IET Software最新文献

筛选
英文 中文
Challenges and Solutions for Engineering Applications on Smartphones 智能手机工程应用的挑战与解决方案
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-08-18 DOI: 10.3390/software2030017
Anthony Khoury, Mohamad Abbas Kaddaha, Maya Saade, R. Younes, Rachid Outbib, Pascal Lafon
{"title":"Challenges and Solutions for Engineering Applications on Smartphones","authors":"Anthony Khoury, Mohamad Abbas Kaddaha, Maya Saade, R. Younes, Rachid Outbib, Pascal Lafon","doi":"10.3390/software2030017","DOIUrl":"https://doi.org/10.3390/software2030017","url":null,"abstract":"This paper starts by presenting the concept of a mobile application. A literature review is conducted, which shows that there is still a certain lack with regard to smartphone applications in the domain of engineering as independent simulation applications and not only as extensions of smartphone tools. The challenges behind this lack are then discussed. Subsequently, three case studies of engineering applications for both smartphones and the internet are presented, alongside their solutions to the challenges presented. The first case study concerns an engineering application for systems control. The second case study focuses on an engineering application for composite materials. The third case study focuses on the finite element method and structure generation. The solutions to the presented challenges are then described through their implementation in the applications. The three case studies show a new system of thought concerning the development of engineering smartphone applications.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"122 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88257718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Synthesis-Based Stateful Approach for Guiding Design Thinking in Embedded System Development 嵌入式系统开发中一种基于综合的有状态方法指导设计思维
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-08-12 DOI: 10.3390/software2030016
Hung-Fu Chang, S. K. Mobasser
{"title":"A Synthesis-Based Stateful Approach for Guiding Design Thinking in Embedded System Development","authors":"Hung-Fu Chang, S. K. Mobasser","doi":"10.3390/software2030016","DOIUrl":"https://doi.org/10.3390/software2030016","url":null,"abstract":"Embedded systems have attracted more attention and have become more critical due to the recent computer technology advancements and applications in various areas, such as healthcare, transportation, and manufacturing. Traditional software design approaches and the finite state machine cannot provide sufficient support due to two major reasons: the increasing need for more functions in designing an embedded system and sequential controls in the implementation. This deficiency particularly discourages inexperienced engineers who use conventional methods to design embedded software. Hence, we proposed a design method, the Synthesis-Based Stateful Software Design Approach (SSSDA), which synthesizes two existing methods, the Synthesis-Based Software Design Framework (SSDF) and Process and Artifact State Transition Abstraction (PASTA), to remedy the drawback of conventional methods. To show how to conduct our proposed design approach and investigate how it supports embedded system design, we studied an industrial project developed by a sophomore student team. Our results showed that our proposed approach could significantly help students lay out modules, improve testability, and reduce defects.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"53 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83720268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Test-driven development, engagement in activity, and maintainability: An empirical study 测试驱动的开发、活动参与和可维护性:一项实证研究
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-07-27 DOI: 10.1049/sfw2.12135
Wei Ren, Stephen Barrett
{"title":"Test-driven development, engagement in activity, and maintainability: An empirical study","authors":"Wei Ren,&nbsp;Stephen Barrett","doi":"10.1049/sfw2.12135","DOIUrl":"https://doi.org/10.1049/sfw2.12135","url":null,"abstract":"<p>The software engineering community aims to achieve and maintain high-efficient software engineering practical activities. One of the techniques used for this purpose is Test-Driven Development (TDD), which is a cyclic and test-centered development method positively related to maintainability, which may vary depending on the context and application. Previous research has indicated that TDD's benefits on maintainability may be due to the improved focus on coding and testing activities. However, limited research has investigated the role of engagement in software quality. Therefore, this study investigates the relationship between TDD methods, engagement level in development activities, and maintainability. The primary research questions addressed in this study are does following TDD methods improve the engagement level in development activities? And does a higher engagement level leads to better maintainability? The study employs a statistical analysis technique, regression analysis to explore the research questions. The results show that TDD behaviours improve the engagement level, and engaging in development activities has a significant positive impact on maintainability. Additionally, the study finds that the positive impact of focussing on testing, such as writing more test cases, is more pronounced compared to coding activities. Our study adds to current software engineering literature that not only personal expertise but the engagement level in the development process are associated with software quality and calls for the emphasis on developer's engagement.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"509-525"},"PeriodicalIF":1.6,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50145743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Measured Agile Software Development Metrics Using an Agile Model-Based Software Engineering Approach versus Scrum Only 比较使用基于敏捷模型的软件工程方法与仅使用Scrum的度量敏捷软件开发指标
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-07-26 DOI: 10.3390/software2030015
Moe Huss, Daniel R. Herber, J. Borky
{"title":"Comparing Measured Agile Software Development Metrics Using an Agile Model-Based Software Engineering Approach versus Scrum Only","authors":"Moe Huss, Daniel R. Herber, J. Borky","doi":"10.3390/software2030015","DOIUrl":"https://doi.org/10.3390/software2030015","url":null,"abstract":"This study compares the reliability of estimation, productivity, and defect rate metrics for sprints driven by a specific instance of the agile approach (i.e., scrum) and an agile model-Bbased software engineering (MBSE) approach called the integrated Scrum Model-Based System Architecture Process (sMBSAP) when developing a software system. The quasi-experimental study conducted ten sprints using each approach. The approaches were then evaluated based on their effectiveness in helping the product development team estimate the backlog items that they could build during a time-boxed sprint and deliver more product backlog items (PBI) with fewer defects. The commitment reliability (CR) was calculated to compare the reliability of estimation with a measured average scrum-driven value of 0.81 versus a statistically different average sMBSAP-driven value of 0.94. Similarly, the average sprint velocity (SV) for the scrum-driven sprints was 26.8 versus 31.8 for the MBSAP-driven sprints. The average defect density (DD) for the scrum-driven sprints was 0.91, while that of the sMBSAP-driven sprints was 0.63. The average defect leakage (DL) for the scrum-driven sprints was 0.20, while that of the sMBSAP-driven sprints was 0.15. The t-test analysis concluded that the sMBSAP-driven sprints were associated with a statistically significant larger mean CR, SV, DD, and DL than that of the scrum-driven sprints. The overall results demonstrate formal quantitative benefits of an agile MBSE approach compared to an agile alone, thereby strengthening the case for considering agile MBSE methods within the software development community. Future work might include comparing agile and agile MBSE methods using alternative research designs and further software development objectives, techniques, and metrics.","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"43 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78344153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisit security in the era of DevOps: An evidence-based inquiry into DevSecOps industry 重温DevOps时代的安全:基于证据的DevSecOps行业调查
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-07-26 DOI: 10.1049/sfw2.12132
Xin Zhou, Runfeng Mao, He Zhang, Qiming Dai, Huang Huang, Haifeng Shen, Jingyue Li, Guoping Rong
{"title":"Revisit security in the era of DevOps: An evidence-based inquiry into DevSecOps industry","authors":"Xin Zhou,&nbsp;Runfeng Mao,&nbsp;He Zhang,&nbsp;Qiming Dai,&nbsp;Huang Huang,&nbsp;Haifeng Shen,&nbsp;Jingyue Li,&nbsp;Guoping Rong","doi":"10.1049/sfw2.12132","DOIUrl":"https://doi.org/10.1049/sfw2.12132","url":null,"abstract":"<p>By adopting agile and lean practices, DevOps aims to achieve rapid value delivery by speeding up development and deployment cycles, which however lead to more security concerns that cannot be fully addressed by an isolated security role only in the final stage of development. <i>DevSecOps</i> promotes security as a shared responsibility integrated into the DevOps process that seamlessly intertwines development, operations, and security from the start throughout to the end of cycles. While some companies have already begun to embrace this new strategy, both industry and academia are still seeking a common understanding of the DevSecOps movement. The goal of this study is to report the state-of-the-practice of DevSecOps, including the impact of DevOps on security, practitioners' understanding of DevSecOps, and the practices associated with DevSecOps as well as the challenges of implementing DevSecOps. The authors used a mixed-methods approach for this research. The authors carried out a grey literature review on DevSecOps, and surveyed the practitioners of DevSecOps in industry of China. The status quo of DevSecOps in industry is summarized. Three major software security risks are identified with DevOps, where the establishment of DevOps pipeline provides opportunities for security-related activities. The authors classify the interpretations of DevSecOps into three core aspects of DevSecOps capabilities, cultural enablers, and technological enablers. To materialise the interpretations into daily software production activities, the recommended DevSecOps practices from three perspectives—people, process, and technology. Although a preliminary consensus is that DevSecOps is regarded as an extension of DevOps, there is a debate on whether DevSecOps is a superfluous term. While DevSecOps is attracting an increasing attention by industry, it is still in its infancy and more effort needs to be invested to promote it in both research and industry communities.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"435-454"},"PeriodicalIF":1.6,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50144606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest Editorial: Machine learning applied to quality and security in software systems 嘉宾评论:机器学习应用于软件系统的质量和安全
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-07-25 DOI: 10.1049/sfw2.12141
Honghao Gao, Walayat Hussain, Ramón J. Durán Barroso, Junaid Arshad, Yuyu Yin
{"title":"Guest Editorial: Machine learning applied to quality and security in software systems","authors":"Honghao Gao,&nbsp;Walayat Hussain,&nbsp;Ramón J. Durán Barroso,&nbsp;Junaid Arshad,&nbsp;Yuyu Yin","doi":"10.1049/sfw2.12141","DOIUrl":"10.1049/sfw2.12141","url":null,"abstract":"&lt;p&gt;During the development of software systems, even with advanced planning, problems with quality and security occur. These defects may result in threats to program development and maintenance. Therefore, to control and minimise these defects, machine learning can be used to improve the quality and security of software systems. This special issue focuses on recent advances in architecture, algorithms, optimisation, and models for machine learning applied to quality and security in software systems. After a rigorous review according to relevance, originality, technical novelties, and presentation quality, we selected 4 manuscripts. A summary of these accepted papers is outlined below.&lt;/p&gt;&lt;p&gt;In the first paper entitled “Robust Malware Identification via Deep Temporal Convolutional Network with Symmetric Cross Entropy Learning” by Sun et al., the authors propose a robust Malware identification method using the temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface (API) function names in many cases. Here, considering the numerous unlabelled samples in practical intelligent environments, the authors pre-train the TCN model on an unlabelled set using a word embedding method, that is, &lt;i&gt;word&lt;/i&gt;2&lt;i&gt;vec&lt;/i&gt;. In the experiments, the proposed method is compared to several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real-world dataset. The performance comparisons demonstrate the better performance and noise robustness of the proposed method, that the proposed method can yield the best identification accuracy of 98.75% in real-world scenarios.&lt;/p&gt;&lt;p&gt;In the second paper entitled “Just-In-Time Defect Prediction Enhanced by the Joint Method of Line Label Fusion and File Filtering” by Zhang et al., the authors propose a Just-in-Time defect prediction model enhanced by the joint method of line label Fusion and file Filtering (JIT-FF). First, to distinguish added and removed lines while preserving the original software changes information, the authors represent the code changes as original, added, and removed codes according to line labels. Second, to obtain semantics-enhanced code representation, the authors propose a cross-attention-based line label fusion method to perform complementary feature enhancement. Third, to generate code changes containing fewer defect-irrelevant files, the authors formalise the file filtering as a sequential decision problem and propose a reinforcement learning-based file filtering method. Finally, based on generated code changes, CodeBERT-based commit representation and multi-layer perceptron-based defect prediction are performed to identify the defective software changes. The experiments demonstrate that JIT-FF predicts defective software changes more effectively.&lt;/p&gt;&lt;p&gt;In the third paper entitled “Android Malwar","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"345-347"},"PeriodicalIF":1.6,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12141","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44482903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structuring meaningful bug-fixing patches to fix software defect 构建有意义的bug修复补丁来修复软件缺陷
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-07-12 DOI: 10.1049/sfw2.12140
Hui Li, Yong Liu, Xuexin Qi, Xi Yu, Shikai Guo
{"title":"Structuring meaningful bug-fixing patches to fix software defect","authors":"Hui Li,&nbsp;Yong Liu,&nbsp;Xuexin Qi,&nbsp;Xi Yu,&nbsp;Shikai Guo","doi":"10.1049/sfw2.12140","DOIUrl":"https://doi.org/10.1049/sfw2.12140","url":null,"abstract":"<p>Currently, software projects require a significant amount of time, effort and other resources to be invested in software testing to reduce the number of code defects. However, this process decreases the efficiency of software development and leads to a significant waste of workforce and resources. To address this challenge, researchers developed various solutions utilising deep neural networks. However, these solutions are frequently challenged by issues, such as a vast vocabulary, network training difficulties and elongated training processes resulting from the handling of redundant information. To overcome these limitations, the authors proposed a new neural network-based model named HopFix, designed to detect software defects that may be introduced during the coding process. HopFix consists of four parts: data preprocessing, encoder, decoder and code generation components, which were used for preprocessing data, extracting information about software defects, analysing defect information, generating software patches and controlling the generation process of software patches, respectively. Experimental studies on Bug-Fix Pairs (BFP) show that HopFix correctly fixed 47.2% (<i>BFP</i><sub><i>small</i></sub> datasets) and 25.7% (<i>BFP</i><sub><i>medium</i></sub> datasets) of software defects.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"566-581"},"PeriodicalIF":1.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A memetic algorithm for high-strength covering array generation 高强度覆盖阵列生成的模因算法
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-07-12 DOI: 10.1049/sfw2.12138
Xu Guo, Xiaoyu Song, Jian-tao Zhou, Feiyu Wang, Kecheng Tang, Zhuowei Wang
{"title":"A memetic algorithm for high-strength covering array generation","authors":"Xu Guo,&nbsp;Xiaoyu Song,&nbsp;Jian-tao Zhou,&nbsp;Feiyu Wang,&nbsp;Kecheng Tang,&nbsp;Zhuowei Wang","doi":"10.1049/sfw2.12138","DOIUrl":"https://doi.org/10.1049/sfw2.12138","url":null,"abstract":"<p>Covering array generation (CAG) is the key research problem in combinatorial testing and is an NP-complete problem. With the increasing complexity of software under test and the need for higher interaction covering strength <i>t</i>, the techniques for constructing high-strength covering arrays are expected. This paper presents a hybrid heuristic memetic algorithm named QSSMA for high-strength CAG problem. The sub-optimal solution acceptance rate is introduced to generate multiple test cases after each iteration to improve the efficiency of constructing high-covering strength test suites. The QSSMA method could successfully build high-strength test suites for some instances where <i>t</i> up to 15 within one day cutoff time and report five new best test suite size records. Extensive experiments demonstrate that QSSMA is a competitive method compared to state-of-the-art methods.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"538-553"},"PeriodicalIF":1.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12138","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gravitational search algorithm-extreme learning machine for COVID-19 active cases forecasting 新冠肺炎活跃病例预测的引力搜索算法极限学习机
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-07-11 DOI: 10.1049/sfw2.12139
Boyu Huang, Youyi Song, Zhihan Cui, Haowen Dou, Dazhi Jiang, Teng Zhou, Jing Qin
{"title":"Gravitational search algorithm-extreme learning machine for COVID-19 active cases forecasting","authors":"Boyu Huang,&nbsp;Youyi Song,&nbsp;Zhihan Cui,&nbsp;Haowen Dou,&nbsp;Dazhi Jiang,&nbsp;Teng Zhou,&nbsp;Jing Qin","doi":"10.1049/sfw2.12139","DOIUrl":"https://doi.org/10.1049/sfw2.12139","url":null,"abstract":"<p>Corona Virus disease 2019 (COVID-19) has shattered people's daily lives and is spreading rapidly across the globe. Existing non-pharmaceutical intervention solutions often require timely and precise selection of small areas of people for containment or even isolation. Although such containment has been successful in stopping or mitigating the spread of COVID-19 in some countries, it has been criticized as inefficient or ineffective, because of the time-delayed and sophisticated nature of the statistics on determining cases. To address these concerns, we propose a GSA-ELM model based on a gravitational search algorithm to forecast the global number of active cases of COVID-19. The model employs the gravitational search algorithm, which utilises the gravitational law between two particles to guide the motion of each particle to optimise the search for the global optimal solution, and utilises an extreme learning machine to address the effects of nonlinearity in the number of active cases. Extensive experiments are conducted on the statistical COVID-19 dataset from Johns Hopkins University, the MAPE of the authors’ model is 7.79%, which corroborates the superiority of the model to state-of-the-art methods.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"554-565"},"PeriodicalIF":1.6,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12139","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50128533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A case study of environmental considerations and opportunities in cyber physical systems 网络物理系统中环境因素和机遇的案例研究
IF 1.6 4区 计算机科学
IET Software Pub Date : 2023-07-08 DOI: 10.1049/sfw2.12130
Mario Cortes-Cornax, Paula Lago, Claudia Roncancio
{"title":"A case study of environmental considerations and opportunities in cyber physical systems","authors":"Mario Cortes-Cornax,&nbsp;Paula Lago,&nbsp;Claudia Roncancio","doi":"10.1049/sfw2.12130","DOIUrl":"https://doi.org/10.1049/sfw2.12130","url":null,"abstract":"<p>Cyber Physical Systems (CPS) are becoming more ubiquitous, complex and powerful as well as more and more present in our daily life. The inherent benefit and comfort come with an environmental impact at every step of their life-cycle. This impact is significant and unfortunately often ignored today. As cyber-physical systems tend to be ‘invisible’, there is a need for awareness of the underlying infrastructure and required resources, early in the design phases. In this article, the environmental impact considerations in the early stages of the implementation and opportunities to improve design choices with a people-planet-system perspective are discussed. The authors discuss the aspects related to system configuration, data management and the overall goal and functionalities supported by the CPS. Through a specific smart home case, the potential of considering life-cycle assessment of both the devices and data management is illustrated. By explicitly considering different configurations, it will be possible to analyse the environmental impacts of the design decisions. Our research in progress targets a design approach to converge into an equilibrium between utility, performance, and minor environmental impact of smart systems.</p>","PeriodicalId":50378,"journal":{"name":"IET Software","volume":"17 4","pages":"424-434"},"PeriodicalIF":1.6,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/sfw2.12130","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50125208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信