232,894 research outputs found

    Automated sport facilities booking for Majlis Perbandaran Kajang Sport Arena / Muhammad Razman Husin

    Get PDF
    Majlis Perbandaran Kajang Sport Arena is located in Bandar Baru Bangi, which every day the staff will entertain customers either walk in or call to do their sport facilities booking. Common booking issues like redundancy booking, lost of information and even unpaid booking fee leading to unbooked facility has cause major problem for MPKJ Sport Arena. The Sport Arena does not have any computerized system that could facilitate the facilities booking and there are no computerizing systems to keep their customer information. The target of this work is to develop a facilities booking system for MPKJ Sport Arena. Currently, the customer of MPKJ Sport Arena use the manual method either walk in to Sport Arena or call the operator to know the availability of the facilities. This cause the customer time to booked the facilities. The project was document into five phases which is: Introduction, Literature Review, Methodology, Result and Analysis, and Conclusion and Recommendation. The methodology that has been used in the project is Waterfall Model. The requirements for this project were collected by observation and interview of the stakeholder. It was analyzed using CRUD technique and it was documented in Software Requirement Specification (SRS). The system design and structures were made using eclipse software and it was saved in a Software Development Document (SDD). In the near future, the system should be available and integrated with mobile application system as features of booking facilities can be implemented, since people nowadays tend to use the smartphone more than the web in order handle their matter

    Analysis and design of multiagent systems using MAS-CommonKADS

    Get PDF
    This article proposes an agent-oriented methodology called MAS-CommonKADS and develops a case study. This methodology extends the knowledge engineering methodology CommonKADSwith techniquesfrom objectoriented and protocol engineering methodologies. The methodology consists of the development of seven models: Agent Model, that describes the characteristics of each agent; Task Model, that describes the tasks that the agents carry out; Expertise Model, that describes the knowledge needed by the agents to achieve their goals; Organisation Model, that describes the structural relationships between agents (software agents and/or human agents); Coordination Model, that describes the dynamic relationships between software agents; Communication Model, that describes the dynamic relationships between human agents and their respective personal assistant software agents; and Design Model, that refines the previous models and determines the most suitable agent architecture for each agent, and the requirements of the agent network

    Towards Guidelines for Preventing Critical Requirements Engineering Problems

    Get PDF
    Context] Problems in Requirements Engineering (RE) can lead to serious consequences during the software development lifecycle. [Goal] The goal of this paper is to propose empirically-based guidelines that can be used by different types of organisations according to their size (small, medium or large) and process model (agile or plan-driven) to help them in preventing such problems. [Method] We analysed data from a survey on RE problems answered by 228 organisations in 10 different countries. [Results] We identified the most critical RE problems, their causes and mitigation actions, organizing this information by clusters of size and process model. Finally, we analysed the causes and mitigation actions of the critical problems of each cluster to get further insights into how to prevent them. [Conclusions] Based on our results, we suggest preliminary guidelines for preventing critical RE problems in response to context characteristics of the companies.Comment: Proceedings of the 42th Euromicro Conference on Software Engineering and Advanced Applications, 201

    The Dafny Integrated Development Environment

    Full text link
    In recent years, program verifiers and interactive theorem provers have become more powerful and more suitable for verifying large programs or proofs. This has demonstrated the need for improving the user experience of these tools to increase productivity and to make them more accessible to non-experts. This paper presents an integrated development environment for Dafny-a programming language, verifier, and proof assistant-that addresses issues present in most state-of-the-art verifiers: low responsiveness and lack of support for understanding non-obvious verification failures. The paper demonstrates several new features that move the state-of-the-art closer towards a verification environment that can provide verification feedback as the user types and can present more helpful information about the program or failed verifications in a demand-driven and unobtrusive way.Comment: In Proceedings F-IDE 2014, arXiv:1404.578

    Model-Based Security Testing

    Full text link
    Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST) is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.Comment: In Proceedings MBT 2012, arXiv:1202.582
    corecore