Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Methods of Computer Algebra have shown to be useful when formally verifying data-centric hardware designs. This has been demonstrated especially for cases where complex arithmetic computations are tightly coupled with the system's control structures at the bit level. As a consequence of current design trends, however, more and more functionality that was traditionally implemented in hardware is now...
This article considers the basic methods of telecommunication networks modelling, along with the relevant software tools. The expediency of using UNetLab, a new software product for simulation modelling, has been proven. This software is used for the creation and analysis of virtual laboratory-oriented experimental testing benches of telecommunication networks. The article formulates general basic...
It is well known that not all intrusions can be prevented and additional lines of defense are needed to deal with intruders. However, most current approaches use honeynets relying on the assumption that simply attracting intruders into honeypots would thwart the attack. In this paper, we propose a different and more realistic approach, which aims at delaying intrusions, so as to control the probability...
Recent years people have witnessed a surge of interest in APT attack, due to its complex and persistent attack characteristics. In order to prevent APT attacks, this article studies and analyzes a large number of APT attack cases which have been disclosed, gives an overview of APT attack lifecycle and attack techniques. This paper discusses the purposes of APT attacks and APT attack characteristics...
Interior design is the refinement and extension in space for the architectural design, which is a cross-disciplinary that is an aspect of the collection of space, style, color, lighting, material. Due to the development of the virtual reality technology and programming software, making indoor designer has conditions to create a more realistic and humanized interactive virtual display platform, which...
Sustainable software is a software that able to work in a constraint environment. For example, a classroom without Internet facilities or unstable connection; a field trips; a meeting room or discussion room with inadequate computer facilities and power and etc. In this case, how to enabling a daily activity within such situations without losing the benefits of computer support? This paper presents...
Recent years have seen explosive growth in information security problem. Trusted computing is increasingly used in the fields of information security. The basic idea of trusted computing is different from traditional security method. In other words, system abstracts normal behavior and compare with real-time behavior. Most of the current research focuses on static integrity metrics. However, it is...
Training simulation is broadly used in military training but not limited. The simulation environment contains so many elements and so many factors affect the result, so an effective and efficient mechanism to help to manage these factors is required. This article firstly listes the elements in the environment, and then builds the object models of all kinds of objects. Based on these object models,...
Digital Game-Based Learning (DGBL) is becoming increasingly prevalent. Its participant-players are in millions and its revenues are in billions of dollars. There is a gap in how effectiveness DGBL software is to encourage students in learning and increase their motivation in learning process. This paper aims to discuss children and teenagers' education with DGBL software and the motivation design...
As a kind of critical system, safety-critical system is always used for the key areas such as aerospace, national defense, transportation, nuclear energy, health and so on, which require the high security. Due to the inherent defects which caused by the complexity of the organizational structure, and the external threats which caused by the open and dynamic environment, some unexpected results will...
Software process improvement (SPI) aims to increase the quality of the software products or service. There are many software standers for software process improvement must be implemented during development process to achieve software quality characteristic such as functionality, reliability, efficiency, operability, security and maintainability on the other hand to reduce the development effort. There...
This study investigates performance difference between a new bandrol tracking system designed using Model-View-Controller, Model-View-Presenter and Proxy patterns and the bandrol tracking system which TRT (Turkish Radio Television Corporation) currently uses and which was designed without using the aforementioned design patterns. The study concludes that the use of design patterns increases the testability...
Embedded computer system architectures are distributed, layered and heterogeneous. Development progressesthrough a series of model refinements with varying levels ofdetail in different subsystems. Different requirements modelsand scheduling methods are used for different functions andequipment. Today there is no single schedulability tool that cananalyze all of them. This paper describes an open compositionaltiming...
This paper focuses on improving and build a discrete event simulation model for modeling outpatient pharmacy workflow queuing system with the intent of exploring options for designing an efficient the queuing system of KKUH outpatient pharmacy Riyadh KSA. Simulation models of existing workflows in the pharmacy for KKUH outpatient pharmacy were created using discrete event simulation software (Arena)...
As software and hardware have grown in functionality and complexity, the existing computer systems are confronting serious challenges with safety, dependability and reliability. Being one of the primary causes with responsibility for these challenges, the software-hardware interaction is advanced and widely studied in recent years. Unfortunately, none of the state-of-art researches has achieved widespread...
One major problem in service design is the limited availability of information gathered during the development process. In particular, information on end-user requirements is difficult for designers, developers, and maintainers to access. Here, we provide a mechanism that supports the gathering and modeling of various types of information throughout the service and software development life cycle...
This paper describes a statistical method for test completeness verification. The method is based on analyzing programs and mathematical models of discrete devices with introduced defects. It is proposed in the paper that the method allows largely reducing the time it takes to evaluate the tests by introducing multiple defects on the one hand, and, by using the results of the analysis of tests performed...
This paper presents the first computer aided software analysis tool based on HOOMT (High Order Object-oriented Modeling Technique), which provides facilities for structured object-oriented analysis by integrating structured analysis and object-oriented analysis. It contains a graphical user interface for HOOMT-based modeling, supports modeling information management, and provides functionalities for...
Network-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this...
The paper proposes a control-theoretic framework for verification of numerical software systems, and puts forward software verification as an important application of control and systems theory. The idea is to transfer Lyapunov functions and the associated computational techniques from control systems analysis and convex optimization to verification of various software safety and performance specifications...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.