The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The implementation of a low-cost electro pneumatic bank from an existing educational pneumatic equipment is exposed. The proposed bank operates with a PLC. To demonstrate its advantage, a stamping machine is simulated using Ladder and Grafcet language. This demonstration can simulate any machine or process requiring up to four electro pneumatic cylinders.
Preserving important troubleshooting experience gained in industrial practice, often referred to as “tribal knowledge”, and making it readily available to be re-applied in similar situations represent a serious challenge for many companies in heavy industry. The solution is very often tied to building mental models to capture and express key latent cognitive variables. In this paper, we first attempt...
A method for simulation of classic substitution ciphers for the purpose of their study in the learning process is considered. The method is based on the decomposition of the alphabets of the plain and encrypted texts. Implementation of the method has a two-level structure: the basic components are implemented using software, variation is part of the settlement. This allows user to simulate a wide...
We report an investigation of data analysis methods derived from other disciplines, which we applied to physics software systems. They concern the analysis of inequality, trend analysis and the analysis of diversity. The analysis of inequality exploits statistical methods originating from econometrics; trend analysis is typical of economics and environmental sciences; the analysis of diversity is...
Integrated evaluation of military software supportability was studied in this article, with the concept and classification of military software described, the relationship between software support and software supportability analyzed. Based on the analysis of the software supportability conceptual block diagram, the evaluation index systems of military software supportability were made and the index...
In software projects, there is a data repository which contains the bug reports. These bugs are required to carefully analyse and resolve the problem. Handling these bugs humanly is extremely time consuming process, and it can result the deleying in addressing some important bugs resolutions. To overcome this problem, researchers have introduced many techniques. One of the commonly used algorithm...
This paper studies a sensitivity analysis of the software project risk assessment model based on data envelopment analysis. Some sufficient conditions and necessary conditions are provided which can hold the efficiency of decision making units, when positive index data and reverse index data of decision making units are changed simultaneously. Finally, a numerical example is presented to give an illustration...
According to the gradual expansion of power grid scale and rapid development of computer technology, the dispatching automation and control system has played an increasingly prominent role in technique support and guarantee for power grid. In this paper we designed a kind of operating monitoring and evaluation software for the smart grid dispatching and control system, and described several key technologies...
Source code similarity measurement is a fundamental technique in software engineering research. Techniques to measure code similarity have been invented and applied to various research areas such as code clone detection, finding bug fixes, and software plagiarism detection. We perform an evaluation of 30 similarity analysers for source code. The results show that specialised tools including clone...
The first step of the K-nearest neighbor classification is to find the K-nearest neighbors of the query. A basic operation in calculating Jaccard distance is to count the number of ones in a binary vector - population count. This article focuses on finding the K-nearest neighbors in a high-dimensional Jaccard space. There are two main contributions. First, software methods for population count are...
LBlock is a lightweight block cipher designed for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel structure with SP type round function by 32 rounds. Its block size is 64 bits and key size is 80 bits. The designers show that LBlock is resistant against most classical attacks, such as differential and linear cryptanalysis. This paper proposed...
The color-word Stroop paradigm is a neuropsychological test often employed for the evaluation of the cognitive processing when a conflict between different attributes of the same visual stimulus is present. In clinical environments, the standard practice for the Stroop test administration is still based on paper supports and stopwatches. Thus, the aim of the present pilot study was to investigate...
Complex software appliances can be deployed on hardware with limited available computational resources. This computational boundary puts an additional constraint on software applications. This can be an issue for real-time applications with a fixed time constraint such as low delay video encoding. In the context of High Efficiency Video Coding (HEVC), a limited number of publications have focused...
To increase work efficiency of administration transaction, we have designed the Information-based management system of CHS. The system includes four subsidiary systems: The administration management handing system, evaluating system, searching system and statistics analytical system. The administration management handling system includes the application system of the CHS station(center), the examine...
Based on the analytic network process approach (ANP), a new evaluation method is using for college teaching, namely EM-ANP, is proposed in this paper. Compared with evaluation approaches of traditional college teaching, ES-ANP includes two kinds of steering group criteria and student criteria, and the interdependent relationship between two criteria. The conclusion shows that this kind of teaching...
To facilitate the sharing and combination of knowledge by Global Software Engineering (GSE) researchers and practitioners, the need for a common terminology and knowledge classification scheme has been identified, and as a consequence, a taxonomy and an extension were proposed. In addition, one systematic literature review and a survey on respectively the state of the art and practice of effort estimation...
Professional software products and IT systems and services today are developed mostly by globally distributed teams, projects, and companies. Successfully orchestrating Global Software Engineering (GSE) has become the major success factor both for organizations and practitioners. Yet, more than a half of all distributed projects does not achieve the intended objectives and is canceled. This paper...
This paper compares the Flexibility and Maintainability factors on open source Learning Management System (LMS) Moodle, Atutor, and ILIAS. This comparison is aimed to find out which LMS has the value maintainability and better flexibility in order to be used by agencies to consider implementation of LMS as well as useful for software developers to provide an overview of the capabilities of the source...
In the field of information security, risk assessment is the core of the risk management and control. This paper proposes a security risk assessment method based on threat analysis combined with AHP and entropy weight. This method has features that are suitable for website such as practical, easy operative and independent. And the AHP and entropy weight make the evaluation results more objective....
Embedded applications use more and more sophisticated computations. These computations can integrate composition of elementary functions and can easily be approximated by polynomials. Indeed, polynomial approximation methods allow to find a trade-off between accuracy and computation time. Software implementation of polynomial approximation in fixed-point processors is considered in this paper. To...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.