Top PDF An automated wrapper based approach to the design of dependable software

An automated wrapper based approach to the design of dependable software

An automated wrapper based approach to the design of dependable software

As computer systems become pervasive, our reliance on computer software to provide correct and timely services is ever-increasing. To meet these demands it is important that software be dependable [1]. It has been shown that a dependable software must contain two types of artefact; (i) error detection mechanisms (EDMs) and (ii) error recov- ery mechanisms (ERMs) [2], where EDMs are commonly known as detectors and ERMs as correctors. A detector is a component that asserts the validity of a predicate during execution, whilst a corrector is a component that enforces a predicate. Examples of detectors include runtime checks and error detection codes. Examples of correctors include exception handlers and retry [3]. During the execution of a dependable software, an EDM at a given location evaluates whether the corresponding predicate holds at that location, i.e., it attempts to detect an erroneous state. When an erroneous state is detected, an ERM will attempt to restore a suitable state by enforcing a predicate, i.e., it attempts to recover from an erroneous state. Using EDMs and ERMs it is possible to address the error propagation problem. A failure to contain the propagation of erroneous state across a software is known to make recovery more difficult [4].
Show more

9 Read more

Patterns for the design of secure and dependable software defined networks

Patterns for the design of secure and dependable software defined networks

In an interconnected world, cyber and physical networks face a number of chal- lenges that need to be resolved. These challenges are mainly due to the nature and complexity of interconnected systems and networks and their ability to support hetero- geneous physical and cyber components simultaneously. The construction of complex networks preserving security and dependability (S&D) properties is necessary to avoid system vulnerabilities, which may occur in all the different layers of Software De- fined Networks (SDN) architectures. In this paper, we present a model based approach to support the design of secure and dependable SDN. This approach is based on ex- ecutable patterns for designing networks able to guarantee S&D properties and can be used in SDN networks. The design patterns express conditions that can guarantee specific S&D properties and can be used to design networks that have these proper- ties and manage them during their deployment. To evaluate our pattern approach, we have implemented executable pattern instances, in a rule-based reasoning system, and used them to design and verify wireless SDN networks with respect to availability and confidentiality. To complete this work, we propose and evaluate an implementation framework in which S&D patterns can be applied for the design and verification of SDN networks.
Show more

26 Read more

Patterns for the design of secure and dependable software defined networks

Patterns for the design of secure and dependable software defined networks

Permanent repository link: http://openaccess.city.ac.uk/15284/ Link to published version: http://dx.doi.org/10.1016/j.comnet.2016.06.028 Copyright and reuse: City Research Online aims to[r]

6 Read more

The early identification of detector locations in dependable software

The early identification of detector locations in dependable software

Abstract—The dependability properties of a software system are usually assessed and refined towards the end of the software development lifecycle. Problems pertaining to software dependability may necessitate costly system redesign. Hence, early insights into the potential for error propagation within a software system would be beneficial. Further, the refinement of the dependability properties of software involves the design and location of dependability components called detectors and correctors. Recently, a metric, called spatial impact, has been proposed to capture the extent of error propagation in a software system, providing insights into the location of detectors and correctors. However, the metric only provides insights towards the end of the software development life cycle. In this paper, our objective is to investigate whether spatial impact can enable the early identification of locations for detectors. To achieve this we first hypothesise that spatial impact is correlated with module coupling, a metric that can be evaluated early in the software development life cycle, and show this relationship to hold. We then evaluate module coupling for the modules of a complex software system, identifying modules with high coupling values as potential locations for detectors. We then enhanced these modules with detectors and perform fault-injection analysis to determine the suitability of these locations. The results presented demonstrate that our approach can permit the early identification of possible detector locations.
Show more

11 Read more

A Semantic Rule Based Approach for Software Privacy by Design

A Semantic Rule Based Approach for Software Privacy by Design

The more advanced relationship between concepts is being constructed using Web Ontology Language (OWL). OWL extends the vocabulary of RDF by providing more meanings to the triples. OWL is based on description logic, thus its construction has well-defined meanings which are used to describe domain concepts and their relationships in an ontology. Description logic enables automated logical reasoning techniques. The reasoner allows logical conclusion and consistency checks on classes, individual instances and properties. However, OWL does not include a composition conductor in order to capture chain relationships. Semantic Web Rule Language (SWRL) extends OWL with Horn-like rules based on the rule mark- up language RuleML. It enables automatic deduction of new knowledge from existing facts. Thus, SWRL rules ultimately increase the expressivity of OWL-DL. Ontology can be constructed manually using dedicated software tools such as TERMINAE, PROTEGE, HOZO and others [13]-. Here we have used Protégé and FACT ++ as the reasoner in order to construct our ontologies and further our approach. Our semantic model which is called RUL-SoPD, consists of four main ontologies: Requirement Engineering, Design, Compliance and risk (Fig 1). Design ontology is where designing system and its relevance compliance and design resources are being discovered.
Show more

7 Read more

An Automated Approach for Software Fault Detection and Recovery

An Automated Approach for Software Fault Detection and Recovery

Many researchers dedicated their efforts to the field of automated software recovery. Dashofy, Philip Koopman proposed a taxonomy for the problem space for self-healing systems including system completeness, design context, fault models, and system responses [2] [3]. Jiang, et al. presented a generic modeling framework to fa- cilitate self-healing development system software and introduced a model-based approach which is used to ca- tegorize software failures and specify their dispositions at the model level [5]. George et al. was inspired by bi- ological strategies to develop cell-based programming model that has robust and scalable features for software systems self-healing [6]. Fuad et al. presented a new method that use matching a fault scenario for finding self-healing actions by established fault models [7].
Show more

12 Read more

2DCBS: A Model for Developing Dependable Component-Based Software

2DCBS: A Model for Developing Dependable Component-Based Software

Abstract: The software industry has adopted component-based software development (CBSD) to rapidly build and deploy large and complex software systems with significant savings at minimal engineering effort, cost, and time. However, CBSD encounters issues on security trust, mainly with respect to dependability attributes. A system is considered dependable when it can produce the outputs for which it was designed with no adverse effect on its intended environment. Dependability consists of several attributes that imply availability, confidentiality, integrity, reliability, safety, and maintainability. Dependability attributes must be embedded in a CBSD model to develop dependable component software. Motivated by the importance of these attributes, this paper pursues two objectives: to design a model for developing a dependable system that mitigates the vulnerabilities of software components, and to evaluate the proposed model. The model proposed in this study is labelled as developing dependable component-based software (2DCBS). To develop this model, the CBSD architectural phases and processes must be framed and the six dependability attributes embedded according to the best practice method. The expert opinion approach was applied to evaluate 2DCBS framing. In addition, the 2DCBS model was applied to the development of an information communication technology (ICT) portal through an empirical study method. Vulnerability assessment tools (VATs) were employed to verify the dependability attributes of the developed ICT portal. Results show that the 2DCBS model can be adopted to develop web application systems and to mitigate the vulnerabilities of the developed systems. This study contributes to CBSD and facilitates the specification and evaluation of dependability attributes throughout model development. Furthermore, the reliability of the dependable model can increase confidence in the use of CBSD for industries.
Show more

30 Read more

Entropy based automated wrapper generation for weblog data extraction

Entropy based automated wrapper generation for weblog data extraction

coined by the authors [16] of the tool. However, as one of the earlier attempts, the use of the tool is restricted to a specific page structure and the heuristics of the presented data. Furthermore, it is not designed to work with nested structures of web data. The limitation of working with hierarchical data has been addressed by the Stalker tool [20]. However, the use of Stalker requires a training data set that limits the degree of automation offered by the sys- tem. An attempt to automate the process of wrapper induction was made by Crescenzi et al. [6] and published along with the RoadRunner tool, which analyses structurally similar resources and generates a common schema for ex- tracting the data. NoDoSE [1] represents a different, modelling-based category of tools that requires an existing model that defines the process of extraction. This is a semi-automatic approach due to the necessary human input for de- veloping models. However, additional tools, such as a graphical user interface for marking resources, can be used for reducing the human workload of de- veloping the models. Hence, the review of the earlier work suggests that the approach proposed in this paper addresses a niche not served by the existing tools.
Show more

24 Read more

Formal Software Design Technique – A Pattern Based Approach

Formal Software Design Technique – A Pattern Based Approach

To sort out these issues and to explicitly visualize design patterns in class diagrams, we define a UML extension mechanism which includes tagged-value notations. Here we introduce two new tag names and five new values of the tagged value notation, which will improve the visual representation of pattern related information. The two tag names are role and scope and the five values of the tagged-value are client, agent, server, local and remote. Role of a class actually provides information about a class under any design pattern in a system. A class may perform more than one role but that is possible when the class is participating in more than one design patterns. Whether a class resides in a client side or in the server side or it is performing other role in other design pattern, the new tag name “role” represents that. The value of the tag “role” for a class may be one of client, server or agent or any existing value. Also to resolve the first issue that is a participating class performing a specific role represents which design pattern, we have extended the tagged value notation. We propose in the way as : if a tagged value notation of a class XYZ is XYZ{role: client/Pattern} this signifies that the class XYZ performs the role of a client under design pattern “Pattern”. “Pattern” points to any of the existing design pattern. On the other hand if a tagged value notation of a class XYZ is XYZ{role: agent/Pattern} this signifies that the class XYZ is in the client side of design pattern “Pattern” but it is the proxy class of the server. Similarly role of a method denotes the actual work is being done by it. Scope describes class methods whether the execution of a method is in the scope of the local system or a remote system. Its value is either local or remote.
Show more

12 Read more

Component based software engineering: a pragmatic approach to software development in 21st century

Component based software engineering: a pragmatic approach to software development in 21st century

based software engineering approach to software development employs the techniques of selecting reliable and reusable software components and assembling them within appropriate This approach is unique because it brings about designs that make a clear separation between the stable parts of the system from the . The rising need of software in 21 st century is indeed of a great n demand for software, software engineers need a proactive and pragmatic approach that will handle the situation on ground. Although object oriented approach helped in giving birth to software that reflect the object of the problem domain, the approach does not necessarily produce software architectures that can easily adapt to the changing requirements of users based software engineering, the software team will first establish he architectural design is made and detailed design omitted instead the team examines requirements to determine what subset is directly amenable to composition based software engineering would help software developers to quality, reliable and easily maintainable software that meets user’s requirements. It will also bring about significant reduction in the development cost and time since developers can quickly are components rather than build everything from the scratch. Furthermore, it will lead to designs that will be easily adapted to meet the changing
Show more

8 Read more

Feature Subset Selection in Large Dimensionality Micro array using Wrapper Method: A Review

Feature Subset Selection in Large Dimensionality Micro array using Wrapper Method: A Review

Multiclass SVMs: DAGSVM The training phase of this algorithm is similar to the OVO approach using multiple binary SVM classifiers; however, the testing phase of DAGSVM requires the construction of a rooted binary decision directed acyclic graph (DDAG) using _k2_ classifiers. Each node of this graph is a binary SVM for a pair of classes, say (p, q). On the topologically lowest level there are k leaves corresponding to k classification decisions. Every non-leaf node (p, q) has two edges—the left edge corresponds to decision ‘not p’ and the right one corresponds to ‘not q’. The choice of the class order in the DDAG list can be arbitrary as shown empirically in Platt et al. (2000). In addition to inherited advantages from the OVO method, DAGSVM is characterized by a bound on the generalization error.
Show more

7 Read more

A Petri net occam based methodology for the development of dependable distributed control software

A Petri net occam based methodology for the development of dependable distributed control software

Cellular manufacturing [Greene 1985] came from and is a specialisation o f ‘group technology’. Group technology is the “bringing together and organising of common concepts, principles, problems and tasks to improve productivity”; cellular manufacturing is the “physical division of the manufacturing facilities machinery into production cells”; “each cell is designed to produce a part family”; and a part family is a “set of parts that require similar machinery, tooling, machine operations, and/or jigs and fixtures”. Computer controlled manufacturing equipment (machine tools, work handling, sensors and actuators) can be made to co-operate under the direction of the manufacturing control software. Selecting equipment with appropriate flexibility and deploying it according to a flexible manufacturing strategy will result in an FMS. Eight categories of flexibility have been identified [Browne 1985] for FMSs, refer to Table 2-1. Flexibility Description
Show more

241 Read more

End to End Development Engineering

End to End Development Engineering

The history of software engineering shows that a soft- ware design model is a complex object that needs to be maintained during a project life cycle and refined over a long period. CASE tool (computer-aided software engi- neering) is used to allow easy model creation, editing, rendering etc. In this case, a tool designer utilizes infor- mation system technology to keep this complex object in a database called a repository. A repository consists of a schema which stores model instances [6]. In fact this re- pository does not need the complete commercial database machinery. There are recently emerging MOF-standards like XMI [30] used as a mechanism not only for persis- tence purpose but also as a mechanism for exchanging models between tools which it was difficult before in a classic CASE tool (i.e. magic draw, rational rose). Many recent MOF-based toolsets support in addition to effi- cient access methods, both system and user- defined API serialization mechanisms in which developers can render a model using an XMI concrete syntax for different pur- poses. There are many tools with different features and capabilities working in this context, extensively studied in [31]. EMF [32] an open platform adopting MDA prin- ciples provides a Java code-generation facility to achieve interoperability between applications based on a MOF meta-modeling framework.
Show more

22 Read more

Use of an interdisciplinary, participatory design approach to develop a usable patient self-assessment tool in atrial fibrillation

Use of an interdisciplinary, participatory design approach to develop a usable patient self-assessment tool in atrial fibrillation

‘Know Your Colours’ was designed to allow patients to use it easily and enable them to better understand AF and, help them assess whether they are being optimally managed based on their risk of stroke and general symptoms. Through increas- ing patient understanding of AF symptoms and management, the end goal will be to empower patients to self-assess their condition and consult with their primary health care provider if they are being sub-optimally managed or have additional questions.

8 Read more

Self supervised automated wrapper generation for weblog data extraction

Self supervised automated wrapper generation for weblog data extraction

The concept of using web feeds for capturing data is not new. ArchivePress is one of the weblog archiving projects that have developed solutions for harvesting the content of weblog feeds [14]. The solution focuses solely on collecting the structured content of weblog feeds that contain posts, comments and embedded media. The solution provided by ArchivePress remains highly limited, due to the fixed number of entries and partial content (i.e. post summary) found in feeds. Another approach that attempts to exploit web feeds was developed by Oita and Sellenart [13]. This approach is based on evaluating a web page and matching it to the properties found in the corresponding web feed. The general principle of cross-matching web feeds and pages constitutes the foundation of the approach that we propose in this paper. However, because the approach by Oita and Sellenart does not devise general extraction rules, it remains inapplicable for capturing the data that are no longer available in the corresponding web feed. Additionally, the performance of their approach for extracting distinct properties such as title was reported as poor (no figures were provided in the paper).
Show more

11 Read more

Structuralism as an Approach to the Theoretical Construction of Poetic Narratology

Structuralism as an Approach to the Theoretical Construction of Poetic Narratology

Among those perspectives mentioned above one after another respectively, new criticism has always been besting the perspectives related to other theories because poetic scholars or poetic critics who have been interested in the internal studies of poetic texts have been insisting that poetic texts should be interpreted in details from the perspective of new criticism because of the inerasable influence of such an academic values that the poetic studies based on poetic texts ought to be emphasized on the formal studies rather than thematic studies of poetic texts. For this sake, poetic studies have been reduced just to ontological studies from the perspective of new criticism on the ground that poetry scholars have rarely paid any attention to its content, its context as well as its consensus between readers and poets at all, but to its coherence, rhythms, metaphors, features as such. To put it simply, previous poetic studies are no more than the ontological studies of poetic texts owing to the failure of a variety of poetic scholars and poetic critics to combine poetic studies with narratology in the abstract sense. In this case, poetic studies have been thrown into the corner of new critical studies that have been so popular with poetic scholars, poetic critics and poetic theorists that the theoretical insights of other literary theories have been thoroughly ruled out or at least overlooked. It is not until the latest moment that poetic studies have gradually liberated from the bonds and chains of its previous new critical studies to embrace other theories that can be adopted to interpret poetic texts.
Show more

22 Read more

An Improved Architectural Design of the Internet

An Improved Architectural Design of the Internet

To give the sort of the work that another bend effort may perform, we can look at two past instances of basic "thought tests". The first was Application Layer Framing or ALF. ALF was proposed as another basic fragment with specific targets – cut down cost and more versatile use, more beneficial action over varying structure (package and ATM), fruitful help for a more broad extent of usage requirements, and so on. While the ALF thought as proposed was not given a part as in incremental change to the Internet designing yet rather as another and unmistakable approach, distinctive authorities used the ALF thought as the purpose behind the execution of new applications over the present framework. It could be reconsidered as a bit of another plan.
Show more

7 Read more

DESIGN AND FABRICATION OF AUTOMATED SPADE

DESIGN AND FABRICATION OF AUTOMATED SPADE

Here fabrication of Automated spade is mainly reducing the manual effort and increasing the efficiency whilethe operations of the farmers.In this project all the components are placed on the base frame. There are four wheels to move this vehicle. The fuel tank is connected with the engine for the continuous supply of fuel to the engine. The engine shaft is connected with a worm drive. The worm gear is attached with a soil cutter.We have to start the engine and move the vehicle in the respective direction. So that the worm gear will rotate with respect to the engine speed, here worm gear is used to minimize the speed of the engine.A worm drive is a gear arrangement in which a worm (which is a gear in the form of a screw) meshes with a worm gear (which is similar in appearance to a spur gear). The two elements are also called the worm screw and worm wheel. The terminology is often confused by imprecise use of the term worm gear to refer to the worm, the worm gear, or the worm drive as a unit. When the worm gear rotates the blade attached to it also rotates and dig the soil. Hence, by using this method we can easily finish the digging process in agriculture.
Show more

30 Read more

An Advanced Mechatronic Approach to Open Machine-Control Design

An Advanced Mechatronic Approach to Open Machine-Control Design

This paper addresses the field of factory automation within the scope of flexible production systems. It presents a new mechatronic approach to machine control, which introduces an integrated and interdisciplinary method to holistic machine design. The mechanical, electronic and informatics aspects of a production system are involved synergistically. The paper describes a distributed control architecture for a cutting machine. In addition, it applies a new approach to the development of control functions. The controller was built on the open QNX real-time operating system for the PC architecture. The commonly accepted graphical-user-interface environment of Microsoft Windows serves as the front-end of the HMI. The controller and the HMI are interconnected by an Ethernet TCP/IP link that is extended to the office-level of factory automation. A new method for describing logic control functions introduces a modular logic controller that is specified and formalized using a matrix representation of Petri nets. It allows a system simulation and an off-line analysis that can significantly shorten a machine control development cycle. The new method is compatible with standard programming languages for logic controllers. Furthermore, it represents a basis for the design of more efficient, reliable, and user-friendly machine control.
Show more

18 Read more

The Design of Automated Storage and Retrieval Systems Using a Simulation Modeling Approach

The Design of Automated Storage and Retrieval Systems Using a Simulation Modeling Approach

A simulation model of a single and a multi-shuttle automated storage and retrieval systems is presented in this paper. The main object of the presented research was to determine the efficiency of multi- shuttle systems versus single-shuttle systems, which represents the main share and support in the design process of automated storage and retrieval systems. An improvement of the throughput capacity of the transport unit load is possible with the use of multi- versus single-shuttle systems. Single-shuttle systems are frequently used in engineering practice, and they are based on the dual command cycle, while multi-shuttle systems are based on the quadruple and sextuple command cycles. The main problem is how to incorporate an appropriate control policy so that the condition of minimal empty travel of the storage and retrieval machine will be fulfilled. A special heuristics method, “Strategy x”, that sequences storage and retrieval requests in order to minimize the average travel time has been used for this purpose. Discrete event simulations were used to evaluate the heuristics performances within multi-shuttle systems. The results of simulation analyses showed significant improvements in the throughput capacity for multi-shuttle systems in comparison with single-shuttle systems.
Show more

26 Read more

Show all 10000 documents...