The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of an Application Lifecycle Management (ALM) system to promote cross-discipline data capture, tracking and traceability has shown to provide a dramatic improvement during airworthiness audits of software-centric avionics systems by reducing both the time to locate relevant information and rework associated with errors in captured data and their traceability. When configured correctly, an ALM...
The increasing amount of gathered sensor data in Industry 4.0 allows comprehensive data analysis software that creates value-adding opportunities. As companies often cannot implement such software by themselves and as they typically don't want to give their data to external scientists, they commission them to build the required software in order to execute it locally. However, installing, configuring,...
Distributed Denial of Service (DDoS) attack has been bringing serious security concerns on banks, finance incorporation, public institutions, and data centers. Also, the emerging wave of Internet of Things (IoT) raises new concerns on the smart devices. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) have provided a new paradigm for network security. In this paper, we...
Making the data plane of a SDN flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable for Software Defined IoT (SD-IoT) networking. The network device having programmable data plane provides an ability to add new packet and data processing procedures dynamically to the IoT applications. Previously proposed solutions for adding programmability to the...
According to the theory of cylinder indexing cam mechanism, based on the modular design, the CAD/CAM system of cylinder indexing cam mechanism is developed by VB6.0 and Creo3.0. This system is a visual interface which is build by VB6.0and it can be used to output the three-dimensional coordinate data and processing date of the cylinder indexing cam through the basic parameters input of cam and the...
Given the heterogeneity of the data that can be extracted from the software development process, defect prediction techniques have focused on associating different sources of data with the introduction of faulty code, usually relying on handcrafted features. While these efforts have generated considerable progress over the years, little attention has been given to the fact that the performance of...
It is important to provide sightseeing information to foreign people to promote tourism industry. However, in order to provide fresh information or intend for new sightseeing contents, we need to pay for the cost of contents updating and system migration. Therefore, we propose “Self-extending Type Open Data Platform” that can take in the tweet of the tourist automatically. This proposed platform has...
Apply Integrated Logistics Support (ILS) to weapon equipment can efficiently improve equipment's automation and digital level. ILS needs support of various integrated support systems, which have demands for data editing. Nowadays, most of data editing software used in these systems are customized and provide a form-based editing approach, which becomes an obstacle to carry out ILS. This paper brings...
This paper describes a humanitarian healthcare transformation strategy called Whole Person Integrated Care (WPIC). WPIC couples a Spreadsheet-based Software Framework (SSF) and a care delivery model that focus on increasing efficiency and effectiveness through evidence-based knowledge and action. This strategy: 1) integrates “sick care” (treatment of health problems) with “well care” (prevention and...
A significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines...
System specifications can be modeled using various types of notations and diagrams regarding applications of the particular model. In this paper, we present an overview of the existing solutions, focusing on UML, BPMN and DMN models and the diagrams provided by these notations. We perform a comparison of these approaches and provide examples of representing system requirements in these notations.
Today's complex software systems consist of several components that interact in complex ways to provide services to users. In doing so, these systems go through continuous assessment of their context and configure themselves accordingly to keep user satisfaction high. A popular approach to design adaptive software systems is to perform variability modelling, for instance adopting a feature-based approach...
Customer demand for electricity supply is vastly increasing due to urbanization and changing needs. Thus electrical utilities need to accurately determine load profiles for different sectors of the supply area, so that new customers can be seamlessly added. To obtain such information a customer connectivity model needs to be developed and implemented such that historical customer data from various...
Security Risk Assessments (SRA) play a key role in the Security Development Lifecycle (SDL). At an early stage of the project, the SRA helps allocate security resources and identifies SDL requirements and activities. In this paper, we present key findings from a machine learning approach toward the SRA that seeks to learn from a database of previous product security risk assessments and associated...
Design models are widely spread as core artifacts in software engineering. Yet, a key problem is how to fulfill correctly these blueprint specifications when code components are developed. The best possible scenario occurs when a source modeling language can be perfectly linked to a target language of election. Namely, a well defined mapping bridges the gap between the source and the target language...
In order to increase the load capacity of aerostatic bearings, a kind of continuous slot-restriction aerostatic thrust bearing was designed and manufactured. The CFD simulation and experiment methods were both used for studying it; the data about the load capacity was derived from the two methods. The calculation results of the CFD simulation method were compared with the experiment ones. The following...
The approach to the intelligent modeling system development is proposed in the paper. Such system should be used for identification, classification and definition of the parameters of motion of marine facilities. Modeling system structure, conceptual model of modeling system and intellectual methods that are used for data processing are described. The ontology model is used for modeling system data...
This paper proposes the principle of classifier construction for software reliability models and assessment techniques. The classifier is built using a facet-hierarchical approach and allows systematizing scientific publications in the field of software reliability. The available publications for more than 50 years have been analyzed and classified by use of hierarchy of software reliability attributes...
This paper focuses on culture and software development tools issues with respect to the development of a proposed Culture Aware Reference Architecture (CARA) for the delivery of culture competent mobile oriented solutions through culture awareness. The paper presents a discussion of selected architectural design approaches, tools or methodologies that were considered and applied across defined architectural...
We describe a framework for relating available data on hazards to impact on infrastructure. It is designed to be used by simulation platforms that may focus on a single infrastructure layer or aim to study interactions between interdependent layers. The Hazard Impact Framework (HIF) provides a flexible scheme for capturing and maintaining data on the response of elements of critical infrastructures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.