International Journal of Software Innovation最新文献

筛选
英文 中文
Modeling Autonomic Systems: Review, Classification, and Research Challenges 自主系统建模:回顾、分类和研究挑战
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.303585
Marwa Hachicha, Riadh Ben Halima, A. Kacem
{"title":"Modeling Autonomic Systems: Review, Classification, and Research Challenges","authors":"Marwa Hachicha, Riadh Ben Halima, A. Kacem","doi":"10.4018/ijsi.303585","DOIUrl":"https://doi.org/10.4018/ijsi.303585","url":null,"abstract":"","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":"10 1","pages":"1-22"},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70470908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Characterizing the Empirical Analysis, Proposed Approaches, and Research Trends for Architectural Decay 建筑衰退的实证分析、建议方法和研究趋势综述
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.297512
{"title":"A Survey on Characterizing the Empirical Analysis, Proposed Approaches, and Research Trends for Architectural Decay","authors":"","doi":"10.4018/ijsi.297512","DOIUrl":"https://doi.org/10.4018/ijsi.297512","url":null,"abstract":"This decay does not happen overnight, but rather it's cumulative impacts over time. Even though the prior works covered various aspects concerning maintaining architecture from erosion, however, the common factor in the existing studies does not provide full detail about the empirical analysis, perceptions of the proposed approaches, and trendy track of the architectural decay research. There are existing review studies on analysis techniques and approaches of various architectural decay, but to the best of our knowledge, insufficient focus was considered on precisely the description of the empirical analysis, techniques, approaches, and trends for studies that have been evaluated concerning architectural decay. This study provides a comprehensive survey and detailed investigation on the empirical analysis regarding research design and its method, existing approaches analysis to identify used strategies, and trendy research to clarify trendy track for researchers and what evolves from a meaningful essential idea concerns the researchers within the architectural degradation field.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42223048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Color Quantization Based Artificial Bee Colony And Training Tools 基于颜色量化的人工蜂群和训练工具
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.301217
{"title":"Color Quantization Based Artificial Bee Colony And Training Tools","authors":"","doi":"10.4018/ijsi.301217","DOIUrl":"https://doi.org/10.4018/ijsi.301217","url":null,"abstract":"The new method was proposed in this study, a new method was proposed. The method includes a series of steps. At the beginning of its steps creating k colors by using a clustering algorithm for determining a group of K colors starting from X colors, which are determined randomly by an algorithm k-means, and then comes the method of the artificial bee colony for finding the best colors by comparing the colors suggested in the previous step with the colors resulting from this algorithm for completing the replacement process and issuing the final color palette that depends on it to find the quantized image, and the third step involves using the hybrid approach (K-mean & ABC algorithm) to obtain quantitative images. Thus, It is necessary to have a very quality color palette to rely on it for extracting the desired image, it was found that the outcomes of presented method are able to create quantitative images in less time and of high quality in both metrics results and visual results","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42682545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TOE Model Analysis for AI Vision Open API 人工智能视觉开放API的TOE模型分析
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.297509
{"title":"TOE Model Analysis for AI Vision Open API","authors":"","doi":"10.4018/ijsi.297509","DOIUrl":"https://doi.org/10.4018/ijsi.297509","url":null,"abstract":"Recently, there is a growing number of developers have developed software with utilizing open API. This has resulted in much support for the introduction and delivery of open API not only at the corporate level but also at the government level to promote social development through cost reduction and development of new technologies. However, in introducing Open API, an organization must also consider its internal and external environment and individual dimensions, but no research has been conducted on these kinds of factor. This study seeks to discuss about the importance of factors through qualitative analysis and find out which of the various factors should be considered first by the organization to introduce open API in the organization.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49132989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Quality Prediction Using Machine Learning 使用机器学习进行软件质量预测
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.297997
{"title":"Software Quality Prediction Using Machine Learning","authors":"","doi":"10.4018/ijsi.297997","DOIUrl":"https://doi.org/10.4018/ijsi.297997","url":null,"abstract":"With the emergence of Machine Learning, many companies are increasingly embracing this revolutionary approach, both in terms of growth and maintenance, to reduce software costs. This research aimed at building two models which is Software Defect Prediction Model (SDPM) which will be used to predict defects in software and Software Maintainability Prediction Model (SMPM) which will be used for Software Maintainability. Different classifiers, namely Random Forest, Decision Tree, Naïve Bayes and Artificial Neural Networks have been considered and then evaluated using different metrics such as Accuracy, Precision, Recall and Area Under the Curve (AUC). The two models have successfully been evaluated and Decision Tree has been chosen as compared to other classifiers which tends to perform much better. Finally a framework based on a set of guidelines that can be used to improve software quality has been devised.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":"49 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82245127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-Critical Data Transmission Scheme in Wireless Sensor Networks using Machine Learning Approach 基于机器学习的无线传感器网络时间关键数据传输方案
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.303586
{"title":"Time-Critical Data Transmission Scheme in Wireless Sensor Networks using Machine Learning Approach","authors":"","doi":"10.4018/ijsi.303586","DOIUrl":"https://doi.org/10.4018/ijsi.303586","url":null,"abstract":"Wireless sensor network has been extensively used in many real time wireless sensor networks applications. Due to limitations of hardware resources and restricted communication capabilities of sensor nodes, it is very challenging to use wireless sensor networks in real time data transmission. Data collection and routing is the main issue in such applications. To enhance the performance under such real time transmission scenario, it is essential to make the protocol intelligent to choose the appropriate path with change in network scenario. In this paper, we propose a machine learning based Medium Access Control (MAC) protocol to handle real time traffic in wireless sensor networks. To deal with the limitations of WSN in real time application, the proposed scheme can help to increase the performance of time-critical wireless sensor network applications. Simulation results authorize our work, and confirm the accuracy of the proposed MAC protocol strategy is higher than the existing work.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45776434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sliding window based high utility item-sets mining over data stream using extended global utility item-sets tree 使用扩展的全局实用工具项集树对数据流进行基于滑动窗口的高实用工具项集挖掘
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.303579
{"title":"Sliding window based high utility item-sets mining over data stream using extended global utility item-sets tree","authors":"","doi":"10.4018/ijsi.303579","DOIUrl":"https://doi.org/10.4018/ijsi.303579","url":null,"abstract":"High utility item-sets mining (HUIM) is a special topic in frequent item-sets mining (FIM). It gives better insights for business growth by focusing on the utility of items in a transaction. HUIM is evolving as a powerful research area due to its vast applications in many fields. Data stream processing, meanwhile, is an interesting and challenging problem since, processing very fast generating a huge amount of data with limited resources strongly demands high-performance algorithms. This paper presents an innovative idea to extract the high utility item-sets (HUIs) from the dynamic data stream by applying sliding window control. Even though certain algorithms exist to solve the same problem, they allow redundant processing or reprocessing of data. To overcome this, the proposed algorithm used a trie like structure called Extended Global Utility Item-sets tree (EGUI-tree), which is flexible to store and retrieve the mined information instead of reprocessing. An experimental study on real-world datasets proved that EGUI-tree algorithm is faster than the state-of-the-art algorithms.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44727439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Interaction with Software Connectors & the Function of Facade Component in Secure Application Logic 软件连接器的社会交互&外观组件在安全应用逻辑中的作用
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.301230
{"title":"Social Interaction with Software Connectors & the Function of Facade Component in Secure Application Logic","authors":"","doi":"10.4018/ijsi.301230","DOIUrl":"https://doi.org/10.4018/ijsi.301230","url":null,"abstract":"The paper represents a conceptual study of the social interaction model of ATMs by using integration in a UML model-based design for software architecture that deals with the secure component-based software protection and communication patterns through facade based connector. The facade-based connector is developed separately from software components by using the correct contact pattern between components and the required security patterns that encapsulate the connection with other secure connectors. Each secure connector consists of both security architecture and contact patterns. It is constructed as a composite component even though connectors are usually used by component-based software development to encapsulate the mechanisms of communication with components. This paper addresses the security and privacy issues related to social interaction with the ATM model that may also be encapsulated in the software application logic through a secure facade based connector that is known as a security in a connector based social e-commerce B2c application","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43921613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SWARM OF HONEY BEES FOR ASSOCIATION RULE MINING USING CUDA 基于cuda的蜂群关联规则挖掘
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.297996
{"title":"SWARM OF HONEY BEES FOR ASSOCIATION RULE MINING USING CUDA","authors":"","doi":"10.4018/ijsi.297996","DOIUrl":"https://doi.org/10.4018/ijsi.297996","url":null,"abstract":"Association Rule mining (ARM) is well studied and famous optimization problem which finds useful rules from given transactional databases. Many algorithms already proposed in literature which shows their efficiency when dealing with different sizes of datasets. Unfortunately, their efficiency is not enough for handling large scale datasets. In this case, Bees swarm optimization algorithm for association rule mining is more efficient. These kinds of problems need more powerful processors and are time expensive. For such issues solution can be provided by graphics processing units (GPUs) and are massively multithreaded processors. In this case GPUs can be used to increase speed of the computation. Bees swarm optimization algorithm for association rule mining can be designed using GPUs in multithreaded environment which will efficient for given datasets.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45061841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedding Secret Data in Digital Media Using Texture Synthesis 利用纹理合成技术在数字媒体中嵌入秘密数据
IF 0.6
International Journal of Software Innovation Pub Date : 2022-01-01 DOI: 10.4018/ijsi.301225
{"title":"Embedding Secret Data in Digital Media Using Texture Synthesis","authors":"","doi":"10.4018/ijsi.301225","DOIUrl":"https://doi.org/10.4018/ijsi.301225","url":null,"abstract":"A steganography is an art of hiding confidential data into digital media such as image, audio, video etc. Texture synthesis uses the concept of the patch which represents an image block of source texture where its size is user specified. A texture synthesis process resamples a smaller texture image and provides a new image with arbitrary size and shape. Instead of using an existing cover image to hide messages, the algorithm conceals the source texture image and embeds secret messages using the process of texture synthesis. This allows extracting the hidden messages and source texture from a stego synthetic texture. This offers the advantages like, First, it provides the embedding capacity that is proportional to the size of the stego texture image. Second, the reversible capability inherited from this includes functionality, which allows recovery of the source texture. And third, there will be no image distortion since the size of the new texture image is user specified.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47104018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信