{"title":"A technique to evaluate software evolution based on architecture metric","authors":"Bixin Li, Li Liao, Jingwen Si","doi":"10.1109/SERA.2016.7516156","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516156","url":null,"abstract":"Software evolution is always happening during its lifetime. In a software evolution process, the change in software structure often leads to software quality degradation, makes it difficult to maintain or transfer to other platform. In this paper, we propose a technique to evaluate software evolution based on architecture metric. We split the whole architecture evolution process into a series of atomic evolution operation steps, analyze the impact of each atomic change operation with examples, and then find out the general evolution trend. Our purpose is to analyze how architecture changes influence the relevant software quality attributes, which helps to maintain good software quality and keep software healthily evolving.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123776670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of Western Australian Software Businesses an exlporative web content analysis","authors":"Arunasalam Sambhanthan, V. Potdar","doi":"10.1109/SERA.2016.7516150","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516150","url":null,"abstract":"This paper surveys the Western Australian Software Businesses. A literature survey of Australian software firms has been done. Documented studies on Australian software businesses includes themes such as quality management systems, knowledge intensive service activities, requirement engineering practices, software testing practices, knowledge management practices and project management practices. The web content analysis shows that there are around 334 western Australian software businesses that have a web presence. Amongst this there are around 285 project based companies and 49 product based companies which are widespread across twenty towns in the Western Australian state. The key business aspects which are primarily important for the success of Western Australian software businesses are identified as the geographic distribution, human resources structure, business incubation and vendor orientation. Finally we are outlining a number of implications for Western Australian Software businesses to boost their businesses in the forthcoming years.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126753212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stakeholder's expected value of Enterprise Architecture: An Enterprise Architecture solution based on stakeholder perspective","authors":"Ira Puspitasari","doi":"10.1109/SERA.2016.7516152","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516152","url":null,"abstract":"Many enterprises develop and adopt Enterprise Architecture (EA) to achieve IT and business alignment and to support strategic business excellence. However, EA contribution to enterprise goals is questionable. The EA implementation is ineffective because stakeholders are reluctant to actively adopt it in their enterprise life. The reluctance happens because the EA product does not accommodate stakeholder's expected values. No matter how excellent an EA is, if the stakeholder rejects its content, it becomes meaningless and loses its strategic functionality. Thus, EA architect needs to identify and accommodate stakeholder's expected value. The next problem arises when a stakeholder's expected value conflicts with others' expected value or enterprise objective. This paper proposes a solution based on the stakeholder perspective to improve a successful and smooth EA implementation. The proposed approach consists of the stakeholder's expected value analysis scheme, the EA stakeholder profile catalog, and the priority matrix. The analysis scheme is used to identify EA stakeholder, to create the profile catalog, and to analyze stakeholder's expected value. The purpose of the priority matrix is to solve potentially conflicted expected values between stakeholders by prioritizing the value fulfillment based on stakeholder's contribution and concern. The preliminary validation by EA architects suggests that the proposed approach is feasible and usable to be applied in the EA development process.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126002232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability modeling and verification of BPEL-based web services composition by probabilistic model checking","authors":"C. Mi, Huai-kou Miao, Jinyu Kai, Honghao Gao","doi":"10.1109/SERA.2016.7516140","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516140","url":null,"abstract":"Service-Oriented Computing (SOC) and Service-Oriented Architecture (SOA) provide a paradigm for creating composite service with distributed web services over the Internet. Through the integration and coordination of distributed web Services, Web Service Business Process Execution Language (BPEL) can deploy a composite service rapidly. However, in a complex dynamic network environment, it is difficult to guarantee the reliability of BPEL application. To verify the reliability of the BPEL process, this paper proposes a method which can extract the model from a BPEL process and analyze it through probabilistic model checking with Prism model checker. During the extension process, we add reliability attribute to each invoked sub-services. By structure extraction, the BPEL process is transformed to a PLTS system. Then, we generate a suitable analysis Markov model according to the feature of the PLTS model. Finally, we use PCTL formula to describe the properties of the system, and check it with Prism tool.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132954945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards understanding and exploiting developers' emotional variations in software engineering","authors":"M. R. Islam, M. Zibran","doi":"10.1109/SERA.2016.7516145","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516145","url":null,"abstract":"Software development is highly dependent on human efforts and collaborations, which are immensely affected by emotions. This paper presents a quantitative empirical study of the emotional variations in different types of development activities (e.g., bug-fixing tasks) and development periods (i.e., days and times), in addition to in-depth investigation of emotions' impacts on software artifacts (i.e., commit messages) and exploration of scopes for exploiting emotional variations in software engineering activities. We study emotions in more than 490 thousand commit comments across 50 open-source projects. The findings add to our understanding of the role of emotions in software development, and expose scopes for exploitation of emotional awareness in improved task assignments and collaborations.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132249127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning-based mobile threat monitoring and detection","authors":"W. G. Hatcher, David Maloney, Wei Yu","doi":"10.1109/SERA.2016.7516130","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516130","url":null,"abstract":"Mobile device security must keep up with the increasing demand of mobile users. Smartphones are every day becoming connected to more devices and services, interacting with the growing Internet of things. Every new service, and connection, creates a new pathway for intrusion and data theft. Each intrusion can yield further opportunities for breaches of corporate and enterprise infrastructure, and significant cost. In our study, we propose a mobile security platform that combines our developed security web server, analysis module, and Android OS application, with the Google Cloud Messaging service for queued and targeted device messaging. In the cloud, the developed LAMP (Linux, Apache, MySQL, PHP) server sends, receives, and stores data from a connected device via the corresponding Android OS application. The data consists of system information for device identification, and application data to be distributed to the analysis module for malicious content to be extracted and identified. The analysis module, utilizing the Weka software, performs both static and dynamic analyses to detect Android malware, simultaneously providing rapid and intuitive security with predictive capabilities. The server additionally provides device status visualization and manual security operations.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient genetic K-Means clustering for health care knowledge discovery","authors":"Ahmed Alsayat, H. El-Sayed","doi":"10.1109/SERA.2016.7516127","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516127","url":null,"abstract":"Data mining and machine learning are becoming the most interesting research areas and increasingly popular in health organizations. The hidden patterns among patients data can be extracted by applying data mining. The techniques and tools of data mining are very helpful as they provide health care professionals with significant knowledge toward a decision. Researchers have shown several utilities of data mining techniques such as clustering, classification, and regression in health care domain. Particularly, clustering algorithms which help researchers discover new insights by segmenting patients and providing them with effective treatments. This paper, reviews existing methods of clustering and present an efficient K-Means clustering algorithm which uses Self Organizing Map (SOM) method to overcome the problem of finding number of centroids in traditional K-Means. The SOM based clustering is very efficient due to its unsupervised learning and topology preserving properties. Two-staged clustering algorithm uses SOM to produce the prototypes in the first stage and then use those prototypes to create clusters in the second stage. Two health care datasets are used in the proposed experiments and a cluster accuracy metric was applied to evaluate the performance of the algorithm. Our analysis shows that the proposed method is accurate and shows better clustering performance along with valuable insights for each cluster. Our approach is unsupervised, scalable and can be applied to various domains.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117086409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social media analysis using optimized K-Means clustering","authors":"Ahmed Alsayat, H. El-Sayed","doi":"10.1109/SERA.2016.7516129","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516129","url":null,"abstract":"The increasing influence of social media and enormous participation of users creates new opportunities to study human social behavior along with the capability to analyze large amount of data streams. One of the interesting problems is to distinguish between different kinds of users, for example users who are leaders and introduce new issues and discussions on social media. Furthermore, positive or negative attitudes can also be inferred from those discussions. Such problems require a formal interpretation of social media logs and unit of information that can spread from person to person through the social network. Once the social media data such as user messages are parsed and network relationships are identified, data mining techniques can be applied to group different types of communities. However, the appropriate granularity of user communities and their behavior is hardly captured by existing methods. In this paper, we present a framework for the novel task of detecting communities by clustering messages from large streams of social data. Our framework uses K-Means clustering algorithm along with Genetic algorithm and Optimized Cluster Distance (OCD) method to cluster data. The goal of our proposed framework is twofold that is to overcome the problem of general K-Means for choosing best initial centroids using Genetic algorithm, as well as to maximize the distance between clusters by pairwise clustering using OCD to get an accurate clusters. We used various cluster validation metrics to evaluate the performance of our algorithm. The analysis shows that the proposed method gives better clustering results and provides a novel use-case of grouping user communities based on their activities. Our approach is optimized and scalable for real-time clustering of social media data.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115946267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sidney C. Smith, R. Hammell, Kin W. Wong, Carlos J. Mateo
{"title":"An experimental exploration of the impact of multi-level packet loss on network intrusion detection","authors":"Sidney C. Smith, R. Hammell, Kin W. Wong, Carlos J. Mateo","doi":"10.1109/SERA.2016.7516124","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516124","url":null,"abstract":"In this paper we consider the problem of packet loss as it applies to network intrusion detection. We explore the research question: is the impact of packet loss on network intrusion detection performance sufficiently regular to allow a formula to be developed that will predict the effect? We constructed 2 experimental environments to allow us to measure the impact of packet loss. We graphed the packet loss rate against the alert loss rate. We used nonlinear regression analysis to produce a formula with R squared and adjusted R squared values close enough to 1 for us to answer our research question in the affirmative.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"95 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Waste management strategies for Software Development companies: An explorative text analysis of business sustainability reports","authors":"Arunasalam Sambhanthan, V. Potdar","doi":"10.1109/SERA.2016.7516144","DOIUrl":"https://doi.org/10.1109/SERA.2016.7516144","url":null,"abstract":"This paper documents waste management strategies used by Indian Software Development firms. Indian software development giants' corporate sustainability reports were subjected to content analysis using Nvivo qualitative analysis tool. The content analysis reveals that there are a number of waste types such as e-waste, waste water, recycling waste, construction waste, hazardous waste, solid waste, organic waste, packaging waste, paper waste, wet waste, plastic waste, food waste, dry waste, consumer waste, biomedical waste and biodegradable waste which are recorded in the sustainability reports of Indian software development firms. The key implications includes the usage of government authorized recyclers and other government supported initiatives to support the e-waste recycling and disposal, due-diligence audit process for e-waste dismantlers and recyclers to verify their HSE legal compliances and government regulations pertaining to e-waste management and other specific guidelines to assist in waste management. The paper highlights a number of key waste management strategies and tactics used by Indian software development firms which could be used by the software development organizations around the world as best practices.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}