Educational Approach of Refactoring in Facilitating Reverse Engineering
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically instilled in the developer’s mind, this activity is not easy to apply and visualize. This situation became more problematic when deals with inexperienced developers. Therefore, there is a need to develop an educational approach to comprehend refactoring activity. This activity was applied through reverse engineering tasks. The software ngineering (SE) teams were required to apply reverse engineering activity in order to check the consistency between codes and design. The teams were encouraged to apply Model- View-Controller (MVC) pattern architecture in order to facilitate the activities. Findings revealed that Extreme rogramming (XP teams managed to complete reverse engineering tasks earlier than Formal teams. This study found that the approach is important to increase understanding of refactoring activities in reverse engineering process. This approach will be furthered applied for others SE teams to gain more insight and perceptions towards improving SE course.
Authors and Affiliations
Mazni Omar , Sharifah Lailee Syed-Abdullah , Kamaruzaman Jusoff , Azman Yasin , Haslina Mohd
FRIX-Traffic Analyzer And Transportation Assistant
This website specializes in giving traffic reports for a specific area. Much of our collected data comes from automatic sensors placed at various points around the motorway to nitor vehicle speeds. We have provided an...
Step Counting Using Smartphone-Based Accelerometer
This paper presents a method for counting the number of steps taken by a user, while walking at any variable speed, using smartphone-based accelerometer. For this purpose, the steps are detected based on a relation betwe...
Text Analytics to Data Warehousing
Information hidden or stored in unstructured data can play a critical role in making decisions, understanding and conducting other business functions. Integrating data stored in both structured and unstructured formats c...
A novel method of dynamic permanent caching with resourceful built up and imperative access
Caching is built up each time when the machine starts up according to user’s application usability. This built up rocedure escalates the efficiency of application’s usage for the next coming access of same application....
Wirelss Security on Security Standard Policy: A Case Studty
Administrators of a network have a variety of different uthentication and encryption technologies to choose from. Administrators must also take into account a variety of organizational factors, not just of technical fac...