functional requirements
Recently Published Documents


TOTAL DOCUMENTS

2833
(FIVE YEARS 756)

H-INDEX

56
(FIVE YEARS 7)

During the recent years, there is an increasing demand for software systems that dynamically adapt their behavior at run-time in response to changes in user preferences, execution environment, and system requirements, being thus context-aware. Authors are referring here to requirements related to both functional and non-functional aspects of system behavior since changes can also be induced by failures or unavailability of parts of the software system itself. To ensure the coherence and correctness of the proposed model, all relevant properties of system entities are precisely and formally described. This is especially true for non-functional properties, such as performance, availability, and security. This article discusses semantic concepts for the specification of non-functional requirements, taking into account the specific needs of a context-aware system. Based on these semantic concepts, we present a specification language that integrates non-functional requirements design and validation in the development process of context-aware self-adaptive systems.


2022 ◽  
Vol 31 (2) ◽  
pp. 1-23
Author(s):  
Luca Traini ◽  
Daniele Di Pompeo ◽  
Michele Tucci ◽  
Bin Lin ◽  
Simone Scalabrino ◽  
...  

Refactoring aims at improving the maintainability of source code without modifying its external behavior. Previous works proposed approaches to recommend refactoring solutions to software developers. The generation of the recommended solutions is guided by metrics acting as proxy for maintainability (e.g., number of code smells removed by the recommended solution). These approaches ignore the impact of the recommended refactorings on other non-functional requirements, such as performance, energy consumption, and so forth. Little is known about the impact of refactoring operations on non-functional requirements other than maintainability. We aim to fill this gap by presenting the largest study to date to investigate the impact of refactoring on software performance, in terms of execution time. We mined the change history of 20 systems that defined performance benchmarks in their repositories, with the goal of identifying commits in which developers implemented refactoring operations impacting code components that are exercised by the performance benchmarks. Through a quantitative and qualitative analysis, we show that refactoring operations can significantly impact the execution time. Indeed, none of the investigated refactoring types can be considered “safe” in ensuring no performance regression. Refactoring types aimed at decomposing complex code entities (e.g., Extract Class/Interface, Extract Method) have higher chances of triggering performance degradation, suggesting their careful consideration when refactoring performance-critical code.


2022 ◽  
Author(s):  
Misael C. Júnior ◽  
Domenico Amalfitano ◽  
Lina Garcés ◽  
Anna Rita Fasolino ◽  
Stevão A. Andrade ◽  
...  

Context: The mobile app market is continually growing offering solutions to almost all aspects of people’s lives, e.g., healthcare, business, entertainment, as well as the stakeholders’ demand for apps that are more secure, portable, easy to use, among other non-functional requirements (NFRs). Therefore, manufacturers should guarantee that their mobile apps achieve high-quality levels. A good strategy is to include software testing and quality assurance activities during the whole life cycle of such solutions. Problem: Systematically warranting NFRs is not an easy task for any software product. Software engineers must take important decisions before adopting testing techniques and automation tools to support such endeavors. Proposal: To provide to the software engineers with a broad overview of existing dynamic techniques and automation tools for testing mobile apps regarding NFRs. Methods: We planned and conducted a Systematic Mapping Study (SMS) following well-established guidelines for executing secondary studies in software engineering. Results: We found 56 primary studies and characterized their contributions based on testing strategies, testing approaches, explored mobile platforms, and the proposed tools. Conclusions: The characterization allowed us to identify and discuss important trends and opportunities that can benefit both academics and practitioners.


2022 ◽  
Vol 327 ◽  
pp. 231-237
Author(s):  
Marco Speth ◽  
Mathias Liewald ◽  
Kim Rouven Riedmüller ◽  
Laura Schomer

Hybrid material structures allow different material properties to be combined in one single component and thus to meet high functional requirements. When manufacturing such hybrid components, particular attention must be paid to the transition zones between metallic composite partners. These transition zones need to show largely homogeneous and materially bonded structures in order to ensure ideal transmission of the material properties and to prevent component failure due to material defects. In this respect, this paper focuses on a newly developed process in which a powder metallurgical route is combined with semi-solid forming technology. Here, porous copper green bodies are inserted into a forming die and subsequently forged together with a semi-solid aluminium alloy. In this way, it was tried to combine both metal materials into a material locking or at least into a form locking manner in order to achieve ideal material properties in the final hybrid component. The aim of this paper is to find suitable process parameters to infiltrate the porous copper inlay with the semi-solid aluminium alloy during thixoforming. Therefore, different process parameters such as varying liquid fraction of the aluminium alloy and different densities of the green bodies were examined during the production of simply shaped hybrid Al-Cu-components. Afterwards the infiltration depth and produced microstructure of the components was analysed. In the future, this process allows for producing aluminium-copper hybrid heat sinks with improved heat transfer properties compared to conventional produced heat sinks.


2022 ◽  
Author(s):  
Filippo Salustri ◽  
Erica Attard ◽  
Michael Grieg ◽  
W. Patrick Neumann

<div>The instructors of the undergraduate cornerstone design course in Mechanical and Industrial Engineering at Ryerson University aim to integrate diversity and inclusion into students’ design education. Our goal is to provide resources that students can use to understand human capabilities and limitations, so their designs are better suited to a wide range of users. The project was broken down in four phases: Phase 1 consisted of scoping deliverables and background research; Phase 2 included courseware development; Phase 3 employed the courseware into the Fall 2019 offering of our cornerstone design course; and Phase 4 reviewed and analysed student’s work to determine the efficacy of the courseware.</div><div>To initiate this effort, we focused on three Human Factors: vision, hearing, and strength. We created a process whereby students could assess these Factors quantitatively for specific interactions and use the assessments to justify specific functional requirements and constraints of their own designs.</div>


2022 ◽  
Vol 11 (1) ◽  
pp. 5
Author(s):  
Njabulo Sakhile Mtetwa ◽  
Paul Tarwireyi ◽  
Cecilia Nombuso Sibeko ◽  
Adnan Abu-Mahfouz ◽  
Matthew Adigun

The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.


2022 ◽  
Author(s):  
Filippo Salustri ◽  
Erica Attard ◽  
Michael Grieg ◽  
W. Patrick Neumann

<div>The instructors of the undergraduate cornerstone design course in Mechanical and Industrial Engineering at Ryerson University aim to integrate diversity and inclusion into students’ design education. Our goal is to provide resources that students can use to understand human capabilities and limitations, so their designs are better suited to a wide range of users. The project was broken down in four phases: Phase 1 consisted of scoping deliverables and background research; Phase 2 included courseware development; Phase 3 employed the courseware into the Fall 2019 offering of our cornerstone design course; and Phase 4 reviewed and analysed student’s work to determine the efficacy of the courseware.</div><div>To initiate this effort, we focused on three Human Factors: vision, hearing, and strength. We created a process whereby students could assess these Factors quantitatively for specific interactions and use the assessments to justify specific functional requirements and constraints of their own designs.</div>


2022 ◽  
Vol 13 (1) ◽  
pp. 1-13
Author(s):  
Qiaoling Meng ◽  
Mingpeng Jiang ◽  
Zongqi Jiao ◽  
Hongliu Yu

Abstract. Posture transformation is an essential function for multi-posture wheelchairs. To improve the natural motion in posture transformation that is a popular problem in the design of multi-posture wheelchairs because the current wheelchair's posture transformation mechanism cannot remain consistent between the rotation center of the wheelchair and the rotation center of the human body joints. This paper proposes a sitting–standing–lying three-posture bionic transformation mechanism for a smart wheelchair. A human–wheelchair coupling model is described and analyzed according to the biomechanical characteristics of the posture transformation of human beings and their functional requirements. The configuration of the transformation mechanism is chosen by comparing the trails of the wheelchair rotation centers and the corresponding human joint rotation centers. The kinematics of the optimized configuration are discussed in detail to obtain the most bionic motion performance using the multivariable nonlinear constraint optimization algorithm. Finally, the mechanism is designed, and its posture transformation performance is simulated and verified using Adams (Automatic Dynamic Analysis of Mechanical Systems) software.


Author(s):  
Chia-Liang Hung

Firms achieve their competitive advantage quickly through the concept framework of open innovation by integrating external inspiration with internal endowment when facing hyper-competition in the digital era. This paper deploys open innovation into building platform blocks by modular operators. These eight modular operators are splitting, augmenting, deleting, substituting, inversing, porting, configuring, and integrating. By means of case studies of two Taiwan Internet vendors, the results depict the manipulation strategies between eight modular operators to fit seven functional requirements for weaving social media, which are presence, identity, sharing, reputation, groups, conversations, and relationship. Finally, this paper advances propositions about the deployment of modularization strategies to develop a competitive platform.


Sign in / Sign up

Export Citation Format

Share Document