The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The study of historical monument needs a great care especially for the old object. Along with current technologies, allowing the object studied scanned in three dimensions. To make the objective achieved, the digital form of objects studied has almost become mandatory for simplicity of study and also variety of analysis. For various scale of objects that present everywhere, hardware and software equipment...
Records and information in conventional inventory management system are usually written in manual and kept in ledger books. There are cases where the ledgers are misplaced and even lost. For a new campus like Fakulti Kejuruteraan Elektrik Kampus Pasir Gudang (FKE PG), many new equipment and components being purchased for teaching and learning purposes. A proper inventory management system is needed...
With the development of worldwide large experimental facilities, like particle accelerators, confinement fusion equipments, and astronomical telescopes, both the type and the amount of devices or instruments have increased significantly, which contributes to a large-scale heterogeneous system. It is challenging our current control system, and requiring a more efficient pattern, in terms of both control...
Feature modeling is of paramount importance to capture variabilities and commonalities within a software product line. Nevertheless, current feature modeling notations are limited, representing only propositional formulae over attributed variables. This position paper advocates the extension of feature modeling formalisms with richer computational domains and relational operations. In particular,...
The paper deals with the verification of reconfigurable real-time systems to be validated by using the Object Constraint Language (abbrev, OCL). A reconfiguration scenario is assumed to be any adaptation of the execution to the system environment according to user requirements. Nevertheless, since several behaviors can be redundant from an execution to another, the use of OCL is insufficient to specify...
Oil is one of the most important energy sources in the world, due to the uneven distribution of it, its transportation is an important step in the process of oil production. With the development of information technology, the traditional way of pipeline transportation has been unable to meet the requirement of high speed and high accuracy of product oil transportation process. A fuzzy PID control...
Relationship Based Access Control (ReBAC) has been recognized as a distinctive form of access control since the advent of online social networks (OSNs). In the OSN context, ReBAC typically expresses authorization policy in terms of interpersonal relationship between users. OSN-inspired ReBAC models primarily focus on user-to-user relationships, although some have also considered user-to-resource and...
Closed-loop model checking, a formal verification technique for industrial automation systems, increases the richness of specifications to be checked and often helps to reduce size of the state space to be verified compared with the open-loop case. To be applied, it needs two components — the controller and the plant models — to be coupled. While there are approaches for obtaining controller models...
This paper presents a step by step model based approach (Re2Code) allowing the translation from Problem Frames, supporting requirements, to executable code for embedded controllers. The approach uses a set of heuristics to translate Problem Frames diagrams and requirements, into executable Input-Output Place-Transition (IOPT) net models, which take advantage of concepts available in IOPT nets, namely...
We present a platform that enables a service drone to guarantee reliability for mission completion and to update an application while in flight, using a robot operating system (ROS). The ROS is a flexible framework for writing robot software. It is a collection of tools, libraries, and conventions that aim to simplify the task of creating complex and robust robot behavior across a wide variety of...
This paper describes the qualification test guide (QTG) items made for a small, single engine, and commercial aircraft during the evaluation of simulator by any regulatory authority before the simulator can be used to train the student pilots. The test items described here are listed in Federal Aviation Regulations part 60. Out of those, the static control check tests are explained in detail since...
Compared the mechanical adjustment with hydraulic position closed-loop adjustment, the structure of mandrel supporting device of rolling tube machine is analyzed in this paper, then the AMESim software is applied to model the position closed-loop control hydraulic system dynamics based on its structure parameters, where the simulation results play an important role in designing the hydraulic control...
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting of both SDN and legacy switches may be a tradeoff. Nevertheless most of the current SDN control planes can not handle legacy switches. To overcome this problem, we present HybridFlow,...
Software-defined networks (SDNs) only logically centralize the control plane. In reality, SDN controllers are distributed entities, which may exhibit different behavior on event triggers. We identify several classes of faults that afflict an SDN controller cluster and demonstrate them on two enterprise SDN controllers, ONOS and OpenDaylight. We present JURY, a system to validate controller activities...
Computer networks such as the Internet or datacenter networks have become a a crucial infrastructure for manycriticial services. Accordingly, it is important that such networkspreserve correctness criteria, even during transitions from onecorrect configuration to a new correct configuration. This paperinitiates the study of how to simultaneously update multipleroutes in a Software-Defined Network...
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not!) been taken by their packets. Rather, it seems inevitable that as soon as a packet leaves the network card, the user is forced to trust the network provider to forward the packets as expected or agreed upon. This can be undesirable, especially in the light of...
In Software Defined Networking (SDN), the configuration inconsistency during updates is one main source of network instability. An efficient updating scheme with configuration consistency is required. In this paper, we propose the scheme of Fast Incremental Consistent Update for SDN (FICUS) based on the relation graph (RG). In our scheme, we analyse the relation between update operations, construct...
Today's carrier-grade networks are highly resilient and provide close to 4 9s end-to-end availability for various services. Going forward it is expected that Software Defined Networking (SDN) will be deployed in carrier networks to offer dynamically programmable services with an equivalent, or even higher, expectation of service availability. Though SDN, with the separation of the control and data...
The vulnerability of industrial control systems (ICS) to electronic intrusion and malware has recently been well documented in both the technical and popular press. Despite significant attention and much progress over the past 15 years, threats continue to evolve about as fast as preventive solutions. This paper reviews the root causes of ICS cybersecurity vulnerabilities, looks at some common defensive...
It is needed to restructure the static internetwork to more flexible networking environment. Today's infrastructure is not able to change according to fast changing requirements of the users. Due to this there is an introduction of Software Defined Networking (SDN) and OpenFlow (OF) architecture in the year 2005 to modify today's static environment to dynamic one. This concept helps to have programmability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.