This page has only limited features, please log in for full access.
Cyber-physical systems (CPS) have emerged to address the need for more efficient integration of modern advancement in cyber and wireless communications technologies such as 5G with physical objects. In addition, CPSs systems also needed to efficient control of security and privacy when we compare them with internet of things (IoT). In recent years, we experienced lack of security concerns with smart home IoT applications such as home security camera, etc. Therefore, this paper proposes a systematic software engineering framework for CPS and IoT systems. This paper also proposed a comprehensive requirements engineering framework for CPS-IoT applications which can also be specified using BPMN modelling and simulation to verify and validate CPS-IoT requirements with smart contracts. In this context, one of the key contribution of this paper is the innovative and generic requirements classification model for CPS-IoT application services, and this can also be applied to other emerging technologies such as fog, edge, cloud, and blockchain computing.
Muthu Ramachandran. SEF4CPSIoT Software Engineering Framework for Cyber-Physical and IoT Systems. International Journal of Hyperconnectivity and the Internet of Things 2021, 5, 1 -24.
AMA StyleMuthu Ramachandran. SEF4CPSIoT Software Engineering Framework for Cyber-Physical and IoT Systems. International Journal of Hyperconnectivity and the Internet of Things. 2021; 5 (1):1-24.
Chicago/Turabian StyleMuthu Ramachandran. 2021. "SEF4CPSIoT Software Engineering Framework for Cyber-Physical and IoT Systems." International Journal of Hyperconnectivity and the Internet of Things 5, no. 1: 1-24.
Cloud computing technologies are being used highly successfully in large-scale businesses. Therefore, it is useful for governments to adopt cloud-driven multi-channel, and multiple devices to offer their services such as e-tax, e-vote, e-health, etc. Since these applications require open, flexible, interoperable, collaborative, and integrated architecture, service-oriented architecture approach can be usefully adopted to achieve flexibility and multi-platform and multi-channel integration. However, its adoption needs to be systematic, secure, and privacy-driven. In this context, micro services architecture (MSA), a direct offshoot of SOA, is also a highly attractive mechanism for building and deploying enterprise-scale applications. This chapter proposes a systematic framework for cloud e-government services based on the cloud software engineering approach and suggests a cloud adoption model for e-government, leveraging the benefits of MSA patterns. The proposed model is based on a set of evaluated application characteristics that, in turn, support emerging IT-based technologies.
Muthu Ramachandran; Pethuru Raj Chelliah; P. Beaulah Soundarabai. Towards Connected Government Services. Global Perspectives on the Impact of Mass Media on Electoral Processes 2021, 113 -135.
AMA StyleMuthu Ramachandran, Pethuru Raj Chelliah, P. Beaulah Soundarabai. Towards Connected Government Services. Global Perspectives on the Impact of Mass Media on Electoral Processes. 2021; ():113-135.
Chicago/Turabian StyleMuthu Ramachandran; Pethuru Raj Chelliah; P. Beaulah Soundarabai. 2021. "Towards Connected Government Services." Global Perspectives on the Impact of Mass Media on Electoral Processes , no. : 113-135.
Financialization has contributed to economic growth but has caused scandals, misselling, rogue trading, tax evasion, and market speculation. To a certain extent, it has also created problems in social and economic instability. It is an important aspect of Enterprise Security, Privacy, and Risk (ESPR), particularly in risk research and analysis. In order to minimize the damaging impacts caused by the lack of regulatory compliance, governance, ethical responsibilities, and trust, we propose a Business Integrity Modeling and Analysis (BIMA) framework to unify business integrity with performance using big data predictive analytics and business intelligence. Comprehensive services include modeling risk and asset prices, and consequently, aligning them with business strategies, making our services, according to market trend analysis, both transparent and fair. The BIMA framework uses Monte Carlo simulation, the Black–Scholes–Merton model, and the Heston model for performing financial, operational, and liquidity risk analysis and present outputs in the form of analytics and visualization. Our results and analysis demonstrate supplier bankruptcy modeling, risk pricing, high-frequency pricing simulations, London Interbank Offered Rate (LIBOR) rate simulation, and speculation detection results to provide a variety of critical risk analysis. Our approaches to tackle problems caused by financial services and the operational risk clearly demonstrate that the BIMA framework, as the outputs of our data analytics research, can effectively combine integrity and risk analysis together with overall business performance and can contribute to operational risk research.
Victor Chang; Raul Valverde; Muthu Ramachandran; Chung-Sheng Li. Toward Business Integrity Modeling and Analysis Framework for Risk Measurement and Analysis. Applied Sciences 2020, 10, 3145 .
AMA StyleVictor Chang, Raul Valverde, Muthu Ramachandran, Chung-Sheng Li. Toward Business Integrity Modeling and Analysis Framework for Risk Measurement and Analysis. Applied Sciences. 2020; 10 (9):3145.
Chicago/Turabian StyleVictor Chang; Raul Valverde; Muthu Ramachandran; Chung-Sheng Li. 2020. "Toward Business Integrity Modeling and Analysis Framework for Risk Measurement and Analysis." Applied Sciences 10, no. 9: 3145.
Arshad R, Zahoor S, Shah MA, Wahid A, Yu H (2017) Green IoT: An investigation on energy saving practices for 2020 and beyond. IEEE Access 5:15667–15681 Li Y, Ni P, Chang V (2020) Application of deep reinforcement learning in stock trading strategies and stock forecasting. Computing.https://doi.org/10.1007/s00607-019-00773-w Ralph D, Li Y, Wills G, Green NG (2020) Recommendations from cold starts in big data. Computing. https://doi.org/10.1007/s00607-020-00792-y Tariq A, Qin Y, Hill R, Al-Aqrabi H (2020) Enabling distributed intelligence for the internet of things with IOTA and mobile agents. Computing. https://doi.org/10.1007/s00607-020-00806-9 Nandhini S (2020) A Novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT. Computing. https://doi.org/10.1007/s00607-020-00797-7 Standley V, Nuno F, Sharpe J (2020) Fusing attack detection and severity probabilities a method for computing minimum-risk war decisions. Computing. Download references Correspondence to Victor Chang. Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Reprints and Permissions Chang, V., Muñoz, V.M. & Ramachandran, M. Emerging applications of internet of things, big data, security, and complexity: special issue on collaboration opportunity for IoTBDS and COMPLEXIS. Computing (2020). https://doi.org/10.1007/s00607-020-00811-y Download citation Published: 13 April 2020 DOI: https://doi.org/10.1007/s00607-020-00811-y
Victor Chang; VĂctor MĂ©ndez Muñoz; Muthu Ramachandran. Emerging applications of internet of things, big data, security, and complexity: special issue on collaboration opportunity for IoTBDS and COMPLEXIS. Computing 2020, 102, 1301 -1304.
AMA StyleVictor Chang, VĂctor MĂ©ndez Muñoz, Muthu Ramachandran. Emerging applications of internet of things, big data, security, and complexity: special issue on collaboration opportunity for IoTBDS and COMPLEXIS. Computing. 2020; 102 (6):1301-1304.
Chicago/Turabian StyleVictor Chang; VĂctor MĂ©ndez Muñoz; Muthu Ramachandran. 2020. "Emerging applications of internet of things, big data, security, and complexity: special issue on collaboration opportunity for IoTBDS and COMPLEXIS." Computing 102, no. 6: 1301-1304.
This real-world case study has been used to demonstrate the best practices on business process modelling and component-based design for developing cloud services with build security in (BSI). BSI techniques, strategies, and processes presented in this chapter are general systems security principles and are applicable for both a cloud environment and traditional environment (non-cloud environment). The significant contribution of this research is to illustrate the application of the extended system security method known as SysSQUARE to elicit security requirements, identify security threats of data, as well as integrating build-in security techniques by modelling and simulating business processes upfront in the systems development life cycle.
Muthu Ramachandran. Secure Software Development of Cyber-Physical and IoT Systems. Advances in Computer and Electrical Engineering 2019, 1506 -1520.
AMA StyleMuthu Ramachandran. Secure Software Development of Cyber-Physical and IoT Systems. Advances in Computer and Electrical Engineering. 2019; ():1506-1520.
Chicago/Turabian StyleMuthu Ramachandran. 2019. "Secure Software Development of Cyber-Physical and IoT Systems." Advances in Computer and Electrical Engineering , no. : 1506-1520.
Enterprise security is the key to achieve global information security in business and organisations. Enterprise Cloud computing is a new paradigm for that enterprise where businesses need to be secured. However, this new trend needs to be more systematic with respect to Enterprise Cloud security. This chapter has developed a framework for enterprise security to analyze and model Enterprise Cloud organisational security of the Enterprise Cloud and its data. In particular, Enterprise Cloud data & Enterprise Cloud storage technologies (Amazon s3, Drop Box, Google Drive, etc.) have now become a normal practice for almost every computing user's. Therefore, building trust for Enterprise Cloud users should be the one of the main focuses of Enterprise Cloud computing research. This chapter has developed a framework for enterprises which comprises of two models of businesses: Enterprise Cloud provider enterprise model and Enterprise Cloud consumer enterprise model.
Muthu Ramachandran. Enterprise Security Framework for Enterprise Cloud Data Centres. Cloud Security 2019, 226 -248.
AMA StyleMuthu Ramachandran. Enterprise Security Framework for Enterprise Cloud Data Centres. Cloud Security. 2019; ():226-248.
Chicago/Turabian StyleMuthu Ramachandran. 2019. "Enterprise Security Framework for Enterprise Cloud Data Centres." Cloud Security , no. : 226-248.
Service computing and cloud computing have emerged to address the need for more flexible and cost-efficient computing systems where software is delivered as a service. To make this more resilient and reliable, we need to adopt software engineering (SE) principles and best practices that have existed for the last 40 years or so. Therefore, this chapter proposes a Software Engineering Framework for Service and Cloud Computing (SEF-SCC) to address the need for a systematic approach to design and develop robust, resilient, and reusable services. This chapter presents SEF-SCC methods, techniques, and a systematic engineering process supporting the development of service-oriented software systems and software as a service paradigms. SEF-SCC has been successfully validated for the past 10 years based on a large-scale case study on British Energy Power and Energy Trading (BEPET). Ideas and concepts suggested in this chapter are equally applicable to all distributed computing environments including Fog and Edge Computing paradigms.
Muthu Ramachandran. SEF-SCC: Software Engineering Framework for Service and Cloud Computing. Fog Computing 2018, 227 -248.
AMA StyleMuthu Ramachandran. SEF-SCC: Software Engineering Framework for Service and Cloud Computing. Fog Computing. 2018; ():227-248.
Chicago/Turabian StyleMuthu Ramachandran. 2018. "SEF-SCC: Software Engineering Framework for Service and Cloud Computing." Fog Computing , no. : 227-248.
Gang Sun; Victor Chang; Steven Guan; Muthu Ramachandran; Jin Li; Dan Liao. Big Data and Internet of Things—Fusion for different services and its impacts. Future Generation Computer Systems 2018, 86, 1368 -1370.
AMA StyleGang Sun, Victor Chang, Steven Guan, Muthu Ramachandran, Jin Li, Dan Liao. Big Data and Internet of Things—Fusion for different services and its impacts. Future Generation Computer Systems. 2018; 86 ():1368-1370.
Chicago/Turabian StyleGang Sun; Victor Chang; Steven Guan; Muthu Ramachandran; Jin Li; Dan Liao. 2018. "Big Data and Internet of Things—Fusion for different services and its impacts." Future Generation Computer Systems 86, no. : 1368-1370.
Network function virtualization (NFV) is a promising technique aimed at reducing capital expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and scalability of an entire network. In contrast to traditional dispatching, NFV can separate network functions from proprietary infrastructure and gather these functions into a resource pool that can efficiently modify and adjust service function chains (SFCs). However, this emerging technique has some challenges. A major problem is reliability, which involves ensuring the availability of deployed SFCs, namely, the probability of successfully chaining a series of virtual network functions while considering both the feasibility and the specific requirements of clients, because the substrate network remains vulnerable to earthquakes, floods, and other natural disasters. Based on the premise of users' demands for SFC requirements, we present an ensure reliability cost saving algorithm to reduce the CAPEX and OPEX of telecommunication service providers by reducing the reliability of the SFC deployments. The results of extensive experiments indicate that the proposed algorithms perform efficiently in terms of the blocking ratio, resource consumption, time consumption, and the first block.
Jian Sun; Guangyang Zhu; Gang Sun; Dan Liao; Yao Li; Arun Kumar Sangaiah; Muthu Ramachandran; Victor Chang. A Reliability-Aware Approach for Resource Efficient Virtual Network Function Deployment. IEEE Access 2018, 6, 18238 -18250.
AMA StyleJian Sun, Guangyang Zhu, Gang Sun, Dan Liao, Yao Li, Arun Kumar Sangaiah, Muthu Ramachandran, Victor Chang. A Reliability-Aware Approach for Resource Efficient Virtual Network Function Deployment. IEEE Access. 2018; 6 ():18238-18250.
Chicago/Turabian StyleJian Sun; Guangyang Zhu; Gang Sun; Dan Liao; Yao Li; Arun Kumar Sangaiah; Muthu Ramachandran; Victor Chang. 2018. "A Reliability-Aware Approach for Resource Efficient Virtual Network Function Deployment." IEEE Access 6, no. : 18238-18250.
Network function virtualization (NFV) is a promising technique aimed at reducing capital expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and scalability of an entire network. However, this emerging technique has some challenges. A major problem is reliability, which involves ensuring the availability of deployed SFCs, namely, the probability of successfully chaining a series of big-data-based virtual network functions (VNFs) while considering both the feasibility and the specific requirements of clients, because the substrate network remains vulnerable to earthquakes, floods and other natural disasters. Based on the premise of users’ demands for SFC requirements, we present an Ensure Reliability Cost Saving (ER_CS) algorithm to reduce the CAPEX and OPEX of telecommunication service providers (TSPs) by reducing the reliability of the SFC deployments. We employ big-data-based arbitrary topologies as the substrate network. The results of extensive experiments indicate that the proposed algorithms perform efficiently in terms of the blocking ratio, resource consumption and time consumption.
Jian Sun; Gang Sun; Dan Liao; Yao Li; Muthu Ramachandran; Victor Chang. Reliable and Efficient Deployment for Virtual Network Functions. Transactions on Petri Nets and Other Models of Concurrency XV 2018, 375 -384.
AMA StyleJian Sun, Gang Sun, Dan Liao, Yao Li, Muthu Ramachandran, Victor Chang. Reliable and Efficient Deployment for Virtual Network Functions. Transactions on Petri Nets and Other Models of Concurrency XV. 2018; ():375-384.
Chicago/Turabian StyleJian Sun; Gang Sun; Dan Liao; Yao Li; Muthu Ramachandran; Victor Chang. 2018. "Reliable and Efficient Deployment for Virtual Network Functions." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 375-384.
Social media has become an integral part of many people's lives around the world. The main use of this communication channel is to connect with social circles. It is also widely used for commercial and business purposes. Governments are also keen to use social media as an alternative to the traditional communication channels. Nonetheless, when the level of use of social media in the government is compared to other fields, a clear gap becomes apparent. This chapter investigates the adoption of social media as a communication channel between citizens, public agencies and government departments; and considers a wide range of factors that affect the issue from the perspective of public agencies. This chapter presents an extensive literature review and proposes a framework that organises the critical factors that affect public agencies' efforts while implementing social media. We also provide a list of hypotheses to validate and evaluate the significance of these factors.
Reemiah Alotaibi; Muthu Ramachandran; Ah-Lian Kor; Amin Hosseinian-Far; Information Resources Management Association. Adoption of Social Media as Communication Channels in Government Agencies. Media Influence 2018, 106 -140.
AMA StyleReemiah Alotaibi, Muthu Ramachandran, Ah-Lian Kor, Amin Hosseinian-Far, Information Resources Management Association. Adoption of Social Media as Communication Channels in Government Agencies. Media Influence. 2018; ():106-140.
Chicago/Turabian StyleReemiah Alotaibi; Muthu Ramachandran; Ah-Lian Kor; Amin Hosseinian-Far; Information Resources Management Association. 2018. "Adoption of Social Media as Communication Channels in Government Agencies." Media Influence , no. : 106-140.
This real-world case study has been used to demonstrate the best practices on business process modelling and component based design for developing cloud services with Build Security In (BSI). BSI techniques, strategies, and processes presented in this article are general systems security principles and are applicable for both a cloud environment and traditional environment (non-cloud environment). The significant contribution of this research is to illustrate the application of the extended system security method known as SysSQUARE to elicit security requirements, identify security threats of data, as well as integrating build-in security techniques by modelling and simulating business processes upfront in the systems development life cycle.
Muthu Ramachandran; D.B.A. Mehdi Khosrow-Pour. Secure Software Development of Cyber-Physical and IoT Systems. Encyclopedia of Information Science and Technology, Fourth Edition 2018, 7525 -7538.
AMA StyleMuthu Ramachandran, D.B.A. Mehdi Khosrow-Pour. Secure Software Development of Cyber-Physical and IoT Systems. Encyclopedia of Information Science and Technology, Fourth Edition. 2018; ():7525-7538.
Chicago/Turabian StyleMuthu Ramachandran; D.B.A. Mehdi Khosrow-Pour. 2018. "Secure Software Development of Cyber-Physical and IoT Systems." Encyclopedia of Information Science and Technology, Fourth Edition , no. : 7525-7538.
Krishan Chand; Muthu Ramachandran. Complexity Evaluation with Business Process Modeling and Simulation. Proceedings of the 3rd International Conference on Complexity, Future Information Systems and Risk 2018, 1 .
AMA StyleKrishan Chand, Muthu Ramachandran. Complexity Evaluation with Business Process Modeling and Simulation. Proceedings of the 3rd International Conference on Complexity, Future Information Systems and Risk. 2018; ():1.
Chicago/Turabian StyleKrishan Chand; Muthu Ramachandran. 2018. "Complexity Evaluation with Business Process Modeling and Simulation." Proceedings of the 3rd International Conference on Complexity, Future Information Systems and Risk , no. : 1.
Software project management (SPM) is one of the key activities in the success of a software product. One of the classical definitions of a management is the one that suggests to cover both science and the art, so is the software project management. The careful process of bringing together economics, software technology, and human relations for a software project is not a simple task, as a software project is an extremely people-intensive exertion that traverses an exceptionally long period of time, with crucial ramifications on the work and execution of a wide range of classes of individuals. Traditionally, SPM provides software planning, cost estimation, human resource management, and delivery. With the emergence of cloud computing services, there needs to be multitude of features offering and managing virtual development teams and services. Therefore, we have proposed a key set of SPM activities offered as a cloud service: software project management as a service (SPMaaS ). This chapter provides insight into SPMaaS as a cloud service featuring our approach to managing distributed teams and automated cost estimation for software metrics. The design of SPMaaS has been innovative with the use of the newly emerged modelling technique known as SoaML (UML modelling for SOA ) which is one of the key contributions to this research. This study discovered an overall 70% improvement of the cloud-based services by designing with SoaML by counting number of service components during the design phase of this research.
Muthu Ramachandran; Vikrant Chaugule. Software Project Management as a Service (SPMaaS): Perspectives and Benefits. Computer Communications and Networks 2017, 87 -115.
AMA StyleMuthu Ramachandran, Vikrant Chaugule. Software Project Management as a Service (SPMaaS): Perspectives and Benefits. Computer Communications and Networks. 2017; ():87-115.
Chicago/Turabian StyleMuthu Ramachandran; Vikrant Chaugule. 2017. "Software Project Management as a Service (SPMaaS): Perspectives and Benefits." Computer Communications and Networks , no. : 87-115.
This paper describes our proposal for Quality of Service (QoS) for Financial Modeling and Prediction as a Service (FMPaaS), since a majority of papers does not focus on SaaS level. We focus on two factors for delivering successful QoS, which are performance and accuracy for FMPaaS. The design process, theories and models behind the FMPaaS service have been explained. To support our FMPaaS service, two APIs have been developed to improve on performance and accuracy. Two major experiments have been illustrated and results show that each API processing can be completed in 2.12 seconds and 100,000 simulations can be completed in an acceptable period of time. Accuracy tests have been performed while using Facebook as an example. Three points of comparisons between actual and predicted prices have been undertaken. Results support accuracy since results are between 93.72 % and 99.63 % for Facebook. Three case studies have been used and results can support the accuracy and validity of the high level of accuracy offered by FMPaaS.
Victor Chang; Muthu Ramachandran. Financial Modeling and Prediction as a Service. Journal of Grid Computing 2017, 15, 177 -195.
AMA StyleVictor Chang, Muthu Ramachandran. Financial Modeling and Prediction as a Service. Journal of Grid Computing. 2017; 15 (2):177-195.
Chicago/Turabian StyleVictor Chang; Muthu Ramachandran. 2017. "Financial Modeling and Prediction as a Service." Journal of Grid Computing 15, no. 2: 177-195.
Amin Hosseinian-Far; Muthu Ramachandran; Dilshad Sarwar. Strategic Engineering for Cloud Computing and Big Data Analytics. Strategic Engineering for Cloud Computing and Big Data Analytics 2017, 1 .
AMA StyleAmin Hosseinian-Far, Muthu Ramachandran, Dilshad Sarwar. Strategic Engineering for Cloud Computing and Big Data Analytics. Strategic Engineering for Cloud Computing and Big Data Analytics. 2017; ():1.
Chicago/Turabian StyleAmin Hosseinian-Far; Muthu Ramachandran; Dilshad Sarwar. 2017. "Strategic Engineering for Cloud Computing and Big Data Analytics." Strategic Engineering for Cloud Computing and Big Data Analytics , no. : 1.
In today's world, we are living in busy metropolitan cities and want our homes to be ambient intelligent enough towards our cognitive requirements for assisted living in smart space environment and an excellent smart home control system should not rely on the users' instructions (Wanglei, 2015). The ambient intelligence is a sensational new information technology paradigm in which people are empowered for assisted living through multiple IoTs sensors environment that are aware of inhabitant presence and context and highly sensitive, adaptive and responsive to their needs. A noble ambient intelligent environment are characterized by their ubiquity, transparency and intelligence which seamlessly integrated into the background and invisible to surrounded users/inhabitant. Cognitive IoE (Internet of Everything) is a new type of pervasive computing. As the ambient smart home is into research only from a couple of years, many research outcomes are lacking potentials in ambient intelligence and need to be more dug around for better outcomes. As a result, an effective architecture of CIoE for ambient intelligent space is missing in other researcher's work. An unsupervised and supervised methods of machine learning can be applied in order to classify the varied and complex user activities. In the first step, by using fuzzy set theory, the input dataset value can be fuzzified to obtain degree of membership for context from the physical layer. In the second step, using K-pattern clustering algorithms to discover pattern clusters and make dynamic rules based on identified patterns. This chapter provides an overview, critical evaluation of approaches and research directions to CIoE.
Gopal Singh Jamnal; Xiaodong Liu; Lu Fan; Muthu Ramachandran. Cognitive Internet of Everything (CIoE). Design Methodologies and Tools for 5G Network Development and Application 2017, 277 -309.
AMA StyleGopal Singh Jamnal, Xiaodong Liu, Lu Fan, Muthu Ramachandran. Cognitive Internet of Everything (CIoE). Design Methodologies and Tools for 5G Network Development and Application. 2017; ():277-309.
Chicago/Turabian StyleGopal Singh Jamnal; Xiaodong Liu; Lu Fan; Muthu Ramachandran. 2017. "Cognitive Internet of Everything (CIoE)." Design Methodologies and Tools for 5G Network Development and Application , no. : 277-309.
Zanele Nicole Mndebele; Muthu Ramachandran. IoT based Proximity Marketing. Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security 2017, 325 -330.
AMA StyleZanele Nicole Mndebele, Muthu Ramachandran. IoT based Proximity Marketing. Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security. 2017; ():325-330.
Chicago/Turabian StyleZanele Nicole Mndebele; Muthu Ramachandran. 2017. "IoT based Proximity Marketing." Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security , no. : 325-330.
Muthu Ramachandran; Rezan Sedeeq. Learning Environment for Problem-based Learning in Teaching Software Components and Service-oriented Architecture. Proceedings of the 9th International Conference on Computer Supported Education 2017, 249 -255.
AMA StyleMuthu Ramachandran, Rezan Sedeeq. Learning Environment for Problem-based Learning in Teaching Software Components and Service-oriented Architecture. Proceedings of the 9th International Conference on Computer Supported Education. 2017; ():249-255.
Chicago/Turabian StyleMuthu Ramachandran; Rezan Sedeeq. 2017. "Learning Environment for Problem-based Learning in Teaching Software Components and Service-oriented Architecture." Proceedings of the 9th International Conference on Computer Supported Education , no. : 249-255.
Muthu Ramachandran. Technology Enhanced Active Learning in Software Engineering. Proceedings of the 9th International Conference on Computer Supported Education 2017, 242 -248.
AMA StyleMuthu Ramachandran. Technology Enhanced Active Learning in Software Engineering. Proceedings of the 9th International Conference on Computer Supported Education. 2017; ():242-248.
Chicago/Turabian StyleMuthu Ramachandran. 2017. "Technology Enhanced Active Learning in Software Engineering." Proceedings of the 9th International Conference on Computer Supported Education , no. : 242-248.