EA (Enterprise Architecture) visualization methodologies have been explored by researchers and engineers to conduct EA modeling. The objectives of EA modeling are to clarify enterprise strategies, ...visualize business processes, and model information systems to manage resources, improve organization structure, adjust information strategy, and create new business value. Therefore, EA models can be broadly applied in various fields. For example, the applications include business modeling, information system architecture design, technology infrastructure configuration, software maintenance, and system security analysis. As the primary source of information, EA models are of paramount importance to researchers, architects, and developers. However, up to now, the purpose and means of these EA visualization methods have never been systematically analyzed and discussed, and a generalized EA visualization methodology with the ability to meet different demands is needed. The paper narrows this gap by conducting a systematic literature review on enterprise architecture visualization methodologies. In this study, 112 papers are retrieved by a manual search in 5 academic databases, a systematic literature review on EA visualization is explained to show a systematized category of visualization approaches, and then a general visualization approach is proposed by systematically reviewing the papers. Finally, the paper is concluded by discussing the contributions and limitations of the study.
Goal-oriented NFR (Non-Functional Requirement) assurance approaches were used to qualitatively evaluate software architectures. Assurance cases using quantitative method have not been applied to ...evaluate NFR assurance for software architectures. This paper presents a system architecture evaluation method which is able to conduct quantitative NFR assurance evaluation for system architecture through ArchiMate. The paper also proposes an algorithm to automate the quantitative evaluation process. A questionnaire survey among software engineers and a case study on a vehicular safety monitor system were carried out to verify the necessity of the method. Additionally, we conducted an experimental design with 18 samples divided into 2 groups with the goal of comparing how the independent variables affect the dependent variables. The results of the experiment demonstrate that the proposed method achieves better NFR evaluation effect than the traditional approach. Moreover, compared with the traditional approach, the proposed method shortens the time for NFR evaluation. The proposed method is expected to be used at the early stage of software development projects for system NFR development, such as requirements analysis, system architecture design and system modeling. At present, the method has been applied by software engineers in a practical software project.
Wound healing progresses through three distinct stages: inflammation, proliferation, and remodeling. Immune regulation is a central component throughout, crucial for orchestrating inflammatory ...responses, facilitating tissue repair, and restraining scar tissue formation. Elements such as mitochondria, reactive oxygen species (ROS), macrophages, autophagy, ferroptosis, and cytokines collaboratively shape immune regulation in this healing process. Skin wound dressings, recognized for their ability to augment biomaterials’ immunomodulatory characteristics via antimicrobial, antioxidative, pro- or anti-inflammatory, and tissue-regenerative capacities, have garnered heightened attention. Notwithstanding, a lack of comprehensive research addressing how these dressings attain immunomodulatory properties and the mechanisms thereof persists. Hence, this paper pioneers a systematic review of biomaterials, emphasizing immune regulation and their underlying immunological mechanisms. It begins by highlighting the importance of immune regulation in wound healing and the peculiarities and obstacles faced in skin injury recovery. This segment explores the impact of wound metabolism, infections, systemic illnesses, and local immobilization on the immune response during healing. Subsequently, the review examines a spectrum of biomaterials utilized in skin wound therapy, including hydrogels, aerogels, electrospun nanofiber membranes, collagen scaffolds, microneedles, sponges, and 3D-printed constructs. It elaborates on the immunomodulatory approaches employed by these materials, focusing on mitochondrial and ROS modulation, autophagic processes, ferroptosis, macrophage modulation, and the influence of cytokines on wound healing. Acknowledging the challenge of antibiotic resistance, the paper also summarizes promising plant-based alternatives for biomaterial integration, including curcumin. In its concluding sections, the review charts recent advancements and prospects in biomaterials that accelerate skin wound healing via immune modulation. This includes exploring mitochondrial transplantation materials, biomaterial morphology optimization, metal ion incorporation, electrostimulation-enabled immune response control, and the benefits of composite materials in immune-regulatory wound dressings. The ultimate objective is to establish a theoretical foundation and guide future investigations in the realm of skin wound healing and related materials science disciplines.
A lightweight secure retrieval model applied to intranet Zhi, Qiang; Guo, Chenyang; Zhou, Zhengshu ...
Journal of King Saud University. Computer and information sciences,
March 2023, 2023-03-00, 2023-03-01, Volume:
35, Issue:
3
Journal Article
Peer reviewed
Open access
In universities or enterprises that need to establish an intranet to ensure local data security and privacy, intranet users can store their data on the intranet storage server to realize data backup, ...data confidentiality, dynamic storage space and other services. However, ensuring the integrity and security of data is a concern for most users. Thus, some users encrypt their data and store them in an intranet storage server. In this case, some useful functions (retrieval, sharing, etc.) will be affected. Additionally, increasing users not only pay attention to the security of data but also focus on protecting their data usage habits, such as the protection of retrieval information. To this end, in this study, we propose an intranet service-oriented secure retrieval model by designing a specific indexing method and introducing a semi-trusted server to manage and update the index files, which realizes the protection of retrieval information and the sharing of encrypted data. This model is designed to prevent snooping by intranet server administrators unauthorized users on storing data and retrieving information. In the proposed model, two encryption algorithms the cyphertext policy attribute-based encryption (CP-ABE) and public-key encryption with keyword search (PEKS) algorithms—were used to protect the retrieval information, and the advantages and disadvantages of the two algorithms were discussed. Finally, we performed a complete code implementation of the proposed model. The experimental results show that the proposed model is fast and effective, making it a candidate for use in intranet storage privacy protection. Notably, the proposed retrieval model has been tried by several government-affiliated institutions in Xuzhou city and has received good feedback.
A software requirements specification (SRS) provides a detailed description of the requirements of a software system that is to be developed. The Element Quality Indicator (EQI) is a novel method to ...detect defects and assess the quality of an SRS. It does not hinge on review guidelines and is based on the SRS element questions extraction method (EQEM). In this study, we optimized the EQI and carried out a systematic and comprehensive experiment to validate and evaluate its effectiveness. The controlled experiment, which included 60 software engineering students, found that 100% of the subjects identified defects in the SRS using EQI. Moreover, the results indicated that the average number of defects detected with EQI was greater than that of the classical review technique - perspective-based reading. Furthermore, the controlled experiment demonstrated that EQI provides a comparatively objective and accurate evaluation of the quality of the SRS and markedly diminishes the bias in understanding software requirements due to the ambiguity of natural language.
In software engineering, to ensure reliability between systems, describing both system architecture and assurance arguments between system elements is considered necessary. There are proposals for ...system architecture assurance, but use of these traditional methods often requires development of different diagrams using different editors. Because the visual sense of the traditional methods is inadequate, errors readily occur when manipulating different diagrams. Therefore, it is essential that the assurance of dependability between components and systems is visualized and easy to understand. In this paper, an integrated approach to describe the relationship between system actors and system architecture is proposed, and this approach is clarified using an enterprise architecture modeling language. A case study is carried out and comparison to the traditional approach $d^*$ framework is explained. The comparison results show that the proposed approach is more suitable for ensuring dependability in system architecture.
In software engineering, to ensure reliability between systems, describing both system architecture and assurance arguments between system elements is considered necessary. There are proposals for ...system architecture assurance, but use of these traditional methods often requires development of different diagrams using different editors. Because the visual sense of the traditional methods is inadequate, errors readily occur when manipulating different diagrams. Therefore, it is essential that the assurance of dependability between components and systems is visualized and easy to understand. In this paper, an integrated approach to describe the relationship between system actors and system architecture is proposed, and this approach is clarified using an enterprise architecture modeling language. A case study is carried out and comparison to the traditional approach d* framework is explained. The comparison results show that the proposed approach is more suitable for ensuring dependability in system architecture. KCI Citation Count: 0
The development of a service that integrates multiple systems, platforms, and businesses, such as Mobility as a Service (MaaS), has attracted the attention of engineers and scholars. However, because ...of the complexity of the interactions of its subsystems, it is difficult to ensure the reliability of an integrated service, and the analysis approach of the individual subsystems that influence each other is insufficient. Even though many studies on functional safety for road vehicles have been conducted, there are currently no theoretical or experimental reports on MaaS reliability issues at the service level. To fill the void, we propose in this paper a resilience analysis method to facilitate the development of reliable mobility services. As a result, we proposed a novel MaaS resilience analysis and design method. We contend that a connection with enterprise architecture modeling helps to address resilience concerns for MaaS reliability. The claim is based on the close connection between resilience and reliability. Furthermore, we conduct a controlled experiment to demonstrate the efficacy of the proposed method and compare it quantitatively to a referenced method.
•Defines a Stakeholder Value & Uncertainty Map to classify system functions.•Proposes a novel resilience engineering method.•Suggests a way to conduct resilience modeling, analysis, and design for MaaS.•Presents a use case of reliability development based on IEC 62853 standard.
The representation of pseudo point cloud can significantly improve the precision of 3D object detection. However, existing pseudo point cloud-based methods typically fuse the processed features ...through coarse concatenation, which ignores the consistency between the point cloud and pseudo point cloud features. The inconsistency of features in different modal data can lead to detection bias. In this paper, we propose a novel pseudo point cloud-based network called SGF3D, which utilizes a cross-modal attention module cross-modal attention fusion (CMAF) to fuse point cloud and pseudo point cloud features. It can better learn the cross-modal similarity of output features, enabling the detection box to fit better with the target. We also designed a region of interest (RoI) head similarity attention head (SAH) to utilize the overlooked similarity to optimize training without increasing the complexity of the network. By using CMAF and SAH, the proposed method can obtain more accurate bounding boxes. Extensive experiments on KITTI dataset demonstrate that the proposed method can achieve competitive results. Training code and well trained weights are available at https://github.com/ChunZheng2022/SGF3D.
•Better bounding boxes and higher accuracy.•Enhanced communication between features from different modalities.•Optimize training with auxiliary head without introducing more parameters.