The propagation of 5G, beyond 5G and Internet of Everything (IoE) networks are the key business force for future networks and its various applications. These networks have been constantly under various assaults by mea...
详细信息
The propagation of 5G, beyond 5G and Internet of Everything (IoE) networks are the key business force for future networks and its various applications. These networks have been constantly under various assaults by means of blocking and tracking information. Therefore, it is essential to develop a real-time recognition system to handle these assaults. But, not sufficient research has been conducted in this area so far. Hence we propose a model to recognize various assaults via online in 5G, beyond 5G and IoE networks using dominance based rough set and formal concept analysis. For analyzing the model, this paper incorporates legal and simulated 5G, beyond 5G and IoE network traffic, along with various types of assaults. The dominance based rough set is used to identify the assaults whereas chief features that are involved in various assaults are identified using formal concept analysis. The results acquired explain the capability of the projected research.
The goal of using virtual and augmented reality technologies in therapeutic interventions simulation, in the fixed prosthodontics (VirDenT) project, is to increase the quality of the educational process in dental facu...
详细信息
The goal of using virtual and augmented reality technologies in therapeutic interventions simulation, in the fixed prosthodontics (VirDenT) project, is to increase the quality of the educational process in dental faculties, by assisting students in learning how to prepare teeth for all-ceramic restorations. Its main component is an e-learning virtual reality-based software system that will be used for the developing skills in grinding teeth, needed in all-ceramic restorations. The complexity of the domain problem that the software system dealt with made the analysis of the information system supported by VirDenT necessary. The analysis contains the following activities: identification and classification of the system stakeholders, description of the business processes, formulation of the business rules, and modelling of business objects. During this stage, we constructed the context diagram, the business use case diagram, the activity diagrams and the class diagram of the domain model. These models are useful for the further development of the software system that implements the VirDenT information system. (C) 2011 Elsevier Ireland Ltd. All rights reserved.
The presence of a subsurface ocean on Ganymede moon, the largest and the only moon of solar system that has global magnetic field, marks the existence possibility of sustainable life ecosystems. The phases of this mis...
详细信息
ISBN:
(纸本)9798400706226
The presence of a subsurface ocean on Ganymede moon, the largest and the only moon of solar system that has global magnetic field, marks the existence possibility of sustainable life ecosystems. The phases of this mission involve to launch spacecraft from Earth or the Moon to be landed on the Ganymede moon, using satellite constellation about Ganymede moon, to drill the icy crust of Ganymede moon, reaching the subsurface ocean, and placing submarines or submersibles in the subsurface ocean. The process involves obtaining a sample, analyzing the sample, performing documentation, and reporting the Data to DSN. In this research study, the approach to modeling space systems aims to achieve a mission probability of success of 99% and better, as the author's plans & approach are depicted in Figure.1. The context diagram of this research project encircles active, passive, and paying external stakeholders, with detailed specifications provided in a hierarchy diagram for a probe exploration mission on Ganymede, one of Jupiter's moons. The Pugh diagrams was used to evaluate drilling methods for the Ganymede mission. Quality Function Deployment (QFD) at Level-3 aligned stakeholder needs with engineering design, ensuring mission objectives were met. A Functional Flow Block diagram (FFBD) illustrated mission workflows, while a risk matrix identified and mitigated potential mission risks.
The importance of requirements elicitation in the realm of information engineering, software engineering, RE (Requirements Engineering) or IS (Information Systems) development forms the basis of the system to be devel...
详细信息
ISBN:
(纸本)9781479962396
The importance of requirements elicitation in the realm of information engineering, software engineering, RE (Requirements Engineering) or IS (Information Systems) development forms the basis of the system to be developed. This paper presents a structured approach to understanding the big picture of a problem domain as the preliminary criterion for successful development of a verified and validated IS. Present needs are met with a number of contextual diagrams and tools exist to aid the systems analysis process. In this paper, a new approach to understand the context of the problem domain as the initial step in system and requirement analysis is proposed. ContoGram, a contextual requirement gathering tool, is an approach to understanding the problem domain in a nutshell, and with a bird's eye view. The proposed tool is presented in this paper in terms of a conceptual description and its application in a mini case-study.
A large number of analysis methods are used to analyse and document software problems. Among these, Michael Jackson's problem frames is an approach to identifying and describing recurring software problems. Data a...
详细信息
ISBN:
(纸本)1595934073
A large number of analysis methods are used to analyse and document software problems. Among these, Michael Jackson's problem frames is an approach to identifying and describing recurring software problems. Data and business transactions are a recurrent software problem pattern in business and commerce systems. This paper demonstrates that problem frames can effectively capture and describe transactional problems. An extended version of the workpiece frame is proposed for this purpose. We found that problem frames can accommodate the critical transactional properties on diagrams and identify the difficulties associated with solving it.
Proper identification of stakeholders is the first step to bound the system of interest and ultimately to correctly define the problem of concern. Research has traditionally addressed the process of identifying stakeh...
详细信息
Proper identification of stakeholders is the first step to bound the system of interest and ultimately to correctly define the problem of concern. Research has traditionally addressed the process of identifying stakeholders using stakeholder-centric methods such as brainstorming (unstructured or with discipline-specific taxonomies). These approaches are grounded on the idea of listing entities that have a relation to the system and then analyze their mutual relationships so that their relative importance with respect to the system can be assessed. Yet, these methods do not provide any mechanism to ensure completeness and thus introduce a high level of uncertainty in the definition of the problem at the beginning of the system life-cycle. The present research proposes instead a contextual- and behavioral-centric approach for stakeholder identification. Using systems thinking the focus is put on understanding all the underlying relationships, be them complex or simple, of the system within its environment and during its existence by comprehensively modeling its socio-technical context and behavior. As a result stakeholders no longer need to be sought, but they comprehensively emerge out of the holistic understanding of the system.
暂无评论