24,098 research outputs found

    On the structure of problem variability: From feature diagrams to problem frames

    Get PDF
    Requirements for product families are expressed in terms of commonality and variability. This distinction allows early identification of an appropriate software architecture and opportunities for software reuse. Feature diagrams provide intuitive notations and techniques for representing requirements in product line development. In this paper, we observe that feature diagrams tend to obfuscate three important descriptions: requirements, domain properties and specifications. As a result, feature diagrams do not adequately capture the problem structures that underlie variability, and inform the solution structures of their complexity. With its emphasis on separation of the three descriptions, the problem frames approach provides a conceptual framework for a more detailed analysis of variability and its structure. With illustrations from an example, we demonstrate how problem frames analysis of variability can augment feature diagrams

    Occupant behaviour in naturally ventilated and hybrid buildings

    Get PDF
    Adaptive thermal comfort criteria for building occupants are now becoming established. In this paper we illustrate their use in the prediction of occupant behaviour and make a comparison with a non-adaptive temperature threshold approach. A thermal comfort driven adaptive behavioural model for window opening is described and its use within dynamic simulation illustrated for a number of building types. Further development of the adaptive behavioural model is suggested including use of windows, doors, ceiling fans, night cooling, air conditioning and heating, also the setting of opportunities and constraints appropriate to a particular situation. The integration in dynamic simulation of the thermal adaptive behaviours together with non-thermally driven behaviours such as occupancy, lights and blind use is proposed in order to create a more complete model of occupant behaviour. It is further proposed that this behavioural model is implemented in a methodology that includes other uncertainties (e.g. in internal gains) so that a realistic range of occupant behaviours is represented at the design stage to assist in the design of robust, comfortable and low energy buildings

    Design of Closed Loop Supply Chains

    Get PDF
    Increased concern for the environment has lead to new techniques to design products and supply chains that are both economically and ecologically feasible. This paper deals with the product - and corresponding supply chain design for a refrigerator. Literature study shows that there are many models to support product design and logistics separately, but not in an integrated way. In our research we develop quantitative modelling to support an optimal design structure of a product, i.e. modularity, repairability, recyclability, as well as the optimal locations and goods flows allocation in the logistics system. Environmental impacts are measured by energy and waste. Economic costs are modelled as linear functions of volumes with a fixed set-up component for facilities. We apply this model using real life R&D data of a Japanese consumer electronics company. The model is run for different scenarios using different parameter settings such as centralised versus decentralised logistics, alternative product designs, varying return quality and quantity, and potential environmental legislation based on producer responsibility.supply chain management;reverse logistics;facility location;network design;product design

    Pattern Based Security Requirement Derivation with Security Risk-aware Secure Tropos

    Get PDF
    InformatsioonisĂŒsteem (IS) toetab suurt hulka modernse ĂŒhiskonna jaoks olulisi funktsioone. IS sisaldab ĂŒha suurenevat hulka andmeid ja informatsiooni, sealhulgas per-sonaalseid pilte ja andmeid tervise vĂ”i finantstehingute kohta. Üha suurenev kĂŒberrĂŒnna-kute arv on tinginud vajaduse turvaliste infosĂŒsteemide kiiremaks loomiseks. Et arendada turvalist IS-i, tuleb tuvastada turbe-eesmĂ€rgid ning need vastavalt ellu viia. TulemuspĂ”hine arendus tagab turbe-eesmĂ€rkide tulemuslikkuse, pakkudes metodoloogiat, mis vĂ”imaldab turvalisuse nĂ”uete induktsiooni lĂ€bi kogu informatsioonisĂŒsteemi arenduse protsessi. See on saavutatav, kui vĂ”tta igat sĂŒsteemikomponenti kui eesmĂ€rgile orienteeritud osa. Olgugi, et tulemuspĂ”hine modelleerimine on kasulikuks osutunud, on sellel ka mĂ”ningaid puudu-seid. Peamine puudus peitub detailsuses, mille tĂ”ttu see protsess vĂ”ib lĂŒhikese ajaga muu-tuda komplekseks, tĂ”stes ka kogu ĂŒlejÀÀnut protsessi keerukusetaset. SeetĂ”ttu on oluline kasutada struktureeritud lĂ€henemisviisi, mis vĂ”imaldab kogu protsessi jooksul samm-sammulist juhendit rakendada. Turvalisuse mustrid on korduvkasutatavadja vĂ”imaldavad lahendada tarkvaraarenduse protsessi kĂ€igus sagedasti ilmnevaid probleeme. KĂ€esolevas magistritöös uuritakse mustripĂ”hise turvanĂ”uete kogumise protsessi integreerimist, tule-muspĂ”hise IS-i arendamisel. Selle eesmĂ€rgiks on SRP’d (Security Risk-oriented Patterns) kasutades pakkuda protsessi, mis vĂ”imaldab turvanĂ”uete induktsiooni RAST (Security Risk-aware Secure Tropos) mudelis. RAST on turvalisuse tulemuspĂ”hise modelleerimise keel, mis on kohaldatav lĂ€bi kogu tarkvaraarenduse protsessi nii varasematele kui hilisema-tele nĂ”udlustele, arhitektuurile, ĂŒksikasjalikule projekteerimisele kui ka lĂ”plikule rakenda-misele. KĂ€esoleva magistritöö panus on viie SRP avaldamine, kasutades selleks RAST mo-delleerimise keelt. Töös tuuakse vĂ€lja sammud, mida vĂ€ljapakutud turvalisuse mustrite ra-kendamiseks kasutada. Töö autor annab omapoolse panuse viies lĂ€bi juhtumiuuringu, mis kinnitab autori poolt pakutud mustrite ĂŒldise kasutamisest selle rakenduse protsessist. Juh-tumiuuringust selgus ka, et töös vĂ€lja pakutud mustreid on vĂ”imalik kasutada sĂŒsteemi analĂŒĂŒsi alguspunktina, et kiirendada turvalisuse nĂ”uete vĂ€ljaselgitamisprotsessi ning seda efektiivsemaks muuta.Information systems (IS’s) support a multitude of functions vital to the modern society. IS’s carry an ever increasing volume of data and information, including personal pictures, health data or financial transactions. Continuously increasing rates of cyber-attacks have led to the subsequent need to rapidly develop secure IS. To develop secure IS’s, security goals need to be identified and fulfilled accordingly. Goal-oriented development fulfils the achievement of security goal by providing a methodology that enables security requirement elicitation throughout the entire development of an information system. This is achieved by considering every component of a system as an actor that is driven by goals that the actor strives to achieve. Nevertheless goal-oriented modeling has proven itself to be valid it maintains multiple shortcomings. The main disadvantage lays in the high granularity of the process making it complex very fast and subsequently raising the level of complexity of the overall process. Therefore a structured approach that would provide a step-by-step guide throughout the application of the process would be essential. Security patterns are proven to be reusable solutions that address recurring security problems which are commonly faced during the process of software development. In this master thesis we investigate the integration of a pattern based security requirement elicitation process in the goal-oriented IS development. By performing this integration we aim at providing a process that enables the elicitation of security requirements from Security Risk-aware Secure Tropos (RAST) models. RAST is a security goal-oriented modeling language that is applicable throughout the complete process of software development from early to late requirements, architecture, detailed design and final implementation. The contribution of this thesis are five Security Risk-aware Patterns expressed using RAST. The thesis outlines the steps to be executed to apply the proposed security patterns. We validated our contribution by performing a case study that confirmed the overall usability of our proposed patterns and the pattern application process. Additionally the case study determined that the provided patterns can be used as a starting point for a faster and more efficient in identifying security requirements

    A System for Deduction-based Formal Verification of Workflow-oriented Software Models

    Full text link
    The work concerns formal verification of workflow-oriented software models using deductive approach. The formal correctness of a model's behaviour is considered. Manually building logical specifications, which are considered as a set of temporal logic formulas, seems to be the significant obstacle for an inexperienced user when applying the deductive approach. A system, and its architecture, for the deduction-based verification of workflow-oriented models is proposed. The process of inference is based on the semantic tableaux method which has some advantages when compared to traditional deduction strategies. The algorithm for an automatic generation of logical specifications is proposed. The generation procedure is based on the predefined workflow patterns for BPMN, which is a standard and dominant notation for the modeling of business processes. The main idea for the approach is to consider patterns, defined in terms of temporal logic,as a kind of (logical) primitives which enable the transformation of models to temporal logic formulas constituting a logical specification. Automation of the generation process is crucial for bridging the gap between intuitiveness of the deductive reasoning and the difficulty of its practical application in the case when logical specifications are built manually. This approach has gone some way towards supporting, hopefully enhancing our understanding of, the deduction-based formal verification of workflow-oriented models.Comment: International Journal of Applied Mathematics and Computer Scienc

    Quality measures for ETL processes: from goals to implementation

    Get PDF
    Extraction transformation loading (ETL) processes play an increasingly important role for the support of modern business operations. These business processes are centred around artifacts with high variability and diverse lifecycles, which correspond to key business entities. The apparent complexity of these activities has been examined through the prism of business process management, mainly focusing on functional requirements and performance optimization. However, the quality dimension has not yet been thoroughly investigated, and there is a need for a more human-centric approach to bring them closer to business-users requirements. In this paper, we take a first step towards this direction by defining a sound model for ETL process quality characteristics and quantitative measures for each characteristic, based on existing literature. Our model shows dependencies among quality characteristics and can provide the basis for subsequent analysis using goal modeling techniques. We showcase the use of goal modeling for ETL process design through a use case, where we employ the use of a goal model that includes quantitative components (i.e., indicators) for evaluation and analysis of alternative design decisions.Peer ReviewedPostprint (author's final draft

    Feature technology and its applications in computer integrated manufacturing

    Get PDF
    A Thesis submitted for the degree of Doctor of Philosophy of University of LutonComputer aided design and manufacturing (CAD/CAM) has been a focal research area for the manufacturing industry. Genuine CAD/CAM integration is necessary to make products of higher quality with lower cost and shorter lead times. Although CAD and CAM have been extensively used in industry, effective CAD/CAM integration has not been implemented. The major obstacles of CAD/CAM integration are the representation of design and process knowledge and the adaptive ability of computer aided process planning (CAPP). This research is aimed to develop a feature-based CAD/CAM integration methodology. Artificial intelligent techniques such as neural networks, heuristic algorithms, genetic algorithms and fuzzy logics are used to tackle problems. The activities considered include: 1) Component design based on a number of standard feature classes with validity check. A feature classification for machining application is defined adopting ISO 10303-STEP AP224 from a multi-viewpoint of design and manufacture. 2) Search of interacting features and identification of features relationships. A heuristic algorithm has been proposed in order to resolve interacting features. The algorithm analyses the interacting entity between each feature pair, making the process simpler and more efficient. 3) Recognition of new features formed by interacting features. A novel neural network-based technique for feature recognition has been designed, which solves the problems of ambiguity and overlaps. 4) Production of a feature based model for the component. 5) Generation of a suitable process plan covering selection of machining operations, grouping of machining operations and process sequencing. A hybrid feature-based CAPP has been developed using neural network, genetic algorithm and fuzzy evaluating techniques

    Footprints of information foragers: Behaviour semantics of visual exploration

    Get PDF
    Social navigation exploits the knowledge and experience of peer users of information resources. A wide variety of visual–spatial approaches become increasingly popular as a means to optimize information access as well as to foster and sustain a virtual community among geographically distributed users. An information landscape is among the most appealing design options of representing and communicating the essence of distributed information resources to users. A fundamental and challenging issue is how an information landscape can be designed such that it will not only preserve the essence of the underlying information structure, but also accommodate the diversity of individual users. The majority of research in social navigation has been focusing on how to extract useful information from what is in common between users' profiles, their interests and preferences. In this article, we explore the role of modelling sequential behaviour patterns of users in augmenting social navigation in thematic landscapes. In particular, we compare and analyse the trails of individual users in thematic spaces along with their cognitive ability measures. We are interested in whether such trails can provide useful guidance for social navigation if they are embedded in a visual–spatial environment. Furthermore, we are interested in whether such information can help users to learn from each other, for example, from the ones who have been successful in retrieving documents. In this article, we first describe how users' trails in sessions of an experimental study of visual information retrieval can be characterized by Hidden Markov Models. Trails of users with the most successful retrieval performance are used to estimate parameters of such models. Optimal virtual trails generated from the models are visualized and animated as if they were actual trails of individual users in order to highlight behavioural patterns that may foster social navigation. The findings of the research will provide direct input to the design of social navigation systems as well as to enrich theories of social navigation in a wider context. These findings will lead to the further development and consolidation of a tightly coupled paradigm of spatial, semantic and social navigation

    Integration of Legacy Appliances into Home Energy Management Systems

    Full text link
    The progressive installation of renewable energy sources requires the coordination of energy consuming devices. At consumer level, this coordination can be done by a home energy management system (HEMS). Interoperability issues need to be solved among smart appliances as well as between smart and non-smart, i.e., legacy devices. We expect current standardization efforts to soon provide technologies to design smart appliances in order to cope with the current interoperability issues. Nevertheless, common electrical devices affect energy consumption significantly and therefore deserve consideration within energy management applications. This paper discusses the integration of smart and legacy devices into a generic system architecture and, subsequently, elaborates the requirements and components which are necessary to realize such an architecture including an application of load detection for the identification of running loads and their integration into existing HEM systems. We assess the feasibility of such an approach with a case study based on a measurement campaign on real households. We show how the information of detected appliances can be extracted in order to create device profiles allowing for their integration and management within a HEMS
    • 

    corecore