A Systematic Mapping Study on Software Engineering Education

Inadequate curriculum for software engineering is considered to be one of the most common software risks. A number of solutions, on improving Software Engineering Education (SEE) have been reported in literature but there is a need to collectively present these solutions at one place. We have performed a mapping study to present a broad view of literature; published on improving the current state of SEE. Our aim is to give academicians, practitioners and researchers an international view of the current state of SEE. Our study has identified 70 primary studies that met our selection criteria, which we further classified and categorized in a well-defined Software Engineering educational framework. We found that the most researched category within the SE educational framework is Innovative Teaching Methods whereas the least amount of research was found in Student Learning and Assessment category. Our future work is to conduct a Systematic Literature Review on SEE.

WPRiMA Tool: Managing Risks in Web Projects

Risk management is an essential fraction of project management, which plays a significant role in project success. Many failures associated with Web projects are the consequences of poor awareness of the risks involved and lack of process models that can serve as a guideline for the development of Web based applications. To circumvent this problem, contemporary process models have been devised for the development of conventional software. This paper introduces the WPRiMA (Web Project Risk Management Assessment) as the tool, which is used to implement RIAP, the risk identification architecture pattern model, which focuses upon the data from the proprietor-s and vendor-s perspectives. The paper also illustrates how WPRiMA tool works and how it can be used to calculate the risk level for a given Web project, to generate recommendations in order to facilitate risk avoidance in a project, and to improve the prospects of early risk management.

SVM-Based Detection of SAR Images in Partially Developed Speckle Noise

Support Vector Machine (SVM) is a statistical learning tool that was initially developed by Vapnik in 1979 and later developed to a more complex concept of structural risk minimization (SRM). SVM is playing an increasing role in applications to detection problems in various engineering problems, notably in statistical signal processing, pattern recognition, image analysis, and communication systems. In this paper, SVM was applied to the detection of SAR (synthetic aperture radar) images in the presence of partially developed speckle noise. The simulation was done for single look and multi-look speckle models to give a complete overlook and insight to the new proposed model of the SVM-based detector. The structure of the SVM was derived and applied to real SAR images and its performance in terms of the mean square error (MSE) metric was calculated. We showed that the SVM-detected SAR images have a very low MSE and are of good quality. The quality of the processed speckled images improved for the multi-look model. Furthermore, the contrast of the SVM detected images was higher than that of the original non-noisy images, indicating that the SVM approach increased the distance between the pixel reflectivity levels (the detection hypotheses) in the original images.

The Gerber-Shiu Functions of a Risk Model with Two Classes of Claims and Random Income

In this paper, we consider a risk model involving two independent classes of insurance risks and random premium income. We assume that the premium income process is a Poisson Process, and the claim number processes are independent Poisson and generalized Erlang(n) processes, respectively. Both of the Gerber- Shiu functions with zero initial surplus and the probability generating functions (p.g.f.) of the Gerber-Shiu functions are obtained.

Municipal Solid Waste Management in KhoramAbad City and Experiences

This paper presents an overview of current municipal solid waste management in Khoram Abad city. According to data collected by the local authorities, the waste generation rate is estimated to be 800 g/cap.d with density of 243 kg/m3. Solid waste is stored in different types of containers at the source of generation in different areas of the city. Local Authority is responsible for waste collection, transportation. Municipality is responsible for waste collection, using private sector contracts. At present, both mechanical and manual methods are used to collect residential waste. Manual methods of collection are the most commonly used for waste collection in most parts of the city. Land filling is the main disposal method in this city. But it has some obvious problem and deficiencies The current state of solid waste management has been improved slightly in the last decade. By more actions can reduce the human and environmental risks.

High Glucose Increases Acetylcholine-Induced Ca2+ Entry and Protein Expression of STIM1

Hyperglycaemia is a key factor that contributes to the development of diabetes-related microvascular disease and a major risk factor for endothelial dysfunction. In the current study, we have explored glucose-induced abnormal intracellular calcium (Ca2+ i) homeostasis in mouse microvessel endothelial cells (MMECs) in high glucose (HG) (40mmol/L) versus control (low glucose, LG) (11 mmol/L). We demonstrated that the exposure of MMECs to HG for 3 days did not change basal Ca2+ i, however, there was a significant increase of acetylcholine-induced Ca2+ entry. Western blots illustrated that exposure to HG also increased STIM1 (Stromal Interaction Molecule 1), but not Orai1 (the pore forming subunit), protein expression levels. Although the link between HG-induced changes in STIM1 expression, enhanced Ca2+ entry and endothelial dysfunction requires further study, the current data are suggestive that targeting these pathways may reduce the impact of HG on endothelial function.

A Survey on Usage and Diffusion of Project Risk Management Techniques and Software Tools in the Construction Industry

The area of Project Risk Management (PRM) has been extensively researched, and the utilization of various tools and techniques for managing risk in several industries has been sufficiently reported. Formal and systematic PRM practices have been made available for the construction industry. Based on such body of knowledge, this paper tries to find out the global picture of PRM practices and approaches with the help of a survey to look into the usage of PRM techniques and diffusion of software tools, their level of maturity, and their usefulness in the construction sector. Results show that, despite existing techniques and tools, their usage is limited: software tools are used only by a minority of respondents and their cost is one of the largest hurdles in adoption. Finally, the paper provides some important guidelines for future research regarding quantitative risk analysis techniques and suggestions for PRM software tools development and improvement.

Sericin Film: Influence of Concentration on its Physical Properties

Silk sericin (SS) is a glue-like protein from silkworm cocoon. With its outstanding moisturization and activation collagen synthesis properties, silk protein is applied for wound healing. Since wound dressing in film preparation can facilitate patients- convenience and reduce risk of wound contraction, SS and polyvinyl alcohol (PVA) films were prepared with various concentrations of SS. Their physical properties such as surface density, light transmission, protein dissolution and tensile modulus were investigated. The results presented that 3% SS with 2% PVA is the best ingredient for SS film forming.

Web Service Security Method To SOA Development

Web services provide significant new benefits for SOAbased applications, but they also expose significant new security risks. There are huge number of WS security standards and processes. At present, there is still a lack of a comprehensive approach which offers a methodical development in the construction of secure WS-based SOA. Thus, the main objective of this paper is to address this needs, presenting a comprehensive method for Web Services Security guaranty in SOA. The proposed method defines three stages, Initial Security Analysis, Architectural Security Guaranty and WS Security Standards Identification. These facilitate, respectively, the definition and analysis of WS-specific security requirements, the development of a WS-based security architecture and the identification of the related WS security standards that the security architecture must articulate in order to implement the security services.

Quantification of Technology Innovation Usinga Risk-Based Framework

There is significant interest in achieving technology innovation through new product development activities. It is recognized, however, that traditional project management practices focused only on performance, cost, and schedule attributes, can often lead to risk mitigation strategies that limit new technology innovation. In this paper, a new approach is proposed for formally managing and quantifying technology innovation. This approach uses a risk-based framework that simultaneously optimizes innovation attributes along with traditional project management and system engineering attributes. To demonstrate the efficacy of the new riskbased approach, a comprehensive product development experiment was conducted. This experiment simultaneously managed the innovation risks and the product delivery risks through the proposed risk-based framework. Quantitative metrics for technology innovation were tracked and the experimental results indicate that the risk-based approach can simultaneously achieve both project deliverable and innovation objectives.

Effectiveness and Equity: New Challenges for Social Recognition in Higher Education

Today, Higher Education in a global scope is subordinated to the greater institutional controls through the policies of the Quality of Education. These include processes of over evaluation of all the academic activities: students- and professors- performance, educational logistics, managerial standards for the administration of institutions of higher education, as well as the establishment of the imaginaries of excellence and prestige as the foundations on which universities of the XXI century will focus their present and future goals and interests. But at the same time higher education systems worldwide are facing the most profound crisis of sense and meaning and attending enormous mutations in their identity. Based in a qualitative research approach, this paper shows the social configurations that the scholars at the Universities in Mexico build around the discourse of the Quality of Education, and how these policies put in risk the social recognition of these individuals.

Workplace Monitoring During Interventional Cardiology Procedures

Interventional cardiologists are at greater risk from radiation exposure as a result of the procedures they undertake than most other medical specialists. A study was performed to evaluate operator dose during interventional cardiology procedures and to establish methods of operator dose reduction with a radiation protective device. Different procedure technique and use of protective tools can explain big difference in the annual equivalent dose received by the professionals. Strategies to prevent and monitor radiation exposure, advanced protective shielding and effective radiation monitoring methods should be applied.

Credit Risk Management and Analysis in an Iranian Bank

While financial institutions have faced difficulties over the years for a multitude of reasons, the major cause of serious banking problems continues to be directly related to lax credit standards for borrowers and counterparties, poor portfolio risk management, or a lack of attention to changes in economic or other circumstances that can lead to a deterioration in the credit standing of a bank's counterparties. Credit risk is most simply defined as the potential that a bank borrower or counterparty will fail to meet its obligations in accordance with agreed terms. The goal of credit risk management is to maximize a bank's risk-adjusted rate of return by maintaining credit risk exposure within acceptable parameters. Banks need to manage the credit risk inherent in the entire portfolio as well as the risk in individual credits or transactions. Banks should also consider the relationships between credit risk and other risks. The effective management of credit risk is a critical component of a comprehensive approach to risk management and essential to the long-term success of any banking organization. In this research we also study the relationship between credit risk indices and borrower-s timely payback in Karafarin bank.

Improving TNT Curing Process by Using Infrared Camera

Among the chemicals used for ammunition production, TNT (Trinitrotoluene) play a significant role since World War I and II. Various types of military weapon utilize TNT in casting process. However, the TNT casting process for warhead is difficult to control the cooling rate of the liquid TNT. This problem occurs because the casting process lacks the equipment to detect the temperature during the casting procedure This study presents the temperature detected by infrared camera to illustrate the cooling rate and cooling zone of curing, and demonstrates the optimization of TNT condition to reduce the risk of air gap occurred in the warhead which can result in the destruction afterward. Premature initiation of explosive-filled projectiles in response to set-back forces during gunfiring cause by casting defects. Finally the study can help improving the process of the TNT casting. The operators can control the curing of TNT inside the case by rising up the heating rod at the proper time. Consequently this can reduce tremendous time of rework if the air gaps occur and increase strength to lower elastic modulus. Therefore, it can be clearly concluded that the use of Infrared Cameras in this process is another method to improve the casting procedure.

Identifying Corruption in Legislation using Risk Analysis Methods

The objective of this article is to discuss the potential of economic analysis as a tool for identification and evaluation of corruption in legislative acts. We propose that corruption be perceived as a risk variable within the legislative process. Therefore we find it appropriate to employ risk analysis methods, used in various fields of economics, for the evaluation of corruption in legislation. Furthermore we propose the incorporation of these methods into the so called corruption impact assessment (CIA), the general framework for detection of corruption in legislative acts. The applications of the risk analysis methods are demonstrated on examples of implementation of proposed CIA in the Czech Republic.

South African MNEs Entry Strategies in Africa

This is a cross-cultural study that determines South African multinational enterprises (MNEs) entry strategies as they invest in Africa. An integrated theoretical framework comprising the transaction cost theory, Uppsala model, eclectic paradigm and the distance framework was adopted. A sample of 40 South African MNEs with 415 existing FDI entries in Africa was drawn. Using an ordered logistic regression model, the impact of culture on the choice of degree of control by South African MNEs in Africa was determined. Cultural distance was one of significant factors that influenced South African MNEs- choice of degree of control. Furthermore, South African MNEs are risk averse in all countries in Africa but minimize the risks differently across sectors. Service sectors chooses to own their subsidiaries 100% and avoid dealing with the locals while manufacturing, resources and construction choose to have a local partner to share the risk.

Risk Evaluation of Information Technology Projects Based on Fuzzy Analytic Hierarchal Process

Information Technology (IT) projects are always accompanied by various risks and because of high rate of failure in such projects, managing risks in order to neutralize or at least decrease their effects on the success of the project is strongly essential. In this paper, fuzzy analytical hierarchy process (FAHP) is exploited as a means of risk evaluation methodology to prioritize and organize risk factors faced in IT projects. A real case of IT projects, a project of design and implementation of an integrated information system in a vehicle producing company in Iran is studied. Related risk factors are identified and then expert qualitative judgments about these factors are acquired. Translating these judgments to fuzzy numbers and using them as an input to FAHP, risk factors are then ranked and prioritized by FAHP in order to make project managers aware of more important risks and enable them to adopt suitable measures to deal with these highly devastative risks.

Risk Management Analysis: An Empirical Study Using Bivariate GARCH

This study employs a bivariate asymmetric GARCH model to reveal the hidden dynamics price changes and volatility among the emerging markets of Thailand and Malaysian after the Asian financial crisis from January 2001 to December 2008. Our results indicated that the equity markets are sharing the common information (shock) that transmitted among each others. These empirical findings are used to demonstrate the importance of shock and volatility dynamic transmissions in the cross-market hedging and market risk.

Determination of Some Organochlorine Pesticide Residues in Vegetable and Soil Samples from Alau Dam and Gongulong Agricultural Sites, Borno State, North Eastern Nigeria

Five vegetables (spinach, lettuce, cabbage, tomato, and onion) were freshly harvested from the Alau Dam and Gongulong agricultural areas for the determination of some organochlorine pesticide residues (o, p-DDE, p,p’-DDD, o,p’-DDD, p,p’-DDT, α-BHC, γ-BHC, metoxichlor, lindane, endosulfan dieldrin, and aldrin.) Soil samples were also collected at different depths for the determination of the above pesticides. Samples collection and preparation were conducted using standard procedures. The concentrations of all the pesticides in the soil and vegetable samples were determined using GC/MS SHIMADZU (GC-17A) equipped with electron capture detector (ECD). The highest concentration was that of p,p’-DDD (132.4±13.45µg/g) which was observed in the leaf of cabbage, while the lowest concentration was that of p,p’-DDT (2.34µg/g) was observed in the root of spinach. Similar trends were observed at the Gongulong agricultural area, with p,p’-DDD having the highest concentration of 153.23µg/g in the leaf of cabbage, while the lowest concentration was that of p,p’-DDT (12.45µg/g) which was observed in the root of spinach. α-BHC, γ-BHC, Methoxychlor, and lindane were detected in all the vegetable samples studied. The concentrations of all the pesticides in the soil samples were observed to be higher at a depth of 21-30cm, while the lowest concentrations were observed at a depth of 0-10cm. The concentrations of all the pesticides in the vegetables and soil samples from the two agricultural sites were observed to be at alarming levels, much higher than the maximum residue limits (MRLs) and acceptable daily intake values (ADIs) .The levels of the pesticides observed in the vegetables and soil samples investigated, are of such a magnitude that calls for special attention and laws to regulate the use and circulation of such chemicals. Routine monitoring of pesticide residues in these study areas is necessary for the prevention, control and reduction of environmental pollution, so as to minimize health risks.

Fuzzy Numbers and MCDM Methods for Portfolio Optimization

A new deployment of the multiple criteria decision making (MCDM) techniques: the Simple Additive Weighting (SAW), and the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for portfolio allocation, is demonstrated in this paper. Rather than exclusive reference to mean and variance as in the traditional mean-variance method, the criteria used in this demonstration are the first four moments of the portfolio distribution. Each asset is evaluated based on its marginal impacts to portfolio higher moments that are characterized by trapezoidal fuzzy numbers. Then centroid-based defuzzification is applied to convert fuzzy numbers to the crisp numbers by which SAW and TOPSIS can be deployed. Experimental results suggest the similar efficiency of these MCDM approaches to selecting dominant assets for an optimal portfolio under higher moments. The proposed approaches allow investors flexibly adjust their risk preferences regarding higher moments via different schemes adapting to various (from conservative to risky) kinds of investors. The other significant advantage is that, compared to the mean-variance analysis, the portfolio weights obtained by SAW and TOPSIS are consistently well-diversified.