{"title":"Modeling Autonomic Systems: Review, Classification, and Research Challenges","authors":"Marwa Hachicha, Riadh Ben Halima, A. Kacem","doi":"10.4018/ijsi.303585","DOIUrl":"https://doi.org/10.4018/ijsi.303585","url":null,"abstract":"","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":"10 1","pages":"1-22"},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70470908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Characterizing the Empirical Analysis, Proposed Approaches, and Research Trends for Architectural Decay","authors":"","doi":"10.4018/ijsi.297512","DOIUrl":"https://doi.org/10.4018/ijsi.297512","url":null,"abstract":"This decay does not happen overnight, but rather it's cumulative impacts over time. Even though the prior works covered various aspects concerning maintaining architecture from erosion, however, the common factor in the existing studies does not provide full detail about the empirical analysis, perceptions of the proposed approaches, and trendy track of the architectural decay research. There are existing review studies on analysis techniques and approaches of various architectural decay, but to the best of our knowledge, insufficient focus was considered on precisely the description of the empirical analysis, techniques, approaches, and trends for studies that have been evaluated concerning architectural decay. This study provides a comprehensive survey and detailed investigation on the empirical analysis regarding research design and its method, existing approaches analysis to identify used strategies, and trendy research to clarify trendy track for researchers and what evolves from a meaningful essential idea concerns the researchers within the architectural degradation field.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42223048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Color Quantization Based Artificial Bee Colony And Training Tools","authors":"","doi":"10.4018/ijsi.301217","DOIUrl":"https://doi.org/10.4018/ijsi.301217","url":null,"abstract":"The new method was proposed in this study, a new method was proposed. The method includes a series of steps. At the beginning of its steps creating k colors by using a clustering algorithm for determining a group of K colors starting from X colors, which are determined randomly by an algorithm k-means, and then comes the method of the artificial bee colony for finding the best colors by comparing the colors suggested in the previous step with the colors resulting from this algorithm for completing the replacement process and issuing the final color palette that depends on it to find the quantized image, and the third step involves using the hybrid approach (K-mean & ABC algorithm) to obtain quantitative images. Thus, It is necessary to have a very quality color palette to rely on it for extracting the desired image, it was found that the outcomes of presented method are able to create quantitative images in less time and of high quality in both metrics results and visual results","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42682545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TOE Model Analysis for AI Vision Open API","authors":"","doi":"10.4018/ijsi.297509","DOIUrl":"https://doi.org/10.4018/ijsi.297509","url":null,"abstract":"Recently, there is a growing number of developers have developed software with utilizing open API. This has resulted in much support for the introduction and delivery of open API not only at the corporate level but also at the government level to promote social development through cost reduction and development of new technologies. However, in introducing Open API, an organization must also consider its internal and external environment and individual dimensions, but no research has been conducted on these kinds of factor. This study seeks to discuss about the importance of factors through qualitative analysis and find out which of the various factors should be considered first by the organization to introduce open API in the organization.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49132989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Quality Prediction Using Machine Learning","authors":"","doi":"10.4018/ijsi.297997","DOIUrl":"https://doi.org/10.4018/ijsi.297997","url":null,"abstract":"With the emergence of Machine Learning, many companies are increasingly embracing this revolutionary approach, both in terms of growth and maintenance, to reduce software costs. This research aimed at building two models which is Software Defect Prediction Model (SDPM) which will be used to predict defects in software and Software Maintainability Prediction Model (SMPM) which will be used for Software Maintainability. Different classifiers, namely Random Forest, Decision Tree, Naïve Bayes and Artificial Neural Networks have been considered and then evaluated using different metrics such as Accuracy, Precision, Recall and Area Under the Curve (AUC). The two models have successfully been evaluated and Decision Tree has been chosen as compared to other classifiers which tends to perform much better. Finally a framework based on a set of guidelines that can be used to improve software quality has been devised.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":"49 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82245127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Critical Data Transmission Scheme in Wireless Sensor Networks using Machine Learning Approach","authors":"","doi":"10.4018/ijsi.303586","DOIUrl":"https://doi.org/10.4018/ijsi.303586","url":null,"abstract":"Wireless sensor network has been extensively used in many real time wireless sensor networks applications. Due to limitations of hardware resources and restricted communication capabilities of sensor nodes, it is very challenging to use wireless sensor networks in real time data transmission. Data collection and routing is the main issue in such applications. To enhance the performance under such real time transmission scenario, it is essential to make the protocol intelligent to choose the appropriate path with change in network scenario. In this paper, we propose a machine learning based Medium Access Control (MAC) protocol to handle real time traffic in wireless sensor networks. To deal with the limitations of WSN in real time application, the proposed scheme can help to increase the performance of time-critical wireless sensor network applications. Simulation results authorize our work, and confirm the accuracy of the proposed MAC protocol strategy is higher than the existing work.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45776434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sliding window based high utility item-sets mining over data stream using extended global utility item-sets tree","authors":"","doi":"10.4018/ijsi.303579","DOIUrl":"https://doi.org/10.4018/ijsi.303579","url":null,"abstract":"High utility item-sets mining (HUIM) is a special topic in frequent item-sets mining (FIM). It gives better insights for business growth by focusing on the utility of items in a transaction. HUIM is evolving as a powerful research area due to its vast applications in many fields. Data stream processing, meanwhile, is an interesting and challenging problem since, processing very fast generating a huge amount of data with limited resources strongly demands high-performance algorithms. This paper presents an innovative idea to extract the high utility item-sets (HUIs) from the dynamic data stream by applying sliding window control. Even though certain algorithms exist to solve the same problem, they allow redundant processing or reprocessing of data. To overcome this, the proposed algorithm used a trie like structure called Extended Global Utility Item-sets tree (EGUI-tree), which is flexible to store and retrieve the mined information instead of reprocessing. An experimental study on real-world datasets proved that EGUI-tree algorithm is faster than the state-of-the-art algorithms.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44727439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Interaction with Software Connectors & the Function of Facade Component in Secure Application Logic","authors":"","doi":"10.4018/ijsi.301230","DOIUrl":"https://doi.org/10.4018/ijsi.301230","url":null,"abstract":"The paper represents a conceptual study of the social interaction model of ATMs by using integration in a UML model-based design for software architecture that deals with the secure component-based software protection and communication patterns through facade based connector. The facade-based connector is developed separately from software components by using the correct contact pattern between components and the required security patterns that encapsulate the connection with other secure connectors. Each secure connector consists of both security architecture and contact patterns. It is constructed as a composite component even though connectors are usually used by component-based software development to encapsulate the mechanisms of communication with components. This paper addresses the security and privacy issues related to social interaction with the ATM model that may also be encapsulated in the software application logic through a secure facade based connector that is known as a security in a connector based social e-commerce B2c application","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43921613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SWARM OF HONEY BEES FOR ASSOCIATION RULE MINING USING CUDA","authors":"","doi":"10.4018/ijsi.297996","DOIUrl":"https://doi.org/10.4018/ijsi.297996","url":null,"abstract":"Association Rule mining (ARM) is well studied and famous optimization problem which finds useful rules from given transactional databases. Many algorithms already proposed in literature which shows their efficiency when dealing with different sizes of datasets. Unfortunately, their efficiency is not enough for handling large scale datasets. In this case, Bees swarm optimization algorithm for association rule mining is more efficient. These kinds of problems need more powerful processors and are time expensive. For such issues solution can be provided by graphics processing units (GPUs) and are massively multithreaded processors. In this case GPUs can be used to increase speed of the computation. Bees swarm optimization algorithm for association rule mining can be designed using GPUs in multithreaded environment which will efficient for given datasets.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45061841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedding Secret Data in Digital Media Using Texture Synthesis","authors":"","doi":"10.4018/ijsi.301225","DOIUrl":"https://doi.org/10.4018/ijsi.301225","url":null,"abstract":"A steganography is an art of hiding confidential data into digital media such as image, audio, video etc. Texture synthesis uses the concept of the patch which represents an image block of source texture where its size is user specified. A texture synthesis process resamples a smaller texture image and provides a new image with arbitrary size and shape. Instead of using an existing cover image to hide messages, the algorithm conceals the source texture image and embeds secret messages using the process of texture synthesis. This allows extracting the hidden messages and source texture from a stego synthetic texture. This offers the advantages like, First, it provides the embedding capacity that is proportional to the size of the stego texture image. Second, the reversible capability inherited from this includes functionality, which allows recovery of the source texture. And third, there will be no image distortion since the size of the new texture image is user specified.","PeriodicalId":55938,"journal":{"name":"International Journal of Software Innovation","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47104018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}