• Title/Summary/Keyword: Network analysis software

검색결과 795건 처리시간 0.031초

사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구 (Priority Analysis for Software Functions Using Social Network Analysis and DEA(Data Envelopment Analysis))

  • 허상무;김우제
    • 한국IT서비스학회지
    • /
    • 제17권3호
    • /
    • pp.171-189
    • /
    • 2018
  • To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance.

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

An Analysis of Cost Driver in Software Cost Model by Neural Network System

  • Kim, Dong-Hwa
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2000년도 제15차 학술회의논문집
    • /
    • pp.377-377
    • /
    • 2000
  • Current software cost estimation models, such as the 1951 COCOMO, its 1987 Ada COCOMO update, is composed of nonlinear models, such as product attributes, computer attributes, personnel attributes, project attributes, effort-multiplier cost drivers, and have been experiencing increasing difficulties in estimating the costs of software developed to new lift cycle processes and capabilities. The COCOMO II is developed fur new forms against the current software cost estimation models. This paper provides a case-based analysis result of the cost driver in the software cost models, such as COCOMO and COCOMO 2.0 by fuzzy and neural network.

  • PDF

Evolutionary Computing Driven Extreme Learning Machine for Objected Oriented Software Aging Prediction

  • Ahamad, Shahanawaj
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.232-240
    • /
    • 2022
  • To fulfill user expectations, the rapid evolution of software techniques and approaches has necessitated reliable and flawless software operations. Aging prediction in the software under operation is becoming a basic and unavoidable requirement for ensuring the systems' availability, reliability, and operations. In this paper, an improved evolutionary computing-driven extreme learning scheme (ECD-ELM) has been suggested for object-oriented software aging prediction. To perform aging prediction, we employed a variety of metrics, including program size, McCube complexity metrics, Halstead metrics, runtime failure event metrics, and some unique aging-related metrics (ARM). In our suggested paradigm, extracting OOP software metrics is done after pre-processing, which includes outlier detection and normalization. This technique improved our proposed system's ability to deal with instances with unbalanced biases and metrics. Further, different dimensional reduction and feature selection algorithms such as principal component analysis (PCA), linear discriminant analysis (LDA), and T-Test analysis have been applied. We have suggested a single hidden layer multi-feed forward neural network (SL-MFNN) based ELM, where an adaptive genetic algorithm (AGA) has been applied to estimate the weight and bias parameters for ELM learning. Unlike the traditional neural networks model, the implementation of GA-based ELM with LDA feature selection has outperformed other aging prediction approaches in terms of prediction accuracy, precision, recall, and F-measure. The results affirm that the implementation of outlier detection, normalization of imbalanced metrics, LDA-based feature selection, and GA-based ELM can be the reliable solution for object-oriented software aging prediction.

사물인터넷 서비스를 위한 소프트웨어 정의 네트워크 기술의 보안 분석을 위한 F(I)MEA 기법 적용 (An Adaptation of F(I)MEA Technique for security analysis on Software Defined Network Technology for IoT services)

  • 김그린;한근희;김기천
    • 사물인터넷융복합논문지
    • /
    • 제2권1호
    • /
    • pp.17-21
    • /
    • 2016
  • 사물인터넷의 급격한 발전은 기존에 존재하지 않던 형태의 새로운 서비스를 이끌어내었고, 이는 곧 기존 네트워크에 대한 변화를 요구하였다. 이러한 변화를 수용할 수 있는 기술 중 하나로 소프트웨어 정의 네트워크 기술을 이야기 할 수 있다. 소프트웨어 정의 네트워크 기술은 네트워크의 유연성 및 확장성을 제공한다는 점에서 큰 장점을 지니고 있지만, 이는 곧 보안의 취약점으로 악용될 가능성을 지니고 있다. 본 논문에서는 사물인터넷 서비스를 위한 소프트웨어 정의 네트워크 기술의 보안 분석을 위한 F(I)MEA 기법 적용에 대하여 다루고자 한다.

한국형 EMS 시스템의 Baseline 계통 해석용 소프트웨어 개발을 위한 데이터 모델링 (Data Modeling for Developing the Baseline Network Analysis Software of Korean EMS System)

  • 윤상윤;조윤성;이욱화;이진;손진만
    • 전기학회논문지
    • /
    • 제58권10호
    • /
    • pp.1842-1848
    • /
    • 2009
  • This paper summarizes a data modeling for developing the baseline network analysis software of the Korean energy management system (EMS). The study is concentrated on the following aspects. First, the data for operating the each application software are extracted. Some of the EMS network application softwares are selected for basis model. Those are based on the logical functions of each software and are not considered the other softwares. Second, the common data are extracted for equipment model and topological structure of power system in Korea. We propose the application common model(ACM) that can be applied whole EMS network application softwares. The ACM model includes the hierarchy and non-hierarchy power system structure, and is connected each other using the direct and indirect link. Proposed database model is tested using the Korea Electric Power Corporation(KEPCO) system. The real time SCADA data are provided for the test. Through the test, we verified that the proposed database structure can be effectively used to accomplish the Korean EMS system.

종속을 고려한 Network동적 신뢰도 분석 시스템 (Reliability Analysis system For Network with Dependent Components)

  • 윤원영;하영주
    • 산업공학
    • /
    • 제10권2호
    • /
    • pp.41-50
    • /
    • 1997
  • This paper considers the reliability computation of the network with dependent components and a software system is developed for supporting the reliability analysis and improvement of the system reliability. At first, We propose the common cause failure and load sharing models as the typical models considering the dynamic behaviors of networks with dependent components. Secondly, the algorithm is proposed to obtain the network reliability and reliability importance of component. The software, Delphi, is used to develop the our reliability analysis system.

  • PDF

RBF 망 이용 소프트웨어 개발 노력 추정 성능향상 (Improving Estimative Capability of Software Development Effort using Radial Basis Function Network)

  • 이상운;박영목;박재홍
    • 정보처리학회논문지D
    • /
    • 제8D권5호
    • /
    • pp.581-586
    • /
    • 2001
  • 소프트웨어 개발에서 점점 더 중요시되는 사항은 개발 생명주기의 초기에 개발과 관련된 노력과 비용을 추정하는 능력이다. 소프트웨어 개발노력과 비용추정을 위한 대부분의 모델이 선형회귀분석 절차를 사용하였다. 그러나 소프트웨어의 복잡성, 개발환경의 다양성으로 인해 소프트웨어 개발노력과 비용 추정은 점점 더 부정확해지고 있다. 이 목적을 달성하기 위해서는 비선형 방법을 사용해야 한다. 따라서 본 논문은 소프트웨어 개발 노력을 추정하는데 비선형 관계를 표현 가능한 RBF망 모델을 제안한다. 24개 소프트웨어 사례연구를 통해 적합한 RBF 망 모델을 제시하였다. 또한, 회귀분석 모델과 RBF망 모델을 비교하여 RBF 망 모델의 정확성이 가장 좋음을 보였다.

  • PDF

매틀랩/시뮬링크 기반 플렉스레이 네트워크 시스템의 구현 및 검증 (Implementation and Verification of FlexRay Network System using Matlab/Simulink)

  • 윤승현;서석현;황성호;권기호;전재욱
    • 제어로봇시스템학회논문지
    • /
    • 제16권7호
    • /
    • pp.655-660
    • /
    • 2010
  • As increasing the number of Electronic Control Units in a vehicle, the proportion for reliability and stability of the software is going increasingly. Accordingly, the traditional CAN network has occurred the situation that the requirement of developing vehicle software is not sufficient. To solve these problems, the FlexRay network which is ensured the high bandwidth and real-time is generated. However it is difficult to implement FlexRay based application software because of complex protocol than traditional CAN network. Accordingly the system for analysis and verification of network state is needed. Also vehicle vendor develops application software using Matlab/Simulink in order to increase productivity. But this development method is hard to solve the network problem of node to node. Therefore this paper implements Matlab/Simulink based FlexRay network system and verifies it through comparing with existing embedded system.

A Computer-Aided Text Analysis to Explore Recruitment and Intellectual Polarization Strategies in ISIS Media

  • Khafaga, Ayman Farid
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.87-96
    • /
    • 2022
  • This paper employs a computer-aided text analysis (CATA) and a Critical Discourse Analysis (CDA) to explore the strategies of recruitment and intellectual polarization in ISIS (Islamic State in Iraq and Syria) media. The paper's main objective is to shed light on the efficacy of employing computer software in the linguistic analysis of texts, and the extent to which CATA software contribute to deciphering hidden meanings of texts as well as to arrive at concise and authentic results from these texts. More specifically, this paper attempts to demonstrate the contribution of CATA software represented in the two variables of Frequency Distribution Analysis (FDA) and Content Analysis (CA) in decoding the strategies of recruitment and intellectual polarization in one of ISIS 's digital publication: Rumiyah (a digital magazine published by ISIS). The analytical focus is on three strategies of recruitment and intellectual polarization: (i) lexicalization, (ii) intertextual religionisation, and (iii) justification. Two main findings are revealed in this study. First, the application of CATA software into the linguistic investigation of texts contributes effectively to the understanding of the thematic and ideological messages pertaining to the analyzed text. Second, the computational analysis guarantees concise, credible, authentic and ample results than is the case if the analysis is conducted without the work of computer software. The paper, therefore, recommends the integration of CATA software into the linguistic analysis of the various types of texts.