Search results for: the shape of the garment and software
6876 Reasons for Non-Applicability of Software Entropy Metrics for Bug Prediction in Android
Authors: Arvinder Kaur, Deepti Chopra
Abstract:
Software Entropy Metrics for bug prediction have been validated on various software systems by different researchers. In our previous research, we have validated that Software Entropy Metrics calculated for Mozilla subsystem’s predict the future bugs reasonably well. In this study, the Software Entropy metrics are calculated for a subsystem of Android and it is noticed that these metrics are not suitable for bug prediction. The results are compared with a subsystem of Mozilla and a comparison is made between the two software systems to determine the reasons why Software Entropy metrics are not applicable for Android.Keywords: android, bug prediction, mining software repositories, software entropy
Procedia PDF Downloads 5786875 Revolutionary Solutions for Modeling and Visualization of Complex Software Systems
Abstract:
Existing software modeling and visualization approaches using UML are outdated, which are outcomes of reductionism and the superposition principle that the whole of a system is the sum of its parts, so that with them all tasks of software modeling and visualization are performed linearly, partially, and locally. This paper introduces revolutionary solutions for modeling and visualization of complex software systems, which make complex software systems much easy to understand, test, and maintain. The solutions are based on complexity science, offering holistic, automatic, dynamic, virtual, and executable approaches about thousand times more efficient than the traditional ones.Keywords: complex systems, software maintenance, software modeling, software visualization
Procedia PDF Downloads 4016874 Towards Development of a Framework for Saudi Education Software Ecosystem
Authors: Fazal-e-Amin, Abdullah S. Alghamdi, Iftikhar Ahmad
Abstract:
Software ecosystems’ concept is an inspiration from the natural ecosystem. Software ecosystems refer to large systems developed on top of a platform composed of different components developed by different entities of that ecosystem. Ecosystems improve information access, dissemination and coordination considerably. The ability to evolve and accommodate new subsystems gives a boost to the software ecosystems. In this paper, Saudi education software ecosystem is discussed and its need and potential benefits are highlighted. This work will provide a basis for further research in this area and foundation in development of Saudi education ecosystem.Keywords: software ecosystem, education software, framework, software engineering
Procedia PDF Downloads 5316873 Analyzing the Effectiveness of Different Testing Techniques in Ensuring Software Quality
Authors: R. M. P. C. Bandara, M. L. L. Weerasinghe, K. T. C. R. Kumari, A. G. D. R. Hansika, D. I. De Silva, D. M. T. H. Dias
Abstract:
Software testing is an essential process in software development that aims to identify defects and ensure that software is functioning as intended. Various testing techniques are employed to achieve this goal, but the effectiveness of these techniques varies. This research paper analyzes the effectiveness of different testing techniques in ensuring software quality. The paper explores different testing techniques, including manual and automated testing, and evaluates their effectiveness in terms of identifying defects, reducing the number of defects in software, and ensuring that software meets its functional and non-functional requirements. Moreover, the paper will also investigate the impact of factors such as testing time, test coverage, and testing environment on the effectiveness of these techniques. This research aims to provide valuable insights into the effectiveness of different testing techniques, enabling software development teams to make informed decisions about the testing approach that is best suited to their needs. By improving testing techniques, the number of defects in software can be reduced, enhancing the quality of software and ultimately providing better software for users.Keywords: software testing life cycle, software testing techniques, software testing strategies, effectiveness, software quality
Procedia PDF Downloads 846872 Taguchi Approach for the Optimization of the Stitching Defects of Knitted Garments
Authors: Adel El-Hadidy
Abstract:
For any industry, the production and quality management or wastages reductions have major impingement on overall factory economy. This work discusses the quality improvement of garment industry by applying Pareto analysis, cause and effect diagram and Taguchi experimental design. The main purpose of the work is to reduce the stitching defects, which will also minimize the rejection and reworks rate. Application of Pareto chart, fish bone diagram and Process Sigma Level/and or Performance Level tools helps solving those problems on priority basis. Among all, only sewing, defects are responsible form 69.3% to 97.3 % of total defects. Process Sigma level has been improved from 0.79 to 1.3 and performance rate improved, from F to D level. The results showed that the new set of sewing parameters was superior to the original one. It can be seen that fabric size has the largest effect on the sewing defects and that needle size has the smallest effect on the stitching defects.Keywords: garment, sewing defects, cost of rework, DMAIC, sigma level, cause and effect diagram, Pareto analysis
Procedia PDF Downloads 1656871 Structural Optimization Using Catenary and Other Natural Shapes
Authors: Mitchell Gohnert
Abstract:
This paper reviews some fundamental concepts of structural optimization, which is focused on the shape of the structure. Bending stresses produce high peak stresses at each face of the member, and therefore, substantially more material is required to resist bending. The shape of the structure has a profound effect on stress levels. Stress may be reduced dramatically by simply changing the shape to accommodate natural stress flow. The main objective of structural optimization is to direct the thrust line along the axis of the member. Optimal shapes include the catenary arch or dome, triangular shapes, and columns. If the natural flow of stress matches the shape of the structures, the most optimal shape is determined. Structures, however, must resist multiple load patterns. An optimal shape is still possible by ensuring that the thrust lines fall within the middle third of the member.Keywords: optimization, natural structures, shells, catenary, domes, arches
Procedia PDF Downloads 436870 Software Quality Assurance in Component Based Software Development – a Survey Analysis
Authors: Abeer Toheed Quadri, Maria Abubakar, Mehreen Sirshar
Abstract:
Component Based Software Development (CBSD) is a new trend in software development. Selection of quality components is not enough to ensure software quality in Component Based Software System (CBSS). A software product is considered to be a quality product if it satisfies its customer’s needs and has minimum defects. Authors’ survey different research papers and analyzes various techniques which ensure software quality in component based software development. This paper includes an investigation about how to improve the quality of a component based software system without effecting quality attributes. The reported information is identified from literature survey. The developments of component based systems are rising as they reduce the development time, effort and cost by means of reuse. After analysis, it has been explored that in order to achieve the quality in a CBSS we need to have the components that are certified through software measure because the predictability of software quality attributes of system depend on the quality attributes of the constituent components, integration process and the framework used.Keywords: CBSD (component based software development), CBSS (component based software system), quality components, SQA (software quality assurance)
Procedia PDF Downloads 4136869 The Influence of the Form of Grain on the Mechanical Behaviour of Sand
Authors: Mohamed Boualem Salah
Abstract:
The size and shape of soil particles reflect the formation history of the grains. In turn, the macro scale behavior of the soil mass results from particle level interactions which are affected by particle shape. Sphericity, roundness and smoothness characterize different scales associated to particle shape. New experimental data and data from previously published studies are gathered into two databases to explore the effects of particle shape on packing as well as small and large-strain properties of sandy soils. Data analysis shows that increased particle irregularity (angularity and/or eccentricity) leads to: an increase in emax and emin, a decrease in stiffness yet with increased sensitivity to the state of stress, an increase in compressibility under zero-lateral strain loading, and an increase in critical state friction angle φcs and intercept Γ with a weak effect on slope λ. Therefore, particle shape emerges as a significant soil index property that needs to be properly characterized and documented, particularly in clean sands and gravels. The systematic assessment of particle shape will lead to a better understanding of sand behavior.Keywords: angularity, eccentricity, shape particle, behavior of soil
Procedia PDF Downloads 4136868 Improved Structure and Performance by Shape Change of Foam Monitor
Authors: Tae Gwan Kim, Hyun Kyu Cho, Young Hoon Lee, Young Chul Park
Abstract:
Foam monitors are devices that are installed on cargo tank decks to suppress cargo area fires in oil tankers or hazardous chemical ship cargo ships. In general, the main design parameter of the foam monitor is the distance of the projection through the foam monitor. In this study, the relationship between flow characteristics and projection distance, depending on the shape was examined. Numerical techniques for fluid analysis of foam monitors have been developed for prediction. The flow pattern of the fluid varies depending on the shape of the flow path of the foam monitor, as the flow losses affecting projection distance were calculated through numerical analysis. The basic shape of the foam monitor was an L shape designed by N Company. The modified model increased the length of the flow path and used the S shape model. The calculation result shows that the L shape, which is the basic shape, has a problem that the force is directed to one side and the vibration and noise are generated there. In order to solve the problem, S-shaped model, which is a change model, was used. As a result, the problem is solved, and the projection distance from the nozzle is improved.Keywords: CFD, foam monitor, projection distance, moment
Procedia PDF Downloads 3436867 Pseudo Modal Operating Deflection Shape Based Estimation Technique of Mode Shape Using Time History Modal Assurance Criterion
Authors: Doyoung Kim, Hyo Seon Park
Abstract:
Studies of System Identification(SI) based on Structural Health Monitoring(SHM) have actively conducted for structural safety. Recently SI techniques have been rapidly developed with output-only SI paradigm for estimating modal parameters. The features of these output-only SI methods consist of Frequency Domain Decomposition(FDD) and Stochastic Subspace Identification(SSI) are using the algorithms based on orthogonal decomposition such as singular value decomposition(SVD). But the SVD leads to high level of computational complexity to estimate modal parameters. This paper proposes the technique to estimate mode shape with lower computational cost. This technique shows pseudo modal Operating Deflections Shape(ODS) through bandpass filter and suggests time history Modal Assurance Criterion(MAC). Finally, mode shape could be estimated from pseudo modal ODS and time history MAC. Analytical simulations of vibration measurement were performed and the results with mode shape and computation time between representative SI method and proposed method were compared.Keywords: modal assurance criterion, mode shape, operating deflection shape, system identification
Procedia PDF Downloads 4106866 Some Pertinent Issues and Considerations on CBSE
Authors: Anil Kumar Tripathi, Ratneshwer Gupta
Abstract:
All the software engineering researches and best industry practices aim at providing software products with high degree of quality and functionality at low cost and less time. These requirements are addressed by the Component Based Software Engineering (CBSE) as well. CBSE, which deals with the software construction by components’ assembly, is a revolutionary extension of Software Engineering. CBSE must define and describe processes to assure timely completion of high quality software systems that are composed of a variety of pre built software components. Though these features provide distinct and visible benefits in software design and programming, they also raise some challenging problems. The aim of this work is to summarize the pertinent issues and considerations in CBSE to make an understanding in forms of concepts and observations that may lead to development of newer ways of dealing with the problems and challenges in CBSE.Keywords: software component, component based software engineering, software process, testing, maintenance
Procedia PDF Downloads 4016865 Effectiveness of Software Quality Assurance in Offshore Development Enterprises in Sri Lanka
Authors: Malinda Gayan Sirisena
Abstract:
The aim of this research is to evaluate the effectiveness of software quality assurance approaches of Sri Lankan offshore software development organizations, and to propose a framework which could be used across all offshore software development organizations. An empirical study was conducted using derived framework from popular software quality evaluation models. The research instrument employed was a questionnaire survey among thirty seven Sri Lankan registered offshore software development organizations. The findings demonstrate a positive view of Effectiveness of Software Quality Assurance – the stronger predictors of Stability, Installability, Correctness, Testability and Changeability. The present study’s recommendations indicate a need for much emphasis on software quality assurance for the Sri Lankan offshore software development organizations.Keywords: software quality assurance (SQA), offshore software development, quality assurance evaluation models, effectiveness of quality assurance
Procedia PDF Downloads 4216864 Estimation of Fourier Coefficients of Flux Density for Surface Mounted Permanent Magnet (SMPM) Generators by Direct Search Optimization
Authors: Ramakrishna Rao Mamidi
Abstract:
It is essential for Surface Mounted Permanent Magnet (SMPM) generators to determine the performance prediction and analyze the magnet’s air gap flux density wave shape. The flux density wave shape is neither a pure sine wave or square wave nor a combination. This is due to the variation of air gap reluctance between the stator and permanent magnets. The stator slot openings and the number of slots make the wave shape highly complicated. To reduce the complexity of analysis, approximations are made to the wave shape using Fourier analysis. In contrast to the traditional integration method, the Fourier coefficients, an and bn, are obtained by direct search method optimization. The wave shape with optimized coefficients gives a wave shape close to the desired wave shape. Harmonics amplitudes are worked out and compared with initial values. It can be concluded that the direct search method can be used for estimating Fourier coefficients for irregular wave shapes.Keywords: direct search, flux plot, fourier analysis, permanent magnets
Procedia PDF Downloads 2166863 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
Authors: Carlos Gonzalez
Abstract:
This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.Keywords: internet, secure software, threats, cryptography process
Procedia PDF Downloads 3336862 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 2506861 Heterogeneous Artifacts Construction for Software Evolution Control
Authors: Mounir Zekkaoui, Abdelhadi Fennan
Abstract:
The software evolution control requires a deep understanding of the changes and their impact on different system heterogeneous artifacts. And an understanding of descriptive knowledge of the developed software artifacts is a prerequisite condition for the success of the evolutionary process. The implementation of an evolutionary process is to make changes more or less important to many heterogeneous software artifacts such as source code, analysis and design models, unit testing, XML deployment descriptors, user guides, and others. These changes can be a source of degradation in functional, qualitative or behavioral terms of modified software. Hence the need for a unified approach for extraction and representation of different heterogeneous artifacts in order to ensure a unified and detailed description of heterogeneous software artifacts, exploitable by several software tools and allowing to responsible for the evolution of carry out the reasoning change concerned.Keywords: heterogeneous software artifacts, software evolution control, unified approach, meta model, software architecture
Procedia PDF Downloads 4456860 Thermal Resistance of Special Garments Exposed to a Radiant Heat
Authors: Jana Pichova, Lubos Hes, Vladimir Bajzik
Abstract:
Protective clothing is designed to keep a wearer save in hazardous conditions or enable perform short time working operation without being injured or feeling discomfort. Firefighters or other related workers are exposed to abnormal heat which can be conductive, convective or radiant type. Their garment is proposed to resist this conditions and prevent burn injuries or dead of human. However thermal comfort of firefighter exposed to high heat source have not been studied yet. Thermal resistance is the best representative parameter of thermal comfort. In this study a new method of testing of thermal resistance of special clothing exposed to high radiation heat source was designed. This method simulates human body wearing single or multi-layered garment which is exposed to radiative heat. Setup of this method enables measuring of radiative heat flow in time without effect of convection. The new testing method is verified on chosen group of textiles for firefighters.Keywords: protective clothing, radiative heat, thermal comfort of firefighters, thermal resistance of special garments
Procedia PDF Downloads 3796859 Neural Network Based Approach of Software Maintenance Prediction for Laboratory Information System
Authors: Vuk M. Popovic, Dunja D. Popovic
Abstract:
Software maintenance phase is started once a software project has been developed and delivered. After that, any modification to it corresponds to maintenance. Software maintenance involves modifications to keep a software project usable in a changed or a changing environment, to correct discovered faults, and modifications, and to improve performance or maintainability. Software maintenance and management of software maintenance are recognized as two most important and most expensive processes in a life of a software product. This research is basing the prediction of maintenance, on risks and time evaluation, and using them as data sets for working with neural networks. The aim of this paper is to provide support to project maintenance managers. They will be able to pass the issues planned for the next software-service-patch to the experts, for risk and working time evaluation, and afterward to put all data to neural networks in order to get software maintenance prediction. This process will lead to the more accurate prediction of the working hours needed for the software-service-patch, which will eventually lead to better planning of budget for the software maintenance projects.Keywords: laboratory information system, maintenance engineering, neural networks, software maintenance, software maintenance costs
Procedia PDF Downloads 3586858 Catered Lunch Suspected Outbreak in a Garment Factory, Sleman District, Yogyakarta, Indonesia, 2017
Authors: Rieski Prihastuti, Meliana Depo, Trisno A. Wibowo, Misinem
Abstract:
On October 19, 2017, Yogyakarta Islamic Hospital reported 38 garment employees with nausea, vomiting, headache, abdominal pain, and diarrhea after they had lunch on October 18, 2017, to Sleman District Health Office. Objectives of this study were to ensure the outbreak and identify source and route of transmission. Case-control study was conducted to analyze food items that caused the outbreak. A case was defined as a person who got symptoms such as abdominal pain, diarrhea, nausea with/without vomiting, fever, and headache after they had lunch on October 18, 2017. Samples included leftover lunch box, vomit, tap water and drinking water had been sent to the laboratory. Data were analyzed descriptively as frequency table and analyzed by using chi-square in bivariate analysis. All of 196 garment employee was included in this study. The common symptoms of this outbreak were abdominal pain (84.4%), diarrhea (72.8%), nausea (61.6%), headache (52.8%), vomiting (12.8%), and fever (6.4%) with median incubation period 13 hours (range 1-34 hours). Highest attack rate and odds ratio was found in grilled chicken (Attack Rate 58,49%) with Odds Ratio 11,023 (Confidence Interval 95% 1.383 - 87.859; p value 0,005). Almost all samples showed mold, except drinking water. Based on its sign and symptoms, also incubation period, diarrheal Bacillus cereus and Clostridium perfringens were suspected to be the causative agent of the outbreak. Limitation of this study was improper sample handling and no sample of food handler and stools in the food caterer. Outbreak investigation training needed to be given to the hospital worker, and monitoring should be done to the food caterer to prevent another outbreak.Keywords: disease outbreak, foodborne disease, food poisoning, outbreak
Procedia PDF Downloads 1586857 Eco-Fashion Dyeing of Denim and Knitwear with Particle-Dyes
Authors: Adriana Duarte, Sandra Sampaio, Catia Ferreira, Jaime I. N. R. Gomes
Abstract:
With the fashion of faded worn garments the textile industry has moved from indigo and pigments to dyes that are fixed by cationization, with products that can be toxic, and that can show this effect after washing down the dye with friction and/or treating with enzymes in a subsequent operation. Increasingly they are treated with bleaches, such as hypochlorite and permanganate, both toxic substances. An alternative process is presented in this work for both garment and jet dyeing processes, without the use of pre-cationization and the alternative use of “particle-dyes”. These are hybrid products, made up by an inorganic particle and an organic dye. With standard soluble dyes, it is not possible to avoid diffusion into the inside of the fiber unless using previous cationization. Only in this way can diffusion be avoided keeping the centre of the fibres undyed so as to produce the faded effect by removing the surface dye and showing the white fiber beneath. With “particle-dyes”, previous cationization is avoided. By applying low temperatures, the dye does not diffuse completely into the inside of the fiber, since it is a particle and not a soluble dye, being then able to give the faded effect. Even though bleaching can be used it can also be avoided, by the use of friction and enzymes they can be used just as for other dyes. This fashion brought about new ways of applying reactive dyes by the use of previous cationization of cotton, lowering the salt, and temperatures that reactive dyes usually need for reacting and as a side effect the application of a more environmental process. However, cationization is a process that can be problematic in applying it outside garment dyeing, such as jet dyeing, being difficult to obtain level dyeings. It also should be applied by a pad-fix or Pad-batch process due to the low affinity of the pre-cationization products making it a more expensive process, and the risk of unlevelness in processes such as jet dyeing. Wit particle-dyes, since no pre-cationizartion is necessary, they can be applied in jet dyeing. The excess dye is fixed by a fixing agent, fixing the insoluble dye onto the surface of the fibers. By applying the fixing agent only one to 1-3 rinses in water at room temperature are necessary, saving water and improving the washfastness.Keywords: denim, garment dyeing, worn look, eco-fashion
Procedia PDF Downloads 5376856 Software Quality Measurement System for Telecommunication Industry in Malaysia
Authors: Nor Fazlina Iryani Abdul Hamid, Mohamad Khatim Hasan
Abstract:
Evolution of software quality measurement has been started since McCall introduced his quality model in year 1977. Starting from there, several software quality models and software quality measurement methods had emerged but none of them focused on telecommunication industry. In this paper, the implementation of software quality measurement system for telecommunication industry was compulsory to accommodate the rapid growth of telecommunication industry. The quality value of the telecommunication related software could be calculated using this system by entering the required parameters. The system would calculate the quality value of the measured system based on predefined quality metrics and aggregated by referring to the quality model. It would classify the quality level of the software based on Net Satisfaction Index (NSI). Thus, software quality measurement system was important to both developers and users in order to produce high quality software product for telecommunication industry.Keywords: software quality, quality measurement, quality model, quality metric, net satisfaction index
Procedia PDF Downloads 5926855 The Comparison of Open Source Software for Digital Libraries
Authors: Kanita Beširević
Abstract:
Open-source software development activities highly rely on Internet gathering communities volunteering in software development projects. Additionally, the libraries and cultural institutions share their metadata in the form of linked metadata to enable dissemination and enrichment. The open-source software provides free alternatives to traditional software solutions. The article aims to investigate the ever-increasing options for the digital library open source software adoption. The software available is presented and compared to other software solutions as well as to their previous versions. The top three open-source digital library software solutions are presented and compared. The comparison criteria are adopted from the UNESCO study by Bankier, J., & Gleason, K. Institutional Repository Software Comparison comprising of twelve criteria to appraise software, namely: infrastructure, front-end design, content discovery, publication tools, interoperability, and preservation. This article adopts a descriptive methodology based on data and information collected through selected software websites and the literature review.Keywords: open source software, digital library, DSpace, Fedora, Greenstone
Procedia PDF Downloads 1166854 Effect of Footing Shape on Bearing Capacity and Settlement of Closely Spaced Footings on Sandy Soil
Authors: A. Shafaghat, H. Khabbaz, S. Moravej, Ah. Shafaghat
Abstract:
The bearing capacity of closely spaced shallow footings alters with their spacing and the shape of footing. In this study, the bearing capacity and settlement of two adjacent footings constructed on a sand layer are investigated. The effect of different footing shapes including square, circular, ring and strip on sandy soil is captured in the calculations. The investigations are carried out numerically using PLAXIS-3D software and analytically employing conventional settlement equations. For this purpose, foundations are modelled in the program with practical dimensions and various spacing ratios ranging from 1 to 5. The spacing ratio is defined as the centre-to-centre distance to the width of foundations (S/B). Overall, 24 models are analyzed; and the results are compared and discussed in detail. It can be concluded that the presence of adjacent foundation leads to the reduction in bearing capacity for round shape footings while it can increase the bearing capacity of rectangular footings in some specific distances.Keywords: bearing capacity, finite element analysis, loose sand, settlement equations, shallow foundation
Procedia PDF Downloads 2566853 Optimization of Plastic Injection Molding Parameters by Altering Gate and Runner of Feeding System
Authors: Ali Ramezani
Abstract:
Balancing feeding system of plastic injection molding has overriding importance as it minimizes the process’s product defects such as weld line, shrinkage, sink marks and warpage. This article presents the difference between optimization of feeding system in identical multi-cavity molding and family molding using Moldflow Plastic Insight software. In this work, the effect of dimension, shape, position and type of gates and runners on the products quality was studied. The optimization was carried out by analyzing plastic injection molding process parameters, including melt temperature, mold temperature, cooling time, cooling temperature packing time and packing pressure. It was found that symmetrical feeding system is the most efficient shape for diminishing defects in identical multi-cavity molding. However, the same results were not concluded for family molding due to the differences between volume, mass, thickness and shape of cavities.Keywords: balancing feeding system, family molding, multi-cavity, Moldflow, plastic injection
Procedia PDF Downloads 1356852 Importance of Hardware Systems and Circuits in Secure Software Development Life Cycle
Authors: Mir Shahriar Emami
Abstract:
Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models.Keywords: SDLC, SSDLC, software security, software process engineering, hardware systems and circuits security
Procedia PDF Downloads 2616851 Four Phase Methodology for Developing Secure Software
Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García
Abstract:
A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis
Procedia PDF Downloads 3996850 Visible Expression of Social Identity: The Clothing and Fashion
Authors: Nihan Akdemir
Abstract:
Clothes are more than a piece of fabric, and the most visible material item of the fashion symbol is the garment, which carries multiple and various meanings. The dynamism of the clothing symbol can carry open or closed codes depending on culture, gender, and social location. And each one can be the expression of social identity over ethnicity, religious beliefs, age, education and social class. Through observation of clothing styles over these items, the assumptions could be made about a person’s identity. A distinctive and typical style, form or character of the clothing such as ‘zoot suits’, ‘ao dai’, removes the garment from functional and ordinary element to the symbolic area. Clothing is an 'identification' tool that functions in determining the symbolic boundaries between people in a sense. And this paper includes the investigation of the relation between social identity and clothing and also fashion. And this relationship has been taken into consideration over the visual expression because even during the ancient times, the clothes were the basic and simple way of representing the identity and social classes. The visible expression of identity over clothing from Ancient Egypt to today’s clothing and fashion has been researched in this article. And all these items have been explained with visual images and supported by the literature investigations. Then the results have shown that every piece of clothing from fabric to coloring have visual significations about social identity.Keywords: social identity, clothing, fashion, visual expression, visual signification
Procedia PDF Downloads 6176849 The Shape Memory Recovery Properties under Load of a Polymer Composite
Authors: Abdul Basit, Gildas Lhostis, Bernard Durand
Abstract:
Shape memory polymers (SMPs) are replacing shape memory alloys (SMAs) in many applications as SMPs have certain superior properties than SMAs. However, SMAs possess some properties like recovery under stress that SMPs lack. SMPs cannot give complete recovery even under a small load. SMPs are initially heated close to their transition temperature (glass transition temperature or the melting temperature). Then force is applied to deform the heated SMP to a specific position. Subsequently, SMP is allowed to cool keeping it deformed. After cooling, SMP gets the temporary shape. This temporary shape can be recovered by heating it again at the same temperature that was given it while heating it initially. As a result, it will recover its original position. SMP can perform unconstrained recovery and constrained recovery, however; under the load, it only recovers partially. In this work, the recovery under the load of an asymmetrical shape memory composite called as CBCM-SMPC has been investigated. It is found that it has the ability to recover under different loads. Under different loads, it shows powerful complete recovery in reference to initial position. This property can be utilized in many applications.Keywords: shape memory, polymer composite, thermo-mechanical testing, recovery under load
Procedia PDF Downloads 4386848 A Study on the Improvement of the Bond Performance of Polypropylene Macro Fiber according to Longitudinal Shape Change
Authors: Sung-yong Choi, Woo-tai Jung, Young-hwan Park
Abstract:
This study intends to improve the bond performance of the polypropylene fiber used as reinforcing fiber for concrete by changing its shape into double crimped type through the enhancement its fabrication process. The bond performance of such double crimped fiber is evaluated by applying the JCI SF-8 (dog-bone shape) testing method. The test results reveal that the double crimped fiber develops bond performance improved by more than 19% compared to the conventional crimped type fiber.Keywords: Bond, Polypropylene, fiber reinforcement, macro fiber, shape change
Procedia PDF Downloads 4626847 Investigating Software Engineering Challenges in Game Development
Authors: Fawad Zaidi
Abstract:
This paper discusses a variety of challenges and solutions involved with creating computer games and the issues faced by the software engineers working in this field. This review further investigates the articles coverage of project scope and the problem of feature creep that appears to be inherent with game development. The paper tries to answer the following question: Is this a problem caused by a shortage, or bad software engineering practices, or is this outside the control of the software engineering component of the game production process?Keywords: software engineering, computer games, software applications, development
Procedia PDF Downloads 475