2016 (266)
2015 (278)
2014 (298)
2013 (203)
2012 (72)
2011 (41)
2010 (25)
2009 (27)
2008 (39)
2007 (7)
A Study on Web-based PBL System Development for Effective Discussion-based Learning
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This research examines how PBL(Problem-based Learning; PBL) strategy affects to 'Self-directed learning ability', by developing a system to which the PBL strategy was applied and carrying out the program for 16 weeks, targeting the participants of "Science Cyber Conference" - the web based debate learning program - among the students of the Affiliated Institute of Science gifted education of University. To lead the web-based discussion learning effectively, the system was intended to allow a sequential concept schedule management and vote. With this, also the cognizance of learner for the PBL class process was looked into together. As a result of conducting the program applied with the web-based discussion learning system, he participants' 'Self-directed learning ability' showed the statistically remarkable change (p<.05). Especially it showed the meaningful difference in six sections (p<.05), among seven subordinate sections of 'Self-directed learning ability', with one exception, 'Self-confidence as a Learner'. They also showed the positive response to the class which adopted the web-based PBL strategy.
A Component-Based Framework for Software Reusability
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.13-24
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Component-based development allows us to develop and integrate product components which facilitate software reusability, high quality and simplification for testing. Component-Based Software Engineering makes use of approaches which are based on architecture definition languages, object oriented design and software architecture. These strategies assist in the development of both domain-specific and generic software products. Reusability approach speeds up software development by using already developed components, thus software development cost and time is substantially reduced. I this paper, we present a Component-Based Software Engineering framework for software reusability.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.25-36
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A polygon is (weakly) edge-visible if there exists an edge such that every other point in the polygon is visible from some point in the edge. There are well-known linear-time algorithms [1, 2] for finding all visible edges in a polygon without holes. In a polygon with holes, only a tight bound on the number of visible edges has been established; there may be at most three on the boundary and three on one of the holes [3]. In this paper, we present concrete linear-time algorithms for finding the constant number of visible candidate edges in a polygon with holes. Our algorithms take the similar approach of Shin and Woo [1] in a polygon without holes in order to realize the theoretical results of Park et al. [3] on the number of visible edg-es in a polygon with holes.
A Visualization Approach for Bug Reports in Software Systems
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.37-46
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
For widely-used and large software systems, there is huge number of daily submitted bug reports. These bug reports are mainly submitted by different developers with different roles during software development process. Therefore, understanding and monitoring the status of all submitted bug reports is not an easy task. Each bug report has various and different statuses over time. Furthermore, the relationship between bug reports and developers is complicated and hard to detect. In this paper, we propose a solution to help software project managers or bug trackers to understand the current and the previous statuses of large number of submitted bug reports. We propose a visualization approach to model the different statuses of bug reports and their relationships with developers who work on them. The visualization is based on extracting information from bug tracking systems and modeling them in comprehensive and meaningful views.
A Study on Information Technology Plan and Status of University 2013
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.47-54
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study is aimed at offering basic data for establishing higher education information policies and enforcing them in a reasonable and effective manner. To accomplish the objective, the following were conducted. First, the data on information status linked to the government's nationwide university information projects was studied and analyzed. Based on the results, information indicators were established. Second, interviews with university information experts and surveys were conducted. Based on the results, the university information level was diagnosed. It was aimed at securing basic data for solving various university information-related issues and making plans for developing information. The purpose of this study is as follows: promoting reasonable information investment with various factors such as university budget, personnel, and equipment and supporting operational efficiency; offering a guideline for developing university information and investment plans.
Programming Evaluation Process Using Hybrid Cost Estimation Model
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.55-64
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Programming cost estimation is genuine encountering variable in programming outlining applications, because of ordinary programming progression, nonattendance of data in new updated advances, unsatisfied customer necessities and not considering the reusable part cost. Considering these issues in made programming applications programming cost estimation may perform earnest part in programming planning. In this paper we propose to make an alternate programming gadget i.e. Hybridization programming cost estimation instrument, which covers Elaboration, advancement and move stages for supporting different programming overhauls and makes latest programming applications. The made gadget was facilitated with COCOMO and COPSEMO cost models with keen data representation of each module in programming progression process. Our trial results show compelling data examination of each item application with time backing of every one made module.
Application of Appropriate Information System Model for the Alleviation of Lumbago
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.65-72
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This research was performed to identify the application of appropriate information system model for the alleviation of lumbago. The pairwise t-test was done to compare the differences in the health status of patients with low back pain before and after empirical application. This study was estimated to compare changes in the alleviation of low back pain for 4 months in empirical application group (n=146) versus control group (n=146). The results of this study are as follows : First it verified the significance of health status on the alleviation of subjects’ low back pain in the experimental group after intervention as compared to control group (t=2.85, p=.007). Second, the clinical factors after the lapse of 90 days since information intervention were a significantly lower percent in the experimental groups compared to control groups (p<.05). In conclusion, information intervention for patients with low back pain was effective in improving pain control and maintaining long-term health status. Therefore, model application for lumbago patients could be widely used as an effective treatment guide.
New Mechanism of Burst Construction to Reduce Losses in OBS Networks
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.73-82
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The IP traffic explosion and the bandwidth demands which are in increase growth have all recently led research to the development of new network architectures and protocols. The optical burst switching is then expected to provide a broadband data transport, in both flexible and efficient manners [1]. OBS is a hybrid technique for optical circuit switching and for optical packet switching, combining their advantages by overcoming some of their drawbacks. However, OBS networks still suffer from data loss. These losses are not only due to the fact that two bursts want to take the same wavelength at the same time, or due to the insufficiency of "offset-time" but they are also due to the failure of routing information transmission. A recent variation of OBS models is the optical networks of slotted burst switching, whose smallest unit of data transport is the time interval of the burst. In this paper, we propose a new mechanism of burst construction by comparing the obtained results with the hybrid mechanism based on size and time. The obtained results show that the proposed techniques lead to better performance. Choosing a good number of control channels and data channels also allow reducing the loss rate in such type of networks.
A Study of Larchiveum Data Model for the Design of Digital Heritage Museum
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.83-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The Application of Automated Tools to Improve the Software Testing Process
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.95-114
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Software testing is the major challenge of complex software systems. In this field, accuracy and running time are two major performance factors frequently employed to evaluate the reliability of software testing. Automated software testing is a technique which significantly improves these performance factors. There are various automated testing tools dealing with design features however this paper focuses on the comparison of the testing tools exclusively used for .Net applications. We attempted to search for high performance testing tools including popular software testing environments so that the obtained results can be extended to a wide domain of software developers. The main goal of this paper is to analyze and compare the automated software testing tools using practical examples and review the performance of these tools in terms of software reliability determination.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.115-130
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
An assignment is important because it's hard to reach the learning goal of a programming course using only the number of offline classes limited. In a programming course, the learning level of a learner will be determined in the process of tackling the various problem situations through learner's own coding and error handling. It is required to provide the course to learners, which students feel that it is easy and interesting to write coding by considering learners' coding level. For this, we make a teacher give some feedback to a learner after taking questions in the form of classifying the errors of assignments. We expect that the blended learning system developed in this study will reduce learners who quit to solve a assignment and eventually improve learning achievement by steps because there are an adaptive interactions between a learner and a teacher to help to solve the various difficulties in doing an assignment.
Efficient Method to Extract New Parameters of Index Options by KOWA system
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.131-142
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In these days, the importance of money is increased. The wise investors want to have an useful tool which provides overall information in Option market. The KOWA system is the useful tool to provide this overall information. It is Ko’s Option Windows Agent that provides overall information from fragmentary data exported by HTS. Conventionally Option Greeks are used for position traders. But they have used the fragmentary Greeks such as delta, gamma, theta, etc. This paper suggests the new parameters extracted by overall view. Those are omega, mu and sigma. It can be extracted by KOWA system on real time. And the methods to compute the new Greeks are also inspected. The examples are appended which are based on real data of Korean Option market. These new Greeks might be very useful to the wise investors. And KOWA system might be a very useful tool.
The Framework of Navigation and Voice Recognition System of Robot Guidance for Supermarket
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.143-152
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents the research on the development of framework for navigation and voice recognition system designed for robot in store/supermarket. The proposed system consists of a microcontroller and a voice recognition processor that can recognize many voice patterns. The robot is controlled through voice recognition system which allows customers to interact with the robot, in order the robot able to shows the desired location. The advantage of voice recognition system on a robot guidance are fast data input operation and easy to use. The compass is used for navigates the robot from start to goal position. The voice recognition system is trained in such a way that it is recognizing commands and the robot navigates based on the instruction through the voice commands. Based on the experiment, the system run very well and we evaluate and show the performance of this system.
Plan to Build Metadata for Activation of Traditional Cultural Creative Contents Services
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.153-166
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper will discuss plans to put in place metadata for activating traditional cultural creative contents services. Traditional cultural creative contents services are of different forms depending on the data-holding institution. Due to this, users can only sufficiently obtain sought information by using a number of different services. Additionally, the creative contents service user-base mostly comprises creators. These creators require metadata; however, as to date, none has been put in place, so it is difficult for them to find material with the current structure. In order to improve this, we need to activate a search function by including the information required by creators within metadata. We also need to make it easy for users to obtain information by adding an integrated search function for various services. This will be achieved by putting in place standard metadata for those services.
Designing a Smart Consumption Tracking Model
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.167-178
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Big data analytics has received wide attention by information technology industries. It has been done in quantitative and statistic viewpoints. Observing huge amount of data, it is possible without doubt to establish a model that may predict purchase behaviors of consumers. But this approach can neither explain what brings the consumers to such decisions nor predict future purchase behavior of other product categories. Furthermore, it is not possible to reason about consumers’ preferential differences that make choose or avoid certain places and shops. To answer this question, this paper argues that a qualitative analysis based on consumption values will be an alternative, and proposes a conceptual model of extracting consumption values from big data using clothing purchase as a case study.
Conceptual Schematization of Microcontroller and Assembly Language
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.179-190
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Understanding low-level machine organization and programming often proves difficult for students and practitioners. The basic concepts behind computer operations are complicated by a multiplicity of subject domains, discrepancy between theory and practice, and ranges of abstraction. The gap between a written program and processor hardware can be bridged by utilizing an assembler visualization tool. Visualization is useful for enhancing understanding of maintenance, configuring verification, planning tests, and recognizing parallelism in computer systems. This paper proposes a diagrammatic methodology for producing a conceptual representation of assembly language instructions. Without loss of generality, this paper focuses on using these diagrams in teaching Microcontroller 8051. Its assembly constructs are represented in the proposed method in order to show that this representation can provide a foundation for understanding the behavior of running programs. The resultant schematics offer a viable method for new hardware/software independent descriptions that can be used in teaching low-level machine organization and assembly programming.
Twitter Mining: The Case of 2014 Indonesian Legislative Elections
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.191-202
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Twitter is an online micro blogging and social network which not only for communication with others but twitter can be used for business, administration, or political campaign. This paper concern about twitter for political campaign, we take one case in Indonesian legislative elections. In April 2014, Indonesia has held legislative elections. Fifteen political parties have been participated to this election. Each parties has unique strategic for campaign including social media campaign. In this paper we interested with one of political party which very active in social media campaign especially in Twitter, Partai Keadilan Sejahtera (PKS) or Prosperous Justice Party. This party has a lot of supporters and haters are active tweeting on Twitter about the goodness and badness of this party. This thing begs the question that "Who they are? It is really the voice of Indonesia or just tweets from twitter campaign accounts". This paper tried to answer above question by presenting the result of analysis with empirical data. We collected all tweets which related with this party and then extract the data and classify to two types of twitter accounts: real and campaign accounts. We use some features and Naïve Bayes as method for classification. We observe the difference between real and campaign accounts in terms of the tweeting behavior and account properties. We applied text mining methods to know what the meaning of the messages that they bring on their tweets.
Design Implications of a Conversational Agent in an Implicitly-Persuasive Application
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.203-212
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Persuasion can be used to encourage an individual to change his/her behaviors. However, persuading people in one of multiple behavior stages, such as a degree of achievement of target behavior, requires consideration suitable for each stage. We have proposed a persuasive application that implicitly encourages users to walk continuously in implicit manner. The persuasion is designed to be adapted to the users’ estimated current behavior stage. Additionally, this application aims to enable users to walk actively while they play a location-based game and converse with an agent. In this paper, we discuss the design implications of a persuasive conversational agent in an implicitly persuasive application. We specify three aspects: adaptive persuasion, ubiquity and game mechanics.
A Review of an MVC Framework based Software Development
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.213-220
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents the concepts of model-view-controller (MVC) for the development of software systems. The different software development process methods are presented wherein they share some common methodology phases. The MVC is an approach that provides insights for software development by describing three objects in developed software in terms of model, view, and controller. A sample integration of MVC is also presented.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.221-228
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper design and implement systems for reliable participant’s statistics as an important evidence for decision making about tourist attractions and tourism developments. Especially the entrance of tourist spots and local festivals are decentralized that makes data generation difficult so only random sample survey is possible. This paper proposes the system design and implementation using four IR sensors, an MCU, and Zig-bee communication module. Through the system implementation testing results, a single system got a noticeable result of over 97% and more than two systems as originally intended has communicated effectively so the counting of participants are almost instantly performed.
보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.8 No.10 2014.10 pp.229-236
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper designs an automation system for operating horizontal light shelf based on the data input illuminance and uniformity sensor. The light shelf is a horizontal shade as the sunlight reflecting system that controls the sunlight into the working place and is widely used in the architecture field. This paper also proposes the most efficient environment using artificial and natural light in connection with LED dimming control system controlling 0-100% of electric power
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.