Current Issue : April-June Volume : 2024 Issue Number : 2 Articles : 5 Articles
The ISO 23150 standard defines the logical interface between sensors and fusion units. To apply this standard to actual vehicles, software is required to convert sensor data into ISO 23150- compliant sensor data. In this study, we developed sensor data processing software to provide ISO 23150-compliant sensor data to autonomous vehicle software. The main contributions of this study are as follows: First, the safety of the software is considered, and its structure and error detection method are designed to minimize the impact of errors. Second, the software structure is in accordance with the ISO 23150 standard, and a framework structure is designed with convenience in mind. Third, we considered its compatibility with adaptive AUTOSAR by designing a data delivery service using SOME/IP communication. We evaluated the security and data delivery delay of the software on a controller used in an actual vehicle and noted high security and real-time performance. The evaluation results demonstrated the feasibility of this method for real-world vehicles. Our study can serve as a basis for advancing autonomous driving technology in the context of ensuring software safety....
The advancement of technology has made the development of software applications become unstoppable. The wide use of software applications has increased the threat to cyber security. The recent pandemic required the organization to adapt and manage new threats and cyberattacks due to the rising number of cybercrime activities all around the digital ecosystem. This situation has led to the importance of ensuring that the software is safe to use. Therefore, software development that emphasizes security aspects in every phase of the software development life cycle (SDLC) should be prioritized and practised to minimize cybersecurity problems. In this study, a document survey be conducted to achieve an understanding of secure software development processes and activities. The source of information is retrieved from different reliable resources of scientific research databases such as IEEE, Science Direct and Google Scholar. Moreover, trusted web resources also be referenced to support the argument in the literature study. Findings show that there are several steps of security measures for every phase of SDLC that should be conducted to improve the security performance of the software developed. The author also suggests solutions for dealing with current issues in secure software development which include educating and training the development team on secure coding practices, utilizing automated tools for software testing and implementing continuous automated scanning of threats and vulnerabilities in the system environment....
This research aims to explore optimal strategies for fortified software, enhancing the implementation of secure software development practices. Software security involves crafting and designing software that guarantees the integrity, confidentiality, and availability of its code, data, and functionalities. Often, in prioritizing functionality, security takes a back seat when organizations embark on system development. Yet, it's imperative to embed security at every phase of the Software Development Life Cycle (SDLC). Numerous methodologies and models exist for addressing software security, but only a few substantiate creating secure software applications effectively. Despite advancements, software security remains inadequately addressed, posing a challenge to integrating security protocols into the SDLC seamlessly. This review advocates specific security measures to be integrated at each SDLC level, fostering a secure SDLC. Efficient amalgamation of these processes ensures the delivery of secure software systems with minimized resource expenditure. Additionally, it highlights hurdles encountered in employing agile development methodologies for crafting secure software. These challenges stem from assessing agile ideals, principles, and security assurance procedures. These findings underscore the urgency for research facilitating safe software development, addressing barriers inhibiting its adoption. The paper serves as a valuable reference, shedding light on the significance of establishing secure software development processes....
This paper aims to explore the impact of accounting software on accounting fraud cases. This study explores the impact of artificial intelligence on accounting fraud cases. The results of this paper are helpful for business owners and managers to understand the importance of using accounting software to achieve performance. Efficiency, reliability, ease of use, data quality and accuracy affect the use of accounting software, thus affecting the number of accounting fraud cases. Literature and research results show that the efficiency, reliability, ease of use, data quality and accuracy of accounting software have a significant impact on accounting fraud cases. Previous studies have shown that in the increasingly competitive enterprise environment, in addition to improving the management ability and efficiency of enterprises, the use of accounting software is an important means to ensure the survival and sustainable development of enterprises. This study is one of the few studies that can clarify how the use of accounting software affects corporate performance. In this study, the author believes that the dimension of using artificial intelligence is important for improving organizational performance....
Objective To improve breast radiographers’ individual performance by using automated software to assess the correctness of breast positioning and compression in tomosynthesis screening. Materials and methods In this retrospective longitudinal analysis of prospective cohorts, six breast radiographers with varying experience in the field were asked to use automated software to improve their performance in breast compression and positioning. The software tool automatically analyzes craniocaudal (CC) and mediolateral oblique (MLO) views for their positioning quality by scoring them according to PGMI classifications (perfect, good, moderate, inadequate) and checking whether the compression pressure is within the target range. The positioning and compression data from the studies acquired before the start of the project were used as individual baselines, while the data obtained after the training were used to test whether conscious use of the software could help the radiographers improve their performance. The percentage of views rated perfect or good and the percentage of views in target compression were used as overall metrics to assess changes in performance. Results Following the use of the software, all radiographers significantly increased the percentage of images rated as perfect or good in both CCs and MLOs. Individual improvements ranged from 7 to 14% for CC and 10 to 16% for MLO views. Moreover, most radiographers exhibited improved compression performance in CCs, with improvements up to 16%. Conclusion Active use of a software tool to automatically assess the correctness of breast compression and positioning in breast cancer screening can improve the performance of radiographers. Clinical relevance statement This study suggests that the use of a software tool for automatically evaluating correctness of breast compression and positioning in breast cancer screening can improve the performance of radiographers on these metrics, which may ultimately lead to improved screening outcomes....
Loading....