Earticle

현재 위치 Home

International Journal of Software Engineering and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • pISSN
    1738-9984
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.8 No.7 (17건)
No
1

Newton Interpolation for Quincunx Arrayed Image

Gwanggil Jeon

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.1-12

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we use Newton’s polynomial for image upsampling, especially quincunx arrayed image. The Newton interpolation is entitled after its inventor Isaac Newton, which is polynomial for a provided set of data points. This formula is important because Newton interpolation is a simplified version of Taylor interpolation. The only difference is Newton polynomial used finite differences. Simulation results are provided. Three conventional methods such as nearest neighbor, bilinear and bicubic are compared with the proposed method. It can be concluded that the proposed method yields the best performance.

2

Detecting First Races using Trace and Replay for Parallel Programs with Random Synchronization

Hee-Dong Park, Yong-Kee Jun

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.13-22

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Debugging multithreaded or parallel programs is a hard problem due to unintended non-deterministic results of the program, called data races. Previous race detection techniques have limitations of coverage for synchronization constructs in detecting first races for parallel programs with random synchronizations. We present, in this paper, an efficient two-pass algorithm to detect the first races in a particular execution of parallel program, by eliminating independent accesses to make a performance gain and candidate accesses, and then analyzing the traced information with candidate accesses by replaying the program. Therefore, our technique makes the race detection more practical in debugging parallel programs which have random synchronizations.

3

Spherical Self-calibration of Cameras Characterized by Varying Intrinsic Parameters

A. Baataoui, N. El Akkad, A. Saaidi, K. Satori, Med. Masrar

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.23-40

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we present a method of self-calibration of a CCD camera with varying intrinsic parameters by an unknown three-dimensional scene. The advantage of this method lies in the fact that the estimate of the intrinsic camera parameters is performed by using two points in the three-dimensional scene and only two images, in addition, this method does not require constraints on the scene or on the cameras which shows that our approach minimizes the constraints on the self-calibration system. We show that the non-linear cost function is based on the relationship between the projections of two points of the scene in the two images used and the images of the absolute conic. The intrinsic parameters of camera can be obtained by minimizing a non-linear cost function that is based on two steps: initialization and optimization of the cost function. The theoretical analysis and the experimentations on synthetic and real data show that this method of self-calibration is robust in terms of stability and convergence.

4

Investigating Effectiveness of Software Testing with Cause-Effect Graphs

Insang Chung

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.41-54

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Cause-effect graphs can be used for specifying safety critical systems including avionics control software that are often intended to satisfy Boolean expressions. While Boolean expressions are useful to model predicates and complex conditions for state transitions, it is also true that they are very error prone to introduction of faults. Even though many Boolean specification based testing techniques have been proposed to detect faults of implementations of such specifications, there is almost no research about experimental investigation of the effectiveness of testing techniques with cause-effect graphs. In this paper, we present a new fault model which encompasses a variety of fault classes being hypothesized on the cause-effect graph. We have developed a tool to generate faults according to the fault model and to determine if a testing technique can detect those faults. We show a case study where experimental assessment of testing effectiveness using two testing approaches, namely Meyers’ approach and combinatorial testing, has been carried to examine the applicability of our fault model based on the cause-effect graph.

5

Layout Optimization in Flexible Manufacturing System using Particle Swarm Optimization in Matlab

Mani Shivhare, Sunita Bansal

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.55-64

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

FMS ensures quality product at lowest cost. Layout arrangement of flexible manufacturing system is important to achieve high productivity. In this paper the design of loop layout in Flexible Manufacturing System is discussed. The objective of the loop layout problem is to determine the order of machines around a loop, and to minimize the automated guided vehicle movement. Particle Swarm Optimization technique is proposed to optimize the flexible manufacturing system layout. This paper also discusses the movement of AGV around the loop layout. AGV movement is considered as bidirectional. The clearance between the machines is also considered in the Flexible Manufacturing System loop layout that produces result which will be optimized.

6

Constructing Node (Edge) Disjoint Paths on the Petersen Graph

Jung-hyun Seo, Myeongbae Lee, Jongseok Kim, HyeongOk Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.65-72

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In a (d, k)-graph problem, the Petersen graph has a maximum of 10 nodes at degree 3 and diameter 2. Using the Petersen graph, a folded Petersen cube network, a hyper-Petersen network, a cube-connected Petersen network, a cyclic Petersen network, a Petersen-torus network and a 3D Petersen-Torus network have been suggested. In an interconnection network, a disjoint path is an important research topic for efficient and reliable routing. In this study, a disjoint path on the Petersen graph was analyzed so that it could be applied to construction of a disjoint path in a network to be made using the Petersen graph or one to be developed in any other way. It was demonstrated that three-node disjoint paths can be constructed between any two nodes (one-to-one), and that node disjoint paths can be constructed between any one node and any three nodes (one-to-many). The maximum nodes disjoint path in the Petersen graph is three. The length of every disjoint path was not greater than the Petersen graph diameter plus two, and node disjoint paths were edge-disjointed.

7

Model-Driven Generation: From Models to MVC2 Web Applications

M'hamed Rahmouni, Samir Mbarki

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.73-94

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Transformation is one of the prominent features and the rising research area of MDA (Model Driven Architecture) since last few years. MDA is a new paradigm of software engineering that considers models as first-class entities. Indeed, techniques of model transformations may be implemented to automatically generate elements of the system from models. In this paper, we have conducted a new technique of model transformation to generate the code of web application. This technique is based on the combination of diagrams. In this latter, we focus on the combination of the UML class diagram and the UML sequence diagram. This technique of transformation is defined by an algorithm. In this algorithm, we consider only the operations belonging to the two diagrams already combined. Practically, we transform only the operations that have a sequence diagram and belong to the class diagram. This algorithm is appeared in transformation rules. These rules are written in ATL transformation language. The objective of these rules is to generate an MVC2 web model. The generated model is used as an input file of JET template in order to generate anapplication web code. Also; it presents a case study to illustrate this proposal.

8

This paper designs the model of bibimbap restaurant recommendation system in BigData(collected from Twitter's data related to bibimbap). We suggests a TCA (Termite Colony Algorithm) k-means algorithm for clustering BigData, TCA algorithm that used the habits of termites. Through the TCA, finding the appropriate initial clustering needed for the K-means clusters is the goal. We recommend good Bibimpop restaurant to user, using "Bibimbap Restaurant database of Korea (2012)" and an "Taste Adjective Dictionary for the Globalization of Korean Food" for Ranking Algorithm.

9

Web 2.0 and Collaborative Software Development

Dr. JavedFerzund, RobailYasrab, SaadRazzaq

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.107-120

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Effective communication and collaboration are among the most important elements of software development lifecycle. Especially, when software is developed online using development networks, it becomes more critical to incorporate effective communication and collaboration facilities all through software development process. These days web 2.0 based technologies offer a lot of support for communication and collaboration. These technologies are helpful in improving the process of software development by offering excellent support for communication and collaboration. The basic objective of this study is to assess and investigate the influence of effective communication and collaboration tools/facilities on the online collaborative software development. We establish nine hypotheses to analyze the relationship of web 2.0 based communication tools and software quality. We have found that online collaborative software development based on web 2.0 communication tools like blogs, instant messaging, project news and RSS feed etc. shows significant improvement in the software product and process quality.

10

An Empirical Analysis on the Performance Factors of Software Firm

Moon-Jong Choi, Jae-Won Song, Rock-Hyun Choi, Jae-Sung Choi

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.121-132

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The purpose of this study is to examine the factors influencing performance of software companies. This model tests various theoretical research hypotheses related to innovation, standardization and technology marketing strategy and software type. Smart PLS (Partial Least Square) have been utilized for deriving the study results. The result of hypothesis testing is as follows. First, standardization and technology marketing strategy positively influence financial performance. Second, innovation, standardization and technology marketing strategy positively influence technical performance. Finally, mobile and non-mobile software companies was shown that innovation, standardization, and technology marketing strategy has different effects to financial and technical performance.

11

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

I. Mourtaji, M. Bouhorma, M. Benahmed, A. Bouhdir

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.133-148

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Through this paper we propose a new approach to fix the problem related to the deployment of SIP protocol in Ad Hoc Networks. In fact in an Ad hoc network context, there is no available centralized architecture to accommodate different key servers for SIP operations. The main idea of this new approach, which we have named VNSIP (Virtual Network for Session Initiation Protocol), is to self-organize the ad hoc network using a virtual backbone, and then this virtual network will be used as architecture to ensure dierent roles of SIP entities. We have evaluated performances of our technique using comparison with TCA approach, which is considered as one of the most satisfying solution to adapt SIP to Ad hoc networks. During this paper we have treated the notion of QoS in MANET (Mobile Ad hoc Networks) as well. In fact we will explain, at the end of the comparison, that despite the fact that our solution offers overall better results than TCA, it nevertheless suffers from a high consumption of bandwidth, which forced us to enhance VNSIP performance regarding this constraint of bandwidth. Therefore we have designed a new algorithm to enhance QoS inside MANETs. We have named this algorithm MCAC (MANET Call Admission Control). This algorithm counts the number of simultaneous calls or sessions inside the MANET, and refuses the establishment of new sessions when a maximum number of simultaneous calls is reached. By this manner we can control the bandwidth of the MANET and consequently guarantee a good QoS.

12

Promotional Video of Editing Techniques Utilizing Color and Brand Balance

Hak Hyun Choi, Seung Ae Lim, Jung HeeKim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.149-158

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

When we make public relation videos in this paper, we study this research to apply color that not only stimulating digital technology but also analogue sensibility for marketing. If there is a core color, we could establish brand identity and remain in our memory and send core messages. Color has different meaning with culture and country but color also has universal characteristic. Because color effects human's emotions and sensibility, we apply color to public relation video. Using it, we studied the methods of extract just one color. In other words, the purposes of this study are definite experiment and materialization about the method of expressing analogue sensibility. So, this study expression effects to use color. In future wealso use this to consider development possibility and expectation effectiveness.

13

Detection of Recurring Clones Using Weighted Frequent Itemset Mining

S.Mythili, Dr. S. Sarala

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.159-176

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Code clones, the persistent program structures, are explored through a plenty of comprehensive techniques that sustain desirable software maintenance. Detecting the similarities of these code structures, classes, source files or directories ensure progressive development of code clones. There are adequate researches pursued in simple clones. These simple clones, recurrent in characteristics, perhaps, pave the way for the existence of much wider pattern of similarities addressed as structural clones. On the other hand, these structural clones embody large-granularity besides, the design-levels similar to program structures which are repeatedly mapped either to suit the need of designing or application of domain concept. In fact, identification of structural clones help easy comprehension of the system designing, aids software maintenance and authenticates re-engineering. The Identification and Unification of structural clones with generic program structures play a prime role in the comfortable reuse of the program. The strategy devised for this research explores the structural clones using Weighted Frequent Item-set mining (WFIM). WFIM explores the weighted frequent item-set in correspondence to a weight factor. These item-sets when identified for its recurrence in a source file or directory in same relationship are termed as structural clones. The execution of this technique discussed in this paper is performed through the two open source softwares in which the results are validated.

14

The Aspects and Prospect of E-book Industry in Korea

Jin-Young Kim, Jong Oh Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.177-184

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study aims to understand the present state of e-book business in Korea. As technologies advance, digital reading devices such as Kindle, Nook, and Sony Reader rapidly change existed printed-book market as well as creating a new market. However, on the contrary to the popular belief, the e-book market in Korea, one of the most wired countries in the world, still proves to be slow of foot regarding retail sales and e-book readers’ recognition compared to the U.S. market. Yet, it is projected that Korea’s e-book industry has potential to increase if necessary preparations are made into practice. Accordingly, this study will discuss the present and future of the e-book industry through the comprehensive surveys and researches and suggest possible solutions to improve it.

15

A New Cognitive Approach to Measure the Complexity of Software’s

Amit Kumar Jakhar, Kumar Rajnish

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.185-198

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In software industries, the most important parameter is the exact measurement of the effort at the early phase of the software development life cycle. To estimate the effort is difficult due to dynamic behavior of the software. The basic need for this is the clarity in the software requirements like size, complexity of the project, human resource power etc. which is not correctly determined most of time. This paper presents a new cognitive complexity measures named it: New Cognitive Complexity of Program (NCCoP). First, the proposed metric is analytically evaluated against weyuker’s property for analyzing its nature and compare its result with other existing cognitive measurement evaluation results. Secondly, perform a comparative study of propose metric with existing metric and the results shows that the proposed cognitive metric do better that others metrics. And attempt has also been made to present the relationship among NCCoP, CFS, CICM, MCCM, and CPCM versus LOC to analyze the behavior of coding efficiency.

16

Software fault prediction models using supervised learning cannot be applied when training data are not present. In this case, new models using unsupervised learning such as clustering algorithms are quite necessary. Nevertheless, there exist very few studies about unsupervised models because it is difficult to construct the models. One of the difficulties is to decide the number of clusters. To solve this problem, we build unsupervised models using clustering algorithms, EM and Xmeans, which determine the number of clusters automatically and compare them with results of earlier studies. Experimental results show the Xmeans model outperforms the other models.

17

A Gamification Model Design for IPTV Contents Promotion

Seung-Kwan Ryu, Jae-Hwan Bae

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.7 2014.07 pp.205-214

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Gamification means an operation, which uses a game mechanism to influence people’s behavior in the non-game context. This paper aims to design a gamification model in order to activate content business industry through more content viewing or uses, which can be applicable to IPTV. This article presented definitions and types of gamification first and then suggested factors for gamification model and a concrete architecture as well as design.

 
페이지 저장