首页 > 最新文献

International Journal of Open Source Software and Processes最新文献

英文 中文
Performance Evaluation of Xen, KVM, and Proxmox Hypervisors Xen、KVM、Proxmox虚拟化环境性能评估
Q4 Computer Science Pub Date : 2018-04-01 DOI: 10.4018/IJOSSP.2018040103
S. Algarni, Mohammad Rafi Ikbal, Roobaea Alroobaea, Ahmed S. Ghiduk, F. Nadeem
HardwarevirtualizationplaysamajorroleinITinfrastructureoptimizationinprivatedatacentersand publiccloudplatforms.ThoughtherearemanyadvancementsinCPUarchitectureandhypervisors recently,butoverheadstillexistsasthereisavirtualizationlayerbetweentheguestoperatingsystem andphysicalhardware.Thisisparticularlywhenmultiplevirtualguestsarecompetingforresources onthesamephysicalhardware.Understandingperformanceofavirtualizationlayeriscrucialasthis wouldhaveamajorimpactonentireITinfrastructure.Thisarticlehasperformedanextensivestudy oncomparingtheperformanceofthreehypervisorsKVM,Xen,andProxmoxVE.Theexperiments showedthatKVMdelivers thebestperformanceonmostof theselectedparameters.Xenexcels infilesystemperformanceandapplicationperformance.ThoughProxmoxhasdeliveredthebest performanceinonlythesub-categoryofCPUthroughput.Thisarticlesuggestsbest-suitedhypervisors fortargetedapplications. KEywORdS Cloud Computing, Hypervisor, Performance, Virtualization
HardwarevirtualizationplaysamajorroleinITinfrastructureoptimizationinprivatedatacentersand publiccloudplatforms。ThoughtherearemanyadvancementsinCPUarchitectureandhypervisors最近,butoverheadstillexistsasthereisavirtualizationlayerbetweentheguestoperatingsystem andphysicalhardware。Thisisparticularlywhenmultiplevirtualguestsarecompetingforresources onthesamephysicalhardware。Understandingperformanceofavirtualizationlayeriscrucialasthis wouldhaveamajorimpactonentireITinfrastructure。Thisarticlehasperformedanextensivestudy oncomparingtheperformanceofthreehypervisorsKVM,Xen,andProxmoxVE。Theexperiments showedthatKVMdelivers thebestperformanceonmostof theselectedparameters。Xenexcels infilesystemperformanceandapplicationperformance。ThoughProxmoxhasdeliveredthebest performanceinonlythesub-categoryofCPUthroughput。Thisarticlesuggestsbest-suitedhypervisors fortargetedapplications。关键词云计算,Hypervisor,性能,虚拟化
{"title":"Performance Evaluation of Xen, KVM, and Proxmox Hypervisors","authors":"S. Algarni, Mohammad Rafi Ikbal, Roobaea Alroobaea, Ahmed S. Ghiduk, F. Nadeem","doi":"10.4018/IJOSSP.2018040103","DOIUrl":"https://doi.org/10.4018/IJOSSP.2018040103","url":null,"abstract":"HardwarevirtualizationplaysamajorroleinITinfrastructureoptimizationinprivatedatacentersand publiccloudplatforms.ThoughtherearemanyadvancementsinCPUarchitectureandhypervisors recently,butoverheadstillexistsasthereisavirtualizationlayerbetweentheguestoperatingsystem andphysicalhardware.Thisisparticularlywhenmultiplevirtualguestsarecompetingforresources onthesamephysicalhardware.Understandingperformanceofavirtualizationlayeriscrucialasthis wouldhaveamajorimpactonentireITinfrastructure.Thisarticlehasperformedanextensivestudy oncomparingtheperformanceofthreehypervisorsKVM,Xen,andProxmoxVE.Theexperiments showedthatKVMdelivers thebestperformanceonmostof theselectedparameters.Xenexcels infilesystemperformanceandapplicationperformance.ThoughProxmoxhasdeliveredthebest performanceinonlythesub-categoryofCPUthroughput.Thisarticlesuggestsbest-suitedhypervisors fortargetedapplications. KEywORdS Cloud Computing, Hypervisor, Performance, Virtualization","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"30 1","pages":"39-54"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78840363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Effect of User Sessions on the Heuristic Usability Method 用户会话对启发式可用性方法的影响
Q4 Computer Science Pub Date : 2018-01-01 DOI: 10.4018/IJOSSP.2018010104
Jehad Alqurni, Roobaea Alroobaea, Mohammed Alqahtani
Heuristic evaluation (HE) is a widely used method for assessing software systems. Several studies have sought to improve the effectiveness of HE by developing its heuristics and procedures. However, few studies have involved the end-user, and to the best of the authors’ knowledge, no HE studies involving end-users with non-expert evaluators have been reported. Therefore, the aim of this study is to investigate the impact of end-users on the results obtained by a non-expert evaluator within the HE process, and through that, to explore the number of usability problems and their severity. This article proposes introducing two sessions within the HE process: a user exploration session (UES-HE) and a user review session (URS-HE). The outcomes are compared with two solid benchmarks in the usability-engineering field: the traditional HE and the usability testing (UT) methods. The findings show that the end-user has a significant impact on non-expert evaluator results in both sessions. In the UES-HE method, the results outperformed all usability evaluation methods (UEMs) regarding the usability problems identified, and it tended to identify more major, minor, and cosmetic problems than other methods.
启发式评估(HE)是一种广泛应用于软件系统评估的方法。一些研究试图通过开发启发式方法和程序来提高高等教育的有效性。然而,很少有研究涉及最终用户,并且据作者所知,没有关于最终用户与非专家评估者的HE研究的报道。因此,本研究的目的是调查最终用户对HE过程中非专家评估者获得的结果的影响,并通过该研究探索可用性问题的数量及其严重程度。本文建议在HE过程中引入两个会话:用户探索会话(UES-HE)和用户审查会话(URS-HE)。结果与可用性工程领域的两种可靠基准进行了比较:传统的HE和可用性测试(UT)方法。研究结果表明,最终用户对两届会议的非专家评估结果有显著影响。在UES-HE方法中,结果优于所有可用性评估方法(UEMs)所识别的可用性问题,并且与其他方法相比,它倾向于识别更多的主要、次要和外观问题。
{"title":"Effect of User Sessions on the Heuristic Usability Method","authors":"Jehad Alqurni, Roobaea Alroobaea, Mohammed Alqahtani","doi":"10.4018/IJOSSP.2018010104","DOIUrl":"https://doi.org/10.4018/IJOSSP.2018010104","url":null,"abstract":"Heuristic evaluation (HE) is a widely used method for assessing software systems. Several studies have sought to improve the effectiveness of HE by developing its heuristics and procedures. However, few studies have involved the end-user, and to the best of the authors’ knowledge, no HE studies involving end-users with non-expert evaluators have been reported. Therefore, the aim of this study is to investigate the impact of end-users on the results obtained by a non-expert evaluator within the HE process, and through that, to explore the number of usability problems and their severity. This article proposes introducing two sessions within the HE process: a user exploration session (UES-HE) and a user review session (URS-HE). The outcomes are compared with two solid benchmarks in the usability-engineering field: the traditional HE and the usability testing (UT) methods. The findings show that the end-user has a significant impact on non-expert evaluator results in both sessions. In the UES-HE method, the results outperformed all usability evaluation methods (UEMs) regarding the usability problems identified, and it tended to identify more major, minor, and cosmetic problems than other methods.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"36 1","pages":"62-81"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90533886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of Migration Processes to Open Source Software 对开源软件迁移过程的回顾
Q4 Computer Science Pub Date : 2018-01-01 DOI: 10.4018/IJOSSP.2018010102
Razieh Sobhani, Habib Seifzadeh, Taghi Javdani
Withregardtotheincreasingspreadofinformationtechnologyintheworld,accesstothistechnologyis ofgreatimportance.Duetotheircompetitiveadvantages,opensourcesoftwarearemorepopularthan thecloseonesandtheyaremorewidelyused,aswell.Havinganappropriateprocessformigrating, identifyingandrankingactivitiestoprepareandperformthemigrationdesignintheorganization, preventsthefailureoftheperformanceinorganizations.Today,therearelotsofmigrationprocesses inreviewofliteratureandthiswillconfusethemanagerstochoosethemostappropriateprocessfor theirorganization.Thisarticlestudiesthepresentedprocessesofmigrationtoopensourcesoftware intheworldandbypresentingnovelfactors.Italsoattemptstointroduceanappropriateframework toselectthemostefficientprocessinmigrationtoopensourcesoftware.Sothatorganizationsdonot haveaconcerntochoosethebestmigrationprocessandITmanagersareabletoselecttheappropriate processfortheirorganizationsquicklyandwithnoconfusion. KeywORdS Migration Model, Migration Process, Migration to Open Source Software, Open Source Software
Withregardtotheincreasingspreadofinformationtechnologyintheworld,accesstothistechnologyis ofgreatimportance。Duetotheircompetitiveadvantages,opensourcesoftwarearemorepopularthan thecloseonesandtheyaremorewidelyused,aswell。Havinganappropriateprocessformigrating, identifyingandrankingactivitiestoprepareandperformthemigrationdesignintheorganization, preventsthefailureoftheperformanceinorganizations。Today,therearelotsofmigrationprocesses inreviewofliteratureandthiswillconfusethemanagerstochoosethemostappropriateprocessfor theirorganization。Thisarticlestudiesthepresentedprocessesofmigrationtoopensourcesoftware intheworldandbypresentingnovelfactors。Italsoattemptstointroduceanappropriateframework toselectthemostefficientprocessinmigrationtoopensourcesoftware。Sothatorganizationsdonot haveaconcerntochoosethebestmigrationprocessandITmanagersareabletoselecttheappropriate processfortheirorganizationsquicklyandwithnoconfusion。关键词:迁移模型,迁移过程,开源软件迁移,开源软件
{"title":"A Review of Migration Processes to Open Source Software","authors":"Razieh Sobhani, Habib Seifzadeh, Taghi Javdani","doi":"10.4018/IJOSSP.2018010102","DOIUrl":"https://doi.org/10.4018/IJOSSP.2018010102","url":null,"abstract":"Withregardtotheincreasingspreadofinformationtechnologyintheworld,accesstothistechnologyis ofgreatimportance.Duetotheircompetitiveadvantages,opensourcesoftwarearemorepopularthan thecloseonesandtheyaremorewidelyused,aswell.Havinganappropriateprocessformigrating, identifyingandrankingactivitiestoprepareandperformthemigrationdesignintheorganization, preventsthefailureoftheperformanceinorganizations.Today,therearelotsofmigrationprocesses inreviewofliteratureandthiswillconfusethemanagerstochoosethemostappropriateprocessfor theirorganization.Thisarticlestudiesthepresentedprocessesofmigrationtoopensourcesoftware intheworldandbypresentingnovelfactors.Italsoattemptstointroduceanappropriateframework toselectthemostefficientprocessinmigrationtoopensourcesoftware.Sothatorganizationsdonot haveaconcerntochoosethebestmigrationprocessandITmanagersareabletoselecttheappropriate processfortheirorganizationsquicklyandwithnoconfusion. KeywORdS Migration Model, Migration Process, Migration to Open Source Software, Open Source Software","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"5 1","pages":"20-31"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73176587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Mitigate Malware Attacks Using Netfilter's Hybrid Frame in Firewall Security 一种利用Netfilter的混合框架在防火墙安全中减轻恶意软件攻击的方法
Q4 Computer Science Pub Date : 2018-01-01 DOI: 10.4018/IJOSSP.2018010103
Nivedita Nahar, Prerna Dewan, Rakesh Kumar
With the steady advancements in the technology, the network security is really important these daystoprotectinformationfromattackers.Inthisresearch,themainfocusisondesigningstrong firewallfilteringrulessothatdetectionofmaliciouscodeisachievedtoanoptimallevel.Aproposed frameworkisintroducedtoimprovetheperformanceparameterssuchasServerresponsetime,Web contentanalysis,Bandwidth,andtheperformanceoftheNetworktrafficload.Thisresearchwork definesanewsetofIPtablerulesachievedbymodifyingthekernelsourcecode.Thisisdoneusing OpenBSDkernelsourcecode,whichresultsintheformationofamini-firewall.Therefore,anew hybridapproachisproposedbyaddingpacketfilteringrulesandSNORTtechnologyinmini-firewall formaliciousactivitydetection.Itisanefficientandpracticaltechniquewhichwillbehelpfulto mitigate the malware attacks and secure LAMP server. Experimental analysis has been done to concludethataround70-75%maliciousactivitycanbereducedbyusingtheproposedtechnique. KeywORdS Attack Mitigation, Deep Packet Inspection, Distributed Denial of Service, Information Security, Intrusion Detection System, Packet Filtering Rule Editor
随着技术的不断进步,网络安全变得越来越重要daystoprotectinformationfromattackers。Inthisresearch,themainfocusisondesigningstrong firewallfilteringrulessothatdetectionofmaliciouscodeisachievedtoanoptimallevel。Aproposed frameworkisintroducedtoimprovetheperformanceparameterssuchasServerresponsetime,Web contentanalysis,Bandwidth,andtheperformanceoftheNetworktrafficload。Thisresearchwork definesanewsetofIPtablerulesachievedbymodifyingthekernelsourcecode。Thisisdoneusing OpenBSDkernelsourcecode,whichresultsintheformationofamini-firewall。Therefore,anew hybridapproachisproposedbyaddingpacketfilteringrulesandSNORTtechnologyinmini-firewall formaliciousactivitydetection。Itisanefficientandpracticaltechniquewhichwillbehelpfulto mitigate_恶意软件攻击_和_ secure_ lamp_服务器。已经对concludethataround70-75%maliciousactivitycanbereducedbyusingtheproposedtechnique进行了实验分析。关键词:攻击缓解,深度包检测,分布式拒绝服务,信息安全,入侵检测系统,包过滤规则编辑器
{"title":"An Approach to Mitigate Malware Attacks Using Netfilter's Hybrid Frame in Firewall Security","authors":"Nivedita Nahar, Prerna Dewan, Rakesh Kumar","doi":"10.4018/IJOSSP.2018010103","DOIUrl":"https://doi.org/10.4018/IJOSSP.2018010103","url":null,"abstract":"With the steady advancements in the technology, the network security is really important these daystoprotectinformationfromattackers.Inthisresearch,themainfocusisondesigningstrong firewallfilteringrulessothatdetectionofmaliciouscodeisachievedtoanoptimallevel.Aproposed frameworkisintroducedtoimprovetheperformanceparameterssuchasServerresponsetime,Web contentanalysis,Bandwidth,andtheperformanceoftheNetworktrafficload.Thisresearchwork definesanewsetofIPtablerulesachievedbymodifyingthekernelsourcecode.Thisisdoneusing OpenBSDkernelsourcecode,whichresultsintheformationofamini-firewall.Therefore,anew hybridapproachisproposedbyaddingpacketfilteringrulesandSNORTtechnologyinmini-firewall formaliciousactivitydetection.Itisanefficientandpracticaltechniquewhichwillbehelpfulto mitigate the malware attacks and secure LAMP server. Experimental analysis has been done to concludethataround70-75%maliciousactivitycanbereducedbyusingtheproposedtechnique. KeywORdS Attack Mitigation, Deep Packet Inspection, Distributed Denial of Service, Information Security, Intrusion Detection System, Packet Filtering Rule Editor","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"48 1","pages":"32-61"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88110004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining Data Preprocessing Methods With Imputation Techniques for Software Defect Prediction 软件缺陷预测的数据预处理与Imputation相结合
Q4 Computer Science Pub Date : 2018-01-01 DOI: 10.4018/IJOSSP.2018010101
Misha Kakkar, Eleni Constantinou, Apostolos Ampatzoglou, G. Robles, Jesus M. Gonzalez-Barahona, Daniel Izquierdo-Cortazar
SoftwareDefectPrediction(SDP)modelsareusedtopredict,whethersoftwareiscleanorbuggy usingthehistoricaldatacollectedfromvarioussoftwarerepositories.Thedatacollectedfromsuch repositories may contain some missing values. In order to estimate missing values, imputation techniquesareused,whichutilizesthecompleteobservedvaluesinthedataset.Theobjectiveof thisstudyis to identify thebest-suitedimputationtechniqueforhandlingmissingvalues inSDP dataset.Inadditiontoidentifyingtheimputationtechnique,theauthorshaveinvestigatedforthemost appropriatecombinationofimputationtechniqueanddatapreprocessingmethodforbuildingSDP model.Inthisstudy,fourcombinationsofimputationtechniqueanddatapreprocessingmethodsare examinedusingtheimprovedNASAdatasets.Thesecombinationsareusedalongwithfivedifferent machine-learningalgorithmstodevelopmodels.Theperformanceof theseSDPmodelsarethen comparedusingtraditionalperformanceindicators.Experimentresultsshowthatamongdifferent imputationtechniques,linearregressiongivesthemostaccurateimputedvalue.Thecombination oflinearregressionwithcorrelationbasedfeatureselectoroutperformsallothercombinations.To validatethesignificanceofdatapreprocessingmethodswithimputationthefindingsareappliedto opensourceprojects.Itwasconcludedthattheresultisinconsistencywiththeaboveconclusion. KeyWORDS Feature Selection, Instance Selection, Missing Value Imputation, Software Defect Prediction
SoftwareDefectPrediction(SDP)modelsareusedtopredict、whethersoftwareiscleanorbuggy usingthehistoricaldatacollectedfromvarioussoftwarerepositories。Thedatacollectedfromsuch repositories_可能_包含_一些_缺失的_值。> > order > >估计> >缺失的值,> > impuation> > techniquesareused,whichutilizesthecompleteobservedvaluesinthedataset。Theobjectiveof thisstudyis to identify_ thebest-suitedimputationtechniqueforhandlingmissingvalues inSDP数据集。Inadditiontoidentifyingtheimputationtechnique,theauthorshaveinvestigatedforthemost appropriatecombinationofimputationtechniqueanddatapreprocessingmethodforbuildingSDP模型。Inthisstudy,fourcombinationsofimputationtechniqueanddatapreprocessingmethodsare examinedusingtheimprovedNASAdatasets。Thesecombinationsareusedalongwithfivedifferent machine-learningalgorithmstodevelopmodels。Theperformanceof theseSDPmodelsarethen comparedusingtraditionalperformanceindicators。Experimentresultsshowthatamongdifferent imputationtechniques,linearregressiongivesthemostaccurateimputedvalue。Thecombination oflinearregressionwithcorrelationbasedfeatureselectoroutperformsallothercombinations。To validatethesignificanceofdatapreprocessingmethodswithimputationthefindingsareappliedto opensourceprojects.Itwasconcludedthattheresultisinconsistencywiththeaboveconclusion。关键词特征选择,实例选择,缺失值插值,软件缺陷预测
{"title":"Combining Data Preprocessing Methods With Imputation Techniques for Software Defect Prediction","authors":"Misha Kakkar, Eleni Constantinou, Apostolos Ampatzoglou, G. Robles, Jesus M. Gonzalez-Barahona, Daniel Izquierdo-Cortazar","doi":"10.4018/IJOSSP.2018010101","DOIUrl":"https://doi.org/10.4018/IJOSSP.2018010101","url":null,"abstract":"SoftwareDefectPrediction(SDP)modelsareusedtopredict,whethersoftwareiscleanorbuggy usingthehistoricaldatacollectedfromvarioussoftwarerepositories.Thedatacollectedfromsuch repositories may contain some missing values. In order to estimate missing values, imputation techniquesareused,whichutilizesthecompleteobservedvaluesinthedataset.Theobjectiveof thisstudyis to identify thebest-suitedimputationtechniqueforhandlingmissingvalues inSDP dataset.Inadditiontoidentifyingtheimputationtechnique,theauthorshaveinvestigatedforthemost appropriatecombinationofimputationtechniqueanddatapreprocessingmethodforbuildingSDP model.Inthisstudy,fourcombinationsofimputationtechniqueanddatapreprocessingmethodsare examinedusingtheimprovedNASAdatasets.Thesecombinationsareusedalongwithfivedifferent machine-learningalgorithmstodevelopmodels.Theperformanceof theseSDPmodelsarethen comparedusingtraditionalperformanceindicators.Experimentresultsshowthatamongdifferent imputationtechniques,linearregressiongivesthemostaccurateimputedvalue.Thecombination oflinearregressionwithcorrelationbasedfeatureselectoroutperformsallothercombinations.To validatethesignificanceofdatapreprocessingmethodswithimputationthefindingsareappliedto opensourceprojects.Itwasconcludedthattheresultisinconsistencywiththeaboveconclusion. KeyWORDS Feature Selection, Instance Selection, Missing Value Imputation, Software Defect Prediction","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"4 1","pages":"1-19"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74473298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Software Defect Prediction Using Genetic Programming and Neural Networks 基于遗传规划和神经网络的软件缺陷预测
Q4 Computer Science Pub Date : 2017-10-01 DOI: 10.4018/IJOSSP.2017100102
Mohammed Akour, Wasen Y. Melhem
This article describes how classification methods on software defect prediction is widely researched due to the need to increase the software quality and decrease testing efforts. However, findings of past researches done on this issue has not shown any classifier which proves to be superior to the other. Additionally, there is a lack of research that studies the effects and accuracy of genetic programming on software defect prediction. To find solutions for this problem, a comparative software defect prediction experiment between genetic programming and neural networks are performed on four datasets from the NASA Metrics Data repository. Generally, an interesting degree of accuracy is detected, which shows how the metric-based classification is useful. Nevertheless, this article specifies that the application and usage of genetic programming is highly recommended due to the detailed analysis it provides, as well as an important feature in this classification method which allows the viewing of each attributes impact in the dataset.
本文描述了由于提高软件质量和减少测试工作的需要,软件缺陷预测的分类方法是如何被广泛研究的。然而,过去对这一问题的研究结果并没有显示出任何一种分类器比另一种分类器更优越。此外,对遗传编程在软件缺陷预测中的效果和准确性的研究还比较缺乏。为了找到解决这一问题的方法,在NASA度量数据存储库的四个数据集上,对遗传编程和神经网络进行了软件缺陷预测的比较实验。通常,检测到一个有趣的准确度,这表明基于度量的分类是如何有用的。尽管如此,本文明确指出,遗传规划的应用和使用是强烈推荐的,因为它提供了详细的分析,以及这种分类方法的一个重要特征,它允许查看数据集中的每个属性影响。
{"title":"Software Defect Prediction Using Genetic Programming and Neural Networks","authors":"Mohammed Akour, Wasen Y. Melhem","doi":"10.4018/IJOSSP.2017100102","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017100102","url":null,"abstract":"This article describes how classification methods on software defect prediction is widely researched due to the need to increase the software quality and decrease testing efforts. However, findings of past researches done on this issue has not shown any classifier which proves to be superior to the other. Additionally, there is a lack of research that studies the effects and accuracy of genetic programming on software defect prediction. To find solutions for this problem, a comparative software defect prediction experiment between genetic programming and neural networks are performed on four datasets from the NASA Metrics Data repository. Generally, an interesting degree of accuracy is detected, which shows how the metric-based classification is useful. Nevertheless, this article specifies that the application and usage of genetic programming is highly recommended due to the detailed analysis it provides, as well as an important feature in this classification method which allows the viewing of each attributes impact in the dataset.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"98 1","pages":"32-51"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85901120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transmission Line Routing Using Open Source Software Q-GIS 基于开源软件Q-GIS的传输线路由
Q4 Computer Science Pub Date : 2017-10-01 DOI: 10.4018/IJOSSP.2017100104
Shabbir Uddin, K. Sherpa, S. Chakravorty, A. Ray
This article contends that planning for power systems is essentially a projection of how the system should grow over a specific period of time, given certain assumptions and judgments about the future load and the size of investment in generating capacity additions, transmission facilities expansion and reinforcements. Transmission line routing is one of the most important strategic decision-making problems for both private and public sectors. The major objective of a utility is to supply demand for power with a good quality of service, through proper planning of the system. This has led to development of methods which can be used to aid the decision-making process for selecting the best alternative. Geographical Information System (GIS)-based electricity transmission system planning strategies are proposed in this article to determine an optimum routing of feeders. Existing and proposed layouts have been drawn using a GIS-based software, Quantum Geographic Information System (Q-GIS). The developed system is based on the routing of transmission lines from Barh thermal power plant situated in Bihar, India.
本文认为,电力系统的规划本质上是对系统在特定时期内应如何增长的预测,给出对未来负荷的某些假设和判断,以及在发电能力增加、输电设施扩建和加固方面的投资规模。输电线路路由是公私部门最重要的战略决策问题之一。公用事业公司的主要目标是通过适当的系统规划,以优质的服务满足电力需求。这导致了可用于帮助选择最佳备选方案的决策过程的方法的发展。本文提出了基于地理信息系统(GIS)的输电系统规划策略,以确定馈线的最佳路径。现有的和拟议的布局是使用基于gis的软件量子地理信息系统(Q-GIS)绘制的。开发的系统基于位于印度比哈尔邦的Barh热电厂的输电线路路由。
{"title":"Transmission Line Routing Using Open Source Software Q-GIS","authors":"Shabbir Uddin, K. Sherpa, S. Chakravorty, A. Ray","doi":"10.4018/IJOSSP.2017100104","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017100104","url":null,"abstract":"This article contends that planning for power systems is essentially a projection of how the system should grow over a specific period of time, given certain assumptions and judgments about the future load and the size of investment in generating capacity additions, transmission facilities expansion and reinforcements. Transmission line routing is one of the most important strategic decision-making problems for both private and public sectors. The major objective of a utility is to supply demand for power with a good quality of service, through proper planning of the system. This has led to development of methods which can be used to aid the decision-making process for selecting the best alternative. Geographical Information System (GIS)-based electricity transmission system planning strategies are proposed in this article to determine an optimum routing of feeders. Existing and proposed layouts have been drawn using a GIS-based software, Quantum Geographic Information System (Q-GIS). The developed system is based on the routing of transmission lines from Barh thermal power plant situated in Bihar, India.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"17 1","pages":"71-82"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78620010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A New Framework for Reusing Business Processes Via Mashup: BP_Mashup 通过Mashup重用业务流程的新框架:BP_Mashup
Q4 Computer Science Pub Date : 2017-10-01 DOI: 10.4018/IJOSSP.2017100103
Zenak Fethia, Zaoui Lynda
Thisarticledescribeshowinthelastdecade,businessprocessrepositorieshavegrownsignificantly andtheneedfornewprocessestoanswerincreasingmarketdemands,hasbecomeacentralinterest ofmodernenterprises.However,developingopensourcebusinessprocesses(BP)fromscratchisone ofthemosttime-consumingandhigh-costtasks.Therefore,reusingmechanismsbecomesapriority todealwiththisissue.Inthisarticle,itisproposedthatanopensourceuser-friendlyframeworkthat mixespartsofexistingprocesscomponentstobuildanewprocess,inordertorespondtoaparticular goal.Thisisknownasbusinessprocessmashup(BP_Mashup).TheBP_mashupframeworkpresented inthisarticleallowsuserstoperformamixtureofprocessfragmentsusingasimpleinterfacewith asetofgraphicalandtemporaleventsoperatorsbasedonaformalmodel. KeywORdS BP_Mashup, Business Process Fragments, Formal Model, Framework, Reusing
Thisarticledescribeshowinthelastdecade、businessprocessrepositorieshavegrownsignificantly andtheneedfornewprocessestoanswerincreasingmarketdemands、hasbecomeacentralinterest ofmodernenterprises.However、developingopensourcebusinessprocesses(BP)fromscratchisone ofthemosttime-consumingandhigh-costtasks。Therefore,reusingmechanismsbecomesapriority todealwiththisissue。Inthisarticle、itisproposedthatanopensourceuser-friendlyframeworkthat mixespartsofexistingprocesscomponentstobuildanewprocess、inordertorespondtoaparticular goal.Thisisknownasbusinessprocessmashup(BP_Mashup)。TheBP_mashupframeworkpresented inthisarticleallowsuserstoperformamixtureofprocessfragmentsusingasimpleinterfacewith asetofgraphicalandtemporaleventsoperatorsbasedonaformalmodel。关键词BP_Mashup,业务流程片段,形式模型,框架,重用
{"title":"A New Framework for Reusing Business Processes Via Mashup: BP_Mashup","authors":"Zenak Fethia, Zaoui Lynda","doi":"10.4018/IJOSSP.2017100103","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017100103","url":null,"abstract":"Thisarticledescribeshowinthelastdecade,businessprocessrepositorieshavegrownsignificantly andtheneedfornewprocessestoanswerincreasingmarketdemands,hasbecomeacentralinterest ofmodernenterprises.However,developingopensourcebusinessprocesses(BP)fromscratchisone ofthemosttime-consumingandhigh-costtasks.Therefore,reusingmechanismsbecomesapriority todealwiththisissue.Inthisarticle,itisproposedthatanopensourceuser-friendlyframeworkthat mixespartsofexistingprocesscomponentstobuildanewprocess,inordertorespondtoaparticular goal.Thisisknownasbusinessprocessmashup(BP_Mashup).TheBP_mashupframeworkpresented inthisarticleallowsuserstoperformamixtureofprocessfragmentsusingasimpleinterfacewith asetofgraphicalandtemporaleventsoperatorsbasedonaformalmodel. KeywORdS BP_Mashup, Business Process Fragments, Formal Model, Framework, Reusing","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"32 1","pages":"52-70"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82082876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Approach to Test Suite Reduction and Fault Detection Using Data Mining Techniques 基于数据挖掘技术的测试集缩减和故障检测的有效方法
Q4 Computer Science Pub Date : 2017-10-01 DOI: 10.4018/IJOSSP.2017100101
B. Subashini, D. Mala
Software testing is used to find bugs in the software to provide a quality product to the end users. Test suites are used to detect failures in software but it may be redundant and it takes a lot of time for the execution of software. In this article, an enormous number of test cases are created using combinatorial test design algorithms. Attribute reduction is an important preprocessing task in data mining. Attributes are selected by removing all weak and irrelevant attributes to reduce complexity in data mining. After preprocessing, it is not necessary to test the software with every combination of test cases, since the test cases are large and redundant, the healthier test cases are identified using a data mining techniques algorithm. This is healthier and the final test suite will identify the defects in the software, it will provide better coverage analysis and reduces execution time on the software.
软件测试用于发现软件中的错误,从而为最终用户提供高质量的产品。测试套件用于检测软件中的故障,但它可能是冗余的,并且需要花费大量时间来执行软件。在本文中,使用组合测试设计算法创建了大量的测试用例。属性约简是数据挖掘中一项重要的预处理任务。通过去除所有弱属性和不相关属性来选择属性,以降低数据挖掘的复杂性。在预处理之后,没有必要使用测试用例的每个组合来测试软件,因为测试用例是大的和冗余的,使用数据挖掘技术算法识别更健康的测试用例。这样更健康,并且最终的测试套件将识别软件中的缺陷,它将提供更好的覆盖率分析并减少软件的执行时间。
{"title":"An Effective Approach to Test Suite Reduction and Fault Detection Using Data Mining Techniques","authors":"B. Subashini, D. Mala","doi":"10.4018/IJOSSP.2017100101","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017100101","url":null,"abstract":"Software testing is used to find bugs in the software to provide a quality product to the end users. Test suites are used to detect failures in software but it may be redundant and it takes a lot of time for the execution of software. In this article, an enormous number of test cases are created using combinatorial test design algorithms. Attribute reduction is an important preprocessing task in data mining. Attributes are selected by removing all weak and irrelevant attributes to reduce complexity in data mining. After preprocessing, it is not necessary to test the software with every combination of test cases, since the test cases are large and redundant, the healthier test cases are identified using a data mining techniques algorithm. This is healthier and the final test suite will identify the defects in the software, it will provide better coverage analysis and reduces execution time on the software.","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"37 1","pages":"1-31"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76405362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research of Software Reliability Test Based on Test Model 基于测试模型的软件可靠性测试研究
Q4 Computer Science Pub Date : 2017-07-01 DOI: 10.4018/IJOSSP.2017070103
Honghui Li, Aihua Zhao, Jun-wen Zhang
This article describes how in recent years, models-based software reliability test methods have been a hot topic. In order to summarize the research results of the reliabilitytestmodelscreatedinrecentyears,andtofindnewresearchhottopicson thisbasis,twokindsoftestmodelsareinthisarticle.Theseincludetheoperational profile and the usage model which are introduced and compared. In addition, the methodsofconstructingausagemodelarealsodiscussedindetail.Finally,thetopic ofbuildingausagemodelispresented. KeywORdS Markov Chain, Software Reliability Test, Software Reliability, Test Model
这篇文章描述了近年来基于模型的软件可靠性测试方法是如何成为热门话题的。为了总结他们的研究成果reliabilitytestmodelscreatedinrecentyears,andtofindnewresearchhottopicson thisbasis,twokindsoftestmodelsareinthisarticle。Theseincludetheoperational profile和我们所介绍和比较的使用模型。此外,< the> methodsofconstructingausagemodelarealsodiscussedindetail。Finally,thetopic ofbuildingausagemodelispresented。关键词:马尔可夫链,软件可靠性测试,软件可靠性,测试模型
{"title":"Research of Software Reliability Test Based on Test Model","authors":"Honghui Li, Aihua Zhao, Jun-wen Zhang","doi":"10.4018/IJOSSP.2017070103","DOIUrl":"https://doi.org/10.4018/IJOSSP.2017070103","url":null,"abstract":"This article describes how in recent years, models-based software reliability test methods have been a hot topic. In order to summarize the research results of the reliabilitytestmodelscreatedinrecentyears,andtofindnewresearchhottopicson thisbasis,twokindsoftestmodelsareinthisarticle.Theseincludetheoperational profile and the usage model which are introduced and compared. In addition, the methodsofconstructingausagemodelarealsodiscussedindetail.Finally,thetopic ofbuildingausagemodelispresented. KeywORdS Markov Chain, Software Reliability Test, Software Reliability, Test Model","PeriodicalId":53605,"journal":{"name":"International Journal of Open Source Software and Processes","volume":"241 1","pages":"49-64"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74489169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Open Source Software and Processes
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1