• Title/Summary/Keyword: Software Change

Search Result 1,380, Processing Time 0.032 seconds

Design of Component Version Management using Reuse Business Model (재사용 비즈니스 모델을 이용한 컴포넌트 버전 관리 설계)

  • Kim, Young-Sun;Oh, Sang-Yeob;Jang, Deog-Chul
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.67-76
    • /
    • 2003
  • The reuse of software is to use the components of software to be made beforehand to improve the productivity of it. The development of electronic commerce requires it which can be shown from changing the change of business models Reuse is the necessary solution to cope with a rapid change in the electronic commercial transaction. These reuse business models have the defects that they are not offered from version management. This paper has the purpose that by doing the supplementation of defects not to be offered from the version management and by introducing the quick change management about reuse business models, reusing the components and saving a development and reducing a development af period. The reuse of components by the new reuse business models has the advantages to minimize the danger elements from the design to the finish. We use the version management and try to present the method to make the efficiency of reuse by introducing components and managing the elements about components to the version in the technique to accomplish the reuse of software.

A Study on Software Reliability Evaluation Using SRGM (SRGM을 이용한 소프트웨어 신뢰도 평가에 관한 연구)

  • 신경애
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.553-560
    • /
    • 2003
  • Can presume number of software failure or remaining fault that is expected with test data that is collected by decided time using SRGM that is studied until present. Therefore, can forecast software reliability achievement degree and software reliability use step. But, reliability evaluation according to if choose any model can change. Therefore, we present SRGM that consider test cost to error detection and error delete cost as SRGM that consider error delete cost in this research. Using this SRGM, can presume number of remaining fault in software, reliability and optimal release time.

  • PDF

The Solution Of Software Contract (기획특집 - 공공 소프트웨어 발주관행 개선방안(IT 프로젝트관리 실무))

  • Shim, Ki-Bo
    • Journal of the Korean Professional Engineers Association
    • /
    • v.42 no.5
    • /
    • pp.29-31
    • /
    • 2009
  • A general practice in software ordering behavior in public sector has been an enormous obstacle standing in development path of Korea's software industry. Standard on software development cost estimation is supposedly based on Function Point, but in general, it is on headcounting (a number of people involved in a project). Moreover, it is difficult to change a contract in an on-going project, since statement of work is not precisely and carefully described. But it has a simple solution. Design and Implementation should be a separate project, as in construction industry, and both power and responsibility for design should be given to an expert with a national-level qualification. Here, there is a simple way for Korea to reborn as one of the strongest software country.

  • PDF

Prediction of Safety Critical Software Operational Reliability from Test Reliability Using Testing Environment Factors

  • Jung, Hoan-Sung;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.31 no.1
    • /
    • pp.49-57
    • /
    • 1999
  • It has been a critical issue to predict the safety critical software reliability in nuclear engineering area. For many years, many researches have focused on the quantification of software reliability and there have been many models developed to quantify software reliability. Most software reliability models estimate the reliability with the failure data collected during the test assuming that the test environments well represent the operation profile. User's interest is however on the operational reliability rather than on the test reliability. The experiences show that the operational reliability is higher than the test reliability. With the assumption that the difference in reliability results from the change of environment, from testing to operation, testing environment factors comprising the aging factor and the coverage factor are developed in this paper and used to predict the ultimate operational reliability with the failure data in testing phase. It is by incorporating test environments applied beyond the operational profile into testing environment factors. The application results show that the proposed method can estimate the operational reliability accurately.

  • PDF

The SPI Factors Affecting on Organizational Performance: The Prespective of the Moderating Effect of Organizational Maturity Level (조직성과에 미치는 SPI 영향요인에 관한 연구 :조직 성숙도의 조절효과 관점에서)

  • Kim, In-Jai;Seol, Kyung-Hwan
    • The Journal of Information Systems
    • /
    • v.19 no.2
    • /
    • pp.97-118
    • /
    • 2010
  • Software Process Improvement(SPI) has been a challenging issue to software organizations. The factors affecting SPI were analysed for improving software development processes. Numerous studies suggested influencing factors, and assessment models were utilized for software improvement. This research suggested that SPI factors affecting on an organizational performance may vary according to the CMM(Capability Maturity Model) level. The moderating effects of organizational maturity level between the SPI factors and the organizational performance were empirically tested. This research found that all six SPI factors except for the resistance to change affected the organizational performance. The moderating effects of management support, goal alliances, participation, and effect analyses were empirically supported. These results can provide several implications or a practical guidance to academic and industry professionals.

A Study on Applying the Software Development Methodology as utilize Open-Source Components: A Case of Development a Reporting Tool using MARMI III (오픈소스 컴포넌트 활용에 있어서의 소프트웨어 개발방법론 적용에 관한 탐색적 연구: 마르미-III 방법론을 이용한 웹리포팅툴 개발 사례를 중심으로)

  • Kim, Jong-Bae;Kim, Doo-Yeon;Rhew, Sung-Yul
    • Journal of Information Technology Services
    • /
    • v.5 no.1
    • /
    • pp.149-164
    • /
    • 2006
  • The companies are trying to apply to software development approach by utilizing open-source components. The open-source components are new alternatives to solve limits of the previous software developments such as quality of software, time and cost of development. Accordingly, various analysis of open-source components were performed. However, the researches about the detailed procedures and methods to utilize open-source components in practical industry are immature. In this paper, we propose the procedures and cases for identifying, validating, selecting of suitable open-source components and for applying to change and modification. Proposed procedures and cases will be a great contribution to spread of utilizing the open-source.

A Stochastic Differential Equation Model for Software Reliability Assessment and Its Goodness-of-Fit

  • Shigeru Yamada;Akio Nishigaki;Kim, Mitsuhiro ura
    • International Journal of Reliability and Applications
    • /
    • v.4 no.1
    • /
    • pp.1-12
    • /
    • 2003
  • Many software reliability growth models (SRGM's) based on a nonhomogeneous Poisson process (NHPP) have been proposed by many researchers. Most of the SRGM's which have been proposed up to the present treat the event of software fault-detection in the testing and operational phases as a counting process. However, if the size of the software system is large, the number of software faults detected during the testing phase becomes large, and the change of the number of faults which are detected and removed through debugging activities becomes sufficiently small compared with the initial fault content at the beginning of the testing phase. Therefore, in such a situation, we can model the software fault-detection process as a stochastic process with a continuous state space. In this paper, we propose a new software reliability growth model describing the fault-detection process by applying a mathematical technique of stochastic differential equations of an Ito type. We also compare our model with the existing SRGM's in terms of goodness-of-fit for actual data sets.

  • PDF

Predicting Program Code Changes Using a CNN Model (CNN 모델을 이용한 프로그램 코드 변경 예측)

  • Kim, Dong Kwan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.11-19
    • /
    • 2021
  • A software system is required to change during its life cycle due to various requirements such as adding functionalities, fixing bugs, and adjusting to new computing environments. Such program code modification should be considered as carefully as a new system development becase unexpected software errors could be introduced. In addition, when reusing open source programs, we can expect higher quality software if code changes of the open source program are predicted in advance. This paper proposes a Convolutional Neural Network (CNN)-based deep learning model to predict source code changes. In this paper, the prediction of code changes is considered as a kind of a binary classification problem in deep learning and labeled datasets are used for supervised learning. Java projects and code change logs are collected from GitHub for training and testing datasets. Software metrics are computed from the collected Java source code and they are used as input data for the proposed model to detect code changes. The performance of the proposed model has been measured by using evaluation metrics such as precision, recall, F1-score, and accuracy. The experimental results show the proposed CNN model has achieved 95% in terms of F1-Score and outperformed the multilayer percept-based DNN model whose F1-Score is 92%.

Investigating the Determinants of Major IT Incident Tickets: A Case Study of an IT Service Provider Firm for Logistics and Distribution Industry

  • Ro, Mohamad Izham Che;Lau, Wee-Yeap
    • Journal of Distribution Science
    • /
    • v.14 no.12
    • /
    • pp.61-69
    • /
    • 2016
  • Purpose - This study investigates the determinants that affect the number of IT Incident tickets of an IT Service Provider ("ITSP") to logistics industry in order to improve its management process by reducing the incident tickets. Research design, data, and Methodology - This study uses weekly data of IT incident tickets from September 2012 to June 2015. Correlation and regression analyses are conducted. Six identified determinants i.e., IT Change, User Errors, Shipment Volume, Network, Hardware and Software Issues are used as the explanatory variables. Results - Our findings show as following. First, our analysis indicates that IT Change is not a significant determinant as opposed to what commonly believed by many as the most important factor. Second, Software issue is the highest contributor to the Major IT incident tickets, followed by User Error, Network and Hardware issues. Third, it seems there is lead-lag relationship between IT Change and Major IT Incidents tickets as indicated by earlier studies. Fourth, the relationship between IT Change and Major IT tickets is also affected by shipment volume. Conclusions - As policy recommendation, all identified determinants should be treated according to priority. In addition, improving the way IT Changes are implemented will definitely reduce the IT incident tickets.

Exploring Pseudonymous based Schemes for Safegaurding Location Privacy in Vehicular Adhoc Network (VANET)

  • Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.101-110
    • /
    • 2023
  • Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers.