The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Program invariant is formal description of properties that should hold at certain program location in every valid execution. It is very useful for program analysis and verification. In this paper, we introduce an abstraction interpretation approach for generating program invariant efficiently and precisely. A polynomial interval domain is proposed for representing abstract state and precise loop effect...
As Cyber-Physical Systems (CPS) operate in open, dynamic and diverse environments, they need to be self-adaptive to address the uncertainty challenges. And it is urgent to study self-adaptive software intensive Cyber-Physical Systems (self-adaptive CPS). As self-adaptive CPS interact closely with the environments and users, their requirements analysis is particularly challenging. General requirement...
To meet the rising demands on high-performance computing, the number of computing nodes composing a high- performance computing system has been continuously growing. Simultaneously, the complexity of networks linking such computing nodes, or the interconnect, has also been increasing. Taking the scale-out of computing nodes in future high-performance computing systems into consideration, it is unrealistic...
Contemporary generation today can be called digital generation because of the advancement of Information and communication technologies and the necessity of using them. The modern ICT technologies occupy our lives and change the way people learn, educate, work and even entertain. The main objective of this paper is to focus on educational aspect and more precisely how the new technologies influence...
Based on the full consideration of the practical demand of power network, this paper proposes the new calculation method of soft simulation interpolation, improved AC sampling frequency the sampling accuracy, which provides a strong technical support for the security and stability of the system operation. Eliminating the abnormal points of intelligent substation integrated energy collection of comprehensively...
Integrated environmental modelling (IEM) couples interdependent environmental models and data together to solve complex environmental problems. There are two major modelling frameworks for IEM: component based framework, and service oriented framework. This paper suggests to take the best of both to couple modelling components and services together. The result is a hybrid method to leverage Open Modelling...
In order to improve the evacuation ability of the transfer station in Subway network operation, this research selected a complex subway transfer station, analyzed facilities and equipment of this transfer station, based on the social force model, the AnyLogic software was applied to simulate the emergency evacuation, calculated the time required for passenger evacuation in peak flow, the simulation...
A new radiometry and design framework has been introduced in the latest Digital Imaging and Remote Sensing Image Generation model (DIRSIG5) that allows for faster simulations while streamlining the generation of high-fidelity radiometric data. The same framework that allows for improved computational performance has also modularized simulation components to allow for extensive interchangeability based...
A virtual reality program has been developed to assess the strength and flexibility of a computer based model of a term fetus or newborn baby's neck. The software has a haptic/force feedback user interface which allows clinical experts to adjust the mechanical properties, including range of motion and mechanical stiffness of a newborn neck model, at runtime. The developed software was assessed by...
The large software applications of today provide abstractions of the real-life systems that they support. A digital model of the system, and of the changes that occur within, are being maintained and updated, as triggered by real-life events. Morphologically, such applications contain several distinct architectural entities: databases holding the state, central components describing how the system...
The advances in computational techniques both from a software and hardware viewpoint lead to the development of projects whose complexity could be quite challenging, e.g., biomedical simulations. In order to deal with the increased demand of computational power many collaborative approaches have been proposed in order apply proper partitioning strategy able to assign pieces of execution to a crowd...
The bidirectional model transformation (BX) comprises a forward transformation get and a backward transformation put. Given that get may be an information-loss transformation, the behavior of put may be uncertain. An uncertain put produces many valid outputs that fit different application scenarios. This paper proposes an approach to variability management in BX to enable put to generate an output...
A developer of mobile or desktop applications is responsible for implementing the network logic of his software. Nonetheless: i) Developers are not network specialists, while pressure for emphasis on the visible application parts places the network logic out of the coding focus. Moreover, computer networks undergo evolution at paces that developers may not follow. ii) From the network resource provider...
This paper focuses on an analysis of data from elderly patients (aged 65 and older) who underwent an elective operation of colon or rectum in the years 2001–2009 at the Department of Surgery of the University Hospital Ostrava. The main purpose is to determine the main risk factors leading to serious postoperative complications or even death in consequence of the operation. Our results will serve as...
Several approaches to protect data and code, and ensure execution in a secure environment without getting infected from malwares, such as isolation, sandboxing, trust-based execution, application oriented access control have been proposed. In recent times, hardware-based solutions like ARM TrustZone and Intel SGX Enclave have been introduced to protect code and data from being infected or modified...
A 10-year working partnership between engineering instructors and communication instructors for a course called “Computer-Aided Engineering: Applications to Biomedical Process” aims to enrich the professional skills of the engineering students overall. This paper provides a window to the ways the course aids students in improving their engineering/technical writing and presenting skills. This year,...
Workflow management system (WfMS) should be capable of self-autonomous non-function attributes to experience its resilience to the change of runtime environment in Business Process Management (BPM) domain. With the motivation mentioned above, we propose the resilience mechanism for WfMS, associating with the corresponding methods proposed in our early research work, engaging to achieve our final aim,...
This paper introduces a cost effective scheme for a Cloud Radio Access Network (C-RAN) based on virtualization, which is a technology used to reduce Power Consumption (PC) in the Base Band Unit (BBU pool). The BBU's function is proposed to be as a software application running in a servers, which is called the virtual BBU (vBBU). To asses the proposal scheme, a power model of the BBU pool is proposed...
Automatic and semi-automatic approaches supporting program comprehension are sought by researchers and practitioners to facilitate software engineering tasks, such as development, maintenance, extension and so on. Using topic modeling is a promising way to automatically discover feature and structure from textual software assets. However, there are gaps between knowing and doing when applying topic...
This paper has proposed a formal verification of ABAP by Z specification. An ABAP programming language is used to create a customized program in SAP ERP. The program must satisfy a business requirement. It likely has a defect from the developed program. Since a specification is created as the business requirement and a program should have functioned as in the specification, the formal verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.