The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The information technology has experienced breakthroughs in recent years. Enterprises have begun to introduce information systems to help with business operations. Constantly or even perennially in use, high-tech computer equipments are showing hardware abnormalities or malfunctions on a regular basis. In view of the issue, this study utilizes a multifunctional integrative expert system to help maintenance...
Business activity monitoring (BAM) and business intelligence (BI) solutions are both intended to provide insight into the activities and performance of the enterprise. Deployment of such systems requires extensive tailoring to the enterprise, best left to experts. The dynamics of the enterprise demands a solution to the maintenance of BAM/BI solutions. This paper presents an ontology-based BAM-agent,...
With the increased recognition of importance of design for testability, there is an increasing trend toward the development of efficient test strategies for system maintenance. An important issue in practical situation is the imperfect nature of tests, i.e., the tests can have missed detections and false alarms. An error diagnosis may result in false removal and missed repair of the components, thus,...
During regression testing, a modified system needs to be retested using the existing test suite. Since test suites may be very large, developers are interested in detecting faults in the system as early as possible. Test prioritization orders test cases for execution to increase potentially the chances of early fault detection during retesting. Most of the existing test prioritization methods are...
The necessity of reusable artifacts was felt with the demand to produce larger and more complex software in shorter schedule and budget. The ultimate role of component-based software engineering (CBSE) is to develop the reusable artifacts or components and at the same time assembling the parts into one system, maintenance through upgrading, customizing or replacing components in the system. So, definitely...
Distribution center provides necessary logistics service for manufacturers and dealers, and the customers of the manufacturers or dealers usually change frequently. The new customers sometime require the bill of document modification, e.g. add a few information items or drop some items, but the logistics services do not changed, which means the information procedure need not been changed. The information...
In order to get high efficiency of code design and convenience of system maintenance, this paper applies the most advanced method, unified modeling language (UML) and model-driven architecture (MDA), on the development of the embedded system based on the MSC1212. Firstly, using Matlab/stateflow toolbox to model and simulate the complex event driven system in the embedded system introduced in this...
The component-based nature of large industrial software systems that consist of a number of diverse collaborating applications, pose significant challenges with respect to system maintenance, monitoring, auditing, and diagnosing. In this context, a monitoring and diagnostic system interprets log data to recognize patterns of significant events that conform to specific threat models. Threat models...
REportal is an existing Web-based reverse engineering portal Web site that provides access to a suite of reverse engineering and program comprehension tools via a Web browser. This abstraction was intended to allow ease of system maintenance by adding and upgrading tools without involving the end user. However, the software tools and server technologies used became deprecated so quickly that it was...
This paper gives a brief overview of the international workshop on semantic technologies in system maintenance. It describes a number of semantic technologies (e.g., ontologies, text mining, and knowledge integration techniques) and identifies diverse tasks in software maintenance where the use of semantic technologies can be beneficial, such as traceability, system comprehension, software artifact...
In many advanced industrial contexts, Collaborative Working Environments (CWEs) provide interesting opportunities to improve service and maintenance procedure, significantly reducing the time to repair and the risks related to system inactivity. The ASSYST framework aims to enhance existing CWEs by developing a novel maintenance paradigm based on the integration of augmented reality technologies and...
Several years ago, first generation model driven engineering (MDE) tools focused on generating code from high-level platform-independent abstract descriptions. Since then, the target scope of MDE has much broadened and now addresses for example testing, verification, measurement, tool interoperability, software evolution, and many more hard issues in software engineering. In this paper we study the...
Security facilities of information systems with high security requirements should be consistently and continuously developed, used, and maintained based on some common standards of information security. However, there is no engineering environment that can support all tasks in security engineering consistently and continuously. To construct a security engineering environment, a database that can manage...
An uninterruptible power supply (UPS) with high power factor and two conversion stages is suggested. The double-conversion configuration has three stages, but normally, only two stages are operating at the same time. The first stage of the proposed scheme integrates the power-factor-correction stage and the battery charger of the double-conversion configuration, obtaining a two-stage UPS. The second...
In this paper, we present a design of PRMCS (Pharos remote monitoring and control system), and study the communication protocols based on WSN (wireless sensor network) for PRMCS. The PRMCS is the integrated pharos system, consisting of RTU (remote terminal unit), control center, and sensors. Two communication patterns based on WSN are used in PRMCS, one is used on the control center, the other on...
Peer-to-peer system decentralization complicates performance monitoring-and real-time monitoring is particularly challenging. We discuss our experience with monitoring the Peer Name Resolution Protocol (PNRP), a peer-to-peer name resolution/routing protocol and overlay deployed over the Internet. We must collect accurate performance data without adding traffic overhead. Unfortunately, no central node...
Although there are already many researches on aspect-orientation software development from requirements to design and implementation, there is not a practical way for adapting aspects to current Object-Oriented System Analysis and Design (OOSA&D) process. This paper presents a means to model crosscutting concerns based on OOSA&D. The approach is based on use-case driven development. Aspects...
The aim of this paper is to introduce the basic principles. and concepts of evolvable assembly systems, EAS, represents a novel way of designing and implementing assembly systems in industry, and was first presented in 2002. The essence of EAS resides in the ability of system components to not only adapt to the changing conditions of operation, but also to assist in the evolution of these components...
Event-based communication can be considered naturally suited to support ambient intelligence and ubiquitous computing applications due to its asynchronous nature and due to loose coupling between application components. Event systems support different properties depending on the specific problem domain for which they have been developed. Using these event systems in a federated way, where events are...
The advent of and growing interest in service- oriented architectures (SOA) present business leaders with a number of problems. They promise to deliver hitherto unseen business process agility, but at the risk of making investment in existing systems obsolete. The established orthodoxy is that the maintenance problem presented by installed systems is about finding an acceptable balance between risk...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.