Jong-Hun Kim, Kyung-Yong Chung, Joong-Kyung Ryu, K. Rim, Jung-Hyun Lee
{"title":"Personal History Based Recommendation Service System with Collaborative Filtering","authors":"Jong-Hun Kim, Kyung-Yong Chung, Joong-Kyung Ryu, K. Rim, Jung-Hyun Lee","doi":"10.1109/ASEA.2008.56","DOIUrl":"https://doi.org/10.1109/ASEA.2008.56","url":null,"abstract":"Although the conventional ubiquitous home service provides services using the information of environments obtained by the analysis of sensors, it shows a lack of user information. If recommendation services are able to use the past item selection information related to the context information of users, individualized services would be achieved. Also, it is possible to solve a specialization tendency that makes not possible to avoid the taste of users themselves for recommended items when users use the item selection information of other users. This paper attempt to use Naive Bayesian for context model and propose recommendation service method based on personal history. And the recommendation service system (RSS) use a collaborative filtering (CF) to solve a specialization tendency on Open Service Gateway Initiative (OSGi).","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131836736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of the Perception of Computer Security between US and Korea: Focused on Rootkits","authors":"H. Hwang","doi":"10.1109/ASEA.2008.42","DOIUrl":"https://doi.org/10.1109/ASEA.2008.42","url":null,"abstract":"The surveys were conducted to compare the knowledge and experience of students of five Korean universities and three US universities with various forms of malware. The study included an empirical assessment of the cross-cultural similarities and differences between students in the two countries. The variables examined include knowledge of computer viruses, spyware, and rootkits as well as perceptions of the damage that can result from various computer malware. While the two groups are similar with respect to their relative familiarity of rootkits compared with that of spyware and viruses, and in terms of how they perceive the malware knowledge of their peers, significant differences were present in self-reported perceptions of rootkit familiarity. U.S. students showed higher levels for all tested malware types, including the fictional ldquoTrilobyterdquo virus. However, it is expected to experience an accelerated rootkit awareness because of the rapid assimilation of spyware knowledge in recent years.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123140528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Power of MOF-Based Meta-modeling of Components","authors":"P. Hnetynka, F. Plášil","doi":"10.1109/ASEA.2008.31","DOIUrl":"https://doi.org/10.1109/ASEA.2008.31","url":null,"abstract":"To allow comfortable and easy development, component systems have to provide a rather a big set of development supporting tools including at least a tool for composition and repository for storing and retrieving components. In this paper, we evaluate and present advantages of using MOF and meta-modeling during definition of component system and also during development of the supporting tools. Most of the presented arguments are based on a broad practical experience with designing the component systems SOFA and SOFA 2; the former designed in the classical ad hoc manual way, while the latter via meta-modeling.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"83 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134542098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Portal for the Technology of Collaborative Work on Virtual Space","authors":"S. Sophonpattanakit, T. Achalakul","doi":"10.1109/ASEA.2008.35","DOIUrl":"https://doi.org/10.1109/ASEA.2008.35","url":null,"abstract":"A learning portal is a concept designed to help the self-studying process, in which the problem-based learning is emphasized. The portal collects information from many sources and arranges the content in a way that encourages self-studying. In this research, we developed a Web learning portal, where users can access the contents from anywhere at any time. The usage and the development of a video conference package were chosen as our contents. The portal is designed to provide both interactive contents and the programming exercises. The learners can easily gain a basic knowledge of how a video conference package is developed. In other words, we provide a self access learning center for engineering students. A pre-test/post-test method was used to evaluate the effectiveness of an unsupervised learning process. The evaluation results are favorable.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116487966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research about Two-Level Cache Base on SDRAM in RAID Controller","authors":"Jiang Guo-song, Lu Zheng-wu, Wang Yu-de","doi":"10.1109/ASEA.2008.6","DOIUrl":"https://doi.org/10.1109/ASEA.2008.6","url":null,"abstract":"In RAID system, the disk cache for improving RAID system performance is a very important aspect. Two-level cache displays superior performance in comparison to single cache and is effective in temporal and spatial locality. The proposed cache system in this paper consists in two levels. The first level cache is a set associative cache with small block size whereas the second level cache is a fully associative cache with large block size. In this paper, a RAID disk cache model is presented that is located on a disk controller, which can improve disk input and output time especially in a large capacity disk cache and maintain consistency effectively. The aim is to show, in terms of hit ratio and service time, that the two-level cache structure presented in this paper is in fact much improved.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Information Acquisition Method Based on NetFlow for Network Situation Awareness","authors":"Huiqiang Wang, Renjie Zhou, Yingjie He","doi":"10.1109/ASEA.2008.20","DOIUrl":"https://doi.org/10.1109/ASEA.2008.20","url":null,"abstract":"Network situation information acquisition plays an important role in the entire process of network situation awareness. In this paper, we presented a multi-level, multi-perspective and multi-granularity traffic information acquisition method to get traffic information. In addition, we presented a multi-layer detection model that combines baseline based detection layer and signature based detection layer to acquire security incident information. Accordingly, we profiled portpsilas normal behavior for baseline based detection by statistical method and established an incident signature base for signature based detection.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134496595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Consistency Checking Techniques for UML Models","authors":"M. Usman, A. Nadeem, Tai-hoon Kim, Eun-suk Cho","doi":"10.1109/ASEA.2008.40","DOIUrl":"https://doi.org/10.1109/ASEA.2008.40","url":null,"abstract":"UML is the de-facto industry standard to design object-oriented software. UML provides a set of diagrams to model every aspect of an object-oriented application design in sufficient detail, but lacks any mechanism to rigorously check consistency between the models. Today, most of the effort is applied on creating accurate and consistent UML models rather than implementing the design. Automatic code generation from UML models has emerged as a promising area in recent years. The accuracy of generated code in some ways depends on UML models consistency. In this paper, we present a survey of UML consistency checking techniques. To analyze existing techniques, we identify some analysis parameters and construct an analysis table. The analysis table helps us to evaluate existing consistency checking techniques. We conclude that most of the approaches validates intra and inter level consistencies between UML models by using monitoring strategy. UML class, sequence, and statechart diagrams are used in most of the existing consistency checking techniques.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133897520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Development Method of GUI in Military System Software","authors":"Sun-myung Hwang, J. Jo","doi":"10.1109/ASEA.2008.48","DOIUrl":"https://doi.org/10.1109/ASEA.2008.48","url":null,"abstract":"In the development of the military system software it is very difficult to decide the figure of the GUI (graphic user interface) at the beginning of the development process. At the last moment of the development process there raises many requirements and modification that results in the changes in the GUI. So in this paper we suggest the function call and network distributed GUI method to meet such requirements for last minute changes more effectively and actively.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122024340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Software Failure Prediction Based on Fractal","authors":"Yong Cao, Qingxin Zhu","doi":"10.1109/ASEA.2008.24","DOIUrl":"https://doi.org/10.1109/ASEA.2008.24","url":null,"abstract":"Reliability is one of the most important qualities of software, and failure analysis is an important part of the research of software reliability. Fractals are mathematical or natural objects that are made of parts similar to the whole in certain ways. A fractal has a self-similar structure that occurs at different scales. In this paper the failure data of software are analyzed, the fractals are discovered in the data, and the method of software failure prediction based on fractals is proposed. Analyzing the empirical failure data (three data sets including two of Musa's) validates the validity of the model. It should be noticed that the analyses and research methods in this paper are differ from the conventional methods in the past, and a new idea for the research of the software failure mechanism is presented.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125088946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Fire Detection System","authors":"Oh-Hyun Kwon, Sung-Min Cho, Sun-myung Hwang","doi":"10.1109/ASEA.2008.49","DOIUrl":"https://doi.org/10.1109/ASEA.2008.49","url":null,"abstract":"Most of the fire detection are performed by sensor-based systems which have perceived the temperature and smoke by themselves and utilized in various type of industry after combining with the fuzzy theory. Generally this kind of methodology is useful for many spots of fire occurrences. However, it could not satisfy the requirement of accuracy and reliability on some environment. For example, large spaced factories, common area of electric power facility, communication facility are vulnerable to the sensing accuracy and too expensive to cover the entire place. Thus, fire might spread widely over the spots and hard to extinguish even though those sensors detect the fire. For the more it could be worse in the area that causes high temperature, humidity, dust, vibrations. In this study, we tried to improve the problems by using camera image processing instead of sensors. We designed the prototyped system and implemented it after suggesting some type of fire detection algorithm.","PeriodicalId":223823,"journal":{"name":"2008 Advanced Software Engineering and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130427587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}