The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aiming at the deficiency in the field of marine engineers training at present, an entire virtual training system for marine engineers has been designed and developed, which is composed of the full mission marine engine room simulator module and three-dimensional virtual marine engine room module, respectively aiming at cultivating the operating ability for marine engine room system and marine engine...
The sizes of databases are increasing every day. Hence, now days, accessing data in an acceptable time is one of the biggest challenges in centralized database. In centralized databases, the records can be categorized according to the access frequencies; least accessed records (cold data) and most accessed records (hot data). In a study it shows that more than 90% cases query are requested for hot...
Currently multiple Domain Specific Languages (DSLs) are used for model-driven software development, in some specific domains. Software development methods, such as agile development, are test-centered, and their application in model-based frameworks requires model support for test development. We introduce a specific language to define generic test models, which can be automatically transformed into...
The cooperative edition of (meta)models may be enacted by the exchange of change operation journals between the participants. But these are often composed of atomic operations (create, delete, set, …) that have no useful meaning for the users. Hence, detecting and recovering composite operations is a crucial step to help users understand the history of their (meta)models in terms of higher level operations...
In modern systems there is a desire to create Test Program Sets (TPSs) in multiple languages. However, most Automatic Test Equipment (ATE) is designed with only one test executive in mind and the exclusion of all others. This paper discusses a proven design to allow for Multiple Test Executives (MTE) on a single system. In addition, the test executives are divorced from the operator or maintainer...
Modern SoC designs incorporate several security policies to protect sensitive assets from unauthorized access. The policies affect multiple design blocks, and may involve subtle interactions between hardware, firmware, and software. This makes it difficult for SoC designers to implement these policies, and system validators to ensure adherence. Associated problems include complexity in upgrading these...
Any small defect is not permitted in the industry, so PLC real-time engine performance is very important for industry robot control system. Because these industrial characteristic, a new untested system can't be used in real field.
Objectives: Digitalization of maternal and post-natal care system (DigiMAPS) is a system consist of electronic medical record for mother and children health (KIA) also for tele-consultation facility called “Tele-Obgyn”. Our project focuses on the development of KIA Online and a cloud computing-based video conferencing as a basis of Tele-Obgyn platform. The web-based network allows online access not...
The use of Network Function Virtualization to run network services in software enables Software Defined Networks to create a largely software-based network. We envision a dynamic and flexible network that can support a smarter data plane than just simple switches that forward packets. This network architecture needs to support complex stateful routing of flows where processing by network functions...
In Multi-Agent Systems, first-class interaction protocols are the ones which implementations are decoupled from the agents. This paper introduces and establishes the contribution of RPI.Idiom which is a high-level language for specifying such protocols. RPI.Idiom interaction protocols satisfy several properties. They are role-based which means that they are abstract in regard of the agents. They can...
Malware can spread uncontrollably if left unchecked and can cause significant damage to the Advanced Metering Infrastructure (AMI) and ultimately to the underlying power grid. Application layer protocols used in the AMI are capable of carrying large payloads which could be potentially used to hide malware. Fortunately, application layer traffic in the AMI is not expected to contain executable content...
In this paper, the customized team matching system for revitalizing the athletics in public is proposed in smart device environment. The proposed system, CTMS, Customized Team Matching System, collects profiles of community sports teams, analyzes those profiles, and recommends customized sport team. The proposed system is expected to design new service model which will improve revitalization of community...
This article refers to a study on the behavior of an internal combustion engine of a vehicle when you add oxyhydrogen (HHO) as a supplementary fuel, produced from a modified alkaline type electrolyzer, called HHO generator. The first stage consists of a theoretical and experimental analysis of what happens in the internal combustion engine by adding the oxyhydrogen. As a result of this first stage...
The rationale behind domain specific modeling in software engineering is to raise the level of abstraction while boosting automation in software production. Domain-specific languages (DSLs) typically fall into two categories: high-level, script-like languages and visual modeling languages. The code generation engines that come with them are capable of translating what are written (or visually expressed)...
This article is concerned chiefly with a software integration architecture for providing a large-capacity collective memory layer on a multi-node system by using a remote direct memory access technique and a software virtualization technique. Major components described by the architecture include a memory region management module, a large-capacity collective memory service module, and a data cooperative...
Mission critical embedded software for autonomous operation requires high development cost due to its long development cycle. One of the potential solutions for reducing the cost is to reuse the software developed at previous missions. Virtual machine platform such as JVM is a good example to provide code portability across various missions. Flight software in aerospace field is adopting this concept...
The progress of computer aided testing technology brings new development opportunity of aero-engine synthetic test. In order to improve aero-engine synthetic test level, a taken aero-engine synthetic test system is designed using advanced testing technology. User requirements of current situation are introduced, and then system function of test system is given, also related key technology is analyzed...
Malware polymorphic and metamorphic obfuscation techniques combined with so-called "sandboxing evasion techniques" continue to erode the effectiveness of both static detection (signature matching), and dynamic detection (sandboxing). Specifically, signature based techniques are overwhelmed by the sheer number of samples generated from a single seminal binary through the use of polymorphic...
The use of simulators on Intelligent Transportation Systems allows to recreate transit situations from real data; evaluation of algorithms without put at risk the people and assets; and analyze driver behavior on controlled experimental situations. This work shows the development of a simulator from a virtualized environment, using strategies of image processing, and a game engine which offer support...
Naming conventions can help the readability and comprehension of code, and thus the onboarding of new developers. Conventions also provide cues that help developers and tools extract information from identifier names to support software maintenance. Tools exist to automatically check naming conventions but they are often limited to simple checks, e.g. regarding typography. The adherence to more elaborate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.