Earticle

현재 위치 Home

International Journal of Software Engineering and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • pISSN
    1738-9984
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.9 No.6 (23건)
No
1

Quality Evaluation Criteria Based on Open Source Mobile HTML5 UI Framework for Development of Cross-Platform

Hyo-jung Sohn, Min-gyu Lee, Baek-min Seong, Jong-Bae Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.1-12

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As diver mobile platforms appear, attention is paid to the development of cross-platform that can be applied to various platforms with one development rather than the development of native application that depends on each platform. Of many frameworks that enable the development of cross-platform, HTML5-based framework is being actively developed as open source project. The present study proposes the evaluation criteria by which the most suitable framework can be selected from many open source projects. In this study, 9 evaluation criteria[14] are proposed, derived from ‘Mobile Software Quality Evaluation Model’, which is based on existing ISO/IEC 25000[3], ‘Evaluation Criteria for quantitatively OSS Selection’ and ‘Mobile Web App Framework Evaluation Standard’. And we were applied to 4 UI frameworks selected from Github Repository to verify the effectiveness of the criteria. This study expects that it can reduce effort required in selecting the most suitable framework and thus increase productivity through proper maintenance supported by the right selection.

2

LFDS : Scalable and High Performance Logging for Mission Critical Real Time Applications

Muralidaran Natarajan, Nandlal L. Sarda, Sharad C. Srivastava

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.13-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the world of connected enterprises and Internet of Things (IOT), millions of users and devices are connecting and transacting online simultaneously. Further, introduction of multi-core hardware platforms resulted in multi-fold increase in processing speed and volumes. To support the increasing volumes generated, building end-end-end scalable business applications has become the key focus of these service organizations. The reliability expectation of these systems is 100% and hence persisting of transaction information and key activities information is crucial to the success of the business applications. However, the performance of such software applications is inherently limited by disk input/output (I/O). Often, CPU activity gets suspended till I/O activity completes. Redesigning and tuning I/O can enhance application performance significantly. This paper presents our approach of ‘Log Flush Daemon Service’ (LFDS) in which application takes control of the I/O by taking it off the main transaction path along with hybrid of approaches from the techniques for optimization of the ancillary tasks of logging. This helps to enhance the performance, reduce the jitter and outliers.

3

A Study on the Retrieval Methods Using the CST-Tree Index in Web Log Mining

Myoung-jin Jung, Sung-Je Cho

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.29-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The number of web service users is increasing with the widespread of regular PCs, smartphones, and tablet PCs, which has allowed more convenient access to internet. Although the increase in the number of users is translating into the increase in data usage, the previously used method is not suitable to process web log at high-speed, since it operates in the order of strings. Accordingly, this study uses the CST-tree index to analyze the web log data that is generated when accessing a web server.

4

Study on Brake Intervention of AEB System under Various Road Friction Conditions in V2V Communication Environment

Hyeonggeun Mun, Gyoungeun Kim, Byeongwoo Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.35-44

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study developed an algorithm for the determining the application timing of autonomous emergency braking (AEB) under various road friction conditions during driving on a curved road in a vehicle-to-vehicle communication environment. This algorithm, which considers the friction between the tires and the road, was developed to overcome the limitation of the existing algorithm for AEB system brake intervention in which road friction is taken as a constant. The braking and collision avoidance performances of the proposed algorithm were tested in scenarios simulating the velocities of the host and target vehicles and the radii of curvature under various road conditions. The simulation analysis, in which the time-to-collision concept was adopted for braking and collision avoidance tests, revealed that the proposed algorithm provided superior forward collision avoidance performance to the conventional algorithm by adjusting the brake intervention time according to the road friction coefficient.

5

Classification Model for Water Quality using Machine Learning Techniques

Salisu Yusuf Muhammad, Mokhairi Makhtar, Azilawati Rozaimee, Azwa Abdul Aziz, Azrul Amri Jamal

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.45-52

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The problem of water pollution is increasing every day, due to the industries’ waste product disposal, migration of people from rural to urban areas, crowded population, untreated sewage disposal, wastewater and other harmful chemicals’ discharge from the industries. There is a need to resolve this problem for us to get good water that can be used for domestic purposes. This article proposes a suitable classification model for classifying water quality based on the machine learning algorithms. The paper analyzed and compared performance of various classification models and algorithms in order to identify the significant features that contributed in classifying water quality of Kinta River, Perak Malaysia. Five models with respective algorithms were tested and compared with their performance. In assessing the result, the Lazy model using K Star algorithm was the best classification model among the five models had the most outstanding accuracy of 86.67%. Generally, wastewater is harmful to our lives, and bringing scientific models in solving this problem is obligatory.

6

The User Activity Reasoning Model in a Virtual Living Space Simulator

Bokyoung Park, Hyeongyu Min, Green Bang, Ilju Ko

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.53-62

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Smart homes identify the implicit intentions and needs of occupants through the detection of the activities of residents and their internal environment, and they provide a convenient service to them. In smart home research, context-awareness technology is essential. Context-awareness research requires a large amount of data of residents’ activities in living spaces. Data collection using a simulator is a recently developed method to overcome the difficulties of data collection in the real world, and to get consistent data. In this paper we present the usage of a simulator consisting of a virtual space similar to an actual living space, with virtual sensors and virtual character. Through this simulation we collected user context data which has a high probability in the real world. Collected data is analyzed via a classifier, and resultantly a user activity reasoning model in a virtual living space is generated.

7

Test Report Generation Using JSON

B. Navya Rupa, G. Krishna Mohan, J. Satish Babu, Tai-hoon Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.63-70

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Testing was desired to ensure the quality of software. Testing seeks to deliver quality applications within budget and time constraints. Proper test management was required for a disciplined testing process. The reporting mechanism plays an important role for scrutinizing the testing progress, assessing test results for a regimented testing process during the testing life cycle. This paper presents a report generation using JavaScript Object Notation (JSON). JavaScript Object Notation is an alternative to Extensible Markup Language and simpler to use. Proper reporting could efficiently improve the communication between several testing groups.

8

Internet of things (IoT), Cloud, Big Data and 3D printer are the ICT technologies that recently has been on the rise in domestic and in global. The IoT is expected to be a future growth engine by grafting ICT technology to traditional industry. The most important matter for internet of things to grow as successful business is incubating professional man power. The course of university can't hold a candle to the field. And the course of academy is not systematic. Thus, it is continue a problem that human power production not be applied to the field directly. Thus, this study is to suggest how to design systematic education programs for internet of things and to operate those programs in efficient. In this paper, proposed an effective training courses and educational operating system by introducing the HOPPING education course and the ESIC program. The system proposed in this paper will be available in an IOT specialized manpower training and a SW education.

9

Researchers say that creative advertisements should be new, original and appropriate. Paper advertisement is made up of visual images and copy. Advertisement photographs as visual images work as a factor that conveys factual image and makes it focus on the photograph. The object of this thesis is to define what kind of visual image I should bet to be new, original and appropriate. This thesis will review visual metaphor types and how they were classified and its three problems and present visual metaphor (parallel, melting, pure) types. By visual metaphor and expectation conformity, it was reviewed how it affected advertisement effects through experiment research. Through this research, the expression types of visual metaphor of Korean consumers and communication effects of expectation were analyzed to find the most effective ways to produce advertisement photograph in Korea.

10

Remarks on Four-Dimensional Probabilistic Finite Automata

Makoto Sakamoto, Yasuo Uchida, Makoto Nagatomo, Tuo Zhang, Hikaru Susaki, Takao Ito, Tsunehiro Yoshinaga, Satoshi Ikeda, Masahiro Yokomichi, Hiroshi Furutani

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.91-100

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper deals with the study of four-dimensional automata. Recently, due to the advances in many application areas such as dynamic image processing, computer animation, augmented reality (AR), and so on, it is useful for analyzing computation of four-dimensional information processing (three-dimensional pattern processing with time axis) to explicate the properties of four-dimensional automata. From this point of view, we have investigated many properties of four-dimensional automata and computational complexity. On the other hand, the class of sets accepted by probabilistic machines have been studied extensively. As far as we know, however, there is no results concerned with four-dimensional probabilistic machines. In this paper, we introduce four-dimensional probabilistic finite automata, and investigate some accepting powers of them.

11

A Study on Expression of Illusionism based Virtual Space by using Projection Mapping

Jae Joon Cho, Won Hyung Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.101-108

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, the projection mapping is used to examine the constitutions and methods of expression of artwork influenced by light art. For the projection-mapping analysis, my works and those of others were selected as examples of the expression of illusionism and expandability of space. Furthermore, illlusionism and expandability have been expressed through the 3D spatial expression of the other works, achieved with projection mapping, and are different from existing 2D works. Consequently, the advantages include immediacy, whereby the space-time of the works coexist with the audience, and the expression of illusionism and expandability of space propose new possibilities for spatial expression.

12

Examining Technical Debt Accumulation in Software Implementations

Johannes Holvitie, Ville Leppänen

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.109-124

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Technical debt management requires means to identify, track, and resolve technical debt in the various software project artifacts. There are several approaches for identifying technical debt from the software implementation, but they all have their shortcomings in maintaining this information. Readily available information is a cornerstone of successful technical debt management integration. As such, this paper presents a two-partite case study that explores the role of dependency propagation in the accumulation of technical debt for software implementations. The first part, targeting a refactorization project in the ViLLE education platform, identifies a clear relation between the propagation and the accumulation in addition to making notions about special propagation characteristics. The second part considers bug reports for the Eclipse IDE, and, thus, provides further verification in observing a similar relationship at a lower implementation abstraction level for this independent data set. We conclude that formalization of this relation should lead to solutions for the technical debt information maintenance problem. As such, we use the case study herein to further improve the propagation model applied in our DebtFlag technical debt management tool.

13

Implementing a Web-Based Peer grading System and Experiment the Learning Effect

Il-Min Kim, Sae-Hong Cho, Jong wook Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.125-134

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The popularity of online edcation technology has resulted in increase of interests on social learning network and online training aids for traditional class educations. In this paper, we designed and implemented a peer report grading system and studied the educational effect of the grading system. Instead of traditional one-sided evaluation done by professors, the system reduced the burden of grading and evaluating assinments and facilitated idea-sharing among students. We took advantage of web technology to maximize the effectiveness of peer feedback. In this paper, we concluded that the web based grading ststem showed better educational effect than traditional grading systems.

14

Canonical Correlation Analysis on Level-wise Learning Effects in Cyber Lecture

Jong-seok Um

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.135-142

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Canonical correlation between level-wise teaching-learning effects and the preference of the components of the cyber lecture are investigated and analyzed. Overall and medium level teaching-learning effects have a close interrelationship with components of cyber lecture implementing step-by-step learning, interactive learning, and repeated learning. Also, high level teaching-learning effects are correlated with components of cyber lecture implementing self-regulated study. Using canonical scores in level-wise teaching-learning effects, it is known that females have a higher overall and medium level teaching-learning effect than males and students of the college of Natural Sciences and Engineering have a higher overall and medium level teaching-learning effect than students in other colleges. Students of the college of Natural Sciences and Engineering have a higher preference than students of other colleges on components of cyber lectures associated with step-by-step learning, interactive learning, and repeated learning.

15

Development and Application of MB System Software for Bathymetry and Seabed Computation

Henry M. Manik, Diandra Yulius, Udrekh

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.143-160

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

MB-Systems was a useful software tool for mapping the seafloor by processing multibeam bathymetry and bottom backscattering. Multibeam echosounder system was the underwater acoustic technology that used to determine morphology and characteristics of the seabed. The objectives of these research were to produce and describe the map of bathymetry, distribution of seabed backscatter value, beam density distribution, standard deviation of the depth, standard deviation as a percentage of water depth, and also to produce and describe graph of ping interval for each depth. The maps were obtained by using MB-System software after correction of tide, amplitude against grazing angle, sound velocity profile, and 3D editing of swath bathymetry. Implementation of 300 as reference angle to both sides of the beam, low pass filtering, and mosaic amplitude were conducted to calculate the backscatter values of their absolute level. By these steps, nadir stripping and outlayer values in the map of seabed backscattering distribution could be eliminated. After computing the whole correction stages, we found depth value of the slope area were 813.59 meters to 4904.71 meters and at the basin area were 723.01 meters to 1065.21 meters depth. The distribution of backscatter values in slope area ranged from -42.37 dB to -4.47 dB and in the basin area were -41.59 dB to -16.63 dB.

16

Our first research question was to confirm whether there is a positive relationship between environmental and ethical management practices and corporate performance. We tested whether the two constructs fit for the sample companies of Korea and assessed their reliability and validity. Furthermore, we formulated the companies’ action variables using the degree of implementation of customization and process innovation strategy and checked if those two variables had discriminative effects on the relationship. For that purpose, we divided the sample into two groups—high and low—based on the two variables and compared the regression results. The results of this study suggest that both environmental and ethical management practices have a positive effect on corporate performance. Further analyses revealed that the results representing fitness between the two practices and corporate performance favored the group that showed a lower degree of customization strategy. Thus, we inferred that companies that adopt a customization rather than a standardization approach experience a more positive relationship between environmental and ethical practices and corporate performance. Finally, the results comparing the relationship between the two practices and corporate performance revealed a better fit for the group that did more to implement process innovation than for the group with lower implementation, indicating that companies implementing process innovation can anticipate a more positive relationship between environmental and ethical practices and corporate performance.

17

A Systematic Literature Review on Challenges in Service Oriented Software Engineering

Musa Midila Ahmed, Sukumar Letchmunan

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.173-186

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

SOSE is gaining recognition by both research communities and industries in recent times, however, its complete adoption is facing numerous challenges that require researchers to identify and overcome. Consequently, this paper embraces a systematic literature review to classify and analyze SOSE Challenges claimed in research communities from January 2009 to October 2014. First, the search string was applied to each selected database and the title, abstract and keywords of the potentially relevant primary studies were examined where 693 primary studies were found relevant. Then, the full texts of the 693 relevant studies were critically reviewed. As a result, 91 primary studies with 122 claimed SOSE challenges were identified and recorded. The results revealed quality of service (QOS) as the major SOSE Challenge, it is responsible for about 45% of the total SOSE challenges claimed for the period under review. Further investigation revealed Security as the main attribute responsible for placing QOS as the major SOSE challenge. It is recommended that research effort is required to improve the security of SOA applications. In addition, other areas that require research effort are Service provision and integration.

18

The Students’ Perception Change in the Curriculum Implementation through the Robot-based Instruction

Hwa-sook Choi, Kyung-hyun Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.187-196

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The study is to analyze the changes in the student's perception for the characteristics of the teacher before and after the robot-based instruction in the middle school curriculum implementation. Moreover, this study is to analyze with the variation in the characteristics of the learner (learning level, personality tendencies, robot operation level) and learner’s gender. In order to attain this purpose, we collected the data and analyzed 150 students divided into the robot utilizing group and the comparison group. The results are as follows. First, students participated in classes utilizing robots changed their view into the positive side for the perception of the teachers’ characteristics. Second, it was effective for middle school students to perceive the teachers’ characteristics more positive, regardless of the sex or characteristics of the learner in robot-based instruction. The results of these studies can be used as basic materials needed for the stable settlement of the robot-based instruction in school.

19

Non-Source Code Refactoring: A Systematic Literature Review

Siti Rochimah, Siska Arifiani, Vika F. Insanittaqwa

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.197-214

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Since software refactoring techniques were introduced, the process is commonly applied to alter the structure of source code. However, there is also increasing popularity in the topic of refactoring in other software artifacts at non-source code level. This paper provides a systematic literature review of existing studies in non-source code refactoring. We use two digital libraries as publication source, IEEExplore and Science Direct, to obtain published articles in non-source code refactoring topic published in between 2002 – 2014 with certain keywords. The 20 selected literatures then processed based on certain criteria, including the refactoring method and refactoring identification source. Then we use this information to provide categorization of non-source code refactoring activity and the advantages and disadvantages of each category. The systematic literature review performed has provided categorization of non-source code refactoring method and has shown that each method has certain advantages and disadvantages. Refactoring detection at non-source code level can be done in the software design model, source code with non-conventional detection, and other software artifacts. The methods used can be categorized as heuristic method, where the refactoring identification is done based on certain rules, and non-heuristic method, where the refactoring identification is done with a certain algoritm that explores every possibility of refactoring opportunities. The advantage of heuristic method is the speed and precision. The disadvantage of this method is the needed effort to produce the rules and the possibility of the non optimal result. The advantage of non-heuristic method is it can yield a generally more optimal result. The disadvantage of non-heuristic method is that the result depends strongly on the robustness of each algorithm.

20

Wavelet Threshold De- Noising for Mammogram Images

Saima Anwar Lashari, Rosziati Ibrahim, Norhalina Senan

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.215-226

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Digital mammograms are coupled with noise which makes de-noising a challenging problem. In the literature, few wavelets like daubechies db3 and haar have been used for de-noising medical images. However, wavelet filters such as sym8, daubechies db4 and coif1 at certain level of soft and hard threshold have not been taken into account for mammogram images. Therefore, in this study five wavelet filters namely: haar, sym8, daubechies db3, db4 and coif1 at certain level of soft and hard threshold have been considered. Later, peak signal to noise ratio and mean squared error values are calculated. From the obtained results, it can be concluded that db3 (46.44656 db for hard threshold and 43.80779 db for soft threshold) is more appropriate filter for de-noising mammogram images while compared with other wavelets filters.

21

The Exploration in Developing the Concept of R-Learning for Early Childhood Education Institutions

Yeon-Seung Lee, Chunghee Chung, Min-Jung Lee

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.227-234

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The purpose of this study was to examine the concept of r-learning in an effort to ensure the efficient utilization of r-learning in Korean early childhood education institutions. A Delphi survey was applied to 20 early childhood professionals including teachers, directors, professors, and graduate students who have experience in the robot learning. In this study, data were collected, read, and commented upon participants three times to arrive at a consensus regarding the nature of robot learning and the requirements for its successful implementation in early childhood institution. The findings of the study were as follows: As for the concept of r-learning in an early childhood education institution, that means to further the learning of preschoolers by introducing robots in early childhood education and to facilitate the process teaching and learning by assisting the teaching of teachers. So far, there isn't yet any consensus on the concept of r-learning, and this study is expected to suggest some of the right directions for r-learning in early childhood education institutions in our country by analyzing the concept of r-learning on the basis of the opinions of the experts in early childhood education.

22

Wireless Remote Central Monitoring System for Freshwater Lakes

Byung Mun Lee, Un Gu Kang

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.235-246

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The management of water resources is closely related to human life. Thus the operation of various devices for water circulation, algae control and water quality control of scattered freshwater lakes is paramount. In this paper, the author designed and implemented a system which monitors water quality in real time. The subjects for monitoring include amount of sunlight collected from various types of photovoltaic inverters, power consumption and data from water quality analysis sensors, e.g. temperature, hydrogen-iron concentration (pH), amount of dissolved oxygen (DO), electrical conductivity (EC), chlorophyll-a (Chl-a), and turbidity. These were accumulated in a BD server on a real-time basis. By using this data, the author developed a system which facilitates real-time integrative monitoring and transmits an SMS alert in the event of an emergency. The suggested system is able to reduce time and manpower because there is no need to visit sites to measure the water quality, thereby increasing efficiency of water quality management and preventing disasters through real-time monitoring of water quality and swift reaction.

23

A Design of CBD Intelligent Framework for U-Healthcare Application

Yvette E. Gelogo, Haeng-Kon Kim, Youn-Ky Chung

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.9 No.6 2015.06 pp.247-256

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

 
페이지 저장