Asset management is a process of identification, design, construction, operation, and maintenance of physical assets (Wenzler, 2005). An asset-centric approach is vital for the success of an asset intensive organisation as the effective management of assets is a major determinant of organisational success. One key issue in asset information management is the availability of information at the right time, in the right format, before the right person, against the right query, and at the right level. This paper provides a comprehensive and in-depth critical analysis from literature which fulfils an identified need of fusing asset information for predictive maintenance so that decision making can be improved. The critical literature review included also highlights the need for an expert system which integrates reliable information with effective decision-support, under the umbrella of Asset Management. Various elements of asset management were critically reviewed, highlighting the need for more robust Predictive maintenance management for assets. We argue that this is best achieved by a system that, in particular, incorporates Expert System to enhance the quality of predictive maintenance through accurate decision analysis. In addition, it should have fuzzy logic reasoning ability that assists in the decision-making process. Our analysis leads us to propose that Expert System when combined with fuzzy logic provides a better way of decision making in predictive maintenance management of assets.
The modeling of security threats is equally important as the modeling of functional requirements at the design stage of software engineering. However, unlike functional requirements modeling, the modeling of security threats is neglected, which consequently introduces software defects during the early stages of software engineering. Hence, there is a need to mitigate these threats at the design stage. Security threats, specifically authentication threats, crosscut other functional and non-functional requirements when modeled using the object-oriented paradigm. This not only makes the design complex but also results in tangling and scattering problems. We therefore model authentication threats using the aspect-oriented modeling (AOM) technique since it separates crosscutting concerns and localizes them as separate units called aspects. Our main research aim is to remove scattering and tangling in security threats modeling using all the core features of the aspect-oriented technique. In this paper, we propose a research approach to model security threats and their mitigation in mal sequence diagram. Using this approach, our contribution makes a clear difference from previous work. Our first contribution is the modeling of authentication threats in the mal sequence diagram using the security profile and AOM profile. Our second contribution is the mathematical verification of the aspect-oriented mal sequence woven model in terms of correctness and completeness. Using the proposed approach, the scattering and tangling from the resultant woven model are successfully removed at the design stage. Thus, the complexity of models and the time and effort required for future modifications of design models are reduced.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.