Earticle

현재 위치 Home

International Journal of Software Engineering and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • pISSN
    1738-9984
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.8 No.3 (39건)
No
1

Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement

Chang-Su Kim, Bong-Im Jang, Hoe-Kyung Jung

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recently, the use of RFID(Radio Frequency Identification) for object identification is used more often, but the tag collision problem by the use of a radio frequency still exists. Therefore, in this paper, we analyzed tag identification time to minimize tag collisions and improve tag identification time by applying various tag anti-collision algorithms in the suggested method. As a result, we drew a conclusion about the number of optimum readers used in the RFID system environment. Significantly, we expect that the suggested method will be used more efficiently in the simultaneous multi-tags identification RFID system environment.

2

Performance Analysis of ORB Image Matching Based on Android

Yu-Doo Kim, Jin-Tae Park, Il-Young Moon, Chang-Heon Oh

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.11-20

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent years, there has been rapid development of the technologies used in smart devices. Hence, research into these technologies is required in order to expand our understanding of these devices. One of the main features of smart devices is the mobile camera. Many studies have been conducted about how to utilizing service using camera. A key component of camera applications is image processing software. In this paper, we analyze the performance of algorithms used for image processing and seek to improve the performance of the ORB algorithm for image processing in mobiles. Through this study, we find an optimum threshold value for image detection in mobile applications using the ORB algorithm.

3

A Genetic Methodology for Object Evolution

Enas Naffar, Said Ghoul

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.21-38

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

One of the major issues of object-oriented programming languages is lack of reclassification mechanisms. Reclassification allows an object to change its class at runtime. Object reclassification is desired in applications whose entities need to change dynamically at runtime. The previous approaches dealt with object reclassification in different ways. But none had approached the notion of real entities evolution, where objects can evolve while belonging to the same class. This had led to a large number of classes most of the times; making the design and the implementation of the intended system more complex. The desired evolution of objects should allow objects to evolve automatically at runtime, without changing their classes membership. In this work, we present a new approach for object evolution; inspired by some genetics concepts. Objects that belong to the same class can change their structure, functions and behaviors at run time automatically, while keeping their membership to the same class. A slight environmental influence on the proposed evolution process is introduced.

4

A Case Study of Quality Improvement for Water Resource Management System based on ISO/IEC 9126

Kidu Kim, R. YoungChul Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.39-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Software testing organization in the company always tries to verify the completeness of developed code before product release, but difficult to do that. The program, which has shipped without verification of non-functional defects, causes user inconvenience or an irreparable loss. In this paper, we show to improve software quality of water resources management system based on ISO/IEC 9126 including developer-centric functional test.

5

Model Transformation Rule for generating Automatic Database Schema of Business Process Framework

Chae Yun Seo, Hyun Seung Son, R. Young Chul Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.47-54

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The previous researches had developed business process frameworks for easily integrating the separating data processing and managing, and decision-support systems built by different times in different places, but never mentioned how to develop this complex business process structures, that is, six-layer architecture. This paper suggests how automatically to develop a whole database schema of business process framework. To do this, we apply with Model-To-Text transformation based on metamodel to automatically build the schema based business process model. This procedure is follows: 1) defining each meta-model of the entire structure and of database schema, and 2) also defining model transformation rules for it. With of model transformation rules of this procedure, we can automatically transform through meta-modeling of an integrated information system to the schema based model information table specification defined of the entire layer.

6

Enhancing Red Tide Image Recognition using Semantic Feature and Rotation of Algae Image Angle

Sun Park, Myeong Soo Choi, Yeonwoo Lee, Seong Ro Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.55-64

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Red tide is a temporary natural phenomenon involving harmful algal blooms (HABs) in company with a changing sea color from normal to red or reddish brown, and which has a bad influence on coast environments and sea ecosystems. The HABs have inflicted massive mortality on fin fish and shellfish, damaging the economies of fisheries for almost every year from 1990 in South Korea. There has been a lot of study on red tide due to increasing of red tide damage. However, internal study of automatic red tide image classification is not enough. Especially, extraction of matching center of image features for recognizing algae image object is difficult because over 200 species of algae in the world have a different size and features. Besides, the accuracy of algae image recognition of various species is low since previous red tide recognition methods mostly use a few species of red tide harmful algae images for training of classification. In order to resolve the above limitation, this paper proposes the red tide algae image recognition method using rotation of image angle and semantic feature based on NMF (nonnegative matrix factorization). The experimental results demonstrate that the proposed method achieves better performance than other red tide recognition methods.

7

A Regression Test Selection Technique for SOA Based Applications

Rajani Kanta Mohanty, Binod Kumar Pattanayak, Durga Prasad Mohapatra

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.65-72

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Service Oriented Architecture (SOA) based application can be composed of heterogeneous self- contained independent services on the web. These applications are usually modified to fix bugs or to enhance their functionality. These modifications are quick and they should be supported by rapid verification. Regression Test (RT) is essential to ensure that modifications do not result in adverse effects. Regression Test Selection (RTS), one of the cheapest techniques, aims at decreasing cost of carrying out RT. This paper presents a Control Flow Graph (CFG) based approach that makes it feasible to apply a safe RTS technique to SOA based applications or services in an end-to-end manner. Safe RTS technique guarantees that no modification revealing tests will be left unselected. A simplified navigational subsystem that involves 3 services, is used to elicit our approach.

8

A Study on the iOS-to-Bada Converter using a Resource Converter and a Platform Mapping Engine

JaeHyun Kim, YangSun Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.73-88

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The iOS platform developed by Apple is the world’s most advanced mobile operating system, continually redefining what people can do with a mobile device. Bada platform developed by Samsung is a smart phone platform, which is created for wide range of device. "Bada" is a Korean word that means "ocean" and "seashore". "bada" in itself embodies the open possibilities of the ocean. Due to the use of different smart phone platforms, game developers must create content designed specifically for each platform or use a conversion process to provide game content to consumers. In this paper, to resolve this problem, the iOS-to-Bada automatic smart game converter was designed to automatically translate game contents from the iOS platform to the Bada platform for smart phones. Through the iOS-to-Bada converter, resources such as images and sounds can be converted, APIs can be converted using a platform mapping engine. These and all other content conversion functions were examined. Test results indicate that the graphics, image output, sound output, and other functions of converted Bada games were equivalent to those of the iOS games before conversion.

9

The existing studies suggested the Importance and Prioritization Methods which for exactly reflecting customers’ requests from the proper requirements [1,2]. However, this method decides ERRC (Eliminate, Reduce, Raise, Create) of Use Case by the customers’ subjective judgment. Moreover, such a previous approach can’t present a verification method for logical consistency about customers’ judgment [3]. In order to more objectively solve such a problem, this paper suggests another method for the importance extraction and prioritization of Use Case with AHP mechanism. With this suggested method, it compares and verifies the data extracted from each method of Use Case Point or AHP, and also judges whether the customers’ idea is consistently determined through Consistency Assessment of AHP or not. We show a Case Study to adapt this to Automobile Goods Management System, for the exact customers’ requests.

10

Reengineering Legacy Code with Model Transformation

Napas Methakullawat, Yachai Limpiyakorn

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.97-110

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

PL/SQL is a programming language used for developing business software, which is the connection between oriented database technology and application procedures used in Oracle Developer Tools. PL/SQL has been in existence for decades. Applications implemented with PL/SQL can be considered legacy systems. Enhancement of the systems to satisfy the business needs would be difficult to handle or manage. Integration with newer systems may also be difficult due to the use of completely different technologies. In addition, there would be a shortage of developers who can write and maintain the archaic code. Hence, migration of legacy systems to the modern business computing environment is worth the corporate invest-ment. A technique of reengineering is required to rebuild legacy applications in a new tech-nology or platform. This paper presents an approach to reengineering legacy code, PL/SQL, in order to support program comprehension activity during software migration. Model trans-formation is applied for the mapping of architectural design from the specification of PL/SQL source to the target metamodel of Class diagram as a Platform Independent Model, which can be augmented with particular technologies and used for later implementation of the new system.

11

A study on Utilization Situation and Problems in Traditional Culture-Based Public Knowledge Contents

Tae-hwan Oh, Sang-heon Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.111-122

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Korea has constructed various knowledge contents by state initiative. Having solely placed its objective in initial construction, its utilization and usability has been reduced and its awareness is quite low. However, traditional culture-based knowledge contents with the growth of culture contents industry, the trend now is on an increasing demand as a creative material. Now, on the strategic side of utilizing public knowledge contents, it has come to a point to consider it more keenly. Thus, the research aims to analyze existing utilization cases of public knowledge contents and present aspects needed in improving utilization and its prospects in expansion and development into the industry. Going beyond the existing database construction phase and to take a leap towards global contents to meet the contemporary demand, it has to expand its breadth, activate its utilization, and pursue spreading of information. If this kind of public contents is developed by utilization of the people and simultaneously achieve improvement in both academics and industry, it can contribute greatly to maintaining and utilization of ‘Hallyu’.

12

Folk tale narration places of the digital era: A study on the plans to design folk tale story banks

Dong-hwan Yoo, Dae-jin Jeon

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.123-132

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The purpose of this paper is to propose folk tale story banks to accumulate the folk tales which have been discussed about the importance for a long time in the folklore world and the literary world effectively and inherit them to modern times. Modern inheritance of folk tales is possible when new folk tale narration places which reflects documentary literature and image culture which are today’s cultural environment, not the past which was the age of oral literature, and the digital culture that is recently and rapidly developing is realized. Especially, it tries to recover interactivity and variability which cannot have been revealed for a long time as folk tales are accepted as documentary literature by proposing the digital story bank form based on its structural feature.

13

A Study on Object Tracking Signal Generation of Pan, Tilt, and Zoom Data

Jin-Tae Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.133-142

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

CCD cameras monitoring a moving object generally operate with a fixed view point or a defined pattern. As a result, a free-moving object can move out of the CCD camera's field of vision quickly, and automatic control is required to observe the object continuously. This paper proposes a signal generation algorithm for the automatic control of a CCD camera. Using the control signal, the monitoring camera can track a moving object and keep it near the image center for a longer time. The proposed method is validated in experiments that automatically move a mark located at a specified position to the image center. The proposed algorithm computes horizontal and vertical displacements between the detected object position and the image center and coverts them into angles. Finally, pan/tilt data are generated from the angles. To evaluate the proposed algorithm, we compare the generated data in the automatic control with measured data in manual control and carry out the object tracking using a simple object. The experimental results show that the difference between the generated and measured data is a negligible quantity, and the object, which is moving within ranges of ±52o/±40o of pan/tilt, is kept within about ±13o/±10o from the image center.

14

Analyzing Security Aspects during Software Design Phase using Attack-based Analysis Model

Saman Hedayatpour, Nazri Kama, Suriayati Chuprat

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.143-156

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent years, concentration on software design phase for evaluating security into the developing software increased where the cost of fixing errors in design level is several times less than the cost of fixing errors in the coding or implementation levels. One of the main challenges in facing current models that evaluate security into the software design phase refers to the need for existence of security experts to analyze the system from a security angle of view while this additional task makes the project more costly and lengthy. In this work we address this problem by defining a method for using known attacks’ and threats’ properties and behaviors instead of using a drawn misuse case for assessing potential risks in the developing software. The main contribution of this work refers to defining a model for analyzing security aspects into the software design phase while additional cost and time are not required for system analyzing by security experts.

15

Collaborative EMI Development Experience with AMGA

Taesang Huh, Jae-Hyuck Kwak, Soonwook Hwang, Geunchul Park

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.157-170

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The ultimate goal of the European Middleware Initiative (EMI) is to integrate several components of major pre-existing middleware into a consolidated middleware package with a uniform distribution and repositories and to deliver it to Distributed Computing Infrastructure (DCI)s and research communities in order to meet the needs of both High Throughput Computing (HTC) and High Performance Computing (HPC). This paper outlines our relevant implementation experience with respect to the evolution of the ARDA Metadata Catalog Grid Application (AMGA) (one of the products of the EMI middleware distribution) and the corresponding new features being implemented from the perspectives both of official and non-official EMI development. We focus on the implementation of sub-products including server, cli-clients, Client/Server(C/S) GUI (Graphic User Interface) client and web application. Moreover, we discuss additional developmental activities that have been carried out within EMI in order to expand the use of the AMGA product.

16

Development of Operational Quality Measurement Attributes of Application Software Using KJ Method

Seung-Hee Kim, Woo-Je Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.171-188

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study proposes quality measurement attributes for Application Service Quality Indicator (ASQI) to measure the quality of application software in the operation stage using the KJ technique and by reviewing some existing methodologies, such as ISO 25000 quality standard, BSC, EA PRM, SERVQUAL, and SLA. As during operational stages software quality is defined variedly in terms of software, managing organization, and service value, this study focuses on ASQI index, which is a recently developed software operational quality property that considers the special characteristics required for evaluation of quality during the SW operational stage.

17

Shape Retrieval using the Voting Number based on Rearranged Hough Transform

Youngeun An, Jongan Park, Younghun Lee, Gukjeong Kim, Jonghun Chun

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.189-202

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to manage and retrieve images from a large database based on multi-media content features, the features should have enough differentiation and be invariant to expansion, movement, and rotation. Content features include information on colors, shapes, textures, and movement. In particular, as human eyesight is sensitive to shape information as well as illumination or color in early judgments on objects, there have been a number of studies on the detection of objects. Therefore, this study proposed a new algorithm where noise invariability is added to the existing standard Hough transform which is applied for recognition of shape.For the order of movement, first, feature points are extracted through the standard Hough transform from a query image. Second, the numbers of lines which pass through each of the feature points are voted on and the voting numbers are rearranged according to size. Third, labels for the voting numbers are clustered and normalized to compose a feature table. In the simulation of the image retrieval system using a voting numberbased rearrangement Hough transform, a variety of images with different sizes were analyzed. As a result of the analysis, it was discovered that the weak point was that this transform was sensitive to rotation, expansion, and reduction. If the algorithm used in the standard Hough transform was complemented, it could improve recall and precision greatly in image retrieval.

18

Proposing a New Hybrid Controlled Loop

George Tsaramirsis, Salam Al-jammoor, Seyed M. Buhari

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.203-210

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Counter controlled and condition controlled are main categories of iterative statements, with “for”, “while” and “do while” loops dominating the field. While there are clear distinctions between them, it is not uncommon for a programmer to practically convert a condition controlled loop to do counter controlled task or vice versa. For instance, there is a “while loop” that will be iterated a number of times or a “for loop” with an additional condition next to the counter checker. This paper proposes a new loop that will be both counter and condition controlled. The loop will include an in-built predefined counter and it will be able to iterate a user defined number of time, prior to checking the user defined condition. A detailed explanation and a C++ implementation of the proposed loop are included in this paper.

19

Interactive Digital Art based on user’s Physical Effort with Sensor Technology

Hae Young Lee, Jung Yoon Kim, Won Hyung Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.211-216

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Interactive Digital Art is a popular art form that collaborates with science and technology. In this paper we search for Interactive Digital Art which is one of the most popular art genres in these days. It takes a digital technology with modern art and sensor technology helps audiences’ active participation on art works. The participations naturally move their part of body or the hole body to create some image and sound that programmed by digital artists. To create the image or sound sensor technology is also take a very important part in Interactive Digital Art. Interactive Digital Art takes visual and sound through new technologies. Audience participation type of works need sensing process requisitely. Therefore, we search for some digital art installations about body experience participation’s movement using sensor technology that create visualizations sounds. Various sensors are used for Interactive Media Art works; however, Kinect from Microsoft Company is easy and useful for artist. The Kinect is a contactless controller to make an audience to be free from exist contact controller. Sensor that on-board in Kinect recognizes the audience movement who is free from controller and offers visual or auditoria response to the audience in a real time. Therefore the audience becomes a user in an Interactive Digital Art. The goal for this paper is to survey and analyze about the Interactive art works that includes based on cutting edge trend sensor technology and the audience’s physical affordance and effort.

20

Language Driven Development Framework: End-to End Approach for Rapid Game Server Development

Hwan-Soo Yoo, Seong-Whan Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.217-226

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Software programmers no longer expect to make software that only works on PCs and servers. An advantage of using DSL for their software development is that they can achieve a high efficiency compared to their development investment. However, previous research works have not conducted detailed workflow and DSL for web-development reflecting current prosperous web and mobile technology. In this paper, we propose an integrated language driven development (LDD) framework especially for the real time game server development. Using LDD framework, expert developer can make DSL language, so that novice developer or non-programmer can utilize the DSL for their easy programming works. We illustrate detailed LDD framework with our simplified game server language. With our framework, even novice programmer can program massive game server programming works during game development process, utilizing composed DSL written by expert programmer. This paper contributes to increase development productivity and ease of maintenance in game development process. Our workflow helps developers build their own language and can use in their software implementation for rapid prototyping. Using our LDD framework, many developers can build various domain applications not limited to games, including chatting applications, real-time monitoring and much more.

21

Emotion Affective Color Transfer

SeungTaek Ryoo

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.227-232

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The word emotion includes a wide range of observable behaviors, expressed feelings, and changes in the body state. Emotion recognition is one of the most important factors in emotional ICT. In most of these technologies on emotion recognition, features are extracted from the image, speech and bio-signals. In this paper, we suggest the system of emotion affective color transfer. To recognize human emotion, we use feature based facial expression recognition. Suggested system can be affected Image contents according to individual emotion. To emotionally transfer image contents, we analyze color, shape and stroke information. Emotion affective system can be used various multimedia contents such as music, movie and game.

22

A Framework for System Dependability Validation under the Influence of Intrinsic Parameters Fluctuation

Rabah A. Ahmed, Khairulmizam Samsudin, Fakhrul Z. Rokhani

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.233-250

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a framework to analyze and evaluate effects of cell failures induced by impact of intrinsic parameters fluctuation (IPF) on system dependability. The method of evaluation is based on generating the actual cell failures model and the realistic conditions of hardware-software interactions, where the actual error pattern can be captured. The case study of this paper is the impact of cell failures in L1 data cache of a general-purpose microprocessor. The failure modules are generated corresponding to the individual and combined impact of IPF sources in nanometer scale Ultra Thin Body – Silicon on Isolator (UTB-SOI) transistor on 6T-SRAM cell stability. A novel fault injection mechanism has been introduced to propagate errors, through modifying data of cache transactions according to error(s) incurred, dynamically at system-level. By applying a representative system workload using a well-selected suit of real benchmark programs, this study demonstrates that the framework: 1) provides an accurate user visible description for the implications of cell failures at the higher levels of abstraction induced by IPF sources at the lower levels of abstraction, 2) links individual and combined impact of IPF sources with the corresponding implications at system-level which offers a tool to systems designer to involve IPF impacts within the design plan, 3) allows for a detailed simulation process of a system-level environment in the presence of cell failures induced by IPF within an accepted period of time using the look-up file technique and thus offers a foundation to system dependability studies that require vast statistical models, 4) offers high credible evaluation results because the framework is based on the actual error pattern incurred in the system, and 5) improves system reliability where it offers valuable perceptions for an optimal fault tolerance technique in L1 cache with a high failures rate.

23

Swarm Collaborative Filtering through Fish School Search

Andri Fachrur Rozie, Hoh Peter In

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.251-254

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper we present an adaptive collaborative filtering algorithm using Fish School Search[1]. The proposed algorithm use not only rating information but also user demographic information and interests to improve similarity measurement. This algorithm adaptive to different user, where it could learn the best combination of features weight, leading to a better prediction. The experiment result shows that the proposed algorithm outperforms other collaborative filtering method. And on our knowledge, this is the first time Fish School Search applied in recommendation system domain.

24

SCAE : Software Component Assembly Evaluation

Mebarka Yahlali, Abdellah Chouarfia

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.255-268

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

CBSE: Component-Based Software Engineering is based on the idea to develop software systems by selecting appropriate components and then to assemble them with a well-defined software architecture (software component assembly). By the reuse of existing software components that have already been tested, software engineers may reduce errors and shorten the time to market of the system under development. However, software engineers still have a problem in selecting the existing reusable components as well as difficulties in determining the quality of the developed components for future reuse. So the choice of component is one of the key factors for successful development of such application. In this paper we present SCAE: Software Component Assembly Evaluation, a method enabling quality evaluation of software components. This method allows us to choose the best composition in term of quality (non-functional needs).

25

Efficient Sub-Carrier Assignment Scheme in OFDMA System with Partial Channel State Information

Kyujin Lee, Keehwan Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.269-278

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we introduce the partial channel state information based on sub-carrier allocation (PCSI-SA) scheme in order to improve the performance in multi-carrier transmission techniques such as Orthogonal Frequency Division Multiplexing Access (OFDMA). To obtain an optimum resource allocation, we require accurate channel state information (CSI). However, in practical resource allocation systems, it is hard to estimate the accurate channel state information because the environment of a wireless communication channel is always changing. To solve this problem, we proposed the resource allocation scheme using partial channel state information (PCSI) feedback data from the receiver. Moreover, the proposed sys- tem improves the fairness among the users, as well as the BER performance. We evaluate the performance of the proposed scheme using computer simulations. The results show that the proposed system provides superior performance compared to that of conventional systems in term of BER performance and fairness.

26

Towards Feasible Approach for Trusted Personalization Service Model

Kyong-jin Kim, Seng-phil Hong

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.279-290

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Wireless networks are certainly able to improve our life, and it plays an important role in various fields for personalized services. This service has also been made possible with the widespread of the smartphone. It is also being extended to upcoming intelligent service area. However, due to the nature of the wireless networks, security of information transfer still remains a challenging issue. In this paper, to resolve the issues, we introduce that the model provides a personalized service based on trust in intelligent environments, and perform the scenario simulations to show how enhanced security functions have an impact on the performance.

27

Recovering Intent of Code from RPG Legacy Source

Kochaporn Suntiparakoo, Yachai Limpiyakorn

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.291-304

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Legacy software can be characterized as old software that continues to provide core services to an organization. Applications written in RPG can be considered as legacy software.RPG was originated as a report-building program developed by IBM. Many business applications are written in RPG, and they are often critical in the operations of enterprises. Through decades of use, these RPG legacy systems can be hard to maintain, improve, and expand, since there is a general lack of understanding of the systems. The supporting documentation may not be current as well due to many changes implemented into the software. This paper thus presents a method of reverse engineering for recovering the intent of code from RPG legacy source. The metadata is gathered from the input RPG source by detecting and handling the program controls and operations. These metadata stored in the directed graph will then be mapped to DOT markup language format for flowchart rendering using visualization tool, Graphviz. The prototype implemented in this work would facilitate the understanding of RPG legacy code during software maintenance process.

28

Qualification Paradigm for Independent Software Verification and Validation

Jangyeol Kim, Soongohn Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.305-312

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper describes the case of Independent Software Verification and Validation(V&V). As an example, verification and validation of the graphic recorder is introduced. Graphic recorder as a verification and validation paradigm describe the qualification approaching techniques and methods. Graphic recorder is a measurement data recording device with 5.5 inch TFT liquid crystal display instead of a paper. It mainly describes V&V criteria, testing approach, software verification methodology, techniques and procedures. However, hardware based equipment qualification (i.e. environment qualification, seismic qualification, and EMI/RFI qualification) has been excluded. The V&V methods for each phase of the software life cycle and V&V input-output tasks, with a focus on the processes are described. From the initial phase to the final phase of development, development and testing/verification were performed according to the software life cycle based on information engineering methodology. The suggested validation and verification paradigm is satisfied with SRP7/BTP-14 criteria, which is the digital software licensing standard for safety-critical system (for example, aerospace, railways, automobile and nuclear industry etc). The paper addresses the pass/fail criteria for each phase of the software life cycle referenced by hierarchical international standard framework.

29

Image Retrieval using Global and Local Image Features and DPGM Model

Wanhyun Cho, Inseop Na, Soohyung Kim, Soonja Kang

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.313-320

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we propose new image retrieval system using global and local image features and the Dirichlet process Gaussian mixture model (DPGMM). First, we considered global and local image features. Global features are color histogram, wavelet coefficients, and Fourier descriptors extracted from a given image. Local features are defined as both the histogram features of pixel values extracted from square image patches and descriptors such as SIFT extracted from the salient region having center points as affine invariant detectors. Second, we have modeled an observed image as the DPGMM, and we have investigated the variational Bayesian inference method which can be used to estimate the parameters of DPGMM. And then we have extracted two types of feature vectors from an estimated DPGMM to represent a given image. Third, the image retrieval is conducted by matching two types of feature vectors such as the probability density feature and the feature signature vector generated by DPGMM based on two kinds of distance measures. Finally, we have carried out experiments on two kinds of real images datasets in order to compare the performance between the proposed method and the existing methods.

30

Evaluation and Tuning Test of False Positive and False Negative using Static Analysis Non-Linear Method in JDBC

Shadrach Jabonir, Ford Lumban Gaol

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.3 2014.03 pp.321-338

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, it will be explained deeply in how to test the measurement of Bedighasan application which is used non linear static analysis medhod against Findbugs which is used static analysis too but it adapts linear code scan. Findbugs is able to detects many bugs pattern, but some parts are not quite accurately detected. It is called false positives when there is no bugs but the system raised warning. It is called false negatives if there is a bugs but the system didn’t raised warning. Here in this paper, with another method, will try to improve false negatives and also false positives. In this paper those 2 variabel will used as measurements. JDBC used as an area of testing because most of JDBC syntax will not seen error unless it executed. This method is needed to handle bugs pattern which is not able to be detected by standard compiler. In this paper will be shown about how bedhigasan will win the false negatives of findbugs and how bedhigasan will loose the false positives of findbugs. Because of the increasing level of awareness of bugs pattern, it decrease the false positives. This application is still need improvement in how mutting some detected bugs.

 
1 2
페이지 저장