Search results
1 – 10 of over 2000R. Chinnaiyan and S. Somasundaram
The purpose of this paper is to evaluate the reliability of individual software components in terms of the probability that each software component performs its intended…
Abstract
Purpose
The purpose of this paper is to evaluate the reliability of individual software components in terms of the probability that each software component performs its intended functionality successfully. The overall software system reliability is evaluated.
Design/methodology/approach
This paper incorporates the reliability behavior of component‐based software system using Markov process.
Findings
It is found that the component‐based software system reliability increases as the component reliability increases.
Originality/value
This paper explores new directions in evaluating the reliability of component‐based software systems for software reliability and offers practical help to researchers and software industries in reliable software development. The proposed software simulation technique will act as a tool for the software quality assurance team for evaluating the reliability of component‐based software systems.
Details
Keywords
T. Tryfonas, E. Kiountouzis and A. Poulymenakou
As information and communication technologies become a critical component of firms’ infrastructures and information establishes itself as a key business resource as well as…
Abstract
As information and communication technologies become a critical component of firms’ infrastructures and information establishes itself as a key business resource as well as driver, people start to realise that there is more than the functionality of the new information systems that is significant. Business or organisational transactions over new media require stability, one factor of which is information security. Information systems development practices have changed in line with the evolution of technology offerings as well as the nature of systems developed. Nevertheless, as this paper establishes, most contemporary development practices do not accommodate sufficiently security concerns. Beyond the literature evidence, reports on empirical study results indicating that practitioners deal with security issues by applying conventional risk analysis practices after the system is developed. Addresses the lack of a defined discipline for security concerns integration in systems development by using field study results recording development practices that are currently in use to illustrate their deficiencies, to point to required enhancements of practice and to propose a list of desired features that contemporary development practices should incorporate to address security concerns.
Details
Keywords
Kathryn Anne Weiss, Elwin C. Ong and Nancy G. Leveson
Modern, complex control systems for specific application domains often display common system design architectures with similar subsystem functionality and interactions. The…
Abstract
Modern, complex control systems for specific application domains often display common system design architectures with similar subsystem functionality and interactions. The similarities between these subsystems in most spacecraft can be exploited to create a model‐driven system development environment and then transformed into software or hardware either manually or automatically. Modifications to software and hardware during operations can be similarly made in the same controlled way. The approach is illustrated using a spacecraft attitude determination and control subsystem, but applies equally to other types of aerospace systems.
Details
Keywords
Yu Liu, Shan-Shan Huang and Ian Burgess
In order to improve the robustness of bare-steel and composite structures in fire, a novel axially and rotationally ductile connection has been proposed in this paper.
Abstract
Purpose
In order to improve the robustness of bare-steel and composite structures in fire, a novel axially and rotationally ductile connection has been proposed in this paper.
Design/methodology/approach
The component-based models of the bare-steel ductile connection and composite ductile connection have been proposed and incorporated into the software Vulcan to facilitate global frame analysis for performance-based structural fire engineering design. These component-based models are validated against detailed Abaqus FE models and experiments. A series of 2-D bare-steel frame models and 3-D composite frame models with ductile connections, idealised rigid and pinned connections, have been created using Vulcan to compare the fire performance of ductile connection with other connection types in bare-steel and composite structures.
Findings
The comparison results show that the proposed ductile connection can provide excellent ductility to accommodate the axial deformation of connected beam under fire conditions, thus reducing the axial forces generated in the connection and potentially preventing the premature brittle failure of the connection.
Originality/value
Compared with conventional connection types, the proposed ductile connection exhibits considerable deformability, and can potentially enhance the robustness of structures in fire.
Details
Keywords
Yanjun Zuo and Brajendra Panda
This paper aims to develop a framework for object trust evaluation and related object trust principles to facilitate knowledge management in a virtual organization. It proposes…
Abstract
Purpose
This paper aims to develop a framework for object trust evaluation and related object trust principles to facilitate knowledge management in a virtual organization. It proposes systematic methods to quantify the trust of an object and defines the concept of object trust management. The study aims to expand the domain of subject trust to object trust evaluation in terms of whether an object is correct and accurate in expressing a topic or issue and whether the object is secure and safe to execute (in the case of an executable program). By providing theoretical and empirical insights about object trust composition and combination, this research facilitates better knowledge identification, creation, evaluation, and distribution.
Design/methodology/approach
This paper presents two object trust principles – trust composition and trust combination. These principles provide formal methodologies and guidelines to assess whether an object has the required level of quality and security features (hence it is trustworthy). The paper uses a component‐based approach to evaluate the quality and security of an object. Formal approaches and algorithms have been developed to assess the trustworthiness of an object in different cases.
Findings
The paper provides qualitative and quantitative analysis about how object trust can be composed and combined. Novel mechanisms have been developed to help users evaluate the quality and security features of available objects.
Originality/value
This effort fulfills an identified need to address the challenging issue of evaluating the trustworthiness of an object (e.g. a software program, a file, or other type of knowledge element) in a loosely‐coupled system such as a virtual organization. It is the first of its kind to formally define object trust management and study object trust evaluation.
Details
Keywords
Gang Dong, Ian Burgess, Buick Davison and Ruirui Sun
This paper reports on the development of a general-purpose Eurocode-compliant component-based connection finite element for steel-to-steel joints in fire. The development begins…
Abstract
This paper reports on the development of a general-purpose Eurocode-compliant component-based connection finite element for steel-to-steel joints in fire. The development begins by utilising the temperature-dependent connection component characteristics previously developed at the University of Sheffield to create a component-based connection finite element to model flush endplate connections. Subsequently the element was extended to a new connection type with high ductility, the reverse channel. The component models have been developed for the reverse channel under tension and compression. The element has been incorporated into the nonlinear global structural analysis program Vulcan, in which it has been used along with a static-dynamic formulation. The use of the element is illustrated by modelling a fire test at the University of Manchester in which reverse channel connections were used.
Details
Keywords
Guohua Wang, Qiang Li, Jinglin Sun and Xiaofeng Meng
The purpose of this paper is to develop the model of telemetry data processing flow (TDPF) for TDPF development and the TDPF run-time infrastructure to improve the spacecraft…
Abstract
Purpose
The purpose of this paper is to develop the model of telemetry data processing flow (TDPF) for TDPF development and the TDPF run-time infrastructure to improve the spacecraft health monitoring capability.
Design/methodology/approach
This research tries to develop the TDPF by flow-based programming (FBP) method and the component-based telemetry data processing software.
Findings
The result from the case study is positive, thus reflecting the appropriateness of the suggested method.
Practical implications
Application of the proposed TDPF model and the component-based telemetry data processing software may result in improved development efficiency and less development costs.
Originality/value
This paper provides an effective way to develop TDPF without recompiling the software. It greatly facilitates the TDPF development that hopefully will save the TDPF development cost.
Details
Keywords
Kuldeep Kumar and Jos van Hillegersberg
The purpose of this study is to describe the experiences with the development and use of an agile component‐based architecture for enabling the requirements for the transformation…
Abstract
Purpose
The purpose of this study is to describe the experiences with the development and use of an agile component‐based architecture for enabling the requirements for the transformation of financial services.
Design/methodology/approach
The methodology used is a case study. Findings –The findings of the case study indicate that while technically it is feasible to develop and implement such an architecture, a number of managerial and organizational issues need to be addressed before such architecture can become successful.
Originality/value
For the practitioners and managers in the financial services industry, this study provides a potential solution to its need for an agile technology platform that can keep aligned with its evolving business requirements.
Details
Keywords
Luiz Fernando Capretz, Faheem Ahmed, Shereef Al‐Maati and Zaher Al Aghbari
The purpose of this paper is to provide an overview of a pragmatic approach to components off‐the‐shelf (COTS)‐based development. Software product line (SPL) is at the forefront…
Abstract
Purpose
The purpose of this paper is to provide an overview of a pragmatic approach to components off‐the‐shelf (COTS)‐based development. Software product line (SPL) is at the forefront among the techniques for reducing costs, decreasing schedule time, and ensuring commonality of features across a family of products – as COTS are reused in multiple products.
Design/methodology/approach
A disciplined process for SPL development is still needed. This paper proposes the Y‐model for COTS‐based SPL development. The model put forward identifies and elaborates the essential phases and activities of SPL development from COTS‐based repository.
Findings
The Y‐model provides an efficient way of integrating the approaches of SPL and COTS‐based development as a cohesive software development model.
Practical implications
The model has the potential to tremendously increase software engineers' productivity. Thus, software architects, domain engineers and component designers should become aware of how to use these ideas to structure their models and designs.
Originality/value
This paper describes a systematic approach for COTS‐based development that takes into account the cataloguing and retrieval of software assets permeating a process that encompasses all stages of software development, from system product requirements engineering to system deployment.
Details
Keywords
Abstract
Details