110 research outputs found

    Towards Domain-Specific Modeling Methodology for Avionic Safety-Critical Systems

    Get PDF
    The use of domain-specific modeling languages and associated methodologies, provide support in application domain where the safe and reliable operations of the systems are of paramount importance to the users and organizations, and wherein the domains are well understood and documented. One such area of domain-specific modeling application is in the field of avionic systems. For software systems to be used onboard aircrafts they must be certified, and as such certification protocols have been established for developing these safety-critical systems. These established protocols are usually represented as textual documents and inherently are difficult to apply directly in software development environments. The work presented herein proposes a graphical modeling representation for an avionic software system certification specification and an accompanying model-driven methodology for implementing the certification specification. This work is based on the RTCA Software Consideration in Airborne Systems and Equipment specification and the Unified Modeling Language. The presented model-driven methodology, incorporates the use of formal specification techniques to satisfy many of the verification requirements of the RTCA specification. The benefit of this work is in the transformation of textual description to graphical models in support of precise software system development, and a rigorous model-driven software development methodology for avionic soft-ware system development

    Towards Verification of UML Class Models using Formal Specification Methods: A Review

    Get PDF
    Abstract In today s world many elements of our lives are being affected by software and for that we are in greater need of high-quality software The Unified Modeling Language UML is considered the de facto standard for object-oriented software model development UML class diagram plays an important role in the design and specification of software systems A class diagram provides a static description of system component

    Software System Model Correctness using Graph Theory: A Review

    Get PDF
    The Unified Modeling Language UML is the de facto standard for object-oriented software model development The UML class diagram plays an essential role in design and specification of software systems The purpose of a class diagram is to display classes with their attributes and methods hierarchy generalization class relationships and associations general aggregation and composition between classes in one mode

    Enhancing Teaching & Learning of Software Engineering in an International Environment

    Get PDF
    A fundamental artifact of any academic research isthe data used as the basis of that research effort. A group ofresearchers, from institutions in multiple territories, hasembarked on an ambitious research project that is initially aimedat enhancing the teaching of software engineering for four-yearundergraduate programs. The research project details a set ofworkshops, for which the objective is the capture of data that willbe the basis of the research effort. The first of these workshopswas held in August of 2011, and is reported on in this paper. Theworkshop comprised software engineering educators andrepresentatives from the information technology industry. Thedata collection task sought to identify a set of topics that areconsidered suitable for teaching software engineering, along withidentification of the years and depth at which these topics shouldbe taught. The use of technology in the curriculum design processis seen as an important step forward and this issue is alsodiscussed

    Cloud Computing Security for Organizations using Live Signature – TPALM Printing Client Service

    Get PDF
    Cloud is taking over the computing environment in both public as well as private sector. This has increased the use of service-oriented architecture (SOA) for the development of services later deployed in the Cloud. This paper presents a Cloud Security algorithm using SOA 3.0 for secured transactions on the data, which usually governments of countries like USA International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) requires to be utilized and distributed only within United States by security cleared personal only. In this paper, we describe a novel algorithm and corresponding cloud service as Cloud Monitoring Gateway (CMG). The current service prototype simulates the behavior of actual Cloud Security Gateway Application (CSGA) using the algorithm called as TPALM (The Privacy Authentication Latency Management). This simulation is coarse-grained, but is capable of measuring the privacy authentication on the given variables of a legit user. We also present an evaluation of this service utilization on actual data

    Towards a Formal Approach to Validating and Verifying Functional Design for Complex Safety Critical Systems

    Get PDF
    The quality and reliability of safety criticalsoftware systems are highly dependent on proper systemvalidation and verification. In model-driven softwaredevelopment, semi-formal notations are often used inrequirements capture. Though semi-formal notations possessadvantages, their major disadvantage is their imprecision. Atechnique to eliminate imprecision is to transform semi-formalmodels into an analyzable representation using formalspecification techniques (FSTs). With this approach to systemvalidation and verification, safety critical systems can bedeveloped more reliably. This work documents early experienceof applying FSTs on UML class diagrams as attributeconstraints, and pre- post-conditions on procedures. Thevalidation and verification of the requirements of a system tomonitor unmanned aerial vehicles in unrestricted airspace is theorigin of this work. The challenge is the development of a systemwith incomplete specifications; multiple conflicting stakeholders’interests; existence of a prototype system; the need forstandardized compliance, where validation and verification areparamount, which necessitates forward and reverse engineeringactivities

    Book Reviews

    Get PDF
    With the observation of high-energy astrophysical neutrinos by the IceCube Neutrino Observatory, interest has risen in models of PeV-mass decaying dark matter particles to explain the observed flux. We present two dedicated experimental analyses to test this hypothesis. One analysis uses 6 years of IceCube data focusing on muon neutrino ‘track’ events from the Northern Hemisphere, while the second analysis uses 2 years of ‘cascade’ events from the full sky. Known background components and the hypothetical flux from unstable dark matter are fitted to the experimental data. Since no significant excess is observed in either analysis, lower limits on the lifetime of dark matter particles are derived: we obtain the strongest constraint to date, excluding lifetimes shorter than 102810^{28} s at 90% CL for dark matter masses above 10 TeV

    A Search for Neutrino Emission from Fast Radio Bursts with Six Years of IceCube Data

    Get PDF
    We present a search for coincidence between IceCube TeV neutrinos and fast radio bursts (FRBs). During the search period from 2010 May 31 to 2016 May 12, a total of 29 FRBs with 13 unique locations have been detected in the whole sky. An unbinned maximum likelihood method was used to search for spatial and temporal coincidence between neutrinos and FRBs in expanding time windows, in both the northern and southern hemispheres. No significant correlation was found in six years of IceCube data. Therefore, we set upper limits on neutrino fluence emitted by FRBs as a function of time window duration. We set the most stringent limit obtained to date on neutrino fluence from FRBs with an E2E^{-2} energy spectrum assumed, which is 0.0021 GeV cm2^{-2} per burst for emission timescales up to \textasciitilde102^2 seconds from the northern hemisphere stacking search.Comment: 15 pages, 9 figure
    corecore