The relationship between object oriented metrics and software maintainability is complex and ***,there is considerable research interest in development and application of sophisticated techniques which can be used to ...
详细信息
The relationship between object oriented metrics and software maintainability is complex and ***,there is considerable research interest in development and application of sophisticated techniques which can be used to build models for predicting software ***,when predicting maintainability not only product quality measurements are surrounded with imprecision and uncertainty,but also the relationships between the external and internal quality attributes suffer from imprecision and *** reason behind that,there are at least two important sources of information for building the prediction model: historical data and human ***,in this paper an attempt has been made to utilize the capability of fuzzy logic in handling imprecision and uncertainty to come up with an efficient maintainability prediction *** proposed model is constructed using object-oriented metrics data in Li and Henry's datasets collected from two different object-oriented systems.
SOFL approach to the construction of the formal specifications has been proposed and applied in information systems,but its effectiveness and applicability have not been demonstrated *** this paper,we describe an appl...
详细信息
SOFL approach to the construction of the formal specifications has been proposed and applied in information systems,but its effectiveness and applicability have not been demonstrated *** this paper,we describe an application of the SOFL approach to the construction of a specification during requirements *** approach requires two steps: informal and semi-formal *** order to describe on how this approach can be applied to capture requirements using SOFL easily,we use a case study to develop an examination monitoring system for construct abstract *** case study demonstrates the suitability of SOFL to capture detail requirements and provides us with an insight into the knowledge of how SOFL approach can be effectively supported.
This paper presents a pulse doubling technique in a 36-pulse ac-dc converter which supplies direct torque-controlled motor drives (DTCIMD39;s) in order to have better power quality conditions at the point of common ...
详细信息
This paper presents a pulse doubling technique in a 36-pulse ac-dc converter which supplies direct torque-controlled motor drives (DTCIMD's) in order to have better power quality conditions at the point of common coupling. The proposed technique increases the number of rectification pulses without significant changes in the installations and yields in harmonic reduction in both ac and dc sides. The 36-pulse rectified output voltage is accomplished via two paralleled eighteen-pulse ac-dc converters each of them consisting of nine-phase diode bridge rectifier. A transformer is designed to supply the rectifiers. The design procedure of magnetics is in a way such that makes it suitable for retrofit applications where a six-pulse diode bridge rectifier is being utilized. Independent operation of paralleled diode-bridge rectifiers, i.e. dc-ripple re-injection methodology, requires a Zero Sequence Blocking Transformer (ZSBT). Finally, a tapped interphase reactor is connected at the output of ZSBT to double the pulse numbers of output voltage up to 72 pulses. The aforementioned structure improves power quality criteria at ac mains and makes them consistent with the ieee-519 standard requirements for varying loads. Furthermore, near unity power factor is obtained for a wide range of DTCIMD operation. A comparison is made between 6-pulse, 36-pulse, and proposed converters from view point of power quality indices. Results show that input current total harmonic distortion (THD) is less than 3% for the proposed topology at variable loads.
In this paper an application, implemented functions and data base of welds defects destined to an Intelligent System for Radiogram Analysis ISAR for welds quality inspection is presented. System has to improve informa...
详细信息
Along with the development of middleware technology, middleware has been widely used in many applications, especially in banking systems in which a three-layer structure model based on Tuxedo can be used. This model p...
详细信息
Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hardware/software codesign flow. In such a case the system39;s modules and components ...
详细信息
ISBN:
(纸本)9783642191244
Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hardware/software codesign flow. In such a case the system's modules and components are continuously modified and refined until all constraints are met and the system design is in a stable state. A transaction level model can be used for such a design space exploration in this phase. It is essential that security requirements are considered from the very first beginning. In this work we(1) demonstrate a novel approach how to use meta-information in transaction level models to verify the consistent application of security requirements in embedded systems.
The object-oriented simulation software of an adaptive optics system is used to evaluate the performance of the adaptive optics system. The software includes distorted wavefront correction and turbulence simulation. A...
详细信息
This Paper analyses the integration demands of PDM system with MS Project, and elaborates the integration solution of the two softwaresystems, technique crux and realization method. At last introduces the realization...
详细信息
In this paper the application of the Equivalent Electrodes Method (EEM) for the analysis of square coaxial lines has been presented. The capacitance per unit length, for different shapes and sizes, has been calculated...
详细信息
Authorization is a key aspect in secure software development of multi-user applications. Authorization is often enforced in the program code with enforcement statements. Since authorization is present in numerous plac...
详细信息
ISBN:
(纸本)9783642191244
Authorization is a key aspect in secure software development of multi-user applications. Authorization is often enforced in the program code with enforcement statements. Since authorization is present in numerous places, defects in the enforcement are difficult to discover. One approach to this challenge is to improve the developer usability with regard to authorization. We analyze how software development is affected by authorization in a real-world case study and particularly focus on the loose-coupling properties of authorization frameworks that separate authorization policy from enforcement. We show that authorization is a significant aspect in software development and that the effort can be reduced through appropriate authorization frameworks. Lastly, we formulate advice on the design of enforcement APIs.
暂无评论