Software Engineering Research Papers - Academia.edu (original) (raw)
A computer aided design (CAD) tool has been specifically developed for rapid and easy design of solid models for surfboard and sailboard fins. This tool simplifies the lofting of advanced fin cross-sectional foils, in this instance based... more
A computer aided design (CAD) tool has been specifically developed for rapid and easy design of solid models for surfboard and sailboard fins. This tool simplifies the lofting of advanced fin cross-sectional foils, in this instance based upon the family of standard airfoil series set by the National Advisory Committee for Aeronautics (NACA), whilst retaining a basic parametric description at each cross-section.
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mechanisms for requirements and software verification are by... more
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mechanisms for requirements and software verification are by now a well-accepted part of the design process, and model driven architectures support the automation of the refinement process. We claim that we can further push the envelope towards the automatic exploration and selection among design alternatives and show that this is concretely possible for Secure Tropos, a requirements engineering methodology that addresses security and trust concerns. In Secure Tropos, a design consists of a network of actors (agents, positions or roles) with delegation/permission dependencies among them. Accordingly, the generation of design alternatives can be accomplished by a planner which is given as input a set of actors and goals and generates alternative multiagent plans to fulfill all given goals. We validate our claim with a case study using a state-of-the-art planner.
Command Control, Communication Computer and Intelligence (C4I) systems enables modern military forces to achieve information superiority in the battlefield. C4I are complex System of systems (SOS) where individual systems interact locally... more
Command Control, Communication Computer and Intelligence (C4I) systems enables modern military forces to achieve information superiority in the battlefield. C4I are complex System of systems (SOS) where individual systems interact locally to achieve global SOS behaviors. To build software for C4I systems conventional software engineering SwE process and practices have shortcomings and are not capable to support certain aspect of these systems. If C4I systems fail to operate as required due to the fact that SwE process was unable to fulfill its requirements, the consequences may not be tolerated because of the criticality of the mission of these systems in information warfare (IW). This paper highlights the distinguished characteristics and operational requirements of C4I systems which poses challenges to SwE process and practices. This paper also discuss the possible future research areas in order to enhance SwE process so that better software could drive these complex systems as required.
The dynamic software development organizations optimize the usage of resources to deliver the products in the specified time with the fulfilled requirements. This requires prevention or repairing of the faults as quick as possible. In... more
The dynamic software development organizations optimize the usage of resources to deliver the products in the specified time with the fulfilled requirements. This requires prevention or repairing of the faults as quick as possible. In this paper an approach for predicting the run-time errors in java is introduced. The paper is concerned with faults due to inheritance and violation of java constraints. The proposed fault prediction model is designed to separate the faulty classes in the field of software testing. Separated faulty classes are classified according to the fault occurring in the specific class. The results are papered by clustering the faults in the class. This model can be used for predicting software reliability.
Among the various contemporary schools of moral thinking, consequencebased ethics, as opposed to rule-based, seems to have a good acceptance among professionals such as software engineers. But naïve consequentialism is intellectually too... more
Among the various contemporary schools of moral thinking, consequencebased ethics, as opposed to rule-based, seems to have a good acceptance among professionals such as software engineers. But naïve consequentialism is intellectually too weak to serve as a practical guide in the profession. Besides, the complexity of software systems makes it very hard to know in advance the consequences that will derive from professional activities in the production of software. Therefore, following the spirit of well-known codes of ethics such as the ACM/IEEE's, we advocate for a more solid position in the ethical education of software engineers, which we call 'moderate deontologism', that takes into account both rules and consequences to assess the goodness of actions, and at the same time pays an adequate consideration to the absolute values of human dignity. In order to educate responsible professionals, however, this position should be complemented with a pedagogical approach to virtue ethics.
This article explores how agile practices can reduce three kinds of "distance" -temporal, geographical, and sociocultural -in global software development (GSD). On the basis of two indepth case studies, specific Scrum and eXtreme... more
This article explores how agile practices can reduce three kinds of "distance" -temporal, geographical, and sociocultural -in global software development (GSD). On the basis of two indepth case studies, specific Scrum and eXtreme Programming (XP) practices are found to be useful for reducing communication, coordination, and control problems that have been associated with GSD.
Automated software engineering has long been a goal of arti cial intelligence. There has been slow but steady progress towards understanding the processes underlying program synthesis and modi cation. One signi cant observation that came... more
Automated software engineering has long been a goal of arti cial intelligence. There has been slow but steady progress towards understanding the processes underlying program synthesis and modi cation. One signi cant observation that came out of Richards and Waters 15] Software Apprentice Project was that programmers repeatedly use certain program constructs or cliches to solve a variety of programming tasks. Richards developed Plan Description Language (PDL) to capture the association between various code fragments and the functional goals that they serve. Another development has been the understanding of the relationship between physical devices and programs. This understanding asserts that causal theories (such as Functional Representation 17]) developed for reasoning with physical systems can be applied to reason with programs. This observation led to the development of debugging and program understanding tools 2]. Here, we outline a framework for functional representation of programs which also allows us to automatically learn new programming constructs and to re ne existing programs so as to achieve a more functionally complete program.
This thesis aims at developing software-intensive systems architecture for the Healthcare Industry to meet information assurance, legislative security and privacy standards by proposing an architecture and framework - “SARCHIA” using data... more
This thesis aims at developing software-intensive systems
architecture for the Healthcare Industry to meet information
assurance, legislative security and privacy standards by proposing
an architecture and framework - “SARCHIA” using data mining
and statistical techniques. “SARCHIA” can help the software
industry guard against unauthorized access to Health Information.
SARCHIA will help companies to track compliance in the
healthcare industry by leveraging SARCHIA framework and
architecture. The framework will be evaluated through a case
study from the healthcare industry. SARCHIA will do the
auditing, impact analysis of Key Compliance Attributes (KCA) on
Key Quality Attributes (KQA), and will regulate financial and
health information, and identify related risks.
In the daily life of the software we think of mobile phone computer and so on devices that we use in different ways on our devices. For companies, the management of business processes such as the supply chain of human resources is the... more
In the daily life of the software we think of mobile phone computer and so on devices that we use in different ways on our devices. For companies, the management of business processes such as the supply chain of human resources is the system of measurement of efficiency and profitability rates. The production of software, which is not in need of personal need, but increasing in importance in the institutional sense, has changed the dimension with the fourth industrial revolution. As a manifestation of this, the waterfall model and the latest methodology have been included in the software development processes of the first period and there are a variety of sub-disciplines and agile methods. In this study, both methods will be examined and a comparison will be made.
Project methodologies have grown with time when there is a need for a project if satisfying that model will have lasted. There are multiple SDLC Models available but no one fits perfectly, as all of them have some drawbacks. Considering a... more
Project methodologies have grown with time when there is a need for a project if satisfying that model will have lasted. There are multiple SDLC Models available but no one fits perfectly, as all of them have some drawbacks. Considering a larger organization, where daily productivity, hours of work done, no of resources used, and progress made in the project are monitored on a day to day basis. Picking up the correct SDLC model for the project is very crucial because when the work gets started, there is no way to alter it back. The Agile methodology does it all, it provides matrices, reports, progress, and the backlogs. Everything is being monitored very closely, throughout the development and testing of the product. This paper addresses the problem which is encountered during the testing of an application when a failed test case or defect is added to product backlog since no more fixes can be made to it.
This paper presents a Business Process Maturity Model (BPMM) for measuring and improving business process competence. The BPMM comprises maturity levels that are associated with the scope of influence of process areas, the capability of... more
This paper presents a Business Process Maturity Model (BPMM) for measuring and improving business process competence. The BPMM comprises maturity levels that are associated with the scope of influence of process areas, the capability of monitoring and controlling processes and the influence on process improvement It is based on the principle that any business process essentially consists of activities belonging to four categories; Input, Mechanism, Control, and Output. While constructing our BPMM, we aligned it with the terms, maturity levels, and some elements of Key Process Areas (KPAs) of CMM/CMMI, IS12207, and IS15288. We incorporated the results of the existing researches on Process Maturity Model (PMM) and Process Management Maturity Model (PMMM) and conducted a survey on a group of companies that are actively pursuing Business Process Management (BPM).
A set of fundamental principles can act as an enabler in the establishment of a discipline; however, software engineering still lacks a universally recognized set of fundamental principles. This article presents a progress report on an... more
A set of fundamental principles can act as an enabler in the establishment of a discipline; however, software engineering still lacks a universally recognized set of fundamental principles. This article presents a progress report on an attempt to identify and develop a consensus on a set of candidate fundamental principles.
Start Here--->http://bit.ly/2wblnF3<---Get complete detail on CSQE exam guide to crack ASQ Certified Software Quality Engineer. You can collect all information on CSQE tutorial, practice test, books, study material, exam questions, and... more
Start Here--->http://bit.ly/2wblnF3<---Get complete detail on CSQE exam guide to crack ASQ Certified Software Quality Engineer. You can collect all information on CSQE tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on ASQ Certified Software Quality Engineer and get ready to crack CSQE certification. Explore all information on CSQE exam with the number of questions, passing percentage, and time duration to complete the test.
This dissertation describes the concepts, application and features of documents with the main goal to show the importance of the system documentation. Beyond, it approaches the issues problems related to developing documents as well as... more
This dissertation describes the concepts, application and features of documents with the main goal to show the importance of the system documentation.
Beyond, it approaches the issues problems related to developing documents as well as the established pragmaticism concerning the need of documentation. The dissertation argues about the concept and relevant aspects of documentation passing through common issues, important aspects related to content, its connection to concepts and methodologies, respectively the Software Engineering and the Rational Unified Process and then finishes proposing a model with document types and a case study showing appropriate conclusions with regards to the dissertation’s goal.
Context: Development of software-intensive products and services increasingly occurs by continuously deploying product or service increments, such as new features and enhancements, to customers. Product and service developers must... more
Context: Development of software-intensive products and services increasingly occurs by continuously deploying product or service increments, such as new features and enhancements, to customers. Product and service developers must continuously find out what customers want by direct customer feedback and usage behaviour observation. Objective: This paper examines the preconditions for setting up an experimentation system for continuous customer experiments. It describes the RIGHT model for Continuous Experimentation (Rapid Iterative value creation Gained through High-frequency Testing), illustrating the building blocks required for such a system. Method: An initial model for continuous experimentation is analytically derived from prior work. The model is matched against empirical case study findings from two startup companies and further developed. Results: Building blocks for a continuous experimentation system and infrastructure are presented. Conclusions: A suitable experimentation system requires at least the ability to release minimum viable products or features with suitable
An efficient and new but non-intrusive method to detect the fluctuation in gear load may be the motor current signature analysis (MCSA). In this paper, a multi-stage transmission gearbox (with and without defects) has been studied in... more
An efficient and new but non-intrusive method to detect the fluctuation in gear load may be the motor current signature analysis (MCSA). In this paper, a multi-stage transmission gearbox (with and without defects) has been studied in order to replace the conventional vibration monitoring by MCSA. It has been observed through FFT analysis that low frequencies of the vibration signatures have sidebands across line frequency of the motor current whereas high frequencies of vibration signature are difficult to be detected. Hence, discrete wavelet transform (DWT) is suggested to decompose the current signal, and FFT analysis is carried out with the decomposed current signal to trace the sidebands of the high frequencies of vibration
An engineering design is a model of the product or structure to be engineered. The model is used to • Evaluate suitability of proposed product/system • Communicate proposed product to others An engineering design process describes a set... more
An engineering design is a model of the product or structure to be engineered. The model is used to • Evaluate suitability of proposed product/system • Communicate proposed product to others An engineering design process describes a set of steps for constructing an engineering design.
There are a lot of payroll engines that do exist in the market serving different organizations under different circumstances. But the problem with those payroll engines that comes to our observation is that most of them are static or... more
There are a lot of payroll engines that do exist in the market serving different organizations under different circumstances. But the problem with those payroll engines that comes to our observation is that most of them are static or required changes in their programming when an organizational structure changes. And for these changes there required a professional programmer to make these changes according to the demands of company.
The Laundry management System (LMS) is specifically developed for Katsina State Laundry Shops. This application is developed to manage the laundry service and provide an automated backup and recovery for security management of... more
The Laundry management System (LMS) is specifically developed for Katsina State Laundry
Shops. This application is developed to manage the laundry service and provide an automated
backup and recovery for security management of information in the laundry. It is a client-server
system which can only be access within three (3) main users; there are database administrator,
manager, and staff. Only authorized user can login into the system and view the LMS application.
The database administrator will maintain the backup and recovery and user privilege to view the system. Besides that, clerk's responsibility is to manage the customers and laundry service record, also the payment record. Furthermore, the laundress is to view customers' record and their services.
Then, the manager of this laundry can view and update all the record in laundry. On the other hand, this LMS application is focused more on database management of laundry service besides maintaining the backup and recovery for the records in the database. The methodology of this system is System Development Life Cycle (SDLC) which is prototyping model. An analysis study has been done based on the current manual system and all the problems statements and requirements have been identified. Moreover, LMS is two-tier architecture system which involves client tier and application server tier which includes a database. The interfaces for LMS have been designed according to the requirement and needs of the current market. This Laundry Management System (LMS) will help to improve the performance of current situation and overcome the problems that arise nowadays.
A new approach for the segmentation of gland units in histological images is proposed with the aim of contributing to the improvement of the prostate cancer diagnosis. Clustering methods on several colour spaces are applied to each sample... more
A new approach for the segmentation of gland units in histological images is proposed with the aim of contributing to the improvement of the prostate cancer diagnosis. Clustering methods on several colour spaces are applied to each sample in order to generate a binary mask of the different tissue components. From the mask of lumen candidates, the Locally Constrained Watershed Transform (LCWT) is applied as a novel gland segmentation technique never before used in this type of images. 500 random gland candidates, both benign and pathological, are selected to evaluate the LCWT technique providing results of Dice coefficient of 0.85. Several shape and textural descriptors in combination with contextual features and a fractal analysis are applied, in a novel way, on different colour spaces achieving a total of 297 features to discern between artefacts and true glands. The most relevant features are then selected by an exhaustive statistical analysis in terms of independence between variables and dependence with the class. 3.200 artefacts, 3.195 benign glands and 3.000 pathological glands are obtained, from a data set of 1468 images at 10x magnification. A careful strategy of data partition is implemented to robustly address the classification problem between artefacts and glands. Both linear and non-linear approaches are considered using machine learning techniques based on Support Vector Machines (SVM) and feedforward neural networks achieving values of sensitivity, specificity and accuracy of 0.92, 0.97 and 0.95, respectively.
This paper presents a methodology for a unified cosimulation and co-synthesis of hardware-software systems. This approach addresses the modeling of communication between the hardware and software modules at different abstraction levels... more
This paper presents a methodology for a unified cosimulation and co-synthesis of hardware-software systems. This approach addresses the modeling of communication between the hardware and software modules at different abstraction levels and for different design tools. The main contribution is the use of a multi-view library concept in order to hide specific hardware/software implementation details and communication schemes. A system is viewed as a set of communicating hardware(VHDL) and software(C) subsystems. The same C, VHDL descriptions can be used for both co-simulation and hardware-software co-synthesis. This approach is ilustrated by an example.
Modern hardware architectures featuring multicores and a complex memory hierarchy raise challenges that need to be addressed by parallel applications programmers. It is therefore tempting to adapt an application communication pattern to... more
Modern hardware architectures featuring multicores and a complex memory hierarchy raise challenges that need to be addressed by parallel applications programmers. It is therefore tempting to adapt an application communication pattern to the characteristics of the underlying hardware. The MPI standard features several functions that allow the ranks of MPI processes to be reordered according to a graph attached to a newly created communicator. In this paper, we explain how the MPICH2 implementation of the MPI Dist graph create function was modified to reorder the MPI process ranks to create a match between the application communication pattern and the hardware topology. The experimental results on a multicore cluster show that improvements can be achieved as long as the application communication pattern is expressed by a relevant metric.
Responsiveness, the ability to provide real time behavior eveninpresence of faults, is becoming one of the most sought after properties in distributed computing systems. We present a framework for ''High-Performance Responsive... more
Responsiveness, the ability to provide real time behavior eveninpresence of faults, is becoming one of the most sought after properties in distributed computing systems. We present a framework for ''High-Performance Responsive Computing''i nn etworked systems whose current implementation works on a network of fiveN eXTSTEP (Mach 2.5)-based HP workstations. Within this paper we discuss the design issues behind the ''Unstoppable Orchestra''a nd showh ow our programming framework supports synchronization and re-configuration of responsive applications.
This paper discusses the problem of understanding and measuring quality in complex systems which include hardware and software. Using general systems concepts, a schematic model of quality is proposed and its use illustrated. The paper... more
This paper discusses the problem of understanding and measuring quality in complex systems which include hardware and software. Using general systems concepts, a schematic model of quality is proposed and its use illustrated. The paper concludes by discussion of the problems involved with the use of the schematic model in developing the specific quality models required in the software and systems industry.
The most critical and important aspect of disaster recovery is to protect the data from application fail over, natural disasters and infrastructure failures. Taking frequent backups of the huge volumes of data and storing it is also an... more
The most critical and important aspect of disaster recovery is to protect the data from application fail over, natural disasters and infrastructure failures. Taking frequent backups of the huge volumes of data and storing it is also an integral part of the disaster recovery plan. Various scenarios of database replication strategies and techniques are provided in this survey paper addressing the need for replication of data. A wide range of open source and commercial tools have evolved over a period of time to deal with the issues and challenges involved during the process of database replication. This paper describes the general characteristics of replication & disaster recovery. Later the features of open source and commercial replication tools are compared.
Nowadays, the Unified Modeling Language (UML) is becoming a "de facto" standard for object oriented environments and then it is perceived as a part of the culture of software engineers. However, the luck of rigorous semantic basis is a... more
Nowadays, the Unified Modeling Language (UML) is becoming a "de facto" standard for object oriented environments and then it is perceived as a part of the culture of software engineers. However, the luck of rigorous semantic basis is a great shortcoming of UML which upsets its use to address safety problems. Still, taking benefit of the richness of UML to model critical systems is worthwhile because it is aimed at reducing the certification effort required for the design phase. Currently, we undertake works to delimit a well-defined UML core which could be used to model such systems. In this paper, we explore some critical aspects and recommandations of basic UML constructs which should be approached when dealing with safety.