The research is devoted to the development of the formalized and ontological models of the software quality according to ISO 25010. These models provide the possibility of the formalization of the ...software quality assessment according to ISO 25010. This standard would benefit from a formal description. The paper proves that information sufficiency is a critical aspect of software quality assessment. The methods and system of evaluating the sufficiency of the information for software quality assessment according to ISO 25010 are developed. The developed methods and tools provide the increasing the veracity of software quality assessment. The conducted experiments confirm that the developed methodology of evaluating the sufficiency of information for software quality assessment increased the veracity of the software quality assessment in 12% for the automated system for large-format photo print.
At the current stage of development and implementation of information technology in various areas of human activity, decisive changes are taking place, as there are powerful technical resources for ...the accumulation and processing of large amounts of information ...
Currently, there is a contradiction between the growing number of mobile applications in use and the responsibility that is placed on them, on the one hand, and the imperfection of the methods and ...tools for ensuring the security of mobile applications, on the other hand. Therefore, ensuring the security of mobile applications by developing effective methods and tools is a challenging task today. This study aims to evaluate the mutual correlations and weights of factors and consequences of mobile application insecurity. We have developed a method of evaluating the weights of factors of mobile application insecurity, which, taking into account the mutual correlations of mobile application insecurity consequences from these factors, determines the weights of the factors and allows us to conclude which factors are necessary to identify and accurately determine (evaluate) to ensure an appropriate level of reliability of forecasting and assess the security of mobile applications. The experimental results of our research are the evaluation of the weights of ten OWASP mobile application insecurity factors the identification of the mutual correlations of the consequences of mobile applications’ insecurity from these factors, and the identification of common factors on which more than one consequence depends.
Today, there is a contradiction between the rapid increase in the complexity and size of modern software while increasing responsibility for the performance of their functions, the increasing ...requirements of customers and users to the quality and efficiency of software use and the imperfection of models, methods, tools of predicting software quality at the early stages of the life cycle.Therefore, the task of predicting the software quality level based on requirements is relevant. The aim of this study is to solve this task by developing information technology for prediction software quality levels based on requirements. The proposed information technology for prediction software quality level based on requirements provides analysis of quality attributes in requirements, reflects the dependence (equations) of quality characteristics on attributes, forms a quantitative assessment of quality characteristics, reflects the dependence (equation) of quality on its characteristics, forms a quantitative assessment of quality, performs quality level prediction, provides all the listed services simultaneously and the model, methods, and tools underlying the IT belong to common methodological approaches and are integrated. The developed system of predicting the software quality level based on requirements provides the user with predicted estimates of eight software quality characteristics, geometric interpretation of the software quality characteristics’ values, a comprehensive indicator of the predicted software quality, and a conclusion about the future software quality level. On the basis of this, it is possible to compare sets of requirements for software and make a reasonable choice of a set of requirements for further implementation. The information technology and the system of predicting the software quality level based on requirements, developed in this paper, provide the possibility of comparing sets of requirements for software, justified selection of requirements for further implementation of quality software (as experiments have shown, this is only one of the four proposed sets), and rejection or revision of unsuccessful sets of requirements that cannot be used to develop quality software.
Currently, there are no clinical decision support information technologies (CDSIT) that would consider civil-legal grounds when forming a decision for clinicians. Therefore, the design, development, ...and implementation of CDSIT, which considers civil-legal grounds when forming decisions, are actual problems. Methodology for the development and application of knowledge-driven, rule-based, clinical decisions support information technologies with consideration of civil-legal grounds has been developed, which provides a theoretical basis for developing clinical decisions support information technology with consideration of civil-legal grounds and partial CDSITs regarding the possibility of providing medical services of a certain type. In addition to the conclusion about the possibility or impossibility of providing certain medical services, the developed methodology ensures the presence of all essential terms (from the viewpoint of civil law regulation) in the contract for the certain medical service's provision and/or the data on potential patients for the provision of such a service, as well as minimization of the influence of the human factor when making clinical decisions. It is advisable to evaluate the CDSITs with consideration of civil-legal grounds, developed according to the proposed methodology, from the viewpoint of the correctness of the decisions generated by them, as well as from the viewpoint of their usefulness for clinics. In this paper, experiments with the methodology-based CDSIT regarding the possibility of performing a surrogate motherhood procedure with consideration of civil-legal grounds were conducted. Such experiments showed the correctness of the generated decisions at the level of 97 %. Experiments also demonstrated the usefulness of such IT for clinics from the viewpoint of eliminating adverse legal consequences, as they might arise due to violation or disregard of legal, and moral and ethical norms.
The Report is prepared on the basis of the information received from three European universities – the Project’s partners (including information from the universities’ websites) about the practices ...of personalised learning (PL); and the information from six Ukrainian universities – the Project’s partners (including surveys of staff and students) to describe the current state/situation, to understand the existing gaps and to define the tasks for the process of implementing the Project. Information about the European universities presents their achievements in the realisation of PL in higher education, including the following directions: PL model; Institutional policies and PL; Infrastructure, environment, tools etc. for PL; QA system and PL; Students and PL; University teachers and PL; Management and PL; Inclusion in the education process. Information on Ukrainian universities has two parts: the 1st – General questions about implementing PL in the university; the 2nd – Questionnaire for surveying staff and students. The Conclusions that are finalising the publication have a practical orientation.
Currently, the urgent task is developing the methods and tools for increasing Smart Parking software system security. The purpose of this study is conducting analysis of requirements for Smart ...Parking System software security in order to find the bottlenecks and parts of the software that are most vulnerable to external threats and develop the methods and tools for increasing their security. The paper proposes the method of increasing Smart Parking software system security based on integrating the middleware in Smart Parking System software architecture. The proposed method takes into account all the criteria for Smart Parking System software security, i.e. parameters of safe access to the database, client program security, server security and API security and provides a complex solution for increasing the safety of Smart Parking software system. The proposed method differs from the known ones in that it allows taking into account all the criteria for increasing the Smart Parking System software security in complex using security middleware.
The paper develops the method for forecasting the level of software quality based on quality attributes. This method differs from the known ones in that it provides forecasting the quality level of ...future software based on the processing the software quality attributes’ values, which are available in the software requirements specification (SRS). So, the proposed method makes it possible to compare the SRSs, to immediately refuse the realization of a software based on unsuccessful SRS (saving money and time, reducing the probability of failed and challenged projects), and to make a reasonable choice of the specification for the further implementation of a software with the highest quality (of course, if errors will not be introduced at subsequent stages of the software life cycle). During the experiments, 4 SRS were analyzed, which were fulfilled by different IT firms of Khmelnytskyi (Ukraine) for the solution of the same task. Taking into account the forecasted quality level of the future software, which will have developed according to each of the analyzed SRS, a comparison of the 4 analyzed SRS was made, and a reasoned choice of the specification was made for the further realization of the highest quality software.