JRPIT 43.4.QXP_Layout 1
نویسندگان
چکیده
Journal of Research and Practice in Information Technology, Vol. 43, No. 4, November 2011 We are approaching the shortest day of the year in the southern hemisphere and also approaching is the National Authentication Service for Health (NASH) as part of the Australian Government’s $1 billion personally controlled e-health record (PCEHR). The NASH is being delivered by IBM and the public key infrastructure-based system will handle transactions by more than 800,000 doctors and other health professionals as they access patient records across 70,000 organizations. It is a key part of the PCEHR in that it will verify authorized users and support secure communications between medical providers. This is the final issue for volume #43 for 2011. The first two papers for this issue concern refactoring. “Refactoring is used to improve the internal structure of the code without affecting its external behaviour.” In his paper “The Impact of Refactoring on Class and Architecture Stability”, Mohammad Alshayeb assesses “the impact of refactoring on class and architecture stability and then proposes a classification for refactoring methods based on the impact of refactoring on class and architecture stability”. In the second paper, “Software Refactoring at the Class Level using Clustering Techniques”, the authors, Abdulaziz Alkhalid, Mohammad Alshayeb and Sabri A. Mahmoud discuss the need to reduce software complexity, and the roll of refactoring in this exercise. They propose “a method for identifying ill-structured software at the class level that provides heuristic refactoring advice to software designers in order to create balance between coupling and cohesion using pattern recognition techniques”. They compare the effectiveness of four different techniques to identify “illstructured” code. The third paper, “A Maturity Model of Software Product Quality” by Rafa E. Al-Qutaish and Alain Abran, presents “a maturity model designed to directly assess the quality of a software product”. “The quality of a product can be assessed either directly by looking into the product itself, or indirectly through assessing the process used to develop that product. In the software engineering field, there are currently numerous capability and maturity models for assessing a set of specific software processes, but very few product maturity models for those interested in assessing the quality of software products.” In the final paper, “How to Manage Spatio-temporal Events in Relational Databases”, the authors, Dolores Cuadra, Javier Calle and Jesica Rivero discuss “the need for event-conditionaction (ECA) rules in spatio-temporal databases and outline a generic scenario for them”. “They present a proposal for the implementation of ECA rules, in which several implementation alter natives for different spatio-temporal rule types are considered”.
منابع مشابه
JRPIT 43.4.QXP_Layout 1
The quality of a product can be assessed either directly by looking into the product itself, or indirectly through assessing the process used to develop that product. In the software engineering field, there are currently numerous capability and maturity models for assessing a set of specific software processes, but very few product maturity models for those interested in assessing the quality ...
متن کاملJRPIT 44.3.QXP_Layout 1
In the last decade, e-learning systems have become a standard tool for training both in academia (universities, schools, for example.) and in business (employee training programs, lifelong learning, for example.) This situation has generated an increasing demand for services and functionalities, resulting in highly complex systems, both from a technological point of view and from the point of v...
متن کاملJrpit 38.2.qx
135 Copyright© 2006, Australian Computer Society Inc. General permission to republish, but not for profit, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges were granted by permission of the Australian Computer Society Inc. Face Detection and R...
متن کاملWASM - A Metric for Securing a Web Application
Journal of Research and Practice in Information Technology, Vol. 46, No. 1, February 2014 Copyright© 2014, Australian Computer Society Inc. General permission to republish, but not for profi t, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges ...
متن کاملA Model for Generating Explanatory Web-based Natural-Language Dialogue Interactions for Document Filtering
Journal of Research and Practice in Information Technology, Vol. 34, No. 1, February 2002 2 Copyright© 2001, Australian Computer Society Inc. General permission to republish, but not for profit, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges...
متن کامل