Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq...Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.展开更多
The S38C railway axle undergoes induction hardening,resulting in a gradient-distributed microstructure and mechanical properties.The accurate identification of gradient-distributed plastic parameters for the S38C axle...The S38C railway axle undergoes induction hardening,resulting in a gradient-distributed microstructure and mechanical properties.The accurate identification of gradient-distributed plastic parameters for the S38C axle remains a challenging task.To tackle this challenge,the present study proposes a novel approach for identifying the gradient-distributed plastic parameters for the S38C axle by integrating nano-indentation techniques with the machine learning method.Firstly,nano-indentation tests are conducted along the radial direction of the S38C axle to obtain the gradient-distributed load-displacement curves,nano-hardness,and elastic modulus.Subsequently,the dimensionless analysis is performed to obtain the representative stress,strain,and yield stress from load-displacement curves.These parameters are then incorporated into the machine learning method as physical information to identify the gradient-distributed plastic parameters of the S38C axle.The results indicate that the proposed method based on the physics-informed neural network and multi-fidelity neural network successfully identifies the gradient-distributed plastic parameters of the S38C axles and demonstrates superior prediction accuracy and generalization compared with the purely data-driven machine learning method.展开更多
Alzheimer’s disease is initially thought to be caused by age-associated accumulation of plaques,in recent years,research has increasingly associated Alzheimer’s disease with lysosomal storage and metabolic disorders...Alzheimer’s disease is initially thought to be caused by age-associated accumulation of plaques,in recent years,research has increasingly associated Alzheimer’s disease with lysosomal storage and metabolic disorders,and the explanation of its pathogenesis has shifted from amyloid and tau accumulation to oxidative stress and impaired lipid and glucose metabolism aggravated by hypoxic conditions.However,the underlying mechanisms linking those cellular processes and conditions to disease progression have yet to be defined.Here,we applied a disease similarity approach to identify unknown molecular targets of Alzheimer’s disease by using transcriptomic data from congenital diseases known to increase Alzheimer’s disease risk,namely Down syndrome,Niemann-Pick type C disease,and mucopolysaccharidoses I.We uncovered common pathways,hub genes,and miRNAs across in vitro and in vivo models of these diseases as potential molecular targets for neuroprotection and amelioration of Alzheimer’s disease pathology,many of which have never been associated with Alzheimer’s disease.We then investigated common molecular alterations in brain samples from a Niemann-Pick type C disease mouse model by juxtaposing them with brain samples of both human and mouse models of Alzheimer’s disease.Detailed phenotypic,molecular,chronological,and biological aging analyses revealed that the Npc1tm(I1061T)Dso mouse model can serve as a potential short-lived in vivo model for brain aging and Alzheimer’s disease research.This research represents the first comprehensive approach to congenital disease association with neurodegeneration and a new perspective on Alzheimer’s disease research while highlighting shortcomings and lack of correlation in diverse in vitro models.Considering the lack of an Alzheimer’s disease mouse model that recapitulates the physiological hallmarks of brain aging,the short-lived Npc1^(tm(I1061T)Dso) mouse model can further accelerate the research in these fields and offer a unique model for understanding the molecular mechanisms of Alzheimer’s disease from a perspective of accelerated brain aging.展开更多
Hepatitis C virus(HCV)and hepatitis B virus(HBV)infections are increasingly recognized as significant etiological factors in the pathogenesis of B-cell non-Hodgkin’s lymphomas(B-NHLs).Epidemiological and molecular st...Hepatitis C virus(HCV)and hepatitis B virus(HBV)infections are increasingly recognized as significant etiological factors in the pathogenesis of B-cell non-Hodgkin’s lymphomas(B-NHLs).Epidemiological and molecular studies have demonstrated a consistent association between chronic viral infection and B-NHLs.Multiple pathogenic mechanisms have been implicated in lymphomagenesis,both direct and indirect,including chronic antigenic stimulation,direct infection of B cells,and viral protein-mediated oncogenic signaling,It is likely that a combination of several pathogenic conditions is required to eventually lead to the development of lymphoma.The prevalence of B-cell lymphomas among individuals with chronic HCV or HBV infection presents a complex pathogenetic scenario,given the tumor heterogeneity and variable clinical behavior,and poses therapeutic challenges,due to the partial efficacy of current treatment options.The advent of direct-acting antivirals(DAAs)for HCV and high-genetic barrier nucleos(t)ide analogues(NAs)for HBV has improved patient outcomes.In indolent HCV-associated B-NHLs,antiviral therapy with DAAs alone often achieves sustained virologic response and may lead to lymphoma regression.Conversely,aggressive subtypes like diffuse large B-cell lymphomas require combination treatment with immunochemotherapy.In the setting of HBV-associated lymphomas,antiviral prophylaxis with potent NAs(e.g.,entecavir or tenofovir)is essential to prevent HBV reactivation during rituximab-containing chemotherapy regimen.The integration of antiviral and anticancer therapies has been shown to enhance survival outcomes while mitigating hepatic toxicity.A comprehensive understanding of the biological interplay between chronic viral infection and B-cell transformation is critical for optimizing diagnostic and therapeutic strategies.Aim of this viewpoint is to provide evidence that early viral detection and prompt management remain the most effective strategies to improve survival rates and to reduce treatment-related morbidity in these patients.展开更多
According to specifications for Welding Procedure Qualification of ASME IX Section and Chinese code, JB 4708 2000, a software package for managing welding documents has been rebuilt. Consequently, the new software pa...According to specifications for Welding Procedure Qualification of ASME IX Section and Chinese code, JB 4708 2000, a software package for managing welding documents has been rebuilt. Consequently, the new software package can be used in a Limited Area Network (LAN) with 4 different levels of authorities for different users. Therefore, the welding documents, including DWPS (Design for Welding Procedure Specifications), PQRs (Procedure Qualification Records) and WPS (Welding Procedure Specifications) can be shared within a company. At the same time, the system provides users various functions such as browsing, copying, editing, searching and printing records, and helps users to make decision of whether a new PQR test is necessary or not according to the codes above as well. Furthermore, super users can also browse the history of record modification and retrieve the records when needed.展开更多
Testing-effort(TE) and imperfect debugging(ID) in the reliability modeling process may further improve the fitting and prediction results of software reliability growth models(SRGMs). For describing the S-shaped...Testing-effort(TE) and imperfect debugging(ID) in the reliability modeling process may further improve the fitting and prediction results of software reliability growth models(SRGMs). For describing the S-shaped varying trend of TE increasing rate more accurately, first, two S-shaped testing-effort functions(TEFs), i.e.,delayed S-shaped TEF(DS-TEF) and inflected S-shaped TEF(IS-TEF), are proposed. Then these two TEFs are incorporated into various types(exponential-type, delayed S-shaped and inflected S-shaped) of non-homogeneous Poisson process(NHPP)SRGMs with two forms of ID respectively for obtaining a series of new NHPP SRGMs which consider S-shaped TEFs as well as ID. Finally these new SRGMs and several comparison NHPP SRGMs are applied into four real failure data-sets respectively for investigating the fitting and prediction power of these new SRGMs.The experimental results show that:(i) the proposed IS-TEF is more suitable and flexible for describing the consumption of TE than the previous TEFs;(ii) incorporating TEFs into the inflected S-shaped NHPP SRGM may be more effective and appropriate compared with the exponential-type and the delayed S-shaped NHPP SRGMs;(iii) the inflected S-shaped NHPP SRGM considering both IS-TEF and ID yields the most accurate fitting and prediction results than the other comparison NHPP SRGMs.展开更多
For the remote control of a neutral beam injection (NBI) system, a software NBIcsw is developed to work on the control server. It can meet the requirements of data transmission and operation-control between the NBI ...For the remote control of a neutral beam injection (NBI) system, a software NBIcsw is developed to work on the control server. It can meet the requirements of data transmission and operation-control between the NBI measurement and control layer (MCL) and the remote monitoring layer (RML). The NBIcsw runs on a Linux system, developed with client/server (C/S) mode and multithreading technology. It is shown through application that the software is with good efficiency.展开更多
The developing market of information technologies i s the most dynamical and thriving business in the modern world. The law of supply and demand establishes repeating, steady cause and effect relation between three ec...The developing market of information technologies i s the most dynamical and thriving business in the modern world. The law of supply and demand establishes repeating, steady cause and effect relation between three economic phenomena-price, supply and demand. Demand is an ideal need and a real opportunity of the customer to buy the goods. Supply is an ideal readiness and a real opportunity of the commodity producer to put the goods on the market . A plethora of factors affect the supply and demand. There is inverse dependenc e between the market price of the goods and the quantity which is in the demand. There is direct dependence between the market price of the goods and the qu antity which is offered to the buyer. The following features distinguish the sof tware from the usual goods in the consumer market: high science intensity, simpl icity of replicating, relative simplicity of modification and updating, high req uirements to quality of the software, at sale the buyer gets it, but it does no t disappear in sale, there is no physical deterioration, but there is a fast ob solescence. To protect the programs against the non-authorized access (the copy ings and operation) technical and legal methods are used: the patent protection, status of industrial secret, license agreements.展开更多
The cultivation of innovative and entrepreneurial capability is a quality requirement of the times for the training of college and university talents. However, the regular teaching system universally has such problems...The cultivation of innovative and entrepreneurial capability is a quality requirement of the times for the training of college and university talents. However, the regular teaching system universally has such problems as much more emphasis on theory than on practice, much more emphasis on inheritance than on innovation, and mismatching between talent training and market demand, so that a great number of graduates do not have enough innovative capacity, and it is very difficult for them to engage in related jobs of software engineering steadily and permanently. By investigating and analyzing similar majors of more than 20 schools at home and abroad, this article proposes a teaching system of talent training of the 3 C-cored major of "innovative and entrepreneurial" software engineering(digital media technology) based on regions, oriented to the industry and marked by school-enterprise linkage, and in connection with the characteristics of college and university education.展开更多
Software engineering(SE) courses are confronted with predicaments how to cultivate students' engineering concept and how to abridge the distance between the academy and industry.The "Computing and Software En...Software engineering(SE) courses are confronted with predicaments how to cultivate students' engineering concept and how to abridge the distance between the academy and industry.The "Computing and Software Engineering,III(CSE III)" helps students mimic a real-world software development and broaden realworld SE view.With the spiral model as the main development model,the CSE III course includes not only the SE theory knowledge,but also quick learning,team cooperation,development management and risk management skills which meet the real-world industry requirements.Our contribution is providing an introductory course for multiple dimensions of knowledge,creating a real-world software development circumstance for students under quantitative control and designing a systematic and practical evaluation mechanism which stimulates the interests of students.CSE III has been executed from 2009 and obtains a valuable teaching and learning effects among our teachers,TAs and students;and we add refinements to the course according to feedbacks of participants.This paper will describe the design and practice of the CSE III course.展开更多
Software product lines have recently been presented as one of the best promis-ing improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regardi...Software product lines have recently been presented as one of the best promis-ing improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regarding the prob-lems of producing a perfect software scheme. Traditional approaches or recy-cling software are not effective to solve the problems concerning software competence. Since fast developments with software engineering in the past few years, studies show that some approaches are getting extensive attention in both industries and universities. This method is categorized as the software product line improvement;that supports reusing of software in big organizations. Different industries are adopting product lines to enhance efficiency and reduce operational expenses by way of emerging product developments. This research paper is formed to offer in-depth study regarding the software engineering issues such as complexity, conformity, changeability, invisibility, time constraints, budget constraints, and security. We have conducted various research surveys by visiting different professional software development organizations and took feedback from the professional software engineers to analyze the real-time problems that they are facing during the development process of software systems. Survey results proved that complexity is a most occurring issue that most software developers face while developing software applications. Moreover, invisibility is the problem that rarely happens according to the survey.展开更多
文摘Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
基金supported by the National Key Research and Development Plan(Grant No.2022YFB3401901)the National Natural Science Foundation of China(Grant Nos.12192210,12192214,12072295,and 12222209)+1 种基金Independent Project of State Key Laboratory of Rail Transit Vehicle System(Grant No.2023TPL-T03)Fundamental Research Funds for the Central Universities(Grant No.2682023CG004).
文摘The S38C railway axle undergoes induction hardening,resulting in a gradient-distributed microstructure and mechanical properties.The accurate identification of gradient-distributed plastic parameters for the S38C axle remains a challenging task.To tackle this challenge,the present study proposes a novel approach for identifying the gradient-distributed plastic parameters for the S38C axle by integrating nano-indentation techniques with the machine learning method.Firstly,nano-indentation tests are conducted along the radial direction of the S38C axle to obtain the gradient-distributed load-displacement curves,nano-hardness,and elastic modulus.Subsequently,the dimensionless analysis is performed to obtain the representative stress,strain,and yield stress from load-displacement curves.These parameters are then incorporated into the machine learning method as physical information to identify the gradient-distributed plastic parameters of the S38C axle.The results indicate that the proposed method based on the physics-informed neural network and multi-fidelity neural network successfully identifies the gradient-distributed plastic parameters of the S38C axles and demonstrates superior prediction accuracy and generalization compared with the purely data-driven machine learning method.
基金supported by the NIA/NIH(1K01AG060040).Studies performed by JN were funded by the NICHD/NIH(5R00HD096117)Microscopy Core Facility supported,in part,with funding from NIH-NCI Cancer Center Support Grant P30 CA016059.
文摘Alzheimer’s disease is initially thought to be caused by age-associated accumulation of plaques,in recent years,research has increasingly associated Alzheimer’s disease with lysosomal storage and metabolic disorders,and the explanation of its pathogenesis has shifted from amyloid and tau accumulation to oxidative stress and impaired lipid and glucose metabolism aggravated by hypoxic conditions.However,the underlying mechanisms linking those cellular processes and conditions to disease progression have yet to be defined.Here,we applied a disease similarity approach to identify unknown molecular targets of Alzheimer’s disease by using transcriptomic data from congenital diseases known to increase Alzheimer’s disease risk,namely Down syndrome,Niemann-Pick type C disease,and mucopolysaccharidoses I.We uncovered common pathways,hub genes,and miRNAs across in vitro and in vivo models of these diseases as potential molecular targets for neuroprotection and amelioration of Alzheimer’s disease pathology,many of which have never been associated with Alzheimer’s disease.We then investigated common molecular alterations in brain samples from a Niemann-Pick type C disease mouse model by juxtaposing them with brain samples of both human and mouse models of Alzheimer’s disease.Detailed phenotypic,molecular,chronological,and biological aging analyses revealed that the Npc1tm(I1061T)Dso mouse model can serve as a potential short-lived in vivo model for brain aging and Alzheimer’s disease research.This research represents the first comprehensive approach to congenital disease association with neurodegeneration and a new perspective on Alzheimer’s disease research while highlighting shortcomings and lack of correlation in diverse in vitro models.Considering the lack of an Alzheimer’s disease mouse model that recapitulates the physiological hallmarks of brain aging,the short-lived Npc1^(tm(I1061T)Dso) mouse model can further accelerate the research in these fields and offer a unique model for understanding the molecular mechanisms of Alzheimer’s disease from a perspective of accelerated brain aging.
基金supported by the National Italian Research Council(CNR)“Progetto DSB.AD007.305.001”to Monica Rinaldi。
文摘Hepatitis C virus(HCV)and hepatitis B virus(HBV)infections are increasingly recognized as significant etiological factors in the pathogenesis of B-cell non-Hodgkin’s lymphomas(B-NHLs).Epidemiological and molecular studies have demonstrated a consistent association between chronic viral infection and B-NHLs.Multiple pathogenic mechanisms have been implicated in lymphomagenesis,both direct and indirect,including chronic antigenic stimulation,direct infection of B cells,and viral protein-mediated oncogenic signaling,It is likely that a combination of several pathogenic conditions is required to eventually lead to the development of lymphoma.The prevalence of B-cell lymphomas among individuals with chronic HCV or HBV infection presents a complex pathogenetic scenario,given the tumor heterogeneity and variable clinical behavior,and poses therapeutic challenges,due to the partial efficacy of current treatment options.The advent of direct-acting antivirals(DAAs)for HCV and high-genetic barrier nucleos(t)ide analogues(NAs)for HBV has improved patient outcomes.In indolent HCV-associated B-NHLs,antiviral therapy with DAAs alone often achieves sustained virologic response and may lead to lymphoma regression.Conversely,aggressive subtypes like diffuse large B-cell lymphomas require combination treatment with immunochemotherapy.In the setting of HBV-associated lymphomas,antiviral prophylaxis with potent NAs(e.g.,entecavir or tenofovir)is essential to prevent HBV reactivation during rituximab-containing chemotherapy regimen.The integration of antiviral and anticancer therapies has been shown to enhance survival outcomes while mitigating hepatic toxicity.A comprehensive understanding of the biological interplay between chronic viral infection and B-cell transformation is critical for optimizing diagnostic and therapeutic strategies.Aim of this viewpoint is to provide evidence that early viral detection and prompt management remain the most effective strategies to improve survival rates and to reduce treatment-related morbidity in these patients.
文摘According to specifications for Welding Procedure Qualification of ASME IX Section and Chinese code, JB 4708 2000, a software package for managing welding documents has been rebuilt. Consequently, the new software package can be used in a Limited Area Network (LAN) with 4 different levels of authorities for different users. Therefore, the welding documents, including DWPS (Design for Welding Procedure Specifications), PQRs (Procedure Qualification Records) and WPS (Welding Procedure Specifications) can be shared within a company. At the same time, the system provides users various functions such as browsing, copying, editing, searching and printing records, and helps users to make decision of whether a new PQR test is necessary or not according to the codes above as well. Furthermore, super users can also browse the history of record modification and retrieve the records when needed.
基金supported by the Pre-research Foundation of CPLA General Equipment Department
文摘Testing-effort(TE) and imperfect debugging(ID) in the reliability modeling process may further improve the fitting and prediction results of software reliability growth models(SRGMs). For describing the S-shaped varying trend of TE increasing rate more accurately, first, two S-shaped testing-effort functions(TEFs), i.e.,delayed S-shaped TEF(DS-TEF) and inflected S-shaped TEF(IS-TEF), are proposed. Then these two TEFs are incorporated into various types(exponential-type, delayed S-shaped and inflected S-shaped) of non-homogeneous Poisson process(NHPP)SRGMs with two forms of ID respectively for obtaining a series of new NHPP SRGMs which consider S-shaped TEFs as well as ID. Finally these new SRGMs and several comparison NHPP SRGMs are applied into four real failure data-sets respectively for investigating the fitting and prediction power of these new SRGMs.The experimental results show that:(i) the proposed IS-TEF is more suitable and flexible for describing the consumption of TE than the previous TEFs;(ii) incorporating TEFs into the inflected S-shaped NHPP SRGM may be more effective and appropriate compared with the exponential-type and the delayed S-shaped NHPP SRGMs;(iii) the inflected S-shaped NHPP SRGM considering both IS-TEF and ID yields the most accurate fitting and prediction results than the other comparison NHPP SRGMs.
基金supported by National Natural Science Foundation of China (No. 10875146)
文摘For the remote control of a neutral beam injection (NBI) system, a software NBIcsw is developed to work on the control server. It can meet the requirements of data transmission and operation-control between the NBI measurement and control layer (MCL) and the remote monitoring layer (RML). The NBIcsw runs on a Linux system, developed with client/server (C/S) mode and multithreading technology. It is shown through application that the software is with good efficiency.
文摘The developing market of information technologies i s the most dynamical and thriving business in the modern world. The law of supply and demand establishes repeating, steady cause and effect relation between three economic phenomena-price, supply and demand. Demand is an ideal need and a real opportunity of the customer to buy the goods. Supply is an ideal readiness and a real opportunity of the commodity producer to put the goods on the market . A plethora of factors affect the supply and demand. There is inverse dependenc e between the market price of the goods and the quantity which is in the demand. There is direct dependence between the market price of the goods and the qu antity which is offered to the buyer. The following features distinguish the sof tware from the usual goods in the consumer market: high science intensity, simpl icity of replicating, relative simplicity of modification and updating, high req uirements to quality of the software, at sale the buyer gets it, but it does no t disappear in sale, there is no physical deterioration, but there is a fast ob solescence. To protect the programs against the non-authorized access (the copy ings and operation) technical and legal methods are used: the patent protection, status of industrial secret, license agreements.
基金supported by Research and Practice on the reform of graduate education and teaching in Jiangsu Province in 2016(JGZZ16_065)
文摘The cultivation of innovative and entrepreneurial capability is a quality requirement of the times for the training of college and university talents. However, the regular teaching system universally has such problems as much more emphasis on theory than on practice, much more emphasis on inheritance than on innovation, and mismatching between talent training and market demand, so that a great number of graduates do not have enough innovative capacity, and it is very difficult for them to engage in related jobs of software engineering steadily and permanently. By investigating and analyzing similar majors of more than 20 schools at home and abroad, this article proposes a teaching system of talent training of the 3 C-cored major of "innovative and entrepreneurial" software engineering(digital media technology) based on regions, oriented to the industry and marked by school-enterprise linkage, and in connection with the characteristics of college and university education.
文摘Software engineering(SE) courses are confronted with predicaments how to cultivate students' engineering concept and how to abridge the distance between the academy and industry.The "Computing and Software Engineering,III(CSE III)" helps students mimic a real-world software development and broaden realworld SE view.With the spiral model as the main development model,the CSE III course includes not only the SE theory knowledge,but also quick learning,team cooperation,development management and risk management skills which meet the real-world industry requirements.Our contribution is providing an introductory course for multiple dimensions of knowledge,creating a real-world software development circumstance for students under quantitative control and designing a systematic and practical evaluation mechanism which stimulates the interests of students.CSE III has been executed from 2009 and obtains a valuable teaching and learning effects among our teachers,TAs and students;and we add refinements to the course according to feedbacks of participants.This paper will describe the design and practice of the CSE III course.
文摘Software product lines have recently been presented as one of the best promis-ing improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regarding the prob-lems of producing a perfect software scheme. Traditional approaches or recy-cling software are not effective to solve the problems concerning software competence. Since fast developments with software engineering in the past few years, studies show that some approaches are getting extensive attention in both industries and universities. This method is categorized as the software product line improvement;that supports reusing of software in big organizations. Different industries are adopting product lines to enhance efficiency and reduce operational expenses by way of emerging product developments. This research paper is formed to offer in-depth study regarding the software engineering issues such as complexity, conformity, changeability, invisibility, time constraints, budget constraints, and security. We have conducted various research surveys by visiting different professional software development organizations and took feedback from the professional software engineers to analyze the real-time problems that they are facing during the development process of software systems. Survey results proved that complexity is a most occurring issue that most software developers face while developing software applications. Moreover, invisibility is the problem that rarely happens according to the survey.