The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Regarding current Oil&Gas production places, an important challenge is to deal with the increasing complexity of shop floor level data on existing production processes and, beyond that, allowing their possible vertical integration. In order to reach this goal, an integration of smart cyber-physical production systems (CPPS) into the automation production systems could be a solution. In the last...
To study wireless network, a network simulator always is an important tool for researchers to evaluate their theories. If a selected simulator inherently has poor architecture, the maintenance, will become more difficult in the future. To increase the flexibility of a simulator's architecture, the use of design patterns as the norms of system architecture design is suggested in this paper. We propose...
Models are primary artifacts in software development which influence the quality of the process and product. While students are trained to use design and development methodologies few teaching approaches address how they should create and evaluate alternative models to find a good solution. This paper suggests to complement common teaching formats with facilitated modeling sessions where small groups...
Program dependency artifacts such as call graphs help support a number of software engineering tasks such as software mining, program understanding, debugging, feature location, software maintenance and evolution. Java Enterprise Edition (JEE) applications represent a significant part of the recent legacy applications, and we are interested in modernizing them. This modernization involves, among other...
Auto-completion of textual inputs benefits software developers using IDEs. However, graphical modeling tools used to design software do not yet provide such functionality. The challenges of recommending auto-completions for graphical modeling activities are largely unexplored. Recommending such auto-completions requires detecting meaningful partly completed activities, tolerating variance in user...
Automatically pinpointing those classes in an object-oriented program that implement interesting domain concepts would be valuable for industrial software maintainers. We encode two observations of programmer behavior in Reoom, a novel light-weight static analysis. In a comparison with its most closely related competitor, Womble, on third-party open source applications, Reoom scaled to larger applications...
Partial system specifications give rise to design spaces: sets of designs that satisfy specified constraints but that can vary in other dimensions, including non-functional properties such as performance. A tradespace is a design space where each design is paired with its relevant corresponding properties. Exploring tradespaces to find high-value designs is hard and time-consuming. The software engineering...
Over the past few decades, IT industry has faced the difficulties of evolving their software systems in order to live on the market and to compete with similar software systems. For software systems to live on market, they should derived new additional design requirements and concert themselves to the new evolving environment. Evolvability is most crucial and essential attribute to evaluate the software...
Component-based software platforms likeOSGi facilitate the development of complex software. As software systems become more complicated, tool supportis often a necessity for assuring the conformance betweendesigned and implemented architectures. We present ARTOS, an architecture toolkit to facilitate the design and conformanceanalysis of the software running on the OSGi platform. Thetoolkit consists...
Internet of Things (IoT) is a rapidly developing technology that provides comfort, safety, and economy in humans' everyday life. Due to its close relation with humans' living environment, this technology may submit the private life to increased threats. Therefore, security is a key factor in IoT. In this work, we propose a mechanism that, by applying threat and risk modeling, provides a tool for the...
Detecting refactorings in Object-Oriented Models (OOM) is essential to automate the repair, maintenance, and migration of OOM-related products. However, detecting refactorings is challenging since multiple sequences of atomic changes may define a single user intention and refactorings may overlap over the atomic change trace. In this paper, we present AD-ROOM an Eclipse-based tool to automatically...
Recently, Technical Debt (TD) has gained popularity in the Software Engineering community to describe design decisions that allow software development teams to achieve short term benefits such as expedited release of code. Technical debt accrued should be managed to avoid the disastrous consequences of these temporary workarounds. Management of technical debt involve documenting the debt item in the...
We discuss our experience in use of models and model-driven techniques for developing large business applications. Benefits accrued and limitations observed are highlighted. We describe possible means of overcoming some of the limitations and experience thereof. A case for shift in focus of model driven engineering (MDE) community in the context of large enterprises is argued. Though emerging from...
Complex situations and systems can be studied by using adequate models in simulation. An important aspect of models and the simulation software is the ability to use a wide range of possible input parameters. The simulation described in this paper is based on agile manufacturing by using transport robots and cheap reconfigurable production platforms, called equiplets. This setup makes agile manufacturing...
Software defect prediction provides actionable outputs to software teams while contributing to industrial success. Empirical studies have been conducted on software defect prediction for both cross-project and within-project defect prediction. However, existing studies have yet to demonstrate a method of predicting the number of defects in an upcoming product release. This paper presents such a method...
Energy is very important for a country for both its economic growth and socio-economic development. The main source of energy is fossil fuels. However, the use of fossil fuels has severe effects on environment like emission of greenhouse gasses. These diverse effects have leads to the demand of renewable energy resources. Renewable energy sources like wind, solar, hydro based energies, etc. are environment...
As digital life became more intertwined with our daily activities, humans developed an increasing reliance on cloud computing to sync data between all their devices, acquired 24/7 access to information through the internet, as well as the ability to share data from anywhere using a variety of methods. Predictably, technology began to exert its influence in education, with new practices of large-scale...
Requirement engineering literature exemplifies the description of attributes and practicalities of the target system. Software requirements may ambit from high-level academic affirmation or restraint of a system to elaborated statistical functionalities. This paper exhibits the current practices of requirement process at Companies. A survey of ten companies is conducted with the assistance of definitive...
Most code-based quality measurement approaches are based, at least partially, on values of multiple source code metrics. A class will often be classified as being of poor quality if the values of its metrics are above given thresholds, which are different from one metric to another. The metrics thresholds are calculated using various techniques. In this paper, we investigated two specific techniques:...
Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.