• Title/Summary/Keyword: Metric for evaluation

Search Result 275, Processing Time 0.025 seconds

Comparison of Software Clustering using Split Based Tree Analysis (분기점 기반 트리 분석을 통한 소프트웨어 클러스터링 결과 비교)

  • Um, Jaechul;Lee, Chan-gun
    • Journal of Software Engineering Society
    • /
    • v.25 no.3
    • /
    • pp.59-62
    • /
    • 2012
  • We propose a novel metric for quantitatively comparing different clustered results generated from software clustering algorithms. A quantitative evaluation of software clustering helps understanding of architectural changes of software. The concept of split, which has been used for analysis of genetic characters in bio-informatics, is applied in the analysis of software architecture.

  • PDF

A Study on Selection Method of COTS Component Based on the Software Quality Measurement (소프트웨어 품질측정에 의한 상용컴포넌트 선정방법에 관한 연구)

  • Oh, Kie-Sung;Lee, Nam-Yong;Rhew, Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.897-902
    • /
    • 2002
  • Because of rapid evolution of software technique, numerous software professionals have been concerned with component based development methodologies. However, it is hard to find out a systematic technique for the selection of COTS (Commercial Off The Shelf) component in consumer position. Up to date, the major of component quality evaluation is object-oriented metric based evaluation methodology. But this paper present four step process and evaluation criteria based on MCDM (Multiple Criteria Decision Making) technique for optimal COTS component selection in consumer position. We considered funtionality, efficiency, usability based on IS0/IEC 9126 for Quality measurement and executed practical analysis about commercial EJB component in internet. This paper show that the proposed selection technique is applicable to optimal COTS component selection.

Metrics for evaluation of heavy-weight impact noise generated by impact ball (임팩트 볼에 의한 중량충격음의 평가 메트릭스 설정)

  • Lee, Pyoung-Jik;Jeong, Young;Jeon, Jin-Yong
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2006.11a
    • /
    • pp.636-640
    • /
    • 2006
  • In this study, metrics for evaluation of heavy-weight impact noise were investigated. Heavy-weight impact noises generated by impact ball were recorded in real apartments using binaural microphone. Those sounds were classified into three groups according to frequency characteristics in order to control aspects which affect subjective responses to heavy-weight impact noise. Sound sources for auditory experiment were selected based on the classification result. Then auditory experiments were conducted to investigate the relationship between level indices and subjective responses. The results showed that $L_{Aeq},\;L_{Amax}$ and $LL_z$ as well as $L_{iFmax,AW}$ were highly correlated with subjective response. Therefore, $L_{Aeq}$ and $L_{Amax}$ can be used as metrics for evaluation of heavy-weight impact noise. In further studies, it is needed to verify classification of heavy-weight impact noise generated by bang machine and impact ball.

  • PDF

Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network

  • Jin, Seung-Hun;Park, Chan-Il;Choi, Dae-Seon;Chung, Kyo-Il;Yoon, Hyun-Soo
    • ETRI Journal
    • /
    • v.27 no.4
    • /
    • pp.465-468
    • /
    • 2005
  • This paper presents a new trust evaluation scheme in an ad hoc network. To overcome the limited information about unfamiliar nodes and to reduce the required memory space, we propose a cluster-based trust evaluation scheme, in which neighboring nodes form a cluster and select one node as a cluster head. The head issues a trust value certificate that can be referred to by its non-neighbor nodes. In this way, an evaluation of an unfamiliar node's trust can be done very efficiently and precisely. In this paper, we present a trust evaluation metric using this scheme and some operations for forming and managing a cluster. An analysis of the proposed scheme over some security problems is also presented.

  • PDF

Sound Quality Index Development of Electrically Powered Vehicle Roller Blind (차량용 전동 롤러 블라인드의 음질지수 개발)

  • Sung, Weonchan;Jo, Hyeonho;Kim, Seonghyeon;Park, Dongchul;Kang, Yeonjune
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2014.10a
    • /
    • pp.785-790
    • /
    • 2014
  • The purpose of this study is to identify the significant sound quality metric and compose the sound quality index of motor driven roller blind which is part of vehicle sunroof. Before subjective evaluation, sound characteristics of roller blind was analyzed and set the target operating sound for subjective evaluation. Thus, transfer sound of roller blind which has the characteristics of sound modulation was used for subjective evaluation. Linear regression was carried out by chosen Zwicker's metrics which are pointed by comments of jurors. Loudness and sharpness related metrics are prime metrics in sound quality index we composed. Effect of roller blind assay when it is attached to real vehicle was identified to evaluate the validity of index.

  • PDF

A Study of Practical Field Application Cryptographic Module through Evaluation Derived by Connection Indicators (품질 연계지표 평가방법을 사용한 암호화 모듈 실무현장 적용체계 연구)

  • Noh, SiChoon;Na, SangYeob
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.55-60
    • /
    • 2014
  • In this study, we propose a cryptographic module quality evaluation system referenced by ISO/IEC 9000 quality system with Quality, Quality Factor, Quality Subfactor, Metric. Practical application process encryption algorithm based on the encryption algorithm to encrypt the pros and cons valuation of diagnosis, point selection algorithm, analysis, and quality items(quality factor), eliciting constraints derived, such as the cryptographic module design quality evaluation system is set to step 5. The five steps are examples of field-based diagnostic tool for cryptographic operations, the most essential work to be done in order to derive one will work. 2-Factor encryption module for connection between indicator items(quality factor) to identify and ensure the quality of the item the constraints of the environment are two kinds of cryptographic operations. This study is an encryption module and a practical field application system, it presents the standardized model. We have to meet the rapid changes in information technology. The environment, development and the encryption algorithm applied to model a wide variety of on-site development encryption will be able to expect the efficiency.

Performance comparison evaluation of speech enhancement using various loss functions (다양한 손실 함수를 이용한 음성 향상 성능 비교 평가)

  • Hwang, Seo-Rim;Byun, Joon;Park, Young-Cheol
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.2
    • /
    • pp.176-182
    • /
    • 2021
  • This paper evaluates and compares the performance of the Deep Nerual Network (DNN)-based speech enhancement models according to various loss functions. We used a complex network that can consider the phase information of speech as a baseline model. As the loss function, we consider two types of basic loss functions; the Mean Squared Error (MSE) and the Scale-Invariant Source-to-Noise Ratio (SI-SNR), and two types of perceptual-based loss functions, including the Perceptual Metric for Speech Quality Evaluation (PMSQE) and the Log Mel Spectra (LMS). The performance comparison was performed through objective evaluation and listening tests with outputs obtained using various combinations of the loss functions. Test results show that when a perceptual-based loss function was combined with MSE or SI-SNR, the overall performance is improved, and the perceptual-based loss functions, even exhibiting lower objective scores showed better performance in the listening test.

An Application of Qualitative Preference to Software Quality Evaluation (소프트웨어 품질평가를 위한 정성적 선호이론의 적용)

  • 이종무;정호원
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.25 no.3
    • /
    • pp.109-124
    • /
    • 2000
  • For rational human value judgement and evaluation, provision of clear evaluation data, objective value judgement criteria, and properly generalized methods are required. For instance, this is true for software quality evaluation, and the measure of software quality and the weighting method of evaluation target directly affect final decisions. However it is not easy to find a generalized method for the software quality evaluation or product selection, because of its complex characteristics. In this paper, we apply the qualitative preference method based on quantitative belief functions to find a general weighing method for the software quality evaluation. In particular, the qualitative preference method, in which the differentiated preference expression is possible, is conceptually expanded for general applications in future. For this purpose, we hierarchically differentiate the strong preference relation from the weak preference relation, and show an example of quantification of software quality evaluation on different applications, by comparing the qualitative preference method with AHP. We believe that the application domain of this method is not limited to the software quality evaluation and it is very useful to apply this results to other SE areas, e.g., metric selection with different views and riority determination of practices to be assessed in the SPICE.

  • PDF

Synthesis and Evaluation of Prosodically Exaggerated Utterances

  • Yoon, Kyu-Chul
    • Phonetics and Speech Sciences
    • /
    • v.1 no.3
    • /
    • pp.73-85
    • /
    • 2009
  • This paper introduces the technique of synthesizing and evaluating human utterances with exaggerated or atypical prosody. Prosody exaggeration can be implemented by manipulating either the fundamental frequency (F0) contour, the segmental durations, or the intensity contour of an utterance. Of these three prosodic elements, two or more can be exaggerated at the same time. The algorithms of synthesis and evaluation were suggested. Learner utterances exaggerated in each of the three prosodic features were evaluated with respect to their original native versions in terms of the differences in their F0 contours, the segmental durations, and the intensity contours. The measure of differences was the Euclidean distance metric between the matching points in their F0 and intensity contours. The measure was calculated after the exaggerated learner utterances were aligned by the segments and rendered identical to their native version in terms of their segmental durations. For the evaluation of the segmental durations, no prior modifications were made in durations and the same measure was used. The results from the pilot experiment suggest the viability of this measure in the evaluation of learner utterances with atypical prosody with respect to their native versions.

  • PDF

Development of Evaluation System for Defense Informatization Level

  • Sim, Seungbae;Lee, Sangho
    • Journal of Multimedia Information System
    • /
    • v.6 no.4
    • /
    • pp.271-282
    • /
    • 2019
  • There is a description that you cannot manage what you do not measure. The Korea Ministry of National Defense (MND) is conducting evaluations in various fields to obtain meaningful effects from IT investments, and views that the evaluation of the defense informatization sector is divided into defense informatization policy evaluation and defense informatization project evaluation. The defense informatization level evaluation can measure the informatization level of MND and the armed forces or organizations. Since the evaluation system being studied to measure the level of defense informatization is composed mainly of qualitative metrics, it is necessary to reconstruct it based on quantitative metrics that can guarantee objectivity. In addition, for managing the level of change by evaluation objects, the evaluation system should be designed with a focus on homeostasis of metrics so that it can be measured periodically. Moreover, metrics need to be promoted in terms of performance against targets. To this end, this study proposes to measure the level of defense informatization by dividing it into defense information network, computer systems, interoperability and standardization, information security, information environment, and information system use, and suggests their metrics.