13 research outputs found

    Enhancing the ESIM (Embedded Systems Improving Method) by Combining Information Flow Diagram with Analysis Matrix for Efficient Analysis of Unexpected Obstacles in Embedded Software

    Get PDF
    In order to improve the quality of embedded software, this paper proposes an enhancement to the ESIM (Embedded Systems Improving Method) by combining an IFD (Information Flow Diagram) with an Analysis Matrix to analyze unexpected obstacles in the software. These obstacles are difficult to predict in the software specification. Recently, embedded systems have become larger and more complicated. Theoretically therefore, the development cycle of these systems should be longer. On the contrary, in practice the cycle has been shortened. This trend in industry has resulted in the oversight of unexpected obstacles, and consequently affected the quality of embedded software. In order to prevent the oversight of unexpected obstacles, we have already proposed two methods for requirements analysis: the ESIM using an Analysis Matrix and a method that uses an IFD. In order to improve the efficiency of unexpected obstacle analysis at reasonable cost, we now enhance the ESIM by combining an IFD with an Analysis Matrix. The enhancement is studied from the following three viewpoints. First, a conceptual model comprising both the Analysis Matrix and IFD is defined. Then, a requirements analysis procedure is proposed, that uses both the Analysis Matrix and IFD, and assigns each specific role to either an expert or non-expert engineer. Finally, to confirm the effectiveness of this enhancement, we carry out a description experiment using an IFD.14th Asia-Pacific Software Engineering Conference (APSEC\u2707), 4-7 Dec. 2007, Aichi, Japa

    A preliminary study on operation management for one-way EV car sharing system in university campus

    Get PDF
    Car sharing using electric vehicles(EVs) is effective in local society and community from the viewpoint of economy and the protection of the natural environment. For instance, Univerisiti Putra Malaysia (UPM), which has two large campuses, has a plan to use a small number of small EVs as one of transportation methods. When a large number of people share a small number of vehicles in this way, the confliction of usage requests by users may cause inconvenience to users and ineffective operation of vehicles. In addition, because the degree of legal compliance with usage time and operation rules relies on social and cultural backgrounds, operation methods may be affected by them. Therefore, a framework for supporting operation management in consideration of characteristics of the local society and community is necessary in order to efficiently operate a limited number of vehicles without detracting from the convenience of users. We have been developing an operation management support system for one-way EV car sharing in the university campus to improve user convenience and vehicle operation efficiency. In this presentation, we clarify the issues of operation management for car sharing system. We also introduce an overview of the operation management support system and propose several reservation methods of vehicles

    Multi-Threading Inside Prolog for Knowledge-Based Enterprise Applications

    Get PDF
    A knowledge-based system is suitable for realizing advancedfunctions that require domain-specific expert knowledge in enterprise-mission-critical information systems (enterprise applications). This pa-per describes a newly implemented multi-threaded Prolog system thatevolves single-threaded Inside Prolog. It is intended as a means to applya knowledge-based system written in Prolog to an enterprise application.It realizes a high degree of parallelism on an SMP system by minimizingmutual exclusion for scalability essential in enterprise use. Also brieflyintroduced is the knowledge processing server which is a framework foroperating a knowledge-based system written in Prolog with an enterpriseapplication. Experimental results indicated that on an SMP system themulti-threaded Prolog could achieve a high degree of parallelism whilethe server could obtain scalability. The application of the server to clini-cal decision support in a hospital information system also demonstratedthat the multi-threaded Prolog and the server were sufficiently robustfor use in an enterprise application

    An analysis method with failure scenario matrix for specifying unexpected obstacles in embedded systems

    Get PDF
    This paper describes an analysis method with failure scenario matrix for specifying unexpected obstacles in order to improve the quality of embedded systems. Although embedded software has become increasingly large in scale and complexity, companies are requiring the software to be developed within shorter periods of time. Therefore, the quality of the software is bound to suffer. This problem is one of the most serious concerns in a coming age of ubiquitous embedded systems. In order to improve the quality, it is very important to specify the forbidden behavior of embedded systems. The forbidden behavior of unexpected obstacles is analyzed by using a matrix and scenarios. This paper provides a detailed description of the analysis method used, in particular the cause, phenomenon, and goal in the scenario, relating them to each other by using a matrix.Proceedings of the 12th Asia-Pacific Software Engineering Conference, December 15-17, 2005, The Grand Hotel in Taiwa

    An analysis method with failure scenario matrix for specifying unexpected obstacles in embedded systems

    No full text
    Proceedings of the 12th Asia-Pacific Software Engineering Conference,The Grand Hotel in Taiwan,December 15-17, 2005This paper describes an analysis method with failure scenario matrix for specifying unexpected obstacles in order to improve the quality of embedded systems. Although embedded software has become increasingly large in scale and complexity, companies are requiring the software to be developed within shorter periods of time. Therefore, the quality of the software is bound to suffer. This problem is one of the most serious concerns in a coming age of ubiquitous embedded systems. In order to improve the quality, it is very important to specify the forbidden behavior of embedded systems. The forbidden behavior of unexpected obstacles is analyzed by using a matrix and scenarios. This paper provides a detailed description of the analysis method used, in particular the cause, phenomenon, and goal in the scenario, relating them to each other by using a matrix
    corecore