Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1165

Recommendation of Move Method Refactoring to Optimize Modularization Using Conceptual Similarity

Recommendation of Move Method Refactoring to Optimize Modularization Using Conceptual Similarity

Md. Masudur Rahman, Md. Rayhanur Rahman, B M Mainul Hossain

Статья научная

Placement of methods within classes is one of the most important design activities for any object oriented application to optimize software modularization. To enhance interactions among modularized components, recommendation of move method refactorings plays a significant role through grouping similar behaviors of methods. It is also used as a refactoring technique of feature envy code smell by placing methods into correct classes from incorrect ones. Due to this code smell and inefficient modularization, an application will be tightly coupled and loosely cohesive which reflect poor design. Hence development and maintenance effort, time and cost will be increased. Existing techniques deals with only non-static methods for refactoring the code smell and so are not generalized for all types of methods (static and non-static). This paper proposes an approach which recommends 'move method' refactoring to remove the code smell as well as enrich modularization. The approach is based on conceptual similarity (which can be referred as similar behavior of methods) between a source method and methods of target classes of an application. The conceptual similarity relies on both static and non-static entities (method calls and used attributes) which differ the paper from others. In addition, it compares the similarity of used entities by the source method with used entities by methods in probable target classes. The results of a preliminary empirical evaluation indicate that the proposed approach provides better results with average precision of 65% and recall of 63% after running it on five well-known open projects than JDeodorant tool (a popular eclipse plugin for refactorings).

Бесплатно

Regression Test Case Selection for Multi-Objective Optimization Using Metaheuristics

Regression Test Case Selection for Multi-Objective Optimization Using Metaheuristics

Rahul Chaudhary, Arun Prakash Agrawal

Статья научная

A new heuristic algorithm is proposed by this paper, on multi-objective optimization using metaheuristics and TSP (travelling salesman problems). Basic thinking behind this algorithm is minimizing the TSP path or tour by dividing the entire tour into blocks that are overlapped to each other and then improve each individual block separately. Although it is unproven that a good solution have small improvement chances if a node moved far way to a position compared to its original solution. By intensively searching each block, further improvement is possible in TSP path or tour that never be supported in various search methods and genetic algorithm. Proposed algorithm and computational experiment performance was tested, and these tests are carried out with support of already present instances of problem. According to the results represented by paper, the computation verifies that proposed algorithm can solve TSPs efficiently. Proposed algorithm is then used for selecting optimal test cases, thousands of those test cases which are selected after confirming that they identify bugs and they itself selected from a repository of test cases; these thousand test cases are those test cases which are selected from several thousand test cases because they detect bugs. Few test cases from repository act as milestones (nodes) and having certain weight associated with each, proposed algorithm based on TSP implemented over selected result and select the optimal result or path or solution. These selected optimal test cases or selected path are further used to perform the regression testing, by applying those test cases selected by proposed algorithm in order to remove most of the faults or bugs effectively, i.e. take less time and identify almost all the bugs with few test cases. Hence this proposed algorithm assures most effective solution for regression testing test case selection.

Бесплатно

Relative Performance of Certain Meta Heuristics on Vehicle Routing Problem with Time Windows

Relative Performance of Certain Meta Heuristics on Vehicle Routing Problem with Time Windows

Sandhya, V. Katiyar

Статья научная

Solving Vehicle Routing Problem (VRP) and its variants arise in many real life distribution systems. Classical VRP can be described as the problem of finding minimum cost routes with identical vehicles having fixed capacity which starts from a depot and reaches a number of customers with known demands with the proviso that each route starts and ends at the depot and the demand of each customer does not exceed the vehicle capacity is met. One of the generalizations of standard VRP is Vehicle Routing Problem with Time Windows (VRPTW) with added complexity of serving every customer within a specified time window. Since VRPTW is a NP hard meta heuristics have often been designed for solving it. In this paper we compare the performance of Simulated Annealing (SA), genetic Algorithm (GA) and Ant Colony Optimization (ACO) for solving VRPTW based on their performance using different parameters taking total travel distance as the objective to be minimized. The results indicate that ACO is in general slightly more efficient then SA and GA.

Бесплатно

Relevant XML Documents - Approach Based on Vectors and Weight Calculation of Terms

Relevant XML Documents - Approach Based on Vectors and Weight Calculation of Terms

Abdeslem DENNAI, Mohammed Yacine DENNAI, Sidi Mohammed BENSLIMANE

Статья научная

Three classes of documents, based on their data, circulate in the web: Unstructured documents (.Doc, .html, .pdf ...), semi-structured documents (.xml, .Owl ...) and structured documents (Tables database for example). A semi-structured document is organized around predefined tags or defined by its author. However, many studies use a document classification by taking into account their textual content and underestimate their structure. We attempt in this paper to propose a representation of these semi-structured web documents based on weighted vectors allowing exploiting their content for a possible treatment. The weight of terms is calculated using: The normal frequency for a document, TF-IDF (Term Frequency - Inverse Document Frequency) and logic (Boolean) frequency for a set of documents. To assess and demonstrate the relevance of our proposed approach, we will realize several experiments on different corpus.

Бесплатно

Reliability Assessment for Open-Source Software Using Deterministic and Probabilistic Models

Reliability Assessment for Open-Source Software Using Deterministic and Probabilistic Models

Islam S. Ramadan, Hany M. Harb, Hamdy M. Mousa, Mohammed G. Malhat

Статья научная

Nowadays, computer software plays a significant role in all fields of our life. Essentially open-source software provides economic benefits for software companies such that it allows building new software without the need to create it from scratch. Therefore, it is extremely used, and accordingly, open-source software’s quality is a critical issue and one of the top research directions in the literature. In the development cycles of the software, checking the software reliability is an important indicator to release software or not. The deterministic and probabilistic models are the two main categories of models used to assess software reliability. In this paper, we perform a comparative study between eight different software reliability models: two deterministic models, and six probabilistic models based on three different methodologies: perfect debugging, imperfect debugging, and Gompertz distribution. We evaluate the employed models using three versions of a standard open-source dataset which is GNU’s Not Unix Network Object Model Environment projects. We evaluate the employed models using four evaluation criteria: sum of square error, mean square error, R-square, and reliability. The experimental results showed that for the first version of the open-source dataset SRGM-4 based on imperfect debugging methodology achieved the best reliability result, and for the last two versions of the open-source dataset SRGM-6 based on Gompertz distribution methodology achieved the best reliability result in terms of sum of square error, mean square error, and R-square.

Бесплатно

Reliability Evaluation Metrics for Internet of Things, Car Tracking System: A Review

Reliability Evaluation Metrics for Internet of Things, Car Tracking System: A Review

Michael Onuoha Thomas, Babak Bashari Rad

Статья научная

As technology continues to advance, the need to create benchmark or standards for systems becomes a necessity so as to ensure that these new advanced systems functions at its maximum capacity over a long period of time without any failure, fault or errors occurring. The internet of things technology promises a broad range of exciting products and services, with car tracking technology as part of the broad range of technological concept under the internet of things paradigm. The car tracking technology involves deploying some basic internet of things components into the tracking of important transportation component; the basic principle behind any technological concept involves delivery of high quality product that conforms to specifications. In this paper, the concept and technological description about the internet of things is discussed with emphasis on the principal functional component, this is to enable a broaden conceptualization about car tracking technology because it needs to function correctly, at all time. The concept of reliability engineering is also discussed in respect to an important quality factor, which entails that systems must function correctly without fault, failure or errors, it provides benchmark, principles, or standards in which the internet of things system must possess for an increased quality assurance.

Бесплатно

Removing Noise from Speech Signals Using Different Approaches of Artificial Neural Networks

Removing Noise from Speech Signals Using Different Approaches of Artificial Neural Networks

Omaima N. A. AL-Allaf

Статья научная

In this research, four ANN models: Function Fitting (FitNet), Nonlinear AutoRegressive (NARX), Recurrent (RNNs), and Cascaded-ForwardNet were constructed and trained separately to become a filter to remove noise from any speech signal. Each model consists of input, hidden and output layers. Two neurons in the input layer that represent speech signal and its associated noise. The output layer includes one neuron that represent the enhanced signal after removing noise. The four models were trained separately on stereo (noisy and clean) audio signals to produce the clean signal. Experiments were conducted for each model separately with different: architecture; optimization training algorithms; and learning parameters to identify model with best results of removing noise from speech signal. From experiments, best results were obtained from FitNet and NARAX models respectively. TrainLM is the best training algorithm in this case. Finally, the results showed that the suggested architecture of the four models have filtering ability to remove noise form both trained and not trained speech signals samples.

Бесплатно

Research and Compare Standards of E-Learning Management System: A Survey

Research and Compare Standards of E-Learning Management System: A Survey

Zeinab Shariat, Seyyed Mohsen Hashemi, Asad Mohammadi

Статья научная

Nowadays, using of e-learning has a special place in organizations and universities. Understanding the efficiency and effectiveness of this type of education, scientific and professional assemblies try to provide effective tools and strategies to operate this kind of training better. E-Learning management system as one of the basic requirements of the system plays a special role in this field. Therefore all companies are looking for a system that meets their needs in the field of e-learning. Standards of content and structure of e-learning must be set so that access to possibilities such as content reuse or gathering or discriminating subject from various sources at different times is possible. This paper reviews and compares some of the most important standards in the field of e-learning.

Бесплатно

Research based solution for linking higher learning institutions students to relevant companies for field attachment

Research based solution for linking higher learning institutions students to relevant companies for field attachment

Erick R. Samwi, Kisangiri Michael, Sabine Moebs

Статья научная

Work-based learning is what equips students with practical skills. All higher learning institutions (HLIs) have a specified period of time for students to carry out field based practices in companies which are relevant to their fields of study. As the number of students in Tanzanian HLIs become larger, coordination and allocation of students to relevant companies is becoming tougher. This study therefore intended to examine a better method to facilitate coordination and allocation of students to relevant companies through development of an online computer system. The research study to determine systems’ requirements was conducted in Arusha and Kilimanjaro regions by involving 62 HLI students, 3 HLIs and 5 companies. Data were collected using key informant interviews, observation and workshop. Both informative and descriptive information regarding current practices and desired features were collected and analyzed. It was found that, a platform for registering students’ profiles and companies’ information has advantages to all three main stakeholders who are HLIs, students and companies. Prior to actual implementation, collaborative prototype was designed using pencil software and shared to 5 users from each group of stakeholders to evaluate the tasks. Responses from users were used to refine the requirements and design the final prototype. The final prototype design was used to develop a Field Attachment Management System (FAMS). FAMS indicated to have improved access of students to relevant companies, reports generation, students’ assessment and follow-up conducted by HLIs to their students.

Бесплатно

Research of CWS’ Particle Size Distribution based on Ultrasonic Attenuation Theory

Research of CWS’ Particle Size Distribution based on Ultrasonic Attenuation Theory

WANG Weidong, ZHANG Chenglian, CHU Fengge

Статья научная

The key to reduce coal pollution is the development of clean coal technology and the improvement of the backward coal-burning technology. The coal water slurry (CWS) is the first substitute of the oil. The particle size distribution of CWS plays an important role in the quality control of CWS. Now there are three methods that are used to analysis the particle size distribution of CWS, screening method, settlement method, laser method. These methods produce some disadvantages when be used to forecast the distribution of CWS. Thus, this article proposes an ultrasonic method with effective medium theory model which can be accurately reflected in the acoustic attenuation characteristics of coal-water slurry based on structural average. Experimental simulation proved that effective medium model is fully capable of achieving on-line detection of coal-water slurry particle size, for detection of fine-and coarse-sized particle size distribution. Non-linear relationship between attenuation and particle size, the three-frequency method can be used to inverse calculation of its. Which we can achieve CWS granularity on-line, and continuously control the quality of CWS.

Бесплатно

Research of IGPC Control Strategy Based-on Hybrid Optimization for Power Station Boiler Superheated Steam Temperature

Research of IGPC Control Strategy Based-on Hybrid Optimization for Power Station Boiler Superheated Steam Temperature

Benxian Xiao, Rongbao Chen, Jun Xiao

Статья научная

Implicit Generalized Predictive Control (IGPC) algorithm can directly identify controller parameters without the need of solving Diophantine equation, thus can reduce the on-line algorithm computation time. In order to improve IGPC performance and extend its application, modified Particle Swarm Optimization (PSO) algorithm is introduced into IGPC rolling horizon optimization, combined with general IGPC gradient optimization method under unconstrained condition, a new hybrid optimization method is obtained, this modified IGPC can be used to both of the non-constraint industry process control and the constraint industry process control. Aiming at the superheated steam temperature control of sub-critical 600MW boiler, a new cascade compound control strategy that combines an outer loop IGPC master adjuster and an inner loop PID auxiliary adjuster is adopted. Finally the simulation results have shown that the proposed method can constrain the control action, prevent dramatic change of the input signal, thus can achieve good static and dynamic performances.

Бесплатно

Research on Dynamic Water Surface and Ripple Animation

Research on Dynamic Water Surface and Ripple Animation

Yufen. Feng, Haiyan. Fan

Статья научная

Dynamic simulation of waters is a significant research subject, but the research and simulation of the water drops generating ripples is relatively less. The research on the ripples motion is great significance due to the indispensability of it in the special environments. In our research, we study the method of adding dynamic water ripple effects in 2D image on Web page, 3D animation and virtual reality. By the means of shape simulation, we add animation effects for the web page through creating cells of table combined with transparent special effect files of Flash. we achieve the good reality ripple effect by using simple dynamics and kinematic principle to create models in the 3D animation. By using the combination of 3dMax and Realflow software, we achieve more realistic simulation of the effect of dripping ripple. In the virtual reality system, the appropriate algorithm is applied in program to simulate ripples correctly. These methods are applied to different environments and the results are realistic.

Бесплатно

Research on SVG DC-Side Voltage Control Based-on PSO Algorithm

Research on SVG DC-Side Voltage Control Based-on PSO Algorithm

Yingwei Xiao

Статья научная

The operation flow of particle swarm optimization (PSO) is presented, at the same time the PSO algorithm and GA algorithm are used to find the optimal value of the standard function, simulation results show that the PSO algorithm has better global search performance and faster search efficiency. The inertia weight decreasing strategy of PSO algorithm is studied, the simulation results show that the concave function decreasing strategy can accelerate the convergence rate of the algorithm. The stability control of the DC-side voltage is very important for the static var generator (SVG) compensation, but the disadvantages of the traditional PI control are fixed parameters and poor adaptability of dynamic response, PSO algorithm is introduced to the optimization of PI parameters, so online PSO-PI control and off-line PSO-PI control are obtained, the SVG voltage loop transfer function is used as the controlled object. The simulation results show that the PSO-PI control can satisfy the time varying system of the controlled object with strong adaptability.

Бесплатно

Research on Virtual Vehicle Driven with Vision

Research on Virtual Vehicle Driven with Vision

Youquan Liu, Yu Cui, Enhua Wu

Статья научная

This paper presents a traffic-oriented modeling and simulation framework. With this tool, users can create a traffic scene quickly and easily, and then drive the vehicle in the created scene with physics simulated. Especially, the vehicle could be driven with vision technology, which is equipped with a webcam and a paper printed with controlling markers. And the paper is used as the virtual wheel to control the motion of the vehicle. At such low cost, many people can enjoy the driving fun; it also provides an easy and interesting way for driving video games with promising business values.

Бесплатно

Research on the time synchronization technology based on the GEO Positioning System

Research on the time synchronization technology based on the GEO Positioning System

Jing wenfang, Lu xiaochun, Wang Jin, Wang Danni

Статья научная

The method of common-view is characterized by higher precision, good convenience in use, and cheap instrument. A new time synchronous method for multiple users system by common-view technology is presented based on the GEO Positioning System (GEOPS). And the GEOPS common-view theory is studied for which is different from the other GNSS system. This paper introduces the working process and the time service pattern of the GEOPS. In the GEOPS, the pseudo-range found by the receiver through testing is actually the measurement of the whole link from the main control station and through the satellite to the receiver. Due to the different distances between the main control station and each satellite, this measurement has to be done using the upload delay correction by the main control station. The upload delay adopts a polynomial model and the polynomial parameters are demodulated from the navigation message to calculate the delay correction value during the adjustment. In accordance with these characteristics of GEOPS, we propose the GEOPS common-view theory. The format parameters of GEOPS common-view and data calculating method are presented. The time synchronization system, the error analysis and the applied plan of GEOPS common-view technology are introduced

Бесплатно

Retrieval of Complex Named Entities on the Web: Proposals for Similarity Computation

Retrieval of Complex Named Entities on the Web: Proposals for Similarity Computation

Armel Fotsoh, Christian Sallaberry, Annig Le Parc Lacayrelle

Статья научная

As part of the Cognisearch project, we developed a general architecture dedicated to extracting, indexing and searching for complex Named Entities (NEs) in webpages. We consider complex NEs as NEs represented by a list of properties that can be single values (text, number, etc.), "elementary" NEs and/or other complex NEs. Before the indexing of a new extracted complex NE, it is important to make sure that it is not already indexed. Indeed, the same NE may be referenced on several different web platforms. Therefore, we need to be able to establish similarity to consolidate information related to similar complex NEs. This is the focus of this paper. Two issues mainly arise in the computation of similarity between complex NEs: (i) the same property may be expressed differently in the compared NEs; (ii) some properties may be missing. We propose several generic similarity computation approaches that target any type of complex NEs. The two issues outlined above are tackled in these proposals. We experiment and evaluate these approaches with two examples of complex NEs related to the domain of social events.

Бесплатно

Rheological Behaviors of Bio-degradable Drilling Fluids in Horizontal Drilling of Unconsolidated Coal Seams

Rheological Behaviors of Bio-degradable Drilling Fluids in Horizontal Drilling of Unconsolidated Coal Seams

Cai Jihua, Gu Sui

Статья научная

In China, horizontal drilling techniques have been widely used in the exploration of coalbed methane (CBM). The drill-in fluids, especially in unconsolidated coal seams, are typically comprised of cellulose polymers, xanthan polymers and guar gums. However, testing and experience have shown that insufficient degradation of filter cakes resulting from even this “clean” drill-in fluids can significantly impede flow capacity at the wellbore wall. Past approaches to minimizing the damage have been the application of strong acids or oxidative breakers systems. They are often only marginally successful, particularly when applied in extended length intervals. Therefore, this paper introduced an engineered technique incorporating non-toxic, environment friendly and economically attractive bio-degradable drilling fluids (BDF). Extensive lab tests were conducted to evaluate the effects of substrate (polymer) type, substrate concentration, enzyme type and enzyme concentration on the viscosity breaking behaviors of BDFs. We got the conclusions as follows. (1) Power Law model was the best model to matching the rheological properties of BDFs; (2) Compared with konjak, the degradations of Na-CMC and guar gum were easier to be controlled; (3) In the degradation of CMC by enzyme SE-1, the optimal weight concentration ratio of CMC to SE-1 was 3 to 1; (4) Of the three enzymes, enzyme SE-2 had the highest activity and could be used to degrade polymer in shorter time; (5) Higher enzyme concentration could speed up the degradation reaction; (6) Viscosity breaking times fluctuating from 13.5 hours to 74.5 hours and viscosity breaking ratios varying from 20% to 100% could be achieved by modifying the formulations of BDFs.

Бесплатно

Risk-based Decision-making System for Information Processing Systems

Risk-based Decision-making System for Information Processing Systems

Serhii Zybin, Yana Bielozorova

Статья научная

The article is dedicated to using the methodology of building a decision support system under threats and risks. This method has been developed by modifying the methods of targeted evaluation of options and is used for constructing a scheme of the decision support system. Decision support systems help to make correct and effective solution to shortage of time, incompleteness, uncertainty and unreliability of information, and taking into account the risks. When we are making decisions taking into account the risks, it is necessary to solve the following tasks: determination of quantitative characteristics of risk; determination of quantitative indicators for the effectiveness of decisions in the presence of risks; distribution of resources between means of countering threats, and means that are aimed at improving information security. The known methods for solving the first problem provide for the identification of risks (qualitative analysis), as well as the assessment of the probabilities and the extent of possible damage (quantitative analysis). However, at the same time, the task of assessing the effectiveness of decisions taking into account risks is not solved and remains at the discretion of the expert. The suggesting method of decision support under threats and risks has been developed by modifying the methods of targeted evaluation of options. The relative efficiency in supporting measures to develop measures has been calculated as a function of time given on a time interval. The main idea of the proposed approach to the analysis of the impact of threats and risks in decision-making is that events that cause threats or risks are considered as a part of the decision support system. Therefore, such models of threats or risks are included in the hierarchy of goals, their links with other system's parts and goals are established. The main functional modules that ensure the continuous and efficient operation of the decision support system are the following subsystems: subsystem for analysing problems, risks and threats; subsystem for the formation of goals and criteria; decision-making subsystem; subsystem of formation of the decisive rule and analysis of alternatives. Structural schemes of functioning are constructed for each subsystem. The given block diagram provides a full-fledged decision-making process.

Бесплатно

Road Rush: A Review on Road Traffic Analytics Systems and A Proposed Alternative

Road Rush: A Review on Road Traffic Analytics Systems and A Proposed Alternative

Kaniz Fatema Fomy, Ashik Mahmud, Musabbir Islam, Shamsur Rahim

Статья научная

Road traffic congestion is a recurring occurrence causing enormous loss of valuable working hours around the world. It is impossible to eradicate such a problem overnight. Rather it could be handled intelligently with the help of modern technologies. Researchers and practitioners have introduced several algorithms, frameworks, systems to mitigate traffic congestion. This paper presents a systematic literature review on existing research and critically analyze the applications on traffic analytics systems. After designing a review protocol, each work was evaluated based on the five research questions and criteria. After critically and carefully analyzing the existing works, this paper also identified the advantages as well as the limitations of the existing approaches towards solving traffic congestion. Based on the findings, a prototype of a mobile application is proposed that can be considered as an improved alternative to the existing works. Finally, this study provides future research directions and improvement scopes in this field.

Бесплатно

Robust Security System for Critical Computers

Robust Security System for Critical Computers

Preet Inder Singh

Статья научная

Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used, but this system having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt the contents of password before storing or transmitting in physical domain. But all conventional cryptographic based encryption methods are having its own limitations, generally either in terms of complexity, efficiency or in terms of security. In this paper a simple method is developed that provide more secure and efficient means of authentication, at the same time simple in design for critical systems. Apart from protection, a step toward perfect security has taken by adding the feature of intruder detection along with the protection system. This is possible by merging various security systems with each other i.e password based security with keystroke dynamic, thumb impression with retina scan associated with the users. This new method is centrally based on user behavior and users related security system, which provides the robust security to the critical systems with intruder detection facilities.

Бесплатно

Журнал