{"title":"Design and Implementation of Hardware in the Loop Simulation Operation Simulator for Complex Mechanical Equipment","authors":"Siyu Li, Shaoluo Huang, Shuo Meng, Weiyi Wu","doi":"10.17706/jsw.16.3.145-156","DOIUrl":"https://doi.org/10.17706/jsw.16.3.145-156","url":null,"abstract":"Hardware in the loop simulation technology is an important branch of system modeling and simulation. With the development of artificial intelligence, big data, virtual reality and other technologies, more and more advanced technologies are integrated into it, and the economic and military benefits are constantly highlighted, which attracts the attention of all parties. In view of the complex structure of modern large-scale mechanical equipment system and the high cost-effectiveness ratio of carrying out practical operation training, an operation simulator is developed by using hardware in the loop simulation and virtual reality technology. The simulator can complete the daily training of mechanical equipment and the interactive operation, maintenance training, assessment and operation data recording of other equipment, and can popularize and update equipment knowledge Improve the technical level and maintenance skills of operators and technical support personnel as soon as possible.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"285 1","pages":"145-156"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76869796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Quality Model in the Presence of Culture Quality Factors","authors":"A. Mohammad, Hamed Fawareh","doi":"10.17706/jsw.16.5.248-258","DOIUrl":"https://doi.org/10.17706/jsw.16.5.248-258","url":null,"abstract":"","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"39 1","pages":"248-258"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79753455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaolu Zhang, H. Quan, Huixian Sun, P. Cui, Guangkai Liu
{"title":"A Synchronization Acquisition Method for the Dual-Sequence-Frequency-Hopping Communication System Based on Software Defined Radio at Low SNR","authors":"Xiaolu Zhang, H. Quan, Huixian Sun, P. Cui, Guangkai Liu","doi":"10.17706/jsw.16.5.235-247","DOIUrl":"https://doi.org/10.17706/jsw.16.5.235-247","url":null,"abstract":"The Dual-Sequence-Frequency-Hopping (DSFH) communication system based on software defined radio (SDR) system belongs to the field of information and communication security of software engineering. At very low signal-to-noise ratio (SNR), which is lower than -10dB, the DSFH fails to synchronize. Synchronization acquisition method via a combined multi-signal detection (SAMCMD) is proposed. The feature of a short sequence of frequency hopping (FH) frequency point is utilized to express the information of the time of date (TOD), and the time accumulation of several FH signals is used to extend the detection time. This method can not only be appropriate for DSFH but also greatly improve the synchronization performance at low SNR. Explain the principle and structure of the SAMCMD. And obtain the performance of this method of the SDR synchronization acquisition. The conclusions are as below: 1) the longer detection time is, the better the anti-jamming performance of SAMCMD is; 2) SAMCMD can gain about 22.5dB-24dB when the SNR is -20dB and the acquisition probability requirement is 96.31% due to the extension of the detection time, compared with the traditional FH synchronization acquisition method.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"168 1","pages":"235-247"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84054911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements Engineering: An Industrial Survey in the Gulf Cooperation Council Countries","authors":"A. Alzayed","doi":"10.17706/jsw.16.3.107-129","DOIUrl":"https://doi.org/10.17706/jsw.16.3.107-129","url":null,"abstract":"Requirements engineering (RE), the process of defining the requirements of a system, is critical to the successful implementation of software projects. Although many studies have been globally conducted on the different facets of RE in software engineering, studies explicitly focusing on the countries of the Gulf Cooperation Council (GCC) have been scarce. GCC-specific RE research studies are needed because of the unique cultural characteristics and common work ethics in GCC countries. Besides, the investigation of the state of RE practices in the countries of the GCC is crucial as the globalization of software development becomes imminent. This study compares the state of RE practices within the six countries of the GCC, namely, the Kingdom of Saudi Arabia (KSA), the United Arab Emirates (UAE), Qatar, Kuwait, Bahrain, and Oman, using six RE factors. To understand commonalities and differences in the RE practices and methods, 163 software practitioners in GCC countries are surveyed in this study. The results show that the RE practices are relatively similar among the six countries, with subtle differences. Initiating software-related projects with unclear requirements and undefined project scopes are the two major limitations of the RE practices among the survey participants. The results of this study contribute to providing project managers and system analysts, who are working globally and within the GCC countries, with valuable decision-making tools to help them consider the identified RE techniques, methods, and challenges and their related risks early in their software development projects","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"42 1","pages":"107-129"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87403019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for the Regression Testing of Model-to-Model Transformations","authors":"Issam Al-Azzoni, S. Iqbal","doi":"10.37190/e-inf210104","DOIUrl":"https://doi.org/10.37190/e-inf210104","url":null,"abstract":"Background: Model transformations play a key role in Model-Driven Engineering (MDE). Testing model transformation is an important activity to ensure the quality and correctness of the generated models. However, during the evolution and maintenance of these model transformation programs, frequently testing them by running a large number of test cases can be costly. Regression test selection is a form of testing, which selects tests from an existing test suite to test a modified program. Aim: The aim of the paper is to present a test selection approach for the regression testing of model transformations. The selected test case suite should be smaller in size than the full test suite, thereby reducing the testing overhead, while at the same time the fault detection capability of the full test suite should not be compromised. Method: approach is based on the use of a traceability mapping of test cases with their corresponding rules to select the affected test items. The approach is complemented with a tool that automates the proposed process. Results: Our experiments show that the proposed approach succeeds in reducing the size of the selected test case suite, and hence its execution time, while not compromising the fault detection capability of the full test suite. Conclusion: The experimental results confirm that our regression test selection approach is cost-effective compared to a retest strategy.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86761379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Klotins, M. Unterkalmsteiner, Panagiota Chatzipetrou, T. Gorschek, R. Prikladnicki, Nirnaya Tripathi, L. Pompermaier
{"title":"SIoT Framework: Towards an Approach for Early Identification of Security Requirements for Internet-of-things Applications","authors":"E. Klotins, M. Unterkalmsteiner, Panagiota Chatzipetrou, T. Gorschek, R. Prikladnicki, Nirnaya Tripathi, L. Pompermaier","doi":"10.37190/e-inf210103","DOIUrl":"https://doi.org/10.37190/e-inf210103","url":null,"abstract":"","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80857066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on User Experience of Mobile Learning System Based on WeChat","authors":"Lei Peng","doi":"10.17706/jsw.16.2.55-66","DOIUrl":"https://doi.org/10.17706/jsw.16.2.55-66","url":null,"abstract":"Based on the theory of user experience design, this paper analyzed the key factors of mobile learning system user experience based on WeChat, and with the development practice of \"mobile micro-classroom system\" it also analyzed the roles that technology of Responsive Mobile Webpage, OAuth authentication technology, WeChat template message technology, and WeChat JS-SDK technology played in improving the user experience of a mobile learning system. Questionnaires method have been used to analyze the applying effect of the system. In conclusion, the users were satisfied with their experience in mobile learning, and insights in the development of mobile learning systems are also summarized.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"16 1","pages":"55-66"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87346886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Method of Chinese Electronic Medical Records Entity Labeling Based on BIC model","authors":"Yifan Wang, Guowei Teng, Xuehai Ding, Guoqing Zhang, Yunchao Ling, Guozhong Wang","doi":"10.17706/jsw.16.1.24-38","DOIUrl":"https://doi.org/10.17706/jsw.16.1.24-38","url":null,"abstract":"In the field of bio-medicine, mass data are generated every day, such as Chinese electronic medical record (EMR), containing massive medical terminology and specific categories of entities. The way to analyze and obtain effective information from these sparse data is a difficulty in research. As the foundation of analyzing huge amount of biomedical text data, Named Entity Recognition (NER) is essential in Natural Language Processing (NLP) complementing with effective labeling data. One of the two basic sequence labeling methods is rule-based bulk corpus tagging, requiring domain experts to establish targeted recognition rule base. However, in the application field, this method is single, and the portability does not make the expectation, bringing great limitations; The other is complete manual labeling, but it is time-consuming and laborious. Based on Bidirectional Long Short-Term Memory network (BiLSTM), Iterated Dilated Convolution Neural Network (IDCNN) and Conditional Random Field (CRF), we proposed the BIC model. This paper proposes a method for EMR entity labeling based on BIC model, realizing automatic annotation of Chinese EMR data. Machine labeling data can be used after manual review, which will reduce the workload of manual labeling bestially. Compared with other models, F1 value of BIC model reached 91.90% in CCKS2017 dataset, and 78% in PACS report data. Experiments show that our method is superior to the others.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"39 1","pages":"24-38"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88674246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecting an Enterprise Data Lake, A Covid19 Case Study","authors":"Bushra, M. Memon, Salahuddin Saddar","doi":"10.17706/jsw.16.4.174-181","DOIUrl":"https://doi.org/10.17706/jsw.16.4.174-181","url":null,"abstract":"Data is increasing at an enormous rate every day. Traditionally data has resided in silosacross any organization,so it’s difficult to have a complete picture for data driven business decision making. Data lake addresses the problem of rate of increase of data by providing “schema on read”, better integration and cheaper storage. It also solves the data silos problemby providing a central platform for a variety of data housing needs. However, implementing a data lake becomes challenging as the implementation needs to address the additional needs like metadata management, data discovery, data governance, data lifecycle management, security and centralized access controls mechanisms. This paper intends to provide a comprehensive architecture of data lake to address these challenges. We have also conducted and documented our experiments with publicly available datasets about COVID19 to validate the design and applicability of the proposed architecture for business analytics purposes.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"23 1","pages":"174-181"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81599625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Research of Statistical Analysis System Based on Business Decision Field","authors":"Xiao lianLi, Dexin Qiao, Yu Ding, Yingwen Shi, Wenting Guo, Daiming Wei","doi":"10.17706/jsw.15.6.172-180","DOIUrl":"https://doi.org/10.17706/jsw.15.6.172-180","url":null,"abstract":"With the gradual deepening and expansion of the scale of enterprise information construction, it is more and more required that the system can break the business barriers and data barriers, and realize a new software design idea of data sharing, technology sharing and collaboration. At present, the data statistics system of large-scale energy enterprises has been unable to meet and adapt to the increasingly complex and huge data analysis demand group. There are many kinds of calculation caliber and groups, and the data processing capacity has multiplied. The original system has been overwhelmed. Therefore, a set of functions is needed to support the comprehensive statistical business needs of the group headquarters, integrate discrete statistics, and provide integrated big data statistical business management; finally, the functions of data collection, data verification and data presentation of the comprehensive statistical business of the company are realized, so as to improve the level of statistical business data query and data analysis.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"222 1","pages":"172-180"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}