Flow-Based Specification of Time Design Requirements
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 8
Abstract
This paper focuses on design requirements in real-time systems where information is processed to produce a response within a specified time. Nowadays, computer control applications embedded in chips have grown in significance in many aspects of human life. These systems need a high level of reliability to gain the trust of users. Ensuring correctness in the early stages of the design process is especially a major challenge in these systems. Faulty requirements lead to errors in the final product that have to be fixed later, often at a high cost. A crucial step in this process is modeling the intended system. This paper explores the potential of flow-based modeling in expressing design requirements in real-time systems that include time constraints and synchronization. The main emphasized problem is how to represent time. The objective is to assist real-time system requirement engineers, in an early state of the development, to express the timing behavior of the developed system. Several known examples are modeled and the results point to the viability of the flow-based representation in comparison with such time specifications as state-based and line-based modeling.
Authors and Affiliations
Sabah Al-Fedaghi
Matrix Clustering based Migration of System Application to Microservices Architecture
A microservice architecture (MSA) style is an emerging approach which is gaining strength with the passage of time. Micro services are recommended by a number of researchers to overcome the limitations and issues encount...
Improvement of the Vertical Handover Decision and Quality of Service in Heterogeneous Wireless Networks using Software Defined Network
The development of wireless networks brings people great convenience. More state-of-the-art communication protocols of wireless networks are getting mature. People attach more importance to the connections between hetero...
An Improved Malicious Behaviour Detection Via k-Means and Decision Tree
Data Mining algorithm which is applied as an anomaly detection system has been considered as one of the essential techniques in malicious behaviour detection. Unfortunately, such detection system is known for its inclina...
A Hybrid Exam Scheduling Technique based on Graph Coloring and Genetic Algorithms Targeted towards Student Comfort
Scheduling is one of the vital activities needed in various aspects of life. It is also a key factor in generating exam schedules for academic institutions. In this paper we propose an exam scheduling technique that comb...
Allocation of Roadside Units for Certificate Update in Vehicular Ad Hoc Network Environments
The roadside unit (RSU) plays an important role in VANET environments for privacy preservation. In order to conserve the privacy of a vehicle, the issued certificate must be updated frequently via RSUs. If a certificate...