Modeling from the perspectives of softwareengineering and systems engineering have co-evolved over the last two decades as orthogonal approaches. Given the central role of software in modern cyber-physical systems an...
详细信息
ISBN:
(纸本)9798350358810;9798350358803
Modeling from the perspectives of softwareengineering and systems engineering have co-evolved over the last two decades as orthogonal approaches. Given the central role of software in modern cyber-physical systems and the increasing adoption of digital engineering practices in complex systems design, there is now significant opportunity for collaborative design among system users, software developers, and systems engineers. Model-based systems engineering (MBSE) and systems modeling languages can support seamless cross-domain connectivity for design, simulation, and analysis of emerging technologies such as Augmented Reality (AR). this paper presents a co-design process for extending the capability of an existing AR application referred to as a No-Code AR Systems (NCARS) framework. NCARS enables content developed by multi-domain authors to be deployed on AR devices through a software layer that bridges the content to the game engine that drives the AR system. Utilizing a software dependency diagram of the AR Annotation function, an existing MBSE model of the AR system is extended to include the structure and behavior of relevant software components. this allows a modular design of the system to address needs in integrating new requirements into the existing application. New user requirements for tracking items in motion in the user's physical environment with virtual annotations in the augmented space are collaboratively designed and visualized through use case, block definition, internal block, and sequence diagrams. they capture the required structure and behavior of the proposed to-be system.
this research concludes an overall summary of the publications so far on the applied Machine Learning (ML) techniques in different phases of software Development Life Cycle (SDLC) that includes Requirement Analysis, D...
详细信息
ISBN:
(纸本)9789897586477
this research concludes an overall summary of the publications so far on the applied Machine Learning (ML) techniques in different phases of software Development Life Cycle (SDLC) that includes Requirement Analysis, Design, Implementation, Testing, and Maintenance. We have performed a systematic review of the research studies published from 2015-2023 and revealed that software Requirements Analysis phase has the least number of papers published;in contrast, software Testing is the phase withthe greatest number of papers published.
the proceedings contain 16 papers. the special focus in this conference is on softwareengineering. the topics include: Towards Automatic Test Case Generation for Industrial software Systems Based on Functional Specif...
ISBN:
(纸本)9783030892463
the proceedings contain 16 papers. the special focus in this conference is on softwareengineering. the topics include: Towards Automatic Test Case Generation for Industrial software Systems Based on Functional Specifications;promise Plus: Flexible Synchronization for Parallel Computations on Arrays;Term Rewriting on GPUs;solving Systems of Bilinear Equations for Transition Rate Reconstruction;runtime Monitoring Processes Across Blockchains;protocol Scheduling;systematic Extraction of Tests from Object-Oriented Programs;introducing Interval Differential Dynamic Logic;preface;deadlock in Packet Switching Networks;Extending OCL with Map and Function Types;event-Driven Temporal Logic Pattern for Control software Requirements Specification;a Program Logic for Fresh Name Generation;adding Proof Calculi to Epistemic Logics with Structured knowledge.
Developing automated and smart software vulnerability detection models has been receiving great attention from both research and development communities. One of the biggest challenges in this area is the lack of code ...
详细信息
ISBN:
(纸本)9789897586477
Developing automated and smart software vulnerability detection models has been receiving great attention from both research and development communities. One of the biggest challenges in this area is the lack of code samples for all different programming languages. In this study, we address this issue by proposing a transfer learning technique to leverage available datasets and generate a model to detect common vulnerabilities in different programming languages. We use C source code samples to train a Convolutional Neural Network (CNN) model, then, we use Java source code samples to adopt and evaluate the learned model. We use code samples from two benchmark datasets: NIST software Assurance Reference Dataset (SARD) and Draper VDISC dataset. the results show that proposed model detects vulnerabilities in both C and Java codes with average recall of 72%. Additionally, we employ explainable AI to investigate how much each feature contributes to the knowledge transfer mechanisms between C and Java in the proposed model.
Withthe adoption of values, principles, practices, tools and processes from Agile, Lean, and DevOps, knowledge preservation has become a serious issue because documentation is largely left out. We identify two questi...
详细信息
ISBN:
(纸本)9789897586477
Withthe adoption of values, principles, practices, tools and processes from Agile, Lean, and DevOps, knowledge preservation has become a serious issue because documentation is largely left out. We identify two questions that are relevant for knowledge acquisition and distribution concerning design decisions, rationales, or reasons for code change. the first concerns which knowledge is required upfront to start a project. the second question concerns continuation after initial development and addresses which knowledge is required by those who deploy, use or maintain a software product. We evaluate two relevant approaches for alleviating the issues, which are 'Just enough Upfront' and 'Executable Documentation' with a total of 25 related artifacts. For the evaluation, we conducted a case study supported by a literature review, organizational and project metrics, and a survey. We looked into closed source-code and closed classified source-code. We found two conclusive remarks. First, git commit messages typically contain what has been changed but not why source-code has been changed. Design decisions, rationale, or reasons for code change should be saved as close as possible to the source-code with Git Pull Requests. Second, knowledge about a software product is not only written down in artifacts but is also a social construction between team members.
this paper presents the control of multiple unmanned aerial manipulators that perform various manipulator tasks keeping a given formation. the software-in-loop simulation is utilised to test and validate three coopera...
详细信息
ISBN:
(纸本)9798331518509;9798331518493
this paper presents the control of multiple unmanned aerial manipulators that perform various manipulator tasks keeping a given formation. the software-in-loop simulation is utilised to test and validate three cooperative algorithms, i.e., line formation tracking a piecewise continuous trajectory, circular trajectory in a cyclic pursuit, and finally a pick and place operation during formation. We employed leader-follower strategies and performed experiments using the Robot Operating System, Gazebo, and PX4. During the formation process, the manipulator is tested for various poses yet it maintained stability and followed the designated path. Performance of the proposed controller and algorithms are evaluated through real-time simulation analysis.
With AI increasingly affecting software systems, there is a pressing need to prepare the next generation of software engineers to build AI-intensive systems proficiently. this work outlines our instructional approach ...
详细信息
ISBN:
(纸本)9798350378986;9798350378979
With AI increasingly affecting software systems, there is a pressing need to prepare the next generation of software engineers to build AI-intensive systems proficiently. this work outlines our instructional approach in the "engineering of AIintensive Systems" course for postgraduate computer science students to bridge the knowledge gap between softwareengineering (SE) and artificial intelligence (AI) disciplines. Our paper elaborates on the course's framework, pedagogical strategies, and evaluation methods, emphasizing the benefits of this interdisciplinary educational model.
the proceedings contain 13 papers. the topics discussed include: logging practices with mobile analytics: an empirical study on firebase;an earthquake alert system based on a collaborative approach using smart devices...
ISBN:
(纸本)9781728187112
the proceedings contain 13 papers. the topics discussed include: logging practices with mobile analytics: an empirical study on firebase;an earthquake alert system based on a collaborative approach using smart devices;an empirical study on the impact of refactoring on quality metrics in android applications;developing apps for researching the COVID-19 pandemic withthe TrackYourHealth platform;ITDroid: a tool for automated detection of i18n issues on android apps;the impact of instant messaging on the energy consumption of android devices;towards understanding iOS app store search advertising: an explorative study;MeetDurian: a gameful mobile app to prevent COVID-19 infection;SequalsK — a bidirectional swift-Kotlin-Transpiler;and KotlinDetector: towards understanding the implications of using kotlin in android applications.
the proceedings contain 15 papers. the special focus in this conference is on Requirements engineering: Foundation for software Quality. the topics include: Requirements engineering in the Planning Phase of a software...
ISBN:
(纸本)9783030731274
the proceedings contain 15 papers. the special focus in this conference is on Requirements engineering: Foundation for software Quality. the topics include: Requirements engineering in the Planning Phase of a software Ecosystem;power and Privacy in software Ecosystems: A Study on Data Breach Impact on Tech Giants;iterative and Scenario-Based Requirements Specification in a System of Systems Context;Specifying Requirements for Data Collection and Analysis in Data-Driven RE. A Research Preview;saPeer Approach for Training Requirements Analysts: An Application Tailored to a Low-resource Context;on Understanding the Relation of knowledge and Confidence to Requirements Quality;Automatic Detection of Causality in Requirement Artifacts: the CiRA Approach;improving Trace Link Recovery Using Semantic Relation Graphs and Spreading Activation;CORG: A Component-Oriented Synthetic Textual Requirements Generator;automatically Classifying Non-functional Requirements with Feature Extraction and Supervised Machine Learning Techniques: A Research Preview;adaptationExplore – A Process for Elicitation, Negotiation, and Documentation of Adaptive Requirements;Trustworthy AI Services in the Public Sector: What Are Citizens Saying About It?;defining Utility Functions for Multi-stakeholder Self-adaptive Systems.
the development of quantum computing is following a substantial growth. this leads us closer to the implementation of practical solutions based on quantum softwarethat address problems that are not computable by clas...
详细信息
ISBN:
(纸本)9789897586477
the development of quantum computing is following a substantial growth. this leads us closer to the implementation of practical solutions based on quantum softwarethat address problems that are not computable by classical software in a practical timeframe. Hence, some companies will need to adapt their development practices and, so, their information systems to take advantage of quantum computing. Unfortunately, there is still a lack of tools, frameworks, and processes to support the evolution of current systems towards the combination of the quantum and classical paradigms into information systems. Hence, this paper presents a reverse engineering technique to generate abstract models based on the knowledge Discovery Metamodel (KDM) by analyzing quantum software written in OpenQASM3. the main implication is that KDM models represent, in a technology-agnostic way, the different components and interrelationships of quantum software. these models then can be used to restructure and redesign the target hybrid information system.
暂无评论