• Title/Summary/Keyword: Network analysis software

Search Result 795, Processing Time 0.031 seconds

Priority Analysis for Software Functions Using Social Network Analysis and DEA(Data Envelopment Analysis) (사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구)

  • Huh, Sang Moo;Kim, Woo Je
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.171-189
    • /
    • 2018
  • To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance.

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

An Analysis of Cost Driver in Software Cost Model by Neural Network System

  • Kim, Dong-Hwa
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.377-377
    • /
    • 2000
  • Current software cost estimation models, such as the 1951 COCOMO, its 1987 Ada COCOMO update, is composed of nonlinear models, such as product attributes, computer attributes, personnel attributes, project attributes, effort-multiplier cost drivers, and have been experiencing increasing difficulties in estimating the costs of software developed to new lift cycle processes and capabilities. The COCOMO II is developed fur new forms against the current software cost estimation models. This paper provides a case-based analysis result of the cost driver in the software cost models, such as COCOMO and COCOMO 2.0 by fuzzy and neural network.

  • PDF

Evolutionary Computing Driven Extreme Learning Machine for Objected Oriented Software Aging Prediction

  • Ahamad, Shahanawaj
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.232-240
    • /
    • 2022
  • To fulfill user expectations, the rapid evolution of software techniques and approaches has necessitated reliable and flawless software operations. Aging prediction in the software under operation is becoming a basic and unavoidable requirement for ensuring the systems' availability, reliability, and operations. In this paper, an improved evolutionary computing-driven extreme learning scheme (ECD-ELM) has been suggested for object-oriented software aging prediction. To perform aging prediction, we employed a variety of metrics, including program size, McCube complexity metrics, Halstead metrics, runtime failure event metrics, and some unique aging-related metrics (ARM). In our suggested paradigm, extracting OOP software metrics is done after pre-processing, which includes outlier detection and normalization. This technique improved our proposed system's ability to deal with instances with unbalanced biases and metrics. Further, different dimensional reduction and feature selection algorithms such as principal component analysis (PCA), linear discriminant analysis (LDA), and T-Test analysis have been applied. We have suggested a single hidden layer multi-feed forward neural network (SL-MFNN) based ELM, where an adaptive genetic algorithm (AGA) has been applied to estimate the weight and bias parameters for ELM learning. Unlike the traditional neural networks model, the implementation of GA-based ELM with LDA feature selection has outperformed other aging prediction approaches in terms of prediction accuracy, precision, recall, and F-measure. The results affirm that the implementation of outlier detection, normalization of imbalanced metrics, LDA-based feature selection, and GA-based ELM can be the reliable solution for object-oriented software aging prediction.

An Adaptation of F(I)MEA Technique for security analysis on Software Defined Network Technology for IoT services (사물인터넷 서비스를 위한 소프트웨어 정의 네트워크 기술의 보안 분석을 위한 F(I)MEA 기법 적용)

  • Kim, Green;Han, Keun-Hee;Kim, Kee-Cheon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.17-21
    • /
    • 2016
  • The rapid development of IoT leads new kinds of services which does not existed. And, it requires several changes on existing network. Software Defined Network is one of the future network technology which can deal with problems from these kinds of changes. The strong point of Software Defined Network is flexibility and scalability. However, In some cases, these factors could be the security vulnerabilities. In this paper, we present adaptation of F(I)MEA technique for the security analysis on Software Defined Network Technology for IoT services.

Data Modeling for Developing the Baseline Network Analysis Software of Korean EMS System (한국형 EMS 시스템의 Baseline 계통 해석용 소프트웨어 개발을 위한 데이터 모델링)

  • Yun, Sang-Yun;Cho, Yoon-Sung;Lee, Wook-Hwa;Lee, Jin;Sohn, Jin-Man
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.10
    • /
    • pp.1842-1848
    • /
    • 2009
  • This paper summarizes a data modeling for developing the baseline network analysis software of the Korean energy management system (EMS). The study is concentrated on the following aspects. First, the data for operating the each application software are extracted. Some of the EMS network application softwares are selected for basis model. Those are based on the logical functions of each software and are not considered the other softwares. Second, the common data are extracted for equipment model and topological structure of power system in Korea. We propose the application common model(ACM) that can be applied whole EMS network application softwares. The ACM model includes the hierarchy and non-hierarchy power system structure, and is connected each other using the direct and indirect link. Proposed database model is tested using the Korea Electric Power Corporation(KEPCO) system. The real time SCADA data are provided for the test. Through the test, we verified that the proposed database structure can be effectively used to accomplish the Korean EMS system.

Reliability Analysis system For Network with Dependent Components (종속을 고려한 Network동적 신뢰도 분석 시스템)

  • Yun, Won-Young;Ha, Young-Ju
    • IE interfaces
    • /
    • v.10 no.2
    • /
    • pp.41-50
    • /
    • 1997
  • This paper considers the reliability computation of the network with dependent components and a software system is developed for supporting the reliability analysis and improvement of the system reliability. At first, We propose the common cause failure and load sharing models as the typical models considering the dynamic behaviors of networks with dependent components. Secondly, the algorithm is proposed to obtain the network reliability and reliability importance of component. The software, Delphi, is used to develop the our reliability analysis system.

  • PDF

Improving Estimative Capability of Software Development Effort using Radial Basis Function Network (RBF 망 이용 소프트웨어 개발 노력 추정 성능향상)

  • Lee, Sang-Un;Park, Yeong-Mok;Park, Jae-Hong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.581-586
    • /
    • 2001
  • An increasingly important facet of software development is the ability to estimated the associated coast and effort of development early in the development life cycle. In spite of the most generally sued procedures for estimation of the software development effort and cost were linear regression analysis. As a result of the software complexity and various development environments, the software effort and cost estimates that are grossly inaccurate. The application of nonlinear methods hold the greatest promise for achieving this objects. Therefore this paper presents an RBF (radial basis function) network model that is able to represent the nonlinear relation for software development effort, The research describes appropriate RBF network modeling in the context of a case study for 24 software development projects. Also, this paper compared the RBF network model with a regression analysis model. The RBF network model is the most accuracy of all.

  • PDF

Implementation and Verification of FlexRay Network System using Matlab/Simulink (매틀랩/시뮬링크 기반 플렉스레이 네트워크 시스템의 구현 및 검증)

  • Yoon, Seung-Hyun;Seo, Suk-Hyun;Hwang, Sung-Ho;Kwon, Key-Ho;Jeon, Jae-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.7
    • /
    • pp.655-660
    • /
    • 2010
  • As increasing the number of Electronic Control Units in a vehicle, the proportion for reliability and stability of the software is going increasingly. Accordingly, the traditional CAN network has occurred the situation that the requirement of developing vehicle software is not sufficient. To solve these problems, the FlexRay network which is ensured the high bandwidth and real-time is generated. However it is difficult to implement FlexRay based application software because of complex protocol than traditional CAN network. Accordingly the system for analysis and verification of network state is needed. Also vehicle vendor develops application software using Matlab/Simulink in order to increase productivity. But this development method is hard to solve the network problem of node to node. Therefore this paper implements Matlab/Simulink based FlexRay network system and verifies it through comparing with existing embedded system.

A Computer-Aided Text Analysis to Explore Recruitment and Intellectual Polarization Strategies in ISIS Media

  • Khafaga, Ayman Farid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.87-96
    • /
    • 2022
  • This paper employs a computer-aided text analysis (CATA) and a Critical Discourse Analysis (CDA) to explore the strategies of recruitment and intellectual polarization in ISIS (Islamic State in Iraq and Syria) media. The paper's main objective is to shed light on the efficacy of employing computer software in the linguistic analysis of texts, and the extent to which CATA software contribute to deciphering hidden meanings of texts as well as to arrive at concise and authentic results from these texts. More specifically, this paper attempts to demonstrate the contribution of CATA software represented in the two variables of Frequency Distribution Analysis (FDA) and Content Analysis (CA) in decoding the strategies of recruitment and intellectual polarization in one of ISIS 's digital publication: Rumiyah (a digital magazine published by ISIS). The analytical focus is on three strategies of recruitment and intellectual polarization: (i) lexicalization, (ii) intertextual religionisation, and (iii) justification. Two main findings are revealed in this study. First, the application of CATA software into the linguistic investigation of texts contributes effectively to the understanding of the thematic and ideological messages pertaining to the analyzed text. Second, the computational analysis guarantees concise, credible, authentic and ample results than is the case if the analysis is conducted without the work of computer software. The paper, therefore, recommends the integration of CATA software into the linguistic analysis of the various types of texts.