scholarly journals Reusable and Usable Environment for the Digital Courseware Domain

10.28945/2461 ◽  
2002 ◽  
Author(s):  
Elsabe Cloete ◽  
Paula Kotze

This paper considers a functional framework that creates a usable authoring support environment (ASE) for digital course design, and outputs reusable components. Within the context of considering the courseware domain as a domain of interactive software systems, we developed an ASE prototype. The objectives of this prototype include the provision of a usable authoring tool to develop interactive courseware, as well as the creation of domain products that are based on open standards to foster large-scale reuse of these products. In this paper we describe the software architecture of the prototype, based on usability requirements.

2012 ◽  
pp. 201-222
Author(s):  
Yujian Fu ◽  
Zhijang Dong ◽  
Xudong He

The approach aims at solving the above problems by including the analysis and verification of two different levels of software development process–design level and implementation level-and bridging the gap between software architecture analysis and verification and the software product. In the architecture design level, to make sure the design correctness and attack the large scale of complex systems, the compositional verification is used by dividing and verifying each component individually and synthesizing them based on the driving theory. Then for those properties that cannot be verified on the design level, the design model is translated to implementation and runtime verification technique is adapted to the program. This approach can highly reduce the work on the design verification and avoid the state-explosion problem using model checking. Moreover, this approach can ensure both design and implementation correctness, and can further provide a high confident final software product. This approach is based on Software Architecture Model (SAM) that was proposed by Florida International University in 1999. SAM is a formal specification and built on the pair of component-connector with two formalisms – Petri nets and temporal logic. The ACV approach places strong demands on an organization to articulate those quality attributes of primary importance. It also requires a selection of benchmark combination points with which to verify integrated properties. The purpose of the ACV is not to commend particular architectures, but to provide a method for verification and analysis of large scale software systems in architecture level. The future research works fall in two directions. In the compositional verification of SAM model, it is possible that there is circular waiting of certain data among different component and connectors. This problem was not discussed in the current work. The translation of SAM to implementation is based on the restricted Petri nets due to the undecidable issue of high level Petri nets. In the runtime analysis of implementation, extraction of the execution trace of the program is still needed to get a white box view, and further analysis of execution can provide more information of the product correctness.


2020 ◽  
Vol 12 (6) ◽  
pp. 2177
Author(s):  
Jun-Ho Huh ◽  
Jimin Hwa ◽  
Yeong-Seok Seo

A Hierarchical Subsystem Decomposition (HSD) is of great help in understanding large-scale software systems from the software architecture level. However, due to the lack of software architecture management, HSD documentations are often outdated, or they disappear in the course of repeated changes of a software system. Thus, in this paper, we propose a new approach for recovering HSD according to the intended design criteria based on a genetic algorithm to find an optimal solution. Experiments are performed to evaluate the proposed approach using two open source software systems with the 14 fitness functions of the genetic algorithm (GA). The HSDs recovered by our approach have different structural characteristics according to objectives. In the analysis on our GA operators, crossover contributes to a relatively large improvement in the early phase of a search. Mutation renders small-scale improvement in the whole search. Our GA is compared with a Hill-Climbing algorithm (HC) implemented by our GA operators. Although it is still in the primitive stage, our GA leads to higher-quality HSDs than HC. The experimental results indicate that the proposed approach delivers better performance than the existing approach.


Author(s):  
Yujian Fu ◽  
Zhijang Dong ◽  
Xudong He

The approach aims at solving the above problems by including the analysis and verification of two different levels of software development process–design level and implementation level-and bridging the gap between software architecture analysis and verification and the software product. In the architecture design level, to make sure the design correctness and attack the large scale of complex systems, the compositional verification is used by dividing and verifying each component individually and synthesizing them based on the driving theory. Then for those properties that cannot be verified on the design level, the design model is translated to implementation and runtime verification technique is adapted to the program. This approach can highly reduce the work on the design verification and avoid the state-explosion problem using model checking. Moreover, this approach can ensure both design and implementation correctness, and can further provide a high confident final software product. This approach is based on Software Architecture Model (SAM) that was proposed by Florida International University in 1999. SAM is a formal specification and built on the pair of component-connector with two formalisms – Petri nets and temporal logic. The ACV approach places strong demands on an organization to articulate those quality attributes of primary importance. It also requires a selection of benchmark combination points with which to verify integrated properties. The purpose of the ACV is not to commend particular architectures, but to provide a method for verification and analysis of large scale software systems in architecture level. The future research works fall in two directions. In the compositional verification of SAM model, it is possible that there is circular waiting of certain data among different component and connectors. This problem was not discussed in the current work. The translation of SAM to implementation is based on the restricted Petri nets due to the undecidable issue of high level Petri nets. In the runtime analysis of implementation, extraction of the execution trace of the program is still needed to get a white box view, and further analysis of execution can provide more information of the product correctness.


2012 ◽  
Vol 2 (2) ◽  
pp. 112-116
Author(s):  
Shikha Bhatia ◽  
Mr. Harshpreet Singh

With the mounting demand of web applications, a number of issues allied to its quality have came in existence. In the meadow of web applications, it is very thorny to develop high quality web applications. A design pattern is a general repeatable solution to a generally stirring problem in software design. It should be noted that design pattern is not a finished product that can be directly transformed into source code. Rather design pattern is a depiction or template that describes how to find solution of a problem that can be used in many different situations. Past research has shown that design patterns greatly improved the execution speed of a software application. Design pattern are classified as creational design patterns, structural design pattern, behavioral design pattern, etc. MVC design pattern is very productive for architecting interactive software systems and web applications. This design pattern is partition-independent, because it is expressed in terms of an interactive application running in a single address space. We will design and analyze an algorithm by using MVC approach to improve the performance of web based application. The objective of our study will be to reduce one of the major object oriented features i.e. coupling between model and view segments of web based application. The implementation for the same will be done in by using .NET framework.


1994 ◽  
Vol 29 (3) ◽  
pp. 281-288 ◽  
Author(s):  
A. Siepe

The floodplain of the Upper Rhine and its biocoenoses have, through different river-regulatory activities over the last 175 years, undergone large scale degradation. At the same time flood protection for the downstream inhabitants has been greatly reduced. For reasons of flood protection, the “Polder Altenheim” in Baden-Württemberg, Germany southwest of Strasbourg, France, with so called retention flooding, was put into operation in 1987. The original floodplain had been diked for the previous 17 years, during which no flooding occurred. Since 1989 “ecological flooding” also is carried out. This has assisted in the regeneration of floodplain biotopes and promoted the floodplain biotic communities and the readaption of the bioceonosis to a regular flooding regime. The creation of new floodplain biotopes of early succession stages, particularly through geomorphodynamic processes, has followed the more than ten flood ocassions and typical biotic communities have colonised these sites. This will be presented together with selected examples of terrestrial and limnical species and communities. The following species and communities will be discussed: kingfisher Alcedo atthis, carabid communities (Coleoptera), the red alga Hildenbrandia rivularis (Rhodophyceae), the freshwater snail Theodoxus fluviatilis (Neritacea) and the freshwater bug Aphelocheirus aestivalis (Hydrocorisae).


2021 ◽  
Vol 62 ◽  
pp. 142-157
Author(s):  
James Rogers ◽  
Amanda Müller ◽  
Frank E. Daulton ◽  
Paul Dickinson ◽  
Cosmin Florescu ◽  
...  
Keyword(s):  

2021 ◽  
Vol 177 ◽  
pp. 110944
Author(s):  
Mohsin Irshad ◽  
Ricardo Britto ◽  
Kai Petersen
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document