The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
This paper compares the Information and Communication Technology (ICT) infrastructure between Saudi Arabia and Gulf States universities, the latter consisting of Qatar, Oman, United Arab Emirates (UAE) and Bahrain. A questionnaire, expert-reviewed and pilot-tested, was used to collect data from ten universities in Saudi Arabia and five in the Gulf States. It covered the perspectives offered by faculty...
The aim of the study is to develop tools of increasing a problem solving reliability in a heterogeneous distributed computing environment by applying a diagnostics of computing resources components and using an analysis of problem solving schemes. A scheme (a plan) is an abstract program for a problem solving. A special attention is paid to the calculation of a problem solving scheme reliability on...
PUF is a security primitive that exploits the fact that no two ICs are exactly the same. To verify a new PUF design, several metrics including uniqueness, reliability, and randomness must be evaluated, which requires various resources and a long set-up time. In this live demonstration, we have developed an automatically evaluation platform for the PUF design. To the authors' best knowledge, this is...
Vulnerability Assessment and Penetration Testing is an important activity to improve cyber defense of systems/networks. It assist to make systems/networks vulnerability free. But it is a costly process. Premium VAPT tools are very costly. Even premium VAPT tools are not able to give 100 % accuracy to find out vulnerability. In addition to that, single VAPT tool cannot find all type of vulnerabilities...
Software piracy worldwide has resulted in serious industrial, academic and economic consequences. However, the problem can be solved if the root causes can be identified. Personality traits are said to be an effective positive influence on unethical behaviour. For this reason, personality traits could be a predictor for software piracy. This study investigates personality traits as a factor in students...
In recent years, military computers have been widely used by ASELSAN. Flexible backplanes which have backplane connectors on one end (VPX or CPCI) and military connectors on the other end are used as part of the military computers along with processor boards, Input/Output boards, communication boards etc. To meet the requirements of various projects, backplanes with different form factors (3U, 6U...
As a kind of critical system, safety-critical system is always used for the key areas such as aerospace, national defense, transportation, nuclear energy, health and so on, which require the high security. Due to the inherent defects which caused by the complexity of the organizational structure, and the external threats which caused by the open and dynamic environment, some unexpected results will...
VXI bus is regard as an excellent platform in instrument bus system and automatic test system. It can improve test precision, speed and performance. After the characters of VXI bus is introduced, the design concept and principles of a certain automatic test system based on VXI bus are explained. Then the hardware and software design of the system are mainly expatiated in detail. Practical application...
To achieve better performance, computer designers employ advanced techniques that shrink feature sizes, lower supply voltage, increase clock rates and memory capacity, and meanwhile modern computers become increasingly vulnerable to soft errors caused by energetic particles, such as alpha particles and neutron strikes. Therefore, fault tolerance evolves into one of the most significant design objectives,...
Electronic devices can be seen everywhere in our lives along with the popularization and application of computer technology, meanwhile more and more digital traces are found in criminal activities, so we can take these digital evidences to prove case. But digital evidences usually have been questioned in the courts because of their reliability. There is no valid method to prove the reliability of...
Welcome to this special panel aiming to reexamine the history of modern computing during early 20th century. During our discussion we will recognize some of the earliest efforts in transforming the world through electronic digital computing.
A Distributed shared memory systems represent a successful hybrid of two parallel computer classes: distributed computer systems and shared memory multiprocessors. They provide the shared memory abstraction in systems with physically distributed memories, and consequently combine the advantages of both approaches. Distributed shared memory is the abstraction that supports the shared memory in a physically...
The paper considers functions of the informational technologies which are implemented in the modern systems for monitoring complex industrial facilities. It substantiates the task to develop systems for monitoring technical state of the electrical equipment of the rolling mill units. The hardware configuration and software of the monitoring system are proven to be determined by technical parameters...
The aim of this work, which is a case study, is to present the way eAssessment could be applied in assessing the student knowledge of ESP (English for Specific Purposes) at institutions of higher education (HEI) using Drupal, a free software package that allows anyone to easily publish, manage and organize a wide variety of content on a website, allowing tight control over who can create, view, manage,...
In this paper, we present an approach to comparing control flow graphs of binary programs by matching their basic blocks. We first set up an initial match and propagate it to reach a stable state. We consider the matched pairs to identify overall similarities. To evaluate the proposed method, we perform experiments on real-world Java applications, and compare their performance with previous structural...
In this article the situation of teaching in engineering courses using specialized software support is evaluated and analysed. The statistics courses in engineering often come off as element of formal exposure to statistical analysis and research methods. The software support during classes intends to facilitate and reinforce learning with computational resolution of statistical specific problems...
An approach to study the effects of single event upsets (SEU) by fault injection performed at system-level is presented. It is illustrated by results obtained on two different versions of a matrix multiplication algorithm, one standard and the second with fault tolerance capabilities. The final goal of this work is to validate fault tolerance techniques implemented at software level and provide a...
Different etiquette of software could trigger different attitudes and behaviors of users. This paper conducted a series of word-learning studies in which users either received polite feedback offering compliments and encouragements, or impolite feedback belittling users. Through the analysis on the results of e-learning experiment and post-test questionnaires, it was found that the polite feedback...
With the platform of industrial PC and VC++ software, this paper researches on how to use PCI-1240 motor control card to achieve the control of stepper motor by sending control signals to stepper motor controller. A control system to realize the accurate control of the motion of stepper motor is designed. It is proved that this method is accurate, reliable, easy to operate, and practical in industry.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.