Skip to main content
Several successful experiences have reported on the advantages of using patterns in designing applications. For instance, Srinivasan et. al.[26] discuss their experience in using design patterns to develop highly interactive software... more
Several successful experiences have reported on the advantages of using patterns in designing applications. For instance, Srinivasan et. al.[26] discuss their experience in using design patterns to develop highly interactive software systems for speech recognition. Garlow et. al.[9] describe another experience in applying analysis, architecture, and design patterns to design and implement OO cellular communication software. These experiences, among others, do not follow a systematic method to develop applications using patterns. ...
In our research, we are interested in modeling the radio network part of the GSM system in order to apply in-house developed framework for timing and performance analyses. Our approach in both timing and performance analyses was... more
In our research, we are interested in modeling the radio network part of the GSM system in order to apply in-house developed framework for timing and performance analyses. Our approach in both timing and performance analyses was introduced in former works, and is based on applying the proposed techniques on UML-based simulation models of systems' dynamic specifications. In former work, we introduced an UML Architectural model for the GSM case study. In this paper, we discuss the modeling of a resource ...
A NORMAL ACCIDENT THEORY-BASED COMPLEXITY ASSESSMENT METHODOLOGY FOR SAFETY-RELATED EMBEDDED COMPUTER SYSTEMS By John J. Sammarco PE Dissertation submitted to the College of Engineering and Mineral Resources At West Virginia University in... more
A NORMAL ACCIDENT THEORY-BASED COMPLEXITY ASSESSMENT METHODOLOGY FOR SAFETY-RELATED EMBEDDED COMPUTER SYSTEMS By John J. Sammarco PE Dissertation submitted to the College of Engineering and Mineral Resources At West Virginia University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Engineering Approved by Roy S. Nutter, PhD; Committee Chairperson Hany H. Ammar, PhD Bojan Cukic, PhD Chinnarao Mokkapati, PhD Katerina Goseva–Popstojanova, PhD James T. ...
Research Interests:
Abstract: The demand for educational software is growing exponentially with the surge of interest in educational reform, the Internet and distance education. A Web-based Interactive Course Tool was developed at West Virginia University.... more
Abstract: The demand for educational software is growing exponentially with the surge of interest in educational reform, the Internet and distance education. A Web-based Interactive Course Tool was developed at West Virginia University. The tool provides components for instructors, administrators, and students to interact effectively through the Internet. This paper presents an object-oriented software architecture model of this tool. Keywords: Distant Teaching and virtual classroom, Internet University, Object-Oriented Analysis and Design ...
As software architecture is becoming an important asset in the development of software systems, the study of quantitative assessment of software architectures is gaining importance due to its role in assessing their quality. Error... more
As software architecture is becoming an important asset in the development of software systems, the study of quantitative assessment of software architectures is gaining importance due to its role in assessing their quality. Error propagation between software system components is a quantitative factor that reflects on the reliability of a software product. We introduce a framework for experimental error propagation analysis. This framework addresses the problem of estimating error propagation at the architecture ...
Development of software systems utilizes only 20%-40% of the overall project cost; the rest is consumed by maintenance. Systems with poor maintainability are difficult to modify and to maintain. Maintainability-based risk is defined as a... more
Development of software systems utilizes only 20%-40% of the overall project cost; the rest is consumed by maintenance. Systems with poor maintainability are difficult to modify and to maintain. Maintainability-based risk is defined as a product of two factors: the probability of carrying out maintenance tasks and the impact of these tasks. In this paper, we present a methodology for assessing maintainability-based risk in the context of adaptive maintenance. We demonstrate the methodology on a case study using UML models. ...
Abstract: The International Center of Excellence in Software Engineering (ICESE) is a multifaceted center that aims at establishing active programs in research, outreach, and education. The significance of this center relies on its goal... more
Abstract: The International Center of Excellence in Software Engineering (ICESE) is a multifaceted center that aims at establishing active programs in research, outreach, and education. The significance of this center relies on its goal of bringing together on a tightly coupled fashion, and on a weekly or bi weekly basis through virtual meeting environments, researches from the Arab world and international researchers to work on projects that advance the state of the art in software engineering. The center focuses on applying ...
The study of software architectures is emerging as an important discipline in software engineering, due to its emphasis on large scale composition of software products, and its support for emerging software engineering paradigms such as... more
The study of software architectures is emerging as an important discipline in software engineering, due to its emphasis on large scale composition of software products, and its support for emerging software engineering paradigms such as product line engineering, component based software engineering, and software evolution. Architectural attributes differ from code-level software attributes in that they focus on the level of components and connectors, and that they are meaningful for an architecture. In this ...
Abstract. Identification of deceased individuals based on dental characteristics is receiving increased attention. Dental radiographic films of an individual are usually composed into a digital image record. In order to achieve high level... more
Abstract. Identification of deceased individuals based on dental characteristics is receiving increased attention. Dental radiographic films of an individual are usually composed into a digital image record. In order to achieve high level of automation in postmortem identification, it is necessary to decompose dental image records into their constituent radiographic films, which are in turn segmented to localize dental regions of interest. In this paper we offer an automatic hierarchical treatment to the problem of cropping dental image records into films. Our approach is heavily based on concepts of mathematical morphology and shape analysis. Among the many challenges we face are non-standard assortments of films into records, variability in record digitization as well as randomness of record background both in intensity and texture. We show by experimental evidence that our approach achieves high accuracy and timeliness. 1
Abstract Recently, there has been a great demand for distributed medical imaging systems to share information among medical institutions in an interoperable fashion. Connectivity between medical institutions requires sharing complete... more
Abstract Recently, there has been a great demand for distributed medical imaging systems to share information among medical institutions in an interoperable fashion. Connectivity between medical institutions requires sharing complete protocols defined by standards. The “DICOM” standard is evolving to define the communication messages and application services between two medical applications. We specify and design the client and server behaviour of the Upper Layer service of the DICOM standard using an object oriented ...
Abstract Summary form only given. Risk assessment is an integral part of software risk management. There are several methods for risk assessment during various phases of software development and at different levels of abstraction.... more
Abstract Summary form only given. Risk assessment is an integral part of software risk management. There are several methods for risk assessment during various phases of software development and at different levels of abstraction. However, there are very few techniques available for assessing risk at the requirements level and those that are available are highly subjective and are not based on any formal design models. Such techniques are human-intensive and highly error prone. This paper presents a ...
This paper addresses the problem of testing an automated fingerprint comparison system. In this research, a web-based test bed is developed to assist the experiments in Fingerprint Image Comparison (FIC). The FIC function, which supports... more
This paper addresses the problem of testing an automated fingerprint comparison system. In this research, a web-based test bed is developed to assist the experiments in Fingerprint Image Comparison (FIC). The FIC function, which supports the comparison between submitted fingerprints and candidate fingerprint, is one of the specified functions of the US Federal Bureau of Investigation (FBI) Integrated Automated Fingerprint Identification System (IAFIS). The FIC test bed provides an integrated environment to simplify the testing process and collects information from test results. A 3-tiered architecture is used in the test bed design, which is composed of test bed client, test bed server and fingerprint image database. These components can be distributed on the network and run on different platforms. Because the test bed client is designed as a Java Applet, the FIC experiment can be conducted in a Java-enabled Internet web browser. In this environment, a powerful computer can be emplo...
Research Interests:
Abstract Fuzzy marking Petri Nets (FMPNs) were presented by the authors (1995) as an extension of Petri Nets in which markings are imprecise numbers represented by membership functions. In this paper, two analysis algorithms for the... more
Abstract Fuzzy marking Petri Nets (FMPNs) were presented by the authors (1995) as an extension of Petri Nets in which markings are imprecise numbers represented by membership functions. In this paper, two analysis algorithms for the reachability analysis of FMPNs are presented and compared. A simple example of a FMPN is analyzed using the two algorithms
to SA/RT by means of High-Level timed Petri Nets " , The international journal of time critical computing systems, [20] Department of Defense (DoD): Procedures of performing a failure mode, effects and criticality analysis. DoD,... more
to SA/RT by means of High-Level timed Petri Nets " , The international journal of time critical computing systems, [20] Department of Defense (DoD): Procedures of performing a failure mode, effects and criticality analysis. DoD, MIL_-STD_1629A.
Global System for Mobile communication (GSM) is a widely accepted standard for digital cellular communication. It has become the mobile communication standard in more than 160 countries all over the globe. In this paper, we are interested... more
Global System for Mobile communication (GSM) is a widely accepted standard for digital cellular communication. It has become the mobile communication standard in more than 160 countries all over the globe. In this paper, we are interested in modeling the radio network part of a GSM system, in particular the Mobile Station (MS), using a UML-based notation. Our long-term research goal is to investigate issues related to timing and performance of the model in several operational scenarios. Our approach in both timing and performance analysis was introduced in former works, and was based on applying the proposed techniques on UML-based simulation models of systems' dynamic specifications. In this paper we propose a high-level architecture for the simulation model of the GSM Radio Subsystem, focusing on the Mobile Station. The paper discusses the main challenges faced in modeling this type of systems, in order to reach an adequate level of abstraction catering to the research objecti...
Risk assessment is an essential process in managing software development. Performing risk assessment in the early development phases enhances the resource allocation decisions. Several methodologies for risk assessment were developed,... more
Risk assessment is an essential process in managing software development. Performing risk assessment in the early development phases enhances the resource allocation decisions. Several methodologies for risk assessment were developed, mostly based on subjective judgment. In this paper we use the Unified Modeling language (UML), and a dynamic metrics based methodology developed in earlier work. We use commercial tools such as Rose RealTime modeling and simulation environment to obtain simulation statistics for which an automated architectural-risk assessment environment can be developed. We use Microsoft Excel sheets and Macros in the development of this environment. The dynamic metrics based methodology is a heuristic risk assessment methodology that is based on dynamic complexity factors and severity analysis. Model execution is used for obtaining dynamic complexity and dynamic coupling measures for all architecture elements. Severity analysis is performed using Failure Mode and Ef...
Cloud computing is getting popular and IT giants ha ve started evolving toward networks and different cloud services that serve different organizations. Software as a service (SaaS) is the most mature cat egory of cloud service [11],... more
Cloud computing is getting popular and IT giants ha ve started evolving toward networks and different cloud services that serve different organizations. Software as a service (SaaS) is the most mature cat egory of cloud service [11], since it evolved from the ap plication-service-provider model of software hostin g. As our use of SaaS increases future solutions will lik ely require more frequent data exchange with lower tolerance for failure. We also look to improve scal ability and modifiability, which currently require a great deal of work. These requirements led us to develop a SaaS architecture that will help us shift to a mo re strategic view of SaaS and enable faster, more stan dardized implementations. Using the SaaS architecture, we can build the cloud application independent of a ny platform. The architecture must be both prescrip tive and descriptive. In this paper we present a simple architecture style for cloud computing applications that enhance certain quality attribut...

And 193 more