1,496,502 research outputs found
Recommended from our members
Adaption of structured analysis design techniques methodology for construction project planning
The construction industry has been heavily criticised by researchers and governmental organisations for its performance especially excessive delay. Ballard and Howell (2003) indicated that only about 50% of the tasks on weekly work plans are completed by the end of the plan week. This is a result of a lack of either effective project planning or effective production control. It therefore seems the traditional approach of planning is insufficient to meet the current demand and complexity of construction projects. This paper proposes to critically evaluate the adaptation of Structured Analysis Design Techniques (SADT) methodology as a tool for project planning. SADT which was further developed into IDEF (Integrated Definition) techniques claims to be a complete methodology to provide the means of understanding complex production systems and aid the implementation of change. The use of this methodology has led to process improvement. The research uses a literature review followed by interviews with academics and practitioners to investigate their knowledge and understanding of SADT (IDEFO). The results of the interviews indicated that SADT (IDEFO) methodology is seldom known and used in the construction industry. However, this study indicates that SADT methodology appears to be an effective project planning tool. This study contributes to the limited project planning techniques in construction industry by exploring the possible adaption of SADT
Complexity and maintenance : a comparative study of object-oriented and structured methodologies : a thesis presented in partial fulfilment of the requirements for the degree of Master of Business Studies in Information Systems at Massey University
Maintenance has been found to be one of the most expensive phases in the life of an information system. It has been suggested that the use of object-oriented methods instead of traditional structured methods may be one way of reducing the cost of maintenance required for an information system. This thesis is an attempt to determine whether the object-oriented approach does in fact undergo a relatively smaller increase in complexity when subjected to a change in specifications than a similar system that is developed using a "structured methodology", and is therefore easier to maintain. The methodologies used in this study were Yourdon's (1989) Modern Structured Methodology and Booch's (1994) Object-Oriented methodology. The analysis phase of both methodologies were applied to the same case study twice in order to evaluate the effects of a change in the system's specifications. Once the two models for each methodology were complete, various metrics were applied to the structured system and a separate set of metrics were applied to the object-oriented system. The results of the models and the metrics were then analysed and validated in order to determine which system suffered a smaller proportional increase in complexity as a result of the changes to the system. It was found that overall, the object-oriented system proved to undergo a smaller increase in complexity, and it was therefore easier to maintain as a result of the changes than the structured system
CML: the commonKADS conceptual modelling language
We present a structured language for the specification of knowledge models according to the CommonKADS methodology. This language is called CML (Conceptual Modelling Language) and provides both a structured textual notation and a diagrammatic notation for expertise models. The use of our CML is illustrated by a variety of examples taken from the VT elevator design system
Advanced Cloud Privacy Threat Modeling
Privacy-preservation for sensitive data has become a challenging issue in
cloud computing. Threat modeling as a part of requirements engineering in
secure software development provides a structured approach for identifying
attacks and proposing countermeasures against the exploitation of
vulnerabilities in a system . This paper describes an extension of Cloud
Privacy Threat Modeling (CPTM) methodology for privacy threat modeling in
relation to processing sensitive data in cloud computing environments. It
describes the modeling methodology that involved applying Method Engineering to
specify characteristics of a cloud privacy threat modeling methodology,
different steps in the proposed methodology and corresponding products. We
believe that the extended methodology facilitates the application of a
privacy-preserving cloud software development approach from requirements
engineering to design
Structure Formation in Large Theories
Structuring theories is one of the main approaches to reduce the
combinatorial explosion associated with reasoning and exploring large theories.
In the past we developed the notion of development graphs as a means to
represent and maintain structured theories. In this paper we present a
methodology and a resulting implementation to reveal the hidden structure of
flat theories by transforming them into detailed development graphs. We review
our approach using plain TSTP-representations of MIZAR articles obtaining more
structured and also more concise theories
A qualitative investigation of elite golf coaches' knowledge and the epistemological chain
The aim of the study was to explore the existence and application of the epistemological chain (EC) construct in the decision making of elite golf coaches. Eight male expert golf coaches were recruited for the study. Employing a qualitative methodology, semi-structured interviews were conducted to gain understanding of the participants‟ perceptions and application of the EC and to determine its overall effect on their knowledge development. Data were analysed to identify themes using interpretive phenomenological analysis (IPA). Results indicate the EC is indeed present in the coaching of elite golfers and implemented in a structured and coherent form. This raises a number of interesting issues regarding coach and player development that may impact upon future pedagogical provision
Recommended from our members
Behavioral synthesis from VHDL using structured modeling
This dissertation describes work in behavioral synthesis involving the development of a VHDL Synthesis System VSS which accepts a VHDL behavioral input specification and performs technology independent synthesis to generate a circuit netlist of generic components. The VHDL language is used for input and output descriptions. An intermediate representation which incorporates signal typing and component attributes simplifies compilation and facilitates design optimization.A Structured Modeling methodology has been developed to suggest standard VHDL modeling practices for synthesis. Structured modeling provides recommendations for the use of available VHDL description styles so that optimal designs will be synthesized.A design composed of generic components is synthesized from the input description through a process of Graph Compilation, Graph Criticism, and Design Compilation. Experiments were performed to demonstrate the effects of different modeling styles on the quality of the design produced by VSS. Several alternative VHDL models were examined for each benchmark, illustrating the improvements in design quality achieved when Structured Modeling guidelines were followed
- …
