Due to the increasing complexity of business processes and the growing number of required features, modern software rarely operates independently. Rather, it often relies on third-party services, many of which are ava...
详细信息
Systems engineering trends show an increasing importance of applying version control to all engineering artifacts, and a need to synchronize artifact updates with design decisions. Leveraging available technologies, s...
详细信息
ISBN:
(纸本)9798350358810;9798350358803
Systems engineering trends show an increasing importance of applying version control to all engineering artifacts, and a need to synchronize artifact updates with design decisions. Leveraging available technologies, such as Git, has the potential to enhance version control and integration among cross-functional teams and their associated artifacts. Orchestration is only possible when cross-functional teams have the same baseline of knowledge in understanding Git functionality. this paper presents a selection of ten Git commands used by systems engineering digital artifacts authors and analysts collaborating within in a digital engineering ecosystem. Application to a use case of systems engineering, as authors, and systems safety, as analysts, aims to ensure needed end-to-end process from an end-user perspective. Commands described in this paper can be utilized by any artifact consumers, reviewers, or contributors such as human factors engineering, reliability, cybersecurity, testability or any other '-ilities' in the lifecycle properties of engineering systems domain. Furthermore, the paper discusses the benefits of version control systems centered on achieving early gap identification for systems integration and verification while maintaining design, development, assessment continuity, temporal tracking of engineering artifacts to support evidence quality, managing digital artifacts complexity, building a digital thread, and achieving curated data display to audiences.
Earlier research has focused on technical debt (TD). While numerous issues connected to non-technical aspects of software development (SD) that are equally worthy of "debt" status are neglected. Simultaneous...
详细信息
ISBN:
(纸本)9789897586477
Earlier research has focused on technical debt (TD). While numerous issues connected to non-technical aspects of software development (SD) that are equally worthy of "debt" status are neglected. Simultaneously, these types of debts regularly develop significant challenges to be addressed, demonstrating that the debt metaphor may be used to reason about elements other than technical ones. It motivates us to create the new umbrella term "Non-Technical Debt" (NTD) to investigate people, processes, culture, social, and organizational concerns under its cover. All types of debt are similar in some ways, and they are often caused by making risky decisions. therefore, ignoring any one dimension of debt can have severe consequences on the successful completion of SD projects. this study investigates recent literature on the current state of knowledge about NTD, its causes, and mitigation strategies. By using a thematic analysis approach, we found five NTD types (i.e., people, process, culture, social, and organizational). We further identified their accumulation causes and discussed remedies for mitigation.
knowledge Graph Embedding aims to represent entities and relations as low dimensional vectors. the representative ability of low dimensional vectors is one of the most important aspects of knowledge graph embedding. K...
详细信息
ISBN:
(纸本)9798350385359
knowledge Graph Embedding aims to represent entities and relations as low dimensional vectors. the representative ability of low dimensional vectors is one of the most important aspects of knowledge graph embedding. knowledge graph embedding needs to represent two kinds of information: entity relation structures and entity semantic differences. However, the most existing approaches are good at entity relation structure representation, but fail to represent entity semantic differences which are common in real-world applications. To address the challenge, we propose a novel approach called SeTransE to enhance semantic awareness in knowledge graph embedding and achieve the aim of representing entity semantic differences. It mainly adopts a new method where a relation can rotate to a certain angle, which is different from traditional approaches. Experimental results on multiple benchmark knowledge graphs show our proposed approach not only represents relation structures, but also effectively models semantic structures and distinguish semantic differences.
this paper is to highlight the formation of the new design;a one-of-kind structure that is an independentuniform knowledge source of blackboard architecture. the domain and control knowledge sources independently defi...
详细信息
A software's most crucial component is its quality. software Defect Prediction has gained a lot of traction in recent years and has the potential to directly impact quality. software quality is greatly impacted by...
详细信息
software end users are diverse by nature and their different facets influence the way they use software. An understanding of the users and their needs are achieved by engaging withthe users during requirement enginee...
详细信息
ISBN:
(纸本)9789897586477
software end users are diverse by nature and their different facets influence the way they use software. An understanding of the users and their needs are achieved by engaging withthe users during requirement engineering. However, sometimes recruiting users during requirement engineering phase can be very challenging. An accessible way to understand a user's perspective and traits is through user application reviews. this research paper proposes an innovative approach to develop user personas from a data set of e-commerce application user reviews by using GPT-3 and PAthY. this enables the development teams to see different demographic data, as well as overall frustrations and expectations that users of their platform possess, so developers know how to enhance their software solutions. this is also helpful to developers of new e-commerce applications.
In this paper, we describe a method to transform a model from a graphical representation into a textual representation and back. In order to do this, we take a context-specific modeling language approach. this approac...
详细信息
ISBN:
(纸本)9798350385359
In this paper, we describe a method to transform a model from a graphical representation into a textual representation and back. In order to do this, we take a context-specific modeling language approach. this approach is graph-based and data-flow driven. this language has a BNF (Backus-Naur form) for the textual representation and another BNF, which is able to generate a graphical representation of a model. We transform our example in a central step into an Abstract Data Type (ADT) driven specification with an abstract syntax. After that we transform it to the appropriate and semantically transferable target form.
From theory and technical skills to self-management and interpersonal skills, and to role-specific knowledge such as DevOps or Requirements engineering, students struggle to become proficient in all aspects to Softwar...
详细信息
ISBN:
(纸本)9798350378986;9798350378979
From theory and technical skills to self-management and interpersonal skills, and to role-specific knowledge such as DevOps or Requirements engineering, students struggle to become proficient in all aspects to softwareengineering before graduating, while instructors struggle to prepare students for industry. Project-based instruction has become a de-facto standard to teach skills and knowledge. Many project-based courses focus on implementation, wherein students tend to adopt third-party technologies without critical reflection. this leads to insufficient knowledge about supply chain risk management (SCRM). the result is that students are inadequately prepared to handle risks to project success due to third-party acquisitions, including usage rights, introduction of security vulnerabilities, or their ability to identify and mitigate acquisition risks. In this paper, we present a capstone-style project-based course to deliver an industry-realistic and teamwork-centric software development approach. We propose incorporating Technology Acquisition Plans, which are based on an existing SCRM curriculum, and add acquisition planning, bidding, and risk monitoring activities to the project and development activities. Empirical evaluation and classroom observations show that while students' ability to justify the need for third-party acquisitions remains the same, self-reported ability to evaluate and bid on alternatives is improved. Furthermore, statistically significant improvement can be seen in areas pertaining to risk monitoring, problem detection, and problem resolution.
Due to the continuous evolution of software systems, their architecture is subject to damage and the formation of numerous design issues. this empirical study focuses on the co-occurrence of design smells in software ...
详细信息
ISBN:
(纸本)9789897586477
Due to the continuous evolution of software systems, their architecture is subject to damage and the formation of numerous design issues. this empirical study focuses on the co-occurrence of design smells in software systems and refactoring activities. To this end, a detailed analysis is carried out of the data relating to the presence of Design Smells, the use of refactoring, and the consequences of such use. Specifically, the evolution of 17 different types of design odors in five open-source Java software projects has been examined. Overall, the results indicate that the application of refactoring is not used by developers on design smells. this work also offers new and interesting insights for future research methods in this field.
暂无评论