Software Engineering and Information Systems
Narges Akhound; Sahar Adabi; Ali Rezaee; Amir masoud Rahmani
Articles in Press, Accepted Manuscript, Available Online from 27 September 2022
Abstract
The advent of the Internet of Things (IoT) technology has made it possible for different devices to be widely connected to the Internet and interact. It has led to the production of large amounts of heterogeneous data. On the other hand, cloud computing is a convenient and efficient processing model ...
Read More
The advent of the Internet of Things (IoT) technology has made it possible for different devices to be widely connected to the Internet and interact. It has led to the production of large amounts of heterogeneous data. On the other hand, cloud computing is a convenient and efficient processing model for storing and processing data. Still, the increasing demand for real-time and delay-sensitive applications is increasing day by day. Due to network bandwidth limitations, these problems cannot be solved using cloud computing alone. A fog layer located between the IoT devices and the cloud computing layer has been proposed to overcome the problem of resource constraints in mobile devices. delay-sensitive applications run that require more volume and power resources. In this paper, end-to-end architecture for integrating IoT, fog, and cloud layers into a large-scale dispatched application is proposed to support high availability to make efficient use of fog-cloud resources and achieve the appropriate quality of service (QoS) in terms of delay and failure probability criteria. The mentioned architecture consists of three hierarchal layers: IoT devices, fog nodes, and cloud data centers. Depending on the processing power of each layer's resources, user requests may be executed on the same layer or sent to a higher layer. Then, quality characteristics such as availability, performance, and interoperability for the proposed architecture are evaluated by the ATAM scenario-based method. The basis of architectural evaluation and analysis in this method is the study of the requirements and the quality characteristics of the system architecture.
Software Engineering and Information Systems
Mohammad Reza Hassanzadeh; farshid keynia
Volume 7, Issue 1 , February 2021, , Pages 35-54
Abstract
Metaheuristic algorithms are typically population-based random search techniques. The general framework of a metaheuristic algorithm consisting of its main parts. The sections of a metaheuristic algorithm include setting algorithm parameters, population initialization, global search section, local search ...
Read More
Metaheuristic algorithms are typically population-based random search techniques. The general framework of a metaheuristic algorithm consisting of its main parts. The sections of a metaheuristic algorithm include setting algorithm parameters, population initialization, global search section, local search section, and checking the stopping conditions in a metaheuristic algorithm. In the parameters setting section, the user can monitor the performance of the metaheuristic algorithm and improve its performance according to the problem under consideration. In this study, an overview of the concepts, classifications, and different methods of population initialization in metaheuristic algorithms discussed in recent literature will be provided. Population initialization is a basic and common step between all metaheuristic algorithms. Therefore, in this study, an attempt has been made that the performance, methods, mechanisms, and categories of population initialization in metaheuristic algorithms. Also, the relationship between population initialization and other important parameters in performance and efficiency of metaheuristic algorithms such as search space size, population size, the maximum number of iteration, etc., which are mentioned and considered in the literature, are collected and presented in a regular format.
Software Engineering and Information Systems
shahrzad Oveisi; Mohammad Nadjafi; Mohammad Ali Farsi; Ali moeini; Mahmood Shabankhah
Volume 6, Issue 3 , August 2020, , Pages 187-200
Abstract
One of the key pillars of any operating system is its proper software performance. Software failure can have dangerous effects and consequences and can lead to adverse and undesirable events in the design or use phases. The goal of this study is to identify and evaluate the most significant software ...
Read More
One of the key pillars of any operating system is its proper software performance. Software failure can have dangerous effects and consequences and can lead to adverse and undesirable events in the design or use phases. The goal of this study is to identify and evaluate the most significant software risks based on the FMEA indices with respect to reduce the risk level by means of experts’ opinions. To this end, TOPSIS as one of the most applicable methods of prioritizing and ordering the significance of events has been used. Since uncertainty in the data is inevitable, the entropy principle has been applied with the help of fuzzy theory to overcome this problem to weigh the specified indices.The applicability and effectiveness of the proposed approach is validated through a real case study risk analysis of an Air/Space software system. The results show that the proposed approach is valid and can provide valuable and effective information in assisting risk management decision making of our software system that is in the early stages of software life cycle. After obtaining the events and assessing their risk using the existing method, finally, suggestions are given to reduce the risk of the event with a higher risk rating.
Software Engineering and Information Systems
Zahra Baatmaanghelich; Ali Rezaee; Sahar Adabi
Volume 4, Issue 1 , February 2018, , Pages 1-6
Abstract
One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics ...
Read More
One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics of these systems, formal methods are used for specification, description and verification. The goal of this research is to turn a business process graphical diagram into a formal based model. In this work, BPMN has been extended to add time and probability information and then has been transferred to probabilistic real-time CSP area. This mapping can be employed as a basic model for modeling different system characteristics. This mapping, then, is modeled using a case study in pervasive healthcare domain and verified in a model checking tool. Index Terms — Formal methods, CSP, BPMN, Pervasive healthcare, Model checking, Verification, Service Composition.
Software Engineering and Information Systems
Abdolghader pourali
Volume 3, Issue 1 , February 2017, , Pages 1-10
Abstract
Software architecture is one of the most fundamental products in the process of software development in the areas of behavioral or non- behavioral features like availability or transformability change. There are different ways to evaluate software architecture one of which is the creation of application ...
Read More
Software architecture is one of the most fundamental products in the process of software development in the areas of behavioral or non- behavioral features like availability or transformability change. There are different ways to evaluate software architecture one of which is the creation of application model. An executable model of software architecture is an official description of architecture which if used prior to the running of architecture, its final behavior and function will be observed and as a result possible problems could be elevated and promoted. In this study we aimed at availability evaluation in object- oriented style. To ensure the applicability of the style the UML diagrams, especially the sequence diagram, were used to exhibit the architectural behavior. In the later stages, as the UML diagram is inapplicable, the following operations were done. First, metric annotation is used to tag clichés. Then, the studied style diagram was transformed into an applicable one. Afterwards and following the design of petri, using CpnTools, the applicable model based on color petri net was evaluated. In this research the availability evaluation on an ATM for the N=5 users was tested and the results of evaluation showed that the higher the rate of availability (approximately %100) the higher is the rate of usability of the system when needed.