• Title/Summary/Keyword: Network analysis software

Search Result 796, Processing Time 0.028 seconds

A Model for Estimation Software Development Team Size (소프트웨어 개발팀 규모 추정 모델)

  • 이상운
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.12
    • /
    • pp.873-882
    • /
    • 2002
  • Estimation of development cost, effort and time is difficult and a key problem of software engineering in the early stage of software development. These are estimated by using the function point which is measured from a requirement specification. However, it is often a serious Question of the staffing level required for the software development. The purpose of this paper is to show us the model which can be used to estimate a size of development team. Three hundred one software projects have been analyzed and studied for the model. First, an analysis was conducted for statistical algorithmic model. After various data transformation and regression analysis, it was concluded that no good model was available. Therefore, non-algorithmic model was suggested for analysis, which has random distribution of residuals and makes good performance using RBF (Radial Basis Function) network. Since the model provides a standard to determine the required size of development team, it ran be used as management information.

The Impact on Structures of Knowledge Creation and Sharing on Performance of Open Collaboration: Focus on Open Source Software Development Communities (개방형협업 참여자의 지식창출·지식공유 구조와 혁신 성과: 오픈소스 소프트웨어 개발 커뮤니티를 중심으로)

  • Koo, Kyungmo;Baek, Hyunmi;Lee, Saerom
    • Knowledge Management Research
    • /
    • v.18 no.4
    • /
    • pp.287-306
    • /
    • 2017
  • This research focus on the effect of developers' participation structure in knowledge creation and knowledge sharing activities in open source software development projects. Based on preferential selection theory, hypotheses of relationship between a developers' concentration of knowledge creation/sharing activities and collaboration performance was derived. To verify the hypotheses, we use the Gini coefficient in the commit contribution of the developers (knowledge creation) and the centralization index in the repository issue network (knowledge sharing network). Using social network analysis, this paper calculates centralization index from developers in the issue boards in each repository based on data from 837 repositories in GitHub, a leading open source software development platform. As a result, instead of all developers creating and sharing knowledge equally, only a few of developers creating and sharing knowledge intensively further improve the performance of the open collaboration. In other words, a few developers predominantly providing commit and actively responding to issues raised from other developers enhance the project performance. The results of this study are expected to be used by developers who manage open source software project as a governance strategy, which could improve the performance of open collaboration.

Development of AVN Software Using Vehicle Information for Hand Gesture (차량정보 분석과 제스처 인식을 위한 AVN 소프트웨어 구현)

  • Oh, Gyu-tae;Park, Inhye;Lee, Sang-yub;Ko, Jae-jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.892-898
    • /
    • 2017
  • This paper describes the development of AVN(Audio Video Navigation) software for vehicle information analysis and gesture recognition. The module that examine the CAN(Controller Area Network) data of vehicle in the designed software analyzes the driving state. Using classified information, the AVN software converge vehicle information and hand gesture information. As the result, the derived data is used to match the service step and to perform the service. The designed AVN software was implemented in HW platform that common used in vehicles. And we confirmed the operation of vehicle analysing module and gesture recognition in a simulated environment that is similar with real world.

Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries

  • Gupta, Govind P.;Misra, Manoj;Garg, Kumkum
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.123-144
    • /
    • 2014
  • Wireless sensor networks are generally deployed for specific applications to accomplish certain objectives over a period of time. To fulfill these objectives, it is crucial that the sensor network continues to function for a long time, even if some of its nodes become faulty. Energy efficiency and fault tolerance are undoubtedly the most crucial requirements for the design of an information extraction protocol for any sensor network application. However, most existing software agent based information extraction protocols are incapable of satisfying these requirements because of static agent itineraries and large agent sizes. This paper proposes an Information Extraction protocol based on Multiple software Agents with Dynamic Itineraries (IEMADI), where multiple software agents are dispatched in parallel to perform tasks based on the query assigned to them. IEMADI decides the itinerary for an agent dynamically at each hop using local information. Through mathematical analysis and simulation, we compare the performance of IEMADI with a well known static itinerary based protocol with respect to energy consumption and response time. The results show that IEMADI provides better performance than the static itinerary based protocols.

Automatic Extraction of Road Network using GDPA (Gradient Direction Profile Algorithm) for Transportation Geographic Analysis

  • Lee, Ki-won;Yu, Young-Chul
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.775-779
    • /
    • 2002
  • Currently, high-resolution satellite imagery such as KOMPSAT and IKONOS has been tentatively utilized to various types of urban engineering problems such as transportation planning, site planning, and utility management. This approach aims at software development and followed applications of remotely sensed imagery to transportation geographic analysis. At first, GDPA (Gradient Direction Profile Algorithm) and main modules in it are overviewed, and newly implemented results under MS visual programming environment are presented with main user interface, input imagery processing, and internal processing steps. Using this software, road network are automatically generated. Furthermore, this road network is used to transportation geographic analysis such as gamma index and road pattern estimation. While, this result, being produced to do-facto format of ESRI-shapefile, is used to several types of road layers to urban/transportation planning problems. In this study, road network using KOMPSAT EOC imagery and IKONOS imagery are directly compared to multiple road layers with NGI digital map with geo-coordinates, as ground truth; furthermore, accuracy evaluation is also carried out through method of computation of commission and omission error at some target area. Conclusively, the results processed in this study is thought to be one of useful cases for further researches and local government application regarding transportation geographic analysis using remotely sensed data sets.

  • PDF

Movie Recommendation System using Social Network Analysis and Normalized Discounted Cumulative Gain (소셜 네트워크 분석 및 정규화된 할인 누적 이익을 이용한 영화 추천 시스템)

  • Vilakone, Phonexay;Xinchang, Khamphaphone;Lee, Hanna;Park, Doo-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.267-269
    • /
    • 2019
  • There are many recommendation systems offer an effort to get better preciseness the information to the users. In order to further improve more accuracy, the social network analysis method which is used to analyze data to community detection in social networks was introduced in the recommendation system and the result shows this method is improving more accuracy. In this paper, we propose a movie recommendation system using social network analysis and normalized discounted cumulative gain with the best accuracy. To estimate the performance, the collaborative filtering using the k nearest neighbor method, the social network analysis with collaborative filtering method and the proposed method are used to evaluate the MovieLens data. The performance outputs show that the proposed method get better the accuracy of the movie recommendation system than any other methods used in this experiment.

Comparison of On-Device AI Software Tools

  • Song, Hong-Jong
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.246-251
    • /
    • 2022
  • As the number of data and devices explodes, centralized data processing and AI analysis have limitations due to the load on the network and cloud. On-device AI technology can provide intelligent services without overloading the network and cloud because the device itself performs AI models. Accordingly, the need for on-device AI technology is emerging. Many smartphones are equipped with On-Device AI technology to support the use of related functions. In this paper, we compare software tools that implement On-Device AI.

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Screening of Differentially Expressed Genes Related to Bladder Cancer and Functional Analysis with DNA Microarray

  • Huang, Yi-Dong;Shan, Wei;Zeng, Li;Wu, Yang
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.8
    • /
    • pp.4553-4557
    • /
    • 2013
  • Objective: The purpose of this study was to identify genes related to bladder cancer with samples from normal and disease cases by microarray chip. Methods: After downloading the gene expression profile GSE3167 from Gene Expression Omnibus database which includes 50 bladder samples, comprising 9 normal and 41 disease samples, differentially expressed genes were identified with packages in R language. The selected differentially expressed genes were further analyzed using bioinformatics methods. Firstly, molecular functions, biological processes and cell component analysis were researched by software Gestalt. Then, software String was used to search interaction relationships among differentially expressed genes, and hub genes of the network were selected. Finally, by using plugins of software Cytoscape, Mcode and Bingo, module analysis of hub-genes was performed. Results: A total of 221 genes were identified as differentially expressed by comparing normal and disease bladder samples, and a network as well as the hub gene C1QBP was obtained from the network. The C1QBP module had the closest relationship to production of molecular mediators involved in inflammatory responses. Conclusion: We obtained differentially expressed genes of bladder cancer by microarray, and both PRDX2 and YWHAZ in the module with hub gene C1QBP were most significantly related to production of molecular mediators involved in inflammatory responses. From knowledge of inflammatory responses and cancer, our results showed that, the hub gene and its module could induce inflammation in bladder cancer. These related genes are candidate bio-markers for bladder cancer diagnosis and might be helpful in designing novel therapies.