Earticle

현재 위치 Home

International Journal of Multimedia and Ubiquitous Engineering

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJMUE) [Science & Engineering Research Support Center, Republic of Korea(IJMUE)]
  • pISSN
    1975-0080
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.7 No4 (23건)
No
1

Integrated Content-aware Image Retargeting System

Shanshan Wang, Amr Abdel-Dayem

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.1-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent years, image retargeting has been an active research topic due to the rapid growth of mobile devices and display screens with different resolutions and aspect ratios. To address this problem, various content-aware image-retargeting approaches have been proposed to retarget images while preserving important regions and minimizing distortions. In our research, the goal is to propose a new integrated content-aware image retargeting system that outperforms other traditional approaches. At the beginning, an improved context-aware saliency detection approach is applied for detecting low-level saliency. Then, a high level salient feature—human faces—is also incorporated using an improved Viola-Jones face detector with a skin color detector as a post-processing stage, to construct the final importance map. Finally, a non-uniform image scaling approach is employed as the retargeting stage. Experimental study over a set of 74 benchmark images demonstrated that the proposed system overcomes most of the drawbacks of other existing approaches.

2

Live-Video Service using Multicast in Wireless Network

Jaeho Choi, Seungyeol Lee, Iksoo Kim, Yoseop Woo

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.17-22

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a live-video service using multicast in wireless network. The switching/multicast agent (SMA) in this system provides multicast for effective use of network resources in WLAN and reduces the load of video server and access points(AP). Also, the SMA and AP support a handover mechanism for moving mobile nodes(MN) using identification number(ID#) of AP (AP_#) that the MNs are visiting while they move within WLAN. The AP_# is added to IP address assigned from the first accessed AP. Except the MN receives multicast group address(MGA) from SMA, this IP address never changes even if the MN moves among other APs. The overhead for handover using AP_# is negligible in video service. The proposed live-video system using multicast provides a seamless video service by adding AP_# only without reassigning of IP address from a new AP when MN moves one AP to another.

3

Generic Channel Overlap Calculations Algorithm

A. Oudah, T. Abd. Rahman, N. Seman

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.23-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The ever-increasing shortage of the spectrum leaves fourth generation wireless technologies no choice but to re-use their existing spectra repeatedly by the so-called re-farming strategy. This alternative, nevertheless, increases overlap levels between cells and rapidly escalates into interference situations. In this paper, channel overlap in wireless systems is defined and quantified. The proposed models account for cross and adjacent types of overlap in almost any radio network.

4

Amorphous Slack Methodology for Autonomous Fault-Handling in Reconfigurable Devices

Naveed Imran, Jooheung Lee, Youngju Kim, Mingjie Lin, Ronald F. DeMara

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.29-44

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Amorphous Slack fault handling methodology utilizes adaptive runtime redundancy to improve survivability of FPGA based designs. Unlike conventional static redundancy based methods to achieve fault resilience, the proposed system operates in uniplex arrangement under non-contingent conditions. The proposed fault isolation algorithm is invoked upon fault detection which employs a health metric of the application operating over reconfigurable platform. This assertion applies if a signal-to-noise metric is known, as well as applications that do not possess a readily correlated metric to identify anomalous behavior. In particular, readily available processor cores allow dynamic fault identification by executing a software specification of the signal processing algorithm which is used to periodically validate critical outputs of the high-speed hardware circuit within tolerances. The results from H.263 video encoder and Canny edge detector implemented over Xilinx Virtex-4 device demonstrate autonomous recovery from permanent stuck-at faults while maintaining the throughput during fault-handling operations. The fault-detection and isolation applications are executed on on-chip PowerPC processor while the Circuit-Under-Test (CUT) is realized in hardware fabric. The proposed architecture allows on-chip processor based functional monitoring of the contained hardware resources subjected to the actual inputs of the circuit.

5

Intelligent Material Design System based on Weak Conditioned Linear Programming

Teiichi Inada, Tokuro Matsuo

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.45-58

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent year, multi-layered semiconductor package is one of the most important technologies to enhance its performance. To bond between each layer of multi-chip package, die-bonding film is known as an effective material. We had developed a novel low-modulus die-bonding adhesive film. Properties of the films are widely changed by the ratio of epoxy resin and acrylic polymer contents. To satisfy the target properties, the influence of various parameters on material properties was examined. However, it is not easy for researchers to find out the formulation which satisfy the targets. To solve the problem, this paper proposes the weak conditioned combinatorial linear programming method (WCCLP). By defining solution area as a function of combination index, the optimum formulations are acquired. This optimization can be done by newly developed user-friendly software. The software is applicable not only to semiconductor related materials but also to any such formulation as paint, medicine and food.

6

An enhanced and optimized adaptive filter with optimal filter coefficients selection is proposed and implemented to resolve motion artifact issue in wearable ECG Recording. A two-electrode small size chest belt ECG system mounted with 3-axis accelerometer is implemented for ECG and activity ubiquitous recording in daily life. In ubiquitous ECG recording, ECG signal is often distorted due to different state of activity. Body movement incurs activity noise in ubiquitous ECG recording, and causing low accuracy in R-peak (heart beat) detection. Thus, a new adaptive filter methodology is proposed in this paper to look for an optimized filter coefficients base on different state of activity. A simple fuzzy rule-based algorithm is suggested for activity state classification and a set of high pass filter coefficient is applied base on different state of activity. In the case of low activity state, low high pass filter coefficient is used, whereas, in the case of high activity state, a high pass filter coefficient is used. The experiment result shows significant improvement of R-peak detection accuracy during fast movement activity state.

7

Managing Multimedia Data : A Temporal-Based Approach

Farham Mohamed, M Nordin A Rahman, Yuzarimi M Lazim, Saiful Bahri Mohamed

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.73-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Implement a proper method in multimedia data management is important to support multimedia application’s domain. The method is to ensure that the process of data store, retrieving and manipulation in a distributed environment can be conducted in an efficient manner. A reliable or appropriate format of record structure in multimedia data management tool is required in order to trace validation and transaction of multimedia data. Hence, the concept of temporal database can be applied to overcome this situation. The paper presents the development of the temporal based multimedia data management model. The two elements of time will associate into the model to fulfill the requirement. Transaction time and valid time will monitor the changes (event) and transaction that happen to the multimedia data stored in a database. The use of time elements provided a new schema to query multimedia data based on past, current and future time. The designed model is implemented under web services based environment by utilizing J2EE platform. Applying this implementation approach is believed to provide application sharing under multiple environments, reduce complexity and cost savings.

8

A New Recovery Scheme for the Long-Term Mobile Application

Sungchae Lim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.87-94

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, the widespread use of mobile devices, such as smartphones and tablet PCs, leads to a new demand for distributed mobile applications. When the mobile application has a long lifetime and it is comprised of many parallel tasks, it is required to safely checkpoint its processing states against abrupt failure. To this end, lots of works have been done to reduce the wireless traffic overhead caused by distributed checkpointing protocols. In this paper, we also propose a new recovery scheme with less networking overhead and high flexibility in its protocol. For this, we deploy logging agents across mobile support stations so that they can gather the causality dependency vectors of the involved application processes without the use of wireless data transmission. Because of these features, our scheme provides the benefits of high flexibility during the checkpointing time and low traffic overhead, while preventing severe cascaded rollbacks efficiently.

9

A Study on the Source Translator for Generating the Android Game Source from the WIPI Game Source

YangSun Lee, YunSik Son

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.95-106

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the mobile market, the appearance of various smart phone platforms such as Android, iOS(iPhone), Bada and Window Phone has led to game developers to repeatedly develop game contents to suit the different mobile communication companies' platforms in order to service mobile game contents. Furthermore, to use each of the game contents developed on the existing feature phone platform, they need to be recreated based on the smart phone platform. Consequently, large amounts of time and expenses are being used to analyze and convert the sources and resources of the mobile game contents for use on the smart phone platform. Rather than creating new game content, developers are investing twice the amount of time and money required to develop a game for one platform in making existing game content available on other platforms. In this paper, in order to resolve such problems the source translator of the automatic mobile game contents converter system will be implemented in order to convert the WIPI(Wireless Internet Platform for Interoperability) game contents for use on an Android smart platform. This system has enabled contents to be transferred into smart platforms within a short time, so that the time and money it takes to launch services for different mobile communication companies can be reduced. Furthermore, game contents developed for use on feature phones can also be converted and used on smart platforms to increase reusability of game contents and also new game contents creation processes can heighten productivity to consequently provide a more variety of game contents to users.

10

Performance Evaluation of WiMAX Network with AMC and MCCDMA for Mobile Environments

Vinit Grewal, Ajay K. Sharma

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.107-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The WiMAX forum is based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) based adaptive Physical Layer (PHY) layer. In this paper, the performance of WiMAX PHY layer is investigated for two PHY layer modifications, link adaption algorithm (Adaptive Modulation and coding, AMC) and MCCDMA (hybrid OFDM system with multiple access technology, Code Division Multiple Access) to provide high suppression against multipath fading , provide high bandwidth efficiency, high throughput with high data rates for mobile environments. The results obtained for these modifications show that these mechanisms enhance the performance of the PHY layer in mobile environments with lower BER and high spectral efficiency.

11

Lane Detection using Fuzzy C-Means Clustering

Kwang Baek Kim, Doo Heon Song, Jae-Hyun Cho

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.119-124

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In general, road lane detection from a traffic surveillance camera is done by the analysis of geometric shapes of the road. Thus, Hough transform or B-snake technology is preferred to intelligent pattern matching or machine learning such as neural network. However, we insist that the feasibility of using intelligent technique in this area is quite undervalued. In this paper, we first divide the image into halves and use only the lower part in detection and binarize them by analyzing RGB channel. Then the boundary lines are extracted by applying 4-directional contour tracking algorithm and vectors with distance and angle values are extracted from those boundary lines to use as input for fuzzy C-means clustering algorithm. Clustered vectors form a straight line for road lanes by our method. In experiment, the proposed intelligent method is slightly slower than Hough transform but better in accuracy thus there is a room for intelligent method such as fuzzy C-means to solve this problem.

12

Design and Implementation of Location Awareness and Sharing System using GPS and 3G/GPRS

Mohammed Abdul Qadeer, Ankur Chandra, Shashank Jain

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.125-140

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this age of significant telecommunications competition, mobile network operators continuously seek new and innovative ways to create differentiation and increase profits. One of the best ways to accomplish this is through the delivery of highly personalized services. One of the most powerful ways to personalize mobile services is based on location. Location is a key to provide location based services (LBS) to the user because the location information is typically useful for coverage, deployment, routing, location service, target tracking and rescue operations. One of the most obvious technologies behind LBS is positioning, with the most widely recognized system being the Global Positioning System (GPS). There are no subscription fees or setup charges to use GPS. This document provides detail on the design and implementation of a java application which provides the users current location sends this location using SMS (Short Message Service) plus sharing location with friends and family and views them on maps. Users can also take benefit of this application in emergency situations by using emergency feature of this application. To get the location coordinates, application is using GPS (Global Positioning System) as location provider. The application design has five parts: a mobile client, a web server, a database, GPS system and a map service. A mobile client application which consists of a mobile and GPS receiver finds the location of the user to get aware of his location. In order to share this location the mobile client sends this location to the web server from where other users can get this location if they have the authentication provided by the user. The mobile client is implemented using J2ME which is one of the most promising software platforms for mobile devices. Sun representatives assert that 18 to 20 million mobile phones support the J2ME platform. Analysts predict that within the next few years, this technology will become omnipresent. The web server side programming is done using PHP and database is maintained by MYSQL.

13

A Design Methodology of Advanced-PEPs Architecture for TCP Satellite Connection and Bandwidth Management

Jaehwan Kim, Do-Huy Wang, Deock-Gil Oh, Byungjoo Park

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.141-148

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the network environment of the Internet and Intranet, Transmission Control Protocol (TCP) is Representative application of transport layer protocols. TCP based network specific environment and other upper-layer protocol performance should be limited according to link feature. To solve these problems for typical techniques is Enhanced-TCP based which use PEP. PEPs is placed between the degraded network segment complementary problems, and efficiently manage developed for efficient network environment. Because of these characteristics, PEPs in the satellite communications environment good solution has been Level rised. PEPs system is typical for a satellite-based network. However, because of the feature satellite network, has the disadvantage of high packet loss ratio and Long Return Trip Time (RTT). In addition, many problems remain, and various solutions are discussed. in this paper to solve these problems, an 'Advanced-PEP Architecture' based methodology of the new technique is proposed.

14

Stochastic TCO Minimization for Video Transmission over IP Networks

Pejman Goudarzi

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.149-162

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

From the viewpoint of service operators the Total Cost of Ownership (TCO) for developing a communication service comprises from two parts; CAPital EXpenditure (CAPEX) and OPerational EXpenditure (OPEX). These two types of costs are interrelated and affect any service provider’s deployment strategy. In many traditional methods, selection of critical elements of a new service is performed in a heuristic manner aimed at reducing only the OPEX part of the TCO which is not necessarily optimal. Furthermore, exact cost modeling for such services is not always possible and contains some uncertainties. In the current work, after cost modeling of each video streaming element by capturing the effect of the model uncertainties, the TCO optimization problem for video streaming over IP networks is formulated as a stochastic optimization problem. The solution of the proposed optimization problem can cope with the cost modeling uncertainties and track the dynamism in the TCO and lead to a time-varying optimal solution. Numerical analysis results verify the developed method.

15

Software Modules Management Techniques for Multi-Cooperate Robots based on R-Object Model in Dynamic Environments

YunSik Son, YangSun Lee, JinWoo Jung

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.163-174

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent research, robots have been regarded as having a complete set of functions. Such robots can fulfill only specialized roles. Accordingly, it is not possible to use these robot systems for alternative purposes. The complexity of robot system for various tasks can be simplified by multi-robot cooperation system. Also In the classical robot motion paradigm, model-based paradigm in the field of motion planning of robots, robots make it difficult to respond efficiently to the dynamically variable environment such as disaster area. In order to handle such a situation that may be changed dynamically, a technology that allows a dynamic execution of data transmission and physical/logical connection between multiple robots based on scenarios is required. In this paper, we deal with the software module management techniques for the multicooperate robot systems using R-Object model in dynamically changed environments. The proposed method is designed for managing versions of software modules to processing same or different functions and used to the multi-cooperate robot system can be adapt to any given environment and execute scenarios.

16

A Study on Verification and Analysis of Symbol Tables for Development of the C++ Compiler

YangSun Lee, YunSik Son

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.175-186

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The existing C++ compilers are designed to translate C++ source programs into target codes and then execute them. This translation method is that a compiler that translates C++ source programs to target codes has to be available for each platform. Reusability and portability of codes will also decrease because target codes have to be different for each platform they are run under. For that reason, much research is taking place in various fields in an effort to develop a retargetable compiler and a virtual machine that execute application programs without recompiling or modifying them though processor or operating systems are changed. We have developed the C++ compiler for the SVM(Smart Virtual Machine) of the smart platform on smart systems. As a part of the C++ compiler development, we designed the symbol table that can support object-oriented languages, C++ and java. The symbol table is a data structure to keep track of scope and binding information about names (or identifiers). Various information is entered into the symbol table after visiting and analyzing the abstract syntax tree generated by syntax-directed translation, and then is used to check whether the use of names is consistent with their definition during the semantic analysis phase and generate a valid code during the code generation phase. In this paper, we describe the reconstruction technique for verifying and analyzing the symbol table designed for the C++ compiler. This system reconstructs inputted C++ declarations by using information of the symbol table entered in the declaration process phase of the C++ compiler, and therefore we can verify completeness of symbol table design and correctness of information entered in the symbol table. In addition, this system also produces debug information, and so is effectively utilized for the development of the C++ compiler.

17

Design of StraaS (Streaming as a Service) based on Cloud Computing

Byung-Rae Cha, Soo-Bong Park, Yoo-Kang Ji

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.187-200

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we define and design the Streaming service based on cloud computing. And we describe the various function and security function to StraaS service. Specially, we introduce KS-MMA and SIES as security function for streaming service and cloud computing.

18

Rapid advances in cellular communications, wireless networks and satellite services, leading to the emergence of moving computing systems. Mobility can be problematic when the data is kept and need to be calculated in the databases with moving clients. Disconnection of the mobile unit with wireless networks and the information centre is rampant. When the mobile client is disconnected the information is disrupted and processes and operations are done from scratch. In this paper, a method for predicting the future of information that the user uses them is suggested. Users’ data are saved in cache of each client and are available during disconnected times. Such caching schemes avoid too much overhead due to loss of connection. This paper employs a novel method to suggest the nearest records based on vicinity of the interests to the user. Moreover, this work employs an efficient mechanism to update items in cache storage. This avoids from stale data to be served on each client.

19

Personalized Preference Metrics for Image Pattern Design

Dongsu Seo

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.217-224

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Artistic perception has been regarded as a subject of personal preference, although there are well established mechanisms explaining characteristics of design artifacts. In this paper we have identified problems relating to specification for image pattern designs. Specification scheme has been suggested that can utilize design elements such as forms, shapes, colors, and nine design principles for automatically generated patterns. Personal preference on design is represented by personalized preference metrics supported by scoring systems. Scoring systems have been constructed to demonstrate ideas and effectiveness of suggested scheme.

20

Various Factor Comparison of DRAM-SSD and HDD using TPC-H Benchmark

Hyun-Ju Song, Young-Hun Lee

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.225-232

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, Users needed storage for processing high-capacity data. Meanwhile, the HDD was used primarily as storage device, but SSD was developed as a fast access device. So, the use of SSD increased a lot of capacity-process. Using a SAN Switch, we tested in order to resolve data process faster. So in this paper, DRAM-SSD and HDD’s performance ability in the data process will be confirmed using TPC-H Benchmark on MYSQL at SAN environment. From the performance analysis results, performance difference of HDD and DRAM-SSD is little when database size is low at san switch connecting with storage. But ad-hoc query process ability difference between DRAM-SSD and HDD increased. Based on these results in a SAN-based, DRAM-SSD has a better performance than the HDD. Therefore San is judged to be more effective when dealing with the large amounts of data using a SAN to manage data. And CO2 &power consumption was tested. CO2 emissions analysis result during analysis of performance of each storage using Postmark and TPC-H, as shown in Figure 4 HDD storage can be considered less CO2 emissions due to the power consumption when non-load. But, increasing the load to DRAM-SSD storage generated less CO2 emission.

21

The Study on Cooperative Relay Coding in Multicarrier System

Seung-Jun Yu, Hyoung-Kyu Song

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.233-238

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Cooperative relay systems represent a promising solution overcoming the drawbacks of non-line-of-sight (NLOS) propagation in future wireless communications. In this paper, we propose a cooperative relay coding which uses adaptive hierarchical modulation based on cyclic redundancy check (CRC) and cyclic delay diversity (CDD). In the proposed scheme, the system consists of multiple single-antenna terminals acting as relays and cooperating to provide spatial diversity. Also, cyclic shift is introduced at the relays to increase the frequency selectivity in the relay channels. To exploit a highly selective channel, convolutional code is employed together with orthogonal frequency division multiplexing (OFDM). The proposed scheme is evaluated in terms of the bit error rate (BER).

22

The Study on the Adaptive Hybrid MIMO Cooperative Scheme in Wireless OFDM Systems

Hyun-Woo Jang, Hyoung-Kyu Song

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.239-244

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, a new adaptive hybrid multiple-input multiple-output (MIMO) cooperative scheme is proposed in wireless OFDM systems. The conventional hybrid MIMO cooperative scheme is inefficient in the relay because the relay does not use one antenna between two antennas for transmission to the destination. So the new hybrid MIMO cooperative scheme supplements inefficiency of the conventional scheme by using two antennas in the relay. Also the conventional scheme and the new hybrid MIMO cooperative scheme can be used adaptively according to the channel condition between source and relay. As a result, the adaptive scheme adaptively achieves proper diversity gain and symbol rate.

23

Social Network Service-based Impact Analysis of Customer Requirements

Dong-Min Seo, Neung-hoe Kim, Dong-Hyun Lee, Jung-Dong Kim, Joseph S. In

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.7 No4 2012.10 pp.245-254

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Many researchers in the field of requirements engineering are now focusing on eliciting requirements only from market influencers, that is, people who have a great influence on the market success of products. However, acting on the requirements expressed by customers without validating them can cause a product to fail in the market. Therefore, the importance of a requirement proposed by a customer should be validated by various other customers. Social Network Services (SNSs) are an important tool for validating customer requirements. They offer various advantages, such as ease of access and ease of use, and the diversity of their users. We therefore propose a method for analyzing the impact of customer requirements, based on SNSs. Our proposed method considers various factors, such as the time a customer spends on transmitting messages, the number of customers receiving the messages, and the opinions expressed in the messages. The method makes it possible to evaluate the impact of a customer's requirements and to support a software project through prioritizing these requirements.

 
페이지 저장