A Case Study to Validate Feasibility of Risk Proposal in the Deployment Process of Software Systems

Author(s):  
Felipe Ortiz ◽  
Marisa Panizzi ◽  
Rodolfo Bertone
Keyword(s):  
2007 ◽  
Vol 2 (2) ◽  
pp. 77-88
Author(s):  
K. Vijayalakshmi ◽  
◽  
N Ramaraj ◽  

2021 ◽  
Vol 23 (1) ◽  
pp. 34-41
Author(s):  
Alejandro Vera-Baquero ◽  
Owen Phelan ◽  
Pawel Slowinski ◽  
John Hannon

2021 ◽  
Author(s):  
Mohammad Rubyet Islam ◽  
Peter Sandborn

Abstract Prognostics and Health Management (PHM) is an engineering discipline focused on predicting the point at which systems or components will no longer perform as intended. The prediction is often articulated as a Remaining Useful Life (RUL). RUL is an important decision-making tool for contingency mitigation, i.e., the prediction of an RUL (and its associated confidence) enables decisions to be made about how and when to maintain the system. PHM is generally applied to hardware systems in the electronics and non-electronics application domains. The application of PHM (and RUL) concepts has not been explored for application to software. Today, software (SW) health management is confined to diagnostic assessments that identify problems, whereas prognostic assessment potentially indicates when in the future a problem will become detrimental to the operation of the system. Relevant areas such as SW defect prediction, SW reliability prediction, predictive maintenance of SW, SW degradation, and SW performance prediction, exist, but all represent static models, built upon historical data — none of which can calculate an RUL. This paper addresses the application of PHM concepts to software systems for fault predictions and RUL estimation. Specifically, we wish to address how PHM can be used to make decisions for SW systems such as version update, module changes, rejuvenation, maintenance scheduling and abandonment. This paper presents a method to prognostically and continuously predict the RUL of a SW system based on usage parameters (e.g., numbers and categories of releases) and multiple performance parameters (e.g., response time). The model is validated based on actual data (on performance parameters), generated by the test beds versus predicted data, generated by a predictive model. Statistical validation (regression validation) has been carried out as well. The test beds replicate and validate faults, collected from a real application, in a controlled and standard test (staging) environment. A case study based on publicly available data on faults and enhancement requests for the open-source Bugzilla application is presented. This case study demonstrates that PHM concepts can be applied to SW systems and RUL can be calculated to make decisions on software version update or upgrade, module changes, rejuvenation, maintenance schedule and total abandonment.


Author(s):  
Yutaka Watanobe ◽  
Nikolay Mirenkov

Programming in pictures is an approach where pictures and moving pictures are used as super-characters to represent the features of computational algorithms and data structures, as well as for explaining the models and application methods involved. *AIDA is a computer language that supports programming in pictures. This language and its environment have been developed and promoted as a testbed for various innovations in information technology (IT) research and implementation, including exploring the compactness of the programs and their adaptive software systems, and obtaining better understanding of information resources. In this paper, new features of the environment and methods of their implementation are presented. They are considered within a case study of a large-scale module of a nuclear safety analysis system to demonstrate that *AIDA language is appropriate for developing efficient codes of serious applications and for providing support, based on folding/unfolding techniques, enhancing the readability, maintainability and algorithmic transparency of programs. Features of this support and the code efficiency are presented through the results of a computational comparison with a FORTRAN equivalent.


2014 ◽  
Vol 17 (3) ◽  
Author(s):  
Emiliano Reynares ◽  
María Laura Caliusco ◽  
Maria Rosa Galli

The wide applicability of mapping business rules expressions to ontology statements have been recently recognized. Some of the most important applications are: (1) using of on- tology reasoners to prove the consistency of business domain information, (2) generation of an ontology intended to be used in the analysis stage of a software development process, and (3) the possibility of encapsulate the declarative specification of business knowledge into information software systems by means of an implemented ontology. The Semantics of Business Vocabulary and Business Rules (SBVR) supports that approach by provid- ing business people with a linguistic way to semantically describe business concepts and specify business rules in an independent way of any information system design. Although previous work have presented some proposals, an exhaustive and automatable approach for them is still lacking. This work presents a broad and detailed set of transformations that allows the automatable generation of an ontology implemented in OWL 2 from the SBVR specifications of a business domain. Such transformations are rooted on the struc- tural specification of both standards and are depicted through a case study. A real case validation example was performed, approaching the feasibility of the mappings by the quality assessment of the developed ontology.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Juliana Hsuan ◽  
Marin Jovanovic ◽  
Diego Honorato Clemente

PurposeThis study shows various pathways manufacturers can take when embarking on digital servitization (DS) journeys. It builds on the DS and modularity literature to map the strategic trajectories of product–service–software (PSSw) configurations.Design/methodology/approachThe study is exploratory and based on the inductive theory building method. The empirical data were gathered through a workshop with focus groups of 15 servitization manufacturers (with 22 respondents), an on-site workshop (in-depth case study), semi-structured interviews, observations and document study of archival data.FindingsThe DS trajectories are idiosyncratic and dependent on design architectures of PSSw modules, balancing choices between standardization and innovation. The adoption of software systems depends on the maturity of the industry-specific digital ecosystem. Decomposition and integration of PSSw modules facilitate DS transition through business model modularity. Seven testable propositions are presented.Research limitations/implicationsWith the small sample size from different industries and one in-depth case study, generalizing the findings was not possible.Practical implicationsThe mapping exercise is powerful when top management from different functional departments can participate together to share their expertise and achieve consensus. It logs the “states” that the manufacturer undergoes over time.Originality/valueThe Digital Servitization Cube serves as a conceptual framework for manufacturers to systematically map and categorize their current and future PSSw strategies. It bridges the cross-disciplinary theoretical discussion in DS.


Author(s):  
Ayda Saidane ◽  
Nicolas Guelfi

The quality of software systems depends strongly on their architecture. For this reason, taking into account non-functional requirements at architecture level is crucial for the success of the software development process. Early architecture model validation facilitates the detection and correction of design errors. In this research, the authors are interested in security critical systems, which require a reliable validation process. So far, they are missing security-testing approaches providing an appropriate compromise between software quality and development cost while satisfying certification and audit procedures requirements through automated and documented validation activities. In this chapter, the authors propose a novel test-driven and architecture model-based security engineering approach for resilient systems. It consists of a test-driven security modeling framework and a test based validation approach. The assessment of the security requirement satisfaction is based on the test traces analysis. Throughout this study, the authors illustrate the approach using a client server architecture case study.


2014 ◽  
pp. 2072-2098
Author(s):  
Ayda Saidane ◽  
Nicolas Guelfi

The quality of software systems depends strongly on their architecture. For this reason, taking into account non-functional requirements at architecture level is crucial for the success of the software development process. Early architecture model validation facilitates the detection and correction of design errors. In this research, the authors are interested in security critical systems, which require a reliable validation process. So far, they are missing security-testing approaches providing an appropriate compromise between software quality and development cost while satisfying certification and audit procedures requirements through automated and documented validation activities. In this chapter, the authors propose a novel test-driven and architecture model-based security engineering approach for resilient systems. It consists of a test-driven security modeling framework and a test based validation approach. The assessment of the security requirement satisfaction is based on the test traces analysis. Throughout this study, the authors illustrate the approach using a client server architecture case study.


Author(s):  
Kyoungho An ◽  
Adam Trewyn ◽  
Aniruddha Gokhale ◽  
Shivakumar Sastry

Much of the existing literature on domain-specific modeling languages (DSMLs) focuses on either the DSML design and their use in developing complex software systems (e.g., in enterprise and web applications), or their use in physical systems (e.g., process control). With increasing focus on research and development of cyber-physical systems (CPS) such as autonomous automotive systems and process control systems, which are systems that tightly integrate cyber and physical artifacts, it becomes important to understand the need for and the roles played by DSMLs for such systems. One use of DSMLs for CPS systems is in the analysis and verification of different properties of the system. Many questions arise in this context: How are the cyber and physical artifacts represented in DSMLs? How can these DSMLs be used in analysis? This book chapter addresses these questions through a case study of reconfigurable conveyor systems used as a representative example.


Sign in / Sign up

Export Citation Format

Share Document