Earticle

현재 위치 Home

International Journal of Software Engineering and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • pISSN
    1738-9984
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.7 No.4 (39건)
No
1

IEEE 802.15.6 WBAN Beaconing for Wireless USB Protocol Adaptation

Kyeong Hur, Won-Sung Sohn, Jae-Kyung Kim, YangSun Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.1-14

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, an IEEE 802.15.6 wireless body area networks (WBAN) medium access control protocol is developed to support a wireless USB (WUSB) application as a protocol adaptation layer (PAL). Even though we can avoid colliding packets using CSMA/CA, hazard of beacon collisions still remains in the WUSB over WBAN networks. Further, in order to solve beacon conflict problem, we introduce a multi-channel beaconing (MCB) for avoidance of beacon collision. The proposed MCB can minimize the possibility of beacon collision by efficiently managing the multiple available channels in a hybrid manner combining proactive and reactive method.

2

Software Measurement and Software Metrics in Software Quality

Ming-Chang Lee, To Chang

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.15-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Software measurement process must be a good oriented methodical process that measures, evaluates, adjusts, and finally improves the software development process. The main contribution of this work is the easy and extensible solution to software quality of validation and verification in software develop process. Therefore, we use formal approaches in order to describe the fundamental aspects of the software. This formalization supports the evaluation of the metrics or measurement level themselves. We discuss several metrics in each of five types of software quality metrics: product quality, in-process quality, testing quality, maintenance quality, and customer satisfaction quality.

3

Specification and Automated Detection of Code Smells using OCL

Tae-Woong Kim, Tae-Gong Kim, Jai-Hyun Seu

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.35-44

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The words Code smells mean certain code lines which makes problems in source code. It also means that code lines in bad design shape or any code made by bad coding habits. There are a few studies found in code smells detecting field. But these studies have their own weaknesses which are detecting only particular kinds of code smells and lack of expressing what the problems are. In this paper, we newly define code smells by using specification language OCL and use these models in auto detection. To construct our new code smells model, we first transform java source into XMI document format based on JavaEAST meta-model which is expanded from JavaAST meta-model. The prepared OCL will be run through OCL component based on Eclipse plug-in. Finally the effectiveness of the model will be verified by applying on primitive smell and derived smell in java source code.

4

On A New High Quality Speech Coder using Non-uniform Sampling and the Rectified Harmonics

Seongeon Bae, Myungjin Bae

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.45-54

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

To encode the speech quality with reduce the redundancy within samples that resulted from uniform sampling method like PCM, uniform sampling or non-linear sampling coding methods can be considered. However, it is well known that when conventional sampling methods are applied directly to speech signal, the required amount of data is comparable to or more than that of uniform sampling method in noisy. To overcome this problem, a new non-uniform sampling methods is proposed, in which non-uniform sampling is applied to the low-pass filtered speech signal and the remain signals are compensated by the rectified signals with various harmonics.

5

A Green Model for Sustainable Software Engineering

Sara S. Mahmoud, Imtiaz Ahmad

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.55-74

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Information Communication Technology (ICT) has a strong impact on sustainable development due its rising demands for energy and resources needed when building hardware and software products. Most of the efforts spent on Green ICT/IT have been dedicated to addressing the effects of hardware on the environment but little have been considering the effects of building software products as well. Efficient software will indirectly consume less energy by using up less hardware equipment to run. Our contributions in this paper are devoted to building a two level green software model that covers the sustainable life cycle of a software product and the software tools promoting green and environmentally sustainable software. In the first level we propose a new green software engineering process that is a hybrid process between sequential, iterative, and agile development processes to produce an environmentally sustainable one. Each stage of the software process is then further studied to produce a green and sustainable stage. We propose either green guidelines or green processes for each software stage in the engineering process. We add to the software life cycle the requirements stage and the testing stage. We also include in the first level a complete list of metrics to measure the greenness of each stage in terms of the first order effects of ICT on the environment for a green software engineering process. No effort has been placed before in designing a green software engineering process. The second level explains how software itself can be used as a tool to aid in green computing by monitoring resources in an energy efficient manner. Finally, we show and explain relationships that can be found between the two levels in our proposed model to make the software engineering process and product green and sustainable.

6

Semi-automated Classification Scheme-based Massive Science and Technology Data Management

Wongoo Lee, Yunsoo Choi, Myungseok Choi, Suntae Kim, Sanghwan Lee, Minho Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.75-88

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the field of science and technology, a lot of research has recently been done for collecting and analyzing information, for example, examination of global research trend, detection of emerging signals and searching for leading researchers from science and technology literature [1]. Since the science and technology literature information collected for the analysis has been produced for the purpose of each information source, the information is differently constructed and expressed [1, 2]. Therefore, it is necessary to integrate and manage the different information with the same structure and expression format [3]. To this end in this study, examination is made of methods of standardizing the data processing process and data format, and of implementing interoperability of data in different format. Examination is also made of a method of semi-automation through machine learning for even more automated data management. It is expected this study will contribute to improving integration of heterogeneous databases and efficient and easy management of contents in different fields and domains.

7

Implementation and Performance Evaluation of the WS-DAIR Interface for AMGA

Sunil Ahn, Taesang Huh, Geunchul Park, Namgyu Kim, Soonwook Hwang

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.89-104

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

WS-DAIR is the OGF proposed recommendation for access to relational database on the Grid. AMGA is one of first two reference implementations with which interoperability was tested for WS-DAIR standard ratification, in addition to OGSA-DAI. In this paper, we present a reference implementation model of the WS-DAIR interface for AMGA, and show some results of performance studies on the WS-DAIR interface with real Grid applications; WISDOM and Belle II. It provides very simplified WS-DAIR implementation model on data services and data resources, and supports most features of the existing AMGA implementation including replication, Grid accessibility, find-grained access control, hierarchical directory structure and heterogeneous backend database support. The performance study showed that the WS-DAIR access patterns and the message formats affect performance of the WS-DAIR service significantly. One issue found from the test results was that all the access patterns defined in the WS-DAIR specification may be inadequate to transfer large sized data in some applications. To deal with this issue, we have proposed to have considerations on streaming access pattern in the WS-DAIR specification, which can decrease response time and allow a WS-DAIR service to be more stabile when transferring large sized data.

8

To collect and analyze the requirements to make the products that customers want is an important starting point in the requirements engineering stage. In the requirement engineering is focus on building a qualitative system through identification and extraction of value requirements. A lot of researches for complete requirements, but they are difficult to determine correct extraction requirements. A purpose of this paper is that a goal approach is graft on to use case approach to reach a target system through goal-oriented requirements. For this, we suggest that the extraction and prioritization of requirements for fitting on the goal approach, and then to make a change an existing value based approach to show the prioritization of requirements based on goal-oriented requirements. It helps to make a target product customers want from extracting a highly importance of use cases and requirements. Beside it gets a benefit of the prioritization of test cases by prioritization of all requirements, and it is possible to measure coverage of test cases quantitatively. Finally, we verify the prioritization of requirements based on goal-oriented use case approach by calculating prioritization about use cases using the Use Case points proposed by Karner [5].

9

From AADL to Timed Automaton - A Verification Approach

Mohamed Elkamel Hamdane, Allaoui Chaoui, Martin Strecker

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.115-126

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The AADL is considered as one of the most powerful language for modeling the embedded systems. In this work, we propose an approach for the verification of the AADL architecture by using of the timed automata formalism. Indeed, the AADL architecture cannot be directly analyzed by model checking. An alternative for achieving that is to use the model driven engineering technology to extract an analysis model so that the properties can be verified using a model checker toolbox. The goal of this effort is to insure some properties of the AADL models using the Uppaal model checker. We show the application of our approach to an example.

10

Home media services are gaining in popularity with the ever-increasing availability of a wide variety of personal media devices. A number of media devices support UPnP technology for providing media services in a home network. UPnP technology is used to share media content among multiple media devices connected to a single network. However, UPnP-based home media services have a few problems. First, personal media devices should have sufficient storage space to keep a large amount of media content data. Additionally, the devices must have sufficient computing power to properly provide media streaming services. Moreover, for media streaming services using UPnP, the users have to utilize their devices with great care, remembering the name, available services, and functions of each device. To resolve these problems, this paper proposes a system model designed to store and manage media content in a cloud-based media server, namely, a cloud server. To ensure an easy-to-use media service, this paper also proposes a UPnP-based service model to provide media streaming services by extracting the most appropriate media renderer for playing the media content. The proposed system can provide the user with improved home media services in conjunction with cloud computing and UPnP technologies.

11

Deriving Multi-Agent System Behavior

Ahmed Harbouche, Mohammed Erradi, Aicha Mokhtari

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.137-156

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The multi-agent systems (MAS) have become a very powerful paradigm in the development of complex computer systems. The modeling of these systems can reduce this complexity during the development phases. The Model-Driven Architecture (MDA) approach can be used to resolve this problem. It allows designers to model their systems at different abstraction levels, providing them with automatic model transformations to incrementally refine abstract models into concrete ones. This paper presents a MDA approach to develop multi-agent system with the derivation of the behavior of a given system agent from its global requirements. The suggested approach is based on the definition of an appropriate requirements meta-model (Computational Independent Meta-Model CIMM) and the definition of a target design meta-model (Platform Independent Meta-model PIMM). The CIM models are specified using UML activity diagram extended with collaborations to describe the system global behavior. The agent’s behavior model (PIM) is in the form of distributed UML state machines. Automatic model transformations between these two models have been designed in order to govern the derivation process. A real application of telediagnosis in neuroscience has been developed using this approach.

12

Smart Museum Based on Regional Unified App

Eun Sok Bae, Dong Uk Im, Sung Young Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.157-166

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In a society undergoing rapid changes, future museums will contribute to human culture by means of smart-museum technology that promotes active interaction with the public. Several museums in New York have already begun distributing free mobile applications for this purpose. Likewise, the National Palace Museum of Korea has developed an application to provide visitors with helpful information related to its exhibitions. Apps developed so far, however, are concentrated in exhibition information, experimental programs, or the collection information of an individual museum. If the Jongno museum unified app, which could be universally used in Jongno district where museums are concentrated develops and contains information about different museums, it would reduce the cost and provide useful information to visitors. Based on location information and the regional route, this app would be comprised of information concerning admission, opening hours, exhibitions, collections, trial and educational programs. Information about the routes connecting museums would also be provided. The Jongno museum unified app would contribute to the possibility of a new form of smart museums where local museums are linked together.

13

A design methodology of interval type-2 fuzzy c-means clustering algorithm-based fuzzy inference systems (IT2FCMFIS) is introduced in this paper. An interval type-2 fuzzy c-means (IT2FCM) clustering algorithm is developed to generate the fuzzy rules in the form of the scatter partition of input space. And the individual partitioned spaces describe the fuzzy rules equal to the number of clusters. The consequence part of the rule is represented by polynomial functions with interval set. To optimally construct of fuzzy model we exploit real-coded genetic algorithms with successive optimization. The proposed model is evaluated through the numeric experimentation.

14

Advanced Tagging and Semantic-Annotation Methods for the Semantic-based OpenAPI Retrieval System

Seung-Jun Cha, Kyu-Chul Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.177-188

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The OpenAPI retrieval system has been developed applying semantic web technologies as the typical information retrieval method had. The semantic web technologies applied in the system are tagging and semantic-annotation. However, these methods are difficult for the non-technical general users to use and the probability of failure is high. To solve these problems we suggest improved methods for the tagging and semantic- annotation. Tagging turn human-readable service description to machine-readable one by adding tags into the page. Through the use of XHTML and DTD modification, auto-completion and auto-view are enabled. Semantic-annotation means to input related semantic information into parameters in the service description. The java-based tool providing methods of target parameters selection and the ontology viewer is developed for annotating easily. Tagging and semantic-annotation are applied and tested through the test-bed system. These improvements enabled non-technical general users to applying semantic information to the OpenAPI retrieval system.

15

Automatic Selection of Functional Indexes for Object Relational Mapping System

Aleksandra Boniewicz, Michał Gawarkiewicz, Piotr Wiśniewski

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.189-196

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Functional indexes are an important tool for database tuning, often not appreciated by programmers and system administrators. In practice, a programmer can only advise the deployment team such such indexes. Only a few very expensive systems have tools for the analysis of performance and automatic creation of functional indexes. The authors decided to provide the ability to define `functional indexes at the stage of application development by supplying the appropriate API in object-relational mapping level, and implemented it as an extension for Hibernate. The interfaces proposed by the authors were developed with the functional indexes generator for selected DBMS: PostgreSQL, Oracle and IBM DB2. In addition, to facilitate the work of programmers, HQL query analysis algorithms detecting the usefulness of functional indexes in queries have been developed.

16

Vendor or Client: What are the Important Factors for SDO Project Success?

Dong-Hwan Cho, Haeng-Nam Sung

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.197-206

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

SDO (Software Development Outsourcing) projects have been consistently increasing and expanding but also have many failures. In order to improve SDO performance, the factors affecting SDO performance are investigated in this study. SDO has relational risk as well as performance risk in nature, and the factors affecting the SDO performance caused by these mixed risks are drawn from the prior studies. With field survey targeted client IS personnel who experienced SDO, 214 survey questionnaires are collected and analyzed. Research results show that vendor power, client requirements certainty, goal clarity and goal alignment affect the SDO performance. However, vendor knowledge and client knowledge do not have much effect on SDO performance. The results of this study can be effectively utilized to decrease the failures of SDO and increase the possibility of success.

17

Implementation of Port Logistics Information System using e-Government Standard Framework

Yong-Hae Han, Mok-Ryun Choi, Chang-Seung Ha, Doo-Jin Park, Sung-Chul Byun, Lee-Sang Jung

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.207-216

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Country according to the rapid development of IT technology with the introduction of e-government information systems are managed efficiently. However, using the framework of different specifications of e-government system has been developed. The development of these methods, such as redundancy and interoperability problems occurred. In this paper, we utilizing e-government standard framework for the port logistics information systems proposes to design and implement. Based on a standard framework by implementing information systems to reduce human and material resources, and ease of writing source code, avoid duplication, reuse, and interoperability is guaranteed.

18

The paper discusses the topology optimization of power systems for reduction of fault current level. The countermeasures of interest are bus splitting and line opening which modify power network topology. When the selected measures are applied, the magnitudes of Thévenin impedances at the critical locations would be increased and hence the fault current levels might get lower to the acceptable level. In this paper, a Tabu search on the solution space with binary variables was adopted as the solution technique to find adequate topology changing schemes to satisfying the fault level security criteria.

19

Regression Testing of Object-Oriented Software: Towards a Hybrid Technique

Pierre-Luc Vincent, Linda Badri, Mourad Badri

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.227-240

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We propose, in this paper, a hybrid regression testing technique and associated tool for object-oriented software. The technique combines, in fact, the analysis of UML models to a simple static analysis of the source code of the modified program. The basic models we use are use cases model and corresponding UML statechart and collaboration diagrams. The goal of the static analysis of the source code is to identify changes that are not visible in design models. The developed tool identifies the modified (and/or impacted by modifications) use cases and selects the appropriate test cases from an existing test suite. New (JUnit) test cases, covering new scenarios or those whose structure has been modified after changes, are generated when necessary. In this way, the technique supports an incremental update of the test suite. The selected JUnit test cases, including the new ones, are automatically executed. A case study is reported to provide evidence of the feasibility of the approach and its benefits in terms of reduction of regression testing effort.

20

Nonlinear Modeling Using Fuzzy Neural Networks Based on Scatter Space

Keon-Jun Park, Dong-Yoon Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.241-250

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we introduce a design of fuzzy neural networks based on scatter space for nonlinear modeling. To design the networks, we partition the input space in the scatter form using fuzzy c-means (FCM) clustering algorithm which generates the fuzzy rules in the premise part of the proposed networks. The partitioned spaces express the fuzzy rules of the networks. Through this method, we are able to handle the high dimension problem. The consequence part of the rule is represented by polynomial functions whose coefficients are learned by standard back-propagation algorithm. The proposed networks are evaluated with the nonlinear process. Finally, this paper shows that the proposed networks can be utilized for high-dimension nonlinear process.

21

Necessity of the Introduction of Panel Survey and Its Problem: Focused on Leisure Studies

Young-Min Song, Seung-Il Moon

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.251-258

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Introduction of panel survey into the leisure studies can meet the causal relationship over time, which previous studies have suggested its limit. Also, it enables us to understand and analyse the changing patterns and trends of leisure activity in the rapidly changing Korean society. This study aims to examine the meaning and characteristics of panel survey in the leisure study, its application method, and future problems.

22

Lessons for Software Modeling from “Architecture 101” Movie

Kai-On Chow, Tak-Lam Wong

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.259-268

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In software modeling, it is difficult to properly arrange the modeling of system structure and behavior as the traversal between software models usually lacks a clear progression path. Taking an inter-disciplinary approach, this paper tackles the problem by borrowing ideas from a successful movie “Architecture 101”. The commonalities between the movie and modeling are studied. The result is a proposal for multi-modeling construction. The benefits include more explicit guidance in software development. And the progression from model to code is made more productive.

23

An Improvement Technique for Simulated Annealing and Its Appli-cation to Nurse Scheduling Problem

Young-Woong Ko, DongHoi Kim, Minyeong Jeong, Wooram Jeon, Saangyong Uhmn, Jin Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.269-278

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The simulated annealing was perceived as a useful method for many intractable problems. However, it needs additional strategies to cope with time complexity due to an initial state and search space reduction. In this work, we suggested an efficient transition rule and ap-plied it to a nurse scheduling problem. It uses a cost matrix to reduce a set of candidates, which results in performance improvement. The experimental results showed that the sug-gested method generated a feasible solution for the nurse scheduling problem faster in time and better in quality compared to traditional simulated annealing.

24

Study on Cellular Iterative Location Algorithm with Uniform Noise

An Qin-li, Chen Jian-feng, Yin Zhong-hai

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.279-284

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to realize location in cellular networks, the location model with uniform noise based on AOA is established when seven base stations are available. Then a maximum likelihood estimation (MLE) method is proposed and realized by an iterative algorithm under this model. Finally, the simulation result of the iterative algorithm as compared to least squares estimation(LSE) algorithm under this AOA model is shown that the iterative algorithm is less error and more robust to noise disturbance than LSE algorithm.

25

Fast and Low cost GF(28) Multiplier design based on Double Subfield Transformation

Hyeong-Keon An

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.285-294

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We describe the design method of the efficient GF(28) multiplier using double subfield transformation. Here we first transform the GF(28) field elements to the GF(24) field elements. And then we again transform the GF(24 field to the GF(22) field. This double transform generates the very fast and cost effective GF(28) multiplier. The Multiplier can be used for the Reed Solomon Error correction and Encription/Decription on the digital communication channel.

26

Implementation of a Prototype Personal Live Broadcasting System

Jaegeol Yim, Gyeyoung Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.295-304

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper introduces our implementation of a personal real-time live broadcast system. This system is comprised of three main components: the caster program, data manipulation program, and management program. The caster program is a client program running on the end user's personal computer equipped with a webcam. This program provides a convenient environment (cue sheet, prompts, reference image, buttons to control broadcasting) in which the user can create his video contents easily. The data manipulation program receives user's webcam video stream, combines the stream with the reference image and texts, then outputs HDMI, SID or RTSP as the manager directs. The management program manages broadcasting schedules, cue sheets, and users. User registration, user information modification, and deletion of a user are handled by the management program. A producer creates a broadcasting schedule (cue sheets) with the management program. One of the distinguished features of our personal real-time live broadcast system is its less than 1 second delay time.

27

An Approach for Measuring Quality of Web Service

Yan Gong, Lin Huang

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.305-314

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Quality of Web Service (QoWS) measure is crucial for selecting web services to take part in seamless and dynamic integration of business applications on the web. However, since QoWS are often influenced by several factors, traditional approaches are not very efficient and effective in measuring QoWS. The authors introduce in this study a novel QoWS measure approach to efficiently measure QoWS for web service recommendation and selection. The core of this approach is to take the five factors, that is, price, latency, accessibility, accuracy, and reputation into QoWS measure. The experimental results demonstrate that the proposed approach is efficient and effective in measuring QoWS.

28

Extracting Key Technology Using Advanced Fuzzy Clustering

Sunghae Jun, Seung-Joo Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.315-322

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Most companies that have developed their own technology have registered and patented the results. As a result, patent and technology management (PTM) has become important to companies needing to improve their market competitiveness. Using the PTM process, a company can develop a new product that is competitive in their market. First, we need to know the key technology (KT) a company uses to develop new technology. In this paper, we propose a method of extracting the KT for new product development and effective PTM. The proposed method uses advanced fuzzy clustering, which groups patents into clusters according to their technological difference. To verify the performance of our method, we perform a case study using all patents applied for by the company Adobe Systems Incorporated.

29

The purpose of this study is a development of database system for clinical management in patients with coronary artery disease. The pairwise t-test was done to compare the before and after intervention effect for the health promotion practice of cardiac patients by the information application. The present research showed that practice rate of health promotion application. The present research showed that practice rate of health promotion using database system in an effort to reduce inefficiency and improve reliability of information. By the adoption of this database system, the medical information. By the adoption of this database system, the medical information can be effectively connected with other databse sytem. preated in urban area from September 1, 2011 to December 31, 2011. The pairwise t-test was done to compare the drug misuse and abuse before and after computer-aided education. The present research showed that drug misuse and abuse decreased to 54.9-67.1% by the computer-aided education. This paper resulted in significant positive effects in quality of life of patients with drug misuse and abuse and its implications could be used as the basic data for developing further systematic materials on computer-aided education.

30

A Rough Computing based Performance Evaluation Approach for Educational Institutions

Debi Prasanna Acharjya, Debarati Bhattacharjee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.4 2013.07 pp.331-348

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Performance evaluation of various organizations especially educational institutions is a very important area of research and needs to be cultivated more. In this paper, we propose a performance evaluation for educational institutions using rough set on fuzzy approximation spaces with ordering rules and information entropy. In order to measure the performance of educational institutions, we construct an evaluation index system. Rough set on fuzzy approximation spaces with ordering is applied to explore the evaluation index data of each level. Furthermore, the concept of information entropy is used to determine the weighting coefficients of evaluation indexes. Also, we find the most important indexes that influence the weighting coefficients. The proposed approach is validated and shows the practical viability. Moreover, the proposed approach can be applicable to any organizations.

 
1 2
페이지 저장