software assessment
Recently Published Documents


TOTAL DOCUMENTS

57
(FIVE YEARS 6)

H-INDEX

5
(FIVE YEARS 0)

Author(s):  
Natalia A. Pasichnyk ◽  
Dmytro S. Komarchuk ◽  
Oleksiy A. Opryshko ◽  
Sergey A. Shvorov ◽  
Nikolay A. Kiktev

Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3660
Author(s):  
Wladmir Araujo Chapetta ◽  
Jailton Santos das Neves ◽  
Raphael Carlos Santos Machado

Modern sensors deployed in most Industry 4.0 applications are intelligent, meaning that they present sophisticated behavior, usually due to embedded software, and network connectivity capabilities. For that reason, the task of calibrating an intelligent sensor currently involves more than measuring physical quantities. As the behavior of modern sensors depends on embedded software, comprehensive assessments of such sensors necessarily demands the analysis of their embedded software. On the other hand, interlaboratory comparisons are comparative analyses of a body of labs involved in such assessments. While interlaboratory comparison is a well-established practice in fields related to physical, chemical and biological sciences, it is a recent challenge for software assessment. Establishing quantitative metrics to compare the performance of software analysis and testing accredited labs is no trivial task. Software is intangible and its requirements accommodate some ambiguity, inconsistency or information loss. Besides, software testing and analysis are highly human-dependent activities. In the present work, we investigate whether performing interlaboratory comparisons for software assessment by using quantitative performance measurement is feasible. The proposal was to evaluate the competence in software code analysis activities of each lab by using two quantitative metrics (code coverage and mutation score). Our results demonstrate the feasibility of establishing quantitative comparisons among software analysis and testing accredited laboratories. One of these rounds was registered as formal proficiency testing in the database—the first registered proficiency testing focused on code analysis.


The drilling and blasting method considered most economical method in civil and urban construction process. Ground vibrations are one of the major problem in blasting activity. Velocity of blast induced ground vibrations influenced by mainly three parameters such as properties of the rock mass properties, the explosive characteristics and the blast design and execution. In those parameters, rock mass properties of blasting area are unchangeable, so study of influence of rock properties very essential to minimize the effect of vibration on nearby structure. This study investigated the effect of rock strength parameters on vibration velocity. In this study, the blasting vibration monitored at a blasting site with different rock masses. This paper, presented a review on prediction models and rock properties influence on peak particle velocity. This paper also presented the relation between peak particle velocities different mines with their respective rock properties. This paper critical analysis on previous studies. This paper presented correlation between rock strength properties like compressive strength and tensile strength on vibration velocity.


ACTA IMEKO ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 12
Author(s):  
Ferrucio De Franco Rosa ◽  
Mario Jino ◽  
Paulo Marcos Siqueira Bueno ◽  
Rodrigo Bonacin

Security standards are essential instruments for security assessment. To create security assessment designs with suitable assessment items, we need to know the security aspects that are covered by a particular standard. We propose an approach to the selection and prioritisation of security assessment items. Assessment heuristics are proposed, aiming to increase the coverage of assessment dimensions and security characteristics in assessment designs. The main contribution of this paper to the field is the set of security assessment heuristics. Our approach can be applied to security standards in order to select or to prioritise assessment items with respect to 11 security properties and 6 assessment dimensions. The approach is flexible and allows the inclusion of security dimensions and properties. Our proposal is applied herein to a well-known security standard, ISO/IEC 27001, and its assessment items were analysed. The proposal is intended to support (i) the generation of high-coverage assessment designs, by including security assessment items with assured coverage of the main security characteristics and (ii) the evaluation of security standards with respect to the coverage of security aspects.


Sign in / Sign up

Export Citation Format

Share Document