The recent revolution of intelligent systems made it possible for robots and autonomous systems to work alongside humans, collaborating with them and supporting them in many domains. It is undeniable that this interac...
详细信息
Both graph structures and textual information play a critical role in Knowledge Graph Completion (KGC). With the success of Pre-trained Language Models (PLMs) such as BERT, they have been applied for text encoding for...
详细信息
Unit testing focused on the Modified Condition/Decision Coverage (MC/DC) criterion is essential in development of safety-critical systems as recommended by international standards. Designing unit tests for such specif...
详细信息
ISBN:
(数字)9781728189154
ISBN:
(纸本)9781728189161
Unit testing focused on the Modified Condition/Decision Coverage (MC/DC) criterion is essential in development of safety-critical systems as recommended by international standards. Designing unit tests for such specific software is time-consuming task which can be partially automated by test data generation methods. Special attention is given to search-based methods which are often used for problems where traditional methods like symbolic execution fall short. However, no publicly available dataset for evaluation of such methods taking into account specifics of the MC/DC criterion, which is esential for safety-critical systems. In this paper we present an analysis of software of safety-critical systems and we postulate to find a fitting open source project which could serve as a synthesized dataset for future evaluations of search-based test data generation methods for the MC/DC criterion.
In the area of Cyber-Physical Systems (CPS), the degree of complexity continuously increases mainly due to new key-enabling technologies supporting those systems. One way to deal with this increasing complexity is to ...
ISBN:
(数字)9781728189567
ISBN:
(纸本)9781728189574
In the area of Cyber-Physical Systems (CPS), the degree of complexity continuously increases mainly due to new key-enabling technologies supporting those systems. One way to deal with this increasing complexity is to create a digital representation of such systems, a so-called Digital Twin (DT), which virtually acts in parallel ideally across the entire life-cycle of a CPS. For this purpose, the DT uses simulated or real-time data to mimic operations, control, and may modify the CPS's behaviour at runtime. However, building such DTs from scratch is not trivial, mainly due to the integration needed to deal with heterogeneous systems residing in different technological spaces. In order to tackle this challenge, Model-Driven engineering (MDE) allows to logically model a CPS with its physical components. Usually, in MDE such "logical models" are created at design time which keep them detached from the deployed system during runtime. Instead of building bilateral solutions between each runtime environment and every engineering tool, a dedicated integration layer is needed which can deal with both, design and runtime aspects. Therefore, we present a reference architecture that allows on the one side to query data from model repositories to enrich the running system with design-time knowledge, and on the other side, to be able to reasoning about system states at runtime in design-time models. We introduce a model repository query and management engine as mediator and show its feasibility by a demonstration case.
Education is gradually moving from traditional classroom-based setting to online-based. E-learning has become the topic of discussion as far as cybersecurity is concerned. E-learning as a mode of acquiring knowledge a...
ISBN:
(数字)9781728169392
ISBN:
(纸本)9781728169408
Education is gradually moving from traditional classroom-based setting to online-based. E-learning has become the topic of discussion as far as cybersecurity is concerned. E-learning as a mode of acquiring knowledge and skills through electronic means, cannot be achieved without internet technology. In other words, it depends largely on the internet technology for the sharing of ideas and information. However, the network environment is a home for hackers and the internet fraudless. As the reach of the internet expands to cover ever broader aspects of our education and social welfare, cybersecurity is the major concern when dealing with privacy, authentication, and confidentiality of user's information stored in a database server. Most often hackers release attacks designed to steal confidential data and an organization's database servers are the targets of these attacks because they are the core of any organization, storage bank. Hence, it is very important to put strong security measures in place to protect the data and information of the end-user against any malicious attack. This paper, therefore, aimed to discuss cybersecurity issues related to the e-learning management system, the significance of the e-Learning, and the Database Management System. Again the paper discusses top security issues in databases and how to lessen them.
Recently, Unmanned Aerial Vehicles (UAVs) present a promising advanced technology that can enhance people life quality and smartness of cities dramatically and increase overall economic efficiency. UAVs have attained ...
详细信息
Features in a software system usually must satisfy different quality expectations originating from the various stakeholders of a software system, ranging from direct users to the software manufacturer. As an example, ...
详细信息
ISBN:
(纸本)9781728134222
Features in a software system usually must satisfy different quality expectations originating from the various stakeholders of a software system, ranging from direct users to the software manufacturer. As an example, the design quality of the source code will likely be more important if the associated feature is frequently used by customers or if it has strategic value for the software manufacturer. In order to effectively approach these qualitative subtleties, we need a means to specify non-functional requirements on the level of individual software features. Fine-grained specification of non-functional requirements on feature level respects their individual relevance for a feature and facilitates deriving suitable constraints for them. Particularly in DevOps-driven software projects with operational data the fulfillment of non-functional requirements for individual features can then continuously be evaluated. This guides software engineers in meeting these quality expectations on a much finer level than if treated uniformly across the software system. In this paper we present an extension of the QUAMOCO meta quality model for specifying and evaluating non-functional requirements on feature level. While the existing meta model focused on static quality measures, the extension of the meta model now also captures dynamic measures which accumulate during feature execution. An exploratory case study based on the results from an interview study shows the completeness of the approach for specifying and evaluating feature-dependent non-functional requirements.
暂无评论