The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-Defined Networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding, the rules in the flow table should reside in the forwarding plane as much as possible to reduce the chances of consulting the SDN controller, which is a slow process. The rules are usually cached in the forwarding plane with a Ternary Content Addressable...
The purpose of this paper is to introduce a set of automatic feeding system in the tank area, to achieve a variety of material handling precision control. This paper introduces the composition and function of the system and describes the characteristics and application of PCS7 software in the automatic feeding control system. The system was designed and developed based on Siemens PCS7 software. The...
A process graph is a graph designed to visually explain the action of programs which make use of the fork and wait system calls. We outline a tool that automatically generates process graphs for a class of C programs. The key idea behind our tool is to use a program's control flow graph (CFG) to determine its process graph.
The present paper is a brief history of the evolution of HPC at a research institution in Argentina. In addition to the historical review, we would like to show that two components are necessary in important projects: knowledge and Government's interest.
The learning of reading is one of the challenges of school and one of its most important activities, because reading is the basis for other school activities and a fundamental element for the exercise of citizenship. The applied behavior analysis have been useful for the development of reading and writing instruction programs by means of two paradigms: the stimulus equivalence that seeks to identify...
In order to better manage the software evolution in CBSE, this paper proposes a framework and its prototype supporting system from the technical and process management perspective. This framework integrates several components including software change control and tracking by defining the change template based on a process engine. The framework not only can support software evolution information collection...
Continuous analysis technique Audit as presented in this article to speed up the audit process aimed at reviewing controls, risk management and detection: fraud, suspicious and unusual transactions, errors, etc. The implementation is done by using CAATs (Computer Assisted Auditing Techniques) and a case of payroll where through the use of these techniques is facilitated illustrated: detecting variations...
In this paper, a complete set of real-time monitoring system of MAA hydrolysis reaction based on WinCC configuration software is designed, which is based on the automatic control system of MAA hydrolysis reaction of Zibo Xinhua Pharmaceutical. And this paper introduces the characteristics of SIEMENS WinCC configuration software, and expounds the structure and functions of the system and the application...
One of the most important segments of the university education process management seems to be the student knowledge verification as well as support of the monitoring and assessment of the quality of educational programs and related processes. The organization of the examination tests, as well as, the process and methods of student knowledge verification can take a lot of time. This paper elaborates...
Cyber-Physical Systems (CPS) are yielding novel problems and solutions for security researchers. CPSs connect computerized controllers and human supervisors with physical systems used in the energy, transportation, water, manufacturing, and other sectors. Recent attacks against CPS have prompted unprecedented investigation into new threats and mitigations against CPSs. There are motivating examples...
Military computers have been widely used for Defense System Technologies projects during the last decade in ASELSAN, the leading defense industry company of Turkey. A military computer design is reused for new projects as long as it meets the requirements, but as processor technology evolves and different project requirements arise, the need for a new design becomes inevitable.
The major cause of IT security incidents are software issues, hence this article presents an automated approach for source code partitioning and privilege separation. Based on static call graph analysis, functions and program parts of a monolithic software are separated in several processes and grouped by the privilege they need. For the partitioning we introduce a metric that estimates the potential...
Digital storage oscilloscope (DSO) is, with applied far going, high sampling frequency and measuring accuracy, a common testing instrument in signal acquisition and processing. While many DSOs are used together to measure multi-channels of signals, there exist some problems in synchronous comparing, acquisition, storage and plots of different signals. In order to solve these problems, the features...
The Boundary Scan (BS) technology is widely used in the testing and debugging of Printed Circuit Boards (PCBs), being employed in various phases of product manufacturing and contributing to a very pronounced cost reduction when compared to alternative test techniques. Also, the BS technology is frequently used as a pedagogical tool. This technology is presented on a "Debug and Test of Electronic...
In the USSR the IT industry was conceived at the end of 1960-ies primarily within Universities and specialized R&D institutions of the Academy of Sciences and industrial Ministries. The paper provides a description of how a formalized process of industrial software development was established. The author's personal experience in disseminating the CMM/CMMI maturity models in the USSR and Russia...
In the era of knowledge economy, big data storage requirements greatly promote the rapid development of storage technology. In this paper, we put forward the intelligent network storage disks, they are cluster storage system. It is a novel storage way on the big data, cluster storage system resolve the problems such as the big data storage, access, protection and management. They have developed the...
Software Cybernetics emphasises controlling software while Creative Computing emphasises being creative, in the whole software life cycle. It seems that they conflict each other. Nevertheless, controlling and being creative are almost the two most important aspects in software development and evolution. This paper discusses how best to combine these two aspects in improving software by proposing models...
Access control is one of the most widely used smart card applications on university campus. With the increase of smart card access control applications, it's more and more inconvenient and costly to build, use and maintain traditional client-server smart card access control system. In order to solve these problems, we propose the design of a web-based multi-level smart card access control system....
Industrial control computers can be connected to the Internet, and equipped with a Web interface. This enables access to process data from any computer with a set of common web-related software applications. This paper deals with laboratory exercises performed as a part of courses regarding process control computers, which include tasks dealing with this topic. Integration of Java and HTML technologies...
Software evolution is an essential activity that adapts existing software to changes in requirements. It has played a central role in the overall software lifecycle in recent years. It is generally acknowledged that the software employed in real-world environments must continuously evolve and adapt. Many studies, on the other hand, have suggested that software evolution consumes a large part of development...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.