Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests: Computer Science, Computer Architecture, Software Engineering, Object Oriented Programming, Software Architecture, and 15 moreApplications, Safety, UML, Software Metrics, Real Time Systems, Aerospace Industry, Design Methodology, Certification, Unified Modeling Language, Software Systems, Hazards, Hazard Analysis, Object Oriented, Embedded System, and Real Time Embedded System
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests: Electrical Engineering, Computer Science, Environmental Economics, Globalization, Advertising, and 15 moreHospitality Management, Computer Networks, Energy Consumption, Fault Detection, Brand Image, Brand equity, Energy Management, Descriptive Statistics, Brand Awareness, Fault diagnosis, Ansys, Credibility, Energy Accounting, Foreign investments, and Balance of Payments
Research Interests: Engineering, Computer Science, Computer Architecture, Software Maintenance, Maintainability, and 15 moreVerification and Validation, Risk Management, Risk assessment, Reliability Engineering, Risk Analysis, UML, Case Study, Error Correction, Life Cycle, Software Architectures, Unified Modeling Language, Software Systems, Risk Assessment, West Virginia, and Corrective Maintenance
Research Interests: Computer Science, Computer Architecture, Software Engineering, Software Architecture, Space Technology, and 12 moreSoftware Design, Software Quality, Change Impact Analysis, Design Pattern, Quality Attributes, Component Based Software Engineering, Error Propagation, Design Quality, Change Propagation, Application Software, Product Line Engineering, and software metric
Research Interests:
Research Interests:
Research Interests: Computer Science, Computer Architecture, Software Engineering, Software Testing, Software Architecture, and 15 moreRisk Management, Risk assessment, Risk Analysis, Programming, Software Quality, Software Metrics, Defect Detection, Resource Management, Prototypes, Software Systems, Risk Assessment, Software System, Software Development Process, Database, and High risk
Research Interests:
Research Interests:
Research Interests:
Research Interests: Computer Science, Software Engineering, Computational Modeling, Software Development, Software Architecture, and 12 morePerformance Assessment, Stochastic processes, Software Design, Formal Specification, Performance Model, Non Functional Requirement, Real Time, Software Process, Unified Modeling Language, Software Systems, Software Performance, and Application Software
Research Interests:
Research Interests: Computer Science, Software Maintenance, Sensitivity Analysis, Directed graphs, Probability, and 15 moreReliability Engineering, Programming, Rapid Application Development, Software Design, Software Quality, Assembly, Case Study, Probabilistic Model Checking, Reliability Analysis, Reliability Modeling, Directed Graph, Digital System Testing, Dependence Graph, Application Software, and Probabilistic Model
Research Interests:
Research Interests:
Research Interests: Information Systems, Computer Science, Resource Allocation, Markov Processes, Risk Management, and 15 moreRisk assessment, Risk Analysis, Computer Software, Case Study, Early development, Risk factors, Real Time, Development Process, Risk Factors, Risk Assessment, Hazard Analysis, Complex Dynamics, Product Architecture, Markov model, and High risk
Research Interests:
Research Interests:
Several successful experiences have reported on the advantages of using patterns in designing applications. For instance, Srinivasan et. al.[26] discuss their experience in using design patterns to develop highly interactive software... more
Several successful experiences have reported on the advantages of using patterns in designing applications. For instance, Srinivasan et. al.[26] discuss their experience in using design patterns to develop highly interactive software systems for speech recognition. Garlow et. al.[9] describe another experience in applying analysis, architecture, and design patterns to design and implement OO cellular communication software. These experiences, among others, do not follow a systematic method to develop applications using patterns. ...
In our research, we are interested in modeling the radio network part of the GSM system in order to apply in-house developed framework for timing and performance analyses. Our approach in both timing and performance analyses was... more
In our research, we are interested in modeling the radio network part of the GSM system in order to apply in-house developed framework for timing and performance analyses. Our approach in both timing and performance analyses was introduced in former works, and is based on applying the proposed techniques on UML-based simulation models of systems' dynamic specifications. In former work, we introduced an UML Architectural model for the GSM case study. In this paper, we discuss the modeling of a resource ...
A NORMAL ACCIDENT THEORY-BASED COMPLEXITY ASSESSMENT METHODOLOGY FOR SAFETY-RELATED EMBEDDED COMPUTER SYSTEMS By John J. Sammarco PE Dissertation submitted to the College of Engineering and Mineral Resources At West Virginia University in... more
A NORMAL ACCIDENT THEORY-BASED COMPLEXITY ASSESSMENT METHODOLOGY FOR SAFETY-RELATED EMBEDDED COMPUTER SYSTEMS By John J. Sammarco PE Dissertation submitted to the College of Engineering and Mineral Resources At West Virginia University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Engineering Approved by Roy S. Nutter, PhD; Committee Chairperson Hany H. Ammar, PhD Bojan Cukic, PhD Chinnarao Mokkapati, PhD Katerina Goseva–Popstojanova, PhD James T. ...
Research Interests:
Abstract: The demand for educational software is growing exponentially with the surge of interest in educational reform, the Internet and distance education. A Web-based Interactive Course Tool was developed at West Virginia University.... more
Abstract: The demand for educational software is growing exponentially with the surge of interest in educational reform, the Internet and distance education. A Web-based Interactive Course Tool was developed at West Virginia University. The tool provides components for instructors, administrators, and students to interact effectively through the Internet. This paper presents an object-oriented software architecture model of this tool. Keywords: Distant Teaching and virtual classroom, Internet University, Object-Oriented Analysis and Design ...
Research Interests:
As software architecture is becoming an important asset in the development of software systems, the study of quantitative assessment of software architectures is gaining importance due to its role in assessing their quality. Error... more
As software architecture is becoming an important asset in the development of software systems, the study of quantitative assessment of software architectures is gaining importance due to its role in assessing their quality. Error propagation between software system components is a quantitative factor that reflects on the reliability of a software product. We introduce a framework for experimental error propagation analysis. This framework addresses the problem of estimating error propagation at the architecture ...
Research Interests:
Development of software systems utilizes only 20%-40% of the overall project cost; the rest is consumed by maintenance. Systems with poor maintainability are difficult to modify and to maintain. Maintainability-based risk is defined as a... more
Development of software systems utilizes only 20%-40% of the overall project cost; the rest is consumed by maintenance. Systems with poor maintainability are difficult to modify and to maintain. Maintainability-based risk is defined as a product of two factors: the probability of carrying out maintenance tasks and the impact of these tasks. In this paper, we present a methodology for assessing maintainability-based risk in the context of adaptive maintenance. We demonstrate the methodology on a case study using UML models. ...
Research Interests:
Abstract: The International Center of Excellence in Software Engineering (ICESE) is a multifaceted center that aims at establishing active programs in research, outreach, and education. The significance of this center relies on its goal... more
Abstract: The International Center of Excellence in Software Engineering (ICESE) is a multifaceted center that aims at establishing active programs in research, outreach, and education. The significance of this center relies on its goal of bringing together on a tightly coupled fashion, and on a weekly or bi weekly basis through virtual meeting environments, researches from the Arab world and international researchers to work on projects that advance the state of the art in software engineering. The center focuses on applying ...
Research Interests:
Research Interests: Information Systems, Computer Science, Law, Component-Based Software Engineering (CBSE), Software Reliability, and 13 moreReliability Theory, Reliability Engineering, Software Quality, Computer Software, Probabilistic Model Checking, Reliability Analysis, Reliability Modeling, Early Detection, Software Systems, Electrical And Electronic Engineering, Dependence Graph, Commercial Off-The-Shelf, and Probabilistic Model
Research Interests: Information Systems, International Relations, SEO, Failure Analysis, Risk Analysis, and 15 moreUML, Software Design, Computer Software, Case Study, Formal Specification, Interested in Writing Research Papers, Risk factors, Software Fault Tolerance, Unified Modeling Language, Failure probability, Software Systems, Risk Factors, E Commerce, Electronic Commerce, and Software Performance
The study of software architectures is emerging as an important discipline in software engineering, due to its emphasis on large scale composition of software products, and its support for emerging software engineering paradigms such as... more
The study of software architectures is emerging as an important discipline in software engineering, due to its emphasis on large scale composition of software products, and its support for emerging software engineering paradigms such as product line engineering, component based software engineering, and software evolution. Architectural attributes differ from code-level software attributes in that they focus on the level of components and connectors, and that they are meaningful for an architecture. In this ...
Research Interests:
Abstract. Identification of deceased individuals based on dental characteristics is receiving increased attention. Dental radiographic films of an individual are usually composed into a digital image record. In order to achieve high level... more
Abstract. Identification of deceased individuals based on dental characteristics is receiving increased attention. Dental radiographic films of an individual are usually composed into a digital image record. In order to achieve high level of automation in postmortem identification, it is necessary to decompose dental image records into their constituent radiographic films, which are in turn segmented to localize dental regions of interest. In this paper we offer an automatic hierarchical treatment to the problem of cropping dental image records into films. Our approach is heavily based on concepts of mathematical morphology and shape analysis. Among the many challenges we face are non-standard assortments of films into records, variability in record digitization as well as randomness of record background both in intensity and texture. We show by experimental evidence that our approach achieves high accuracy and timeliness. 1
Research Interests:
Abstract Recently, there has been a great demand for distributed medical imaging systems to share information among medical institutions in an interoperable fashion. Connectivity between medical institutions requires sharing complete... more
Abstract Recently, there has been a great demand for distributed medical imaging systems to share information among medical institutions in an interoperable fashion. Connectivity between medical institutions requires sharing complete protocols defined by standards. The “DICOM” standard is evolving to define the communication messages and application services between two medical applications. We specify and design the client and server behaviour of the Upper Layer service of the DICOM standard using an object oriented ...
Research Interests:
Abstract Summary form only given. Risk assessment is an integral part of software risk management. There are several methods for risk assessment during various phases of software development and at different levels of abstraction.... more
Abstract Summary form only given. Risk assessment is an integral part of software risk management. There are several methods for risk assessment during various phases of software development and at different levels of abstraction. However, there are very few techniques available for assessing risk at the requirements level and those that are available are highly subjective and are not based on any formal design models. Such techniques are human-intensive and highly error prone. This paper presents a ...
Research Interests: Computer Science, Software Engineering, Software Development, Risk Management, Risk assessment, and 14 moreRisk Analysis, Programming, UML, Case Study, Levels of Abstraction, Early development, Software Requirements, Risk factors, Unified Modeling Language, Software Systems, Risk Factors, Risk Assessment, Failure Mode, and Design Model
This paper addresses the problem of testing an automated fingerprint comparison system. In this research, a web-based test bed is developed to assist the experiments in Fingerprint Image Comparison (FIC). The FIC function, which supports... more
This paper addresses the problem of testing an automated fingerprint comparison system. In this research, a web-based test bed is developed to assist the experiments in Fingerprint Image Comparison (FIC). The FIC function, which supports the comparison between submitted fingerprints and candidate fingerprint, is one of the specified functions of the US Federal Bureau of Investigation (FBI) Integrated Automated Fingerprint Identification System (IAFIS). The FIC test bed provides an integrated environment to simplify the testing process and collects information from test results. A 3-tiered architecture is used in the test bed design, which is composed of test bed client, test bed server and fingerprint image database. These components can be distributed on the network and run on different platforms. Because the test bed client is designed as a Java Applet, the FIC experiment can be conducted in a Java-enabled Internet web browser. In this environment, a powerful computer can be emplo...
Research Interests:
Abstract Fuzzy marking Petri Nets (FMPNs) were presented by the authors (1995) as an extension of Petri Nets in which markings are imprecise numbers represented by membership functions. In this paper, two analysis algorithms for the... more
Abstract Fuzzy marking Petri Nets (FMPNs) were presented by the authors (1995) as an extension of Petri Nets in which markings are imprecise numbers represented by membership functions. In this paper, two analysis algorithms for the reachability analysis of FMPNs are presented and compared. A simple example of a FMPN is analyzed using the two algorithms
Research Interests:
to SA/RT by means of High-Level timed Petri Nets " , The international journal of time critical computing systems, [20] Department of Defense (DoD): Procedures of performing a failure mode, effects and criticality analysis. DoD,... more
to SA/RT by means of High-Level timed Petri Nets " , The international journal of time critical computing systems, [20] Department of Defense (DoD): Procedures of performing a failure mode, effects and criticality analysis. DoD, MIL_-STD_1629A.
Global System for Mobile communication (GSM) is a widely accepted standard for digital cellular communication. It has become the mobile communication standard in more than 160 countries all over the globe. In this paper, we are interested... more
Global System for Mobile communication (GSM) is a widely accepted standard for digital cellular communication. It has become the mobile communication standard in more than 160 countries all over the globe. In this paper, we are interested in modeling the radio network part of a GSM system, in particular the Mobile Station (MS), using a UML-based notation. Our long-term research goal is to investigate issues related to timing and performance of the model in several operational scenarios. Our approach in both timing and performance analysis was introduced in former works, and was based on applying the proposed techniques on UML-based simulation models of systems' dynamic specifications. In this paper we propose a high-level architecture for the simulation model of the GSM Radio Subsystem, focusing on the Mobile Station. The paper discusses the main challenges faced in modeling this type of systems, in order to reach an adequate level of abstraction catering to the research objecti...
Risk assessment is an essential process in managing software development. Performing risk assessment in the early development phases enhances the resource allocation decisions. Several methodologies for risk assessment were developed,... more
Risk assessment is an essential process in managing software development. Performing risk assessment in the early development phases enhances the resource allocation decisions. Several methodologies for risk assessment were developed, mostly based on subjective judgment. In this paper we use the Unified Modeling language (UML), and a dynamic metrics based methodology developed in earlier work. We use commercial tools such as Rose RealTime modeling and simulation environment to obtain simulation statistics for which an automated architectural-risk assessment environment can be developed. We use Microsoft Excel sheets and Macros in the development of this environment. The dynamic metrics based methodology is a heuristic risk assessment methodology that is based on dynamic complexity factors and severity analysis. Model execution is used for obtaining dynamic complexity and dynamic coupling measures for all architecture elements. Severity analysis is performed using Failure Mode and Ef...
Research Interests:
Cloud computing is getting popular and IT giants ha ve started evolving toward networks and different cloud services that serve different organizations. Software as a service (SaaS) is the most mature cat egory of cloud service [11],... more
Cloud computing is getting popular and IT giants ha ve started evolving toward networks and different cloud services that serve different organizations. Software as a service (SaaS) is the most mature cat egory of cloud service [11], since it evolved from the ap plication-service-provider model of software hostin g. As our use of SaaS increases future solutions will lik ely require more frequent data exchange with lower tolerance for failure. We also look to improve scal ability and modifiability, which currently require a great deal of work. These requirements led us to develop a SaaS architecture that will help us shift to a mo re strategic view of SaaS and enable faster, more stan dardized implementations. Using the SaaS architecture, we can build the cloud application independent of a ny platform. The architecture must be both prescrip tive and descriptive. In this paper we present a simple architecture style for cloud computing applications that enhance certain quality attribut...