883 resultados para REQUIREMENTS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Construction Design and Management (CDM) Regulations (2007) is one of the most important set of health and safety regulations in the construction industry today. The aim of this research is to examine critical success factors for CDM compliance in small to medium size contractors in the UK construction industry. The objectives of the research include the identification of critical barriers in doing so along with the identification of success factors where CDM is incorporated. A mixed method approach is adopted in the identification and categorisation of the various factors encompassing a literature review, interviews and questionnaire survey. The key finding which emerge is the lack of knowledge and understanding with regards the CDM regulations with the recommendation to encourage small and medium contractor compliance through illustrating the benefits attainable. The practicality of the research is evident based on the significant uptake in the CDM by larger contractors, yet the research indicates that further insight and guidance is required to educate and inform those working within small to medium sized contractors in the UK. Where such acknowledgement and compliance is adopted, it is envisaged that this sector will benefit from reduced incidents and accidents, increased productivity while ultimately leading to a safer and more productive industry as a whole.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding the links between genetic, epigenetic and non-genetic factors throughout the lifespan and across generations and their role in disease susceptibility and disease progression offer entirely new avenues and solutions to major problems in our society. To overcome the numerous challenges, we have come up with nine major conclusions to set the vision for future policies and research agendas at the European level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this research, an agent-based model (ABM) was developed to generate human movement routes between homes and water resources in a rural setting, given commonly available geospatial datasets on population distribution, land cover and landscape resources. ABMs are an object-oriented computational approach to modelling a system, focusing on the interactions of autonomous agents, and aiming to assess the impact of these agents and their interactions on the system as a whole. An A* pathfinding algorithm was implemented to produce walking routes, given data on the terrain in the area. A* is an extension of Dijkstra's algorithm with an enhanced time performance through the use of heuristics. In this example, it was possible to impute daily activity movement patterns to the water resource for all villages in a 75 km long study transect across the Luangwa Valley, Zambia, and the simulated human movements were statistically similar to empirical observations on travel times to the water resource (Chi-squared, 95% confidence interval). This indicates that it is possible to produce realistic data regarding human movements without costly measurement as is commonly achieved, for example, through GPS, or retrospective or real-time diaries. The approach is transferable between different geographical locations, and the product can be useful in providing an insight into human movement patterns, and therefore has use in many human exposure-related applications, specifically epidemiological research in rural areas, where spatial heterogeneity in the disease landscape, and space-time proximity of individuals, can play a crucial role in disease spread.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building secure systems is difficult for many reasons. This paper deals with two of the main challenges: (i) the lack of security expertise in development teams, and (ii) the inadequacy of existing methodologies to support developers who are not security experts. The security standard ISO 14508 (Common Criteria) together with secure design techniques such as UMLsec can provide the security expertise, knowledge, and guidelines that are needed. However, security expertise and guidelines are not stated explicitly in the Common Criteria. They are rather phrased in security domain terminology and difficult to understand for developers. This means that some general security and secure design expertise are required to fully take advantage of the Common Criteria and UMLsec. In addition, there is the problem of tracing security requirements and objectives into solution design,which is needed for proof of requirements fulfilment. This paper describes a security requirements engineering methodology called SecReq. SecReq combines three techniques: the Common Criteria, the heuristic requirements editorHeRA, andUMLsec. SecReqmakes systematic use of the security engineering knowledge contained in the Common Criteria and UMLsec, as well as security-related heuristics in the HeRA tool. The integrated SecReq method supports early detection of security-related issues (HeRA), their systematic refinement guided by the Common Criteria, and the ability to trace security requirements into UML design models. A feedback loop helps reusing experiencewithin SecReq and turns the approach into an iterative process for the secure system life-cycle, also in the presence of system evolution.