e Informatica Softw. Eng. J.最新文献

筛选
英文 中文
Personal Recommender System Based on Agglomerative Clustering together with User-based and Item-based Collaborative Filtering Methods 基于聚类与基于用户和基于项目的协同过滤的个人推荐系统
e Informatica Softw. Eng. J. Pub Date : 2020-11-01 DOI: 10.17706/jsw.15.6.163-171
Ratawan Phantunin, N. Chirawichitchai
{"title":"Personal Recommender System Based on Agglomerative Clustering together with User-based and Item-based Collaborative Filtering Methods","authors":"Ratawan Phantunin, N. Chirawichitchai","doi":"10.17706/jsw.15.6.163-171","DOIUrl":"https://doi.org/10.17706/jsw.15.6.163-171","url":null,"abstract":"The objective of this study is to develop and increase efficiency of Personal Integrated Recommender System. The Recommender System plays an important role and is crucial to our everyday lives in online shopping and online services. We will find that the thing that comes with when shopping for products or using services is to recommend products or services. A good Recommender System helps generate more sales. In the meantime, various problems could be found with the system, e.g. scalable data, data sparsity, data accuracy, and having a lot of new users. Therefore, new techniques have been introduced and integrated with the recommender system in order to solve the problems and improve for greater recommender system efficiency. In this study, an Agglomerative Clustering together with a User-base and Item-base Collaborative Filtering Method is proposed. By combining the strengths of each method, we can improve the recommender system efficiency and accuracy. This combination helps to solve the problems of scalable data, data sparsity, and having a lot of new users. The results show that it reduces the processing time and increases precision. Therefore, we can conclude that","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"126 1","pages":"163-171"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88174614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Converting N-Dimensional Dataset into Two Dimensions to Improve Accuracy in Software Defect Prediction 一种将n维数据集转换为二维数据集以提高软件缺陷预测精度的新方法
e Informatica Softw. Eng. J. Pub Date : 2020-11-01 DOI: 10.17706/jsw.15.6.147-162
Rayhanul Islam, A. Satter, Atish Kumar Dipongkor, Md. Saeed Siddik, K. Sakib
{"title":"A Novel Approach for Converting N-Dimensional Dataset into Two Dimensions to Improve Accuracy in Software Defect Prediction","authors":"Rayhanul Islam, A. Satter, Atish Kumar Dipongkor, Md. Saeed Siddik, K. Sakib","doi":"10.17706/jsw.15.6.147-162","DOIUrl":"https://doi.org/10.17706/jsw.15.6.147-162","url":null,"abstract":"Software defect prediction model is trained using code metrics and historical defect information to identify probable software defects. The accuracy and performance of a prediction model largely depend on the training dataset. In order to provide proper training dataset, it is required to make the dataset clustered with less variabilities using clustering algorithms. However, clustering process is hampered due to multiple attributes of dataset such as Coupling between Objects, Response for Class, Lines of Code, etc. This research will aim to predict software defects through reducing code metrics dimensions to two latent variables. It will finally help the clustering algorithms to group data properly for the defect prediction model. In this paper, the dataset similarities are analyzed by reducing code metrics’ attributes into two latent variables based on their impacts to defects. Their impacts to defects can be analyzed using regression analysis because it identifies the relationship among a set of dependent and independent variables. Then, the code metrics are merged into two variables PosImpactValue and NegImpactValue based on their positive or negative impact, respectively. As a result, multi-dimensional dataset is mapped into two-dimensional dataset. Plotting those dimensions reduced datasets enable distance-based clustering algorithms to group those datasets based on their similarities. Experiments have been performed on 18 releases of 6 open source software datasets such as jEdit, Ant, Xalan, Synapse, Tomcat and Camel. For comparative analysis, one of the most commonly used dimension reduction techniques named Principle Component Analysis (PCA) and two popular clustering techniques in defect prediction – DBSCAN and WHERE have been used in the experiment. First, the dimensions of the experimental datasets have been reduced using the proposed technique and PCA separately. Then, the reduced datasets have been clustered using DBSCAN and WHERE independently for identifying number of defects accurately. The comparative result analysis shows that the defect prediction models based on the clustering algorithms are more accurate for the dataset reduced by the proposed technique than PCA.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"64 1","pages":"147-162"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84798462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Technologies and Research Challenges on Microservice-Based NFV 基于微服务的NFV安全技术与研究挑战
e Informatica Softw. Eng. J. Pub Date : 2020-09-01 DOI: 10.17706/jsw.15.5.138-146
Xiaochun Wu, Yuling Shen, Junnan Zhang
{"title":"Security Technologies and Research Challenges on Microservice-Based NFV","authors":"Xiaochun Wu, Yuling Shen, Junnan Zhang","doi":"10.17706/jsw.15.5.138-146","DOIUrl":"https://doi.org/10.17706/jsw.15.5.138-146","url":null,"abstract":"In recent years, Network Function Virtualization (NFV) is an emerging key technology that has enabled network operators to change the way they build networks. The application of NFV improves the flexibility of the network and services, improves the operating efficiency, and reduces the operating costs. NFV reconstruction based on microservice architecture can speed up the software development cycle as well as decoupling software. This article first introduces the development process of NF from the physical equipment to the microservice based VNF. Then, we discuss the establishment of a trusted environment and the monitoring of the environment based on microservices which are the key security issues of NFV. Finally, we put forward some research challenges and future directions of NFV security based on microservices.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"58 1","pages":"138-146"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84559866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of A Preliminary Usability Guidelines of Mobile Game Applications for Children: From the User Interface Perspectives 开发儿童手机游戏应用的初步可用性指南:从用户界面的角度
e Informatica Softw. Eng. J. Pub Date : 2020-09-01 DOI: 10.17706/jsw.15.5.123-129
A. F. A. Fadzlah, M. Shukran, Norshahariah Wahab, Muhamad Lazim Talib, S. Thanakodi
{"title":"Development of A Preliminary Usability Guidelines of Mobile Game Applications for Children: From the User Interface Perspectives","authors":"A. F. A. Fadzlah, M. Shukran, Norshahariah Wahab, Muhamad Lazim Talib, S. Thanakodi","doi":"10.17706/jsw.15.5.123-129","DOIUrl":"https://doi.org/10.17706/jsw.15.5.123-129","url":null,"abstract":"Usability guidelines is an important factor in designing and developing of successful user interfaces, and also the most widely used principle in the field of software engineering that defines the application’s demand and usage. Due to this reason, there are strong demands to conduct a study that focuses in developing new usability guidelines to design user interfaces of mobile game applications for children. Therefore, this study aimed at exploring the usability guidelines and investigating the importance of these guidelines in designing the user interfaces for mobile game application to be used among 1 to 3 years old children. As a result, a total number of 87 guidelines in which categorized into 17 usability characteristics were found highly associated in designing usable user interfaces for mobile game applications for these categories of users. This research effort has been in a position to derive a preliminary specification and scheme specifically for designing usable interfaces as well as developing mobile game applications from the perspective of children aged 1 to 3 years old.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"19 1","pages":"123-129"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81968865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Bus Management System Architecture Using Mesh App and Service Architecture 基于Mesh App和Service架构的智能公交管理系统架构
e Informatica Softw. Eng. J. Pub Date : 2020-09-01 DOI: 10.17706/jsw.15.5.130-137
Surachet Sangkhapan, P. Wannapiroon, P. Nilsook
{"title":"Smart Bus Management System Architecture Using Mesh App and Service Architecture","authors":"Surachet Sangkhapan, P. Wannapiroon, P. Nilsook","doi":"10.17706/jsw.15.5.130-137","DOIUrl":"https://doi.org/10.17706/jsw.15.5.130-137","url":null,"abstract":"Public transportation users in Thailand have faced the problem of wasting time waiting for the bus due to do not know when the bus will arrive, its location, number of passengers, and speed, etc. They are risky to injure and disability due to frequent accidents and have increased gradually each year. Therefore, this research aims to study smart bus management system architecture (SBMSA) using mesh app and service architecture (MASA), to synthesize SBMSA using MASA, and to evaluate the suitability of SBMSA by studying and analyzing related research on smart bus management system (SBMS) models. The researcher discovers a synthesized model of SBMSA using MASA which consists of 3 modules: IoT stack, GPS tracking system, and smart bus management system. Module 1 IoT stack consists of 5 subsystems: sensors devices and actuators, IoT gateway, communications network, cloud data management, and mesh app. Module 2 GPS tracking system to receive signals via satellite to specify bus location and route in real-time. Module 3 SBMS consists of 8 subsystems: smart tracking, smart gate attendance, smart camera, smart alert, smart estimate time of arrival, smart suggestions, smart accident center, and smart report. The suitability evaluation of SBMSA using MASA was at the highest level. The findings of this research will lead to the development of SBMS and help to solve problems of public transportation in the future.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"19 1","pages":"130-137"},"PeriodicalIF":0.0,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85901264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithms for Adapting Communication Protocols of Fanet Networks Fanet网络通信协议自适应算法
e Informatica Softw. Eng. J. Pub Date : 2020-07-01 DOI: 10.17706/jsw.15.4.114-122
G. Vasilyev, D. Surzhik, O. Kuzichkin, I. Kurilov
{"title":"Algorithms for Adapting Communication Protocols of Fanet Networks","authors":"G. Vasilyev, D. Surzhik, O. Kuzichkin, I. Kurilov","doi":"10.17706/jsw.15.4.114-122","DOIUrl":"https://doi.org/10.17706/jsw.15.4.114-122","url":null,"abstract":"Ensuring the reliability and high throughput of information channels between unmanned aerial vehicles (UAVs) located in different environments and ground control centers requires the development of ad-hoc networks of aircraft (Flying Ad Hoc Network, FANET) that can function in case of accidental movements, switching on and off of network nodes, in case of accidental destructive effects on network nodes, failure of one or more control centers. Unstable operating conditions of the FANET network determine the relevance of adapting network protocols of different levels of the OSI model, while most of the known protocols of wireless ad-hoc networks are optimized for specific operating conditions. An overview of the existing adaptive protocols of the physical, channel, network, and transport levels of ad-hocnetworks is performed. The directions of further work on the development of new adaptive protocols aimed at building FANET networks with improved characteristics are determined.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"341 1","pages":"114-122"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90460344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Test-Driven Approach for Safety-Critical Software Development 安全关键软件开发的测试驱动方法
e Informatica Softw. Eng. J. Pub Date : 2020-07-01 DOI: 10.17706/jsw.10.7.904-911
Onur Özçelik, D. Altilar
{"title":"Test-Driven Approach for Safety-Critical Software Development","authors":"Onur Özçelik, D. Altilar","doi":"10.17706/jsw.10.7.904-911","DOIUrl":"https://doi.org/10.17706/jsw.10.7.904-911","url":null,"abstract":"Nowadays software control large majority of systems that humankind use. Systems that software is used widely, such as transportation, military, medicine and avionics must be safe during operation. Fail in these critical systems may cause catastrophic results (i.e. loss of human life, loss or severe damage to environment or equipment etc.). In order to avoid failure on safety critical systems or at least mitigate risks detailed testing is required. Many safety critical systems are developed with sequential phases and tested with test last approach. But test last approach is not sufficient when requirements are unclear or changed. To overcome weaknesses of test last approach we propose test driven approach for safety critical software development, regulated by IEC 61508 standard. A systematic analysis of IEC 61508 software requirements against proposed approach showed that the approach directly supports some objectives and partially supports some of them. Supported objectives are safety requirement identification, simple and testable software design, verification and validation. In general introduced approach suits regulated software development well and this paper outlines these details.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"24 1","pages":"904-911"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78111952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Node-Based Programmatic Modeling of Chain Mail 基于节点的链甲编程建模
e Informatica Softw. Eng. J. Pub Date : 2020-07-01 DOI: 10.17706/jsw.15.4.98-105
Qi Zhang, Jiani Zhou, T. Yun
{"title":"Node-Based Programmatic Modeling of Chain Mail","authors":"Qi Zhang, Jiani Zhou, T. Yun","doi":"10.17706/jsw.15.4.98-105","DOIUrl":"https://doi.org/10.17706/jsw.15.4.98-105","url":null,"abstract":"With the continuous development of three-dimensional movie and television animation technology, Three-dimensional technology is appearing in front of the audience with a new look. In modern animated movies, making digital modeling is an extremely important part. Maya as an excellent 3D production software. Naturally using Maya making digital modeling is the most common way. However, in the process of using Maya, it is inevitable that it will encounter very troublesome or very difficult problems. For example, when making a chain mail, it is very troublesome to place the position of the iron ring one by one to make it fit the clothes inside. Especially in film and television animation, there are many wrinkles on the cloth, it is not easy for the chain mail to fit these wrinkles. So you need to use other production tools to simplify the process. This article proposes that it may solve this problem by Houdini's node-based programmatic modeling, and confirmed the feasibility of this method. It also explores in depth which types of modeling can be helped by node-based programmatic method, as well as his strengths and weaknesses.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"1 1","pages":"98-105"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82794415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scrum-Based Application for Agile Project Management 基于scrum的敏捷项目管理应用
e Informatica Softw. Eng. J. Pub Date : 2020-07-01 DOI: 10.17706/jsw.15.4.106-113
André Luiz Garcia, Iury da Rocha Miguel, Jonathan Brendon Eugênio, Marina da Silva Vilela, G. Marcondes
{"title":"Scrum-Based Application for Agile Project Management","authors":"André Luiz Garcia, Iury da Rocha Miguel, Jonathan Brendon Eugênio, Marina da Silva Vilela, G. Marcondes","doi":"10.17706/jsw.15.4.106-113","DOIUrl":"https://doi.org/10.17706/jsw.15.4.106-113","url":null,"abstract":": Nowadays on projects there are a lot of data and requirements involved. Agile methodology can contribute significantly and in an organized way. One important tool for it is Kanban, a board that project team can easily view task status and evolution. This article presents a mobile application developed for delivering Kanban functionality in a project management software (Jira). The application was developed to help the day-by-day processes and a final survey demonstrated that the result was positive, according to the interviewed people.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"29 1","pages":"106-113"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74915936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Model Driven Software Product Line Process for Service/Component-Based Applications 基于服务/组件的应用程序的模型驱动软件产品线流程
e Informatica Softw. Eng. J. Pub Date : 2020-07-01 DOI: 10.17706/jsw.10.7.881-892
Sami Ouali, Naoufel Kraïem, Z. Al-Khanjari, Y. Baghdadi
{"title":"Model Driven Software Product Line Process for Service/Component-Based Applications","authors":"Sami Ouali, Naoufel Kraïem, Z. Al-Khanjari, Y. Baghdadi","doi":"10.17706/jsw.10.7.881-892","DOIUrl":"https://doi.org/10.17706/jsw.10.7.881-892","url":null,"abstract":"The software reuse becomes the key for companies to improve development costs, time-to-market, and software quality. The Software Product Line Engineering (SPLE) and the Model Driven Engineering (MDE) are two new forms of software reuse. Software product lines are recognized as a successful approach to reuse in many domains (cars, printers, phones…) and especially in software development. Software Product Line Engineering proposes a set of methods, techniques and a common set of software artifacts for the production of customized software products as atomic or composite services to be reused in SOA-based applications. The main purpose of MDE is to enhance productivity by maximizing compatibility between software systems and simplifying the process of design via reuse of standardized models and design patterns. This paper presents a process for the construction of software product lines using model driven techniques. This process is based on a combination of SPLE and the MDE throw the use of visual techniques for modeling product lines and model driven techniques. We have validated the approach with a common example of software product line to evaluate the approach (airline travel agency reservation system). We propose a tool that supports some software product line visual techniques and model driven techniques.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"28 1","pages":"881-892"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80314830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信