208,978 research outputs found

    Water treatment analysis guide

    Get PDF
    The treatment of water up to potable/drinkable standards is a complex process, with many variables and parameters impacting on each other. In South Africa drinking water delivered to consumers must meet the requirements as recorded in the South African National Standards (SANS). Today, more so than ever, there are a number water sources that can be exploited and treated to provide safe drinking water, namely; surface water (dams and rivers), sea water, ground water and treated wastewater. The focus of this dissertation is on surface water; however, reference is made in the first sections with regards to sea water and ground water. The first step in designing a treatment process begins with analysis of the raw water source. Unfortunately, there is not a one size fits all approach and it is left up to the process engineer to find the correct method of investigation. This can be a daunting task, especially if lacking in experience and available information. The first part of this dissertation focusses on just that. It prescribes the method of sampling and aims to provide the reader with context on when to and what to test for. It goes further to suggest how the results may influence the process design and how certain contaminants can be removed. It also draws the attention to the sampling timeframe required, to obtain representative information, encompassing fluctuations in water quality. The second part of this dissertation describe the methods for designing a conventional water treatment system, comprising; aeration, coagulation, flocculation, dissolved air floatation, sedimentation, filtration and disinfection. It also comments on the water quality that warrants certain process steps to assist the process engineer in choosing the correct configuration. For most steps the design approach of two or more technologies are presented. This allows the process engineer to consider which technology best suits the application at hand. The design procedures are programmed into an, excel based, software model, which permits quick and easy design. A brief description of how the software model can be used is also covered. The results given by the software model is validated through a set of examples, appended to this document. Ultimately it is concluded that although this dissertation provides a guide for designing a treatment process it is not an encompassing tool that considers all the intricacies involved. That is, there are too many factors involved and considerations required, and cannot all be captured in one dissertation such as this. As such, it is finally recommended that any design attempts should be conducted by a suitably qualified and experienced process engineer that may use this dissertation to augment their design development

    Revisiting the Core Ontology and Problem in Requirements Engineering

    Full text link
    In their seminal paper in the ACM Transactions on Software Engineering and Methodology, Zave and Jackson established a core ontology for Requirements Engineering (RE) and used it to formulate the "requirements problem", thereby defining what it means to successfully complete RE. Given that stakeholders of the system-to-be communicate the information needed to perform RE, we show that Zave and Jackson's ontology is incomplete. It does not cover all types of basic concerns that the stakeholders communicate. These include beliefs, desires, intentions, and attitudes. In response, we propose a core ontology that covers these concerns and is grounded in sound conceptual foundations resting on a foundational ontology. The new core ontology for RE leads to a new formulation of the requirements problem that extends Zave and Jackson's formulation. We thereby establish new standards for what minimum information should be represented in RE languages and new criteria for determining whether RE has been successfully completed.Comment: Appears in the proceedings of the 16th IEEE International Requirements Engineering Conference, 2008 (RE'08). Best paper awar

    Revisiting the Core Ontology and Problem in Requirements Engineering

    Full text link
    In their seminal paper in the ACM Transactions on Software Engineering and Methodology, Zave and Jackson established a core ontology for Requirements Engineering (RE) and used it to formulate the "requirements problem", thereby defining what it means to successfully complete RE. Given that stakeholders of the system-to-be communicate the information needed to perform RE, we show that Zave and Jackson's ontology is incomplete. It does not cover all types of basic concerns that the stakeholders communicate. These include beliefs, desires, intentions, and attitudes. In response, we propose a core ontology that covers these concerns and is grounded in sound conceptual foundations resting on a foundational ontology. The new core ontology for RE leads to a new formulation of the requirements problem that extends Zave and Jackson's formulation. We thereby establish new standards for what minimum information should be represented in RE languages and new criteria for determining whether RE has been successfully completed.Comment: Appears in the proceedings of the 16th IEEE International Requirements Engineering Conference, 2008 (RE'08). Best paper awar

    Safety software testing implementation based on standard IEC 61508

    Get PDF
    In the services industry, the autonomy of a system is strictly related to the system’s safety degree. Safety determines the capabilities and requirements that a system will have. Although safety limits the autonomy of systems, it ensures they are operational, reliable and usable. The thesis consists of an analysis of what functional safety should involve, how safety and testing are related and the application of the safety standard IEC 61508 on an autonomous system. The thesis is performed alongside an internship as a test engineer in KONE; in the critical safety software department. Keywords

    Coping with Poorly Understood Domains: the Example of Internet Trust

    Get PDF
    The notion of trust, as required for secure operations over the Internet, is important for ascertaining the source of received messages. How can we measure the degree of trust in authenticating the source? Knowledge in the domain is not established, so knowledge engineering becomes knowledge generation rather than mere acquisition. Special techniques are required, and special features of KBS software become more important than in conventional domains. This paper generalizes from experience with Internet trust to discuss some techniques and software features that are important for poorly understood domains

    An Extension of NDT to Model Entity Reconciliation Problems

    Get PDF
    Within the development of software systems, the development of web applications may be one of the most widespread at present due to the great number of advantages they provide such as: multiplatform, speed of access or the not requiring extremely powerful hardware among others. The fact that so many web applications are being developed, makes grotesque the volume of information that it is generated daily. In the management of all this information, it appears the entity reconciliation problem, which is to identify objects referring to the same real-world entity. This paper proposes to give a solution to this problem through a web perspective. To this end, the NDT methodology has been taken as a reference and has been extended adding new activities, artefacts and documents to cover this problem.Ministerio de EconomĂ­a y Competitividad TIN2013-46928-C3-3-RMinisterio de EconomĂ­a y Competitividad TIN2016-76956-C3-2-RMinisterio de EconomĂ­a y Competitividad TIN2015-71938-RED

    Change Impact Analysis for SysML Requirements Models based on Semantics of Trace Relations

    Get PDF
    Change impact analysis is one of the applications of requirements traceability in software engineering community. In this paper, we focus on requirements and requirements relations from traceability perspective. We provide formal definitions of the requirements relations in SysML for change impact analysis. Our approach aims at keeping the model synchronized with what stakeholders want to be modeled, and possibly implemented as well, which we called as the domain. The differences between the domain and model are defined as external inconsistencies. The inconsistencies are propagated for the whole model by using the formalization of relations, and mapped to proposed model changes. We provide tool support which is a plug-in of the commercial visual software modeler BluePrint
    • …
    corecore