Earticle

현재 위치 Home

International Journal of Software Engineering and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • pISSN
    1738-9984
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.7 No.6 (39건)
No
1

Analysis of Impact on Internal Organs of Obscene Videos Watching by Face Image Processing

Bong-Hyun Kim, Min-Kyoung Ka, Hee-Dai Kim, Sang-Young Oh, Dong-Uk Cho

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.1-8

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The social problems caused by watching of obscene videos which is very easy to get from communication networks and infra are increasing seriously. Above all, act of watching of obscene videos, especially the stimulated sexual urges and desire by watching obscene videos happen to the health problem of the individual as well as harming of the health of society. In that time, the researches about bad effects or impact by obscene videos watching were accomplished by surveys or based on statistical data originated from social problems such as sexual violence. In this paper, stimulated sexual urges and desire when unmarried man saw the obscene videos had any impact on internal organs on the basis of ocular inspection of Korean Oriental Medicine were investigated. In addition, in order to apply the theory of ocular inspection of Korean Oriental Medicine, a facial image processing program was developed. Finally, the impact on human internal organ by stimulated sexual urges and desire caused after watching obscene videos were identified by quantitative method.

2

Regression Testing based Requirement Prioritization of Desktop Software Applications Approach

Varun Gupta, D.S Chauhan, Kamlesh Dutta

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.9-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The delivery of new increments involves decision makings at various levels like decision aspect prioritization, requirement priorities and selections of regression test cases. The pressure to deliver high quality low cost software by employing limited resources and satisfying mass market invokes the need to have less dependence on regression testing activity. Earlier Proposed requirement prioritization technique categorizes the type of changes and the type of new implementations and then decides the neglection or minimization of test cases. Further minimizations are also possible due to existence of sound regression testing techniques. By focussing on common problems related to the development of mobile and embedded type software applications, one could have great improvement in software development quality and practices. The proposed requirement prioritization technique is applied in evolutionary mobile software application development and results were quite promising. This paper aims to have a deep insight into the ability of the proposed technique in minimization of regression testing of desktop software applications application. The results are very promising thus indicating the usefulness of proposal in low cost development of both mobile compatible and desktop software applications. The novel contribution of this paper lies in making the incremental development timely and low cost activity by making requirement prioritization effective and future increments less dependent on regression testing without having any compromise with the desktop software quality. This had been a result of analysis of proposed prioritization technique on desktop software application.

3

Performance Analysis Measurement of Storage according to INNODB Parameter Change

Jae-Hwan Lee, Young-Hun Lee, Jong-an park

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.19-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study analyzed the ad-hoc query processing capability according to changes of parameter values by performing TPC-H benchmark with 1GB database targeting HDD to find out optimized parameters of INNODB storage engine type parameters of MYSQL in accordance with data storage device. As a result of performing test for three parameters(innodb_buffer_pool_size, inndb_additional_mem_pool_size, innodb_log_buffer_size) among INNODB storage engine type parameters that are known to affect performance, as innodb_buffer_pool_size got bigger, QphH(Query- per-Hour) got better but the rest two parameters couldn’t affect QphH. Therefore, more researches about the case that the types of data storage device of servers are different from one another and bigger database capacity.

4

Design and Development of Information System Template Prototype for Maritime Transportation

Felipe P. Vista IV, Bo Long, Kil To Chong

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.29-40

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper details the step-by-step production of a real world scenario and modular template for a marine information system from the theories involved to its design, development, implementation and tests. Data and information from the global positioning system (GPS), digital compass (DC), automatic identification system (AIS) and electronic navigational charts (ENC) were utilized to display map, map data, directional, location and ship related information. The data and other information display orientation remains in legible horizontal manner even if the base map is moving or transforming while several utilities such as serial device connection configuration and data retrieval was written for technical and testing purposes. This work was done to come-up with a template for developing a marine vehicle system that will serve as a reference or basis for future system developmental works. The modular and compartmentalized design of the system makes it very easy to customize for further specific development such as a Marine Vehicle Monitoring System or Marine Navigation System.

5

A Rewriting System Based Operational Semantics for the Feature Oriented Reuse Method

Amougou Ngoumou, Marcel Fouda Ndjodo

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.41-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, an extension of the Feature Oriented Reuse Method (FORM) with business components semantics (FORM/BCS) has been given. The key idea of FORM/BCS is that, it transforms the assets produced by FORM (feature models, subsystem models, process models and modules) into reusable objects of a domain (business reusable components). Since each individual business reusable component is a constituent of a business architecture (i.e a model of a domain), FORM/BCS is therefore a model-driven design engineering method whose main products are business reusable architectures. The engineering process of FORM/BCS has been formalized using a set of total maps (called constructors and refiners). This paper shows that these maps are in fact rules of a coherent rewriting system which, indeed, defines the operational semantics of FORM/BCS.

6

Assessing Software Reliability Based on NHPP Using SPC

Hee-cheul Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.61-70

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Software reliability in the software development process is an important issue. Software process improvement helps in finishing with reliable software product. In this field, SPC (Statistical process control) is a method of process management through application of statistical analysis, which involves and includes the defining, measuring, controlling, and improving of the processes. In measuring software reliability control charts can be used as efficient and appropriate SPC Tools. The proposed process involves evaluation of the parameter of the mean value function and hence the values of the mean value function at various inter failure times to develop relevant time control chart. In this paper, was proposed a control mechanism, based on time between failures observations using Burr distribution property, which is based on Non Homogenous Poisson Process (NHPP).

7

Reusable Aspect Models versus Theme/UML: the Aspect-Oriented Code Generation Perspective

Abid Mehmood, Dayang N.A. Jawawi

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.71-88

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The integration of aspect oriented modeling approaches with model-driven engineering process achieved through their direct transformation to aspect-oriented code is expected to enhance the software development from many perspectives. This study aims to assess the existing UML-based aspect- oriented modeling techniques from the perspective of their suitability with regards to integration into model-driven engineering process through aspect-oriented code generation. For this purpose, we selected two mature aspect-oriented modeling approaches, Reusable Aspect Models and Theme/UML, and proceeded to evaluate them in a detailed way from the specific perspectives of design and its mapping to the implementation code. The in-depth comparison reveals some points equally shared by both approaches, and identifies some areas where one has advantage over the other. The study concludes that the Reusable Aspect Models approach may be seen as a preferred approach to handling the task of integration using aspect-oriented code generation.

8

Public transportation is essential for citizens’ traveling. However, private bus companies are not willing to establish new routes if they are not guaranteed some revenues by running the new bus lines even if some citizens are excluded from bus service areas. This is especially true of small-medium sized cities where the density of demand population is much lower. Nevertheless, it is necessary to provide public transit services as a type of indispensable public goods for citizens’ daily life regardless of the possibility of generating profits. Furthermore, due to the constraints of the resources available to service provision in monetary terms for both local agencies and bus companies, it is critical to improve the overall serviceability without requiring considerable additional costs. For this reason, reforming the local bus routing system without any significant investment for setting up new routes is necessary. This study aims at investigating serviceability improvement effects derived from reforming the city bus route system by analyzing some upward changes in terms of the number of citizens contained in the reformed system. The analysis is made in the framework of GIS in such a way that the numbers of citizens who can access the services before and after the reform are compared. The city of Chungju, located in Chungbuk Province, which is an example of a small-medium sized city in South Korea, was selected as the study area for the empirical analysis. According to the analysis results, the bus route reform in the study area improved the overall serviceability in that it contained more service recipients after the reform. Furthermore, it turns out that the overall bus running time also decreased in the reformed route system.

9

Similitude and Performance Assessment on a Possible Patterns of R, B and Two Gs

Gwanggil Jeon

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.101-110

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, three patterns of R, two Gs, and B are presented and analyzed. The conventional Bayer CFA pattern has two Gs in diagonal location, and an R and a B are located in the rest part of CFA pair. In other words, red, green, and blue pixels are located as RGBG in clockwise. There are two alternatives of RGBG, which are RBGG and RGGB in clockwise. Four performance metrics (MSE, PSNR, S-CIELAB, and FSIM) are used to assess the superiority of three patterns. The experimental results show that RGBG in clockwise gives the best objective performance and reconstruct images were visually satisfied.

10

Automata-Based Software Reliability Model: The Key to Reliable Software

Ritika Wason, P. Ahmed, M. Qasim Rafiq

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.111-126

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we critically analyze the success of the traditional reliability models built to measure and estimate software reliability. We further propose that a Finite State Automata (FSA) based reliability model can serve as a befitting solution to all existing software reliability challenges. The proposed model estimates actual system reliability at runtime. The main advantage of this model is that it allows authentic or real-time reliability estimation, prediction and can also be trained towards dynamic learning of the evolving behavior of software, and fault tolerance.

11

Performance Analysis of Adaptive QoS Handoff Mechanism Using Service Degradation and Compensation

Jihoon Lee, Hyun-chul Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.127-136

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

User mobility management is one of the important components of mobile multimedia environments. That is, mobile users should obtain network resources after handoff for seamless service supports. So, an adaptive handoff scheme has been proposed to minimize the connection dropping probability for handoff connections. This paper shows the comparative performance analysis for the adaptive QoS handoff mechanism with existing solutions such as non-priority scheme (NPS) and guard-channel scheme (GCS). It has been shown from the performance evaluations that the adaptive QoS mechanism provides lower dropping and blocking probability than existing schemes.

12

Implementation of Smartphone System using QR Code in Mobile Environment

Keunwang Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.137-146

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Smartphone subscribers exceeded 20 million people, 'Smart Korea' is up on this track, and leaping to 'Smart powerful nation' from 'IT powerful nation'. Of course, the popularization of the smart phone called 'PC in the hands' has brought a revolutionary change to nation livelihood, and also to business and government, too. The current usage of Smartphone is not just a simple function call, people can communicate anytime, anywhere with it. And it has become the culture of the terminal type in the hands whenever and wherever. However, the screen size and the existing flash or video files do not run when trying to access to the homepage for PC with Smartphone. and it may gives the inconvenience to people who use mobile devices. Therefore, in this paper, it is a study for the provision of an efficient service for Smartphone users through the establishment of website for mobile in mobile environment.

13

In principle, structural coverage criterion enables the evaluation of test results and the automation of test execution; however, it is limited in that it cannot be applied to specification based testing. Model-Based Testing is one of the solutions used to overcome this limitation. We propose an approach in which UML activity diagrams are used as a model. Once these activity diagrams are generated from program specifications, test cases are selected systematically according to the coverage criteria identified for the activity diagrams. Applying criteria to specification-based testing is very helpful for programmers who are supposed to write tests before source codes in Agile developments. With our proposed approach, they design tests in accordance with test models rather than their intuition. In this paper, we report on an empirical study conducted in which our approach generated a more effective suite of test cases than that of the Siemens Suite.

14

Quantitative and qualitative evaluation of AspectJ, JBoss AOP and CaesarJ, using Gang-of-Four design patterns

Soumeya Debboub, Djamel Meslati

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.157-174

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Several languages are currently proposed to apply the basics of the aspect oriented programming and choosing one language or another is not obvious since they are sophisticated languages that deal with new sophisticated concepts of software engineering. A comparison between these languages is therefore worthwhile, not only to help developers choosing the right language for their needs but also to improve these languages themselves. However, such a comparison requires important investigations to put into evidence strengths and weaknesses of each language and ultimately operate a synergy between these languages. In this study we have selected three of well known advanced separation of concerns (ASOC) languages: AspectJ, JBoss AOP and CaesarJ, and we have conducted a comparative study using the GoF design patterns as hypothetical benchmarks. Our starting point was our confidence in the fact that design patterns are seamlessly powerful elicitation artifacts to test separation of concerns languages. Indeed design patterns cover most of the problems associated with the design and implementation of large and complex software systems. This article reports on our quantitative and qualitative comparisons using eight GoF design patterns in each of the AspectJ, JBoss AOP and CaesarJ languages. The result of this work allowed us to highlight strengths and weakness of each language and showed that the use of design patterns as benchmarks is an effective way for comparing ASOC languages.

15

General Image Processing Technique and Car License Plate Application

Seong-Yoon Shin, Dai-Hyun Jang, Hyoung-Keun Park

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.175-184

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Image processing technology is improving lately, and its importance has been greatly increased. Therefore, a lot of research and work is utilized with an image processing. For individual use, just need the effective and swift method simply process the image and make out the result immediately; while for research, it usually use more accurate and complex method for particular purpose, can somewhat tolerate the time cost and huge operands. Everyone has advantage and disadvantage; everyone deserves to be delved into. By the way, in any high level algorithm, they still take important parts in actual application. This paper contains some simple daily used and research used complex methods, describe their theories and analysis implement results, for deeper comprehension. This paper, we introduced the representative method of Gaussian smoothing technique, Laplace sharpening technique, Canny edge detection technique. After that, take an actual application of car license location, elaborate the common algorithm responsibility, and meanwhile take some subtle new attempts for algorithm development. In the experiment, the results for each algorithm showed by image and describe the characteristics for each algorithm.

16

New Quality Inheritance Metrics for Object-Oriented Design

Sandip Mal, Kumar Rajnish

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.185-200

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Metrics are used to help a software engineer in quantitative analysis to assess the quality of the design before a system is built. Object-Oriented (OO) design is becoming more popular in software development environment and OO design metrics are essential parts of software environment. The primary purpose of this paper is to analytically evaluate against the Weyuker’s property and empirically validate, a proposed inheritance metrics (against a three versions of the same project) that can be used to measure the quality (especially focus on the quality factors “Reuse” and “Design Complexity”) of an OO systems in terms of the using class inheritance tree.

17

Log based Keyword Extraction and Spread based Clustering for an Efficient Information Searching

Nam Hun Park, Kil Hong Joo

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.201-210

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Today an efficient information search is very important to extract and analyze user requirements in vast amount of web information. Due to this reason, this paper proposes the log based keyword extraction method which finds the associated keywords in a certain domain. Also, this paper proposes the spread based clustering method as clustering the keywords with high association among the keyword-sets of the maximum frequent keyword-sets with redundancy removal by the log based keyword extraction method. The proposed method in this paper is much more efficient and exact than conventional works. The performance of the proposed algorithm is analyzed by a series of experiments to identify its various characteristics.

18

An Outdoor Comfort Index Framework Based on GIS for Supporting Optimal Environment

Jae-Hoon Jeong, Do-Hyeun Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.211-220

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, a few studies on context information for outdoor environments have been focused to collect phenomena data like a temperature, a humidity, etc. The importance of the former is increasingly recognized with changing environments and increase of heat stress in cities. In this paper we present an outdoor comfort index framework based on GIS for supporting context information instead of phenomena data in environments. We also present method for supporting comfort index and context information based on GIS in outdoor environments.

19

Factors Influencing Software Development Process : A statistical Outlook

Madhumita Singha Neogi, Soubhik Chakraborty, Vandana Bhattacherjee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.221-236

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

While dealing with students in solving their assignments and projects of software development we have experienced that students are ready to adopt agile process model because it is very close to their nature. It is assumed that certain concepts were already prevalent in student fraternity. The factors considered here are ‘quality of code’, ‘preference of group work’, ‘regular interaction with teammate’, ‘responding to changes’, ‘early testing’, and ‘fast delivery of working software’. Presence of linear relationship, if any, was tested by testing the significance of correlation coefficient r using t-test while non-linearity was tested by testing the significance of correlation ratio (η) using F-test. The overall results show that there is strong non-linear relationship among the factors.

20

A Study on the Paradigm Shift in Exhibition Culture Facilities by the Smart Device Technologies

Ill Chul Doo, Hyunwook Shin, ChangSoo Sung, Jungmin Byun

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.237-248

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study deals with the activation of mobile technology which enables audiences to make a two-way interaction with the cultural facilities and to grant a newer concept of exhibition culture facilities. In other words, the combination of personal mobile device and IT tech would bring a new paradigm that cultural facility is not only a historical archive but also a place for education and entertainment beyond the limitation of real life. The connection between exhibition culture facilities and mobile device would result in a substantial reduction in marketing and PR cost and labor, an offer of TPO(time, place, occasion) service which increases audience accessibility, a storage of enormous amount of information and finally, the discovery of new markets and business opportunities in culture industry.

21

Energy based Efficiency Evaluation of Cluster-Based Routing Protocols for Wireless Sensor Networks (WSNs)

M. Faheem, Asri Bin Ngadi, S. Ali, M.A.Shahid, L.Sakar

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.249-264

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent years many researchers demonstrate their great interest in cluster based energy efficient routing in Wireless sensor networks (WSNs). Wireless sensor networks are networks of tiny sensor nodes intelligent to data processing, sensing, wireless communication proficiency, along with memory and energy limitations. In the existing era many energy efficient routing protocols for Wireless sensor networks have been proposed to prolong the network lifetime of the minute sensor node however, because of their transformed behavior in altered scenarios performance superior or poorer cannot be observed without any doubt by conventional techniques. The main purpose of this research is to evaluate the performance among energy efficient routing protocols in WSNs based on metrics Overhead, Delay, Packet Delivery Ratio (PDR) and Congestion over Energy consumption and Network lifetime. The current research work can be utilized to guide protocol designing, application-specific protocol selection and modification of the existing routing protocols in Wireless sensor networks. Simulations between Cluster based Data Gathering Protocol ECDGP and cluster based Selective Flooding Routing Protocol SFRP confirms their results in term of Overhead, Delay, Packet Delivery Ratio and Congestion over Energy consumption and Network lifetime.

22

A Background Removal Algorithm using the Variable Order n×m Dimensional Vector

Jeong-In Park, Jin-Tak Choi

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.265-276

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Existing code book algorithm removes the background or the specified image area by composing a code Book from the basis image and mapping it on an objective image to make a code book. The code book algorithm is known to use the color similarity such that it removes by clustering like colors, however, it is disadvantageous that larger the code size or the objective image, slower the removal process. To improve the situation, this study suggests the variable order n×m dimensional vector. The suggested algorithm generates the variable order vectors with received values of n and m, calculates the average of 3 pixels around the objective image and replaces each pixel. The replaced pixels reduces the image by dividing it into squares implementing the code book and removes the background color by applying the vectors again. Then the image is finally enlarged to the original size using the linear interpolation. Since the vectors are applied to the reduced objective image to remove the background in this algorithm, the speed which has been the shortcoming of the code book is improved. It is confirmed that the removal of the background in complex color images where the background was difficult to distinguish is successful as a result of application of the proposed algorithm to the actual objective image.

23

Identifying Designers and their Design Knowledge

Maen Hammad, Mustafa Hammad, Hani Bani-Salameh

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.277-288

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents an approach to identify designers who participated in shaping the design of software systems. Designers are identified as well as their design knowledge. Identified designers are recommended to handle a high level change request. High level requests require changing the design of software systems. The identified design knowledge of designers is used to find the appropriate designer to handle a change request. Designers are developers who made design changes to the software. Identifying designers and their design knowledge is based on mining software repositories to extract design changes from commits. Developers who committed any design change are considered designers. Type and amount of committed design changes are used to identify the knowledge of designers. A tool has been developed to automatically recommend a set of designers to handle a high level change request. Recommended designers are ranked based on their knowledge that is identified from cumulative design activities for designers. The tool also extracts useful information and statistics about designers and their activities. A case study of two open source projects is presented to show the benefits of the proposed approach and tool. Results showed that most committers are not designers. It also shows that designers can be ranked based on their design knowledge.

24

This paper proposes an ontology learning and population model from structured data sources. Recently various attempts have been made to harmonize Web 2.0 and the Semantic Web, named as Web 3.0 or Web 4.0. One of the most important issues for realization of the next Web platform is about how to make Web ontology rich as well as to address semantic interoperability between ontologies. To resolve those issues, Web ontology schemas should be precisely defined in semantic aspect and we should also develop a method for learning and population of ontology instances from diverse resources. This paper proposes a model which enables the ontology learning and population from structured data sources. The proposed model in this paper is a standard-based approach. In other words, our proposal is based on ISO/IEC 11179 - Metadata Registry, which is one of the international standards. This standard has been developed to support the interoperability between data by managing standardized common concepts. Therefore, our proposed model enhances the semantic interoperability between ontologies and enables the ontology enrichment from data sources.

25

A Traceability Based Approach for Model Synchronization

Mohamed Yassine Haouam, Djamel Meslati

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.305-318

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In developing software systems, evolution is an inevitable aspect which affects artefacts in the whole life -cycle. Changes may be caused by changing user requirements or be induced by changes in implementation technologies. In Model Driven Engineering, the model is mainly the most artefact concerned by modifications and it's evolution causes changes in all the models obtained as products in the transformation chain. As a consequence, the impacted models have to be updated for preserving their coherency. This article deals with the co-evolution problem by proposing an approach to ensure the co-evolution of artefacts after model changes.

26

An Improvement of Soft Decision Decoding Algorithm Using Linear Block Codes

Yong-Geol Shim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.319-324

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

An improvement of soft decision decoding algorithm using linear block codes is presented. The proposed algorithm is for hard-detected signals of digital communication systems. Based on the error correction, the proposed scheme converts the received hard-decision into soft reliability for the input of the decoder. Simulation results are shown and superior performance is obtained by using the proposed scheme.

27

Impact of SNS Ad Type and Product Involvement on Consumers' Purchasing Intentions

Jongho Kim, Jonghei Ra, Taeyang Seo, Yoon Yong Hwang, Yongpal Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.325-332

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The use of SNS has been increasing globally and the SNS has been used to satisfy different purposes of social groups over the years. In the beginning, the SNS were formed using e-mail, newsgroup, etc., where information was shared among relatively homogeneous groups of people. Now different groups including corporations have been using SNS such as Facebook, Twitter and Youtube for their social media marketing. The SNS marketing can facilitate the purchase of consumers to help increasing sales. Our study investigated the impact of SNS on the type of advertising depending on the involvement of the product to the sense of usefulness or ease of consumers' purchase intention. According to the results, advertising for low-involvement products can be more important than the high-involvement product.

28

An Approach for Change Impact Analysis in Web systems - A Industrial Case study

Zafar Mehboob, Aamir Khan

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.333-350

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

There is a growing body of research on change impact analysis (CIA) approaches that specifically addresses changes and their impacts on architecture design. However, there is little research focus on approaches that particularly support the identification of impacts on architecture design resulting from business process changes i.e. early identification of change impacts in Web systems. To address this problem, we have proposed a systematic, structured and rigorous approach called as process model of CIA (PMCIA). PMCIA consists of a set of defined steps/activities, inputs, outputs, and employs architecture design information. In this paper we have presented the results of PMCIA validation in industrial setting through a detailed case study. The case study was carried out across two releases of a selected Web system project in an organization. The case study results indicate that the proposed approach, indeed, supports for early identification of change impacts in Web systems and provides Web developers the necessary components for systematically performing CIA.

29

Color-Emotion Model for Re-rendering Visual Contents

Heekyung Yang, Kyungha Min

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.351-358

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We present an emotion-based algorithm to re-produce visual contents according to the change of users' emotion. The users' emotion is analyzed by Russell's emotion model. Our scheme is a mapping between the emotions in Russell's model and the visual properties of the contents such as color, tone, saturation and contrast. This method is applied to re-produce a well-known digital animation to prove the effectiveness of our scheme by executing a user test.

30

Drawing Features of 3D Meshes in Pencil-drawing Style

Kyungha Min

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.7 No.6 2013.11 pp.359-366

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We present a feature-guided salient rendering a 3D triangular mesh. For this, we compute directions on the vertices of the mesh and distribute noise on the faces of the mesh. After projecting the direction and noise into image space, we execute a convolution algorithm to render the mesh. We use three directions in this paper: a principal direction, the tangent direction of an isocurve of view-dependent features, and the tangent direction of an isocurve of luminance. By controlling the noise, we produce several artistic effects including pencil drawing and hatching.

 
1 2
페이지 저장