6 resultados para Code Quality
em Queensland University of Technology - ePrints Archive
Resumo:
Background: The systematic collection of high-quality mortality data is a prerequisite in designing relevant drowning prevention programmes. This descriptive study aimed to assess the quality (i.e., level of specificity) of cause-of-death reporting using ICD-10 drowning codes across 69 countries.---------- Methods: World Health Organization (WHO) mortality data were extracted for analysis. The proportion of unintentional drowning deaths coded as unspecified at the 3-character level (ICD-10 code W74) and for which the place of occurrence was unspecified at the 4th character (.9) were calculated for each country as indicators of the quality of cause-of-death reporting.---------- Results: In 32 of the 69 countries studied, the percentage of cases of unintentional drowning coded as unspecified at the 3-character level exceeded 50%, and in 19 countries, this percentage exceeded 80%; in contrast, the percentage was lower than 10% in only 10 countries. In 21 of the 56 countries that report 4-character codes, the percentage of unintentional drowning deaths for which the place of occurrence was unspecified at the 4th character exceeded 50%, and in 15 countries, exceeded 90%; in only 14 countries was this percentage lower than 10%.---------- Conclusion: Despite the introduction of more specific subcategories for drowning in the ICD-10, many countries were found to be failing to report sufficiently specific codes in drowning mortality data submitted to the WHO.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.
Resumo:
The QUT Homestay Program is an essential part of the university’s commitment to meet the accommodation needs of international students. Despite the importance of this style of accommodation, there is very little research addressing issues related to homestay arrangements. The program at Queensland University of Technology (QUT) was evaluated in 2002 to develop a continuous improvement framework to ensure provision of quality homestay services to international students. This paper presents an overview of the evaluation and key lessons learnt in providing quality homestay services to international students. It will cover social and cross-cultural issues faced by providers and international students in the homestay environment, the homestay support needs, program information, policies, procedures and code of practice governing the program.
Resumo:
The first version of the Standard PREanalytical Code (SPREC) was developed in 2009 by the International Society for Biological and Environmental Repositories (ISBER) Biospecimen Science Working Group to facilitate documentation and communication of the most important preanalytical quality parameters of different types of biospecimens used for research. This same Working Group has now updated the SPREC to version 2.0, presented here, so that it contains more options to allow for recent technological developments. Existing elements have been fine tuned. An interface to the Biospecimen Reporting for Improved Study Quality (BRISQ) has been defined, and informatics solutions for SPREC implementation have been developed. A glossary with SPRECrelated definitions has also been added.
Resumo:
Introduction This study aimed to examine the geometric and dosimetric results when radiotherapy treatment plans are designed for prostate cancer patients with hip prostheses. Methods Ten EBRT treatment plans for localised prostate cancer, in the presence of hip prostheses, were analysed and compared with a reference set of 196 treatment plans for localised prostate cancer in patients without prostheses. Crowe et al.’s TADA code [1] was used to extract treatment plan parameters and evaluate doses to target volumes and critical structures against recommended goals [2] and constraints [3, 4]. Results The need to avoid transmitting the radiation beam through the hip prostheses limited the range of gantry angles available for use in both the rotational (VMAT) and the non-rotational (3DCRT and IMRT) radiotherapy treatments. This geometric limitation (exemplified in the VMAT data shown in Fig. 1) reduced the overall quality of the treatment plans for patients with prostheses compared to the reference plans. All plans with prostheses failed the PTV dose homogeneity requirement [2], whereas only 4 % of the plans without prostheses failed this test. Several treatment plans for patients with hip prostheses also failed the QUANTEC requirements that less than 50 % of the rectum receive 50 Gy and less than 35 % of the rectum receive 60 Gy to keep the grade 3 toxicity rate below 10 % [3], or the Hansen and Roach requirement that less than 25 % of the bladder receive 75 Gy [4]. Discussion and conclusions The results of this study exemplify the difficulty of designing prostate radiotherapy treatment plans, where beams provide adequate doses to targeted tissues while avoiding nearby organs at risk, when the presence of hip prostheses limits the available treatment geometries. This work provides qualitative evidence of the compromised dose distributions that can result, in such cases.