Earticle

현재 위치 Home

International Journal of Software Engineering and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • pISSN
    1738-9984
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.8 No.1 (38건)
No
1

Z –Specification of Component Based Software

Prasenjit Banerjee, Anirban Sarkar

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.1-20

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The paper focuses on a Z-semantic based conceptual model of component, called Z-Formal Specification of Component Model (ZFSCM), to conceptualize the different facts of component model in Component Based Software Engineering (CBSE). This model defines a set of components and their contracts or relationships using Z- notation. It is accompanied with different type’s services, classes, components and interfaces. This approach facilitates modeling of components using different schemas in software system. The ZFSCM has being checked validation using a type checker of Z notation (ZTC). The main focus of this paper is the formal specification of the components. The paper has also defined the relationships between the components and composition among them. Moreover, the paper also provides comparative study of several similar kinds of proposals for component models in Component Based Software Engineering (CBSE).

2

Fast Determination of Items Support Technique from Enhanced Tree Data Structure

Zailani Abdullah, Tutut Herawan, A. Noraziah, Mustafa Mat Deris

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.21-32

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Frequent Pattern Tree (FP-Tree) is one of the famous data structure to keep frequent itemsets. However when the content of transactional database is modified, FP-Tree must be reconstructed again due to the changes in patterns and items support. Until this recent, most of the techniques in frequent pattern mining are using the original database to determine the items support and not from their recommended trees data structure. Therefore in this paper, we proposed a technique called Fast Determination of Item Support Technique (F-DIST) to capture the items support from our suggested Disorder Support Trie Itemset (DOSTrieIT) data structure. Experiments with the UCI datasets show that the processing time to determine the items support using F-DIST from DOSTrieIT is outperformed the classical FP-Tree technique. Furthermore, the processing time to construct a complete tree data structure for DOSTrieIT is lesser than the benchmarked CanTree data structure.

3

Design and Implementation of Storage System Using Byte-index Chunking Scheme

Ider Lkhagvasuren, Jung Min So, Jeong Gun Lee, Jin Kim, Young Woong Ko

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.33-42

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we present an enhanced storage system that supports Byte-index chunking algorithm. The storage system aims to provide efficient data deduplication with high performance and to be performed in rapid time. We describe the overall procedure of Byte-index chunking based storage system including read/write procedure and how the system works. The key idea of Byte-index chunking is to adapt fixed-size block chunk scheme which are distributed to “Index-table” by chunk’s both side boundary values. We have found that Byte-index chunking in storage system provides high performance compared with other chunking schemes. Experiments result shows that the storage system with Byte-index chunking compresses overall data with high deduplication capability and reduce the speed of file processing.

4

CyberOffice : A Smart Mobile Application for Instant Meetings

Dong Kwan Kim, Jae Yoon Jung

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.43-52

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Even though web-based conferencing applications enable the user to overcome spatial constraints, they require additional presentation facilities such as beam projectors, computers, and video presentation aids. Most of all, Internet connection is an essential element to connect the participants. Such a Web conferencing may be well suited for formal meetings or presentations rather than small-scale group meetings. To improve the promptness and availability, meeting applications for small-scale group meetings should mitigate communication constraints and reduce initial setup time. In this paper, we present the design and implementation of a smart meeting Android application called CyberOffice which is based on Wi-Fi Direct. Our application enables a presenter to start meetings quickly anywhere at any time without Internet connection. In addition, there is no need for necessary devices except an Android smartphone to join a meeting. The proposed application indicates that the Wi-Fi Direct APIs of the Android platform can be effectively applied for file sharing and event exchanges.

5

A Strategy to Improve Performance of Genetic Algorithm for Nurse Scheduling Problem

Sun-Jeong Kim, Young-Woong Ko, Saangyong Uhmn, Jin Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.53-62

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We applied genetic algorithm to nurse scheduling problem. For time complexity problem of genetic algorithm, we suggested efficient operators using a cost bit matrix of which each cell indicates any violation of constraints. A cell with 1 indicates that the corresponding assignment violates constraints and needs no further consideration. The experimental results showed that the suggested method generated a nurse scheduling faster in time and better in quality compared to the traditional genetic algorithm.

6

A Bio-Inspired Approach to Selective Inheritance Modeling

Darin Hamouda, Said Ghoul, Hanan Hardan

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.63-74

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The conventional inheritance concept adopted in the current Object Oriented Programming (OOP) was applied more than three decades ago. It is acting on "is-a" hierarchy model, and has some defects; while OOP is trying to be more close to the real life, it is still far from genetics principles. Adopted inheritance concept means that the child class can inherit, and get everything that is public in the parent class automatically. This process has solved many problems, but it does not simulate what is really happening in our life, where each object can gain just the needed properties from the parent class. So, in simple words, conventional inheritance is not selective and is generating identical objects. One of introduced solutions was the selective inheritance. But, while conventional inheritance acts on “is-a” hierarchy model, the works that introduced the selective inheritance were also done on this model and still suffers from some problems. The inspiration from the “real life” genetics has led us to a selective inheritance acting upon a “Composed by” model rather than the “is-a” model, where the properties are classified into several classes according to "Composed by" relation. This paper proposes a Genetic approach to a new model for selective inheritance that is replacing the “is-a” hierarchy model by a “Composed by” one, which reduces the complexity and makes each object has its own definition. After that, it proposes a language extension to be adopted in any object oriented programming language.

7

The floating photovoltaic system is a new concept in energy technology to meet the needs of our time. The system integrates existing land based photovoltaic technology with a newly developed floating photovoltaic technology. Because module temperature of floating PV system is lower than that of overland PV system, the floating PV system has 11% better generation efficiency than overland PV system. In the thesis, superiority of floating PV system is verified through comparison analysis of generation amount by 2.4kW, 100kW and 500kW floating PV system installed by K-water and the cause of such superiority was analyzed. Also, effect of wind speed, and waves on floating PV system structure was measured to analyze the effect of the environment on floating PV system generation efficiency.

8

The fact that the information can be collected not only by the government and power companies but also individual users adds seriousness to the problem. In this paper examined this issue by focusing on the load management system based on BEMS system in the smart grid environment. Electricity suppliers and consumers exchange real-time information to two-way and is a next-generation power grid to optimize energy efficiency. This paper suggests the implementation of load management application system in energy management service environment. The structure of load management system in the smart grid environment is the structure that serves data in the load management system to the web through the application service network.

9

Object oriented (OO) is the most accepted object modeling languages nowadays. Although OO languages are successful in modeling real world entities, nevertheless, there is little to no support for modeling state of object precisely in code. To overcome this problem, a new general purpose programming language is proposed that is built on two paradigms which are typestate-oriented and permission-based. One of the most vital factor for every language to be accepted and effective for users is having an enhanced standard library and clearly one of the most important parts is Input and Output (I/O) Application Programming Interface (API). One of a new programming language is Plaid language. Since the Plaid is at its early stage of development, I/O features provided by the Plaid standard library are very basic and limited. This paper presents I/O API that we have developed for the Plaid based on the features provided by Java I/O API. For the evaluation we used two metrics which are the number of features provided by I/O API, and the number of exceptions eliminated by using Plaid and typestate-oriented programming language.

10

E-learning Education for Academic Literacy in Computer-Mediated Communication

Myung-Jeong Ha, Hyun-chul Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.107-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

11

Recovering Color of Dark Images Using Tone Mapping and MSRCR

Woo-Ram Lee, Dong-Guk Hwang, Byoung-Min Jun

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.119-128

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Dark images are acquired under low light level condition and they have some weakness about image contrast and distortion of color. However, the most studies about dark image tried not to recover colors of the image, but to improve the image contrast. For this reason, we propose the method combined with the tone mapping and MSRCR in order to recovering the original color. We consider the tone mapping to control brightness of the image and the MSRCR to recover the original color. As experimental images, we employed synthesized images, created from the Barnard’s data set. We also consider the Euclidean distance and the angular error between images as the evaluation factors. The performance of the proposed method was evaluated by two experiments. First, we carried out the performance comparison of our method and some well-known color constancy methods. Secondly, we analyzed the performance according to change parameters of MSRCR. The experimental results tell us that the proposed method is more suitable for recovering the color of the dark images than the other methods.

12

How Human Aspects Impress Agile Software Development Transition and Adoption

Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md. Sultan, Khaironi Yatim Sharif

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.129-148

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Many software companies are interested in using Agile methods in their software projects. Contrary to traditional software development methods, Agile methods are people oriented. This fact shows the significant role of individuals in these methods. Increasing prevalence of Agile methods forces software companies to consider people related factors as critical issues in adoption and transition to Agile methods and practices. This article focused on human aspects of Agile transformation process by conducting a Grounded Theory study involving 32 Agile experts. The main contribution of this article is identification and classification of diverse human aspects of Agile transformation process. Analyzing collected data showed that human aspects of Agile transformation process can be classified in several categories. While some of them are impediments to change, some others act as change accelerators. At the same time people’s perceptions about change process and incentive factors can shape and form human aspects during the Agile transformation process. Each of these categories encompasses its own factors which have negative or positive effect on change process.

13

A Design of Cargo State Generator for Maritime Logistics in IP-RFID Service Platform

Hyung Rim Choi, Byoung Kwon Park, Young Jae Park, Min Je Cho, Chang Hyun Park

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.149-158

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

It is important to track cargo state in global Maritime Logistics. By the nature of Maritime Logistics, it takes cargo a long time to be transported. If a problem in cargo state comes up in transit, we need real- time notice and response about the problem. Also, we need how to track the cargo's state information in order to clarify where the responsibility lies when problems occur. Although the study of the existing Cargo Location Trace was partly conducted, there is a lack of study with managing cargo state depending on environments. This study suggests a system to track and manage the cargo state in Maritime Logistics IP-RFID Service Platform. A few requirements are identified in order to manage cargo state and a few functions are drawn. Furthermore, the process is suggested to generate cargo state information in Maritime Logistics IP-RFID Service Platform. In this study, there is significance in suggesting a plan to track cargo state as well as track cargo location studied mainly.

14

Assessment Management System based on IMS QTI 2.1

Youngseok Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.159-166

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Traditionally, teachers have made use of exams to evaluate learners during the educational process as a course requirement or to measure concept assimilation presented in a lecture/class/course. E-learning testing systems in general did not help to improve the level of learning because it does not reflect a learner's personal characteristics. In recent years, in order to solve these problems, online learners can be judged by the learning site tests that provide lectures, school, or recognized government through learning results. The online test management for learners evaluates management techniques, learner's analysis of assessment results, report results, and provides heavily-relied feedback technology. According to the individual evaluation result, learning outcomes are used for the next stage of education and promotion. Therefore, in this paper, we propose to design and develop a prototype assessment system in accordance with international standards on the interoperability test items. While focusing on the item bank management system, create online testing, evaluation system; a question authoring tool was developed to create a simple form of items. In addition, Import and Export were designed as a form of international standards-based assessment items for sharing between different systems evaluation questions through management module development.

15

A Model for Visualizing Critical Least Association Rules

Zailani Abdullah, Tutut Herawan, A. Noraziah, Mustafa Mat Deris

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.167-180

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Mining least association rules has received a great attention from the past decades. However, no current research has been specifically performed for visualizing these types of rules. In this paper, a model for visualizing critical least association rules is presented. The proposed model contains five main steps, including scanning dataset, constructing Least Pattern Tree (LP-Tree), applying Critical Relative Support (CRS), capturing Critical Least Association Rules and finally visualizing the respective rules.

16

Effective Communication between Parents and Teachers using Smartphone App

Young-sik Kang, Jungwon Cho

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.181-192

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The purpose of this study is to inquire into effective communication between parents and teachers using smartphone app. To achieve this, a survey was carried out from March 25 to March 29, 2013, on 180 parents of children, who have an experience of sharing community with teachers through smartphone or PC, in rural child care centers, N city, Chungnam. The results of this study are as follows. It showed that communication and information exchange between their parents and teachers by smartphone app were getting diversified by the pervasion and use of smartphone medium, making a considerable contribution to mutual information exchange as an useful medium beyond limited communication for contracting-out child care. Consequently, with the development of information media, the existing communication only through parents letter or visit to child care centers will have to be actively used as a very useful means in delivering characteristics of children's behavioral development and news related to their education, guiding learning materials, and delivering in-house notices with an easy mind and effectively between parents and teachers by safely exchanging and mutually sharing the concern over children's demands with contracting-out child care through communication.

17

Realistic Façade Texturing of Digital Building Models

Changjae Kim, Eugene Rhee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.193-202

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The market related to 3D geospatial information is drastically increasing especially in the current internet or mobile environments. Many famous companies, such as Google and Microsoft, are already providing lots of 3D geospatial information in such environments. One of the interesting 3D geospatial information is 3D building information. However, most of the 3D building models produced by such companies are through the manual procedures. In this regards, this paper suggests a more automated framework for the realistic façade texturing of 3D building models. Linear features such as wire-frame of a building are used for geo-referencing of terrestrial images taken around the buildings in question. Afterwards, the texturing process is applied to the building models while considering occlusions and lens distortions. Conclusively, the results are shown in more realistic way through the proposed framework.

18

Test Cases Selection Based on Source Code Features Extraction

Iyad Alazzam, Izzat Alsmadi, Mohammed Akour

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.203-214

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Extracting valuable information from source code automatically was the subject of many research papers. Such information can be used for document traceability, concept or feature extraction, etc. In this paper, we used an Information Retrieval (IR) technique: Latent Semantic Indexing (LSI) for the automatic extraction of source code concepts for the purpose of test cases’ reduction. We used and updated the open source FLAT Eclipse add on to try several code stemming approaches. The goal is to check the best approach to extract code concepts that can improve the process of test cases’ selection or reduction.

19

Development of XML-based Standardized Software Database Specifications and Operating Schema

Chang-Su Kim, Tae-Hak Ban, Hoe-Kyung Jung

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.215-224

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, the importance of software has been emphasized as the core capability of IT convergence due to the development of various information industries. The need to improve the utilization of excellent software resources through database is arising. Therefore, the system database schema of XML-based software products required for registration, searching and sharing to utilize software products was designed in this thesis. And, the database method for software assets was designed and implemented for the management of XML-based software information system.

20

Ontology Mapping for Enhanced Interoperability of S-100 Geographic Information Registers

Daewon Park, Suhyun Park

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.225-234

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the maritime field, integration of information service architectures and a common data model currently are topics of considerable interest. The International Hydrographic Organization (IHO) introduced the S- 100 standard for the universal hydrographic data model and publishes Geographic Information (GI) registers in order to support the wider use of, the ease of access to, and the development of S-100 based product specifications. GI registers can be used with other domains’ registers. Whereas each register might have contents for each domain or each specific type, extracting cross-domain or cross- type contents from registers is not easy. In this paper, we present three register ontologies based on the ISO 19135 register schema model, the S-100 model, and the FCD model, respectively. As each register ontology represents concept classes and their relations on different level, we also present ontology- mapping methods for enhanced interoperability of GI registers based on ISO 19100 series.

21

Indoor Wireless Localization Using Kalman Filtering in Fingerprinting-based Location Estimation System

Geon-Yeong Park, Min-Ho Jeon, Chang-Heon Oh

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.235-246

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As “smart” devices such as smart phone and smart TVs become widely distributed, various studies on location-based services have been conducted. Such location-based services are useless, however, unless the user’s location is known. A number of researchers have examined methods to trace and determine indoor locations for indoor location-based services. In particular, WALN has been examined in various studies because of its advantage to use a frequency band available without advanced settings. This study suggests a new indoor tracing method to reduce time delays upon location fingerprinting for point data collection, which is a disadvantage of the existing Kalman filtering algorithm and fingerprinting type location tracing algorithm. This study also compares its performance with that of existing methods based on the collected data. As a result of the experiment, the fast collection algorithm is presented as a solution to the problems of existing methods. It is proven that the fast collection algorithm presented in this study is applicable to a location tracing system in an actual environment.

22

Detecting Change Patterns in Aspect Oriented Software Evolution : Rule-based Repository Analysis

Hanene Cherait, Nora Bounour

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.247-266

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Interesting information and Meta-information about software systems can be extracted by analyzing their evolution histories. This information has been proved useful for understanding software evolution, predicting future changes, and performing an efficient change impact analysis. A rich source code repository is a prerequisite for a high quality evolution analysis. Nonetheless, the evolutionary information contained in current versioning systems for Aspect Oriented (AO) software is incomplete and of low quality, hence limiting the scope of AO software evolution analysis. In spite of AO Programming (AOP) characteristics, none of current versioning tools match the need of controlling and storing the AO software evolution, they do not perform well with obliviousness and quantification found in AO code. In this paper, we suggest a rule-based repository for AO software evolution, and specifically for AspectJ programming language. This repository is dedicated to handle the proper characteristics of AO paradigm. In our proposal changes are formulated as rewriting rules and recorded in the repository when they are applied. Then, this last is analyzed to detect change patterns in AspectJ software evolution. We give here, the details of our rule-based repository, as well as the proposed approach for change pattern detection. We present a tool validation and some experimentation to prove the feasibility and the efficiency of our proposals.

23

Implementation of Smart Car Infotainment System including Black Box and Self-diagnosis Function

Minyoung Kim, Jae-Hyun Nam, Jong-Wook Jang

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.267-274

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Currently, most of cars are equipped with the car infotainment system. In addition, drivers install the additional functions which they want to. The car black box and self-diagnosis tool are remarkable functions among the additional function. If they install the additional functions in their own car, they almost pay purchasing cost. These functions give the convenience to drivers, but it is causing the complex problem and the economic burden. In this paper, we implement car infotainment system which integrates multiple function based on the android platform. Our aim is to solve the above mentioned problem by providing integrated multiple functions of car infotainment.

24

Beam-to-column connections are very important in steel structure buildings, and have direct effect on safety and economic efficiencies of the buildings. Especially, they have rigidity and ductility that are necessary for behavior and stress transmission of buildings. Furthermore, they are also needed carry strength and strain with easy construction. The design and analysis of steel structure connections are generally considered to consist of rigid, semi-rigid or pin joint. Deformation characteristic of H-shaped beams with newly T-stub connections is investigated for the effect of these joints on inelastic behavior of the beams in this paper. This research applies the model of exponential function based on the equations of equilibrium and compatibility equations at the location of bolts. The prying action reducing both the ultimate load capacity and the fatigue of the bolts are not considered in this study. The elasto-plastic behavior has been studied through various models with parameters of the length of T-flange, distance of bolts and the diameter of bolts. The results indicated that the distance of bolts has a great effect on the ultimate strength and deformation capacity of T-stub connections. The presented method may be a useful tool for the design of T-stub connections.

25

A Conceptual-operative Framework for in-process Decision Support of Software Project Management Practice

Ali Tizkar Sadabadi, Nazri Kama

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.287-302

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The intention of this paper is to present an in-process decision support feature for Software project management (SPM). The significance of decision support in knowledge management of any discipline is undeniable and more prominent when it includes managerial capabilities. The specified in-process decision support in this paper astutely would address the distinct class of decision issues and accordingly tries to resolve them with an optimal policy. This feature would be accomplished with a multi-method simulation approach comprises of three different methods of simulation technique. The simulation methods implemented for the approach are discrete event simulation (DES), system dynamics (SD) and partially observable Markov decision process (POMDP). In this paper the composition of this framework and consequently the simulation results of POMDP policy which is operation-center for decision support would be presented.

26

Designing Knowledge Base Mobile Application Compatibility Test System for Android Fragmentation

Hyung Kil Ham, Young Bom Park

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.303-314

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Android is an open operating system developed by the Open Handset Alliance (OHA) that is Google-led. Due to the nature of an open operating system, however, Android has the fragmentation problem that mobile application shows different behavior patterns in heterogeneous devices. To resolve this issue, a developer needs much cost in terms of time and efforts to devise application tests in mobile environment. In this paper, we propose two methods that handle android fragmentation problem. Moreover, utilizing the methods, we produce mobile application compatibility test system. We also perform case studies in order to evaluate the methods’ effectiveness concerning fragmentation problem by developing application. The proposed system analyses the fragmentation that is found in code level as well as in API level. The experimental results demonstrate enhancement in mobile application test process regarding time and cost.

27

A Meta-Learning Approach based on Mean Field Genetic Algorithms

Chuleui Hong, Yeongjoon Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.315-322

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Mean Field Genetic Algorithm (MGA) is a hybrid algorithm of Mean Field Annealing (MFA) and Simulated annealing-like Genetic Algorithm (SGA). It combines benefit of rapid convergence property of MFA and effective genetic operations of SGA. This paper presents an approach for building a multi-classifier system in a MGA-based inductive learning environment. Multiple base classifiers are combined to build a multi-classifier system. A base classifier consists of a general classifier and a meta-classifier. The general classifier performs regular classification task. The meta-classifier evaluates classification result of its general classifier and decides whether the base classifier participates into a final decision-making process or not. The paper discusses our approach in details and presents some empirical results that show the improvement we can achieve with our approach.

28

An Evaluation Model for Social Development Environments

Hani Bani-Salameh, Sanaa Alwidian, Maen Hammad, Fadi Wedyan

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.323-336

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Distributed software development is becoming a common practice among developers. Factors such as the development environments improvement, their extensibility, and the emergence of social networking software are leading factors. They lead the development process (both co-located and geographically distributed) to a practice that: 1) improves the team’s productivity, and 2) encourages and supports the social interaction among the teams’ members. The above factors along with the distributed development emergence, Integrated Development Environments (IDEs) evolution, and the social media advances got the attention of the software development teams, and made them consider how to better assist the social nature of software developers, and the social aspects of software development, including activity awareness of team members’ progress, their presence, collaboration, communication, and coordination around shared artifacts. IDEs are the most commonly used tools by developers and programmers. Integrating the most needed development tools inside the IDE, makes it a Collaborative Development Environment (CDE), and embedding a variety of social software features within a CDE helps support distributed development teams. It also creates a new genera of tools called Social Development Environments or “SDEs” as it is commonly called. This article discusses the origins and development of “SDEs”. It reflects and presents the research into development environments, explaining their role in supporting the communication and coordination needs of development teams. Also, it presents the effect of embedding social network features in such environments. It presents some emerging SDEs and future work. Finally, it concludes by introducing a new model named 5-star that classifies, and helps to evaluate and compare the collaborative tools. 5- star presents a new way to compare and evaluate the SDE systems based on their supported features. It bases the comparison on five major categories including: Communication, Coordination, Collaboration, Awareness & Presence, and Social networking (SN) tools.

29

Topology for Optimal Task Assignment on Multicomputers with Dedicated Resources

Sang-Young Cho

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.337-344

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

One of the geometrical k-cut problem applications is the task assignment in homogeneous networks where processors are homogeneous and some of them have unique or special functionalities. Though the problem is NP-hard in general, there are polynomial-time optimal algorithms if the topology graphs representing networks have regular properties such as tree and general array. We showed that the O(n3k) time complexity of existing algorithms for the task assignment problems can be enhanced to O(n3logk) in cases of linear array, binary tree, and general array by using the results of [3, 5]. This paper also proposed a new kind of topology graphs on which the geometrical k-cut problem can be solved in polynomial time. The time complexity of the algorithm is O(n3k), where n is the number of nodes in a k-terminal graph, with the Goldberg-Tarjan’s network flow algorithm.

30

Effectiveness of Rules for Format Conversion Analysis

Gwanggil Jeon

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.1 2014.01 pp.345-354

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, a rule-based format conversion approach is proposed. A super resolution topic is of much interest and some applications of super resolution are format converting of TV signals, face recognition, camera surveillance, and digital camera color interpolation. The main goal of super resolution is to raise the resolution of image via upsampling. This paper proposes an image upsampling method by rule. The proposed method provides better performance than conventional methods.

 
1 2
페이지 저장