The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following papers are dealt with: software component verification; decision support system; web service; ERP; SQL; semantic data gathering; network security; software development; knowledge-based environmental information system; artificial neural network based radial bending; graph theory model; ontology-based process model; data mining; rough-neuro fuzzy network; feature extraction; query processing;...
With the development of the Co-operative education in China, the Co-operative Studies Supporting System (CSSS) for Software Engineering becomes a task of high priority. We analyze the requirements of integrated study and work term of Co-operative education in software engineering, give a new Integrate Developing Model based on Capability Maturity Model (IPD-CMM) supporting by Team Software Process...
In most Hardware-in-the-loop (HIL) simulation test systems, task scheduling algorithms (TSA) are used to support concurrent test to save test time and cost. However, prevailing TSA do not consider about the concurrent operation potential of hardware devices, thus pure TSA become no longer powerful enough to exploit the system concurrency when the system integrates more and more complex devices. Centralized...
Developing software components requires a high focus on software quality. A novel approach was proposed from the component producer perspective to improve it in this paper. First, atomic service, service extension and extension rule were defined respectively. Secondly, an effective component model was defined, in terms of service, to describe all services which a component can provide. Thirdly, the...
The access control mechanism is the one key issue in realizing safety interoperation between distributed information systems. However, the existing multi-domains interoperation access control based on RBAC can not satisfy the safety needs of information system interoperability, in which the sort of users and information are diverse and update frequently. Therefore, the interoperation access control...
The essence of fault diagnosis is pattern recognition to characters of fault. The non-dimensional parameter immune detector as the recognition fault detector is constructed with some non-dimensional parameter being more hypersensitive to fault combined with negative selection mechanism of artificial immune system. And two parts of immune vaccine and immune learning produce the excellence detector...
An accurate estimation of State-of-Charge (SOC) for power battery pack is very important in the applications of electrical vehicles. Single cell model is not suitable for battery pack of m u Iti cells. Considering the imbalance characteristic of serial connected battery pack, a Vmin model is proposed. The minimal cell load voltage of the battery pack (Vmin) is used as the model measurement variable,...
This paper introduces current advances and some rudimental results of our ongoing research project. To discriminate between earthquakes and explosions, temporal and spectral features extracted from seismic waves, plus some seismological parameters (such as epicenter depth, location, magnitude) are crux for rapid and correct recognizing event sources (earthquakes or explosions). Seismological parameters...
In this paper, we study component-based software architectures and report the following results. I) By defining port operations, we may use port activities to describe process migration. The proposed formalism(port algebra) can be used to describe running time system architecture. 2) In processing checking, the formalism can keep architecture structure unchanged while progresses migrate, which enables...
In this paper, we propose a language I-BPEL to model web services in the environment with channel noise and system instabilities. Each channel is assigned an interval value to indicate the value of noise. We introduce an operational semantics which attached with interval values to indicate the quality of the web service. Based on the syntax and semantics, we define the notion of simulation and investigate...
Authentication is the process of verifying a user's identity when the user is requesting services from any secure IT system. By far, the most popular authentication is a basic username-password based method that is commonly considered to be a weak technique of authentication. A more secure method is the multi-factor authentication that verifies not only the username/password pair, but also requires...
Starting from the goal to overcome the limitation of the single type algorithm of iris recognition. In this paper, a two-step iris recognition algorithm is proposed based on feature extraction on corner and Gabor transform. First of all, it uses the corner feature of iris texture to recognize for achieving the purpose of removal of alien and confirm the vast majority of similar samples rapidly; if...
In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching time logic for ZIAs is presented. We then give an algorithm for model checking this logic on ZIAs with finite domain. Furthermore, we present a mu-calculus logic for ZIAs, and give a model...
To improve the cost-efficiency during the processes of software development and maintenance for the Electronic Control Unit (ECU) of automated manual transmissions (AMT), a software architecture as well as its supporting environments for the ECU of AMT was put forward based on the requirements analysis of AMT system. The software architecture has a structure with five layers and two bases, which consists...
One of the core problems of product line development is the coordination efforts of product builder and core-asset developer. More specifically, it is the integration of production strategy decision and core asset implemention scenario selection. In this paper, we have developed the CoFAQ (Cost Optimization under Functional And Quality goal satisfaction constraints) framework which provides a systematic...
Model Driven Architecture (MDA) methodology is considered as the next generation development methodology and approach though it is not applied widely in software enterprise yet. In order to testify the efficiency of MDA methodology in the real software project environment, we conducted a comparison experiment in developing a prototype for a community support system between the approach of MDA and...
COTS (Commercial off-the-shelf) ERP systems provide a lot of reusable software packages, which accelerate the implementation process to some extent. However they also put enterprises into a dilemma: whether to adapt as-is business processes or to customize software packages. In order to help the enterprises get out of the dilemma, a holistic methodology is proposed to automatically elicit software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.