User Requirements Research Papers - Academia.edu (original) (raw)

a DIIAR c/o Polo of Como, Politecnico of Milan, Piazza Leonardo Da Vinci 32, 20133 Milano, Italy ludovico.biagi@polimi.it b DIMeC, University of Modena and Reggio Emilia, via Vignolese 905/B, 41100 Modena, Italy (marco.dubbini,... more

a DIIAR c/o Polo of Como, Politecnico of Milan, Piazza Leonardo Da Vinci 32, 20133 Milano, Italy ludovico.biagi@polimi.it b DIMeC, University of Modena and Reggio Emilia, via Vignolese 905/B, 41100 Modena, Italy (marco.dubbini, capra.alessandro, cristina.castagnetti)@unimore.it c Department of Mathematics, University of Modena and Reggio Emilia, Via Campi 213/B, 41100 Modena, Italy francesco.unguendoli@unimore.it

Korea Astronomy and Space Science Institute (KASI) launched the development project of two satellite laser ranging (SLR) systems in early 2008 after the government fund approval of the SLR systems in 2007. One mobile SLR system and one... more

Korea Astronomy and Space Science Institute (KASI) launched the development project of two satellite laser ranging (SLR) systems in early 2008 after the government fund approval of the SLR systems in 2007. One mobile SLR system and one permanent SLR station will be developed with the completion of the project. The main objectives of these systems will be focused on the Space Geodetic researches. A system requirement review was held in the second half of the same year. Through the following system design review meeting and other design reviews, many unsolved technical and engineering issues would be discussed and resolved. However, the design of the mobile SLR system is a corner stone of whole project. The noticeable characteristics of Korea's first SLR system are 1) use of light weight main mirror, 2) design of compact optical assembly, 3) use of KHz laser pulse, 4) use of commercial laser generator, 5) remote operation capability, 6) automatic tracking, 7) state of art operation system, etc. In this paper, the major user requirement and pre-defined specification are presented and discussed.

The data warehouse design task needs to consider both the end-user requirements and the organization data sources. For this reason, the data warehouse design has been traditionally considered a reengineering process, guided by... more

The data warehouse design task needs to consider both the end-user requirements and the organization data sources. For this reason, the data warehouse design has been traditionally considered a reengineering process, guided by requirements, from the data sources.Most current design methods available demand highly-expressive end-user requirements as input, in order to carry out the exploration and analysis of the data

The commercialization of biomass-derived pyrolysis liquids for use in heat and power applications is dependent on the ability to successfully provide a fuel of acceptable quality to an end user at a competitive price. One of the... more

The commercialization of biomass-derived pyrolysis liquids for use in heat and power applications is dependent on the ability to successfully provide a fuel of acceptable quality to an end user at a competitive price. One of the intentions of the European Union (EU) Altener 4.1030/ C/00-015/2000 project was to derive standards for biomass-derived pyrolysis liquids, based on a consensus between providers of the equipment (boilers, engines, and turbines) and the producers of the liquids. Five basic properties (homogeneity, water content, solids content, stability, flash point) for the liquids are used as the primary criteria for pyrolysis liquid evaluation. Specific values are proposed to ensure that pyrolysis liquids meet a minimum grade that is acceptable for use as a fuel oil in boilers and engines. Data on emissions from boilers, engines and turbines are presented. Preliminary long-duration test data from boiler use are available to allow moredetailed specifications on secondary properties to be made. The purpose of this work is to ensure that a realistic set of specifications is determined, to allow the introduction of pyrolysis liquids into existing fuel infrastructures and markets.

Evidence-based medicine is critically dependent on three sources of information: a medical knowledge base, the patient's medical record and knowledge of available resources, including, where appropriate, clinical protocols. Patient data... more

Evidence-based medicine is critically dependent on three sources of information: a medical knowledge base, the patient's medical record and knowledge of available resources, including, where appropriate, clinical protocols. Patient data is often scattered in a variety of databases and may, in a distributed model, be held across several disparate repositories. Consequently addressing the needs of an evidence-based medicine community presents issues of biomedical data integration, clinical interpretation and knowledge management. This paper outlines how the Health-e-Child project has approached the challenge of requirements specification for (bio-) medical data integration, from the level of cellular data, through disease to that of patient and population. The approach is illuminated through the requirements elicitation and analysis of Juvenile Idiopathic Arthritis (JIA), one of three diseases being studied in the EC-funded Health-e-Child project.

We introduce the study of homeplace communication as being relevant to the design of new communication technology for the home market. After reviewing current approaches to the field, we go on to describe the nature of remote homeplace... more

We introduce the study of homeplace communication as being relevant to the design of new communication technology for the home market. After reviewing current approaches to the field, we go on to describe the nature of remote homeplace communication over the telephone, based on a quantitative and qualitative analysis of 315 household telephone calls. The findings are contrasted with aspects of workplace communication and used to identify 7 user requirements for support. We conclude with recommendations for future basic and applied research in the area.

Electronic voting has been attracting the attention of governments and research groups with most work on the subject referring to the user requirements such a system should satisfy. For several cases, though, requirement identification... more

Electronic voting has been attracting the attention of governments and research groups with most work on the subject referring to the user requirements such a system should satisfy. For several cases, though, requirement identification seldom goes further than a simple narrative description of a basic set of nonfunctional characteristics related to security. On the other hand, governmental reports usually refer to requirements as the set of applicable laws pertaining a certain voting procedure. Both sides seem to underestimate the fact that an electronic voting system is an information system with functional, as well as non-functional, requirements. In this paper we apply the Rational Software Development Process for identifying and presenting the requirements an electronic voting system should meet. The requirements are based on a generic voting model that has been developed having in mind the European Union member states legislation, the organisational details of currently applicable voting procedures and the opportunities offered and the constraints imposed by the state-of-the-art technology.

Eleven PC-owning families were interviewed at home about their use of conventional and digital photos. They also completed photo diaries and recorded photo-sharing conversations that occurred spontaneously over a three month period after... more

Eleven PC-owning families were interviewed at home about their use of conventional and digital photos. They also completed photo diaries and recorded photo-sharing conversations that occurred spontaneously over a three month period after the in-home interviews. From an analysis of the resulting materials we illustrate the strengths and weaknesses of past and present technology for photo sharing. These allow us to prioritise user requirements for a range of future photo-sharing technologies or 'photoware'.

As online computer assisted assessment (CAA) is adopted throughout education, the number of CAA systems proliferates. While a number of commercial systems are gaining in sophistication, no single package is universally appropriate. For... more

As online computer assisted assessment (CAA) is adopted throughout education, the number of CAA systems proliferates. While a number of commercial systems are gaining in sophistication, no single package is universally appropriate. For those implementing online assessment, selecting appropriate systems or indeed building them, it may be helpful to consider the ''ultimate'' online CAA system. This combination of web server software, middleware and database package does everything required of it for all possible users of the system. In this paper we take a step back from developments and re-evaluate the requirements of CAA systems for users with 21 possible roles. These user requirements are then mapped onto two leading online assessment systems to analyse how close we are to achieving the ''ultimate'' CAA system. #

Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more

Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user requirements as an effective communication and information delivering service. Since SMS/MMS become so popular on daily communication, there is a demand to communicate or exchange confidential information in a secure environment. Public Key Infrastructure (PKI) is a proven solution, which using pairing of key, for secure communication encryption. In this paper, M-PKI is introduced to provide PKI encryption to the mobile SMS and MMS.

SDIs from global to local levels rely on standardization and interoperable GI services. In the GI field, factual standards are those from the Open Geospatial Consortium (OGC). Therefore, the use and further development of OGC standards... more

SDIs from global to local levels rely on standardization and interoperable GI services. In the GI field, factual standards are those from the Open Geospatial Consortium (OGC). Therefore, the use and further development of OGC standards are crucial for the success of SDIs. Despite a lack of qualified personnel in OGC issues, OGC topics are rarely included in current GI

This paper describes Disease Ontology based Grid Middleware which acts like an intelligent search engine, receiving requests from customers and finding services or service providers for them. We note that currently no such work has been... more

This paper describes Disease Ontology based Grid Middleware which acts like an intelligent search engine, receiving requests from customers and finding services or service providers for them. We note that currently no such work has been done or successfully implemented. We propose the use of Grid Middleware for information exchange as it is able to access unstructured petabyte information on the web and pull the right information for the user. Before it can do this, it obtained the knowledge from ontologies such as medical issues, health matters, disease factors, DNA etc and knows who is doing a particular research, what work has been done and which research group have the most up-to-date results, which database in the web is needed, what is in it, what is the value of the information in that database, where it fits into the specific disease knowledge and how to access it, whose work relates to each others, overlapping with or complements each others etc. It helps search, translate, categorize, index (through ontology and agents), download and upload the exact disease information that the end-user requires.

Traditionally, a project should deliver agreed upon functionality on time and within budget. This study examines the mindset of software development project managers in regard to how they 'define' a successful project in order to arrive... more

Traditionally, a project should deliver agreed upon functionality on time and within budget. This study examines the mindset of software development project managers in regard to how they 'define' a successful project in order to arrive at a richer perspective of 'success' from the perspective of project managers. Senior management and members of the development team can gain a better understanding of the perspective of project managers regarding some of the aspects of their work and the project as a whole. Such understanding can facilitate better communication and cooperation among these groups. We investigated components of the developed system (project) in terms of some of the aspects of the delivered system (outcome/project) in order to place traditional measures of success in context with other organizational/managerial measures that have been suggested in the literature. We also investigated specific work-related items. These items have potential implications for the intrinsic motivation of the project manager. The consensus among the project managers who participated in our study indicated that delivering a system that meets customer/user requirements and works as intended through work that provides a sense quality and personal achievement are important aspects that lead to a project being considered a success.

With the enabling Information Technology, disseminating every kind of information through the Internet became an enforcing condition for information providers. Now, it is more than being fashion and fun. Serving information on the... more

With the enabling Information Technology, disseminating every kind of information through the Internet became an enforcing condition for information providers. Now, it is more than being fashion and fun. Serving information on the Internet is a demand from the consumer as a commercial necessity. Internet allows all levels of society to access spatial data and even interactive mapping facilities that are available through the Web. Furthermore, Internet reshapes conventional characteristics of accessing, sharing, dissemination, visualization and analyzing conventions of spatial information handling. With today’s information technology support, user requirements determine remote geo-data processing as a need. In this paper a description is given of an application aiming at providing spatial data processing functions on the Internet is implemented using topographic data. In this framework, an architecture with the capability of services such as mapping, analyzing spatial data and dynami...

Software Design and Media Design - tools to designMobile and Sensory Interfaces and Interactive EnvironmentsGeert de HaanCommunication, Media and Information TechnologySection Media Technology / Human Centered ICTRotterdam University of... more

Software Design and Media Design - tools to designMobile and Sensory Interfaces and Interactive EnvironmentsGeert de HaanCommunication, Media and Information TechnologySection Media Technology / Human Centered ICTRotterdam University of Applied SciencesP.O.Box 25035, 3001 HA, RotterdamThe Netherlandsg.de.haan@hr.nlABSTRACTThis paper discusses ETAG, a formal model for design representation, and ETAG-based design, a method for user interface design, and the two principal facilities they provide to accommodate different types of users in the design of user interfaces. The paper starts with an introduction of ETAG as a design representation. This is followed by a description of ETAG-based design and using the notation to represent relevant aspects of the work context. Next, we discuss the differences between computer software design and media product design, concluding that media design is a much more flexible, iterative process and prototyping-based process in which adaptation of the design of mobile applications extends into the maintenance phase. To cover further developments towards focussing on user needs and wishes by means of co-design practices, and to cover for ubiquitous computing and interaction with sensors and interactive environments, we propose to use sensory labs and to create living labs to move the usability lab into the real world

Requirements traceability is the ability to follow the life of a requirement i.e. from its origin, to its refinement and inclusion in the requirement specification document, and from there to its subsequent deployment in coding, testing... more

Requirements traceability is the ability to follow the life of a requirement i.e. from its origin, to its refinement and inclusion in the requirement specification document, and from there to its subsequent deployment in coding, testing and validation. Pre-Requirement Traceability is concerned with requirement's life before its inclusion in the requirement specification, while Post-Requirement Traceability is concerned with the requirement's life after its inclusion in the requirement specification.

As the number of Web users and the diversity of Web applications continues to explode, Web Quality of Service (QoS) is an increasingly critical issue in the domain of e-commerce. This paper presents experiments designed to estimate users'... more

As the number of Web users and the diversity of Web applications continues to explode, Web Quality of Service (QoS) is an increasingly critical issue in the domain of e-commerce. This paper presents experiments designed to estimate users' tolerance of QoS in the context of e-commerce. In addition to objective measures, we discuss contextual factors that influence these thresholds and show how users' conceptual models of Web tasks affect their expectations. We then show how user thresholds of tolerance can be taken into account when designing Web servers. This integration of user requirements for QoS into systems design is ultimately of benefit to all stakeholders in the design of Internet services.

Provision of personalized recommendations to users requires accurate modeling of their interests and needs. This work proposes a general framework and specific methodologies for enhancing the accuracy of user modeling in recommender... more

Provision of personalized recommendations to users requires accurate modeling of their interests and needs. This work proposes a general framework and specific methodologies for enhancing the accuracy of user modeling in recommender systems by importing and integrating data collected by other recommender systems. Such a process is defined as user models mediation. The work discusses the details of such a generic user modeling mediation framework. It provides a generic user modeling data representation model, demonstrates its compatibility with existing recommendation techniques, and discusses the general steps of the mediation. Specifically, four major types of mediation are presented: cross-user, cross-item, cross-context, and cross-representation. Finally, the work reports the application of the mediation framework and illustrates it with practical mediation scenarios. Evaluations of these scenarios demonstrate the potential benefits of user modeling data mediation, as in certain conditions it allows improving the quality of the recommendations provided to the users.

In this paper, the history of surface weather observations in the United States is reviewed. Local weather observations were first documented in the 17th Century along the East Coast. For many years, the progression of a weather... more

In this paper, the history of surface weather observations in the United States is reviewed. Local weather observations were first documented in the 17th Century along the East Coast. For many years, the progression of a weather observation from an initial reading to dissemination remained a slow and laborious process. The number of observers remained small and unorganized until agencies including the Surgeon General, Army, and General Land Office began to request regular observations at satellite locations in the 1800s. The Smithsonian was responsible for first organizing a large "network" of volunteer weather observers across the nation. These observers became the foundation for today's Cooperative Observer network. As applications of weather data continued to grow and users required the data with an ever-decreasing latency, automated weather networks saw rapid growth in the later part of the 20th century. Today, the number of weather observations across the U.S. totals in the tens of thousands due largely to privately-owned weather networks and amateur weather observers who submit observations over the internet.

After providing a brief background to the project, the paper describes how two public library users applied library design guidelines and interior design principles to propose the redesign of a public branch library in South Africa. The... more

After providing a brief background to the project, the paper describes how two public library users applied library design guidelines and interior design principles to propose the redesign of a public branch library in South Africa. The following user requirements are discussed and illustrated with photos and three-dimensional drawings: a library interior that promotes and facilitates access, that is functional and modern, aesthetically pleasing, and that creates experiences that users can enjoy. The premise of the paper is that interior design needs and requirements of public library users in many parts of the world do not differ much and that other libraries can therefore apply or adapt the theory, ideas and examples given in this paper to suit their own circumstances.

Applying business process re-engineering to asset management Vanier, D. J.; Lacasse, M. A.; Kyle, B. R.

The OpenPhone project aims to design an Interactive Voice Response (IVR) health information system that enables people who are caregivers for HIV/AIDS infected children to access relevant information by using a telephone in their native... more

The OpenPhone project aims to design an Interactive Voice Response (IVR) health information system that enables people who are caregivers for HIV/AIDS infected children to access relevant information by using a telephone in their native language of Setswana in Botswana. The system lowers accessibility barriers since it is accessible to illiterate users and the community of the blind. The design utilizes usability engineering methodology in order to ascertain that the end product is usable, efficient, effective and satisfactory to the targeted users who are predominantly females, ranging from semi-literate to illiterate adults but nevertheless numerically literate. The paper describes the methodologies that were used to obtain information from the target user population. Based on the information gathered, we are now able to begin the initial design of the OpenPhone system.

Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more

Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user requirements as an effective communication and information delivering service. Since SMS/MMS become so popular on daily communication, there is a demand to communicate or exchange confidential information in a secure environment. Public Key Infrastructure (PKI) is a proven solution, which using pairing of key, for secure communication encryption. In this paper, m–PKI is introduced to provide PKI encryption to the mobile SMS and MMS. This new approach allows the end-user to send private and classified message via SMS. The key pair generation and distribution are performed by the Certificate Authority (CA). The size of the key pair are studied and decided by the tradeoff between performance and security.

Business process modelling is an essential part of developing an enterprise information system. There are many modelling methods with software support currently available on the market. Each individual method has its own advantages and... more

Business process modelling is an essential part of developing an enterprise information system. There are many modelling methods with software support currently available on the market. Each individual method has its own advantages and disadvantages but always has the limitation of only representing a certain view of enterprise. To describe a system clearly from different perspectives and to provide a complete understanding of the business process both to the developer and to the end-user, it is necessary to adopt more than one kind of modelling technique to establish a set of graphical models describing a system from different views.

... into the world with their possibilities well-defined, rather they come into existing systems, and ... take off of a new technology; they acted as a 'breeding space' which helped ... or less... more

... into the world with their possibilities well-defined, rather they come into existing systems, and ... take off of a new technology; they acted as a 'breeding space' which helped ... or less homogeneous, although within them, situations of competition often existed between protagonists of ...

Knowledge management (KM) and successful implementation of knowledge management systems (KMS) are of key interest to many organizations, both large organizations and small-medium size enterprises (SMEs). However, how companies address the... more

Knowledge management (KM) and successful implementation of knowledge management systems (KMS) are of key interest to many organizations, both large organizations and small-medium size enterprises (SMEs). However, how companies address the issue of KM often varies and is also a function of size of the organization. For instance, large corporations' attitude might differ from that of SMEs. Hence, there is need to study these differences. In first part of this paper, we discuss major differences between the approaches to KM by large organizations and SMEs. SMEs, like their large counterparts, carry out diverse business functions (and activities), and each of these business functions plays an important role in the success of the company and attainment of its goals. Further, other factors such as the ownership, business strategies, organizational structure and culture, decision making process, and IT infrastructure, also influence the SMEs performance. Hence in order for an initiative like KM to be successfully implemented, all these influential elements must be taken into consideration and be thoroughly investigated as to how they facilitate the KM implementation process and how to ensure the success of the initiative. Thus, taking a holistic view, we investigate KM efforts in SMEs focusing on the impact of each function in an SME on KM implementation. Based on our study, we also provide recommendations to SMEs for successful implementation of KMS.

Today although a contemporary house or apartment is built with new materials according to technology and regulations to provide a satisfactory microclimate within the building, it is difficult to say they are successful comparing with a... more

Today although a contemporary house or apartment is built with new materials according to technology and regulations to provide a satisfactory microclimate within the building, it is difficult to say they are successful comparing with a house that is constructed with traditional methods and materials even built by a non-architect. In this paper microclimatic elements of traditional Diyarbakýr houses are

This paper presents basic concepts, framework and roadmaps to develop interoperability of enterprise applications and software. The paper is a summary of the main work carried out in Europe to elaborate interoperability development... more

This paper presents basic concepts, framework and roadmaps to develop interoperability of enterprise applications and software. The paper is a summary of the main work carried out in Europe to elaborate interoperability development roadmaps and to prepare forthcoming R&D projects under the Six Framework Programme (FP6). The originality of the approach is to tackle interoperability problem from multiple but integrated views. The state-of-the-art, user requirements and visions relating to develop interoperability are presented. Recommendations for future works are discussed and conclusions given at the end.

This paper describes key concepts of composable FORCEnet, which is the US Navy's operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several... more

This paper describes key concepts of composable FORCEnet, which is the US Navy's operational construct architectural framework for naval warfare in the information age. It describes the concepts and architecture, in several categories: 1) systems and general software engineering; 2) networks ; 3) intelligent software; and 4) network security. The engineering approach to implement FORCEnet is an example of rapid prototyping in which the requirements of the users reviewed periodically and frequently with considerable user input. This method, which captures and implement changes in user requirements, strongly supports the development of relevant and useful systems with up-to-date technology that will be responsive to the users' rapidly changing needs.

This paper reports on a case study of using rapid prototyping to develop a serious game about crime prevention. Five small-scale formative evaluations (with a total of 17 participants) were used to guide the collect user requirements and... more

This paper reports on a case study of using rapid prototyping to develop a serious game about crime prevention. Five small-scale formative evaluations (with a total of 17 participants) were used to guide the collect user requirements and formative feedback. Early formative results are positive and provided early signals on what needs to be changed in the game design and

-Worldwide, the investment in building maintenance is huge as it represents almost 50% of the total turnover of construction activities. Building maintenance is also categorised as the commonest function listed in facilities management... more

-Worldwide, the investment in building maintenance is huge as it represents almost 50% of the total turnover of construction activities. Building maintenance is also categorised as the commonest function listed in facilities management activities. This pilot study explores the current practice of building maintenance management in higher education institutions in Malaysia. Information gathered from semi-structured interviews focuses on different areas of building maintenance practices. The main issue is to identify the user-requirements. The areas of study are to cover the objectives of maintenance departments, maintenance reporting processes, maintenance verification processes and other associated tasks. In addition, this study also looks into the contributions of Information Technology (IT) facilities to maintenance practices. Based on the findings, there will be differences in the maintenance practices among the four universities; empirically, of the 57 elements studied only 30% ...

Requirements capture is arguably the most important step of software engineering and yet the most difficult and the least

The advent of global distribution of software development has made managing collaboration and coordination among developers more difficult due to various reasons including physical distance, differences in time, cultural differences etc.... more

The advent of global distribution of software development has made managing collaboration and coordination among developers more difficult due to various reasons including physical distance, differences in time, cultural differences etc. A nearly total absence of informal communication among developers makes coordinating work in a globally distributed setting more critical. The goal of this workshop is to provide an opportunity for researchers and industry practitioners to explore both the state-of-the art in tools and methodologies for managing global software development (GSD).

In the present work, a reliable wireless healthcare monitoring network which is compatible with common platforms and operating systems is designed and implemented. The main advantages of our suggested wireless monitoring network are the... more

In the present work, a reliable wireless healthcare monitoring network which is compatible with common platforms and operating systems is designed and implemented. The main advantages of our suggested wireless monitoring network are the ability to monitor any required quantity, the usage of an efficient programming environment to allow all features of monitoring, controlling, and data processing to be implemented, the ability to extend the number of monitored patients, and the ability to transfer measurement data over wired or wireless channels. In addition to all of the above mentioned features, the system is implemented with components which achieve the minimum costs without scarifying accuracy. The use of low cost wireless communication and internet network facilities makes our suggested monitoring system reliable for all capital projects with minimum costs and ensures upgradability to adapt additional wide user requirements.

Studies show that up-front attention to requirements can save the economy billions of dollars, yet RE concerns are often treated as an afterthought to user requirements. Industry can thus benefit from a model to examine requirements in... more

Studies show that up-front attention to requirements can save the economy billions of dollars, yet RE concerns are often treated as an afterthought to user requirements. Industry can thus benefit from a model to examine requirements in the development stages of the production life cycle. Choosing an appropriate CASE tool to perform RE tasks became an increasingly harder, due to the tremendous number of CASE tools in this field. This paper introduces a survey of some of these tools available in the software market, comparing them to allow the reader to reach an adequate decision about which tool to use relative to his needs and software system circumstances.

ISO define la acreditación como el procedimiento mediante el cual un organismo autorizado da reconocimiento formal de que una organización o individuo es competente para llevar a término tareas específicas. Mientras que certificación es... more

ISO define la acreditación como el procedimiento mediante el cual un organismo autorizado da reconocimiento formal de que una organización o individuo es competente para llevar a término tareas específicas. Mientras que certificación es el procedimiento mediante el cual una tercera parte da una garantía escrita que un producto, proceso o servicio es conforme a unos requisitos especificados que se registran como tales.

As modern software-based systems and applications gain in versatility and functionality, the ability to manage inconsistent resources and service disparate user requirements becomes increasingly imperative. Furthermore, as systems... more

As modern software-based systems and applications gain in versatility and functionality, the ability to manage inconsistent resources and service disparate user requirements becomes increasingly imperative. Furthermore, as systems increase in complexity, rectification of system faults and recovery from malicious attacks become more difficult, labor-intensive, expensive, and error-prone. These factors have actuated research dealing with the concept of self-healing systems. Self-healing systems attempt to “heal” themselves in the sense of ...

Many organizations require a more effective and powerful information system to support their daily business activities. To develop these systems, engineering process requirement needs and its respective risks must be properly. Gathering... more

Many organizations require a more effective and powerful information system to support their daily business activities. To develop these systems, engineering process requirement needs and its respective risks must be properly. Gathering requirement risks are a challenging process as it involves stakeholders, users and developers. This paper reviews the current researches on risks assessment methods. We have analyze, characterized and classified these similar risks into knowledge, requirement volatility and documentation risks. We conclude this paper by discussing how the new risk classification can be applied to help organization in risk identification and finally, help reduce these risks.

This study addresses the fragmentation in the technology management field by identifying and organising the routines used by managers of technology. In a multi-method, iterative qualitative study done jointly between academics and... more

This study addresses the fragmentation in the technology management field by identifying and organising the routines used by managers of technology. In a multi-method, iterative qualitative study done jointly between academics and technology managers from a number of large industrial firms, 27 technology management routines were identified. These 27 routines were organised into a framework consisting of four categories: producing scientific and technological knowledge, transforming knowledge into working artefacts, linking artefacts with user requirements, and providing organisational support. This framework provides an organising scheme to make sense of technology management routines. In addition, because managers of technology actively participated in developing the routines, the study contributes by identifying routines practitioners regard as particularly important. Both research and practical implications are derived from the framework.

In the present work, a reliable wireless healthcare monitoring network which is compatible with common platforms and operating systems is designed and implemented. The main advantages of our suggested wireless monitoring network are the... more

In the present work, a reliable wireless healthcare monitoring network which is compatible with common platforms and operating systems is designed and implemented. The main advantages of our suggested wireless monitoring network are the ability to monitor any required quantity, the usage of an efficient programming environment to allow all features of monitoring, controlling, and data processing to be implemented, the ability to extend the number of monitored patients, and the ability to transfer measurement data over wired or wireless channels. In addition to all of the above mentioned features, the system is implemented with components which achieve the minimum costs without scarifying accuracy. The use of low cost wireless communication and internet network facilities makes our suggested monitoring system reliable for all capital projects with minimum costs and ensures upgradability to adapt additional wide user requirements.

Service Oriented Architecture (SOA) has become the new reference architecture for distributed computing. For the last few years the number of services on the web has increased exponentially. Among available services locating the best... more

Service Oriented Architecture (SOA) has become the new reference architecture for distributed computing. For the last few years the number of services on the web has increased exponentially. Among available services locating the best service that fulfills the user requirement is a challenging task for researchers especially when they are emphasizing on the need of automating the process of web service discovery. There is still no standard Requirement Engineering Process defined for service centric systems, as the traditional processes and those used for COTS selection cannot be used due to the architectural differences of service oriented software development to the other domains. The aim of this thesis proposal is to highlight the issues and challenges for service oriented software development paradigms and then to create a framework based on the solutions to the issues and then validating this proposal with the help of experiments.

This paper measures the user requirements for the proposed mobile class record application. Specifically, this paper presents the distribution and need level of the functionalities of a mobile class record application as perceived by the... more

This paper measures the user requirements for the proposed mobile class record application. Specifically, this paper presents the distribution and need level of the functionalities of a mobile class record application as perceived by the respondents. The respondents are 122 teacher educators in Central Visayas, Philippines. The study utilized a survey method. The result shows that majority of the teacher educators said that they highly needed the intended functionalities. The result also indicates that all suggested features are highly needed. The result implies that classroom information management, attendance monitoring, test scores and grades calculation, a dictionary of teacher education terms, task management, address book, groups, and photos management are imperative and necessary. The study concludes that all the identified functionalities are required for the overall quality of the proposed application. There is a high degree of satisfaction of the stated needs in the proposed mobile class record.

A systems analysis and design of information requirements for an experimental farm is presented. This study was carried out on the university farm (UF) at the University of Copenhagen in Denmark. The UF has several farm sites, many... more

A systems analysis and design of information requirements for an experimental farm is presented. This study was carried out on the university farm (UF) at the University of Copenhagen in Denmark. The UF has several farm sites, many employees and clients, and collects data on the spatial variability of sites for site-specific management, and is responsible for running field trials. Soft and hard system analyses were performed to better understand the information needs and design an information system for the UF. Soft systems methodology was used to analyse the human activities and to identify user requirements, while a hard systems methodology was used to structure the data handling inside the farm office. The resulting information management system (IMS) includes modules for storage, processing and presentation of spatio-temporal data for research trials and site-specific management. A GIS-based farm IMS including the necessary interfaces was implemented and validated by the UF manager and staff. Limitations and constraints to the full implementation of the IMS in an experimental farm are also discussed.

This demo presents TARSIUS-a system for traffic-aware route search. In a traffic-aware route search (TARS), the user provides start location, target location and search terms, which specify types of geographical entities that should be... more

This demo presents TARSIUS-a system for traffic-aware route search. In a traffic-aware route search (TARS), the user provides start location, target location and search terms, which specify types of geographical entities that should be visited along the route. A TARS query may include additional temporal constraints and limitations on the order by which entities are visited. The goal is to find the fastest route from the start location to the target, via entities of the specified types, while taking into account variations in the travel speed, due to changes in traffic conditions. Planning a route under conditions of uncertainty requires the system to also take into account the possibility that some visited entities will not satisfy the user requirements so that the route may need to go via several entities of the same type. In the demonstration we present the system. We demonstrate a web-based user interface that facilitates the formulation of TARS queries. We show how queries are posed and evaluated over a database that contains real traffic data. Since answering a TARS query is NP-hard, we present three heuristics to the problem. Using the system, we illustrate the routes that are computed by these heuristics.

| This paper is concerned with the application of wireless sensor network (WSN) technology to long-duration and large-scale environmental monitoring. The holy grail is a system that can be deployed and operated by domain specialists not... more

| This paper is concerned with the application of wireless sensor network (WSN) technology to long-duration and large-scale environmental monitoring. The holy grail is a system that can be deployed and operated by domain specialists not engineers, but this remains some distance into the future. We present our views as to why this field has progressed less quickly than many envisaged it would over a decade ago.

In recent years highly glazed spaces and atrium buildings are seen as a sign of advanced technology. An atrium is the social center of a building where people gather for social activities and also is a significant element of passive... more

In recent years highly glazed spaces and atrium buildings are seen as a sign of advanced technology. An atrium is the social center of a building where people gather for social activities and also is a significant element of passive building systems when well designed to provide user requirements. The study aims to accomplish a thermal performance simulation of an atrium building by specifying a prototype model of an office building in Istanbul. With the help of building simulation tools -EnergyPlus (Version 1.2.3), FLUENT (Version 6.2.16)-total energy consumption and air stratification of the atrium building is performed.

We report on the application of the use-case modeling technique to identify and specify the user requirements of the MammoGrid project in an incremental and controlled iterative approach. Modeling has been carried out in close... more

We report on the application of the use-case modeling technique to identify and specify the user requirements of the MammoGrid project in an incremental and controlled iterative approach. Modeling has been carried out in close collaboration with clinicians and radiologists with no prior experience of use cases. The study reveals the advantages and limitations of applying this technique to requirements specification in the domains of breast cancer screening and mammography research, with implications for medical imaging more generally. In addition, this research has shown a return on investment in use-case modeling in shorter gaps between phases of the requirements engineering process. The qualitative result of this analysis leads us to propose that a use-case modeling approach may result in reducing the cycle of the requirements engineering process for medical imaging.

Automotive has gained several benefits from the Ambient Intelligent researches involving the deployment of sensors and hardware devices into an intelligent environment surrounding people, meeting users' requirements and anticipating their... more

Automotive has gained several benefits from the Ambient Intelligent researches involving the deployment of sensors and hardware devices into an intelligent environment surrounding people, meeting users' requirements and anticipating their needs. One of the main topics in automotive is to anticipate driver needs and safety, in terms of preventing critical and dangerous events. Considering the high number of caused accidents, one of the most relevant dangerous events affecting driver and passengers safety is driver's drowsiness and hypovigilance. This paper presents a low-intrusive, real-time driver's drowsiness detection system for common vehicles. The proposed system exploits the ''bright pupil'' phenomenon generated by a 850 nm IR source light embedded on the car dashboard. This visual effect, due to the retina's property of reflecting the 90% of the incident light, makes easier the detection of driver's eyes. At the same time, the ''bright pupil'' effect is used to quantify the driver's drowsiness level as the percentage of time in which the driver's eyes are closed more than 80%. The efficiency of the image processing chain, together with an embedded hardware device exploiting the availability of mature reconfigurable hardware technology, such as Field Programmable Gate Array, allow to implement a real-time detection system able to process an entire 720 9 576 frame in 16.7 ms. The effectiveness of the proposed system has been successfully tested with a human subject operating in real conditions.