The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the automotive industry, as the complexity of electronic control units (ECUs) increase, there is a need for the creation of models that facilitate early tests to ensure functionality, but there is little guidance on how to write these tests in order to achieve maximum coverage. Our prototype CANoe+, which builds on the CANoe and GraphWalker tools, was evaluated against CANoe with regard to coverage...
Searching for code examples on the internet is commonly and frequently performed by software developers but wastes a lot of their time and reduces their productivity. To aid developers with this problem, a system is needed that can allow them to get appropriate code recommendations for reuse within the IDE. In this paper, we present our prototype tool CodeEase, developed as an Eclipse plugin, which...
This paper concentrates on the control of the pH value of a liquid using Ph Neutralization plant and to control the liquid level using a Split Range plant. The control methods used are PID control and FUZZY control. These two controllers are subjected to prototypes of both the process plants. The results are presented and the best controller is suggested. The whole programming is done using LabVIEW...
The use of Application Programming Interfaces (APIs) is pervasive in software systems; it makes the development of new software much easier, but remembering large APIs with sophisticated usage protocol is arduous for software developers. Code recommendation systems alleviate this burden by providing developers with a ranked list of API usages that are estimated to be most useful to their development...
Research in software repository mining has grown considerably the last decade. Due to the data-driven nature of this venue of investigation, we identified several problems within the current state-of-the-art that pose a threat to the external validity of results. The heavy re-use of data sets in many studies may invalidate the results in case problems with the data itself are identified. Moreover,...
A monitoring and control system is being developed for the Aperture Array Verificaton System (AAVS) prototype of the Low Frequency Aperture Array (LFAA) component of the Squatre Kilometer Array (SKA). This software system will have to continuously monitor hundreds of thousands of antennas; schedule, run and monitor observations; control the data flow within the element and outwards; and provide the...
This paper proposes a multi-lingual enhanced Rapid Serial Visual Presentation (RSVP) system named “MulLinR,” which is an attempt for language-specific problems of existing RSVP tools. We design and build a prototype system, which currently only supports Japanese, and experiment with variation of presentation time intervals. Experimental results suggests 400 milliseconds is the most suitable time interval...
The On-Board computer (OBC) in CubeSat is the subsystem which acts as a bridge that connects the other subsystems with each other. It supervises many of the tasks that are done by the different subsystems of satellite and performs housekeeping and monitoring to ensure the health and status of those subsystems. The hardware and software design of the OBC mainly depends on the mission of the CubeSat...
Currently, tech Startups are most interested in group of a new businessman also they turn to do a lot of Startup which is business to focus on software-based. From the survey found that both successful and failed. One of reason came from working within does not have regulatory system, including any appropriate plan, unclearly goals and problems with colleagues. Therefore, this thesis proposes Scrum...
Current network protocol binary software testing methods cannot discover serious vulnerabilities in deep states. This article introduces a novel method based on multi-packet symbolic execution, which can drive the software to deep states, to test the whole network protocol binary software stacks. This article also presents a prototype system, S2EProtocol-multi, upon Selective Symbolic Execution (S2E)...
In the past few years, significant progress has been made in using software defined networking to increase automation, improve network security, simplify network configuration and reduce human effort to establish and maintain the network. There are now a vast number of studies exploring how to utilise policies to achieve the above goals. In this paper, we apply policy defined networking to wireless...
The forest ecosystem is essential for supplying natural resources to the flora and fauna. The forest is an irreplaceable sanctuary, although currently it is exposed to illegal logging by greedy human beings, and this has significantly affected the forest. As a result of this illegal activity, unhealthy phenomenon has surfaced. Hence, the methodology of this research is concerned about developing a...
The colors of characters suitable to presentation slides were proposed. Here, five color combinations were proposed. A combination has three colors of base, main, and accent colors. The base color is for the background. The color white is used as the base color. The main color is for the part becoming the frame. The accent one is for the place where we want to emphasize. This paper proposes two methods...
The vulnerabilities existing in network protocol implementations are difficult to detect. The main reason is that the state space of complex protocol binary software is too large to explore. This paper proposes a novel approach that leverages selective symbolic execution to test network protocol binary software directly, which confines symbolic execution in the secure-sensitive area. This paper also...
In this paper, the correlation between the speech features of the vowel /a/ and depression severity was investigated, so as to derive a depression severity meter mobile application that can accurately detect depression quantitatively. Results showed a correlation between depression severity and speech features, and an application prototype was created and tested to assess for predictive accuracy of...
This study develops a unified pedagogy for the design and evaluation of e-learning software for high-school Computer Science. In accordance with the pedagogy, prototype e-learning software was developed for use in student instruction and independent learning. The pedagogy was iteratively refined based on the evaluation of teachers and education experts and the resulting e-learning software was developed...
This paper proposes an interactive annotation technique for 360° videos that allows the use of traditional video editing techniques to add content to immersive videos. Using the case study of immersive journalism the main objective is to diminish the entry barrier for annotating 360° video pieces, by providing a different annotation paradigm and a set of tools for annotation. The spread of virtual...
The intent of this paper is to summarize and analyze the data and experience earned from a practical implementation of online language learning approach specifically targeted to Qur'anic Arabic learning. The foundation of this work is based on the fact that in the current world, almost 80% of the Muslims are non-native speakers/users of Arabic language. As a religious obligation, a part of the Arabic...
Understanding existing pieces of software is a challenge faced by many software developers regardless of their experience. This project researches into existing reverse engineering tools used for code comprehension and identifies the limitations of the current approaches. Furthermore, a prototype implementation was developed to extract design models from available source code in order to achieve better...
This demo introduces an automated collaborative requirements engineering tool, called TestMEReq, which is used to promote effective communication and collaboration between client-stakeholders and requirements engineers for better requirements validation. Our tool is augmented with real time communication and collaboration support to allow multiple stakeholders to collaboratively validate the same...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.