The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece...The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.展开更多
Recent advances in thermochemical storage technology have introduced a novel closed-loop thermal energy storage(TES)system,known as the heat battery(HB),which is believed to have great potential for aiding the energy ...Recent advances in thermochemical storage technology have introduced a novel closed-loop thermal energy storage(TES)system,known as the heat battery(HB),which is believed to have great potential for aiding the energy transition in the built environment because of its higher energy density and neglectable storage loss compared to conventional TES systems.In order to investigate the potential use cases of the HB and provide practical feedback for its further development,this research employs a simulation-based approach to analyze its influence on building performance in various use cases within Dutch residential buildings.Stakeholders including the homeowner,distribution system operator,and district heating system operator are identified,and a preliminary list of use cases is defined based on relevant literature and input from the HB developer.The simulation approach is conducted to predict key performance indicators for each stakeholder.The Kruskal-Wallis test was employed to sort and scrutinize the simulation outcomes and discern the significance of each use case element.The findings demonstrated that the HB holds the potential to diminish both the operational energy cost by up to 30%for the homeowners and the peak heating load transmitted from the building to the district heating system.展开更多
A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security func...A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security functions and latent typical misuse behaviors,but also with the interaction of them.In this paper,we analyze the differences between SETAM with security use case and security misuse case in different types of security test requirements.To illustrate the effectiveness of SETAM,we compare them in a practical case study by the number of test cases and the number of faults detected by them.The results show that SETAM could decrease about 34.87% use cases on average,and the number of faults detected by SETAM increased by 71.67% in average,which means that our model can detect more faults with fewer test cases for software security testing.展开更多
The formal process of system design begins with the identification of use cases.No such cases are readily apparent for the current generation of geobrowsers,though the text of the 1998 Gore speech refers to several.An...The formal process of system design begins with the identification of use cases.No such cases are readily apparent for the current generation of geobrowsers,though the text of the 1998 Gore speech refers to several.An analysis of the use cases of geographic information systems(GIS)reveals similarities with the functionality of geobrowsers,inviting the view that the two forms of geographic information technology will eventually converge.However,experience suggests that users are finding very different ways of exploiting geobrowsers,and two examples are discussed in detail.These uses can be interpreted within a broad framework of spatial concepts,and the paper concludes that this framework provides a better guide to the future of geobrowsers and Digital Earth than current GIS technology.展开更多
In this work, we present DUSM (Disciplined Use Cases with Screen Mockups), a novel method for describing and refining requirements specifications based on disciplined use cases and screen mockups. Disciplined use ca...In this work, we present DUSM (Disciplined Use Cases with Screen Mockups), a novel method for describing and refining requirements specifications based on disciplined use cases and screen mockups. Disciplined use cases are characterized by a quite stringent template to prevent common mistakes, and to increase the quality of the specifications. Use cases descriptions are formulated in a structured natural language, which allows to reach a good level of precision, avoiding the need for further notations and complex models. Screen mockups are precisely associated with the steps of the use cases scenarios and they present the corresponding GUIs (graphical user interfaces) as seen by the human actors before/after the steps executions, improving the comprehension and the expression of the non-functional requirements on the user interface. DUSM has been proposed and fine-tuned during several editions of a software engineering course at the University of Genova. Then, by means of a series of case studies and experiments, we validated the method and evaluated: 1) its effectiveness in improving the comprehension and, in general, the quality of the produced requirements specification, and 2) its applicability in the industry, where the method has been found useful and not particularly onerous.展开更多
Semantic representation of evidence-based medical guidelines provides the support for the data inter-operability and has been found many applications in the medical domain. In this paper, we describe a semantic repres...Semantic representation of evidence-based medical guidelines provides the support for the data inter-operability and has been found many applications in the medical domain. In this paper, we describe a semantic representation approach of evidence-based medical guidelines, which is based on the Semantic Web Technology standards. We discuss several use cases of that semantic representation of evidence-based medical guideline, and show that they are potentially useful for medical applications.展开更多
Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect diffe...Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect different use cases. This paper presents an approach to identify base flows and alternative flows of different use cases by traversing control flow graph in which back edges are eliminated. The effectiveness of the approach is verified by identification of the use case structure of an ATM system. The workload of human intervention of the approach is relatively slight, and the manner of human intervention closely follows the usual process of software comprehension.展开更多
1.Patient's conditionsA 29-year-old man,was infected with nongonococcal urethritis(NGU).He complained that he had dysuria and discomfort in the urethra and mucopurulent discharge,which appeared one week after inte...1.Patient's conditionsA 29-year-old man,was infected with nongonococcal urethritis(NGU).He complained that he had dysuria and discomfort in the urethra and mucopurulent discharge,which appeared one week after intercourse.展开更多
Hiccups are common, usually mild with no obvious cause and often resolve spontaneously. They are classified as transient, persistent and intractable depending on the duration. Drug induced hiccups have been reported i...Hiccups are common, usually mild with no obvious cause and often resolve spontaneously. They are classified as transient, persistent and intractable depending on the duration. Drug induced hiccups have been reported in medical literature but not common and corticosteroids are often cited. This report involved 2 male patients who developed persistent hiccups following use of oral dexamethasone for inflammatory conditions. The hiccups were severe and intolerable and could not stop despite use of metoclopramide and chlorpromazine. The hiccups only stopped following discontinuation of the dexamethasone. It should be noted that low dose of dexamethasone was used. Management of dexamethasone induced hiccups involves discontinuation of the drug, steroid rotation if the patient is steroid dependent and use of metoclopramide and chlorpromazine. Clinicians should be aware of this known but rare adverse effect of dexamethasone as it could be severe, distressful and negatively impart patients care. There is a need for a high index of suspicion whenever a patient develops hiccups while taking dexamethasone.展开更多
Blockchain is one of the innovative and disruptive technologies that has a wide range of applications in multiple industries beyond cryptocurrency.The widespread adoption of blockchain technology in various industries...Blockchain is one of the innovative and disruptive technologies that has a wide range of applications in multiple industries beyond cryptocurrency.The widespread adoption of blockchain technology in various industries has shown its potential to solve challenging business problems,as well as the possibility to create new business models which can increase a firm’s competitiveness.Due to the novelty of the technology,whereby many companies are still exploring potential use cases,and considering the complexity of blockchain technology,which may require huge changes to a company’s existing systems and processes,it is important for companies to carefully evaluate suitable use cases and determine if blockchain technology is the best solution for their specific needs.This research aims to provide an evaluation framework that determines the important dimensions of blockchain suitability assessment by identifying the key determinants of suitable use cases in a business context.In this paper,a novel approach that utilizes both qualitative(Delphi method)and quantitative(fuzzy set theory)methods has been proposed to objectively account for the uncertainty associated with data collection and the vagueness of subjective judgments.This work started by scanning available literature to identify major suitability dimensions and collected a range of criteria,indicators,and factors that had been previously identified for related purposes.Expert opinions were then gathered using a questionnaire to rank the importance and relevance of these elements to suitability decisions.Subsequently,the data were analyzed and we proceeded to integrate multi-criteria group decision-making(MCGDM)and intuitionistic fuzzy set(IFS)theory.The findings demonstrated a high level of agreement among experts,with the model being extremely sensitive to variances in expert assessments.Furthermore,the results helped to refine and select the most relevant suitability determinants under three important dimensions:functional suitability of the use case,organizational applicability,and ecosystem readiness.展开更多
The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°...The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°52'5''W) a town with 3000 inhabitants. Both weather stations are 30 km from each other in the Chiapas State, México. 54 years of daily records of the series of maximum (<em>t</em><sub>max</sub>) and minimum temperatures (<em>t</em><sub>min</sub>) of the weather station 07205 Comitan that is on top of a house and 30 years of daily records of the weather station 07374 La Esperanza were analyzed. The objective is to analyze the evidence of climate change in the Comitan valley. 2.07% and 19.04% of missing data were filled, respectively, with the WS method. In order to verify homogeneity three methods were used: Standard Normal Homogeneity Test (SNHT), the Von Neumann method and the Buishand method. The heterogeneous series were homogenized using climatol. The trends of <em>t</em><sub>max</sub> and <em>t</em><sub>min</sub> for both weather stations were analyzed by simple linear regression, Sperman’s rho and Mann-Kendall tests. The Mann-Kendal test method confirmed the warming trend at the Comitan station for both variables with <em>Z<sub>MK</sub></em> statistic values equal to 1.57 (statistically not significant) and 4.64 (statistically significant). However, for the Esperanza station, it determined a cooling trend for tmin and a slight non-significant warming for <em>t</em><sub>max</sub> with a <em>Z</em><sub><em>MK</em></sub> statistic of -2.27 (statistically significant) and 1.16 (statistically not significant), for a significance level <em>α</em> = 0.05.展开更多
UML is widely accepted and applied by the international software industry. UML is a powerful language for Object oriented modeling, designing, and implementing software systems, but its Use Case method for requirem...UML is widely accepted and applied by the international software industry. UML is a powerful language for Object oriented modeling, designing, and implementing software systems, but its Use Case method for requirement analysis and modeling software patterns has some explicit drawbacks. For more complete UML, this paper proposes the Role Use Case modeling and its glyphs, and provides an instance of requirement analysis using Role Use Case method. Uses the Role Model to modeling software pattern at knowledge level. This paper also extends the UML Meta Model and accentuates “RM before UML's class Modeling”.展开更多
UML is used widely in many software development processes.However,it does not make explicit requirement goals. Here is a method tending to establish the semantic relationship between requirements goals and UML m...UML is used widely in many software development processes.However,it does not make explicit requirement goals. Here is a method tending to establish the semantic relationship between requirements goals and UML models.Before the method is introduced, some relevant concepts are described.展开更多
基金supported by the Research Program funded by the SeoulTech(Seoul National University of Science and Technology).
文摘The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
基金This research is based on the project of Development of A Closed-loop TCM System,which belongs to the‘Integrale Energietransitie Bestaande Bouw’(IEBB).The IEBB was initiated by the Building and Technology Innovation Centre(BTIC)and is funded by Rijksdienst voor Ondernemend(RVO)Nederland.
文摘Recent advances in thermochemical storage technology have introduced a novel closed-loop thermal energy storage(TES)system,known as the heat battery(HB),which is believed to have great potential for aiding the energy transition in the built environment because of its higher energy density and neglectable storage loss compared to conventional TES systems.In order to investigate the potential use cases of the HB and provide practical feedback for its further development,this research employs a simulation-based approach to analyze its influence on building performance in various use cases within Dutch residential buildings.Stakeholders including the homeowner,distribution system operator,and district heating system operator are identified,and a preliminary list of use cases is defined based on relevant literature and input from the HB developer.The simulation approach is conducted to predict key performance indicators for each stakeholder.The Kruskal-Wallis test was employed to sort and scrutinize the simulation outcomes and discern the significance of each use case element.The findings demonstrated that the HB holds the potential to diminish both the operational energy cost by up to 30%for the homeowners and the peak heating load transmitted from the building to the district heating system.
基金Supported by the National High Technology Research and Development Program of China (863 Program) (2009AA01Z402)the PLA University of Science and Technology Pre-research Project (20110202, 20110210)+1 种基金the Natural Science Foundation of Jiangsu Province of China (BK2012059,BK2012060)the PLAUST Outstanding Graduate Student Thesis Fund (2012)
文摘A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security functions and latent typical misuse behaviors,but also with the interaction of them.In this paper,we analyze the differences between SETAM with security use case and security misuse case in different types of security test requirements.To illustrate the effectiveness of SETAM,we compare them in a practical case study by the number of test cases and the number of faults detected by them.The results show that SETAM could decrease about 34.87% use cases on average,and the number of faults detected by SETAM increased by 71.67% in average,which means that our model can detect more faults with fewer test cases for software security testing.
文摘The formal process of system design begins with the identification of use cases.No such cases are readily apparent for the current generation of geobrowsers,though the text of the 1998 Gore speech refers to several.An analysis of the use cases of geographic information systems(GIS)reveals similarities with the functionality of geobrowsers,inviting the view that the two forms of geographic information technology will eventually converge.However,experience suggests that users are finding very different ways of exploiting geobrowsers,and two examples are discussed in detail.These uses can be interpreted within a broad framework of spatial concepts,and the paper concludes that this framework provides a better guide to the future of geobrowsers and Digital Earth than current GIS technology.
文摘In this work, we present DUSM (Disciplined Use Cases with Screen Mockups), a novel method for describing and refining requirements specifications based on disciplined use cases and screen mockups. Disciplined use cases are characterized by a quite stringent template to prevent common mistakes, and to increase the quality of the specifications. Use cases descriptions are formulated in a structured natural language, which allows to reach a good level of precision, avoiding the need for further notations and complex models. Screen mockups are precisely associated with the steps of the use cases scenarios and they present the corresponding GUIs (graphical user interfaces) as seen by the human actors before/after the steps executions, improving the comprehension and the expression of the non-functional requirements on the user interface. DUSM has been proposed and fine-tuned during several editions of a software engineering course at the University of Genova. Then, by means of a series of case studies and experiments, we validated the method and evaluated: 1) its effectiveness in improving the comprehension and, in general, the quality of the produced requirements specification, and 2) its applicability in the industry, where the method has been found useful and not particularly onerous.
基金Supported by the European Commission under the 7th Framework EURECA Project(FP7-ICT-2011-7,288048)the Key Projects of National Social Science Foundation of China(11ZD&189)the Natural Science Foundation of Hubei Province(2014CFB247)
文摘Semantic representation of evidence-based medical guidelines provides the support for the data inter-operability and has been found many applications in the medical domain. In this paper, we describe a semantic representation approach of evidence-based medical guidelines, which is based on the Semantic Web Technology standards. We discuss several use cases of that semantic representation of evidence-based medical guideline, and show that they are potentially useful for medical applications.
基金Supported by the Major Research Plan of the National Natural Science Foundation of China(90818027)the Key Program of the National Natural Science Foundation of China(60633010)+2 种基金the National Natural Science Foundation of China (60873050,60873049,60803008)the Natural Science Foundation of Jiangsu Province of China(BK2006094,BK2008292)the Opening Foundation of State Key Laboratory of Software Engineering in Wu-han University (SkLSE20080717)
文摘Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect different use cases. This paper presents an approach to identify base flows and alternative flows of different use cases by traversing control flow graph in which back edges are eliminated. The effectiveness of the approach is verified by identification of the use case structure of an ATM system. The workload of human intervention of the approach is relatively slight, and the manner of human intervention closely follows the usual process of software comprehension.
文摘1.Patient's conditionsA 29-year-old man,was infected with nongonococcal urethritis(NGU).He complained that he had dysuria and discomfort in the urethra and mucopurulent discharge,which appeared one week after intercourse.
文摘Hiccups are common, usually mild with no obvious cause and often resolve spontaneously. They are classified as transient, persistent and intractable depending on the duration. Drug induced hiccups have been reported in medical literature but not common and corticosteroids are often cited. This report involved 2 male patients who developed persistent hiccups following use of oral dexamethasone for inflammatory conditions. The hiccups were severe and intolerable and could not stop despite use of metoclopramide and chlorpromazine. The hiccups only stopped following discontinuation of the dexamethasone. It should be noted that low dose of dexamethasone was used. Management of dexamethasone induced hiccups involves discontinuation of the drug, steroid rotation if the patient is steroid dependent and use of metoclopramide and chlorpromazine. Clinicians should be aware of this known but rare adverse effect of dexamethasone as it could be severe, distressful and negatively impart patients care. There is a need for a high index of suspicion whenever a patient develops hiccups while taking dexamethasone.
文摘Blockchain is one of the innovative and disruptive technologies that has a wide range of applications in multiple industries beyond cryptocurrency.The widespread adoption of blockchain technology in various industries has shown its potential to solve challenging business problems,as well as the possibility to create new business models which can increase a firm’s competitiveness.Due to the novelty of the technology,whereby many companies are still exploring potential use cases,and considering the complexity of blockchain technology,which may require huge changes to a company’s existing systems and processes,it is important for companies to carefully evaluate suitable use cases and determine if blockchain technology is the best solution for their specific needs.This research aims to provide an evaluation framework that determines the important dimensions of blockchain suitability assessment by identifying the key determinants of suitable use cases in a business context.In this paper,a novel approach that utilizes both qualitative(Delphi method)and quantitative(fuzzy set theory)methods has been proposed to objectively account for the uncertainty associated with data collection and the vagueness of subjective judgments.This work started by scanning available literature to identify major suitability dimensions and collected a range of criteria,indicators,and factors that had been previously identified for related purposes.Expert opinions were then gathered using a questionnaire to rank the importance and relevance of these elements to suitability decisions.Subsequently,the data were analyzed and we proceeded to integrate multi-criteria group decision-making(MCGDM)and intuitionistic fuzzy set(IFS)theory.The findings demonstrated a high level of agreement among experts,with the model being extremely sensitive to variances in expert assessments.Furthermore,the results helped to refine and select the most relevant suitability determinants under three important dimensions:functional suitability of the use case,organizational applicability,and ecosystem readiness.
文摘The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°52'5''W) a town with 3000 inhabitants. Both weather stations are 30 km from each other in the Chiapas State, México. 54 years of daily records of the series of maximum (<em>t</em><sub>max</sub>) and minimum temperatures (<em>t</em><sub>min</sub>) of the weather station 07205 Comitan that is on top of a house and 30 years of daily records of the weather station 07374 La Esperanza were analyzed. The objective is to analyze the evidence of climate change in the Comitan valley. 2.07% and 19.04% of missing data were filled, respectively, with the WS method. In order to verify homogeneity three methods were used: Standard Normal Homogeneity Test (SNHT), the Von Neumann method and the Buishand method. The heterogeneous series were homogenized using climatol. The trends of <em>t</em><sub>max</sub> and <em>t</em><sub>min</sub> for both weather stations were analyzed by simple linear regression, Sperman’s rho and Mann-Kendall tests. The Mann-Kendal test method confirmed the warming trend at the Comitan station for both variables with <em>Z<sub>MK</sub></em> statistic values equal to 1.57 (statistically not significant) and 4.64 (statistically significant). However, for the Esperanza station, it determined a cooling trend for tmin and a slight non-significant warming for <em>t</em><sub>max</sub> with a <em>Z</em><sub><em>MK</em></sub> statistic of -2.27 (statistically significant) and 1.16 (statistically not significant), for a significance level <em>α</em> = 0.05.
基金Supported the Middleware Software Division of Software Group of F ujitsu L imited in Japanthe National Depart-ment of Educat
文摘UML is widely accepted and applied by the international software industry. UML is a powerful language for Object oriented modeling, designing, and implementing software systems, but its Use Case method for requirement analysis and modeling software patterns has some explicit drawbacks. For more complete UML, this paper proposes the Role Use Case modeling and its glyphs, and provides an instance of requirement analysis using Role Use Case method. Uses the Role Model to modeling software pattern at knowledge level. This paper also extends the UML Meta Model and accentuates “RM before UML's class Modeling”.
文摘UML is used widely in many software development processes.However,it does not make explicit requirement goals. Here is a method tending to establish the semantic relationship between requirements goals and UML models.Before the method is introduced, some relevant concepts are described.