Papers by Fryad M. Rashid
Social Science Research Network, 2008
E-learning system is one of the most important systems used in development of education especiall... more E-learning system is one of the most important systems used in development of education especially in higher education. The proposed e-learning system involves a systematic process of ADDIE frameworks that are comprised of Analysis, Design, Development, Implementation and Evaluation to buildup a desired network that creates and offers e-learning system. The ADDIE framework processes and rapid prototype approaches have been integrated for establishing a derivative framework to enhance the e-learning system. In this study, a framework for e-learning and web teaching system has been designed and implemented to deliver courses, lessons, examples, exercises, exercise solutions, self evaluation test, sending and receiving report via web technology and database systems. The proposed e-learning system can be used over Internet or intranet and it represents a new technology of education to facilitate and improve learning process especially for universities. The designed system represents structure for e-learning system interfaces. The interfaces are administrator, instructor and student. They are implemented on a Web server and clients. E-learning Database has been designed to store all of data in an appropriate relational and independent table that related to the e-learning interfaces.
Bookmarks Related papers MentionsView impact
CompSciRN: Problem Solving (Topic), 2016
This paper presents basic understanding of quantum computing, which is one of the hot topics in t... more This paper presents basic understanding of quantum computing, which is one of the hot topics in today's research area. The discussion starts to clarify the basic difference between a quantum computer and a classical computer at different levels such as bit level, register level, logic gate level, and circuit level. The main purpose of this paper is to deepen the understanding of the basic model of quantum computing by building a relationship between quantum gates, reversible logic gates, and classical logic gates. This paper demonstrates the quantum bit or qubit, quantum register, and quantum gates because they are important elements in the understanding of the quantum circuit model. The quantum computer simulator has been used to implement quantum circuits and quantum algorithms. The famous Deutsch's algorithm has been described and a corresponding quantum circuit is presented. The last demonstration is converting a combinational logic circuit to a quantum circuit for the s...
Bookmarks Related papers MentionsView impact
SSRN Electronic Journal, 2020
Safety-critical software is increasingly integrated into everyday life. We depend on software for... more Safety-critical software is increasingly integrated into everyday life. We depend on software for automation, such as medical monitoring, and we increasingly rely on software to make decisions in high-risk, safety-critical scenarios where there may not be enough time to alert humans, such as autonomous vehicle navigation. Traditional methods for creating safety-critical software are expensive, time-consuming and not suitable for consumer products. Software product line techniques have proven successful at reducing the cost and the time of creating and deploying traditional products. This paper presents a proposal for an investigation on conducting safety analysis in safety-critical software product lines using an architecture approach.
Bookmarks Related papers MentionsView impact
IEEE Access
Bookmarks Related papers MentionsView impact
SSRN Electronic Journal, 2020
In cryptography, encryption is the process of transforming information to make it unreadable to a... more In cryptography, encryption is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. This research is intended to introduce a new approach for encryption is the design and implement Kurdish and English languages cipher system. It uses Kurdish letters and their diacritics for encrypting English messages and vice versa. A pseudo random generator is used to generate integer numbers to represent each character in Kurdish language. The same numbers are used again after sorting them to represent the English characters. The conclusions that are extracted indicate the efficiency of KAELCS system according to security and time performance.<br>
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Safety-critical systems are those systems whose failure could result in loss of life. For that re... more Safety-critical systems are those systems whose failure could result in loss of life. For that reason, it needs specific development activities in the software development life cycle to ensure that the system will operate safely. The overall objective of this research is to develop a theoretical framework that identifies unsafe functional behavior for each component in the system. Current safety analysis methods do not use formal methods to find hazardous conditions in a design. We provide guidance concerning mathematical notations to formalize an error ontology used in the architecture descriptions of systems represented in AADL (Architecture Analysis and Design Language) and to improve the rigor of STPA (Systems-Theoretic Process Analysis), a hazard analysis method. In this study, we investigated how a formalized error ontology could assist in identifying unsafe behavior. The ontology can aid in identifying mathematical expressions for each error flow in the canonical feedback con...
Bookmarks Related papers MentionsView impact
Safety-critical systems need specific activities in the software development life cycle to ensure... more Safety-critical systems need specific activities in the software development life cycle to ensure that the system will operate safely. The objective of this dissertation is to develop a new safety analysis method to identify hazards. The method uses error propagation information and the internal structure rather than the interfaces of a system. We propose development procedures to augment STPA (System-Theoretic Process Analysis) with error propagation information derived from the architecture description of a system represented in the AADL (Architecture Analysis & Design Language). We will focus on how the AADL error ontology can be used to assist in identifying errors, how those errors propagate among components, and whether the errors lead to hazards in the system. Our research shows that tracing error propagation leads to the discovery of hazards and additional information that other methods miss. The new safety analysis method, Architecture Safety Analysis Method (ASAM), by augm...
Bookmarks Related papers MentionsView impact
Safety-critical systems need specific activities in the software development life cycle to ensure... more Safety-critical systems need specific activities in the software development life cycle to ensure that the system will operate safely. The objective of this dissertation is to develop a new safety analysis method to identify hazards. The method uses error propagation information and the internal structure rather than the interfaces of a system. We propose development procedures to augment STPA (System-Theoretic Process Analysis) with error propagation information derived from the architecture description of a system represented in the AADL (Architecture Analysis & Design Language). We will focus on how the AADL error ontology can be used to assist in identifying errors, how those errors propagate among components, and whether the errors lead to hazards in the system. Our research shows that tracing error propagation leads to the discovery of hazards and additional information that other methods miss. The new safety analysis method, Architecture Safety Analysis Method (ASAM), by augm...
Bookmarks Related papers MentionsView impact
https://www.researchgate.net/publication/340459885_DESIGN_AND_IMPLEMENTATION_A_NEW_APPROACH_FOR_ENHANCING_ENCRYPTION_AND_DECRYPTION_MECHANISMS, 2010
In cryptography, encryption is the process of transforming information to make it unreadable to a... more In cryptography, encryption is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information. This research is intended to introduce a new approach for encryption is the design and implement Kurdish and English languages cipher system. It uses Kurdish letters and their diacritics for encrypting English messages and vice versa. A pseudo random generator is used to generate integer numbers to represent each character in Kurdish language. The same numbers are used again after sorting them to represent the English characters. The conclusions that are extracted indicate the efficiency of KAELCS system according to security and time performance.
Bookmarks Related papers MentionsView impact
https://ssrn.com/abstract=3569753, 2008
E-learning system is one of the most important systems used in development of education especiall... more E-learning system is one of the most important systems used in development of education especially in higher education. The proposed e-learning system involves a systematic process of ADDIE frameworks that are comprised of Analysis, Design, Development, Implementation and Evaluation to buildup a desired network that creates and offers e-learning system. The ADDIE framework processes and rapid prototype approaches have been integrated for establishing a derivative framework to enhance the e-learning system. In this study, a framework for e-learning and web teaching system has been designed and implemented to deliver courses, lessons, examples, exercises, exercise solutions, self evaluation test, sending and receiving report via web technology and database systems. The proposed e-learning system can be used over Internet or intranet and it represents a new technology of education to facilitate and improve learning process especially for universities. The designed system represents structure for e-learning system interfaces. The interfaces are administrator, instructor and student. They are implemented on a Web server and clients. E-learning Database has been designed to store all of data in an appropriate relational and independent table that related to the e-learning interfaces.
Bookmarks Related papers MentionsView impact
Rashid, Fryad and AL-Mukhtar, Mumtaz, A Framework for E-Learning and Web Teaching System (November 2007). ACIT 2007, 26-28 November 2007. Available at SSRN: https://ssrn.com/abstract=3569727, 2007
The aim of this paper is to design and implement a framework for e-learning and web teaching syst... more The aim of this paper is to design and implement a framework for e-learning and web teaching system in delivering (courses, lessons, examples, exercises, exercise solutions, self evaluation test, send and receive report) via web technology and database system. We proposed an e-learning system which is divided into three interfaces (1-Administrator 2-Instructor 3-Student). This system has been developed to provide e-learning solutions over Internet or intranet and represents the new technology of education,
Bookmarks Related papers MentionsView impact
https://www.researchgate.net/publication/340449069_Experimental_Study_to_Show_the_Effect_of_Bouncing_On_Digital_Systems, 2016
What is the reason that when you press on a remote for a TV, the channel shifts by two or three o... more What is the reason that when you press on a remote for a TV, the channel shifts by two or three or more? Or have you noticed that while tuning to a channel on the radio you will pass more channels than desired? Have you thought about this problem? It is called button bounce or switch bounce, or chatter. This is a common problem in these types of switches, such as push button switches, toggle switches, and mechanical relays because they are made up of metals and these metals have a characteristic called elasticity or springiness. This project, proposed a new system design to solve this problem. For that reason, the project is divided into three parts: In the first part, an algorithm was designed to show the effect of the bouncing problem on the digital systems, which is called "Bouncing Algorithm." This algorithm has been implemented by using a new hardware technique to show this problem in the real world. In the second part, another algorithm was designed to solve this problem, which is called "De-bouncing Algorithm." This is a new method to avoid contact bouncing problem. This solution has been implemented by using a new hardware system design. Both algorithms have been implemented by using Multisim simulator for education purposes. These two parts of hardware have been mixed to produce a new integrated circuit (IC), which is called "Bouncing/De-bouncing." It is shown in fig.1. This IC consists of two packages: The first package shows the effect of the bouncing problem in reality by connecting 4 LEDs to the pins (6-9) and the second package shows the solution for this problem by connecting the digital display to the pins (10-16). The third part is related to the software de-bouncing approach. It uses a program to solve the contact bouncing problem in microcontroller Atmega168 and then implements it.
Bookmarks Related papers MentionsView impact
https://www.researchgate.net/publication/340449368_Quantum_Computing, 2016
This paper presents basic understanding of quantum computing, which is one of the hot topics in t... more This paper presents basic understanding of quantum computing, which is one of the hot topics in today's research area. The discussion starts to clarify the basic difference between a quantum computer and a classical computer at different levels such as bit level, register level, logic gate level, and circuit level. The main purpose of this paper is to deepen the understanding of the basic model of quantum computing by building a relationship between quantum gates, reversible logic gates, and classical logic gates. This paper demonstrates the quantum bit or qubit, quantum register, and quantum gates because they are important elements in the understanding of the quantum circuit model. The quantum computer simulator has been used to implement quantum circuits and quantum algorithms. The famous Deutsch's algorithm has been described and a corresponding quantum circuit is presented. The last demonstration is converting a combinational logic circuit to a quantum circuit for the specific scenario.
Bookmarks Related papers MentionsView impact
https://www.researchgate.net/publication/341277011_An_Architecture-centric_Approach_to_Safety_Critical_Software_Product_Lines, 2016
Safety-critical software is increasingly integrated into everyday life. We depend on software for... more Safety-critical software is increasingly integrated into everyday life. We depend on software for automation, such as medical monitoring, and we increasingly rely on software to make decisions in high-risk, safety-critical scenarios where there may not be enough time to alert humans, such as autonomous vehicle navigation. Traditional methods for creating safety-critical software are expensive, time-consuming, and not suitable for consumer products. Software product line techniques have proven successful at reducing the cost and the time of creating and deploying traditional products. This paper presents a proposal for an investigation on conducting safety analysis in safety-critical software product lines using an architecture approach.
Bookmarks Related papers MentionsView impact
https://ssrn.com/abstract=3569773, 2017
Context: Safety-critical systems need specific development activities in the software development... more Context: Safety-critical systems need specific development activities in the software development life cycle to ensure that the system will operate safely. Objective: The overall objective of this research is to develop a safety analysis method that provides a deeper analysis of the system under review. Problem: Current safety analysis methods do not use error information to identify faults. Method: We augmented the STPA with error propagation information derived from the architecture description of a system represented in the Architecture Analysis and Design Language. In this study, we investigated how an error ontology can be used to assist in identifying errors and how those errors propagate among components. The error may or may not lead to a hazard in the system. It depends on its context. The key principle of our method is that an error analysis of a domain represents the root causes of hazards in the domain. Using that analysis hazards may be identified. Results: The results of our studies have shown that tracing errors leads to finding hazards and additional information in the system that other methods miss. Conclusions: By augmenting existing hazard analysis methods with early design information, we are able to find more hazards, unsafe control actions, safety constraints and specific causes.
Bookmarks Related papers MentionsView impact
https://ssrn.com/abstract=3569778, 2018
Safety-critical systems are those systems whose failure could result in loss of life. For that re... more Safety-critical systems are those systems whose failure could result in loss of life. For that reason, it needs specific development activities in the software development life cycle to ensure that the system will operate safely. The overall objective of this research is to develop a theoretical framework that identifies unsafe functional behavior for each component in the system. Current safety analysis methods do not use formal methods to find hazardous conditions in a design. We provide guidance concerning mathematical notations to formalize an error ontology used in the architecture descriptions of systems represented in AADL (Architecture Analysis and Design Language) and to improve the rigor of STPA (Systems-Theoretic Process Analysis), a hazard analysis method. In this study, we investigated how a formalized error ontology could assist in identifying unsafe behavior. The ontology can aid in identifying mathematical expressions for each error flow in the canonical feedback control loop architecture. The results of our studies have shown that providing a formal notation for the feedback control loop and providing formal specification for the error ontology leads to finding hazards in the operating system context that other methods miss. By augmenting STPA with an error ontology described in a formal notation, we are able to find more hazards.
Bookmarks Related papers MentionsView impact
Thesis Chapters by Fryad M. Rashid
http://dx.doi.org/10.2139/ssrn.3569786, 2018
Safety-critical systems need specific activities in the software development life cycle to ensure... more Safety-critical systems need specific activities in the software development life cycle to ensure that
the system will operate safely. The objective of this dissertation is to develop a new safety analysis method
to identify hazards. The method uses error propagation information and the internal structure rather than the
interfaces of a system. We propose development procedures to augment STPA (System-Theoretic Process
Analysis) with error propagation information derived from the architecture description of a system represented
in the AADL (Architecture Analysis & Design Language). We will focus on how the AADL error
ontology can be used to assist in identifying errors, how those errors propagate among components, and
whether the errors lead to hazards in the system. Our research shows that tracing error propagation leads to
the discovery of hazards and additional information that other methods miss.
The new safety analysis method, Architecture Safety Analysis Method (ASAM), by augmenting
STPA with early design information, is able to find more hazards, unsafe control actions, safety constraints
and causes of the unsafe control actions than by using STPA alone. Our method leaves more false positives
than STPA, but in safety analysis having false positive is preferred over missing actual hazards. We use
the AADL error ontology to rigorously describe system component errors and how they propagate among
components. We illustrate this rigorous description through several examples and we demonstrate that it
yields hazards that an STPA analysis of the example did not find. In addition, we provide a mathematical
notation and expressions so that formal analysis and verification of the hazards can be done to ensure that
all causes of the hazards have been identified and that any developed safety constraints fully mitigate the
hazards, through the use of compositional reasoning.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Fryad M. Rashid
Thesis Chapters by Fryad M. Rashid
the system will operate safely. The objective of this dissertation is to develop a new safety analysis method
to identify hazards. The method uses error propagation information and the internal structure rather than the
interfaces of a system. We propose development procedures to augment STPA (System-Theoretic Process
Analysis) with error propagation information derived from the architecture description of a system represented
in the AADL (Architecture Analysis & Design Language). We will focus on how the AADL error
ontology can be used to assist in identifying errors, how those errors propagate among components, and
whether the errors lead to hazards in the system. Our research shows that tracing error propagation leads to
the discovery of hazards and additional information that other methods miss.
The new safety analysis method, Architecture Safety Analysis Method (ASAM), by augmenting
STPA with early design information, is able to find more hazards, unsafe control actions, safety constraints
and causes of the unsafe control actions than by using STPA alone. Our method leaves more false positives
than STPA, but in safety analysis having false positive is preferred over missing actual hazards. We use
the AADL error ontology to rigorously describe system component errors and how they propagate among
components. We illustrate this rigorous description through several examples and we demonstrate that it
yields hazards that an STPA analysis of the example did not find. In addition, we provide a mathematical
notation and expressions so that formal analysis and verification of the hazards can be done to ensure that
all causes of the hazards have been identified and that any developed safety constraints fully mitigate the
hazards, through the use of compositional reasoning.
the system will operate safely. The objective of this dissertation is to develop a new safety analysis method
to identify hazards. The method uses error propagation information and the internal structure rather than the
interfaces of a system. We propose development procedures to augment STPA (System-Theoretic Process
Analysis) with error propagation information derived from the architecture description of a system represented
in the AADL (Architecture Analysis & Design Language). We will focus on how the AADL error
ontology can be used to assist in identifying errors, how those errors propagate among components, and
whether the errors lead to hazards in the system. Our research shows that tracing error propagation leads to
the discovery of hazards and additional information that other methods miss.
The new safety analysis method, Architecture Safety Analysis Method (ASAM), by augmenting
STPA with early design information, is able to find more hazards, unsafe control actions, safety constraints
and causes of the unsafe control actions than by using STPA alone. Our method leaves more false positives
than STPA, but in safety analysis having false positive is preferred over missing actual hazards. We use
the AADL error ontology to rigorously describe system component errors and how they propagate among
components. We illustrate this rigorous description through several examples and we demonstrate that it
yields hazards that an STPA analysis of the example did not find. In addition, we provide a mathematical
notation and expressions so that formal analysis and verification of the hazards can be done to ensure that
all causes of the hazards have been identified and that any developed safety constraints fully mitigate the
hazards, through the use of compositional reasoning.