The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Process of development complex electronic control units (ECUs) is usually complex and requires several iterations (releases). After each iteration, it is necessary to perform detailed testing and verification of all components in a testing environment that is as similar as possible to the real system. For this kind of testing it is recommended to use the automated testing environment that generates...
Heterogeneous rectangular dissections are frequently used in information processing such as multiple paged books in spread sheet languages and multi-layer image data. In previous studies, a hexadecimal grid graph model was proposed for multilayer rectangular dissections and certain algorithms were provided. In this paper, we propose a 16-ary list structure to implement their algorithms for the hexadecimal...
Software security assurance is an important process in software development that protects the sensitive data and resources contained in and controlled by the software. Addressing security vulnerabilities at an early phase could decrease the cost of addressing them in later stages by two orders of magnitude. In order to detect vulnerabilities in Web services and Web applications in a scalable and accurate...
Over the past decades the pico/nano-satellite (PNS) has gradually become an important direction of small satellites. As a crucial subsystem of PNS, the attitude determination and control system (ADCS) should pass a full set of strict ground tests before launch. Due to the low cost and short period of PNS manufacturing process, as well as the requirement of “test while designing”, this paper presents...
Test case prioritization is a technique for selecting those test cases, which are expected to outperform for determining faulty modules earlier. Different phases of software development lifecycle represent the total software from different point of views, where priority module may vary from phase to phase. However, information from different phases of software development lifecycle is rarely introduced...
Finite element meshes are the basic data structures of engineering analyses and simulations. Unfortunately many different kinds of finite element mesh formats exist. These different formats can make it difficult to handle the meshes in several aspects, for example when the same simulation should be checked and validated by another program or to preserve these data for long term. For both cases the...
Owl Computing Technologies provides software and hardware that facilitates secure unidirectional data transfer across the internet. Bash scripts are used to facilitate customer installation of Owl's client/server software, and to provide high level management, control, and monitoring of client/server interfaces. With the evolution of more robust scripting languages, Owl now wishes to convert their...
Logs are the files which contain the information about all the events occurring on the system. Logs have been playing a vital role in providing all kinds of information which can be used for several purposes like detecting a suspicious behaviour over the system. The aim of this paper is to study, analyse and generate results by observing host. Log files consist of different header information which...
This paper explores an effective solution for a test configuration to perform system-level manufacturing tests without use of system management/user interface software of system under test (SUT). A generic, computer aided and modular test configuration, which acts in combination and in an integrated way with the management unit(s) of the SUT over Ethernet connectivity is proposed as a solution. Using...
The use of serious educational games has many advantages, offering immersive, engaging and fun environments that require deep thinking and complex problem solving within a construct of overcoming obstacles and challenges. Developing new games, however, to support broad and rapidly evolving disciplines has remained time consuming, expensive, and requiring the expertise of game designers, software developers,...
Abstract Syntax Trees (AST) are useful to understand program semantics. Data flow analysis of interests to program developers. In this paper we use effectively AST to reveal data flow information. Computer programs larger part in static form is declaration of data. Analyzing data dependency helps to design and development of source programs. We consider data flow analysis with more importance and...
Universality has long been an important standard to measure software. Universality means not only further applicability and the viability of transplant but also reduction of repeated development. The problem that discordance of different model of plane will surely catalyze the various simulation tasks will surely encounter. Current engineering flight simulation platform, in terms of functional versatility...
This communication is part of a comprehensive study of theoretical and practical research that deals with the basics they need to have students in grades Computer Engineering, in their different specializations, in order to acquire the competences in the different plans study. Specifically, we have used data on concepts about Databases 18 curricula in Computer Grade Spanish public universities, among...
Copy Plagiarism detection is one of the important problems in both fields of computer software theory and computer applications technology. In this paper we summarize the methods and status of technical development about plagiarism detection, actively explore kinds of applicability under the framework of syntax tree, and conduct the research of multi-strategies integration and evaluation mechanism...
Educational Modeling Languages (EMLs) provide the framework to represent learning processes in a formal fashion. The IMS-LD is a widely used EML and there have been created several tools to facilitate the authoring process of a course for that specification. However, since most of these tools are meant to be IMS-LD complaint they are also restricted by its level of expressiveness. To solve this issue,...
Open source applications have flourished recent years. Meanwhile, security vulnerabilities in such applications have grown. Since manual code auditing is error-prone, time-consuming and costly, it is necessary to find automatic solutions. To address this problem we propose an approach that combines constraint-based analysis and model checking together. Model checking technology as a constraint solver...
In the Web applications it is difficult to directly edit the complex mathematical formula online, which has greatly affected the full application of physics, mathematics. At present, there are some alternative solutions, but they have some kinds of flaws not to widely apply. In this paper, the mathematical formula editor of MSOFFICE WORD is called to combine with XML markup language to be fully compatible...
Weak self-defense ability of network security system would threaten the computer data security. This paper presents the design and implementation of a daemon which can enhance the self-defense ability of the network security system. Using plugin and config file, this daemon has good scalability and maintainability.
Data query plays an important role in the information application system. Data query in the traditional design method need to be constantly redesigned with the change of user requirements, which increases the workload of system development, reducing development efficiency and software reuse. After abstracting and extracting the common elements of the query, a scalable, flexible configuration, reusable...
With the development of network technology in modern society, various industries have raised their own standards, the standard test is the test information generated by the system description model to xml standards to judge whether the information system standards. This paper proposes an agile software development method in the domain of digital standard test: component-based product line, and designs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.