This paper discusses the related contents of the integration application of information technology and computer software engineering.First,it briefly expounds the concepts and integration background of information tec...This paper discusses the related contents of the integration application of information technology and computer software engineering.First,it briefly expounds the concepts and integration background of information technology and computer software engineering.Then,it deeply analyzes the application status and significance of the integration application of information technology and computer software engineering in different fields.Finally,it briefly describes the specific application paths of the integration of information technology and computer software engineering,hoping to provide some valuable references for promoting the in-depth integration and development of information technology and computer software engineering.展开更多
The software technology field is facing new talent demands brought by the Information Technology Application Innovation(ITAI)industry.This paper takes Shanwei Institute of Technology as an example to deeply explore th...The software technology field is facing new talent demands brought by the Information Technology Application Innovation(ITAI)industry.This paper takes Shanwei Institute of Technology as an example to deeply explore the construction of a school-enterprise community education model driven by the ITAI industry.It establishes the Kirin Workshop training base to facilitate talent cultivation,integrates the ITAI Application Adaptation Center to enhance technical capabilities,cooperates with Liqi Technology to establish an industrial college for government talent training,adjusts the professional curriculum system,and arranges for students to participate in ITAI vocational skills competitions.The school-enterprise collaborative cultivation mechanism meets the talent needs of the ITAI field,with effective practical results.This paper also points out the shortcomings of the school-enterprise collaborative education model in the ITAI industry and provides optimization methods to explore new paths for industry-education integration and serve the development of regional and national ITAI industries^([1]).展开更多
The Guidelines for the Construction of Ideological and Political Education in Courses at Institutions of Higher Learning emphasizes that“the construction of ideological and political education in courses is an import...The Guidelines for the Construction of Ideological and Political Education in Courses at Institutions of Higher Learning emphasizes that“the construction of ideological and political education in courses is an important task for comprehensively improving the quality of talent cultivation”and“clarifying the target requirements and key content of the construction of ideological and political education in courses.”In vocational colleges,as an important discipline in the field of information technology,the construction of ideological and political education in software technology courses is of great significance for cultivating students’comprehensive qualities and establishing correct values.Based on sorting out the core literacy of the construction of ideological and political education in software technology courses,this article actively explores its construction path,hoping to provide references for relevant educators.展开更多
Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business...Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business operations, and protect core assets. However, the development process often faces threats such as injection attacks, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), mainly due to code vulnerabilities, configuration errors, and risks from third-party components. To meet these challenges, this paper discusses the application of security technology in development and operation, emphasizing security requirements analysis, design principles, coding practices, and testing during the development phase. Along with focusing on environmental configuration, continuous monitoring, emergency response, disaster recovery, and regular auditing and updating during the operation phase. These measures can significantly enhance the security of software systems and protect user and corporate data.展开更多
This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysi...This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system.展开更多
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq...Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.展开更多
This article focuses on the current computer monitoring and control as the research direction,studying the application strategies of artificial intelligence and big data technology in this field.It includes an introdu...This article focuses on the current computer monitoring and control as the research direction,studying the application strategies of artificial intelligence and big data technology in this field.It includes an introduction to artificial intelligence and big data technology,the application strategies of artificial intelligence and big data technology in computer hardware,software,and network monitoring,as well as the application strategies of artificial intelligence and big data technology in computer process,access,and network control.This analysis aims to serve as a reference for the application of artificial intelligence and big data technology in computer monitoring and control,ultimately enhancing the security of computer systems.展开更多
A new method that designs and implements the component-based distributed & hierarchical flexible manufacturing control software is described with a component concept in this paper. The proposed method takes aim at...A new method that designs and implements the component-based distributed & hierarchical flexible manufacturing control software is described with a component concept in this paper. The proposed method takes aim at improving the flexibility and reliability of the control system. On the basis of describing the concepts of component-based software and the distributed object technology, the architecture of the component-based software of the control system is suggested with the Common Object Request Broker Architecture (CORBA). And then, we propose a design method for component-based distributed & hierarchical flexible manufacturing control system. Finally, to verify the software design method, a prototype flexible manufacturing control system software has been implemented in Orbix 2.3c, VC + + 6. 0 and has been tested in connection with the physical flexible manufacturing shop at the WuXi Professional Institute.展开更多
In view of the flaws of component-based software (CBS) reliability modeling and analysis, the low recognition degree of debugging process, too many assumptions and difficulties in obtaining the solution, a CBS relia...In view of the flaws of component-based software (CBS) reliability modeling and analysis, the low recognition degree of debugging process, too many assumptions and difficulties in obtaining the solution, a CBS reliability simulation process is presented incorporating the imperfect debugging and the limitation of debugging resources. Considering the effect of imperfect debugging on fault detec- tion and correction process, a CBS integration testing model is sketched by multi-queue muhichannel and finite server queuing model (MMFSQM). Compared with the analytical method based on pa- rameters and other nonparametric approaches, the simulation approach can relax more of the usual reliability modeling assumptions and effectively expound integration testing process of CBS. Then, CBS reliability process simulation procedure is developed accordingly. The proposed simulation ap- proach is validated to be sound and effective by simulation experiment studies and analysis.展开更多
The rapid growth of Internet usage and electronic commerce (e commerce) applications will push traditional industries to transform their business models and to re engineer their information systems. This direction w...The rapid growth of Internet usage and electronic commerce (e commerce) applications will push traditional industries to transform their business models and to re engineer their information systems. This direction will give the software industry either great opportunities for their business growth or crucial challenges to their existence. This article describes two essential challenges the software industry will face and presents relevant new technologies that will be helpful for overcoming those challenges.展开更多
Computer software has been becoming more and more c om plex with the development of hardware. Thus, how to efficiently develop extensib le, maintainable and adaptable software occurs to be an urgent problem. The comp ...Computer software has been becoming more and more c om plex with the development of hardware. Thus, how to efficiently develop extensib le, maintainable and adaptable software occurs to be an urgent problem. The comp onent-based software development technique is a better method to solve the prob lem. In this paper, we first discuss the concept, description method and some fa miliar styles of software architecture, and then analyze the merits of using the software architecture to guide the software development. We also present a gene ral design method for component. Its applications are finally provided.展开更多
The cultivation of innovative and entrepreneurial capability is a quality requirement of the times for the training of college and university talents. However, the regular teaching system universally has such problems...The cultivation of innovative and entrepreneurial capability is a quality requirement of the times for the training of college and university talents. However, the regular teaching system universally has such problems as much more emphasis on theory than on practice, much more emphasis on inheritance than on innovation, and mismatching between talent training and market demand, so that a great number of graduates do not have enough innovative capacity, and it is very difficult for them to engage in related jobs of software engineering steadily and permanently. By investigating and analyzing similar majors of more than 20 schools at home and abroad, this article proposes a teaching system of talent training of the 3 C-cored major of "innovative and entrepreneurial" software engineering(digital media technology) based on regions, oriented to the industry and marked by school-enterprise linkage, and in connection with the characteristics of college and university education.展开更多
For a more accurate and comprehensive assessment of the trustworthiness of component-based soft- ware system, the fuzzy analytic hierarchy process is introduced to establish the analysis model. Combine qualitative and...For a more accurate and comprehensive assessment of the trustworthiness of component-based soft- ware system, the fuzzy analytic hierarchy process is introduced to establish the analysis model. Combine qualitative and quantitative analyses, the impacts to overall trustworthiness by the different types of components are distinguished. Considering the coupling relationship between components, dividing the system into several layers from target layer to scheme layer, evaluating the scheme advantages disadvantages by group decision-making, the trustworthiness of a typical J2EE structured component-based software is assessed. The trustworthiness asses model of the software components provides an effective methods of operation.展开更多
Against the deficiencies of component-based software(CBS) reliability modeling and analysis,for instance,importing too many assumptions,paying less attention to debugging process without considering imperfect debuggin...Against the deficiencies of component-based software(CBS) reliability modeling and analysis,for instance,importing too many assumptions,paying less attention to debugging process without considering imperfect debugging and change-point(CP) problems adequately,an approach of CBS reliability process analysis is proposed which incorporates the imperfect debugging and CP.First,perfect/imperfect debugging and CP are reviewed.Based on the queuing theory,a multi-queue multichannel and infinite server queuing model(MMISQM) is presented to sketch the integration test process of CBS.Meanwhile,considering the effects of imperfect debugging and CP,expressions for fault detection and correction are derived based on MMISQM.Numerical results demonstrate that the proposed model can sketch the integration test process of CBS with preferable performance which outperforms other models.展开更多
In view of the problems and the weaknesses of component-based software ( CBS ) reliability modeling and analysis, and a lack of consideration for real debugging circumstance of integration tes- ting, a CBS reliabili...In view of the problems and the weaknesses of component-based software ( CBS ) reliability modeling and analysis, and a lack of consideration for real debugging circumstance of integration tes- ting, a CBS reliability process analysis model is proposed incorporating debugging time delay, im- perfect debugging and limited debugging resources. CBS integration testing is formulated as a multi- queue muhichannel and finite server queuing model (MMFSQM) to illustrate fault detection process (FDP) and fault correction process (FCP). A unified FCP is sketched, given debugging delay, the diversities of faults processing and the limitations of debugging resources. Furthermore, the impacts of imperfect debugging on fault detection and correction are explicitly elaborated, and the expres- sions of the cumulative number of fault detected and corrected are illustrated. Finally, the results of numerical experiments verify the effectiveness and rationality of the proposed model. By comparison, the proposed model is superior to the other models. The proposed model is closer to real CBS testing process and facilitates software engineer' s quantitatively analyzing, measuring and predicting CBS reliability. K展开更多
Since most of the available component-based software reliability models consume high computational cost and suffer from the evaluating complexity for the software system with complex structures,a component-based back-...Since most of the available component-based software reliability models consume high computational cost and suffer from the evaluating complexity for the software system with complex structures,a component-based back-propagation reliability model(CBPRM)with low complexity for the complex software system reliability evaluation is presented in this paper.The proposed model is based on the artificial neural networks and the component reliability sensitivity analyses.These analyses are performed dynamically and assigned to the neurons to optimize the reliability evaluation.CBPRM has a linear increasing complexity and outperforms the state-based and the path-based reliability models.Another advantage of CBPRM over others is its robustness.CBPRM depends on the component reliabilities and the correlative sensitivities,which are independent from the software system structure.Based on the theory analysis and experiment results,it shows that the complexity of CBPRM is evidently lower than the contrast models and the reliability evaluating accuracy is acceptable when the software system structure is complex.展开更多
In a component-based software development life cycle, selection of preexisting components is an important task. Every component that has to be reused has an associated risk of failure of not meeting the functional and...In a component-based software development life cycle, selection of preexisting components is an important task. Every component that has to be reused has an associated risk of failure of not meeting the functional and non-functional requirements. A component's failure would lead a developer to look for some other alternative of combinations of COTS, in-house and engineered components among possible candidate combinations. This means design itself can readily change. The very process of design of a software system and component selection seems to be heavily dependent on testing results. Instability of design, further, becomes more severe due to requirements change requests. Therefore, this instability of design has to be essentially mitigated by using proper design and testing approaches, otherwise, it may lead to exorbitantly high testing cost due to the repeated testing of various alternatives. How these three activities: Component-based software design, component selection and component-based software testing are interrelated? What process model is most suited to address this concern? This work explores the above questions and their implication in terms of nature of a process model that can be convincing in case of component-based software development.展开更多
Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvemen...Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL.展开更多
Under the background of the continuous combination of science and technology and modern production, the national macro requirements for enterprise construction have been adjusted and changed more obviously than in the...Under the background of the continuous combination of science and technology and modern production, the national macro requirements for enterprise construction have been adjusted and changed more obviously than in the past. It is not simply based on quantitative production, but more emphasis on the upgrading and progress of technology. This change also provides new ideas and ways for enterprise innovation. As an important basis for leading the development trend of the times, chemical enterprises should also receive more attention and attention in this case, especially in terms of chemical design, we should especially emphasize the significance of the application of computer software technology.展开更多
文摘This paper discusses the related contents of the integration application of information technology and computer software engineering.First,it briefly expounds the concepts and integration background of information technology and computer software engineering.Then,it deeply analyzes the application status and significance of the integration application of information technology and computer software engineering in different fields.Finally,it briefly describes the specific application paths of the integration of information technology and computer software engineering,hoping to provide some valuable references for promoting the in-depth integration and development of information technology and computer software engineering.
基金supported by the Foundation of Shanwei Institute of Technology(swjy23-008).
文摘The software technology field is facing new talent demands brought by the Information Technology Application Innovation(ITAI)industry.This paper takes Shanwei Institute of Technology as an example to deeply explore the construction of a school-enterprise community education model driven by the ITAI industry.It establishes the Kirin Workshop training base to facilitate talent cultivation,integrates the ITAI Application Adaptation Center to enhance technical capabilities,cooperates with Liqi Technology to establish an industrial college for government talent training,adjusts the professional curriculum system,and arranges for students to participate in ITAI vocational skills competitions.The school-enterprise collaborative cultivation mechanism meets the talent needs of the ITAI field,with effective practical results.This paper also points out the shortcomings of the school-enterprise collaborative education model in the ITAI industry and provides optimization methods to explore new paths for industry-education integration and serve the development of regional and national ITAI industries^([1]).
文摘The Guidelines for the Construction of Ideological and Political Education in Courses at Institutions of Higher Learning emphasizes that“the construction of ideological and political education in courses is an important task for comprehensively improving the quality of talent cultivation”and“clarifying the target requirements and key content of the construction of ideological and political education in courses.”In vocational colleges,as an important discipline in the field of information technology,the construction of ideological and political education in software technology courses is of great significance for cultivating students’comprehensive qualities and establishing correct values.Based on sorting out the core literacy of the construction of ideological and political education in software technology courses,this article actively explores its construction path,hoping to provide references for relevant educators.
文摘Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business operations, and protect core assets. However, the development process often faces threats such as injection attacks, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), mainly due to code vulnerabilities, configuration errors, and risks from third-party components. To meet these challenges, this paper discusses the application of security technology in development and operation, emphasizing security requirements analysis, design principles, coding practices, and testing during the development phase. Along with focusing on environmental configuration, continuous monitoring, emergency response, disaster recovery, and regular auditing and updating during the operation phase. These measures can significantly enhance the security of software systems and protect user and corporate data.
基金Chongqing Engineering University Undergraduate Innovation and Entrepreneurship Training Program Project:Wireless Fire Automatic Alarm System(Project No.:CXCY2024017)Chongqing Municipal Education Commission Science and Technology Research Project:Development and Research of Chongqing Wireless Fire Automatic Alarm System(Project No.:KJQN202401906)。
文摘This article explores the design of a wireless fire alarm system supported by advanced data fusion technology.It includes discussions on the basic design ideas of the wireless fire alarm system,hardware design analysis,software design analysis,and simulation analysis,all supported by data fusion technology.Hopefully,this analysis can provide some reference for the rational application of data fusion technology to meet the actual design and application requirements of the system.
文摘Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
文摘This article focuses on the current computer monitoring and control as the research direction,studying the application strategies of artificial intelligence and big data technology in this field.It includes an introduction to artificial intelligence and big data technology,the application strategies of artificial intelligence and big data technology in computer hardware,software,and network monitoring,as well as the application strategies of artificial intelligence and big data technology in computer process,access,and network control.This analysis aims to serve as a reference for the application of artificial intelligence and big data technology in computer monitoring and control,ultimately enhancing the security of computer systems.
基金Supported by National High Technology Development plan(Item No.:2001AA412250)and Shanghai Science & Technology Development Project(Item No.:02FK04)
文摘A new method that designs and implements the component-based distributed & hierarchical flexible manufacturing control software is described with a component concept in this paper. The proposed method takes aim at improving the flexibility and reliability of the control system. On the basis of describing the concepts of component-based software and the distributed object technology, the architecture of the component-based software of the control system is suggested with the Common Object Request Broker Architecture (CORBA). And then, we propose a design method for component-based distributed & hierarchical flexible manufacturing control system. Finally, to verify the software design method, a prototype flexible manufacturing control system software has been implemented in Orbix 2.3c, VC + + 6. 0 and has been tested in connection with the physical flexible manufacturing shop at the WuXi Professional Institute.
基金Supported by the National High Technology Research and Development Program of China(No.2008AA01A201)the National Nature Science Foundation of China(No.60503015,90818016)
文摘In view of the flaws of component-based software (CBS) reliability modeling and analysis, the low recognition degree of debugging process, too many assumptions and difficulties in obtaining the solution, a CBS reliability simulation process is presented incorporating the imperfect debugging and the limitation of debugging resources. Considering the effect of imperfect debugging on fault detec- tion and correction process, a CBS integration testing model is sketched by multi-queue muhichannel and finite server queuing model (MMFSQM). Compared with the analytical method based on pa- rameters and other nonparametric approaches, the simulation approach can relax more of the usual reliability modeling assumptions and effectively expound integration testing process of CBS. Then, CBS reliability process simulation procedure is developed accordingly. The proposed simulation ap- proach is validated to be sound and effective by simulation experiment studies and analysis.
文摘The rapid growth of Internet usage and electronic commerce (e commerce) applications will push traditional industries to transform their business models and to re engineer their information systems. This direction will give the software industry either great opportunities for their business growth or crucial challenges to their existence. This article describes two essential challenges the software industry will face and presents relevant new technologies that will be helpful for overcoming those challenges.
文摘Computer software has been becoming more and more c om plex with the development of hardware. Thus, how to efficiently develop extensib le, maintainable and adaptable software occurs to be an urgent problem. The comp onent-based software development technique is a better method to solve the prob lem. In this paper, we first discuss the concept, description method and some fa miliar styles of software architecture, and then analyze the merits of using the software architecture to guide the software development. We also present a gene ral design method for component. Its applications are finally provided.
基金supported by Research and Practice on the reform of graduate education and teaching in Jiangsu Province in 2016(JGZZ16_065)
文摘The cultivation of innovative and entrepreneurial capability is a quality requirement of the times for the training of college and university talents. However, the regular teaching system universally has such problems as much more emphasis on theory than on practice, much more emphasis on inheritance than on innovation, and mismatching between talent training and market demand, so that a great number of graduates do not have enough innovative capacity, and it is very difficult for them to engage in related jobs of software engineering steadily and permanently. By investigating and analyzing similar majors of more than 20 schools at home and abroad, this article proposes a teaching system of talent training of the 3 C-cored major of "innovative and entrepreneurial" software engineering(digital media technology) based on regions, oriented to the industry and marked by school-enterprise linkage, and in connection with the characteristics of college and university education.
基金Sponsored by the National High Technology Research and Development Program of China ("863"Program) (2009AA01Z433)
文摘For a more accurate and comprehensive assessment of the trustworthiness of component-based soft- ware system, the fuzzy analytic hierarchy process is introduced to establish the analysis model. Combine qualitative and quantitative analyses, the impacts to overall trustworthiness by the different types of components are distinguished. Considering the coupling relationship between components, dividing the system into several layers from target layer to scheme layer, evaluating the scheme advantages disadvantages by group decision-making, the trustworthiness of a typical J2EE structured component-based software is assessed. The trustworthiness asses model of the software components provides an effective methods of operation.
基金Supported by the National High Technology Research and Development Program of China(No.2008AA01A201)the National Natural ScienceFoundation of China(No.60503015)+1 种基金the National Key R&D Program of China(No.2013BA17F02)the Shandong Province Science andTechnology Program of China(No.2011GGX10108,2010GGX10104)
文摘Against the deficiencies of component-based software(CBS) reliability modeling and analysis,for instance,importing too many assumptions,paying less attention to debugging process without considering imperfect debugging and change-point(CP) problems adequately,an approach of CBS reliability process analysis is proposed which incorporates the imperfect debugging and CP.First,perfect/imperfect debugging and CP are reviewed.Based on the queuing theory,a multi-queue multichannel and infinite server queuing model(MMISQM) is presented to sketch the integration test process of CBS.Meanwhile,considering the effects of imperfect debugging and CP,expressions for fault detection and correction are derived based on MMISQM.Numerical results demonstrate that the proposed model can sketch the integration test process of CBS with preferable performance which outperforms other models.
基金Supported by the National High Technology Research and Development Program of China(No.2008AA01A201)the National Natural Science Foundation of China(No.60503015)+1 种基金the National Key R&D Program of China(No.2013BA17F02)the Shandong Province Science and Technology Program of China(No.2011GGX10108,2010GGX10104)
文摘In view of the problems and the weaknesses of component-based software ( CBS ) reliability modeling and analysis, and a lack of consideration for real debugging circumstance of integration tes- ting, a CBS reliability process analysis model is proposed incorporating debugging time delay, im- perfect debugging and limited debugging resources. CBS integration testing is formulated as a multi- queue muhichannel and finite server queuing model (MMFSQM) to illustrate fault detection process (FDP) and fault correction process (FCP). A unified FCP is sketched, given debugging delay, the diversities of faults processing and the limitations of debugging resources. Furthermore, the impacts of imperfect debugging on fault detection and correction are explicitly elaborated, and the expres- sions of the cumulative number of fault detected and corrected are illustrated. Finally, the results of numerical experiments verify the effectiveness and rationality of the proposed model. By comparison, the proposed model is superior to the other models. The proposed model is closer to real CBS testing process and facilitates software engineer' s quantitatively analyzing, measuring and predicting CBS reliability. K
基金Supported by the National Natural Science Foundation of China(No.60973118,60873075)
文摘Since most of the available component-based software reliability models consume high computational cost and suffer from the evaluating complexity for the software system with complex structures,a component-based back-propagation reliability model(CBPRM)with low complexity for the complex software system reliability evaluation is presented in this paper.The proposed model is based on the artificial neural networks and the component reliability sensitivity analyses.These analyses are performed dynamically and assigned to the neurons to optimize the reliability evaluation.CBPRM has a linear increasing complexity and outperforms the state-based and the path-based reliability models.Another advantage of CBPRM over others is its robustness.CBPRM depends on the component reliabilities and the correlative sensitivities,which are independent from the software system structure.Based on the theory analysis and experiment results,it shows that the complexity of CBPRM is evidently lower than the contrast models and the reliability evaluating accuracy is acceptable when the software system structure is complex.
文摘In a component-based software development life cycle, selection of preexisting components is an important task. Every component that has to be reused has an associated risk of failure of not meeting the functional and non-functional requirements. A component's failure would lead a developer to look for some other alternative of combinations of COTS, in-house and engineered components among possible candidate combinations. This means design itself can readily change. The very process of design of a software system and component selection seems to be heavily dependent on testing results. Instability of design, further, becomes more severe due to requirements change requests. Therefore, this instability of design has to be essentially mitigated by using proper design and testing approaches, otherwise, it may lead to exorbitantly high testing cost due to the repeated testing of various alternatives. How these three activities: Component-based software design, component selection and component-based software testing are interrelated? What process model is most suited to address this concern? This work explores the above questions and their implication in terms of nature of a process model that can be convincing in case of component-based software development.
文摘Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL.
文摘Under the background of the continuous combination of science and technology and modern production, the national macro requirements for enterprise construction have been adjusted and changed more obviously than in the past. It is not simply based on quantitative production, but more emphasis on the upgrading and progress of technology. This change also provides new ideas and ways for enterprise innovation. As an important basis for leading the development trend of the times, chemical enterprises should also receive more attention and attention in this case, especially in terms of chemical design, we should especially emphasize the significance of the application of computer software technology.