{"title":"Application of Mobile Information System in Vehicle Insurance","authors":"J. Wei, L. Peng","doi":"10.1109/SERA.2007.56","DOIUrl":"https://doi.org/10.1109/SERA.2007.56","url":null,"abstract":"This article introduces how to apply mobile information system in the insurance industry. Firstly, it analyses the current status and basic process of insurance business. Then, based on the problem of vehicle insurance business, we offer the solution and implementation of a new mobile information system. The target is that the insurer use smartphone to access the mobile xml data through wireless network. Which can increase the efficiency of insurance company and the satisfaction degree of client.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133380426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implantable Wireless Sensor Network to Monitor the Deep Body Temperature of Broilers","authors":"Hyun-Ho Yang, Y. Bae, Wongi Min","doi":"10.1109/SERA.2007.91","DOIUrl":"https://doi.org/10.1109/SERA.2007.91","url":null,"abstract":"A radio telemetry system was fabricated to continuously measure the deep body temperature (DBT) of broilers as an effort to monitor the occurrences of possible poultry diseases. It was shown that the DBT of broilers could be measured with an accuracy of plusmn0.1degC. Daily fluctuation of DBT in case of a 25 days old broiler was evaluated. To develop a system which can control the environment of poultry housing in real time based on DBT measurements, we proposed the design criteria of a dedicated receiver unit.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133083523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Database Operators for Sensor Networks","authors":"Seungjae Lee, Changhwa Kim, Sangkyung Kim","doi":"10.1109/SERA.2007.101","DOIUrl":"https://doi.org/10.1109/SERA.2007.101","url":null,"abstract":"Recently, researches on relational database approaches to sensor networks are being tried. There occur, however, some problems in applying directly the traditional relational database concepts into a sensor network in that every database operation is performed only on the real existing data which are tuples in database relations. The reason is because in a sensor network viewpoint situations under which some operations should be performed on non-existing data may occur frequently. For instance, Can we write a query to get temperature of a spot with no sensor node? Additionally, let us assume a sensor network that two different classes of nodes are scattered in the same area. We cannot get join results to know the relationship between two different classes of sensing values because there might be no nodes at a exact same location. For a solution about the above described problems we propose in this paper new database operators. This new database operators can provide more effective data management and standard interfaces to application programs in sensor networks.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122887399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Improvement of Bankruptcy Prediction using Credit Card Sales Information of Small & Micro Business","authors":"Jongsik Yoon, Young S. Kwon, T. Roh","doi":"10.1109/SERA.2007.105","DOIUrl":"https://doi.org/10.1109/SERA.2007.105","url":null,"abstract":"Due to the poor financial statements which represent credit risk of small and micro business, it's been difficult to develop the credit evaluation model that reflects both consumer credit risk and business credit risk of small and micro business. The purpose of this study is to develop the credit evaluation model for small and micro businesses using credit card sales information in lieu of poor financial information. In order to develop the model, we derive some variables and analyze the relationship between good and bad credits. We find out that twelve variables are significant in predicting good or bad risk for small and micro business, which are categorized into the business period, scale for sale, a fluctuation in sales, sales pattern and business category's bankruptcy ratio, etc. We employ the new statistical learning technique, support vector machines (SVM) as a classifier. We use grid search technique to find out better parameter for SVM. The experimental result shows that credit card sales information could be a good substitute for the financial data on business credit risk in predicting the bankruptcy for small-micro businesses. In addition, we also find out that SVM performs best, when compared with other classifiers such as neural networks, CART, C5.0, multivariate discriminant analysis (MDA), and logistic regression analysis (IRA).","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Energy-Efficient Clustering Using a Round-Robin Method in a Wireless Sensor Network","authors":"Do-Hyun Nam, Hong Min","doi":"10.1109/SERA.2007.47","DOIUrl":"https://doi.org/10.1109/SERA.2007.47","url":null,"abstract":"The routing algorithm used in the wireless sensor network features the clustering method to reduce the amount of data transmission from the energy efficiency perspective. However, the clustering method results in high energy consumption at the cluster head node. Dynamic clustering is a method used to resolve such a problem by distributing energy consumption through the re-selection of the cluster head node. Still, dynamic clustering modifies the cluster structure every time the cluster head node is re-selected, which causes energy consumption. In other words, the dynamic clustering approaches examined in previous studies involve the repetitive processes of cluster head node selection. This consumes a high amount of energy during the set-up process of cluster generation. In order to resolve the energy consumption problem associated with the repetitive set-up, this paper proposes the round-robin cluster header (RRCH) method that fixes the cluster and selects the head node in a round-robin method The RRCH approach is an energy-efficient method that realizes consistent and balanced energy consumption in each node of a generated cluster to prevent repetitious set-up processes as in the LEACH method. The propriety of the proposed method is substantiated with a simulation experiment.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements Specification: What Strategy Under What Conditions","authors":"J. Král, M. Zemlicka","doi":"10.1109/SERA.2007.112","DOIUrl":"https://doi.org/10.1109/SERA.2007.112","url":null,"abstract":"There are several strategies/philosophies of IS development (structured, data-oriented, object-oriented, service- oriented, and agile programming). Their application was to a high degree implied by technological conditions. The strategies have been determining the information systems architecture and the tools and methods of requirement specification. Due the success of new strategies the older ones are improperly considered to be obsolete. There are discussed the conditions under which the application of a particular strategy is not only feasible but optimal and when and how different strategies are to be combined. All the strategies except the service-oriented one are suited to the development of application more or less from scratch. The application has a programmed number of threads. The current largest information systems like the systems supporting e-government or global enterprises must have service- oriented architecture of a specific form - software confederations. Confederation-oriented strategy is different from the other strategies but it can (should) be combined with them. The main differences are in the use of legacy systems and software standards.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126961945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Caustics Effects with Photo-Realistic Rendering on Movie(\"Cars')","authors":"Jong Seo Kim, Kang-Soo You, Hoon-Sung Kwak","doi":"10.1109/SERA.2007.61","DOIUrl":"https://doi.org/10.1109/SERA.2007.61","url":null,"abstract":"Caustics effects caused by light refraction play an important role in photorealistic rendering to realize rendering like photos. This paper examines caustics effects for light and materials in photorealistic rendering techniques. This paper analyzes caustics used in 'Cars(2006)' of Pixar and realizes caustics effects by using 'Vray' used frequently for photorealistic effects recently. And this paper examines the use environment of each variable and better expression to realize effects. The results can be used as data on characteristic and capability for realization of caustics effects.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123653360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Formal Approach to Designing Anonymous Software","authors":"Yoshinobu Kawabe, Hideki Sakurada","doi":"10.1109/SERA.2007.13","DOIUrl":"https://doi.org/10.1109/SERA.2007.13","url":null,"abstract":"Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. However, a methodology for designing software that preserves anonymity has not yet been established. In the field of software engineering, it is well known that software correctness can be verified with a formal method. Following the formal method approach, this paper introduces an anonymity proof technique. By finding a condition called an anonymous simulation, we prove the anonymity of communication software. Our approach can deal with both eavesdroppers and stronger adversaries. This paper also demonstrates a formal verification of communication software. We employ Crowds, which is an implementation of an anonymous router, and verify the anonymity. After describing Crowds in a formal specification language, we prove its anonymity with a theorem proven In this verification, we employ a formal verification tool called IOA-Toolkit.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122635148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joonseok Park, Mikyeong Moon, Seongjin Hwang, Keunhyuk Yeom
{"title":"CASS: A Context-Aware Simulation System for Smart Home","authors":"Joonseok Park, Mikyeong Moon, Seongjin Hwang, Keunhyuk Yeom","doi":"10.1109/SERA.2007.60","DOIUrl":"https://doi.org/10.1109/SERA.2007.60","url":null,"abstract":"Ubiquitous computing (ubicomp) environments provide access to information and computing resources for users at any time and anywhere. In the approaching ubiquitous ear, many self-adaptive applications are emerging. These can be made to adapt to the environment within which the application operates. Context information is the key to producing self-adaptive applications in ubicomp environments. However, the supporting infrastructure that generates context information can be made dynamically responsive to the environment. Therefore, for the development of self-adaptive applications, it is necessary to demonstrate that valid context information can be created by virtual sensors instead of physical sensors. In this paper we present a context aware simulation system called CASS. In particular, it generates the context information associated with virtual sensors and virtual devices in a smart home domain. By using CASS, the self-adaptive application developer can immediately detect rule conflict in context information and determine optimal sensors and devices in a smart home.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121717556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RVERL: Run-time Verification of Real-time and Reactive Programs using Event-based Real-Time Logic Approach","authors":"S. Jalili, Mehdi MirzaAghaei","doi":"10.1109/SERA.2007.116","DOIUrl":"https://doi.org/10.1109/SERA.2007.116","url":null,"abstract":"Conventional software verification and validation (V&V) approaches for real-time and reactive programs are not practical because applying formal methods is too complex and testing methods are incomplete. It seems runtime verification of programs is a novel approach as a compliment to testing methods. We use event-based real-time logic (ERL) as a specification language in order to simply specify safety properties. By applying aspect-oriented approach to instrumentation, we integrate runtime verification module (i.e. Monitor) with program itself and minimize overhead of runtime verification too. Our proposed method, RVERL, consists of three phases. First, safety properties are extracted from program requirements specification. Second, properties are mapped to timing, functional and deadline aspects which constitute the monitor. Then it is weaved to the program source code. Third, at the execution time, the monitor as a wrapper observes program behavior and protects the program against its misbehavior (i.e., property violations). Experiments on rail road crossing problem show that the RVERL reveals all property violations while overhead of runtime verification is just about 4 percent.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130591502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}