e Informatica Softw. Eng. J.最新文献

筛选
英文 中文
Permissioned vs. Permissionless Blockchain: How and Why There Is Only One Right Choice 许可与无许可区块链:如何以及为什么只有一个正确的选择
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.17706/jsw.16.3.95-106
Siamak Solat, P. Calvez, Farid Naït-Abdesselam
{"title":"Permissioned vs. Permissionless Blockchain: How and Why There Is Only One Right Choice","authors":"Siamak Solat, P. Calvez, Farid Naït-Abdesselam","doi":"10.17706/jsw.16.3.95-106","DOIUrl":"https://doi.org/10.17706/jsw.16.3.95-106","url":null,"abstract":"The blockchain structure can be utilized in an efficient way to verify and ensure the integrity of the data and prevent historical transactions from tampering, such that if one block is altered, then the rest of next blocks are no longer valid. However, it is possible to re-calculate all the next blocks in a closed and permissioned network, such that all altered blocks will become valid again. In other words, only chaining blocks to each other, based on the hash of the previous one, cannot ensure the integrity and the security of the data and protect transactions against tampering. In this paper, we motivate why permissionless blockchain in an open network should be considered as the only acceptable type of blockchain and show that permissioned blockchain and closed network makes chaining transactions (i.e. blockchain) as an unhelpful structure. Of course, this never means that we ignore the existing problems in permissionless blockchains (such as, scalability of the network and transaction throughput), but also, we argue that permissioned blockchain cannot be an acceptable solution for those problems, where chaining transactions will no longer be meaningful. In other words, in a closed network, we no longer need to chain transactions. Although, this is a central issue and has been addressed in recent years, we are trying to bring new elements and an enriched point of view.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"51 1","pages":"95-106"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87464491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Synchronization Acquisition Method for the Dual-Sequence-Frequency-Hopping Communication System Based on Software Defined Radio at Low SNR 低信噪比下基于软件无线电的双序跳频通信系统同步采集方法
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.17706/jsw.16.5.235-247
Xiaolu Zhang, H. Quan, Huixian Sun, P. Cui, Guangkai Liu
{"title":"A Synchronization Acquisition Method for the Dual-Sequence-Frequency-Hopping Communication System Based on Software Defined Radio at Low SNR","authors":"Xiaolu Zhang, H. Quan, Huixian Sun, P. Cui, Guangkai Liu","doi":"10.17706/jsw.16.5.235-247","DOIUrl":"https://doi.org/10.17706/jsw.16.5.235-247","url":null,"abstract":"The Dual-Sequence-Frequency-Hopping (DSFH) communication system based on software defined radio (SDR) system belongs to the field of information and communication security of software engineering. At very low signal-to-noise ratio (SNR), which is lower than -10dB, the DSFH fails to synchronize. Synchronization acquisition method via a combined multi-signal detection (SAMCMD) is proposed. The feature of a short sequence of frequency hopping (FH) frequency point is utilized to express the information of the time of date (TOD), and the time accumulation of several FH signals is used to extend the detection time. This method can not only be appropriate for DSFH but also greatly improve the synchronization performance at low SNR. Explain the principle and structure of the SAMCMD. And obtain the performance of this method of the SDR synchronization acquisition. The conclusions are as below: 1) the longer detection time is, the better the anti-jamming performance of SAMCMD is; 2) SAMCMD can gain about 22.5dB-24dB when the SNR is -20dB and the acquisition probability requirement is 96.31% due to the extension of the detection time, compared with the traditional FH synchronization acquisition method.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"168 1","pages":"235-247"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84054911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIoT Framework: Towards an Approach for Early Identification of Security Requirements for Internet-of-things Applications SIoT框架:面向物联网应用安全需求的早期识别方法
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.37190/e-inf210103
E. Klotins, M. Unterkalmsteiner, Panagiota Chatzipetrou, T. Gorschek, R. Prikladnicki, Nirnaya Tripathi, L. Pompermaier
{"title":"SIoT Framework: Towards an Approach for Early Identification of Security Requirements for Internet-of-things Applications","authors":"E. Klotins, M. Unterkalmsteiner, Panagiota Chatzipetrou, T. Gorschek, R. Prikladnicki, Nirnaya Tripathi, L. Pompermaier","doi":"10.37190/e-inf210103","DOIUrl":"https://doi.org/10.37190/e-inf210103","url":null,"abstract":"","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80857066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Quality Model in the Presence of Culture Quality Factors 文化质量因素下的软件质量模型
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.17706/jsw.16.5.248-258
A. Mohammad, Hamed Fawareh
{"title":"Software Quality Model in the Presence of Culture Quality Factors","authors":"A. Mohammad, Hamed Fawareh","doi":"10.17706/jsw.16.5.248-258","DOIUrl":"https://doi.org/10.17706/jsw.16.5.248-258","url":null,"abstract":"","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"39 1","pages":"248-258"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79753455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for the Regression Testing of Model-to-Model Transformations 模型到模型转换的回归测试框架
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.37190/e-inf210104
Issam Al-Azzoni, S. Iqbal
{"title":"A Framework for the Regression Testing of Model-to-Model Transformations","authors":"Issam Al-Azzoni, S. Iqbal","doi":"10.37190/e-inf210104","DOIUrl":"https://doi.org/10.37190/e-inf210104","url":null,"abstract":"Background: Model transformations play a key role in Model-Driven Engineering (MDE). Testing model transformation is an important activity to ensure the quality and correctness of the generated models. However, during the evolution and maintenance of these model transformation programs, frequently testing them by running a large number of test cases can be costly. Regression test selection is a form of testing, which selects tests from an existing test suite to test a modified program. Aim: The aim of the paper is to present a test selection approach for the regression testing of model transformations. The selected test case suite should be smaller in size than the full test suite, thereby reducing the testing overhead, while at the same time the fault detection capability of the full test suite should not be compromised. Method: approach is based on the use of a traceability mapping of test cases with their corresponding rules to select the affected test items. The approach is complemented with a tool that automates the proposed process. Results: Our experiments show that the proposed approach succeeds in reducing the size of the selected test case suite, and hence its execution time, while not compromising the fault detection capability of the full test suite. Conclusion: The experimental results confirm that our regression test selection approach is cost-effective compared to a retest strategy.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86761379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirements Engineering: An Industrial Survey in the Gulf Cooperation Council Countries 需求工程:海湾合作委员会国家的工业调查
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.17706/jsw.16.3.107-129
A. Alzayed
{"title":"Requirements Engineering: An Industrial Survey in the Gulf Cooperation Council Countries","authors":"A. Alzayed","doi":"10.17706/jsw.16.3.107-129","DOIUrl":"https://doi.org/10.17706/jsw.16.3.107-129","url":null,"abstract":"Requirements engineering (RE), the process of defining the requirements of a system, is critical to the successful implementation of software projects. Although many studies have been globally conducted on the different facets of RE in software engineering, studies explicitly focusing on the countries of the Gulf Cooperation Council (GCC) have been scarce. GCC-specific RE research studies are needed because of the unique cultural characteristics and common work ethics in GCC countries. Besides, the investigation of the state of RE practices in the countries of the GCC is crucial as the globalization of software development becomes imminent. This study compares the state of RE practices within the six countries of the GCC, namely, the Kingdom of Saudi Arabia (KSA), the United Arab Emirates (UAE), Qatar, Kuwait, Bahrain, and Oman, using six RE factors. To understand commonalities and differences in the RE practices and methods, 163 software practitioners in GCC countries are surveyed in this study. The results show that the RE practices are relatively similar among the six countries, with subtle differences. Initiating software-related projects with unclear requirements and undefined project scopes are the two major limitations of the RE practices among the survey participants. The results of this study contribute to providing project managers and system analysts, who are working globally and within the GCC countries, with valuable decision-making tools to help them consider the identified RE techniques, methods, and challenges and their related risks early in their software development projects","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"42 1","pages":"107-129"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87403019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on User Experience of Mobile Learning System Based on WeChat 基于微信的移动学习系统用户体验研究
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.17706/jsw.16.2.55-66
Lei Peng
{"title":"Research on User Experience of Mobile Learning System Based on WeChat","authors":"Lei Peng","doi":"10.17706/jsw.16.2.55-66","DOIUrl":"https://doi.org/10.17706/jsw.16.2.55-66","url":null,"abstract":"Based on the theory of user experience design, this paper analyzed the key factors of mobile learning system user experience based on WeChat, and with the development practice of \"mobile micro-classroom system\" it also analyzed the roles that technology of Responsive Mobile Webpage, OAuth authentication technology, WeChat template message technology, and WeChat JS-SDK technology played in improving the user experience of a mobile learning system. Questionnaires method have been used to analyze the applying effect of the system. In conclusion, the users were satisfied with their experience in mobile learning, and insights in the development of mobile learning systems are also summarized.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"16 1","pages":"55-66"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87346886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method of Chinese Electronic Medical Records Entity Labeling Based on BIC model 基于BIC模型的中文电子病历实体标注新方法
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.17706/jsw.16.1.24-38
Yifan Wang, Guowei Teng, Xuehai Ding, Guoqing Zhang, Yunchao Ling, Guozhong Wang
{"title":"A Novel Method of Chinese Electronic Medical Records Entity Labeling Based on BIC model","authors":"Yifan Wang, Guowei Teng, Xuehai Ding, Guoqing Zhang, Yunchao Ling, Guozhong Wang","doi":"10.17706/jsw.16.1.24-38","DOIUrl":"https://doi.org/10.17706/jsw.16.1.24-38","url":null,"abstract":"In the field of bio-medicine, mass data are generated every day, such as Chinese electronic medical record (EMR), containing massive medical terminology and specific categories of entities. The way to analyze and obtain effective information from these sparse data is a difficulty in research. As the foundation of analyzing huge amount of biomedical text data, Named Entity Recognition (NER) is essential in Natural Language Processing (NLP) complementing with effective labeling data. One of the two basic sequence labeling methods is rule-based bulk corpus tagging, requiring domain experts to establish targeted recognition rule base. However, in the application field, this method is single, and the portability does not make the expectation, bringing great limitations; The other is complete manual labeling, but it is time-consuming and laborious. Based on Bidirectional Long Short-Term Memory network (BiLSTM), Iterated Dilated Convolution Neural Network (IDCNN) and Conditional Random Field (CRF), we proposed the BIC model. This paper proposes a method for EMR entity labeling based on BIC model, realizing automatic annotation of Chinese EMR data. Machine labeling data can be used after manual review, which will reduce the workload of manual labeling bestially. Compared with other models, F1 value of BIC model reached 91.90% in CCKS2017 dataset, and 78% in PACS report data. Experiments show that our method is superior to the others.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"39 1","pages":"24-38"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88674246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecting an Enterprise Data Lake, A Covid19 Case Study 构建企业数据湖,2019冠状病毒病案例研究
e Informatica Softw. Eng. J. Pub Date : 2021-01-01 DOI: 10.17706/jsw.16.4.174-181
Bushra, M. Memon, Salahuddin Saddar
{"title":"Architecting an Enterprise Data Lake, A Covid19 Case Study","authors":"Bushra, M. Memon, Salahuddin Saddar","doi":"10.17706/jsw.16.4.174-181","DOIUrl":"https://doi.org/10.17706/jsw.16.4.174-181","url":null,"abstract":"Data is increasing at an enormous rate every day. Traditionally data has resided in silosacross any organization,so it’s difficult to have a complete picture for data driven business decision making. Data lake addresses the problem of rate of increase of data by providing “schema on read”, better integration and cheaper storage. It also solves the data silos problemby providing a central platform for a variety of data housing needs. However, implementing a data lake becomes challenging as the implementation needs to address the additional needs like metadata management, data discovery, data governance, data lifecycle management, security and centralized access controls mechanisms. This paper intends to provide a comprehensive architecture of data lake to address these challenges. We have also conducted and documented our experiments with publicly available datasets about COVID19 to validate the design and applicability of the proposed architecture for business analytics purposes.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"23 1","pages":"174-181"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81599625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Research of Statistical Analysis System Based on Business Decision Field 基于业务决策领域的统计分析系统设计与研究
e Informatica Softw. Eng. J. Pub Date : 2020-11-01 DOI: 10.17706/jsw.15.6.172-180
Xiao lianLi, Dexin Qiao, Yu Ding, Yingwen Shi, Wenting Guo, Daiming Wei
{"title":"Design and Research of Statistical Analysis System Based on Business Decision Field","authors":"Xiao lianLi, Dexin Qiao, Yu Ding, Yingwen Shi, Wenting Guo, Daiming Wei","doi":"10.17706/jsw.15.6.172-180","DOIUrl":"https://doi.org/10.17706/jsw.15.6.172-180","url":null,"abstract":"With the gradual deepening and expansion of the scale of enterprise information construction, it is more and more required that the system can break the business barriers and data barriers, and realize a new software design idea of data sharing, technology sharing and collaboration. At present, the data statistics system of large-scale energy enterprises has been unable to meet and adapt to the increasingly complex and huge data analysis demand group. There are many kinds of calculation caliber and groups, and the data processing capacity has multiplied. The original system has been overwhelmed. Therefore, a set of functions is needed to support the comprehensive statistical business needs of the group headquarters, integrate discrete statistics, and provide integrated big data statistical business management; finally, the functions of data collection, data verification and data presentation of the comprehensive statistical business of the company are realized, so as to improve the level of statistical business data query and data analysis.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"222 1","pages":"172-180"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信