• Title/Summary/Keyword: software intensive systems

Search Result 59, Processing Time 0.022 seconds

AGING TEST AND SOFTWARE RELIABILITY ANALYSIS METHOD FOR PC-BASED CONTROLLER

  • Song Jun-Yeob;Jang Ju-Su
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.969-973
    • /
    • 2005
  • This paper presents a survey of software reliability modeling and it's application to pre-built software system combined with hardware such as numerical controller based on personal computer systems. Many a systems in these days are much more becoming software intensive and many software intensive systems are safety critical. For this reason, the technique well developed to measure of software reliability is very important for whom to assess such a system. This paper provides a brief idea of method to evaluate such a system's reliability based on hardware performance.

  • PDF

Design and Application of the Warfighting Experiment Process Using the Intelligent Maturity Model in Software Intensive Systems (지능형 성숙도 모델을 이용한 소프트웨어 집약 시스템의 전투실험 프로세스 설계 및 적용)

  • Kang, Dong-Su;Yoon, Hee-Byung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.5
    • /
    • pp.668-673
    • /
    • 2007
  • We propose the design of the warfighting experiment process for software intensive systems using the intelligent maturity model and suggest the application results of the target searching capability in smart UAV. For this, we design the intelligent maturity model to evaluate the intelligent degree of the software intensive systems considering the domain and intelligent level. Then we classify the IS0/1EC-12207 process and CMMI process as LITO domain for designing the warfighting experiment process, map the classifed process to the five factors of the warfighting experiment and derive the process as warfighting experiment element and phase. Based on the derived process, we design the warfighting experiment process using the IDEF0. Finally we apply the proposed process to the target search capability and suggest the results which are required to develop and acquire the smart UAV.

A Security Metrics Taxonomization Model for Software-Intensive Systems

  • Savola, Reijo M.
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.197-206
    • /
    • 2009
  • We introduce a novel high-level security metrics objective taxonomization model for software- intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emphasizes the roles of security-enforcing mechanisms, the overall security quality of the system under investigation, and secure system lifecycle, project and business management. Security correctness, effectiveness and efficiency are seen as the fundamental measurement objectives, determining the directions for more detailed security metrics development. Integration of the proposed model with riskdriven security metrics development approaches is also discussed.

A Systematic Design Method for Service System Development based on Similarity between Software System and Service System (소프트웨어 시스템과 서비스 시스템의 유사성에 기반한 서비스 시스템 개발을 위한 체계적 설계 기법)

  • Jeon, Won-Young;Chang, Soo-Ho;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.5
    • /
    • pp.407-418
    • /
    • 2007
  • Service science is a new application area that implements services in an interdisciplinary area of management, economics, and engineering. Service systems provide functionalities of traditional software systems, moreover the functionalities are more intellectual in that they require dynamic context awareness, analysis, and decision making based on the recognized and analyzed contexts. However, conventional software development approaches do not sufficiently provide methods to model the service requirements and to design service-intensive systems. Therefore, there is a great demand on effective methodologies for developing service systems. In this paper, we compare traditional software systems with service-intensive systems in order to identify characteristics of the service systems. And, we propose a step-wise process to model service systems, in terms of architecture, components, and workflows. Then, we show a case study on an emergency handling system which is a type of living assistant systems. We believe that the proposed approach can be used in developing high-quality service systems effectively.

A Study of Software Hazard Analysis for Safety Critical Function in Military Aircraft

  • Oh, Hung-Jae;Hong, Jin-Pyo
    • Journal of IKEEE
    • /
    • v.16 no.2
    • /
    • pp.145-152
    • /
    • 2012
  • This paper is the Software Hazard Analysis (SWHA) which will study the managerial process and the technical methode and techniques inherent in the performance of software safety task within the Military Aircraft System Safety program. This SWHA identifies potential hazardous effects on the software intensive systems and provides a comprehensive and qualitative assessment of the software safety. The purpose of this paper is to identify safety critical functions of software in Military A/C. The identified software hazards associated with the design or function will be evaluated for risks and operational constraint to further improve the software design requirement, analysis and testing efforts for safety critical software. This common SWHA, the first time analysis in KOREA, was review all avionics OFP(Operational Flight Program), and focus only on software segments which are safety critical. This paper provides a important understanding between the customer and developer as to how the software safety for the Military A/C will be accomplished. It will also provide the current best solution which may as one consider the necessary step in establishing a credible and cost-effective software safety program.

Emotion-aware Task Scheduling for Autonomous Vehicles in Software-defined Edge Networks

  • Sun, Mengmeng;Zhang, Lianming;Mei, Jing;Dong, Pingping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3523-3543
    • /
    • 2022
  • Autonomous vehicles are gradually being regarded as the mainstream trend of future development of the automobile industry. Autonomous driving networks generate many intensive and delay-sensitive computing tasks. The storage space, computing power, and battery capacity of autonomous vehicle terminals cannot meet the resource requirements of the tasks. In this paper, we focus on the task scheduling problem of autonomous driving in software-defined edge networks. By analyzing the intensive and delay-sensitive computing tasks of autonomous vehicles, we propose an emotion model that is related to task urgency and changes with execution time and propose an optimal base station (BS) task scheduling (OBSTS) algorithm. Task sentiment is an important factor that changes with the length of time that computing tasks with different urgency levels remain in the queue. The algorithm uses task sentiment as a performance indicator to measure task scheduling. Experimental results show that the OBSTS algorithm can more effectively meet the intensive and delay-sensitive requirements of vehicle terminals for network resources and improve user service experience.

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

  • Elhabob, Rashad;Zhao, Yanan;Sella, Iva;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4742-4770
    • /
    • 2019
  • Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.

On Improving the Object-Oriented Method for Real-Time System by Applying the SE Process (SE프로세스를 통한 객체지향 실시간시스템 개발 방법론의 개선에 관한 연구)

  • Lee, Byoung Gil;Lee, Jae Chon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.2 no.2
    • /
    • pp.21-26
    • /
    • 2006
  • In modern systems technology, increasingly more systems are anticipated to operate in real-time environment. These systems are usually complex to implement since it is not easy to satisfy the real-time requirement for both hardware and software components simultaneously. In this paper, we first review an object-oriented development process that was proposed earlier for software-intensive real-time system using the Unified Modeling Language (UML). We then study how to improve the problems that the UML approach might have. Applying the systems engineering(SE) process yields useful results which include : 1) an improved requirements management over the whole system life-cycle ; 2) a detailed scenario on how to carry out the SE process ; and 3) a conversion process from the text-based requirements to the UML-based graphic ones.

  • PDF

Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components

  • Liu, Chen;Granados, Omar;Duarte, Rolando;Andrian, Jean
    • Journal of Information Processing Systems
    • /
    • v.8 no.1
    • /
    • pp.133-144
    • /
    • 2012
  • In order to make cognitive radio systems a practical technology to be deployed in real-world scenarios, the core Software Defined Radio (SDR) systems must meet the stringent requirements of the target application, especially in terms of performance and energy consumption for mobile platforms. In this paper we present a feasibility study of hardware acceleration as an energy-efficient implementation for SDR. We identified the amplifier function from the Software Communication Architecture (SCA) for hardware acceleration since it is one of the functions called for most frequently and it requires intensive floating-point computation. Then, we used the Virtex5 Field-Programmable Gate Array (FPGA) to perform a comparison between compiler floating-point support and the on-chip floating-point support. By enabling the on-chip floating-point unit (FPU), we obtained as high as a 2X speedup and 50% of the overall energy reduction. We achieved this with an increase of the power consumption by no more than 0.68%. This demonstrates the feasibility of the proposed approach.

Rule-Based Fuzzy Polynomial Neural Networks in Modeling Software Process Data

  • Park, Byoung-Jun;Lee, Dong-Yoon;Oh, Sung-Kwun
    • International Journal of Control, Automation, and Systems
    • /
    • v.1 no.3
    • /
    • pp.321-331
    • /
    • 2003
  • Experimental software datasets describing software projects in terms of their complexity and development time have been the subject of intensive modeling. A number of various modeling methodologies and modeling designs have been proposed including such approaches as neural networks, fuzzy, and fuzzy neural network models. In this study, we introduce the concept of the Rule-based fuzzy polynomial neural networks (RFPNN) as a hybrid modeling architecture and discuss its comprehensive design methodology. The development of the RFPNN dwells on the technologies of Computational Intelligence (CI), namely fuzzy sets, neural networks, and genetic algorithms. The architecture of the RFPNN results from a synergistic usage of RFNN and PNN. RFNN contribute to the formation of the premise part of the rule-based structure of the RFPNN. The consequence part of the RFPNN is designed using PNN. We discuss two kinds of RFPNN architectures and propose a comprehensive learning algorithm. In particular, it is shown that this network exhibits a dynamic structure. The experimental results include well-known software data such as the NASA dataset concerning software cost estimation and the one describing software modules of the Medical Imaging System (MIS).