Keywords : XML

Automatic Documentation of Java Programs

Dujan B. Taha; Asmaa H. Thanoon

AL-Rafidain Journal of Computer Sciences and Mathematics, 2014, Volume 11, Issue 2, Pages 73-87
DOI: 10.33899/csmj.2014.163757

Documentation process plays a great role in software systems development and maintenance, and regarded as an important feature for all software projects and programs in general. In the past, documents had been generated manually by documents writers, but these documents were very weak and had many errors, Therefore, automated documentation had been invented due to its good features that is complete, precise, and cheap compared with manual ways.
The work concerns with constructing an automated tool ADT(Auto Documentation Tool) used for documenting source code for programs written in java programming languages in legacy systems particularly and for programs in general which does not have any documentation at all or it were documented poorly in order to make them, and producing as a result of the document process either the class diagrams using UML (Unified Modeling Language( or producing easy understandable textual output using XML (Extensible Markup Language).

New Reverse Engineering Tool to Transform Oracle10g Code to Entity Relationship Model

Nada N. Saleem; Saad Ahmed Th.

AL-Rafidain Journal of Computer Sciences and Mathematics, 2013, Volume 10, Issue 4, Pages 27-34
DOI: 10.33899/csmj.2013.163554

Reverse engineering is one of the important operations performed on programming codes to get their design presented graphically. Reverse engineering is performed on various types of databases to get their particular designs represented by different models of relationships.
In this paper, we found that a tool for performing reverse engineering on Oracle10g database located  inside Oracle10g server , It has been designed in order to get its entity relationship model. Oracle10g data dictionary has been considered in performing reverse engineering. This dictionary includes all information that describes databases which is utilized for getting the important information relevant to the tables. It was necessary for presenting the entity relationship model. XML tags have been used in presenting the information of the data dictionary. These tags were utilized in creating the graphical entity relationship model.

Design a Software Engineering CASE Tool (ERToOracle10g) to transform a graphical Entity Relationship model (ER model) to Oracle10g

Nada N. Saleem; Saad Ahmed Th.

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 169-180
DOI: 10.33899/csmj.2011.163658

CASE Tools play a significant role in the field of software engineering development processes where they are utilized in system modeling and analysis, in system design and in generating automatic software codes based on system design models.
In this research the (ERToOracle10g) tool has been designed and implemented as a CASE Tool. Hence it is used to construct a data modeling using ER Model, then transforming the graphical model to (Oracle 10g) SQL instructions and executing it automatically inside an (Oracle 10g) server. XML has been used  to transform graphical ER model to SQL instructions. The graphical ER model includes symbols and shapes that are difficult to analyze or to directly generate SQL instructions. The graphical model is transformed to descriptive text using XML which is easy to analyze and transform to SQL instructions.

Encryption & Hiding Information in Internet Files HTML & XML

Dujan B. Taha; Ahmed S. Nori; Najla B. Ibraheem

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010, Volume 7, Issue 1, Pages 67-93
DOI: 10.33899/csmj.2010.163864

In order to achieve communication security, cryptography and information hiding in different media are used.
In this work, a system for hiding text in Internet files namely, HTML and XML has been built. Two proposed algorithms have been designed and implemented to embed and extract secret information from these files.
Hiding in HTML files was done by first encrypting the message using Linear Feedback Shift Register (LFSR) and embed the encryption key into the HTML tags. Then, the encrypted secret message was embedded into an image in the HTML page.
Hiding in XML files was achieved using non linear feed back shift register to encrypt the secret message. The resultant encryption key was embedded inside XML definition file namely, Document Type Definition (DTD) file which is invisible to the user. The encrypted message was embedded inside the XML component of the file.
            Experimental results demonstrated that the proposed algorithms are secure and efficient. The image carrying the secret information is identical (by Human Visual System HVS) to the original image as well as the ability to embed a lot of information inside the files. Visual C++ was used to access Internet files whereas Matlab Version 7 was used to implement the used encryption methods and graphical user interface.