{"title":"Personal Recommender System Based on Agglomerative Clustering together with User-based and Item-based Collaborative Filtering Methods","authors":"Ratawan Phantunin, N. Chirawichitchai","doi":"10.17706/jsw.15.6.163-171","DOIUrl":"https://doi.org/10.17706/jsw.15.6.163-171","url":null,"abstract":"The objective of this study is to develop and increase efficiency of Personal Integrated Recommender System. The Recommender System plays an important role and is crucial to our everyday lives in online shopping and online services. We will find that the thing that comes with when shopping for products or using services is to recommend products or services. A good Recommender System helps generate more sales. In the meantime, various problems could be found with the system, e.g. scalable data, data sparsity, data accuracy, and having a lot of new users. Therefore, new techniques have been introduced and integrated with the recommender system in order to solve the problems and improve for greater recommender system efficiency. In this study, an Agglomerative Clustering together with a User-base and Item-base Collaborative Filtering Method is proposed. By combining the strengths of each method, we can improve the recommender system efficiency and accuracy. This combination helps to solve the problems of scalable data, data sparsity, and having a lot of new users. The results show that it reduces the processing time and increases precision. Therefore, we can conclude that","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"126 1","pages":"163-171"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88174614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rayhanul Islam, A. Satter, Atish Kumar Dipongkor, Md. Saeed Siddik, K. Sakib
{"title":"A Novel Approach for Converting N-Dimensional Dataset into Two Dimensions to Improve Accuracy in Software Defect Prediction","authors":"Rayhanul Islam, A. Satter, Atish Kumar Dipongkor, Md. Saeed Siddik, K. Sakib","doi":"10.17706/jsw.15.6.147-162","DOIUrl":"https://doi.org/10.17706/jsw.15.6.147-162","url":null,"abstract":"Software defect prediction model is trained using code metrics and historical defect information to identify probable software defects. The accuracy and performance of a prediction model largely depend on the training dataset. In order to provide proper training dataset, it is required to make the dataset clustered with less variabilities using clustering algorithms. However, clustering process is hampered due to multiple attributes of dataset such as Coupling between Objects, Response for Class, Lines of Code, etc. This research will aim to predict software defects through reducing code metrics dimensions to two latent variables. It will finally help the clustering algorithms to group data properly for the defect prediction model. In this paper, the dataset similarities are analyzed by reducing code metrics’ attributes into two latent variables based on their impacts to defects. Their impacts to defects can be analyzed using regression analysis because it identifies the relationship among a set of dependent and independent variables. Then, the code metrics are merged into two variables PosImpactValue and NegImpactValue based on their positive or negative impact, respectively. As a result, multi-dimensional dataset is mapped into two-dimensional dataset. Plotting those dimensions reduced datasets enable distance-based clustering algorithms to group those datasets based on their similarities. Experiments have been performed on 18 releases of 6 open source software datasets such as jEdit, Ant, Xalan, Synapse, Tomcat and Camel. For comparative analysis, one of the most commonly used dimension reduction techniques named Principle Component Analysis (PCA) and two popular clustering techniques in defect prediction – DBSCAN and WHERE have been used in the experiment. First, the dimensions of the experimental datasets have been reduced using the proposed technique and PCA separately. Then, the reduced datasets have been clustered using DBSCAN and WHERE independently for identifying number of defects accurately. The comparative result analysis shows that the defect prediction models based on the clustering algorithms are more accurate for the dataset reduced by the proposed technique than PCA.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"64 1","pages":"147-162"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84798462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Technologies and Research Challenges on Microservice-Based NFV","authors":"Xiaochun Wu, Yuling Shen, Junnan Zhang","doi":"10.17706/jsw.15.5.138-146","DOIUrl":"https://doi.org/10.17706/jsw.15.5.138-146","url":null,"abstract":"In recent years, Network Function Virtualization (NFV) is an emerging key technology that has enabled network operators to change the way they build networks. The application of NFV improves the flexibility of the network and services, improves the operating efficiency, and reduces the operating costs. NFV reconstruction based on microservice architecture can speed up the software development cycle as well as decoupling software. This article first introduces the development process of NF from the physical equipment to the microservice based VNF. Then, we discuss the establishment of a trusted environment and the monitoring of the environment based on microservices which are the key security issues of NFV. Finally, we put forward some research challenges and future directions of NFV security based on microservices.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"58 1","pages":"138-146"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84559866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. F. A. Fadzlah, M. Shukran, Norshahariah Wahab, Muhamad Lazim Talib, S. Thanakodi
{"title":"Development of A Preliminary Usability Guidelines of Mobile Game Applications for Children: From the User Interface Perspectives","authors":"A. F. A. Fadzlah, M. Shukran, Norshahariah Wahab, Muhamad Lazim Talib, S. Thanakodi","doi":"10.17706/jsw.15.5.123-129","DOIUrl":"https://doi.org/10.17706/jsw.15.5.123-129","url":null,"abstract":"Usability guidelines is an important factor in designing and developing of successful user interfaces, and also the most widely used principle in the field of software engineering that defines the application’s demand and usage. Due to this reason, there are strong demands to conduct a study that focuses in developing new usability guidelines to design user interfaces of mobile game applications for children. Therefore, this study aimed at exploring the usability guidelines and investigating the importance of these guidelines in designing the user interfaces for mobile game application to be used among 1 to 3 years old children. As a result, a total number of 87 guidelines in which categorized into 17 usability characteristics were found highly associated in designing usable user interfaces for mobile game applications for these categories of users. This research effort has been in a position to derive a preliminary specification and scheme specifically for designing usable interfaces as well as developing mobile game applications from the perspective of children aged 1 to 3 years old.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"19 1","pages":"123-129"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81968865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Bus Management System Architecture Using Mesh App and Service Architecture","authors":"Surachet Sangkhapan, P. Wannapiroon, P. Nilsook","doi":"10.17706/jsw.15.5.130-137","DOIUrl":"https://doi.org/10.17706/jsw.15.5.130-137","url":null,"abstract":"Public transportation users in Thailand have faced the problem of wasting time waiting for the bus due to do not know when the bus will arrive, its location, number of passengers, and speed, etc. They are risky to injure and disability due to frequent accidents and have increased gradually each year. Therefore, this research aims to study smart bus management system architecture (SBMSA) using mesh app and service architecture (MASA), to synthesize SBMSA using MASA, and to evaluate the suitability of SBMSA by studying and analyzing related research on smart bus management system (SBMS) models. The researcher discovers a synthesized model of SBMSA using MASA which consists of 3 modules: IoT stack, GPS tracking system, and smart bus management system. Module 1 IoT stack consists of 5 subsystems: sensors devices and actuators, IoT gateway, communications network, cloud data management, and mesh app. Module 2 GPS tracking system to receive signals via satellite to specify bus location and route in real-time. Module 3 SBMS consists of 8 subsystems: smart tracking, smart gate attendance, smart camera, smart alert, smart estimate time of arrival, smart suggestions, smart accident center, and smart report. The suitability evaluation of SBMSA using MASA was at the highest level. The findings of this research will lead to the development of SBMS and help to solve problems of public transportation in the future.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"19 1","pages":"130-137"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85901264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithms for Adapting Communication Protocols of Fanet Networks","authors":"G. Vasilyev, D. Surzhik, O. Kuzichkin, I. Kurilov","doi":"10.17706/jsw.15.4.114-122","DOIUrl":"https://doi.org/10.17706/jsw.15.4.114-122","url":null,"abstract":"Ensuring the reliability and high throughput of information channels between unmanned aerial vehicles (UAVs) located in different environments and ground control centers requires the development of ad-hoc networks of aircraft (Flying Ad Hoc Network, FANET) that can function in case of accidental movements, switching on and off of network nodes, in case of accidental destructive effects on network nodes, failure of one or more control centers. Unstable operating conditions of the FANET network determine the relevance of adapting network protocols of different levels of the OSI model, while most of the known protocols of wireless ad-hoc networks are optimized for specific operating conditions. An overview of the existing adaptive protocols of the physical, channel, network, and transport levels of ad-hocnetworks is performed. The directions of further work on the development of new adaptive protocols aimed at building FANET networks with improved characteristics are determined.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"341 1","pages":"114-122"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90460344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Test-Driven Approach for Safety-Critical Software Development","authors":"Onur Özçelik, D. Altilar","doi":"10.17706/jsw.10.7.904-911","DOIUrl":"https://doi.org/10.17706/jsw.10.7.904-911","url":null,"abstract":"Nowadays software control large majority of systems that humankind use. Systems that software is used widely, such as transportation, military, medicine and avionics must be safe during operation. Fail in these critical systems may cause catastrophic results (i.e. loss of human life, loss or severe damage to environment or equipment etc.). In order to avoid failure on safety critical systems or at least mitigate risks detailed testing is required. Many safety critical systems are developed with sequential phases and tested with test last approach. But test last approach is not sufficient when requirements are unclear or changed. To overcome weaknesses of test last approach we propose test driven approach for safety critical software development, regulated by IEC 61508 standard. A systematic analysis of IEC 61508 software requirements against proposed approach showed that the approach directly supports some objectives and partially supports some of them. Supported objectives are safety requirement identification, simple and testable software design, verification and validation. In general introduced approach suits regulated software development well and this paper outlines these details.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"24 1","pages":"904-911"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78111952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node-Based Programmatic Modeling of Chain Mail","authors":"Qi Zhang, Jiani Zhou, T. Yun","doi":"10.17706/jsw.15.4.98-105","DOIUrl":"https://doi.org/10.17706/jsw.15.4.98-105","url":null,"abstract":"With the continuous development of three-dimensional movie and television animation technology, Three-dimensional technology is appearing in front of the audience with a new look. In modern animated movies, making digital modeling is an extremely important part. Maya as an excellent 3D production software. Naturally using Maya making digital modeling is the most common way. However, in the process of using Maya, it is inevitable that it will encounter very troublesome or very difficult problems. For example, when making a chain mail, it is very troublesome to place the position of the iron ring one by one to make it fit the clothes inside. Especially in film and television animation, there are many wrinkles on the cloth, it is not easy for the chain mail to fit these wrinkles. So you need to use other production tools to simplify the process. This article proposes that it may solve this problem by Houdini's node-based programmatic modeling, and confirmed the feasibility of this method. It also explores in depth which types of modeling can be helped by node-based programmatic method, as well as his strengths and weaknesses.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"1 1","pages":"98-105"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82794415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
André Luiz Garcia, Iury da Rocha Miguel, Jonathan Brendon Eugênio, Marina da Silva Vilela, G. Marcondes
{"title":"Scrum-Based Application for Agile Project Management","authors":"André Luiz Garcia, Iury da Rocha Miguel, Jonathan Brendon Eugênio, Marina da Silva Vilela, G. Marcondes","doi":"10.17706/jsw.15.4.106-113","DOIUrl":"https://doi.org/10.17706/jsw.15.4.106-113","url":null,"abstract":": Nowadays on projects there are a lot of data and requirements involved. Agile methodology can contribute significantly and in an organized way. One important tool for it is Kanban, a board that project team can easily view task status and evolution. This article presents a mobile application developed for delivering Kanban functionality in a project management software (Jira). The application was developed to help the day-by-day processes and a final survey demonstrated that the result was positive, according to the interviewed people.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"29 1","pages":"106-113"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74915936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sami Ouali, Naoufel Kraïem, Z. Al-Khanjari, Y. Baghdadi
{"title":"Model Driven Software Product Line Process for Service/Component-Based Applications","authors":"Sami Ouali, Naoufel Kraïem, Z. Al-Khanjari, Y. Baghdadi","doi":"10.17706/jsw.10.7.881-892","DOIUrl":"https://doi.org/10.17706/jsw.10.7.881-892","url":null,"abstract":"The software reuse becomes the key for companies to improve development costs, time-to-market, and software quality. The Software Product Line Engineering (SPLE) and the Model Driven Engineering (MDE) are two new forms of software reuse. Software product lines are recognized as a successful approach to reuse in many domains (cars, printers, phones…) and especially in software development. Software Product Line Engineering proposes a set of methods, techniques and a common set of software artifacts for the production of customized software products as atomic or composite services to be reused in SOA-based applications. The main purpose of MDE is to enhance productivity by maximizing compatibility between software systems and simplifying the process of design via reuse of standardized models and design patterns. This paper presents a process for the construction of software product lines using model driven techniques. This process is based on a combination of SPLE and the MDE throw the use of visual techniques for modeling product lines and model driven techniques. We have validated the approach with a common example of software product line to evaluate the approach (airline travel agency reservation system). We propose a tool that supports some software product line visual techniques and model driven techniques.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"28 1","pages":"881-892"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80314830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}