Abstract: Requirement engineering has been the subject of large
volume of researches due to the significant role it plays in the
software development life cycle. However, dynamicity of software
industry is much faster than advances in requirements engineering
approaches. Therefore, this paper aims to systematically review and
evaluate the current research in requirement engineering and identify
new research trends and direction in this field. In addition, various
research methods associated with the Evaluation-based techniques
and empirical study are highlighted for the requirements engineering
field. Finally, challenges and recommendations on future directions
research are presented based on the research team observations
during this study.
Abstract: Streamtube is used to visualize expansion, contraction
and various properties of the fluid flow. These are useful in fluid
mechanics, engineering and geophysics. The streamtube constructed
in this paper only reveals the flow expansion rate along streamline.
Based on the mass conservative streamline, we will show how to
construct the streamtube.
Abstract: A cart-ball system is a challenging system from the
control engineering point of view. This is due to the nonlinearities,
multivariable, and non-minimum phase behavior present in this
system. This paper is concerned with the problem of modeling and
control of such system. The objective of control strategy is to place
the cart at a desired position while balancing the ball on the top of the
arc-shaped track fixed on the cart. A State-Feedback Controller
(SFC) with a pole-placement method will be designed in order to
control the system. At first, the mathematical model of a cart-ball
system in the state-space form is developed. Then, the linearization of
a model will be established in order to design a SFC. The integral
control strategy will be performed as to control the cart position of a
system. Simulation work is then performed using
MATLAB/SIMULINK software in order to study the performance of
SFC when applied to the system.
Abstract: Prediction of fault-prone modules provides one way to
support software quality engineering. Clustering is used to determine
the intrinsic grouping in a set of unlabeled data. Among various
clustering techniques available in literature K-Means clustering
approach is most widely being used. This paper introduces K-Means
based Clustering approach for software finding the fault proneness of
the Object-Oriented systems. The contribution of this paper is that it
has used Metric values of JEdit open source software for generation
of the rules for the categorization of software modules in the
categories of Faulty and non faulty modules and thereafter
empirically validation is performed. The results are measured in
terms of accuracy of prediction, probability of Detection and
Probability of False Alarms.
Abstract: The objectives of the study are to examine the
determinants of ERP implementation success factors of ERP
implementation. The result indicates that large scale ERP
implementation success consist of eight factors: project management
competence, knowledge sharing, ERP system quality , understanding,
user involvement, business process re-engineering, top management
support, organization readiness.
Abstract: The main goal of this seminal paper is to introduce the
application of Wireless Sensor Networks (WSN) in long distance
infrastructure monitoring (in particular in pipeline infrastructure
monitoring) – one of the on-going research projects by the Wireless
Communication Research Group at the department of Electronic and
Computer Engineering, Nnamdi Azikiwe University, Awka. The
current sensor network architectures for monitoring long distance
pipeline infrastructures are previewed. These are wired sensor
networks, RF wireless sensor networks, integrated wired and wireless
sensor networks. The reliability of these architectures is discussed.
Three reliability factors are used to compare the architectures in
terms of network connectivity, continuity of power supply for the
network, and the maintainability of the network. The constraints and
challenges of wireless sensor networks for monitoring and protecting
long distance pipeline infrastructure are discussed.
Abstract: The history of money is described in relationship to the history of computing. With the transformation and acceptance of money as information, major challenges to the security of money have involved engineering, computer science, and management. Research opportunities and challenges are described as money continues its transformation into information.
Abstract: The treatment of the industrial wastewater can be
particularly difficult in the presence of toxic compounds. Excessive
concentration of Chromium in soluble form is toxic to a wide variety
of living organisms. Biological removal of heavy metals using natural
and genetically engineered microorganisms has aroused great interest
because of its lower impact on the environment. Ralston
metallidurans, formerly known as Alcaligenes eutrophus is a LProteobacterium
colonizing industrial wastewater with a high content
of heavy metals. Tris-buffered mineral salt medium was used for
growing Alcaligenes eutrophus AE104 (pEBZ141). The cells were
cultivated for 18 h at 30 oC in Tris-buffered mineral salt medium
containing 3 mM disodium sulphate and 46 mM sodium gluconate as
the carbon source. The cells were harvested by centrifugation,
washed, and suspended in 10 mM Tris HCl, pH 7.0, containing 46
mM sodium gluconate, and 5 mM Chromium. Interaction among
induction of chr resistance determinant, and chromate reduction have
been demonstrated. Results of this study show that the above bacteria
can be very useful for bioremediation of chromium from industrial
wastewater.
Abstract: This paper presents a new methodology to study power and energy consumption in mechatronic systems early in the development process. This new approach makes use of two modeling languages to represent and simulate embedded control software and electromechanical subsystems in the discrete event and continuous time domain respectively within a single co-model. This co-model enables an accurate representation of power and energy consumption and facilitates the analysis and development of both software and electro-mechanical subsystems in parallel. This makes the engineers aware of energy-wise implications of different design alternatives and enables early trade-off analysis from the beginning of the analysis and design activities.
Abstract: Determining reasonable fees is the main objective of designing the cost estimation and payment systems for consultant contracts. However, project clients utilize different cost estimation and payment systems because of their varying views on the reasonableness of consultant fees. This study reviews the cost estimation and payment systems of consultant contracts for five countries, including the US (Washington State Department of Transportation), Japan (Ministry of Land, Infrastructure, Transport and Tourism), China (Engineering Design Charging Standard) and UK (Her Majesty's Treasure). Specifically, this work investigates the budgeting process, contractor selection method, contractual price negotiation process, cost review, and cost-control concept of the systems used in these countries. The main finding indicates that that project client-s view on whether the fee is high will affect the way he controls it. In the US, the fee is commonly considered to be high. As a result, stringent auditing system (low flexibility given to the consultant) is then applied. In the UK, the fee is viewed to be low by comparing it to the total life-cycle project cost. Thus, a system that has high flexibility in budgeting and cost reviewing is given to the consultant. In terms of the flexibility allowed for the consultant, the systems applied in Japan and China fall between those of the US and UK. Both the US and UK systems are helpful in determining a reasonable fee. However, in the US system, rigid auditing standards must be established and additional cost-audit manpower is required. In the UK system, sufficient historical cost data should be needed to evaluate the reasonableness of the consultant-s proposed fee
Abstract: Riprap is mostly used to prevent erosion by flows
down the steep slopes in river engineering. A total of 53 stability tests
performed on angular riprap with a median stone size ranging from
15 to 278 mm and slope ranging from 1 to 40% are used in this study.
The existing equations for the prediction of medium size of angular
stones are checked for their accuracy using the available data.
Predictions of median size using these equations are not satisfactory
and results show deviation by more than ±20% from the observed
values. A multivariable power regression analysis is performed to
propose a new equation relating the median size with unit discharge,
bed slope, riprap thickness and coefficient of uniformity. The
proposed relationship satisfactorily predicts the median angular stone
size with ±20% error. Further, the required size of the rounded stone
is more than the angular stone for the same unit discharge and the
ratio increases with unit discharge and also with embankment slope
of the riprap.
Abstract: Fault tree analysis is a well-known method for
reliability and safety assessment of engineering systems. In the last 3
decades, a number of methods have been introduced, in the literature,
for automatic construction of fault trees. The main difference between these methods is the starting model from which the tree is constructed. This paper presents a new methodology for the construction of static and dynamic fault trees from a system Simulink
model. The method is introduced and explained in detail, and its correctness and completeness is experimentally validated by using an example, taken from literature. Advantages of the method are also mentioned.
Abstract: This paper proposes an easy-to-use instruction hiding
method to protect software from malicious reverse engineering
attacks. Given a source program (original) to be protected, the
proposed method (1) takes its modified version (fake) as an input,
(2) differences in assembly code instructions between original and
fake are analyzed, and, (3) self-modification routines are introduced
so that fake instructions become correct (i.e., original instructions)
before they are executed and that they go back to fake ones after
they are executed. The proposed method can add a certain amount
of security to a program since the fake instructions in the resultant
program confuse attackers and it requires significant effort to discover
and remove all the fake instructions and self-modification routines.
Also, this method is easy to use (with little effort) because all a user
(who uses the proposed method) has to do is to prepare a fake source
code by modifying the original source code.
Abstract: Process improvements have drawn much attention in
practical software engineering. The capability maturity levels from
CMMI have become an important index to assess a software company-s
software engineering capability. However, in countries like
Taiwan, customers often have no choices but to deal with vendors that
are not CMMI prepared or qualified. We call these vendors maturitylevel-
1 (ML1) vendors. In this paper, we describe our experience
from consulting an e-school project. We propose an approach to help
our client tackle the ML1 vendors. Through our system analysis, we
produce a design. This design is suggested to be used as part of
contract and a blueprint to guide the implementation.
Abstract: Laboratory classes in Electrical Engineering are often hampered by safety issues, as students have to work on high voltage lines. One solution is to make use of virtual laboratory simulations, to help students understand the concepts taught in their coursework. In this context, we have conceived and implemented virtual lab experiments in connection with the study of earthing arrangements. In this work, software was developed, which aid student in understanding the working of a residual current device (RCD) in a TT earthing system. Various parameters, such as the earthing resistances, leakage currents and harmonics were included for a TT system with RCD connection.
Abstract: The productivity of software development is one of the major concerns for project managers. Given the increasing complexity of the software being developed and the concomitant rise in the typical project size, the productivity has not consistently improved. By analyzing the latest release of ISBSG data repository with 4106 projects ever developed, we report on the factors found to significantly influence productivity, and present an original model for the estimation of productivity during project design. We further illustrate that software development productivity has experienced irregular variations between the years 1995 and 2005. Considering the factors significant to productivity, we found its variations are primarily caused by the variations of average team size for the development and the unbalanced use of the less productive development language 3GL.
Abstract: Source code retrieval is of immense importance in the software engineering field. The complex tasks of retrieving and extracting information from source code documents is vital in the development cycle of the large software systems. The two main subtasks which result from these activities are code duplication prevention and plagiarism detection. In this paper, we propose a Mohamed Amine Ouddan, and Hassane Essafi source code retrieval system based on two-level fingerprint representation, respectively the structural and the semantic information within a source code. A sequence alignment technique is applied on these fingerprints in order to quantify the similarity between source code portions. The specific purpose of the system is to detect plagiarism and duplicated code between programs written in different programming languages belonging to the same class, such as C, Cµ, Java and CSharp. These four languages are supported by the actual version of the system which is designed such that it may be easily adapted for any programming language.
Abstract: The InAlGaN alloy has only recently began receiving
serious attention into its growth and application. High quality InGaN
films have led to the development of light emitting diodes (LEDs) and
blue laser diodes (LDs). The quaternary InAlGaN however, represents
a more versatile material since the bandgap and lattice constant can be
independently varied. We report an ultraviolet (UV) quaternary
InAlGaN multi-quantum wells (MQWs) LD study by using the
simulation program of Integrated System Engineering (ISE TCAD).
Advanced physical models of semiconductor properties were used in
order to obtain an optimized structure. The device performance which
is affected by piezoelectric and thermal effects was studied via
drift-diffusion model for carrier transport, optical gain and loss. The
optical performance of the UV LD with different numbers of quantum
wells was numerically investigated. The main peak of the emission
wavelength for double quantum wells (DQWs) was shifted from 358
to 355.8 nm when the forward current was increased. Preliminary
simulated results indicated that better output performance and lower
threshold current could be obtained when the quantum number is four,
with output power of 130 mW and threshold current of 140 mA.
Abstract: This paper presents an architecture to assist in the
development of tools to perform experimental analysis. Existing
implementations of tools based on this architecture are also described
in this paper. These tools are applied to the real world problem of
fault attack emulation and detection in cryptographic algorithms.
Abstract: For a variety of safety and economic reasons, engineering undergraduates in Australia have experienced diminishing access to the real hardware that is typically the embodiment of their theoretical studies. This trend will delay the development of practical competence, decrease the ability to model and design, and suppress motivation. The author has attempted to address this concern by creating a software tool that contains both photographic images of real machinery, and sets of graphical modeling 'tools'. Academics from a range of disciplines can use the software to set tutorial tasks, and incorporate feedback comments for a range of student responses. An evaluation of the software demonstrated that students who had solved modeling problems with the aid of the electronic tutor performed significantly better in formal examinations with similar problems. The 2-D graphical diagnostic routines in the Tutor have the potential to be used in a wider range of problem-solving tasks.