Earticle

현재 위치 Home

International Journal of Software Engineering and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • pISSN
    1738-9984
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.7 No.2 (25건)
No
1

A Method for Extracting Topics in News Twitter

Jeongin Kim, Byeongkyu Ko, Huijin Jeong, Pankoo Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.1-6

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Twitter that represents the social network makes it available to retweet the tweet that other users have written without restriction. Therefore, information can be conveniently delivered on a real-time basis. Thanks to such an advantage, studies that utilize twitter are recently being developed. This paper is intended to establish data base based on BBC News Twitter on a daily basis making a daily tweet as a token according to gap and moving to a phase of reprocessing that removes the stopwords. Each word that is created and retweeted after a phase of reprocessing is applied to calculate the total added retweet value, dividing them by the number of daily average retweet to derive topic weight value. This procedure is called ‘Topic Weight Measurement.’ This way, the topics are extracted. After analyzing the pattern according to the date, topics that are extracted using proposed procedures are compared with frequency pattern that are provided by Google Trends. As a result, it was confirmed that topics provided by BBC News Twitter is similar with word searching pattern graph of Google Trends

2

A Fuzzy Logic Based Software Cost Estimation Model

Ziauddin, Shahid Kamal, Shafiullah khan, Jamal Abdul Nasir

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.7-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Software cost estimation is a challenging and onerous task. Estimation by analogy is one of the expedient techniques in software effort estimation field. However, the methodology utilized for the estimation of software effort by analogy is not able to handle the categorical data in an explicit and precise manner. Early software estimation models are based on regression analysis or mathematical derivations. Today’s models are based on simulation, neural network, genetic algorithm, soft computing, fuzzy logic modelling etc. This paper aims to utilize a fuzzy logic model to improve the accuracy of software effort estimation. In this approach fuzzy logic is used to fuzzify input parameters of COCOMO II model and the result is defuzzified to get the resultant Effort. Triangular fuzzy numbers are used to represent the linguistic terms in COCOMO II model. The results of this model are compared with COCOMO II and Alaa Sheta Model. The proposed model yields better results in terms of MMRE, PRED(n) and VAF.

3

Design of ATL Rules for Transforming UML 2 Communication Diagrams into Buchi Automata

Elkamel Merah, Nabil Messaoudi, Halima Saidi, Allaoua Chaoui

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.19-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

UML 2 communication diagrams are a well known graphical language and are widely used to specify the dynamic behaviors of transaction-oriented systems. However, communication diagrams are expressed in a semi-formal modeling language and need a well-dened formal semantic base for their notations. This formalization enables analysis and veri- cation tasks. Many eorts have been made to transform sequence diagrams into formal representations including Petri nets, but very few works have been proposed for transforming communication diagrams into formal methods, and none, to our knowledge, has used Buchi automata. Buchi automata are a mathematical tool allowing formal specication of the system dynamics and they are commonly used in Model Checking based on automata theory. For these reasons, in this paper, we present a transformation approach that consists of a source metamodel for UML 2 communication diagrams, a target metamodel for Buchi automata and transformation rules. This approach has been implemented using Atlas Transformation Language (ATL). A Cellular Phone System is considered, as a case study. Keywords UML 2, Communication diagrams, Buchi automata, Model checking, Model transformation, Metamodeling, Transformation rules, ATL

4

This study is describes the development of an adaptive learning system that supports the adaptability of learning content and takes into consideration the learner’s learning style for more effective learning. The purpose of this adaptive learning system is to facilitate university students’ computer science learning. There are many studies on adaptive learning systems, but most of them provide adaptive courseware that considers only the learning style. Therefore, with an understanding that the task affects learning more, the purpose of this study attempts to provide an adaptive instruction model and adaptability according to a learning style concurrently. Applying C. M. Reigeluth’s categorization method, the learning content is classified into conceptual knowledge, principal knowledge, and procedural knowledge; serving the concept-attainment model, the inquiry-based model, and the cognitive-apprenticeship learning model respectively. Applying the A. F. Gregorc learning style, learners’ learning styles are classified into concrete-sequential, concrete-random, abstract-sequential, and abstract-random; this adaptively services the respective content. Reliability was secured by conducting a blind test targeting an expert group with an attempt to prove the validity of the instruction model and the learning style provided by this adaptive learning system.

5

On the Improvement of Cyclomatic Complexity Metric

Ayman Madi, Oussama Kassem Zein, Seifedine Kadry

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.67-82

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Complexity is always considered as an undesired property in software since it is a fundamental reason of decreasing software quality. Measuring the complexity using some metrics is one of the important factors that were made by many research activities in order to avoid complex software. In this paper, we analyze the effectiveness of complexity in security, maintainability and errors prediction; we introduce the role of design phase in the software life cycle and the importance of the measurement in this level. We present a study of different software metrics that can be used to measure the complexity of a system during the design phase, and highlight the cyclomatic complexity metric introduced by McCabe which was studied extensively by most researchers. We also propose an improvement of cyclomatic complexity metric which aims to measure both the intra-modular and the inter-modular complexity of a system.

6

Integrating Knowledge Management with Business Intelligence Processes for Enhanced Organizational Learning

Rizwan Shehzad, Muhammad Naeem Ahmed Khan

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.83-92

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Knowledge Management (KM), either in a tacit or explicit form, plays an important role in decision making. Business Intelligence (BI) has acquired significant importance in the business world due to the recent technological advancements and availability of state-of-the-art software tools. Presently, most of the organizations across the globe are adopting BI solutions to promote business, retain customers, earn maximum profits, reduce recurring expenditures, etc. KM, on the other hand, has not gained significant acknowledgement from an implementation perspective. Moreover, the effect of BI on KM and vice versa is rarely observed. In this paper, we propose a model where KM and BI can benefit from each other. Since both of the said fields have a wide range of features, the proposed model is based on specific features. For that purpose, we have identified a number of Critical Success Factors (CSFs) related to both BI and KM technologies reported in contemporary research. Afterwards, we have drawn a comparison pertinent to the effectiveness of these CSFs with the similar research studies. The comparison shows that our model that combines both BI and KM technologies is more useful as compared to their individual utilization.

7

Construction of an Interactive Job Portal Site for Immigrants

Jin-Young Kim, Hak Ro Yoon

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.93-98

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Korea has been implementing a wide range of policies for helping immigrants settle in Korea. However, most of the policies are based on accommodation to a Korean society by providing basic information including daily living support services. Still, the mid-staged immigrants, who have been living in the nation for between 5 to 10 years, are more career-oriented than the ones trying to look for basic services, whereas the social welfare system is not sufficient enough to meet their needs. Especially, career development and vocational education are interrelated with development of human capital. In Korea, a career often means more than just a job, but rather plays a very important role as a criterion for distinguishing social classes. In this context, this study is designed to devise necessary implementations for immigrants to develop their career by constructing an interactive job portal site by providing the ethnically diverse job seekers and the employers' information.

8

A Fuzzy-Based Technique for Describing Security Requirements of Intrusion Tolerant Systems

Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.99-112

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

To care for security in early stages of software development has always been a major engineering trend. However, due to the existence of unpreventable and accidental security faults within the system, it is not always possible to entirely identify and mitigate the security threats. This may eventually lead to security failure of the target system. To avoid security failure, it is required to incorporate fault tolerance (i.e. intrusion tolerant) into the security requirements of the system. In this paper, we propose a new technique toward description of security requirements of Intrusion Tolerant Systems (ITS) using fuzzy logic. We care for intrusion tolerance in security requirements of the system through considering partial satisfaction of security goals. This partiality is accepted and formally described through establishment of a Goal-Based Fuzzy Grammar (GFG) and its respective Goal-Based Fuzzy Language (GFL) for describing Security Requirement Model (SRM) of the target ITS.

9

Evolutionary Design of Fuzzy Inference Systems by Means of Fuzzy Partition of Input Space

Keon-Jun Park, Dong-Yoon Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.113-124

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we introduce the evolutionary design methodology of fuzzy inference systems by means of fuzzy partition of input space. The rules of the proposed fuzzy model are realized with the aid of the fuzzy partition of input space generated by fuzzy c-means clustering algorithm. The number of the partition of input space is equal to the number of clusters. And the individual partitioned spaces describe the fuzzy rules. Due to these characteristics, we may alleviate the problem of the curse of dimensionality. The consequence part of the rule is represented by polynomial functions. We also consider the evolutionary optimization to determine the structure and estimate the values of the parameters of the model using real-coded genetic algorithms. Numerical examples are included to evaluate the performance of the proposed model.

10

Insights of Data Mining for Small and Unbalanced Data Set Using Random Forests

Hyontai Sug

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.125-136

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Because random forests are generated with random selection of attributes and use samples that are drawn by boostraping, they are good for data sets that have relatively many attributes and small number of training instances. In this paper an efficient procedure that considers the property of data set having many attributes with relatively small number of attributes in arrhythmia is investigated to predict cardiac arrhythmia is shown. Even though several research results have been published already to find better prediction accuracy based on other methods, a new and better result has been found with the suggested method.

11

Efficient Processing of KNN Queries in Wireless Sensor Networks

Jeong-Joon Kim, Jeong-Jin Kang, Ki-Young Lee, Gyoo-Seok Choi, Yong-Soon Im, Eun-Young Kang

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.137-148

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, research on techniques of processing of KNN (K Nearest Neighbor) queries in order to find the nearest neighbor in wireless sensor networks is actively in progress. The existing representative techniques of processing of KNN queries suggest the structure-based routing technique and the non-structure-based routing technique. However, the existing representative techniques of processing of KNN queries have problems of the consumption of high energy by sensor nodes or much time spending in query processing. This paper comes up with QKNN (Quad-tree based KNN) in order to solve such problems with existing KNN query processing techniques and more efficiently process KNN queries. QKNN searches for the sensor node nearest to the query by the means of GPSR, and then composes an R-tree in order to set up the KNN Boundary with the searched node as the reference. Then, based on the R-tree, it performs parallel queries by structuring the query area in a Quad-tree in accordance with the distribution of nodes, and in each cell within the Quad-tree it processes queries by means of the non-structure based itinerary routing technique. Lastly, via various experiments using sensor data, this paper proves the excellence of the proposed technique of processing of the nearest neighbor queries.

12

Reconfigurable Motion Estimation with Adaptive Search Range

Jooheung Lee, Youngju Kim, Gwanggil Jeon

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.149-156

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we propose an approach for motion-aware reconfigurable architecture to perform H.264/AVC Variable Block Size Motion Estimation (VBSME) algorithm. We show that by adaptively adjusting the search range on the reconfigurable hardware platform, the computational cost of motion estimation required for interframe encoding with H.264/AVC video compression standard can be reduced significantly. Therefore, the hardware resources used can be configured adaptively with the search range specifications through dynamic partial reconfiguration to make best use of hardware resources and power during runtime. A scalable SAD array is proposed which can perform full search block matching algorithm for integer pixel Motion Estimation of smaller 4x4 blocks. The implemented architecture can support real time applications with various resolutions and frame rates at a maximum frequency of 90 MHz.

13

Dynamic Detection of Accesses for First Races in Parallel Programs with Random Synchronization

Hee-Dong Park, Yong-Kee Jun

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.157-170

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Detecting data races is important in debugging shared memory parallel programs, because the races could exhibit unpredictable results in execution of programs. Unfortunately, previ- ous race detection techniques cannot guarantee that the detected accesses could be involved in the rst races to occur in parallel programs which contain random synchronizations. This paper presents a monitoring algorithm which collects ltered key accesses of local thread blocks that are involved in races comparing with the latest ltered accesses of the other concurrent thread blocks in a particular execution of parallel programs. We discard all the accesses other than key accesses in a block to perform the race condition determination, which makes our algorithm more ecient in time and space. We also demonstrate the cor- rectness of our algorithm by showing at least one of the collected candidate accesses would be included in the actual first races.

14

Toward Flow-Based Semantics of Activities

Sabah Al-Fedaghi

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.171-182

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In UML 2.0, activity and state diagrams are used in a wide range of applications, including business process modeling, software development, and descriptions of basic mechanisms such as computations. They are enriched with some advanced features such as exceptions, loops, and streaming in activity diagrams; nevertheless, several semantic questions have been raised concerning some of these diagrams. Proposals have been introduced to base the semantics of activity diagrams on Petri-nets, but such mapping is not general enough to apply to complicated constructs of activities. In this paper, we propose that these semantic problems are inherent in the nature of description in UML diagrams. Consequently, we propose development of new types of diagrams with more appropriate, precise semantics.

15

The practice of human-centered methodologies for software development, such as agile methodologies, is impacted by the surrounding technological environment. This paper analyzes the potential of the Mobile Social Web in facilitating the social dimension of agile requirements engineering. In doing so, an agile requirements engineering process (AREP) is presented. AREP consists of a nonlinear sequence of technical activities, each of which is supported by a number of social activities. The interplay between activities underlying AREP and Social Web applications is illustrated by means of representative examples. The relationships to other software project artifacts, and to open source software (OSS), are highlighted.

16

An Improved Mobile VoIP Call Setup with Pre-detection of Callee MS State Information

Soonuk Seol, Sungsoo Cho

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.197-206

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In conventional VoIP services, a call session control server, like the proxy call session control function (P-CSCF) in 3GPP IMS, is not aware of the callee’s mobile station (MS) state information such as idle, active, or loss of connection. This may cause an inefficient or unintentional call setup, and sometimes call setup failure. For examples, although a callee MS is in idle state or loss of connection for some reasons, the P-CSCF would send a call session setup request message to the callee irrespective of the MS state and just wait for a response message for a preconfigured time without any action. These induce an undesired call forward or cancellation and a long post-dial delay, and thus degrade quality of service (QoS). In this paper, we propose an improved call setup scheme in which the P-CSCF detects the state of the callee MS during the call setup procedure and makes the procedure optimal. Also, we compare the performances of the proposed scheme and the conventional one by MATLAB simulations. Our scheme is adapted in WiMAX Forum as standard call setup procedure for WiMAX VoIP Service.

17

Aspect-Oriented Code Generation for Integration of Aspect Orientation and Model-Driven Engineering

Abid Mehmood, Dayang N. A. Jawawi

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.207-218

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Software development can be improved from many perspectives by combining aspect orientation and model-driven engineering techniques. At a higher level, they can be integrated in two different ways: (1) by handling specifics of aspect orientation at modeling level and later generating object-oriented code, or (2) by transforming an aspect model directly into aspect-oriented code. The latter approach has been shown to have advantages over the former. Consequently, different aspect-oriented code generation approaches have appeared in literature. This paper comparatively evaluates some of those existing approaches, which are well-published and can be used in integration with model-driven engineering process. The results of this study indicate that in order to provide this integration, existing aspect code generation need to be improved from various perspectives. Moreover, these results also provide some insight into the prerequisites for a valuable integration of these approaches into a model-driven engineering process.

18

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Ronnie D. Caytiles, Byungjoo Park

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.219-226

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The emergence of cloud computing brought a significant change for the delivery of how Information Technology to educational and business enterprises. In this paper, we discuss the different qualities of cloud computing frameworks together with the expectations and promises of cloud computing and associated benefits. The design of a cloud computing framework is presented and its components to realize the identified qualities. A successful cloud solution delivers the qualities of being flexible and has the ability to easily work with multiple programming and platform or run-time environments.

19

Simulation Study for Typical Routing Protocols in Aircraft Ad Hoc Networks

Ki-Il Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.227-234

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Followed by our previous works, a study for performance evaluation of existing typical routing protocols for aircraft ad hoc networks is presented in this paper. The main objective of this evaluation is to figure out the impact of high speed movement and spare deployment over well-known routing protocols with new mobility pattern for aircraft ad hoc networks. The chosen protocols are three major protocols according to general categorization, this is, AODV, DSDV, and GPSR. By analyzing the result of performance evaluation, we demonstrate the suitability of those in aircraft ad hoc networks in the terms of packet delivery ratio, end-to-end delay and control overhead and discuss further works in this research area. Finally, rough conclusion is made that it is necessary to develop new routing protocol based on DTN for aircraft ad hoc networks.

20

Change Impact Analysis for the Software Development Phase: State-of-the-art

Nazri Kama

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.235-244

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Impact analysis predicts the parts of the software system that can be affected by changes in the system. Selecting the approach to perform impact analysis in the software development phase requires consideration of the class artifact status. Static analysis approaches do not require class artifacts to be fully developed. However, the analysis tends to overestimate the number of affected classes. So it is of little practical use. On the other hand, dynamic analysis approaches expect all the class artifacts to be fully developed. So the analysis tends to be imprecise when not all class artifacts are fully developed. This paper reviews current impact analysis techniques’ capability from the perspective of supporting the software development phase implementation. Based on this review, the needs of a new impact analysis technique for the software development phase are then constructed.

21

Applying Model Driven Techniques to Mobile Testing

Sang-Yong Byun

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.245-254

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Mobile Embedded Testing is the most important factor in its software development. Increasing complexity of the embedded system makes difficult to test and evaluate the quality properly. As a result, automated testing methodology is becoming. Because of the characteristics of embedded software, automated testing has difficulty performing all relevant tests and evaluation of the areas of concern. Model-Driven Testing (MDT) techniques artifacts software engineering bases on model transformation principle. This implies increasing research on automation of the testing processes. In this paper, we present an approach to derive tests from the model of embedded system. The analysis of methodologies used for embedded as well as for standard system development demands creation of a bridge between them. We also will discuss the reliable testing processes. In particular, test development for each phase of system engineering is proposed. Input signals as continuous, discrete and real time constraints are the factors indicating object-oriented or function-oriented approach. Finally, Model Driven Testing ideas are mentioned so as to elaborate the full overview on test process automation for embedded systems.

22

Enhancement of Action Description Language for UML Activity Diagram Review

Chinnapat Kaewchinporn, Yachai Limpiyakorn

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.255-272

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The UML activity diagram is graphical presentation that describes the operational process and related causes used in each stage of the system. For understanding and accurate communication, the UML standard is required for determining the congruent and consistent format application. To detect the misconception and incorrect notation, this paper presents an automation approach to reviewing UML activity diagrams based on a domain specific language, called Action Description Language (ADL). The input is the UML activity diagram in the XMI format. Due to the variations of XMI formats, the review process starts with the standardization of the XMI source file. Next, the ADL script will be created using the information extracted from the XMI file. The ADL script will then be verified against the UML constraints defined in the UML standard 2.4.1. The inspection result will be reported. In case of valid activity diagrams, the ADL scripts will be parsed to the ADL semantic model as the final output from the system. The demonstration of the proposed method was performed via three cases. Currently, the implemented prototype can review only the activity diagrams created by ArgoUML and Modelio.

23

Location based service such as automobile navigation system is one of the most valuable commercial products. As the buildings, factories, and shopping malls are getting bigger and bigger, demand for indoor location based service is also increasing rapidly. In addition to user's location, the context of the usage such as user's personal information including age, hobby, occupation, user's emotion and so on is also important factor that determines the most proper service. Smartphones are best suited platform for context aware service implementation because the owner of a smartphone always carries it and saves personal information in it. Besides, record of smartphone use history that is automatically saved in the smartphone is a good resource from which we can infer the context. Furthermore, smartphones are equipped with powerful processing unit and pretty accurate sensors. Making use of the features of smartphones, we have developed a context aware museum guide Android app. It is also a video-on-demand app because it selects best suited video based on the user's context and plays the video. To the best of our knowledge, our app is the first indoor-location-based, context-aware, and video-on-demand Android app. This paper describes the recommendation module of it in detail.

24

Recently aircraft ad hoc networks have received attention from many researchers since ad hoc network technology is expected to play a great role in communications between aircrafts. Due to large number of aircrafts as well as high bandwidth to meet emerging demands such as multimedia stream, ad hoc networks can be practical approach in this situation. However, since aircraft ad hoc networks possess significantly different properties to typical MANET or VANET, many research challenges remains unsolved yet. Among them, simulation study is one of key research area by providing simulation scenarios through simulator. Despite of importance, since current popular simulators do not provide the simulation environments for aircraft ad hoc networks, it is strongly required to extend the current simulators by adding several elements such as mobility model, type of node and so on. Based on above research needs, in this paper, we propose how to implement the realistic mobility scenarios for aircraft ad hoc network. To design the relevant model, we implement new software which connects it to commercial flight simulator to generate mobility trace file. This file is converted to corresponding mobility file for each simulator. The software developed by .NET will be presented to validate its operation by diverse experiments.

25

Integrated Change Impact Analysis Approach for the Software Development Phase

Nazri Kama

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.2 2013.03 pp.293-304

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Impact analysis aims to quickly predict the extent of changes which will be required to software project products as a result of a potential change request. The existence of partially developed classes in the software development phase artifacts causes several challenges to the current static analysis and dynamic analysis techniques. Thus, this paper proposes a new approach that integrates between these two techniques to support those challenges. There are two main contributions of this paper: (1) a new change impact analysis approach that is able to support the software development phase; and (2) evaluation results that show the new approach gives higher accuracy of results over the selected current impact analysis approaches.

 
페이지 저장