2016 (266)
2015 (278)
2014 (298)
2013 (203)
2012 (72)
2011 (41)
2010 (25)
2009 (27)
2008 (39)
2007 (7)
A Study on the Analysis of the Effectiveness according to Buffer Size of Storage
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.1-14
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Most of the present DMBSs have parameters to set the size of data buffer caching in a memory, and disc I/O can be reduced, as the buffer size is greatly reduced, because data pages caching in a buffer increase. Whereas greatly setting this parameter value makes a memory occupy a system excessively, and the buffer pool may be swapped by system's operating system.This article compared and analyzed efficiency of each storage medium, by changing the size of data buffer caching in a memory, after connecting DBMS with a storage medium. According to the result of the test, both performances of storage media increased, as the buffer size was greatly reduced. Seeing that D-SSD's performance and HDD's performance changed from above 1GB and 2GB, respectively, it is supposed that there is no need to cut down the buffer size infinitely, because performance doesn't change from a certain section, although it improves, as the buffer size highly decreases. It isn't necessary to expand the buffer size greatly under the small load, since there was no change of performance, even when the buffer size was greatly increased under the small load. While D-SSD also can maintain its performance without any big change, if it exceeds the scope of capacity that the buffer can process, HDD shows a considerable reduction of performance. Therefore, it is likely that unlike HDD, for D-SSD, tuning the buffer size isn't needed. However, there is a need of conducting a test in an actual service environment in future, because these results came from the test in a single server.
Emotion Recognition from Speech Signals using Fractal Features
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.15-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In early research the basic acoustic features were the primary choices for emotion recognition from speech. Most of the feature vectors were composed with the simple extracted pitch-related, intensity related, and duration related attributes, such as maximum, minimum, median, range and variability values. However, researchers are still debating what features influence the recognition of emotion in speech. In this paper, we propose a new method to recognize the emotion from speech signals using fractal dimension features. The fractal feature indicates the non-linearity and self-similarity of a speech signal. For classification and recognition purposes we used the Support Vector Machine technique. In our experiment, a standard database, the Berlin Emotional Speech Database is used as input to measure the effectiveness of our method. By using these features, the obtained results indicated our approach has provided a recognition rate approximate 77%.
Collaborating Agent fora Device Management System
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.23-28
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, a collaborating agent for a device management system is proposed and implemented. The agent can be a program installed in mobile devices, PHDs, or other terminals. The agent can measure, sense or generate data to transmit to the system to which it belongs. The system consists of agents including P2P clients and P2P hosts, and an Agent server. Every P2P client must be entered into at least one lobby to participate in collaboration processes. Being in a lobby, a P2P client can communicate or collaborate with others via the P2P host thatis in charge of the lobby. Implementation details for the agent are described and the results of the implementation are discussed. The agent implemented is applied to a game simulator system where a terminal is a game simulator. Snapshots captured during its execution indicate that the agent is working as designed.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.29-42
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
E-Government offers a new electronic channel by means of which citizens and government ministries can interact with one another, unconstrained by the locations and schedules; and thereby improving government effectiveness. However, realizing this vision is strictly depending on the ability of diverse computing systems owned and managed by different government ministries to be able to interact together across all ministerial boundaries. This ability is known as e-government interoperability. Since ministries have built their computing systems independently with specifications and solutions relevant to their particular needs but without adequate attention to the need to interact with other ministries systems, this has result in a patchwork of heterogeneous computing solutions that have limited coherence and are largely uncoordinated.Therefore, during the last few years, e-government interoperability has been an important research area. To this direction, although several approaches have been proposed, all these approaches would be insufficient since they are theoretical solutions and technically focused. In this paper low level e-Government architecture is proposed driven by Service Oriented Architecture (SOA) to solve the architectural problem in achieving seamless e-government interoperability. This architecture acts as unifying architectural vision and helps in finding a common understanding of e-government and its realization.
Architecture Approach for Mobile Service Security
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.43-52
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile computing is a relatively new field. While the challenges arising from mobility and the limitations of the portable devices are relatively well understood, there is no consensus yet as to what should be done to address these challenges. A comprehensive solution has to address many different aspects, such as the issue of dynamically changing bandwidth, the power, computational, and other limitations of the portable devices, or the varying availability of services in different environments. A Mobile service is pro-grammable application logic accessible using standard Internet protocols. In this paper, we present our architecture for such adaptive mobile service security applications. We motivated the architecture by classifying likely mobile applications and identified common properties. The architecture intends to be more general than previous work with respect to adaptability, flexibility, and user mobility. We developed various pieces of the overall architecture and collected some preliminary experience with adap-tive mobile applications. We give an overview of the intersection of the areas of software architecture and mobile applications. We consider the mobile applications, which represent the computing functionality designed to migrate across hardware devices at runtime and execute on mobile hardware platforms, and the mobile systems, which are computing applications that include mobile software and hardware elements.
Analysis of User Experience Quality on Responsive Web Design from its Informative Perspective
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.53-62
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study aims to assess the user experience quality of responsive web design on mobile devices. Data were collected from 156 students at Universitas Indonesia, who were asked to evaluate user experience of web design on one of the following scenarios: responsive web design in both desktop and mobile device environment and nonresponsive web design in mobile device environment. The user experience quality was measured by looking at the number of clicks and scrolls as well as information quality that has been experienced by user. The results of the ANOVA test proved that responsive web design was able to maintain the user experience quality of website on home functionality, content readability, and enjoyment using website but not on the information architecture. In addition, responsive web design was also proven to reduce the amount of scrolling when reading content. However, responsive web design required more scroll and click than nonresponsive one when exploring its information architecture.
Histogram-Based Color Image Transformation Using Fuzzy Membership Functions
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.63-72
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper describes a novel color image enhancement method using fuzzy membership functions. We use three well-known fuzzy membership functions smf, sigmamf,and trapezmf for fuzzy logic. The shape of the membership functions used in fuzzy logic is formed in an versatile fashion in accord with the given parameters. By applying fuzzy process and defuzzification, we acquire a relationship between input and output values. Simulation results indicate that the proposed method yields satisfactory results in all test images.
A Study of Affecting the Purchasing Intention of Social Commerce
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.73-84
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The informationization is recognized due to the expansion of the development of the Information Technology and internet utilization as the important means doing the growth momentum role of all industries today. While the Information Technology developed and the network infrastructure develope, the environment which can gain the there was no restriction in the hour and space desired information by using Internet was equipped. This research analyse the relationship with the feature of the web usability and Social commerce. Therefore, this research tries to investigate the relationship about in which the characteristic of the website usability is connected through the confidence about the Social commerce site to the re-purchase. The existing research that the information system and Electronic commerce relates is considered and the usability factor about the Social commerce site tries to be drawn and these try to verify on the relationship with the trust building of the user about the Social commerce site and purchasing intention through the positive research. The result of looking into the effect that it reaches to the purchasing intention of the Social commerce user based on the web use factor and Social commerce site is designed and run and the web use factors can know to be the factor to consider importantly. The importance of the web use factor to has preferentially to be considered in being put through this research and building the confidence of the Social commerce user could be known. When running with the Social commerce site design, this is determined because it can become the useful standard.
An Exploratory Study on Agile based Software Development Practices
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.85-114
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Agile based software development approach is increasingly gaining much interest among software practitioners and researchers due to its ability to produce high quality software in shorter period of time. Even though its importance has been revealed, only few studies were conducted regarding its current practices in the software industry, particularly in Malaysia. Thus, an exploratory study was conducted among software practitioners in Malaysia to study their practices and perceptions on the agile based software development in the real-world projects. Moreover, the practices were covered in a wider perspective by considering the software development, management and documentation practices. This paper discusses the findings from the study, which involved 73 agile practitioners. Structured questionnaire was used for data collection purpose while statistical methods such as frequency, mean, and cross tabulation were used for data analysis. Outcomes from this study reveal that the most implemented agile principles are early delivery and face-to-face communication, whilst the least implemented is self-organizing team. Additionally, majority of the respondents agreed that agile based software development practices are important in order to produce high quality software.
Electromagnetic Compatibility Analysis for the Railway Telecommunication Intra-subsystem
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.115-126
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents the electromagnetic interference and electromagnetic susceptibility characteristics of the railway telecommunication intra-subsystem. These are for assessing the electromagnetic compatibility inside the railway telecommunication subsystem and providing input data for electromagnetic compatibility analysis of other subsystems (intra-system analysis). This paper shows the optimal definition of electromagnetic characteristics of each intentional emitter and the assessment of its radiated power and electromagnetic fields. Moreover, the electromagnetic emission characteristics for all non-intentional radiators resulting from measurements, calculations or standard compliance are also included in this paper.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.127-138
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cloud computing is a computing paradigm of providing IT resources, such as infrastrcture, platform and application, in the form of service by using internet technology. In recent, cloud platform service is being used to establish the platform ecosystem of ICT service industry and ensure application agility. In spite of these trends, the market is not being actively revitalized due to sudden service interruption, users’ concern for failure or lack of compatibility between cloud systems. This paper proposes a reliable cloud service for providing objective, quantitative and measureable performance results on cloud service. In particular, this paper will define the scope for measuring the system performance of VM for IaaS among various areas of cloud service, while focusing on the area of requirements to deduce performance measurement items.
Examining the Effectiveness of Testing Coverage Tools : An Empirical Study
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.139-162
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Code coverage is one of the most important aspects of software testing, which helps software engineers to understand which portion of code has been executed using a given test suite throughout the software testing process. Automatic testing tools are widely utilized to provide testing coverage metrics in order to gauge the quality of software, but these tools may have some shortcomings such as the difference among the values of code coverage metric of a given program using different code coverage tools. Therefore, we designed and performed a controlled experiment to investigate whether these tools have a significant difference among the measured values of coverage metric or not. We collected the coverage data that consist of branch, line, statement, and method coverage metrics. Statistically, our findings show that there is a significant difference of code coverage results among the code coverage tools in terms of branch and method coverage metrics.
Effects of Learner Characteristics on Learning Outcomes in the Learning Situation Incorporating SNS
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.163-176
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study is conducted to know how the learner characteristics such as the goal-orientation, the self-efficacy, self-regulated learning (SRL) strategies and motivations of using social network sites (SNS) affect the learning satisfaction and academic achievement in the learning situation incorporating SNS. For the purpose of the study, we conducted a SNS-integrated Chinese language course for six weeks on 33 undergraduate students, and then we distributed and retrieved questionnaires in offline circumstances. After excluding three insincere survey papers, 30 survey papers were analyzed. We used SPSS 19.0 Statistics Solution for the correlation analysis and the multiple regression analysis. The results are as follows: first, there is a significant correlation between the learners' SRL strategy and the learning satisfaction; however, the goal-orientation, the self-efficacy and motivations of using SNS do not affect the learning satisfaction in the learning situation incorporating SNS. Second, learners' self-efficacy shows effects on the academic achievement in the SNS learning situation; however, learners' goal-orientation, SRL strategies and motivations of using SNS do not affect the academic achievement. The result hints the need for considering learners' SRL strategies in order to raise the learning satisfaction and it also inspires the need for teaching strategies for enhancing self-efficacy in order to raise the academic achievement.
Replace Missing Values with EM algorithm based on GMM and Naïve Bayesian
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.177-188
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In data mining applications, there are various kinds of missing values in experimental datasets. Non-substitution or inappropriate treatment of missing values has a high probability to cause a lot of warnings or errors. Besides, many classification algorithms are very sensitive to the missing values. Because of these, handling the missing values is an important phase in many classification or data mining task. This paper introduces traditional EM algorithm and disadvantage of the EM algorithm. We propose a new method to implement the missing values based on EM algorithm, which uses Naive Bayesian to improve the accuracy. We conclude by classifying seeds dataset and vertebral columns dataset and comparing the results to those obtained by applying two other missing value handling methods: the traditional EM algorithm and the non-substitution method. The experimental results prove a stable algorithm for improving the data classification accuracy on large datasets, which contain a lot of missing values.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.189-204
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Nowadays, the number of mobile device and Internet users is increasing significantly. The growing of sophisticated technology has eased people’s productivity. However, in the other hand, security risks have also grown without an equal degree of awareness of the society. The objective of this research is to design and develop an Android application that is able to draw a topology of a network and do a simple security assessment towards a host in order to detect host's vulnerability. The information gathered will be presented in a PDF report and can be used for maintenance purposes. The application will have wizard feature, where the user can analyze network and discover an underlying vulnerability with guided steps. The methodology is interview, literature study, observation and system design using object oriented approach. DroidGlance, an Android application that can draw a wireless network topology generator and help security tester analyze a host's vulnerability. The application main feature are Topology generator, Ping, Traceroute, Port Scanner, Vulnerability Checker, and Listen. These features are tested. These features are able to run well. However, they need several improvements for future development.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.205-218
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Bargaining game analysis using metaheuristics has been drawing attention in recent years. This paper presents the interaction and co-evolutionary process between two kinds of metaheuristics-based agents, genetic algorithms (GA-based agent) and particle swarm optimization (PSO-based agent), in a bargaining game. Game performance with regard to payoff and deal rate through the interaction and co-evolution of agents is studied. The experimental results show that the PSO-based agent outperforms the GA-based agent in the bargaining game.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.219-230
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As new servers have been introduced and installed in a computer room which already has various servers, many problems, such as a lack of room space, a lack of rack space, and a rise in power consumption, have arisen. The increasing number of operators and rising cost of maintenance caused by the problems lead into a rise in IT expenditure for the computer room. To solve the problems, server integration & virtualization technology, which is used to save power consumption and space and reduce maintenance cost, has gradually been expanding. In this paper, old six UNIX servers were integrated into two in the virtualization process of UNIX servers, in which one partition (DLPAR) per server was created, and more than three DB instances were generated in the created partition for DBMS. As a result, multiple physical servers were made as integrated virtualization servers which ended up solving the space problem in a computer room, securing a rack space and increasing the efficiency of a thermo-hygrostat. More specifically, the server integration & virtualization process brought about the following saving rates: 72% of rack space (U) in a computer room, 90% of power (W), and 59% of cooling (BTU).
Investigation of Parameter Estimation of a Car-Trailer System Using Condition Numbers
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.231-242
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this research we investigate condition numbers obtained from least squares estimation for a car-trailer system to characterize estimation performance. In this case, we can select better parameter estimation methods or well-posed measured data sets for the car-trailer system using condition numbers. We calculate condition numbers from several different linear model-based least squares methods which use four linear regression models and three least squares methods to estimate trailer parameters. We also consider three different observed data sets in ideal and non-ideal sensor scenarios for simulation tests.
Automatic Mobile Translation System for Web Accessibility based on Smart-Phone
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.243-248
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As mobile devices like smart phone prospers, the necessity of mobile web pages is ever increasing while the traditional web services are performed with the existing web pages. To satisfy the those requirement, this paper introduces an automatic mobile translation system that can examine the legacy web pages and produce new mobile web pages in accord to the web accessibility. For this purpose, the regulation for the web accessibility should be built first and the recommendation for a new web page would be performed based on the regulation by the system.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.5 2014.05 pp.249-260
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The Smart Cross Platform was developed by our research team as a platform based on virtual machines for smart devices. It is composed of three parts; compiler, assembler and virtual machine. It supports C/C++, Objective-C and Java programming languages for contents development. Contents made of each language are converted to an intermediate code by the compiler. The SIL (Smart Intermediate Language) has been designed as a standard model of virtual machine codes for ordinary smart phones and embedded systems. It is a set of stack based commands which has the characteristics of language independence, hardware independence and platform independence. It is used as intermediate code which can accommodate procedural language and object orientated language. Intermediate code is converted to execution format by the assembler and executed in the Smart Virtual Machine. The SVM (Smart Virtual Machine) is a stack based virtual machine solution, loaded on smart devices, which allows dynamic application programs to be downloaded and run platform independently. In this paper, we present the virtual machine code based the compilers for the SVM. This makes the existing mobile contents to be ported quickly, and to be executed to a different platform.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.