2016 (266)
2015 (278)
2014 (298)
2013 (203)
2012 (72)
2011 (41)
2010 (25)
2009 (27)
2008 (39)
2007 (7)
Call Graph Based Metrics To Evaluate Software Design Quality
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Software defects prediction was introduced to support development and maintenance activities such as improving the software quality through finding errors or patterns of errors early in the software development process. Software defects prediction is playing the role of maintenance facilitation in terms of effort, time and more importantly the cost prediction for software maintenance and evolution activities. In this research, software call graph model is used to evaluate its ability to predict quality related attributes in developed software products. As a case study, the call graph model is generated for several applications in order to represent and reflect the degree of their complexity, especially in terms of understandability, testability and maintenance efforts. This call graph model is then used to collect some software product attributes, and formulate several call graph based metrics. The extracted metrics are investigated in relation or correlation with bugs collected from customers-bug reports for the evaluated applications. Those software related bugs are compiled into dataset files to be used as an input to a data miner for classification, prediction and association analysis. Finally, the results of the analysis are evaluated in terms of finding the correlation between call graph based metrics and software products’ bugs. In this research, we assert that call graph based metrics are appropriate to be used to detect and predict software defects so the activities of maintenance and testing stages after the delivery become easier to estimate or assess.
An Approach for Computing Dynamic Slice of Concurrent Aspect-Oriented Programs
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.13-32
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
We propose a dynamic slicing algorithm to compute the slice of concurrent aspect-oriented programs. We use a dependence based intermediate program representation called Concurrent Aspect-oriented System Dependence Graph (CASDG) to represent a concurrent aspect-oriented program. The CASDG of an aspect-oriented program consists of a system dependence graph (SDG) for the non-aspect code, a group of dependence graphs for aspect code and some additional dependence edges used to connect the system dependence graph for the non-aspect code to dependence graph for aspect code. The proposed dynamic slicing al-gorithm is an extended version of NMDS algorithm for concurrent object-oriented programs, which is based on marking and unmarking of the executed nodes in CASDG appropriately during run-time.
An Improved Calculation Method for Activity Energy Expenditure by using PNS
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.33-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In daily life, walking is one of the most energy consumed activity. There are many researches’ focuses on energy expenditure estimation using GPS and 3-axis accelerometer for location tracking and activity monitoring. However, in the case of walking on a slope, GPS location tracking method and 3-axis accelerometer method are failed to estimate the energy consumption while walking on a slope. In this study, we combine the information of GPS in smart phone, the information of foot-mounted IMU and also the slope information from Google elevation database to estimate activity energy expenditure. Energy expenditure in static movement is calculated using accelerometer data. Therefore, the energy expenditure calculator is capable to calculate energy expenditure in static movement and also in dynamic movement. Experiment result shows that the increase in elevation in slope, there is an increase in activity energy expenditure. We also show there is higher energy expenditure when jumping.
A Comprehensive Innovation Management Model for Malaysians Public Higher Learning Institutions
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.45-56
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The government of Malaysian has declared that in the next couple of the years, the Malaysian Economy Structure will be based on creativity and innovation. Many of the innovation products will be “manufactured” by the universities and research agencies. Innovation production becomes a most important mission in the Public Institution of Higher Learning in Malaysia (IHLs). The vast volume of innovation products in IHLs requires for a systematic innovation management model (IMM). The IMM provides a platform for innovators to manage the development of innovation products effectively. It also helps for sharing, promoting and re-use of innovations between IHLs-IHLs and IHLs-other organizations. This paper discusses the preliminary study of framework and strategy for effective IMM framework that can be implemented in IHLs. Three important elements in IMM are suggested: innovation management process cycle, the organization of innovation stakeholders and the functions of innovation management portal. Hopefully with this proposed IMM could transform the innovation activity environment in IHLs into more manageable, productively and systematically.
A Risk Classification Scheme for Software Projects
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.57-68
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a risk classification scheme for software projects that utilizes the dependence of risk events to occur on other risk events and the statistical dependence of impacts of risk events. The proposed risk classification scheme helps to avoid the under and over estimations of the overall impact of dependent risk events. Further, the proposed risk classification scheme protects against under and over counting of the impacts of statistically dependent risk events of software projects. The proposed risk classification scheme utilizes the Software Engineering Institute’s risk taxonomy and shows that different classes of the risk taxonomy are independent having statistically independent impacts while different attributes of a taxonomy class are independent having statistically dependent risk impacts.
An Embedding Method for Real Characters into the 3D Virtual Space
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.69-78
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a method for embedding real characters in the 3D virtual space. Most systems have adopted virtual characters into the 3D virtual space to give more realistic situation, where the virtual characters have been controlled by user-steered interfaces. In order to take user immersion, we need to embed real characters into the 3D virtual space. This paper describes how to represent the real characters in 3D virtual space, and how to transform them according to the user control. The experimental results of our proposed method show that immersion and participation of learners are continuously increased.
An Empirical Study on Improving Shared Understanding of Requirements in GSD
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.79-92
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Purpose – To investigate the role of clear organizational structure with communicating responsibilities, a practice of Knowledge Management, in developing shared understanding of requirements in GSD-an area that is very important but has, to date, not been addressed adequately. Design/methodology/approach – A controlled experiment was performed in an academic setting with two groups of geographically distributed students; the duration of the experiment was three months. The understanding patterns of both groups were observed by conducting multiple concept-mapping exercises. Findings – The results of the experiment revealed that clear organizational structure with communicating responsibilities helps to improve shared understanding of requirements in GSD. Research limitations – The sample size was rather small as only two groups of students participated in the experiment and each group consist of eight members from two different countries. Practical implications – The results of the study shows the importance of clear organizational structure with communicating responsibilities in GSD settings, these preliminary results will motivate the researchers to replicate the results in the future to contrast results using large sample size. Academic can use the results to build the definition of organizational structure with responsibilities and communication means between team members in GSD projects.
Document Image Retrieval: Algorithms, Analysis and Promising Directions
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.93-106
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
During the last decades, Due to the advances in Information technology and communication and increase in volume of printed documents in many applications, document image databases have become increasingly important. Document Images are documents that normally begin on paper and are then via electronics scanned that move towards a paperless office and stored documents as images. Document Image retrieval is one of an important research area in the field of document image databases. Many approaches come in for indexing and retrieval document images. Traditionally, Optical character recognition (OCR) has been used for completely convert the manuscript to an electronic version which can be indexed automatically. Then, Keyword spotting has been proposed for indexing document image retrieval. Keyword spotting method has lower cost than OCR. But there are some problems in both of methods for indexing document images with non-text components. Three approaches have been presented to solve this problem, Signature based approach, layout structural and logo based approach. In this paper we proposed a framework for classify document image retrieval approaches, and then we evaluated these approaches based on important measures.
A Formal Semantic for Scenario-Based Model Using Algebraic Semantics Framework for MOF
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.107-122
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Model-driven development uses models to represent system artifacts to improve the visibility of the system towards the real world. The development of models is underlying in the meta-object facility (MOF) standard in order to define the building concepts of metamodel and models. However, these concepts, especially within MOF standard, are not yet formally define which will be difficult to check the consistency between metamodel and models. Therefore, defining a formal semantic for MOF-based metamodel is essential for discovering the meaning of the model and to ensure a structural and behavioral conformance between metamodel and its model. In this paper, we define a formal semantic for a scenario-based model called Performability Failure Behavior Awareness Metamodel (PerFAM) by applying algebraic semantics for MOF framework which provides a formal stage: metamodel, model and model conformance. For this purpose, a formal consistency checking can be applied as to ensure the accuracy of the produced model towards its metamodel.
PDCML: A Model for Enhancing Software Reusability
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.123-136
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Software reusability is an important aspect of software development process. Reusable components can be used to build high quality and reliable software with reduced cost. These reusable components may have different granularity levels like methods, classes, packages and modules. Reusability can be enhanced by making information of these components available to a large developer’s community. In this paper we present a model to represent, store and link structured software engineering data on web. More than 18 open source projects are selected for this study. Data of the chosen projects is extracted, stored and linked using PDCML. We find that PDCML can significantly enhance the productivity of developers and can help to meet the time and cost challenges in software development.
Parameter Estimation for the Compound Poisson Software Reliability Model
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.137-148
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The parameter estimation for the Compound Poisson Software Reliability Model is ana- lyzed. The biased characteristic is considered in order to get better performance. A com- parison with the well known Non Homogeneous Software Reliability Models is presented. Several experimental data are used in order to analyze the goodness of fit of both models.
Implementing Cloud Computing in the Current IT Environments of Korean Government Agencies
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.149-160
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents implementation strategies for building cloud-based IT environments for Korean central government agencies (K-Cloud Centers), to improve service delivery in the public sector and reduce the cost of government operations. This will be achieved by the introduction of cloud computing technologies in the data centers of the National Computing and Information Agency (NCIA). This paper also proposes an approach for building wide-area cloud-based IT centers for Korean local government autonomous entities (W-Cloud Centers), to enhance the efficiency of IT resource utilization via the consolidation of all IT resources operated by these local entities. Through the implementations of cloud computing in the public sector, the Korean government can realize a digital government capable of providing enhanced service environments, while reducing IT-related budgetary expenditures and protecting the environment.
The Archiving Method for Records of Public Sector’s Facebook Page
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.161-170
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
All government departments in South Korea used the Facebook page to inform their own policies and to collect the opinion of the people. The record from the perspective of each government department writings posted on a Facebook page, containing the opinions of people comment on posts, etc. have significant value. However, there is no research yet records of Facebook for fully long-term preservation. In this paper, we proposed long-term preservation method for Facebook page’s records of government departments. In addition, we proposed the long-term record preservation format, document preservation format, long-term record preservation metadata and document preservation metadata for SNS includes Facebook, Twitter, and etc.
Research and Design of an Overtaking Decision Assistant Service on Two-Lane Roads
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.171-178
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Overtaking is one of the common actions that the driver performs while travelling on the road. Without enough information about the road, overtaking is dangerous and causes many accidents. Although overtaking is important, little research was done in this area. Especially, there is no research focus on helping the driver to judge whether it’s safe enough or not to do overtaking. The purpose of this thesis is to provide overtaking assistant service to help the driver to do the overtaking safely. From the proposed Overtaking Decision Assistant Figure, the driver can easily determine whether the overtaking is safe or not. However, since the GPS receiver’s error will influence the trajectory calculation, it has to be considered to improve the original overtaking assistant service.
A New Trajectory Integration Scheme in the Semi-Lagrangian Framework
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.179-188
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the typical semi-Lagrangian framework for Navier-Stokes equations, the advection source positions for each grid center points are repeatedly estimated to get interpolated physical quantities. Most research efforts are concentrated on the numerical accuracy, especially for the interpolation of target physical quantities. In this paper, we adopted an improved trajectory integration scheme during the advection calculation process. Our method traces the grid center points using their previous velocities at the previous time step, while other previous methods use their current velocities. Our experimental results show remarkable improvements, and we achieved real-time processing capability even with straight-forward serial implementations.
Energy-Efficient Random Access for Machine- to-Machine (M2M) Communications
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.189-200
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, an average consumed energy for a unit data transmission in analyzed in frequency-agile cognitive radios. The average energy consumed by a random access protocol operated in a channel using a whole system bandwidth is compared with that operated in frequency-separated channels, which results in an energy saving ratio. The energy saving ratio quantitatively evaluates an energy saving effect by separating one whole bandwidth into more than one channel with a smaller bandwidth. Finally, it is shown that the frequency-separated channel can save energy of machine-to-machine communicating nodes using the random access protocol, so the battery life can be extended.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.201-210
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, new work practices such as virtual work system, have been introduced in various fields. These contracts for new work practices have changed from the existing face-to-face management practices to the autonomous work systems. Existing work contracts are based on the Weber’s theory (1947), in which the bureaucratic and impersonal structure is the most effective means to achieve organization’s goals. However, such contracts have been challenged from various fields and there are lacks of new researches on the practices until now. So, we examined the effects of new contracts through the performance of virtual teams. To do so, in this study, the effects of distributional justice, procedural justice and interactive justice on organizational commitment and innovative work behavior are analyzed on the virtual organizations. The results are as followed. First, organizational justice has significant effect on organizational commitment and innovation work behavior. Secondly, the result between organizational commitment and innovation work behavior has significant effect on. Thirdly, we examined the mediating effects of organizational commitment in relationship between organizational justice and innovative work behavior on the virtual organizations. Finally, the results of this study emphasize on the effect of the distributional, procedural and interactive justice through the mediating effect of organizational commitment justice on the virtual organization’s performance. Future study will be discussed.
A Study of Design and Implementation of Korean Plagiarism Detection System
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.211-220
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, there has been the issue of plagiarism on Korean contents in Korea. Even though a computer program to detect plagiarism on contents is available, there is no overall system to protect plagiarism including Korean contents. Therefore, this research is aimed to design and implement Hangul Plagiarism Detection System (HPDS). From the system perspective, key functions for plagiarism detection are defined, and the structure is designed to allow users to be able to use other plagiarism similarity search engines. In addition, the contents aspect is also significantly considered during the design process. Before the building of contents, about 10,010 units of Korean contents are processed and added to the plagiarism similarity search indexing database. Finally, this research evaluates plagiarism similarity search speed, changes in similarity levels by conversion of original texts, and use of citation information.
Cinematic Wound Synthesis Optimized for Real-time Gameplay
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.221-228
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cinematic rendering techniques have been sporadic in movie industries rather than in game industries because rendering time seems to be critical. In recent, some scenes in gameplay have been almost like cinematic because of a great computational power of GPU. However, there are several drawbacks in synthesizing of wounds on human body. In this paper, we present a task that provides a real-time rendering of wound synthesis on 3d face that employs WARD's BRDF. To solve this, anisotropic diffusion has to be taken into consideration rather than isotropic surface. An efficient and easy interface is designed to let users simulate super-realistic wound synthesis of a face as well. To validate, we have shown wound synthesis samples between traditional methods and the proposed one as well.
Web Services Deployment Model Based on WSG (Web Services Gateway) in NGN 1
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.229-236
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
NGN service architecture has the three main functional characteristics of (i)Agnosticism, (ii) Support for legacy capabilities and features, and (iii) Support for an open service interface. This paper shows the convergence model for NGN based on Web Services and provides a detailed scenario of each convergence model in form of Web Services.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.237-246
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With transition to Knowledge society, many companies in Internet related industries have had higher stock price than their accounting book value. Researchers pointed out its intangible assets as the reason of it. In addition, previous studies show that the effects of this nonfinancial information may be different according to industry life cycle. To check the effects of nonfinancial information about intangible assets and related expenditure on firm market value, we compare the relationships between financial information and firm valuation in Korean Capital market especially for “Software”, “Digital content”, and “Internet” related companies. We classify industry life cycle based on Tobin’s Q value and compare the effects of intangible assets and expenditure for each period. The result shows the effects of intangible asset on firm market value are different according to industry life cycle.
Consequences of Impulse Buying Cross-Culturally: A Qualitative Study
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.1 2013.01 pp.247-260
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study explores how normative influences impact impulse buying across cultures. This qualitative study is conducted using Korean and American respondents to represent culture differences. Previous literature suggests that individuals from collectivist societies place more value on the normative judgments of others. This increased emphasis on the normative values of others coupled with the consequences of impulse buying may seriously impact impulse buying behavior and across cultures. The authors are exploring these possibilities through in-depth focus interviews. In addition, the authors will formulate a multi-cultural model of impulse buying behavior based on the qualitative results. Finally, the authors will discuss the limitations of this study and conclude with some implications for the marketers and researchers.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.