The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Self-monitoring enables patients to become more active participants in their health care, home pulse oximetry can provide objective data for determining health status and the possible need for medical consultation or interventions. Pulse oximetry is a non-invasive and continuous method for monitoring the blood oxygen saturation level. Pulse oximetry has gained acceptance in the medical community caused...
Inter-vehicle communication (IVC) is a key component enabling the autonomous driving vehicles. Standardization of IVC is advanced but yet improvements are still introduced. Congestion control is one of the sensitive topics. The IVC European standard ITS-G5 addresses the congestion issue enabled by a geo-networking protocol that exploits at networking level the geographic information. Implementation...
Developers often perform copy-and-paste activities. This practice causes the similar code fragment (aka code clones) to be scattered throughout a code base. Refactoring for clone removal is beneficial, preventing clones from having negative effects on software quality, such as hidden bug propagation and unintentional inconsistent changes. However, recent research has provided evidence that factoring...
In the recent times, software security has gained a great deal of attention in the Software Development Life Cycle due to increased cases of reported cyber threats and incidents. A considerable number of cyber-attacks targeting financial systems has made security be the most critical feature in banking systems. However, establishing security requirements for these applications can be a challenging...
An important step toward adoption of formal methods in software development is support for mainstream programming languages. Unfortunately, these languages are often rather complex and come with substantial standard libraries. However, by choosing a suitable intermediate language, most of the complexity can be delegated to existing execution-oriented (as opposed to verification-oriented) compiler...
Software Quality is a multidimensional concept for which Reliability is considered as a key attribute. Notwithstanding, due to its conceptual complexity, there is no common agreement on what Software Reliability is, thus different stakeholders use a variety of Software Reliability views. With the aim to improve our understanding of what Software Reliability means for industrial stakeholders as well...
For runtime verification techniques, the most important part that limits its usage is how to reduce the influence of monitors. An important indicator is the amount of software codes after monitor instrumentation. The application of RV is hindered from the size-explosion problem of monitor construction. Namely, the state number of the monitor obtained is doubly exponential in the size of the input...
Softwarization is a systemic trend which appears under several paradigms impacting networks, services and terminals evolution. Even the Internet of Things (IoT) scenario is going to be affected by this revolution. The efforts that are being made to provide IoT objects with embedded logic reconfiguration capabilities and the architectures that are being defined to support standard Machine-2-Machine...
Mininet is the de-facto standard simulation environment for experimenting with SDN enabled networks based on the OpenFlow protocol. Although Mininet is powerful and not resource hungry, it has a strong limitation: it is not possible to use it for networks in which both OpenFlow and standard distributed routing protocols (e.g. Open Short Path First, OSPF) simultaneously run. In this paper we present...
Several defect prediction models proposed are effective when historical datasets are available. Defect prediction becomes difficult when no historical data exist. Cross-project defect prediction (CPDP), which uses projects from other sources/companies to predict the defects in the target projects proposed in recent studies has shown promising results. However, the performance of most CPDP approaches...
This paper reports the experience of applying agile methods in the defense sector, characterized mostly by embedded and mission critical software. We describe the experience of creating a Command and Control system for the 4th Logistic Department of the Italian Army's General Staff. The project was approved by the Army as a pilot to determine whether it could be possible to reduce development costs...
OpenFlow has been applied to a variety of demands of the transmission quality of the Internet business and it is still growing on its way. To test this protocol with its evolution consideration, we analyzed the working process of OpenFlow protocol and constructed the CPN model through phasing firstly and then role division for version 1.0. In addition, the selection of tokens and their given values...
More than 5% of Thai people have strabismus. Strabismus is known as cross-eyed or wall-eyed because the visual field angle of two eyes is not parallel. The amblyopia disease is the cause of strabismus in kids. Strabismus can be completely cured if the strabismus screening can be made in early stage. Currently, strabismus screening includes methods such as Hirschberg test, cover test and Krimsky test,...
Too often, capacity planning activities that are crucial to software performance are being pushed to late development phases where trivial measurement-based assessment techniques can be employed on enterprise applications that are nearing completion. This procedure is highly inefficient, time consuming, and may result in disproportionately high correction costs to meet existing service level agreements...
Combinatorial interaction testing (CIT) stands as one of the efficient testing techniques that have been used in different applications recently. The technique is useful when there is a need to take the interaction of input parameters into consideration for testing a system. The key insight the technique is that not every single parameter may contribute to the failure of the system and there could...
Service Function Chaining (SFC) serves the traffic of a specific service along an ordered set of Service Functions (SFs). SFC uses Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies to reach the deployment and removal of SFC in an appropriate time with minimal costs. However, during the life time of deployed SFCs, the SFs are exposed to the risk of overloading,...
Recently modeling techniques are introduced to support safety assessment. Goal Structural Notation is one of these modeling techniques, which can be used to facilitate the development of safety argumentation and create reusable safety argumentation models. Consequently, GSN-based safety cases are widely used to demonstrate the safety of systems in safety-critical domains. Due to the amount of manual...
Programmable Logic Controllers (PLCs) are specialized computing systems for the control and monitoring of distributed industrial devices. Aiming for a highly connected industrial Internet-of-Things (IoT) ecosystem, PLCopen OPC Unified Architecture (UA) specification has been released. This paper presents the implementation and evaluation of a PLCopen OPC-UA software component for industrial control...
The API Economy trend is nowadays a concrete opportunity to go beyond the traditional development of vertical ICT solutions and to unlock additional business value by enabling innovative collaboration patterns between different players, e.g., companies, public authorities and researchers. Thus, an effective API Economy initiative has to be comprehensive, focusing not only on technical issues but also...
In this research, we attempt to develop for artistic music loop performance on a de facto standard digital DJ system with TouchOSC. Through the analysis on the functions and UI of de facto DJ software and controllers, the 4 shortage of functions for artistic music loop performance were found. Therefore, we built the remote controller system by TouchOSC. It enables to control the complicated music...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.