2016 (266)
2015 (278)
2014 (298)
2013 (203)
2012 (72)
2011 (41)
2010 (25)
2009 (27)
2008 (39)
2007 (7)
Big Text Data Clustering using Class Labels and Semantic Feature Based on Hadoop of Cloud Computing
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Clustering of class labels can be generated automatically, which is much lower quality than labels specified by human. If the class labels for clustering are provided, the clustering is more effective. In classic document clustering based on vector model, documents appear terms frequency without considering the semantic information of each document. The property of vector model may be incorrectly classified documents into different clusters when documents of same cluster lack the shared terms. To overcome this problem are applied by the knowledge based approaches. However, these approaches have an influence of inherent structure of documents on clustering and a cost problem of constructing ontology. In addition, the methods are limited to cluster suitable text document clustering from in exploding big text data on Cloud environment. In this paper, we propose a big text document clustering method using terms of class label and semantic feature based Hadoop. Class label term can well represent the inherent structure of document clusters by non-negative matrix factorization (NMF) based Hadoop. The proposed method can improve the quality of document clustering which uses the class label terms and the term weights based on term mutual information (TMI) with WordNet at a little cost. It also can cluster the big data size of document using the distributed parallel processing based on Hadoop. The experimental results demonstrate that the proposed method achieves better performance than other document clustering methods.
On-the-fly Race Detection for Structured Fork-join Parallel Programs
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.11-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
It is still difficult and cumbersome to locate where a program runs into data races, because they may lead to unpredictable results of the program. To detect data races occurred during an execution of parallel programs, previous work provides large runtime and space overhead or focuses on reducing false positives. Thus, the prior detectors are still imprecise and inefficient, when applied to large scale parallel programs. This paper presents an efficient data race detection technique, called EDP that analyzes conflicting accesses to every shared memory location. Our technique precisely reports data races because it guarantees to locate at least one data race for each shared memory location, if there exists any, and provides a significant improvement of efficiency as O(1) space and time overheads for each access history.
Issues Related to the Detection of Source Code Plagiarism in Students Assignments
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.23-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Detecting similarity or plagiarism in the academic research publications, source code, etc. has been a long time complex and time consuming task. Several algorithms, tools and websites exist that try to find plagiarism or possible plagiarism in those human creative products. In this paper we used source code plagiarism detection tools to assess the level of plagiarism in source codes. We also investigated issues related to accuracy and challenges in detecting possible plagiarism in students’ assignments. In a second study, we evaluated some tools against detecting possible plagiarism in research papers. Results showed that such process or decision is not binary to make and that subjectivity is high. In addition, there is a need to tune plagiarism detection tools to give criticality or weights by users of those tools to categorize and classify different levels of seriousness for committing plagiarism.
Clock Synchronization of Pseudolite Using Time Transfer Technique Based on GPS Code Measurement
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.35-40
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Pseudolite is a contraction of the term pseudo-satellite, used to refer to something that is not a satellite which performs a function commonly in the domain of satellites. A pseudolite is installed on the ground, which sends the same waves as those from a GPS satellite to enable positioning in locations where it is difficult to receive the waves from GPS satellite, such as between tall buildings, underground, and indoors. The pseudo-range measurement accuracy of pseudolite depends on the performance of clock synchronization between pseudolite and GPS satellites. This paper proposes clock synchronization algorithm for pseudolite. It is a revision and improvement of the time comparison technique based on GPS code transfer in order to determine the UTC.
A Framework of Cloud service Quality Evaluation System – Focusing on Security Quality Evaluation
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.41-46
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cloud service, a new internet business, is expected to lead the innovation of paradigm and continuously grow as a future growth engine, but various barriers are occurring that hinder the vitalization of the business such as security, cost, backup, performance and reliability related to the service adoption and usage. In the current circumstance where alleviating the market barriers in advance is desperately needed to adopt and spread cloud service, this paper proposes a framework of cloud service quality evaluation system that allows users to select cloud services with confidence. This paper focuses on security quality of cloud service quality evaluation system. Especially, the requirements of security quality for inspecting and monitoring the security vulnerabilities are defined and specialized in virtualization layer of cloud service infrastructure. The outcomes of this paper are expected to be used as guideline to develop the cloud service quality evaluation system. It also provides the cloud service quality evaluation procedures and tool development method.
Combining Flash Codes for Write Deficiency Reduction
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.47-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Flash codes are designed to write and read information from a flash memory device. The performance of a flash code is often described in terms of write deficiency. Flash codes with low write deficiencies help lengthen the lifespan of flash devices. This paper describes a technique for combining the Index-less Indexed Flash Code (ILIFC) and the Layered Index-less Indexed Flash Code (LILIFC) in order to decrease the write deficiency. Two resulting flash codes are proposed: the Bi-Modal Flash Code (BMFC) and the Two-Split Bi-Modal Flash Code (BMFC2). These proposed flash codes have an asymptotic worst case write deficiency of O(k2q + n/k), and through computer simulation are shown to have significantly lower average write deficiency compared with the ILIFC and LILIFC.
A Video Compression Method using Block Information
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.61-66
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, computer network infrastructure is commonplace and internet user increase. Transmission bandwidth for network traffic is increasing and the type is varied such as real-time video. Video traffic occupies much volume among Internet backbone traffic, transmission bandwidth and quality of service (QoS) of other network application such as web, email cannot be guaranteed. In this paper, we propose a block information-based video compression method. The proposed method uses scenes, memorial/non-memorial blocks, and SIFT parameters as compression structure, compression units, and a compression method, respectively. This electronic document is a “live” template. Experimental results showed that the proposed method has better performance than H.264/AVC main profile in objective quality, compression ratio.
Supermode Transmission for MIMO-based Wireless Communications with Limited Feedback
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.67-74
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a limited feedback transmission based on precoding mechanism for multiple-input multiple-output (MIMO) systems, referred as to supermode transmission. With a fixed data-rate, it allows different degree-of-freedom (DoF) depending on the current channel state information (CSI) and different transmission scheme with the same DoF. Through numerical examples, we show that the pairwise error probability (PEP)-based criterion outperforms the conventional criterion based on minimum eigenvalue (ME) of the received signal matrices, and the supermode transmission improves performance over both multimode MIMO (MM-MIMO) and multimode space-time block coding (MM-STBC), in particular, at low SNR regime.
Assessing Package Reusability in Object-Oriented Design
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.75-84
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper computes reusability at the package level. To obtain the package reusability, authors has considered four design size package metrics. These metrics are then mapped to the Object-Oriented design properties: cohesion, coupling, messaging and the design size. The package reusability is empirically validated through three successive versions of the JFree Chart.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.85-90
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The development of Internet technologies and computer devices make it possible to move communication space from the real world to virtual worlds. Thus, there is an increasing need for virtual communication or virtual collaboration tools which enable users to communicate or work with others in virtual space wherever and whenever. In this paper, we propose an Internet-based virtual collaboration system supporting multimedia presentation. The proposed system provides two main functions. One is a content authoring function for creating multimedia presentation and the other is a virtual collaboration function for offering conferences that helps users exchange their opinions. The authoring function uses Synchronous Multimedia Integration Language (SMIL) that integrates and synchronizes media objects such as text, images, and video. While making a multimedia content, text or drawing can be used as annotations over images in layered architecture. In virtual collaboration, users can use digital images and spatial data elements which are used to represent users’ opinions and areas of interest in images. From conferences, users’ opinions along with coordinate information can be stored into XML database using Unstructured Information Management Architecture (UIMA).
Fringe Analysis for Photoelasticity Using Image Processing Techniques
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.91-102
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In research of photoelasticity, photoelastic fringe patterns are obtained through a circular polariscope with different optical arrangements and they are processed with image processing techniques in a personal computer. Image processing techniques are reviewed and discussed for stress analysis of the photoelastic fringes in this paper. The image processing techniques include fringe sharpening, fringe multiplication, and 8-step phase measuring technique. Gradient descent process is used for fringe sharpening. In fringe multiplication, fringes are multiplied twice for limited fringe order. 8-step phase measuring technique is used to separate isoclinics and isochromatics. The results of image processing techniques show that they are quite useful for stress analysis in photoelasticity.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.103-114
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In a previous study we proceeded to the remodularization architecture based on classes and packages using the Formal Concept Analysis (FCA) [2, 13, 14], we then got two possible remodularized architectures and we explored the issue of redistributing classes of a package to other packages, we used an approach based on Oriented Graph to determine the packages that receive the redistributed classes and we evaluated the quality of a remodularized software architecture by metrics[1]. This paper presents the usefulness of relational concept analysis (RCA) for remodularization of a software architecture composed of classes and packages and we evaluate the quality of the result by metrics of coupling and cohesion.
Experimental Evaluation of an Expert System for Travel Recommender Systems
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.115-128
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Gaussianly Centered Median and Moving Average Filter
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.129-136
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A Gaussianly centered median and moving average filter is proposed for the removal of impulse noise for digital color images. The filter needs two pre-designed filters, median filter and moving average filter mean. The average value of both filter outputs is centered for Gaussian function. The purpose of proposed filter is to correct the pixels where the color components are corrupted by salt and pepper noise. Simulation results prove the feasibility of the proposed method. We compare with three conventional noise removal approaches by visual and numerical metrics.
A Framework to Measure and Visualize Class Coupling
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.137-146
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An important design principle for object oriented systems is to keep classes loosely coupled. Software developers should be aware of the current status of coupling between classes in order to keep control on the quality of the design. This paper presents a framework to automatically measure and visualize class coupling for object oriented projects to help developers to monitor couplings. The coupling is automatically calculated for a class by parsing its source code and counting the number of uses of other classes. The framework provides developers with options to select any package in a project to visualize coupling of its classes. The results help software developers in observing the degree of class coupling in different packages. Moreover, the generated views are useful in enabling developers to understand and compare class coupling. The proposed technique extracts classes of software projects and then generates a coupling report status for each class.
Research Trends on Graph-Based Text Mining
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.147-156
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Since text mining has been assumed to apply for unformatted text (document), it is necessary to represent text with simplified models. One of the most commonly used models is the vector space model, in which text is represented as a bag of words. Recently, many researches tried to apply a graph-based text model for representing semantic relationships between words. In this paper, we surveyed research trends of graph-based text representation models for text mining. We summarized the models, their features and forecasted further researches.
Visualization Tool for Debugging Data Races in Structured Fork-join Parallel Programs
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.157-168
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Ensuring the reliability of structured fork-join parallel programs is difficult because the potential for subtle interactions between concurrent threads can cause concurrency bugs, such as data races, which are hard to detect, reproduce, and eliminate. The visualization for the executions of the programs may offer effective debugging environments with intuitively understanding. Unfortunately, visualization techniques for structured fork-join parallel programs still also difficult to represent and analyze the information of programs executions, because the information for analyzing thread executions and relevant events to data races are increased exponentially in proportion to maximum parallelism of the program. This paper presents a visualization tool that offers overall information for detecting data races by grouping and abstracting thread executions and accesses to shared variables. Moreover, the tool provides an effective approach to debug data races by indicating locations of the defects.
Selection of Web Services by Using Diversified Service Rank
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.169-180
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Traditional techniques for web service discovery mostly rely on string matching and/or semantic logic-based matching. They are generally developed on service description and functional attributes which are exposed in service advertisement. The selection is made from the result output which is typically presented in order of their ranks based on degree of match of functional or operational parameters. The QoS attributes such as service performance, reliability, reputation, price and user preferences are often ignored in the query. Moreover, it is very difficult for the requester or any software agent to select the best service out of many potential candidates from the search result. This paper proposes a framework that takes into account QoS attributes along with user preferences and devise an algorithm namely Diversified Service Rank (DSR) and re-ranks top k web services in the search result, this helps service requesters in prompt selection and composition of web services.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.181-186
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the ship and marine industry, especially the offshore outfitting design requires variable software tools and an amount of complex and unstandarized engineering data rather than conventional ship outfitting design. Due to their variety and complexity, the existing engineering methods tend to waste time in searching for the standardized method and knowledge or to cause errors on tasks. Generally, these kinds of system have serious problems. The most serious one among them is that the existing system consists of both useful and useless data. This finally leads engineers to a failure in finding out useful information from the system. The most serious one among them is that the existing system consists of both useful and useless data. This finally leads engineers to a failure in finding out useful information from the system. We have designed a standardized framework, which enables users to properly recompose the menu form depending on the task process, simplifies the methods at several process levels and provides a more intuitive method in user interface environment in order to resolve the existing problems, minimize the system-operating costs, and improve the efficiency of the offshore outfitting engineering tasks.
A Festival Satisfaction Evaluation Method using Multiple Regression Analysis
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.187-196
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Different festivals are being held following the implementation of the local autonomy system. These festivals are having significant influences on the image enhancement of the regions holding the festivasl as well as the local economic stimulation. In terms of economic, social, and cultural perspectives, festivals have positive effects on the local society and are acting as resources for new opportunities in area development. In order for the festivals to be successful, preparation and efforts are needed to enhance the satisfaction of the festival spectators. This paper derived the evaluation factors which have influence on the festival satisfaction of spectators from the planning stage and constructed a study model. Then, regression analysis was applied for suggestion to be made on the evaluation of festival satisfaction.
Enhancement of UWE Navigation Model : Homepage Development Case Study
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.197-212
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
UML-based Web Engineering (UWE) is a web engineering methodology which provides a systematic approach to development of web applications. It provides a UML extension, defining modeling elements considering the extension mechanisms that are offered by UML. Navigation model is presented as a very critical characteristic in all the hypermedia and web methodologies; also homepage one of the most important pages on the web sites, because it is the key to showing the quality of websites. The UWE navigation model defined as a new proposal meaning still now need it to improve, the problem is elements of the UWE navigation model until now cannot support modules of the homepage especially new modules as Tab, Flash News, Main Menu, Frame, Multi Data and Application Icons, meaning it has weaknesses, in this paper we enhance the UWE navigation model through defining six elements by using an extension mechanism to fully support homepage development.
The Flexible Optical Links with Dispersion Management and Optical Phase Conjugation
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.213-222
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
It is required to suppress or mitigate the optical signal distortion due to group velocity dispersion and optical Kerr effects in ultra-high speed and long-haul transmission systems. Dispersion management (DM), optical phase conjugation (OPC), and the combination of these two are promising techniques to compensate for the signal distortion. The goal of this paper is to investigate the possibility of the non-uniform distribution of residual dispersion per span (RDPS) or single mode fiber (SMF) length of the fiber spans in the optical links with DM and the OPC for implementing the flexible optical network configuration. We confirm that the random distribution of RDPS or the SMF length among the non-uniform distributions is the most suitable DM scheme for implementing the flexible optical link configuration, because the effective net residual dispersion (NRD) range of the conventional(uniform) distribution and the random distributions are not significantly different.
Kazakhstan Perspectives on ERP System Implementation
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.223-232
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The main purpose of this study is to explore what are the critical factors in implementing enterprise resources planning(ERP) system in the Republic of Kazakhstan. Theses critical factors are expected to be utilized in design and implementation of ERP systems in Kazakhstan. The survey has been conducted by distribution of questionnaires focusing on local companies. The respondents were two groups, group A being professionals and managers while group B being end users. It has been found that most of the respondents are aware of the ERP system while their companies were implementing or had implemented the ERP system. Based on the results of the study it is noted that despite some difficulties in identifying right target for the survey overall positive impression was observed, as most projects were implemented successfully. The research has limitations as the sample size is only 100 respondents, not randomly selected, and questionnaires were sent by email to people chosen by the convenience. Thus this factor might have affected a lot to generalize the findings of this study. This study concludes that the ERP system is becoming widespread in Kazakhstan although mainly among large companies, and there are some constraints for the wide implementation of the system such as the cost, lack of commitment from whole organization, education and training and on the perception of implementing ERP as a whole.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.4 2014.04 pp.233-242
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper describes safety-critical software qualification methods and its approach, which corresponds to well-structured qualification organization, methods and results, software quality assurance, and software configuration management. This paper also describes the verification test environment, test components and items, a traceability analysis, and system tests as a result of software qualification based on Software Requirement Specifications (SRS) for a safety-grade optical modem of a Core Protection Calculator (CPC) in a Korea Standard Nuclear Power Plant (KSNP), and Software Design Specifications (SDS) for a safety-grade optical modem of a CPC in a KSNP. We believe that we achieve the functionality, performance, reliability, and safety, which are the software qualification objective goals of safety-critical systems.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.