To effectively evaluate the fuzziness of the market environment in product planning,a customer requirements analysis method based on multiple preference information is proposed.Firstly,decision-makers use a preferred ...To effectively evaluate the fuzziness of the market environment in product planning,a customer requirements analysis method based on multiple preference information is proposed.Firstly,decision-makers use a preferred information form to evaluate the importance of each customer requirement.Secondly,a transfer function is employed to unify various forms of preference information into a fuzzy complementary judgment matrix.The ranking vector is then calculated using row and normalization methods,and the initial importance of customer requirements is obtained by aggregating the weights of decision members.Finally,the correction coefficients of initial importance and each demand are synthesized,and the importance of customer requirements is determined through normalization.The development example of the PE jaw crusher demonstrates the effectiveness and feasibility of the proposed method.展开更多
Our dependability on software in every aspect of our lives has exceeded the level that was expected in the past. We have now reached a point where we are currently stuck with technology, and it made life much easier t...Our dependability on software in every aspect of our lives has exceeded the level that was expected in the past. We have now reached a point where we are currently stuck with technology, and it made life much easier than before. The rapid increase of technology adoption in the different aspects of life has made technology affordable and has led to an even stronger adoption in the society. As technology advances, almost every kind of technology is now connected to the network like infrastructure, automobiles, airplanes, chemical factories, power stations, and many other systems that are business and mission critical. Because of our high dependency on technology in most, if not all, aspects of life, a system failure is considered to be very critical and might result in harming the surrounding environment or put human life at risk. We apply our conceptual framework to integration between security and safety by creating a SaS (Safety and Security) domain model. Furthermore, it demonstrates that it is possible to use goal-oriented KAOS (Knowledge Acquisition in automated Specification) language in threat and hazard analysis to cover both safety and security domains making their outputs, or artifacts, well-structured and comprehensive, which results in dependability due to the comprehensiveness of the analysis. The conceptual framework can thereby act as an interface for active interactions in risk and hazard management in terms of universal coverage, finding solutions for differences and contradictions which can be overcome by integrating the safety and security domains and using a unified system analysis technique (KAOS) that will result in analysis centrality. For validation we chose the Systems-Theoretic Accident Model and Processes (STAMP) approach and its modelling language, namely System-Theoretic Process Analysis for safety (STPA), on the safety side and System-Theoretic Process Analysis for Security (STPA-sec) on the security side in order to be the base of the experiment in comparison to what was done in SaS. The concepts of SaS domain model were applied on STAMP approach using the same example @RemoteSurgery.展开更多
New accounting standards set that once any loss of asset impairment is recognized, here mainly refer to long-term assets, it shall not be switched back in the future accounting periods. In the author's opinion, this ...New accounting standards set that once any loss of asset impairment is recognized, here mainly refer to long-term assets, it shall not be switched back in the future accounting periods. In the author's opinion, this provision has some conflicts with the accounting information quality requirements which require reliability, relevance, comparability, and caution. This paper mainly analyzes the contradictions by comparing the provision with the requirements and putting forward relevant solutions. In the end, this paper has drawn the conclusion that the loss of the long-term asset impairment shall be allowed to switch back with certain conditions.展开更多
Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integr...Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out.展开更多
Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current softwar...Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current software engineering methods extract software requirements by converting legal text into semiformal constraints and rules. In this paper we complement these methods with a state-based model that includes all possibilities of information flow. We show that such a model provides a foundation for the interpretation process.展开更多
Multimedia Interactive Informative Systems (MIIS) are software applications resulting from the convergence of multiples technologies such as audiovisual, computing and communication. They aim to transmit information t...Multimedia Interactive Informative Systems (MIIS) are software applications resulting from the convergence of multiples technologies such as audiovisual, computing and communication. They aim to transmit information to a large, diverse and dispersed public. As with other mass media, the fulfillment of MIIS goals depends largely on the quality of communication between the system and end users. Therefore, those systems should be developed in order to ensure that this quality requirement is satisfied. If MIIS are constructed according to usual software engineering practices, the analysis discipline of the development process includes requirements identification and specification;however, these techniques are focused on functional requirements, and they do not give much importance to non-functional requirements. In this paper, we propose a development process based on the production of videogames which has two different phases: preproduction and production. The first phase, corresponding to requirements identification, derives into the concept of system. In order to translate this concept into a specification, we propose the use of new communicational attributes and a MIIS metamodel. The establishment of MIIS non-functional specification is the result of analyzing class diagrams through quality attributes. In order to evaluate if the specifications are responding to communicational attributes, a functional prototype is built and evaluated with end users. The proposed methodology is applied to a real case study.展开更多
为解决航空信息网络场景下业务突发、拓扑结构动态变化以及资源有限所带来的资源利用效率低下问题,针对服务功能链请求(Service Function Chain Requirement,SFCR)高效调度的难题,提出一种网络功能虚拟化的服务功能链调度算法。算法依据...为解决航空信息网络场景下业务突发、拓扑结构动态变化以及资源有限所带来的资源利用效率低下问题,针对服务功能链请求(Service Function Chain Requirement,SFCR)高效调度的难题,提出一种网络功能虚拟化的服务功能链调度算法。算法依据SFCR与平台的相关性进行映射,提高服务器处理效率并有效减少虚拟网络功能实例化数量及整合平台资源;综合考虑时延和流量影响对网络功能实例进行整合迁移,降低网络能耗同时提升网络资源利用率。仿真结果表明,在满足时延需求条件下,新方法在运行平台数量、SFCR接受率、网络资源消耗等方面具有较好的优化性能,适用于解决航空信息网络场景下的SFCR调度问题。展开更多
文摘To effectively evaluate the fuzziness of the market environment in product planning,a customer requirements analysis method based on multiple preference information is proposed.Firstly,decision-makers use a preferred information form to evaluate the importance of each customer requirement.Secondly,a transfer function is employed to unify various forms of preference information into a fuzzy complementary judgment matrix.The ranking vector is then calculated using row and normalization methods,and the initial importance of customer requirements is obtained by aggregating the weights of decision members.Finally,the correction coefficients of initial importance and each demand are synthesized,and the importance of customer requirements is determined through normalization.The development example of the PE jaw crusher demonstrates the effectiveness and feasibility of the proposed method.
文摘Our dependability on software in every aspect of our lives has exceeded the level that was expected in the past. We have now reached a point where we are currently stuck with technology, and it made life much easier than before. The rapid increase of technology adoption in the different aspects of life has made technology affordable and has led to an even stronger adoption in the society. As technology advances, almost every kind of technology is now connected to the network like infrastructure, automobiles, airplanes, chemical factories, power stations, and many other systems that are business and mission critical. Because of our high dependency on technology in most, if not all, aspects of life, a system failure is considered to be very critical and might result in harming the surrounding environment or put human life at risk. We apply our conceptual framework to integration between security and safety by creating a SaS (Safety and Security) domain model. Furthermore, it demonstrates that it is possible to use goal-oriented KAOS (Knowledge Acquisition in automated Specification) language in threat and hazard analysis to cover both safety and security domains making their outputs, or artifacts, well-structured and comprehensive, which results in dependability due to the comprehensiveness of the analysis. The conceptual framework can thereby act as an interface for active interactions in risk and hazard management in terms of universal coverage, finding solutions for differences and contradictions which can be overcome by integrating the safety and security domains and using a unified system analysis technique (KAOS) that will result in analysis centrality. For validation we chose the Systems-Theoretic Accident Model and Processes (STAMP) approach and its modelling language, namely System-Theoretic Process Analysis for safety (STPA), on the safety side and System-Theoretic Process Analysis for Security (STPA-sec) on the security side in order to be the base of the experiment in comparison to what was done in SaS. The concepts of SaS domain model were applied on STAMP approach using the same example @RemoteSurgery.
文摘New accounting standards set that once any loss of asset impairment is recognized, here mainly refer to long-term assets, it shall not be switched back in the future accounting periods. In the author's opinion, this provision has some conflicts with the accounting information quality requirements which require reliability, relevance, comparability, and caution. This paper mainly analyzes the contradictions by comparing the provision with the requirements and putting forward relevant solutions. In the end, this paper has drawn the conclusion that the loss of the long-term asset impairment shall be allowed to switch back with certain conditions.
文摘Having criticized the current architecture of Advanced Traveler Information Systems (ATISs), this work discusses a new base of requirements to develop a new paradigm for traffic information systems. It mainly integrates three dimensions within a traffic system: drivers' pattern of behavior and preferences, urban traffic desires, and capabilities of traffic information service providers. Based on the above, functional segments from several related backgrounds are brought together to structure a new architecture, called Interactive Traveler Information System (ITIS). The main interactive feature of this new architecture is a two-way communication track between drivers and the traffic information system provider-in fact, a decision on choosing a road at a particular time for an individual will be made based on the utility of both sides. This new configuration consists of driver-side smartphone application, centric traffic prediction, and decision-maker units, which will shape a new approach of decision-making processes. These all work together to satisfy the designated goal of ITIS, which is preserving the Wardrop equilibrium condition in the traffic network level. Finally, we concentrate on a comparison study, which shows a differentiation between performance of the proposed ITIS and the current ATIS model in a real situation. This has been done with simulations of analogical scenarios. The most noticeable advantage of the proposed architecture is not being limited to a saturation limit, and the positive effect of increasing system penetration in the performance of the newly introduced information system. In conclusion, new research subjects are suggested to be carried out.
文摘Laws and policies impose many information handling requirements on business practices. Compliance with such regu-lations requires identification of conflicting interpretations of regulatory conditions. Current software engineering methods extract software requirements by converting legal text into semiformal constraints and rules. In this paper we complement these methods with a state-based model that includes all possibilities of information flow. We show that such a model provides a foundation for the interpretation process.
文摘Multimedia Interactive Informative Systems (MIIS) are software applications resulting from the convergence of multiples technologies such as audiovisual, computing and communication. They aim to transmit information to a large, diverse and dispersed public. As with other mass media, the fulfillment of MIIS goals depends largely on the quality of communication between the system and end users. Therefore, those systems should be developed in order to ensure that this quality requirement is satisfied. If MIIS are constructed according to usual software engineering practices, the analysis discipline of the development process includes requirements identification and specification;however, these techniques are focused on functional requirements, and they do not give much importance to non-functional requirements. In this paper, we propose a development process based on the production of videogames which has two different phases: preproduction and production. The first phase, corresponding to requirements identification, derives into the concept of system. In order to translate this concept into a specification, we propose the use of new communicational attributes and a MIIS metamodel. The establishment of MIIS non-functional specification is the result of analyzing class diagrams through quality attributes. In order to evaluate if the specifications are responding to communicational attributes, a functional prototype is built and evaluated with end users. The proposed methodology is applied to a real case study.
文摘为解决航空信息网络场景下业务突发、拓扑结构动态变化以及资源有限所带来的资源利用效率低下问题,针对服务功能链请求(Service Function Chain Requirement,SFCR)高效调度的难题,提出一种网络功能虚拟化的服务功能链调度算法。算法依据SFCR与平台的相关性进行映射,提高服务器处理效率并有效减少虚拟网络功能实例化数量及整合平台资源;综合考虑时延和流量影响对网络功能实例进行整合迁移,降低网络能耗同时提升网络资源利用率。仿真结果表明,在满足时延需求条件下,新方法在运行平台数量、SFCR接受率、网络资源消耗等方面具有较好的优化性能,适用于解决航空信息网络场景下的SFCR调度问题。