paper linear array antenna with adaptive algorithm is used to achieve desired gain pattern at a desired angle of arrival (AOA). Linearly constraint minimum variance (LCMV) algorithm can be used quite comfortably for a desired gain incorporating Lagrange multiplier but side lobes can not be cancelled properly. This paper deals with combination of LCMV, sidelobe cancellation, LMS algorithm to achieve derided antenna gain pattern keeping sidelobe below a threshold level.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133539875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-12-01DOI: 10.1109/ICCITECHN.2007.4579433
S. K. Dey, M. Abdus Sobhan
In recent years, tremendous technical changes have happened in software development, accompanied by increased complexity of the systems that are being developed. Businesses are now regularly deploying systems that employ and integrate a wide range of computing technologies and paradigms. Thus, it is inevitable for the academics to be prepared to educate their students to meet this unique challenge. However, the development of software engineering (SE) programs is a difficult & daunting task. In Bangladesh, curricula of undergraduate and graduate SE programs are not very old and maturing at a slower pace as compared to other curricula. There are problems for the development of such programs like: a) the SE profession in Bangladesh is immature; b) confusion about the difference between computer science (CS) and SE; c) lack of understanding and appreciation among CS faculty about the need for SE education; d) little available material on SE curriculum guideline; e) absence of local accreditation mechanism for SE programs, etc. In this paper, the authors studied the current status of SE curriculum in Bangladesh and abroad, and proposed guidelines for developing such curriculum adaptable by local academia and industry. The paper includes a curriculum design guideline, descriptions of probable knowledge components that can be used to design SE curricula, and a sample curriculum.
{"title":"Guidelines for preparing standard software engineering curriculum: Bangladesh and global perspective","authors":"S. K. Dey, M. Abdus Sobhan","doi":"10.1109/ICCITECHN.2007.4579433","DOIUrl":"https://doi.org/10.1109/ICCITECHN.2007.4579433","url":null,"abstract":"In recent years, tremendous technical changes have happened in software development, accompanied by increased complexity of the systems that are being developed. Businesses are now regularly deploying systems that employ and integrate a wide range of computing technologies and paradigms. Thus, it is inevitable for the academics to be prepared to educate their students to meet this unique challenge. However, the development of software engineering (SE) programs is a difficult & daunting task. In Bangladesh, curricula of undergraduate and graduate SE programs are not very old and maturing at a slower pace as compared to other curricula. There are problems for the development of such programs like: a) the SE profession in Bangladesh is immature; b) confusion about the difference between computer science (CS) and SE; c) lack of understanding and appreciation among CS faculty about the need for SE education; d) little available material on SE curriculum guideline; e) absence of local accreditation mechanism for SE programs, etc. In this paper, the authors studied the current status of SE curriculum in Bangladesh and abroad, and proposed guidelines for developing such curriculum adaptable by local academia and industry. The paper includes a curriculum design guideline, descriptions of probable knowledge components that can be used to design SE curricula, and a sample curriculum.","PeriodicalId":338170,"journal":{"name":"2007 10th international conference on computer and information technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115418459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}