CINXE.COM

Search results for: software cloning

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: software cloning</title> <meta name="description" content="Search results for: software cloning"> <meta name="keywords" content="software cloning"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="software cloning" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="software cloning"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 4851</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: software cloning</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4851</span> Software Cloning and Agile Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ravi%20Kumar">Ravi Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Dhrubajit%20Barman"> Dhrubajit Barman</a>, <a href="https://publications.waset.org/abstracts/search?q=Nomi%20Baruah"> Nomi Baruah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software Cloning has grown an active area in software engineering research community yielding numerous techniques, various tools and other methods for clone detection and removal. The copying, modifying a block of code is identified as cloning as it is the most basic means of software reuse. Agile Software Development is an approach which is currently being used in various software projects, so that it helps to respond the unpredictability of building software through incremental, iterative, work cadences. Software Cloning has been introduced to Agile Environment and many Agile Software Development approaches are using the concept of Software Cloning. This paper discusses the various Agile Software Development approaches. It also discusses the degree to which the Software Cloning concept is being introduced in the Agile Software Development approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=agile%20environment" title="agile environment">agile environment</a>, <a href="https://publications.waset.org/abstracts/search?q=refactoring" title=" refactoring"> refactoring</a>, <a href="https://publications.waset.org/abstracts/search?q=reuse" title=" reuse"> reuse</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20cloning" title=" software cloning"> software cloning</a> </p> <a href="https://publications.waset.org/abstracts/16005/software-cloning-and-agile-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16005.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">530</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4850</span> An Invertebrate-Type Lysozyme from Chinese Mitten Crab Eriocheir Sinensis: Cloning and Characterization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fengmei%20Li">Fengmei Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Xu"> Li Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Guoliang%20Xia"> Guoliang Xia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Lysozyme is a catalytic enzyme that performs bacterial cell lysis by cleaving the β-1,4-glycosidic bond between N-acetylmuramic acid and N-acetylglucosamine of peptidoglycan in cell walls. In the present study, an invertebrate-type (i-type) lysozyme gene was cloned from Chinese mitten crab Eriocheir sinensis (designated as EsLysozyme) based on PCR-based rapid amplification of cDNA ends (RACE) technology. The full-length cDNA of EsLysozyme was of 831 bp. SMART and SIGNALP 3.0 program analysis revealed that EsLysozyme contained a signal peptide and a destabilase domain. The five amino acid residues (Tyr63, Trp64, Tyr91, His110, Pro114) and the conserved motif GSLSCG(P/Y)FQI and CL(E/L/R/H)C(I/M)C in i-type lysozymes were also found in EsLysozyme. The high similarity of EsLysozyme with L. vannamei lysozymes and phylogenetic analysis suggested that EsLysozyme should be a new member of i-type lysozyme family. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=i-type%20lysozyme" title="i-type lysozyme">i-type lysozyme</a>, <a href="https://publications.waset.org/abstracts/search?q=Eriocheir%20sinensis" title=" Eriocheir sinensis"> Eriocheir sinensis</a>, <a href="https://publications.waset.org/abstracts/search?q=cloning" title=" cloning"> cloning</a>, <a href="https://publications.waset.org/abstracts/search?q=characterization" title=" characterization"> characterization</a> </p> <a href="https://publications.waset.org/abstracts/3986/an-invertebrate-type-lysozyme-from-chinese-mitten-crab-eriocheir-sinensis-cloning-and-characterization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3986.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4849</span> Cloning and Expression of the ansZ Gene from Bacillus sp. CH11 Isolated from Chilca salterns in Peru</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stephy%20Saavedra">Stephy Saavedra</a>, <a href="https://publications.waset.org/abstracts/search?q=Annsy%20C.%20Arredondo"> Annsy C. Arredondo</a>, <a href="https://publications.waset.org/abstracts/search?q=Gisele%20Monteiro"> Gisele Monteiro</a>, <a href="https://publications.waset.org/abstracts/search?q=Adalberto%20Pessoa%20Jr"> Adalberto Pessoa Jr</a>, <a href="https://publications.waset.org/abstracts/search?q=Carol%20N.%20Flores-Fernandez"> Carol N. Flores-Fernandez</a>, <a href="https://publications.waset.org/abstracts/search?q=Amparo%20I.%20Zavaleta"> Amparo I. Zavaleta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> L-asparaginase from bacterial sources is used in leukemic treatment and food industry. This enzyme is classified based on its affinity towards L-asparagine and L-glutamine. Likewise, ansZ genes express L-asparaginase with higher affinity to L-asparagine. The aim of this work was to clone and express of ansZ gene from Bacillus sp. CH11 isolated from Chilca salterns in Peru. The gene encoding L-asparaginase was cloned into pET15b vector and transformed in Escherichia coli BL21 (DE3) pLysS. The expression was carried out in a batch culture using LB broth and 0.5 mM IPTG. The recombinant L-asparaginase showed a molecular weight of ~ 39 kDa by SDS PAGE and a specific activity of 3.19 IU/mg of protein. The cloning and expression of ansZ gene from this halotolerant Bacillus sp. CH11 allowed having a biological input to improve a future scaling-up. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ansZ%20gene" title="ansZ gene">ansZ gene</a>, <a href="https://publications.waset.org/abstracts/search?q=Bacillus%20sp" title=" Bacillus sp"> Bacillus sp</a>, <a href="https://publications.waset.org/abstracts/search?q=Chilca%20salterns" title=" Chilca salterns"> Chilca salterns</a>, <a href="https://publications.waset.org/abstracts/search?q=recombinant%20L-asparaginase" title=" recombinant L-asparaginase"> recombinant L-asparaginase</a> </p> <a href="https://publications.waset.org/abstracts/141113/cloning-and-expression-of-the-ansz-gene-from-bacillus-sp-ch11-isolated-from-chilca-salterns-in-peru" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141113.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4848</span> Software Engineering Revolution Driven by Complexity Science</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jay%20Xiong">Jay Xiong</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Lin"> Li Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces a new software engineering paradigm based on complexity science, called NSE (Nonlinear Software Engineering paradigm). The purpose of establishing NSE is to help software development organizations double their productivity, half their cost, and increase the quality of their products in several orders of magnitude simultaneously. NSE complies with the essential principles of complexity science. NSE brings revolutionary changes to almost all aspects in software engineering. NSE has been fully implemented with its support platform Panorama++. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=complexity%20science" title="complexity science">complexity science</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20development" title=" software development"> software development</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20maintenance" title=" software maintenance"> software maintenance</a> </p> <a href="https://publications.waset.org/abstracts/41084/software-engineering-revolution-driven-by-complexity-science" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41084.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4847</span> Software Architectural Design Ontology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Irfan%20Marwat">Muhammad Irfan Marwat</a>, <a href="https://publications.waset.org/abstracts/search?q=Sadaqat%20Jan"> Sadaqat Jan</a>, <a href="https://publications.waset.org/abstracts/search?q=Syed%20Zafar%20Ali%20Shah"> Syed Zafar Ali Shah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software architecture plays a key role in software development but absence of formal description of software architecture causes different impede in software development. To cope with these difficulties, ontology has been used as artifact. This paper proposes ontology for software architectural design based on IEEE model for architecture description and Kruchten 4+1 model for viewpoints classification. For categorization of style and views, ISO/IEC 42010 has been used. Corpus method has been used to evaluate ontology. The main aim of the proposed ontology is to classify and locate software architectural design information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=semantic-based%20software%20architecture" title="semantic-based software architecture">semantic-based software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title=" software architecture"> software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology" title=" ontology"> ontology</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a> </p> <a href="https://publications.waset.org/abstracts/2056/software-architectural-design-ontology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2056.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">548</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4846</span> Molecular Cloning and Identification of a Double WAP Domain–Containing Protein 3 Gene from Chinese Mitten Crab Eriocheir sinensis </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fengmei%20Li">Fengmei Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Xu"> Li Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Guoliang%20Xia"> Guoliang Xia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Whey acidic proteins (WAP) domain-containing proteins in crustacean are involved in innate immune response against microbial invasion. In the present study, a novel double WAP domain (DWD)-containing protein gene 3 was identified from Chinese mitten crab Eriocheir sinensis (designated EsDWD3) by expressed sequence tag (EST) analysis and PCR techniques. The full-length cDNA of EsDWD3 was of 1223 bp, consisting of a 5′-terminal untranslated region (UTR) of 74 bp, a 3′ UTR of 727 bp with a polyadenylation signal sequence AATAAA and a polyA tail, and an open reading frame (ORF) of 423 bp. The ORF encoded a polypeptide of 140 amino acids with a signal peptide of 22 amino acids. The deduced protein sequence EsDWD3 showed 96.4 % amino acid similar to other reported EsDWD1 from E. sinensis, and phylogenetic tree analysis revealed that EsDWD3 had closer relationships with the reported two double WAP domain-containing proteins of E. sinensis species. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chinese%20mitten%20crab" title="Chinese mitten crab">Chinese mitten crab</a>, <a href="https://publications.waset.org/abstracts/search?q=Eriocheir%20sinensis" title=" Eriocheir sinensis"> Eriocheir sinensis</a>, <a href="https://publications.waset.org/abstracts/search?q=cloning" title=" cloning"> cloning</a>, <a href="https://publications.waset.org/abstracts/search?q=double%20WAP%20domain-containing%20protein" title=" double WAP domain-containing protein "> double WAP domain-containing protein </a> </p> <a href="https://publications.waset.org/abstracts/4040/molecular-cloning-and-identification-of-a-double-wap-domain-containing-protein-3-gene-from-chinese-mitten-crab-eriocheir-sinensis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4040.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4845</span> Influence of Security Attributes in Component-Based Software Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somayeh%20Zeinali">Somayeh Zeinali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=component-based%20software%20development" title="component-based software development">component-based software development</a>, <a href="https://publications.waset.org/abstracts/search?q=component-based%20software%20engineering" title=" component-based software engineering "> component-based software engineering </a>, <a href="https://publications.waset.org/abstracts/search?q=software%20security%20attributes" title="software security attributes">software security attributes</a>, <a href="https://publications.waset.org/abstracts/search?q=dependability" title=" dependability"> dependability</a>, <a href="https://publications.waset.org/abstracts/search?q=component" title=" component"> component</a> </p> <a href="https://publications.waset.org/abstracts/26037/influence-of-security-attributes-in-component-based-software-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26037.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">558</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4844</span> Cloning and Analysis of Nile Tilapia Toll-like receptors Type-3 mRNA</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelazeem%20Algammal">Abdelazeem Algammal</a>, <a href="https://publications.waset.org/abstracts/search?q=Reham%20Abouelmaatti"> Reham Abouelmaatti</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaokun%20Li"> Xiaokun Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Jisheng%20Ma"> Jisheng Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Eman%20Abdelnaby"> Eman Abdelnaby</a>, <a href="https://publications.waset.org/abstracts/search?q=Wael%20Elfeil"> Wael Elfeil</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Toll-like receptors (TLRs) are the best understood of the innate immune receptors that detect infections in vertebrates. However, the fish TLRs also exhibit very distinct features and a large diversity, which is likely derived from their diverse evolutionary history and the distinct environments that they occupy. Little is known about the fish immune system structure. Our work was aimed to identify and clone the Nile tilapiaTLR-3 as a model of freshwater fish species; we cloned the full-length cDNA sequence of Nile tilapia (Oreochromis niloticus) TLR-3 and according to our knowledge, it is the first report illustrating tilapia TLR-3. The complete cDNA sequence of Nile tilapia TLR-3 was 2736 pair base and it encodes a polypeptide of 912 amino acids. Analysis of the deduced amino acid sequence indicated that Nile tilapia TLR-3 has typical structural features and main components of proteins belonging to the TLR family. Our results illustrate a complete and functional Nile tilapia TLR-3 and it is considered an ortholog of the other vertebrate’s receptor. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nile%20tilapia" title="Nile tilapia">Nile tilapia</a>, <a href="https://publications.waset.org/abstracts/search?q=TLR-3" title=" TLR-3"> TLR-3</a>, <a href="https://publications.waset.org/abstracts/search?q=cloning" title=" cloning"> cloning</a>, <a href="https://publications.waset.org/abstracts/search?q=gene%20expression" title=" gene expression"> gene expression</a> </p> <a href="https://publications.waset.org/abstracts/123307/cloning-and-analysis-of-nile-tilapia-toll-like-receptors-type-3-mrna" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123307.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4843</span> A &#039;Four Method Framework&#039; for Fighting Software Architecture Erosion</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sundus%20Ayyaz">Sundus Ayyaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Saad%20Rehman"> Saad Rehman</a>, <a href="https://publications.waset.org/abstracts/search?q=Usman%20Qamar"> Usman Qamar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software Architecture is the basic structure of software that states the development and advancement of a software system. Software architecture is also considered as a significant tool for the construction of high quality software systems. A clean design leads to the control, value and beauty of software resulting in its longer life while a bad design is the cause of architectural erosion where a software evolution completely fails. This paper discusses the occurrence of software architecture erosion and presents a set of methods for the detection, declaration and prevention of architecture erosion. The causes and symptoms of architecture erosion are observed with the examples of prescriptive and descriptive architectures and the practices used to stop this erosion are also discussed by considering different types of software erosion and their affects. Consequently finding and devising the most suitable approach for fighting software architecture erosion and in some way reducing its affect is evaluated and tested on different scenarios. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title="software architecture">software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture%20erosion" title=" architecture erosion"> architecture erosion</a>, <a href="https://publications.waset.org/abstracts/search?q=prescriptive%20architecture" title=" prescriptive architecture"> prescriptive architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=descriptive%20architecture" title=" descriptive architecture"> descriptive architecture</a> </p> <a href="https://publications.waset.org/abstracts/19650/a-four-method-framework-for-fighting-software-architecture-erosion" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">500</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4842</span> New Isolate of Cucumber Mosaic Virus Infecting Banana </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelsabour%20G.%20A.%20Khaled">Abdelsabour G. A. Khaled</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20W.%20A.%20Abdalla%20And%20Sabry%20Y.%20M.%20Mahmoud"> Ahmed W. A. Abdalla And Sabry Y. M. Mahmoud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Banana plants showing typical mosaic and yellow stripes on leaves as symptoms were collected from Assiut Governorate in Egypt. The causal agent was identified as Cucumber mosaic virus (CMV) on the basis of symptoms, transmission, serology, transmission electron microscopy and reverse transcription polymerase chain reaction (RT-PCR). Coat protein (CP) gene was amplified using gene specific primers for coat protein (CP), followed by cloning into desired cloning vector for sequencing. In this study the CMV was transmitted into propagation host either by aphid or mechanically. The transmission was confirmed through Direct Antigen Coating Enzyme Linked Immuno Sorbent Assay (DAC-ELISA). Analysis of the 120 deduced amino acid sequence of the coat protein gene revealed that the EG-A strain of CMV shared from 97.50 to 98.33% with those strains belonging to subgroup IA. The cluster analysis grouped the Egyptian isolate with strains Fny and Ri8 belonging sub-group IA. It appears that there occurs a high incidence of CMV infecting banana belonging to IA subgroup in most parts of Egypt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=banana" title="banana">banana</a>, <a href="https://publications.waset.org/abstracts/search?q=CMV" title=" CMV"> CMV</a>, <a href="https://publications.waset.org/abstracts/search?q=transmission" title=" transmission"> transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=CP%20gene" title=" CP gene"> CP gene</a>, <a href="https://publications.waset.org/abstracts/search?q=RT-PCR" title=" RT-PCR"> RT-PCR</a> </p> <a href="https://publications.waset.org/abstracts/40303/new-isolate-of-cucumber-mosaic-virus-infecting-banana" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40303.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">341</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4841</span> Molecular Cloning of CSP2s, PBP1 and PBP2 Genes of Rhyzopertha dominica</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Suliman%20A.%20I.%20Ali">Suliman A. I. Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Mory%20Mandiana%20Diakite"> Mory Mandiana Diakite</a>, <a href="https://publications.waset.org/abstracts/search?q=Saqib%20Ali"> Saqib Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Man-Qun%20Wang"> Man-Qun Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Lesser grain borer, Rhyzopertha dominica, is a causing damages of stored grains all tropical and subtropical area in the global, according to the information of antenna cDNA library of R. dominica, three olfactory protein genes, including R.domica CSPs2, R.domica PBPs1, R.domica PBPs2 genes (GenBank accessions are KJ186798.1, KJ186830.1, KJ186831.1 separately.), were successfully cloned. For sequencing and phylogenetic analysis, R.domica CSPs1 and R.domica CSPs2 belonged to Minus-C CSPs showed that have 4 conserved cysteine residues, while R.domica PBPs1 and R.domica PBPs2 showed conserved amino acids in all PBPs six conserved cysteine residues. The results of transcription expression level of PBPs1 and PBPs2 of R. dominica showed that the expression level of R.domnica PBP2 is much higher than that of R.domnica PBP1. The variation transcription level at the different developmental time suggested the PBP1, and PBP2 had their particular job in searching food sources, mates and oviposition sites. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rhyzopertha%20dominica" title="Rhyzopertha dominica">Rhyzopertha dominica</a>, <a href="https://publications.waset.org/abstracts/search?q=CSPs" title=" CSPs"> CSPs</a>, <a href="https://publications.waset.org/abstracts/search?q=PBPs" title=" PBPs"> PBPs</a>, <a href="https://publications.waset.org/abstracts/search?q=molecular%20cloning" title=" molecular cloning"> molecular cloning</a> </p> <a href="https://publications.waset.org/abstracts/96733/molecular-cloning-of-csp2s-pbp1-and-pbp2-genes-of-rhyzopertha-dominica" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96733.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4840</span> Cloning and Expression of Azurin: A Protein Having Antitumor and Cell Penetrating Ability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohsina%20Akhter">Mohsina Akhter</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cancer has become a wide spread disease around the globe and takes many lives every year. Different treatments are being practiced but all have potential side effects with somewhat less specificity towards target sites. Pseudomonas aeruginosa is known to secrete a protein azurin with special anti-cancer function. It has unique cell penetrating peptide comprising of 18 amino acids that have ability to enter cancer cells specifically. Reported function of Azurin is to stabilize p53 inside the tumor cells and induces apoptosis through Bax mediated cytochrome c release from mitochondria. At laboratory scale, we have made recombinant azurin through cloning rpTZ57R/T-azu vector into E.coli strain DH-5α and subcloning rpET28-azu vector into E.coli BL21-CodonPlus (DE3). High expression was ensured with IPTG induction at different concentrations then optimized high expression level at 1mM concentration of IPTG for 5 hours. Purification has been done by using Ni+2 affinity chromatography. We have concluded that azurin can be a remarkable improvement in cancer therapeutics if it produces on a large scale. Azurin does not enter into the normal cells so it will prove a safe and secure treatment for patients and prevent them from hazardous anomalies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=azurin" title="azurin">azurin</a>, <a href="https://publications.waset.org/abstracts/search?q=pseudomonas%20aeruginosa" title=" pseudomonas aeruginosa"> pseudomonas aeruginosa</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer" title=" cancer"> cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=therapeutics" title=" therapeutics"> therapeutics</a> </p> <a href="https://publications.waset.org/abstracts/43688/cloning-and-expression-of-azurin-a-protein-having-antitumor-and-cell-penetrating-ability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43688.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4839</span> Reasons for Non-Applicability of Software Entropy Metrics for Bug Prediction in Android </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arvinder%20Kaur">Arvinder Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepti%20Chopra"> Deepti Chopra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software Entropy Metrics for bug prediction have been validated on various software systems by different researchers. In our previous research, we have validated that Software Entropy Metrics calculated for Mozilla subsystem&rsquo;s predict the future bugs reasonably well. In this study, the Software Entropy metrics are calculated for a subsystem of Android and it is noticed that these metrics are not suitable for bug prediction. The results are compared with a subsystem of Mozilla and a comparison is made between the two software systems to determine the reasons why Software Entropy metrics are not applicable for Android. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=bug%20prediction" title=" bug prediction"> bug prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=mining%20software%20repositories" title=" mining software repositories"> mining software repositories</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20entropy" title=" software entropy"> software entropy</a> </p> <a href="https://publications.waset.org/abstracts/49619/reasons-for-non-applicability-of-software-entropy-metrics-for-bug-prediction-in-android" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49619.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">578</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4838</span> Revolutionary Solutions for Modeling and Visualization of Complex Software Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jay%20Xiong">Jay Xiong</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Lin"> Li Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Existing software modeling and visualization approaches using UML are outdated, which are outcomes of reductionism and the superposition principle that the whole of a system is the sum of its parts, so that with them all tasks of software modeling and visualization are performed linearly, partially, and locally. This paper introduces revolutionary solutions for modeling and visualization of complex software systems, which make complex software systems much easy to understand, test, and maintain. The solutions are based on complexity science, offering holistic, automatic, dynamic, virtual, and executable approaches about thousand times more efficient than the traditional ones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=complex%20systems" title="complex systems">complex systems</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20maintenance" title=" software maintenance"> software maintenance</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20modeling" title=" software modeling"> software modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20visualization" title=" software visualization"> software visualization</a> </p> <a href="https://publications.waset.org/abstracts/41451/revolutionary-solutions-for-modeling-and-visualization-of-complex-software-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41451.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4837</span> Towards Development of a Framework for Saudi Education Software Ecosystem</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fazal-e-Amin">Fazal-e-Amin</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20S.%20Alghamdi"> Abdullah S. Alghamdi</a>, <a href="https://publications.waset.org/abstracts/search?q=Iftikhar%20Ahmad"> Iftikhar Ahmad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software ecosystems’ concept is an inspiration from the natural ecosystem. Software ecosystems refer to large systems developed on top of a platform composed of different components developed by different entities of that ecosystem. Ecosystems improve information access, dissemination and coordination considerably. The ability to evolve and accommodate new subsystems gives a boost to the software ecosystems. In this paper, Saudi education software ecosystem is discussed and its need and potential benefits are highlighted. This work will provide a basis for further research in this area and foundation in development of Saudi education ecosystem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20ecosystem" title="software ecosystem">software ecosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=education%20software" title=" education software"> education software</a>, <a href="https://publications.waset.org/abstracts/search?q=framework" title=" framework"> framework</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a> </p> <a href="https://publications.waset.org/abstracts/5173/towards-development-of-a-framework-for-saudi-education-software-ecosystem" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5173.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">531</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4836</span> Analyzing the Effectiveness of Different Testing Techniques in Ensuring Software Quality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20M.%20P.%20C.%20Bandara">R. M. P. C. Bandara</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20L.%20L.%20Weerasinghe"> M. L. L. Weerasinghe</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20T.%20C.%20R.%20Kumari"> K. T. C. R. Kumari</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20G.%20D.%20R.%20Hansika"> A. G. D. R. Hansika</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20I.%20De%20Silva"> D. I. De Silva</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20M.%20T.%20H.%20Dias"> D. M. T. H. Dias</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software testing is an essential process in software development that aims to identify defects and ensure that software is functioning as intended. Various testing techniques are employed to achieve this goal, but the effectiveness of these techniques varies. This research paper analyzes the effectiveness of different testing techniques in ensuring software quality. The paper explores different testing techniques, including manual and automated testing, and evaluates their effectiveness in terms of identifying defects, reducing the number of defects in software, and ensuring that software meets its functional and non-functional requirements. Moreover, the paper will also investigate the impact of factors such as testing time, test coverage, and testing environment on the effectiveness of these techniques. This research aims to provide valuable insights into the effectiveness of different testing techniques, enabling software development teams to make informed decisions about the testing approach that is best suited to their needs. By improving testing techniques, the number of defects in software can be reduced, enhancing the quality of software and ultimately providing better software for users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20testing%20life%20cycle" title="software testing life cycle">software testing life cycle</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20testing%20techniques" title=" software testing techniques"> software testing techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20testing%20strategies" title=" software testing strategies"> software testing strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=effectiveness" title=" effectiveness"> effectiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20quality" title=" software quality"> software quality</a> </p> <a href="https://publications.waset.org/abstracts/166772/analyzing-the-effectiveness-of-different-testing-techniques-in-ensuring-software-quality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166772.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">84</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4835</span> Cloning of Strawberry’s Malonyltransferase Genes and Characterisation of Their Enzymes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiran%20Wang">Xiran Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Johanna%20Trinkl"> Johanna Trinkl</a>, <a href="https://publications.waset.org/abstracts/search?q=Thomas%20Hoffmann"> Thomas Hoffmann</a>, <a href="https://publications.waset.org/abstracts/search?q=Wilfried%20Schwab"> Wilfried Schwab</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malonyltransferases (MATs) are enzymes that play a key role in the biosynthesis of secondary metabolites in plants, such as flavonoids and anthocyanins. As a kind of flavonoid-rich fruit, strawberries are an ideal model to study MATs. From Goodberry metabolome data, in the hybrid generation of 2 strawberries various, Fragaria × ananassa cv. 'Senga Sengana' and 'Candonga', we found the malonylated flavonoid concentration is significantly higher in 'Senga Sengana' compared with 'Candonga'. Therefore, we aimed to identify and characterize the malonyltransferases responsible for the different malonylated flavonoid concentrations in two different strawberry cultivars. In this study, we have found 6 MATs via genome mapping, metabolome analysis, gene cloning, and enzyme assay from strawberries, which catalyzed the malonylation of flavonoid substrates: quercetin-3-glucoside, kaempferol-3-glucoside, pelargonidin-3-glucoside, and cyanidin-3-glucoside. All four compounds reacted with FaMATs to varying degrees. These MATs have important implication into strawberries’ flavonoid biosynthesis, and also provide insights into insights into flavonoid biosynthesis, potential applications in agriculture, plant science, and pharmacy, and information on the regulation of secondary metabolism in plants. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=malonyltransferase" title="malonyltransferase">malonyltransferase</a>, <a href="https://publications.waset.org/abstracts/search?q=strawberry" title=" strawberry"> strawberry</a>, <a href="https://publications.waset.org/abstracts/search?q=flavonoid%20biosynthesis" title=" flavonoid biosynthesis"> flavonoid biosynthesis</a>, <a href="https://publications.waset.org/abstracts/search?q=enzyme%20assay" title=" enzyme assay"> enzyme assay</a> </p> <a href="https://publications.waset.org/abstracts/166257/cloning-of-strawberrys-malonyltransferase-genes-and-characterisation-of-their-enzymes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166257.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4834</span> Enhancement of Transaction&#039;s Authentication for the Europay, MasterCard, and Visa Contactless Card Payments</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ossama%20Al-Maliki">Ossama Al-Maliki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NFC" title="NFC">NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=RFID" title=" RFID"> RFID</a>, <a href="https://publications.waset.org/abstracts/search?q=contactless%20card" title=" contactless card"> contactless card</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=location" title=" location"> location</a>, <a href="https://publications.waset.org/abstracts/search?q=EMV" title=" EMV"> EMV</a> </p> <a href="https://publications.waset.org/abstracts/89591/enhancement-of-transactions-authentication-for-the-europay-mastercard-and-visa-contactless-card-payments" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4833</span> Software Quality Assurance in Component Based Software Development – a Survey Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abeer%20Toheed%20Quadri">Abeer Toheed Quadri</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Abubakar"> Maria Abubakar</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehreen%20Sirshar"> Mehreen Sirshar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Component Based Software Development (CBSD) is a new trend in software development. Selection of quality components is not enough to ensure software quality in Component Based Software System (CBSS). A software product is considered to be a quality product if it satisfies its customer’s needs and has minimum defects. Authors’ survey different research papers and analyzes various techniques which ensure software quality in component based software development. This paper includes an investigation about how to improve the quality of a component based software system without effecting quality attributes. The reported information is identified from literature survey. The developments of component based systems are rising as they reduce the development time, effort and cost by means of reuse. After analysis, it has been explored that in order to achieve the quality in a CBSS we need to have the components that are certified through software measure because the predictability of software quality attributes of system depend on the quality attributes of the constituent components, integration process and the framework used. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CBSD%20%28component%20based%20software%20development%29" title="CBSD (component based software development)">CBSD (component based software development)</a>, <a href="https://publications.waset.org/abstracts/search?q=CBSS%20%28component%20based%20software%20system%29" title=" CBSS (component based software system)"> CBSS (component based software system)</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20components" title=" quality components"> quality components</a>, <a href="https://publications.waset.org/abstracts/search?q=SQA%20%28software%20quality%20assurance%29" title=" SQA (software quality assurance)"> SQA (software quality assurance)</a> </p> <a href="https://publications.waset.org/abstracts/26167/software-quality-assurance-in-component-based-software-development-a-survey-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">413</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4832</span> Some Pertinent Issues and Considerations on CBSE</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anil%20Kumar%20Tripathi">Anil Kumar Tripathi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ratneshwer%20Gupta"> Ratneshwer Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> All the software engineering researches and best industry practices aim at providing software products with high degree of quality and functionality at low cost and less time. These requirements are addressed by the Component Based Software Engineering (CBSE) as well. CBSE, which deals with the software construction by components’ assembly, is a revolutionary extension of Software Engineering. CBSE must define and describe processes to assure timely completion of high quality software systems that are composed of a variety of pre built software components. Though these features provide distinct and visible benefits in software design and programming, they also raise some challenging problems. The aim of this work is to summarize the pertinent issues and considerations in CBSE to make an understanding in forms of concepts and observations that may lead to development of newer ways of dealing with the problems and challenges in CBSE. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20component" title="software component">software component</a>, <a href="https://publications.waset.org/abstracts/search?q=component%20based%20software%20engineering" title=" component based software engineering"> component based software engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20process" title=" software process"> software process</a>, <a href="https://publications.waset.org/abstracts/search?q=testing" title=" testing"> testing</a>, <a href="https://publications.waset.org/abstracts/search?q=maintenance" title=" maintenance"> maintenance</a> </p> <a href="https://publications.waset.org/abstracts/21943/some-pertinent-issues-and-considerations-on-cbse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21943.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4831</span> Effectiveness of Software Quality Assurance in Offshore Development Enterprises in Sri Lanka</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malinda%20Gayan%20Sirisena">Malinda Gayan Sirisena</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this research is to evaluate the effectiveness of software quality assurance approaches of Sri Lankan offshore software development organizations, and to propose a framework which could be used across all offshore software development organizations. An empirical study was conducted using derived framework from popular software quality evaluation models. The research instrument employed was a questionnaire survey among thirty seven Sri Lankan registered offshore software development organizations. The findings demonstrate a positive view of Effectiveness of Software Quality Assurance – the stronger predictors of Stability, Installability, Correctness, Testability and Changeability. The present study’s recommendations indicate a need for much emphasis on software quality assurance for the Sri Lankan offshore software development organizations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20quality%20assurance%20%28SQA%29" title="software quality assurance (SQA)">software quality assurance (SQA)</a>, <a href="https://publications.waset.org/abstracts/search?q=offshore%20software%20development" title=" offshore software development"> offshore software development</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20assurance%20evaluation%20models" title=" quality assurance evaluation models"> quality assurance evaluation models</a>, <a href="https://publications.waset.org/abstracts/search?q=effectiveness%20of%20quality%20assurance" title=" effectiveness of quality assurance"> effectiveness of quality assurance</a> </p> <a href="https://publications.waset.org/abstracts/8370/effectiveness-of-software-quality-assurance-in-offshore-development-enterprises-in-sri-lanka" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8370.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4830</span> Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Gonzalez">Carlos Gonzalez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet" title="internet">internet</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20software" title=" secure software"> secure software</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography%20process" title=" cryptography process"> cryptography process</a> </p> <a href="https://publications.waset.org/abstracts/59586/improving-security-by-using-secure-servers-communicating-via-internet-with-standalone-secure-software" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59586.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4829</span> A Software Engineering Methodology for Developing Secure Obfuscated Software</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Gonzalez">Carlos Gonzalez</a>, <a href="https://publications.waset.org/abstracts/search?q=Ernesto%20Linan"> Ernesto Linan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=development%20methodology" title="development methodology">development methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=obfuscated%20software" title=" obfuscated software"> obfuscated software</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20software%20development" title=" secure software development"> secure software development</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a> </p> <a href="https://publications.waset.org/abstracts/78465/a-software-engineering-methodology-for-developing-secure-obfuscated-software" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78465.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">250</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4828</span> Heterogeneous Artifacts Construction for Software Evolution Control</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mounir%20Zekkaoui">Mounir Zekkaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdelhadi%20Fennan"> Abdelhadi Fennan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The software evolution control requires a deep understanding of the changes and their impact on different system heterogeneous artifacts. And an understanding of descriptive knowledge of the developed software artifacts is a prerequisite condition for the success of the evolutionary process. The implementation of an evolutionary process is to make changes more or less important to many heterogeneous software artifacts such as source code, analysis and design models, unit testing, XML deployment descriptors, user guides, and others. These changes can be a source of degradation in functional, qualitative or behavioral terms of modified software. Hence the need for a unified approach for extraction and representation of different heterogeneous artifacts in order to ensure a unified and detailed description of heterogeneous software artifacts, exploitable by several software tools and allowing to responsible for the evolution of carry out the reasoning change concerned. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heterogeneous%20software%20artifacts" title="heterogeneous software artifacts">heterogeneous software artifacts</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20evolution%20control" title=" software evolution control"> software evolution control</a>, <a href="https://publications.waset.org/abstracts/search?q=unified%20approach" title=" unified approach"> unified approach</a>, <a href="https://publications.waset.org/abstracts/search?q=meta%20model" title=" meta model"> meta model</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title=" software architecture"> software architecture</a> </p> <a href="https://publications.waset.org/abstracts/13647/heterogeneous-artifacts-construction-for-software-evolution-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">445</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4827</span> Neural Network Based Approach of Software Maintenance Prediction for Laboratory Information System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vuk%20M.%20Popovic">Vuk M. Popovic</a>, <a href="https://publications.waset.org/abstracts/search?q=Dunja%20D.%20Popovic"> Dunja D. Popovic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software maintenance phase is started once a software project has been developed and delivered. After that, any modification to it corresponds to maintenance. Software maintenance involves modifications to keep a software project usable in a changed or a changing environment, to correct discovered faults, and modifications, and to improve performance or maintainability. Software maintenance and management of software maintenance are recognized as two most important and most expensive processes in a life of a software product. This research is basing the prediction of maintenance, on risks and time evaluation, and using them as data sets for working with neural networks. The aim of this paper is to provide support to project maintenance managers. They will be able to pass the issues planned for the next software-service-patch to the experts, for risk and working time evaluation, and afterward to put all data to neural networks in order to get software maintenance prediction. This process will lead to the more accurate prediction of the working hours needed for the software-service-patch, which will eventually lead to better planning of budget for the software maintenance projects. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=laboratory%20information%20system" title="laboratory information system">laboratory information system</a>, <a href="https://publications.waset.org/abstracts/search?q=maintenance%20engineering" title=" maintenance engineering"> maintenance engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title=" neural networks"> neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20maintenance" title=" software maintenance"> software maintenance</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20maintenance%20costs" title=" software maintenance costs"> software maintenance costs</a> </p> <a href="https://publications.waset.org/abstracts/68789/neural-network-based-approach-of-software-maintenance-prediction-for-laboratory-information-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68789.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4826</span> Software Quality Measurement System for Telecommunication Industry in Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nor%20Fazlina%20Iryani%20Abdul%20Hamid">Nor Fazlina Iryani Abdul Hamid</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamad%20Khatim%20Hasan"> Mohamad Khatim Hasan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Evolution of software quality measurement has been started since McCall introduced his quality model in year 1977. Starting from there, several software quality models and software quality measurement methods had emerged but none of them focused on telecommunication industry. In this paper, the implementation of software quality measurement system for telecommunication industry was compulsory to accommodate the rapid growth of telecommunication industry. The quality value of the telecommunication related software could be calculated using this system by entering the required parameters. The system would calculate the quality value of the measured system based on predefined quality metrics and aggregated by referring to the quality model. It would classify the quality level of the software based on Net Satisfaction Index (NSI). Thus, software quality measurement system was important to both developers and users in order to produce high quality software product for telecommunication industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20quality" title="software quality">software quality</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20measurement" title=" quality measurement"> quality measurement</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20model" title=" quality model"> quality model</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20metric" title=" quality metric"> quality metric</a>, <a href="https://publications.waset.org/abstracts/search?q=net%20satisfaction%20index" title=" net satisfaction index"> net satisfaction index</a> </p> <a href="https://publications.waset.org/abstracts/15875/software-quality-measurement-system-for-telecommunication-industry-in-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15875.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">592</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4825</span> The Comparison of Open Source Software for Digital Libraries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kanita%20Be%C5%A1irevi%C4%87">Kanita Beširević</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Open-source software development activities highly rely on Internet gathering communities volunteering in software development projects. Additionally, the libraries and cultural institutions share their metadata in the form of linked metadata to enable dissemination and enrichment. The open-source software provides free alternatives to traditional software solutions. The article aims to investigate the ever-increasing options for the digital library open source software adoption. The software available is presented and compared to other software solutions as well as to their previous versions. The top three open-source digital library software solutions are presented and compared. The comparison criteria are adopted from the UNESCO study by Bankier, J., & Gleason, K. Institutional Repository Software Comparison comprising of twelve criteria to appraise software, namely: infrastructure, front-end design, content discovery, publication tools, interoperability, and preservation. This article adopts a descriptive methodology based on data and information collected through selected software websites and the literature review. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=open%20source%20software" title="open source software">open source software</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20library" title=" digital library"> digital library</a>, <a href="https://publications.waset.org/abstracts/search?q=DSpace" title=" DSpace"> DSpace</a>, <a href="https://publications.waset.org/abstracts/search?q=Fedora" title=" Fedora"> Fedora</a>, <a href="https://publications.waset.org/abstracts/search?q=Greenstone" title=" Greenstone"> Greenstone</a> </p> <a href="https://publications.waset.org/abstracts/155592/the-comparison-of-open-source-software-for-digital-libraries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155592.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">116</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4824</span> Importance of Hardware Systems and Circuits in Secure Software Development Life Cycle</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mir%20Shahriar%20Emami">Mir Shahriar Emami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SDLC" title="SDLC">SDLC</a>, <a href="https://publications.waset.org/abstracts/search?q=SSDLC" title=" SSDLC"> SSDLC</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20security" title=" software security"> software security</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20process%20engineering" title=" software process engineering"> software process engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware%20systems%20and%20circuits%20security" title=" hardware systems and circuits security"> hardware systems and circuits security</a> </p> <a href="https://publications.waset.org/abstracts/55558/importance-of-hardware-systems-and-circuits-in-secure-software-development-life-cycle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55558.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">261</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4823</span> Four Phase Methodology for Developing Secure Software</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Gonzalez-Flores">Carlos Gonzalez-Flores</a>, <a href="https://publications.waset.org/abstracts/search?q=Ernesto%20Li%C3%B1an-Garc%C3%ADa"> Ernesto Liñan-García</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=secure%20software" title="secure software">secure software</a>, <a href="https://publications.waset.org/abstracts/search?q=four%20phases%20methodology" title=" four phases methodology"> four phases methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20engineering" title=" software engineering"> software engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=code%20breakers" title=" code breakers"> code breakers</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20analysis" title=" intrusion analysis"> intrusion analysis</a> </p> <a href="https://publications.waset.org/abstracts/38126/four-phase-methodology-for-developing-secure-software" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38126.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">399</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4822</span> Cloning, Expression and Protein Purification of AV1 Gene of Okra Leaf Curl Virus Egyptian Isolate and Genetic Diversity between Whitefly and Different Plant Hosts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dalia.%20G.%20Aseel">Dalia. G. Aseel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <em>Begomoviruses</em> are economically important plant viruses that infect dicotyledonous plants and exclusively transmitted by the whitefly <em>Bemisia tabaci. Here, replicative form was isolated from Okra, Cotton, Tomato plants and whitefly infected with Begomoviruses. Using coat protein specific primers (AV1), the viral infection was verified with amplicon at 450 bp. </em>The sequence of OLCuV-AV1 gene was recorded and received an accession number (FJ441605) from Genebank. The phylogenetic tree of OLCuV was closely related to <em>Okra leaf curl virus </em>previously isolated from Cameroon and USA with nucleotide sequence identity of 92%. The protein purification was carried out using His-Tag methodology by using Affinity Chromatography. The purified protein was separated on SDS-PAGE analysis and an enriched expected size of band at 30 kDa was observed. Furthermore, RAPD and SDS-PAGE were used to detect genetic variability between different hosts of <em>okra leaf curl virus</em> (OLCuV), <em>cotton leaf curl virus</em> (CLCuV), <em>tomato yellow leaf curl virus</em> (TYLCuV) and the whitefly vector. Finally, the present study would help to understand the relationship between the whitefly and different economical crops in Egypt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=okra%20leaf%20curl%20virus" title="okra leaf curl virus">okra leaf curl virus</a>, <a href="https://publications.waset.org/abstracts/search?q=AV1%20gene" title=" AV1 gene"> AV1 gene</a>, <a href="https://publications.waset.org/abstracts/search?q=sequencing" title=" sequencing"> sequencing</a>, <a href="https://publications.waset.org/abstracts/search?q=phylogenetic" title=" phylogenetic"> phylogenetic</a>, <a href="https://publications.waset.org/abstracts/search?q=cloning" title=" cloning"> cloning</a>, <a href="https://publications.waset.org/abstracts/search?q=purified%20protein" title=" purified protein"> purified protein</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20diversity%20and%20viral%20proteins" title=" genetic diversity and viral proteins"> genetic diversity and viral proteins</a> </p> <a href="https://publications.waset.org/abstracts/91013/cloning-expression-and-protein-purification-of-av1-gene-of-okra-leaf-curl-virus-egyptian-isolate-and-genetic-diversity-between-whitefly-and-different-plant-hosts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=161">161</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=162">162</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=software%20cloning&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10