Design Methods

Author(s):  
Bruce I. Blum

The previous chapter on the software process introduced two contrasting orientations: problem and product. Both orientations have the same objective: the efficient and effective creation of an automated response to a real-world problem. They differ only in the methods and tools used to achieve that end. In the product-oriented model, the difficulty of realizing a solution is accepted as the critical path. Thus, the approach applies the principle of separation of concerns and divides the process into two discrete activities: first establish the essential requirements of what is needed, and then build a product that will satisfy those requirements. As already noted, this model is appropriate when the requirements are stable or if the complexity of development is so great that a fixed specification is necessary to reduce risk. In contrast, the problemoriented model is valuable for real-world problems with open requirements (open both in the sense of initial uncertainty and of operational change). Unfortunately, it can be implemented only for domains in which the technology is relatively mature. For example, military applications that push the limits of technology have open requirements (i.e., they begin with uncertainty and are subject to modification as potential adversaries develop responses to newly introduced capabilities). In this domain, however, the technology may be too complex for development without frozen requirements. In other domains, such as interactive information systems, the technological challenges are sufficiently well understood to permit a problem-oriented approach with its one-step process model. The adaptive design paradigm proposed in this book is problem oriented. The instantiation I describe in the next two chapters creates interactive information systems. In principle, there is no reason why the adaptive design model may not be used for complex, real-time military applications; the fact that it has not been so used is a function of our knowledge of that domain and not a limitation of the paradigm. There always will be a fuzzy boundary about the technology that separates what we can and cannot do. At that boundary, we must rely on experimentation and hacking to gain understanding.

2016 ◽  
Vol 25 (01) ◽  
pp. 1650002 ◽  
Author(s):  
Johannes Pflug ◽  
Stefanie Rinderle-Ma

The optimization of their business processes is a crucial challenge for many enterprises. This applies especially for organizations using complex cooperative information systems to support human work, production lines, or computing services. Optimizations can touch different aspects such as costs, throughput times, and quality. Nowadays, improvements in workflows are mostly achieved by restructuring the process model. However, in many applications there is a huge potential for optimizations during runtime as well. This holds particularly true for collaborative processes with critical activities, i.e. activities that require a high setup or changeover time, typically leading to waiting queues in instance processing. What is usually suggested in this situation is to bundle several instances in order to execute them as a batch. How the batching is achieved, however, has been only decided on static rules so far. In this paper, we feature dynamic instance queuing (DIQ) as an approach towards clustering and batching instances based on the current conditions in the process, e.g. attribute values of the instances. Specifically, we extend our previous work on applying DIQ at single activities towards a queuing approach that spans activity sequences (DIQS). The approach is evaluated based on a real-world case study from the manufacturing domain. We discuss limitations and further applications of the DIQ idea, e.g. with respect to collaborative human tasks.


Author(s):  
R. Irawan

Leap frog concept was created to address the loss of single joint rig agility and drive the cycle time average lower than ever. The idea is to move the preparation step into a background activity that includes moving the equipment, killing the well, dismantling the wellhead and installing the well control equipment/BOP before the rig came in. To realize the idea, a second set of equipment is provided along with the manpower. By moving the preparation step, the goal is to eliminate a 50% portion of the job from the critical path. The practice is currently performed in tubing pump wells on land operations. However, the work concept could be implemented for other type of wells, especially ESP wells. After implementation, the cycle time average went down from 18 hours to 11 hours per job, or down by ~40%. The toolpusher also reports more focused operations due to reduced scope and less crew to work with, making the leap frog operation safer and more reliable. Splitting the routine services into 2 parts not only shortened the process but it also reduces noise that usually appear in the preparation process. The team are rarely seen waiting on moving support problems that were usually seen in the conventional process. Having the new process implemented, the team had successfully not only lowered cycle time, but also eliminated several problems in one step. Other benefits from leap frog implementation is adding rig count virtually to the actual physical rig available on location, and also adding rig capacity and completing more jobs compared to the conventional rig. In other parts, leap frog faced some limitation and challenges, such as: limited equipment capability for leap frog remote team to work on stuck plunger, thus hindering its leap frog capability, and working in un-restricted/un-clustered area which disturb the moving process and operation safety.


Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Author(s):  
Marc J. Stern

This chapter covers systems theories relevant to understanding and working to enhance the resilience of social-ecological systems. Social-ecological systems contain natural resources, users of those resources, and the interactions between each. The theories in the chapter share lessons about how to build effective governance structures for common pool resources, how to facilitate the spread of worthwhile ideas across social networks, and how to promote collaboration for greater collective impacts than any one organization alone could achieve. Each theory is summarized succinctly and followed by guidance on how to apply it to real world problem solving.


Author(s):  
A.N. Belikov ◽  
◽  
S.A. Belikova

The existing approach to requirements extraction is that the requirements are formed by the system developer through direct interaction with the customer using a number of methods (for example, interviewing; prototyping; analysis of use cases; user stories; seminars, etc.). In this case, most often the requirements are formed by the developer himself, taking into account the opinion of the customer’s representative. The disadvantage of the existing approach is the problem of loss of knowledge transferred from the customer’s representatives to the developer, which results in the failure of projects, which is recorded by the existing statistics. As statistical studies show, more than half of projects for the creation of information systems (IS) are failures or require changes (in terms of budget, time and customer satisfaction). In modern research in the field of__ design and development of information systems, there is a tendency to involve the end user (customer) in the design process. To develop this idea, an approach is proposed to involve the user in the process of extracting requirements, where the developer will no longer be the person forming the requirements. The main idea of the approach is to develop special tools that allow you to independently transform the customer’s natural language into such a form of representation of the model of the process of solving professional problems, from which an interface will be built, which will allow extracting functional requirements from the unity (process model and interface).


2020 ◽  
Author(s):  
David Kelso ◽  
John D. Enderle ◽  
Kristina Ropella

2021 ◽  
Vol 5 (4) ◽  
pp. 520
Author(s):  
Maria Yuliana Kua ◽  
Ni Wayan Suparmi ◽  
Dek Ngurah Laba Laksana

This research is based on the problem where practical activities in the Basic Physics Practicum course can no longer be carried out optimally due to changes in the learning model from face-to-face (offline) to online (online) during the COVID-19 pandemic. The purpose of this study was to develop a virtual physics laboratory as a medium in carrying out practical activities and to analyze the feasibility of the product through the validation results of experts and the results of product trials on prospective users. This type of research is Research & Development with ADDIE development model. The subjects of this study were 12 lecturers and 47 students of the STKIP Citra Bakti science education study program. Data collection techniques using validation sheets and questionnaires. The data collection instruments are in the form of validation assessment sheets and response questionnaires of prospective users. The data from this study were analyzed qualitatively descriptive to decide the feasibility of the product being developed. The results of the research showed that the average validation score of the material expert was 4.63, the media expert was 4.41, the learning design expert was 4.30, and the linguist was 4.51. The validation results of the four validators are in the very good category. Meanwhile, the results of product trials to lecturers and students as potential users are in the very good category with an average score of 4.53 and 4.57, respectively. Based on these data, this virtual physics laboratory product with real world problems based on Ngada local wisdom is recommended to be applied to the Basic Physics Practicum course and to help students in their independent practicum activities.


2020 ◽  
Vol 34 (01) ◽  
pp. 173-180
Author(s):  
Zhen Pan ◽  
Zhenya Huang ◽  
Defu Lian ◽  
Enhong Chen

Many events occur in real-world and social networks. Events are related to the past and there are patterns in the evolution of event sequences. Understanding the patterns can help us better predict the type and arriving time of the next event. In the literature, both feature-based approaches and generative approaches are utilized to model the event sequence. Feature-based approaches extract a variety of features, and train a regression or classification model to make a prediction. Yet, their performance is dependent on the experience-based feature exaction. Generative approaches usually assume the evolution of events follow a stochastic point process (e.g., Poisson process or its complexer variants). However, the true distribution of events is never known and the performance depends on the design of stochastic process in practice. To solve the above challenges, in this paper, we present a novel probabilistic generative model for event sequences. The model is termed Variational Event Point Process (VEPP). Our model introduces variational auto-encoder to event sequence modeling that can better use the latent information and capture the distribution over inter-arrival time and types of event sequences. Experiments on real-world datasets prove effectiveness of our proposed model.


2016 ◽  
Vol 16 (2) ◽  
pp. 461
Author(s):  
Mukodi Mukodi

Abstract: There is an increasing concern as if discussing politics in pesantren (Islamic Boarding School) was uncommon. This oddity is due to the conception of a person who puts pesantren merely a decontextualised scholarly reproduction of an-sich (from the real world problem or real politics) and not as an agent of change. In fact, pesantren is a replica of life integrating various life skills, including politics. The most interesting finding was that the diverse activities of life in the boarding school had raised the seedling of students’ political sense. This article also recommends the presence of political boarding school establishment, as a political incubator for Islamic activists as the continuity of conditioning political awareness in pesantren. Its realization is believed to be able to trigger the acceleration of the Islamic ideal leader candidate in Indonesia.


Sign in / Sign up

Export Citation Format

Share Document