A Review on Mutant Reduction Techniques

S. Shanmuga Priya, JECET; December 2017 - February 2018; Sec. B; Vol.7. No.1, 009-022,[DOI: 10.24214/jecet.B.7.1.00922.]


Testing is the most important activity in Software Development Life Cycle (SDLC). It plays a vital role in assessing the quality of the software to be released. Software Testing Life Cycle (STLC) involves major activities like: test plan, test case preparation, executing the test case and evaluating the test results. From these set of activities, it is vivid that, test case design and execution plays the centre role. Exhaustive testing is infeasible, as it involves large number of test cases to be designed even for a simple application under test and is time consuming. Due to this, the software tester aims to test the system with minimal set of test cases that uncovers maximum faults as possible. But, there are many challenges involved in designing minimal set of test cases such as, testers are often clueless about how many test cases they need to prepare, whether the minimal test cases developed for testing the program is adequate, and whether these test cases are effective in discovering the bugs. Mutation testing technique is one such testing, that tests the test cases for its effectiveness and ensures its adequacy. Any effective testing technique must cost less and must be highly effective. Even though mutation testing is effective, it‘s highly a cost oriented approach, because even for testing a small amount of code huge number of mutants must be generated. This paper proposes various techniques that are available to reduce the mutant cost involved in mutation testing.

Mobile Money Transfer Transaction Volume in Harare, Zimbabwe

Tinashe Chingoriwo and Dr Farai Choga,JECET; December 2017- February 20178 Sec. B; Vol.7. No.1, 001-008.[DOI: 10.24214/jecet.B.7.1.00108.]


This research was on the usage of mobile money transfer systems in Zimbabwe. Most of the people spent most of their time in bank queues yet they are registered on mobile money transfer systems. Most of the transactions that they use the hard cash for are also available on the mobile money transfer platforms. This research was carried out in order to find out the transaction volumes of mobile money transfer systems in Harare. The researchers used a descriptive survey design to analyse the research problem. A mixed research methodology was used and the researchers collected and analysed both qualitative and quantitative data based on the research questions. In this research judgemental sampling was used by the researchers to select the respondents on the basis of their knowledge on mobile money transfer systems. The data was gathered using interviews and questionnaires. The findings revealed that some customers are still reluctant to adopt mobile money transfer systems because they are used to the traditional banking system and this impacts mobile money transfer systems usage. The mobile money transfer systems were mostly used by the 25-30 year age group. The researchers recommended that mobile network operators should avail loan facilities on the mobile money transfer platforms. By so doing it can bring more people willing to use mobile money transfer systems on board thereby increasing the usage. If implemented, the move can enhance the usage of the mobile money transfer systems and shorten bank queues as well as getting rid of the dominant cash culture syndrome in Zimbabwe

Why Business Intelligence Needs Artificial Intelligence (AI) and Advanced Natural Language Generation (NLG)

Indrasen Poola, JECET; September 2017- November 2017; Sec. B; Vol.6. No.4, 266-274.[DOI: 10.24214/jecet.B.6.4.266274.]


The future is fast paced. Are we, we as mankind, stepping into “World 4.0” era? Is “world 4.0” era better term than “Industry 4.0”? Artificial intelligence robots are scaring us, but, they are arriving in our businesses and no one can stop this. In the world of wearable gadgets for time management and setting schedule around business affairs – you will meet a small group of people who have worked very hard, often inspired by friends and family who they wanted to help. You will not find a robot empire, but pockets of amazing people who want simply to leverage artificial intelligence to help business processes they care about to overcome lethargy, bring automation and grow productivity.

Billing management information systems and organisational performance: A case study a Zimbabwean service provider company 2003 to 2017

Samukeliso Gamuchirai Makore and Dr Farai Choga, JECET; September 2017- November 2017; Sec. B; Vol.6. No.4, 254-265, [DOI: 10.24214/jecet.B.6.4.25465.]


This study sought to investigate how billing management information systems affect organisational performance. The company was being crippled with collection inefficiencies owing to its inefficient billing processes which resulted in customers refusing to pay their bills. In this study, questionnaires and interviews were the research instruments. The documentary analysis method was also used to provide information of how billing management information systems affected organisational performance. The study found that billing management is very critical for both service provider and customers and that business management using information communication technology such as broadband networks and data centres has currently become more and more important. This study recommends that employees and customers be involved and considered in the setting up of billing management information systems of an organisation. It is also necessary for organisations to keep an eye on trends on global ICT changes so as to improve customer experience and relations. Finally it is also recommended that further research be undertaken in order to establish effectiveness of billing management information systems of other organisations

Preventing SQL Injection Attack Using Pattern Matching, Parse Tree Validation and Cryptography Algorithms

Sudha Senthilkumar and Krishna Teja Reddy,JECET; September 2017- November 2017; Sec. B; Vol.6. No.4, 246-253,[DOI: 10.24214/jecet.B.6.4.24653.]


SQL Injection (also known as SQLi) refers to those attacks in which attackers try to inject malicious SQL statements into the web application’s input fields in order to affect the database servers. As this kind of an attack can alter the servers of any kind of web applications and make them susceptible, it has become more difficult to depend upon SQL based web applications. The idea on which this attack is based on is very simple. By scripting the input of an application in a particular way, the attacker is able to make the input be interpreted as an SQL query and not as data. Hence the attacker can affect the database server by inputting different kinds of queries. These attacks need to be prevented in order to have a secure and reliable application. Hence a few methods for preventing SQLi have been stated in this paper.