scholarly journals Models@Runtime: The Development and Re-Configuration Management of Python Applications Using Formal Methods

2021 ◽  
Vol 11 (20) ◽  
pp. 9743
Author(s):  
Mohammed Mounir Bouhamed ◽  
Gregorio Díaz ◽  
Allaoua Chaoui ◽  
Oussama Kamel ◽  
Radouane Nouara

Models@runtime (models at runtime) are based on computation reflection. Runtime models can be regarded as a reflexive layer causally connected with the underlying system. Hence, every change in the runtime model involves a change in the reflected system, and vice versa. To the best of our knowledge, there are no runtime models for Python applications. Therefore, we propose a formal approach based on Petri Nets (PNs) to model, develop, and reconfigure Python applications at runtime. This framework is supported by a tool whose architecture consists of two modules connecting both the model and its execution. The proposed framework considers execution exceptions and allows users to monitor Python expressions at runtime. Additionally, the application behavior can be reconfigured by applying Graph Rewriting Rules (GRRs). A case study using Service-Level Agreement (SLA) violations is presented to illustrate our approach.

Author(s):  
Hyggo Almeida ◽  
Leandro Silva ◽  
Glauber Ferreira ◽  
Emerson Loureiro ◽  
Angelo Perkusich

Validation and verification techniques have been identified as suitable mechanisms to determine if the software meets the needs of the user and to verify if the software works correctly. However, the existing verification techniques do not support friendly visualization. Also, validation techniques with friendly visualization mechanisms do not allow the verification of the system’s correctness. In this chapter, we present a method for the validation and verification of software systems through the integration of formal methods and virtual reality. Furthermore, a software tool associated with such a method is also described along with an embedded system case study.


Author(s):  
Whee Yen Wong Et.al

Service Level Agreements (SLAs) are critical for outsourcing and technological related vendors companies. SLAsare the key requirements for outsourcing implementation and deployment as well as are the key differentiator in the service provider’s offerings industry. Over time, SLAs drive behaviors delivering a minimum level of service to the provider resultant in limited room in innovation and improvement in SLA arrangement and SLA contract renewal. As such, outsourcing companies may deem become a commodity, lacking strategic, innovative and value-added partner to the business. In long run, outsourcing companies face challenges with rapidly changing business requirements that drives business agility to stay competitive. The paper attempts to investigate a vendor IT Service Company accountable for continuous measurement and reporting of SLA activities where agreed-on service levels face challenges. This paper aims to evaluate the practical applicability of Six Sigma approach (i.e. DMAIC (Define, Measure, Analyze, Improve and Control)) as a result of root-cause-analysis; where everyone working on the problem(s) stays focus, drive towards a root cause analysis and eventually address the problem directly. The result of this case study revealed how Six Sigma approach has successfully improve the SLA achievements by identifying the significant factors contributing remedies or penalties towards SLA measurements.


Effort Estimation has been a challenging part of e-Learning due to the growing change in technology. E-Learning industry has to meet dynamic requirements of the customer. Content development has to undergo various stages during its development. During the process, initial SLA (Service Level Agreement) varies frequently and there exists several problems in content delivery. Scope Creep is the result of dynamic expectations from the clients without any limitation to the time. This affect the delivery of the product as the resources that were allocated to the development of the product were according to the initial SLA. This paper discusses about parameters that affect the estimation along with resource requirement computation. The paper further focuses on traditional effort estimation technique while analyzing the scope creep life cycle for e-Learning project. The Investigation is made by considering one of the leading middle level e-Learning organization. The case-study and the statistical analysis are carried out on the data which is collected from the company. From the analysis, amount of resource required to handle the dynamic data can be estimated.


2009 ◽  
pp. 3361-3380
Author(s):  
Hyggo Oliveira de Almeida ◽  
Leandro Silva ◽  
Glauber Ferreira ◽  
Emerson Loureiro ◽  
Angelo Perkusich

Validation and verification techniques have been identified as suitable mechanisms to determine if the software meets the needs of the user and to verify if the software works correctly. However, the existing verification techniques do not support friendly visualization. Also, validation techniques with friendly visualization mechanisms do not allow the verification of the system’s correctness. In this chapter, we present a method for the validation and verification of software systems through the integration of formal methods and virtual reality. Furthermore, a software tool associated with such a method is also described along with an embedded system case study.


Author(s):  
Gurpreet Singh ◽  
Manish Mahajan ◽  
Rajni Mohana

BACKGROUND: Cloud computing is considered as an on-demand service resource with the applications towards data center on pay per user basis. For allocating the resources appropriately for the satisfaction of user needs, an effective and reliable resource allocation method is required. Because of the enhanced user demand, the allocation of resources has now considered as a complex and challenging task when a physical machine is overloaded, Virtual Machines share its load by utilizing the physical machine resources. Previous studies lack in energy consumption and time management while keeping the Virtual Machine at the different server in turned on state. AIM AND OBJECTIVE: The main aim of this research work is to propose an effective resource allocation scheme for allocating the Virtual Machine from an ad hoc sub server with Virtual Machines. EXECUTION MODEL: The execution of the research has been carried out into two sections, initially, the location of Virtual Machines and Physical Machine with the server has been taken place and subsequently, the cross-validation of allocation is addressed. For the sorting of Virtual Machines, Modified Best Fit Decreasing algorithm is used and Multi-Machine Job Scheduling is used while the placement process of jobs to an appropriate host. Artificial Neural Network as a classifier, has allocated jobs to the hosts. Measures, viz. Service Level Agreement violation and energy consumption are considered and fruitful results have been obtained with a 37.7 of reduction in energy consumption and 15% improvement in Service Level Agreement violation.


Author(s):  
Leonardo J. Gutierrez ◽  
Kashif Rabbani ◽  
Oluwashina Joseph Ajayi ◽  
Samson Kahsay Gebresilassie ◽  
Joseph Rafferty ◽  
...  

The increase of mental illness cases around the world can be described as an urgent and serious global health threat. Around 500 million people suffer from mental disorders, among which depression, schizophrenia, and dementia are the most prevalent. Revolutionary technological paradigms such as the Internet of Things (IoT) provide us with new capabilities to detect, assess, and care for patients early. This paper comprehensively survey works done at the intersection between IoT and mental health disorders. We evaluate multiple computational platforms, methods and devices, as well as study results and potential open issues for the effective use of IoT systems in mental health. We particularly elaborate on relevant open challenges in the use of existing IoT solutions for mental health care, which can be relevant given the potential impairments in some mental health patients such as data acquisition issues, lack of self-organization of devices and service level agreement, and security, privacy and consent issues, among others. We aim at opening the conversation for future research in this rather emerging area by outlining possible new paths based on the results and conclusions of this work.


Sign in / Sign up

Export Citation Format

Share Document