Earticle

현재 위치 Home

International Journal of Software Engineering and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSEIA) [Science & Engineering Research Support Center, Republic of Korea(IJSEIA)]
  • pISSN
    1738-9984
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.4 No.2 (4건)
No
1

A Requirements Engineering Approach for the Development of Multi-Agent Systems

David Blanes, Emilio Insfran, Silvia Abrahao

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.4 No.2 2010.04 pp.1-14

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents RE4Gaia, which is a requirements modeling approach for the development of multi-agent systems that extends the Gaia methodology. The approach focuses on dealing with the organizational structure as a means to adequately capture and understand required roles and associated functions in the context of an organization prior to the analysis and design of MAS using Gaia. In addition, a traceability framework is introduced to facilitate moving from the requirements models to the analysis and design models proposed in Gaia.

2

Generating Better Radial Basis Function Network for Large Data Set of Census

Hyontai Sug

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.4 No.2 2010.04 pp.15-22

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Radial basis function networks are known to have good performance compared to other artificial neural networks like multilayer perceptrons. Because the size of target data sets in data mining is very large and artificial neural networks including radial basis function networks require intensive computing, sampling is needed. So, because the sample size should be relatively small due to computational load to train radial basis function networks, simple random sampling for small size might not generate perfect and balanced samples. This paper suggests a better sampling technique based on branching information of decision tree for radial basis function networks when target data set is very large like census data. Experiments with census income data in UCI machine learning repository shows a promising result.

3

Use of Artificial Neural Network in Pattern Recognition

Jayanta Kumar Basu, Debnath Bhattacharyya, Tai-hoon Kim

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.4 No.2 2010.04 pp.23-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Among the various traditional approaches of pattern recognition the statistical approach has been most intensively studied and used in practice. More recently, the addition of artificial neural network techniques theory have been receiving significant attention. The design of a recognition system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples, and performance evaluation. In spite of almost 50 years of research and development in this field, the general problem of recognizing complex patterns with arbitrary orientation, location, and scale remains unsolved. New and emerging applications, such as data mining, web searching, retrieval of multimedia data, face recognition, and cursive handwriting recognition, require robust and efficient pattern recognition techniques. The objective of this review paper is to summarize and compare some of the well-known methods used in various stages of a pattern recognition system using ANN and identify research topics and applications which are at the forefront of this exciting and challenging field.

4

Applications of an Isomorphism of Binary Elliptic Curves

Brian King

보안공학연구지원센터(IJSEIA) International Journal of Software Engineering and Its Applications Vol.4 No.2 2010.04 pp.35-48

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we discuss an isomorphism between elliptic curves defined over binary fields (curves defined over F2n). We introduce a simple public-key encryption scheme for binary elliptic curves. Here we demonstrate that this encryption scheme is as secure as the EC El Gamal cryptosystem. The basis of the encryption scheme is this isomorphism between binary elliptic curves. We use this same isomorphism, as an implementation tool (to reduce the compu-tational complexity) and later we discuss a broadcast encryption scheme.

 
페이지 저장