16 research outputs found

    Cloud adoption: a goal-oriented requirements engineering approach

    Get PDF
    The enormous potential of cloud computing for improved and cost-effective service has generated unprecedented interest in its adoption. However, a potential cloud user faces numerous risks regarding service requirements, cost implications of failure and uncertainty about cloud providers’ ability to meet service level agreements. These risks hinder the adoption of cloud computing. We motivate the need for a new requirements engineering methodology for systematically helping businesses and users to adopt cloud services and for mitigating risks in such transition. The methodology is grounded in goal-oriented approaches for requirements engineering. We argue that Goal-Oriented Requirements Engineering (GORE) is a promising paradigm to adopt for goals that are generic and flexible statements of users’ requirements, which could be refined, elaborated, negotiated, mitigated for risks and analysed for economics considerations. The methodology can be used by small to large scale organisations to inform crucial decisions related to cloud adoption. We propose a risk management framework based on the principle of GORE. In this approach, we liken risks to obstacles encountered while realising cloud user goals, therefore proposing cloud-specific obstacle resolution tactics for mitigating identified risks. The proposed framework shows benefits by providing a principled engineering approach to cloud adoption and empowering stakeholders with tactics for resolving risks when adopting the cloud. We extend the work on GORE and obstacles for informing the adoption process. We argue that obstacles’ prioritisation and their resolution is core to mitigating risks in the adoption process. We propose a novel systematic method for prioritising obstacles and their resolution tactics using Analytical Hierarchy Process (AHP). To assess the AHP choice of the resolution tactics we support the method by stability and sensitivity analysis

    Simulation Studies Relating to Rudder Roll Stabilization of a Container Ship Using Neural Networks

    Get PDF
    International audienceRRS (Rudder Roll Stabilization) of Ships is a difficult problem because of its associated non-linear dynamics, coupling effects and complex control requirements. This paper proposes a solution of this stabilization problem that is based on an ANN (Artificial Neural Network) controller. The controller has been trained using supervised learning. The simulation studies have been carried out using MATLAB and a non-linear model of a container ship. It has been demonstrated that the proposed controller regulates heading and also controls roll angle very successfully

    Simulation studies relating to rudder roll stabilization of a container ship using neural networks

    Get PDF
    RRS (Rudder Roll Stabilization) of Ships is a difficult problem because of its associated non-linear dynamics, coupling effects and complex control requirements. This paper proposes a solution of this stabilization problem that is based on an ANN (Artificial Neural Network) controller. The controller has been trained using supervised learning. The simulation studies have been carried out using MATLAB and a non-linear model of a container ship. It has been demonstrated that the proposed controller regulates heading and also controls roll angle very successfully

    Trust Management in Social Internet of Things (SIoT): A Survey

    Get PDF
    A survey on trust management in the Social Internet of Things (SIoT) is provided, beginning with a discussion of SIoT architectures and relationships. Using a variety of publication databases, we describe efforts that focus on various trust management aspects of SIoT. Trust management models comprise three themes: trust computation, aggregation, and updates. Our study presents a detailed discussion of all three steps. Trust computation and trust aggregation depend upon Trust Attributes (TAs) for the calculation of local and global trust values. Our paper discusses many strategies for aggregating trust, but “Weighted Sum” is the most frequently used in the relevant studies. Our paper addresses trust computation and aggregation scenarios. Our work classifies research by TAs (Social Trust, Quality of Service). We’ve categorized the research (reputation-based, recommendation-based, knowledge-based) depending on the types of feedback/opinions used to calculate trust values (global feedback/opinion, feedback from a friend, trustor’s own opinion considering the trustee’s information). Our work classifies studies (policy-based, prediction-based, weighted sum-based/weighted linear combination-based) by trust computation/aggregation approach. Two trust-update schemes are discussed: time-driven and event-driven schemes, while most trust management models utilize an event-driven scheme. Both trust computation and aggregation need propagating trust values in a centralized, decentralized, or semi-centralized way. Our study covers classifying research by trust updates and propagation techniques. Trust models should provide resiliency to SIoT attacks. This analysis classifies SIoT attacks as collaborative or individual. We also discuss scenarios depicted in the relevant studies to incorporate resistance against trust-related attacks in SIoT. Studies suggest context-based or context-free trust management strategies. Our study categorizes studies based on context-based or context-free approaches. To gain the benefits of an immutable, privacy-preserving approach, a future trust management system should utilize Blockchain technology to support non-repudiation and tracking of trust relationships

    A Comprehensive Bibliometric Assessment on Software Testing (2016–2021)

    Get PDF
    The research study provides a comprehensive bibliometric assessment in the field of Software Testing (ST). The dynamic evolution in the field of ST is evident from the publication rate over the last six years. The research study is carried out to provide insight into the field of ST from various research bibliometric aspects. Our methodological approach includes dividing the six-year time frame into the set of two symmetric but different periods (2016–2018) and (2019–2021) comprising a total of 75,098 records. VOSViewer is used to perform analysis with respect to collaboration network of countries and co-word assessment. Bibliometrix (Studio R) analysis tool is used to evaluate research themes/topics. The year 2019 leads the publication rate whereas a decrement in publication frequency is observed for the years 2020 and 2021. Our research study shows the influence of ST in other research domains as depicted in different research areas. Especially the impact of ST in the Electrical and Electronics Domain is quite notable. Most of the research publications are from the USA and China as they are among the most resourceful countries. On the whole, the majority of the publications are from Asian countries. Collaboration networks amongst countries demonstrate the fact that the higher the collaboration network, the greater would be the research output. Co-word analysis presents the relatedness of documents based on the keywords. The topic dendrogram is generated based on the identified research themes. Although English is the leading language, prominent studies are present in other languages also. This research study provides a comprehensive analysis based on 12 informative research questions

    Glyph Identification and Character Recognition for Sindhi OCR

    No full text
    International audienceA computer can read and write multiple languages and today's computers are capable of understanding various human languages. A computer can be given instructions through various input methods but OCR (Optical Character Recognition) and handwritten character recognition are the input methods in which a scanned page containing text is converted into written or editable text. The change in language text available on scanned page demands different algorithm to recognize text because every language and script pose varying number of challenges to recognize text. The Latin language recognition pose less difficulties compared to Arabic script and languages that use Arabic script for writing and OCR systems for these Latin languages are near to perfection. Very little work has been done on regional languages of Pakistan. In this paper the Sindhi glyphs are identified and the number of characters and connected components are identified for this regional language of Pakistan. A graphical user interface has been created to perform identification task for glyphs and characters of Sindhi language. The glyphs of characters are successfully identified from scanned page and this information can be used to recognize characters. The language glyph identification can be used to apply suitable algorithm to identify language as well as to achieve a higher recognition rate

    Blockchain-Based Trust and Reputation Management in SIoT

    No full text
    In the Social Internet of Things (SIoT), trust refers to the decision-making process used by the trustor (Service Requesters (SRs) or Service Consumers (SCs)) to decide whether or not to entrust the trustee (Service Providers (SPs)) with specific services. Trust is the key factor in SIoT domain. The designing of a two-way, two-stage parameterized feedback-based, service-driven, attacks-resistant trust and reputation system for SIoT accompanied by a penalty mechanism for dishonest SPs and SRs is our main contribution that mitigates the trust-related issues occurring during service provisioning and service acquisition amongst various entities (SPs or SRs) and enhances trust amongst them. Our proposed methodology examines a SP’s local trust, global trust, and reputation by taking into account “Social Trust” and “Quality of Service (QoS)” factors”. Two—Stage Parameterized feedback” is incorporated in our proposed strategy to better manage “intention” and “ability” of SRs and provides early identification of suspicious SRs. This feature compels SRs to act honestly and rate the corresponding SPs in a more accurate way. Our recommended paradigm sorts SPs into three SP status lists (White List, Grey List, and Black List) based on reputation values where each list has a threshold with respect to the maximum service fee that can be charged. SPs in White List charge the most per service. SPs in other lists have a lower selection probability. Every feedback updates the SP’s trust and reputation value. Sorting SPs increases resistance against On Off Attack, Discriminatory Attack, Opportunistic Service Attack, and Selective Behavior Attacks. SPs must operate honestly and offer the complete scope of stated services since their reputation value relies on all their global trust values (Tglobal) for various services. Service requests may be accepted or denied by SPs. “Temporarily banned” SRs can only request unblocked services. SRs lose all privileges once on a “permanently banned” list. If local and global trust values differ by more than the threshold, the SR is banned. Our method also provides resistance against Bad Mouthing Attack, Ballot Stuffing Attack. Good Mouthing Attack/Self—Propagating Attack. Experiments indicate our trust and reputation management system recognizes and bans fraudulent SRs. “Dishonest SPs” are “blacklisted,” which affects their reputation, trust, and service charges

    An Energy Policy Analysis and Proposed Remedial Actions to Reduce Energy Crises in Pakistan

    No full text
    Pakistan energy demand has grown exponentially over the last 2 decades. Reason behind increasing energy demand is excessive mobility of rural population to cities, rapid progression in industrial and transport sector, lack of policy making and implementation on the developed policies and improvements in living style. At present, Pakistan witness 5000-7000 MW power deficit in summer. To reduce the demand and supply gap, power plants across Pakistan are planned to be installed while some are under development phase. Power expansion plans cannot cope with the current energy shortfall since several years are required for them to get fully operational. Effective energy policy is the only key to address the existing shortfall. This paper discusses the initiatives that may be taken to reduce the power shortfall using energy efficiency and conservation, deployment of microgrids, utilization of renewable energy resources and effective research and development in energy sector. Since another most important issue evaluated in the research regarding the energy crises is energy efficiency and lack of compliance to government regulations for energy efficiency and conservation. Implementation on the policies developed for energy efficiencies and conservation has not been witnessed. Possible solutions on short term basis to lessen the energy crises have also been discussed in the pape

    Production Plant and Warehouse Automation with IoT and Industry 5.0

    No full text
    The Internet of Things (IoT) has been implemented by multiple manufacturing companies into their production chain as this technology is the main source of digitalization in a production plant. It improves the data assembling, productivity of the operation, communication efficiency, and overall manufacturing performance. IoT is also serves to be a good means for improved and efficient warehouse automation. It makes the delivery of products more efficient by calculating the least routes and also reduces the time that is consumed during the management of inventory. The basic objective of Industry 4.0 is to lessen the participation of human operators and to emphasize the automation systems. However, this objective has changed in Industry 5.0, which aims to achieve the maximum benefits through the human–machine interaction by maintaining a balance. Industry 5.0 aims to strengthen the interaction between ever-increasing powerful machinery and the productive abilities of human beings. This paper introduces a detailed overview of IoT in enabling digital transformations and Industry 4.0. The authors have discussed the application of IoT in different industrial sectors, and how the concept of IIoT has evolved. In addition to this, the present paper highlights several research studies that enable the authors to elicit the major challenges, implementation analysis, and future scope of IIoT
    corecore