4,197 research outputs found

    Software reusability development through NFL approach for identifying security based inner relationships of affecting factors

    Get PDF
    In component based software reusability development process, the software developers have to choose the best components which are self adaptive future to overcome the functional errors, framework mismatches, violation of user level privacy issues and data leakage feasibilities. The software developers can build high quality software applications by taking the consideration of the reusable components which are more suitable to provide high level data security and privacy. This paper has proposing the neural based fuzzy framework based approach to estimate the reusable components which are directly and indirectly involve the security and privacy to improve the quality of the software system. This approach has considered the twenty effecting factors and fifty three attribute matrices. It has formed with three stages of execution scenarios. The first stage has executed with eleven effecting factors and eighteen attribute matrices for identification of supporting software reusability components, the second stage has executed with four effecting factors and thirty five attribute matrices for identification of sub-internal relationships in terms of security-privacy, and the third stage has executed with eight effecting factors and six attribute matrices for identification of sub of sub-internal relationships in terms of security risk estimation. This analytical finding proposes a fuzzy logic model to evaluate the most feasible effecting factors that influence the enterprise level data security-privacy practices at real time environment

    A Reusability Assessment of UCP-Based Effort Estimation Framework using Object-Oriented Approach

    Get PDF
    Software effort estimation has become one of the most important concerns of software industries and Use Case Points (UCP) is seen as one of the most popular estimation models for object-oriented software development. Since year 2005, more than 10 UCP-based effort estimation techniques have been proposed either to give more options or to enhance the capability of UCP. However, there is no guidance for software practitioners to develop a quality UCP-based effort estimation applications. Therefore, we have proposed a new design framework for UCP-based technique to promote reusability in developing software applications. This paper will experiment and provide evidence showing that the framework achieved a good quality design using Quality Model for Objectoriented Design (QMOOD). The results showed that the framework has met five quality attributes and good to be reused as a guideline at the early stages of software development

    National Security Space Launch

    Get PDF
    The United States Space Force’s National Security Space Launch (NSSL) program, formerly known as the Evolved Expendable Launch Vehicle (EELV) program, was first established in 1994 by President William J. Clinton’s National Space Transportation Policy. The policy assigned the responsibility for expendable launch vehicles to the Department of Defense (DoD), with the goals of lowering launch costs and ensuring national security access to space. As such, the United States Air Force Space and Missile Systems Center (SMC) started the EELV program to acquire more affordable and reliable launch capability for valuable U.S. military satellites, such as national reconnaissance satellites that cost billions per satellite. In March 2019, the program name was changed from EELV to NSSL, which reflected several important features: 1.) The emphasis on “assured access to space,” 2.) transition from the Russian-made RD-180 rocket engine used on the Atlas V to a US-sourced engine (now scheduled to be complete by 2022), 3.) adaptation to manifest changes (such as enabling satellite swaps and return of manifest to normal operations both within 12 months of a need or an anomaly), and 4.) potential use of reusable launch vehicles. As of August 2019, Blue Origin, Northrop Grumman Innovation Systems, SpaceX, and United Launch Alliance (ULA) have all submitted proposals. From these, the U.S. Air Force will be selecting two companies to fulfill approximately 34 launches over a period of five years, beginning in 2022. This paper will therefore first examine the objectives for the NSSL as presented in the 2017 National Security Strategy, Fiscal Year 2019, Fiscal Year 2020, and Fiscal Year 2021 National Defense Authorization Acts (NDAA), and National Presidential Directive No. 40. The paper will then identify areas of potential weakness and gaps that exist in space launch programs as a whole and explore the security implications that impact the NSSL specifically. Finally, the paper will examine how the trajectory of the NSSL program could be adjusted in order to facilitate a smooth transition into new launch vehicles, while maintaining mission success, minimizing national security vulnerabilities, and clarifying the defense acquisition process.No embargoAcademic Major: EnglishAcademic Major: International Studie

    Towards a Tool-based Development Methodology for Pervasive Computing Applications

    Get PDF
    Despite much progress, developing a pervasive computing application remains a challenge because of a lack of conceptual frameworks and supporting tools. This challenge involves coping with heterogeneous devices, overcoming the intricacies of distributed systems technologies, working out an architecture for the application, encoding it in a program, writing specific code to test the application, and finally deploying it. This paper presents a design language and a tool suite covering the development life-cycle of a pervasive computing application. The design language allows to define a taxonomy of area-specific building-blocks, abstracting over their heterogeneity. This language also includes a layer to define the architecture of an application, following an architectural pattern commonly used in the pervasive computing domain. Our underlying methodology assigns roles to the stakeholders, providing separation of concerns. Our tool suite includes a compiler that takes design artifacts written in our language as input and generates a programming framework that supports the subsequent development stages, namely implementation, testing, and deployment. Our methodology has been applied on a wide spectrum of areas. Based on these experiments, we assess our approach through three criteria: expressiveness, usability, and productivity

    Eco-innovative Method to Improve the Distribution Phase of Product

    Get PDF
    The integration of the environmental dimension is crucial in industrial activity. Designers should integrate the new environmental constraints to adapt their approaches and methodologies in the framework of eco-innovation of industrial products and consumer goods. This paper proposes a new method integrating ecological aspects into the innovation process composed of three main stages: an analysis and structuring of the product, the formalization of the problem and the resolution phase. According to the structuring and the design objectives, actions can be selected and allow to guide the design to the most relevant modification to perform on the product. An illustration of the approach is applied on the optimization of the environmental impacts related to the logistical aspects

    A framework for the definition of metrics for actor-dependency models

    Get PDF
    Actor-dependency models are a formalism aimed at providing intentional descriptions of processes as a network of dependency relationships among actors. This kind of models is currently widely used in the early phase of requirements engineering as well as in other contexts such as organizational analysis and business process reengineering. In this paper, we are interested in the definition of a framework for the formulation of metrics over these models. These metrics are used to analyse the models with respect to some properties that are interesting for the system being modelled, such as security, efficiency or accuracy. The metrics are defined in terms of the actors and dependencies of the model. We distinguish three different kinds of metrics that are formally defined, and then we apply the framework at two different layers of a meeting scheduler system.Postprint (published version

    Salvaging building materials in a circular economy: A BIM-based whole-life performance estimator

    Get PDF
    © 2017 The Author(s) The aim of this study is to develop a BIM-based Whole-life Performance Estimator (BWPE) for appraising the salvage performance of structural components of buildings right from the design stage. A review of the extant literature was carried out to identify factors that influence salvage performance of structural components of buildings during their useful life. Thereafter, a mathematical modelling approach was adopted to develop BWPE using the identified factors and principle/concept of Weibull reliability distribution for manufactured products. The model was implemented in Building Information Modelling (BIM) environment and it was tested using case study design. Accordingly, the whole-life salvage performance profiles of the case study building were generated. The results show that building design with steel structure, demountable connections, and prefabricated assemblies produce recoverable materials that are mostly reusable. The study reveals that BWPE is an objective means for determining how much of recoverable materials from buildings are reusable and recyclable at the end of its useful life. BWPE will therefore provide a decision support mechanism for the architects and designers to analyse the implication of designs decision on the salvage performance of buildings over time. It will also be useful to the demolition engineers and consultants to generate pre-demolition audit when the building gets to end of its life
    • …
    corecore