Unlike computer aided design (CAD) and computer aided manufacturing (CAM) systems which have been used in industry for a long time, computer aided process planning (CAPP) systems are yet to be transferred from researc...
详细信息
Unlike computer aided design (CAD) and computer aided manufacturing (CAM) systems which have been used in industry for a long time, computer aided process planning (CAPP) systems are yet to be transferred from research laboratories to industry. Aircraft industries are trying to improve their performance by developing CAPP software, and the present study contributes to this effort. Aircraft parts are specific mainly because of their complex geometry, which generates many accessibility problems, and their thin shells, which generate machining deformation and vibration problems. New CAPP approaches have been specified and developed for aircraft structural parts. Machining features are defined as machining faces. the part is split up into a set of machining faces with accessibility, adjacency, and rigidity properties. New set-up strategies are defined. these highlight three particular features in the machining of such parts: the categorization, which is a strict guide as to how the part should be machined;the best-fit blank orientation relative to the part;and the potential machining directions of the part which are the main elements for decision making.
the use of software components is perceived to significantly shorten. development time and cost, while improving quality, in developing a large, complex software system. A key premise to this perception seems to be th...
详细信息
ISBN:
(纸本)0769525156
the use of software components is perceived to significantly shorten. development time and cost, while improving quality, in developing a large, complex software system. A key premise to this perception seems to be the ability to effectively search, match, rank and select software components, during the requirements engineering process. In this paper we present a technique for eliciting requirements by using model-driven evaluation of software components, where the evaluation revolves around "models" of software components and "models" of the component-based application (CBA). As part of our ongoing project, component-aware requirements engineering (CARE), this model-driven. evaluation technique is intended to match the models of the stakeholders' needs for the component-based application against the models of the capabilities of the set of components that are currently available. More specifically, this technique allows for an integrated use of several searching/matching techniques, such as keyword-based search, case-based reasoning (CBR) and analytic hierarchy process (AHP), in evaluating models of components' requirements against models of the requirements of the stakeholders of the CBA being elicited incrementally. the model-driven evaluation technique is illustrated using a home appliance control system (HACS) example.
Agent-Oriented softwareengineering (AOSE) is concerned withthe use of agents in the development of distributed systems, especially in open and dynamic environments that require autonomous processes with communicativ...
详细信息
ISBN:
(纸本)9781424400379
Agent-Oriented softwareengineering (AOSE) is concerned withthe use of agents in the development of distributed systems, especially in open and dynamic environments that require autonomous processes with communicative and cooperative features. In order to support this perspective, we therefore require special procedures and techniques to support the development process. In this context, AOSE came to the forefront as a new discipline to assist the engineering of complex softwaresystems based on the multi-agent systems paradigm. As a result, a large number of AOSE methodologies and modeling techniques evolved to support the development of agent-based applications in all of their life cycle phases. Deciding what Agent-Oriented softwareengineering (AOSE) methodology is the best to adopt for developing a potential multi-agent system depends on which aspects are considered more important for the prospective application. However, up till now, there is no industry-wide agreement on the kinds of concepts a methodology should support. this lack of standardization makes the research in this area an open issue with accompanying challenges. Evaluation is a crucial and critical task here to identify the differences between several AOSE methodologies. In this paper, we propose the Multidimensional Weighted-Attributes Framework (MWAF), a new framework that provides a reliable solution with accurate results based on applying state-of-the-art statistical procedures to evaluate AOSE methodologies and come up with a set of measures that help in selecting the most appropriate methodology for developing prospective agent-based applications.
MPI (Message Passing Interface) is the inter-node communication interface used in today PC clusters and other cluster-type parallel/distributed systems. Up-to-date the most popular analytical MPI performance model for...
详细信息
the SCR (software Cost Reduction) requirements method has been used in industrial environments to specify the requirements of many practical systems. To evaluate the correctness of a software implementation, one can a...
详细信息
ISBN:
(纸本)9781424400379
the SCR (software Cost Reduction) requirements method has been used in industrial environments to specify the requirements of many practical systems. To evaluate the correctness of a software implementation, one can apply black-box testing to determine whether the implementation satisfies a system requirements specification, i.e., given a sequence of system inputs, it produces the correct system outputs. A static approach consists in selecting feasible paths through the use of static analysis techniques. Use of paths with lower numbers of traversed predicates ease the feasibility analysis. Our primary goal is to test whether the relation REQ is satisfied by a corresponding system, and in particular, whether critical properties defined by the specification assertions are conserved. Our second goal is to keep the cost of the testing process relatively low.
As agent technology becomes more wide-spread, the need for agent-based analysis and design methods and tools will keep growing. An agent, which is an autonomous entity that acts on behalf of the user, has different pr...
详细信息
ISBN:
(纸本)9781424400379
As agent technology becomes more wide-spread, the need for agent-based analysis and design methods and tools will keep growing. An agent, which is an autonomous entity that acts on behalf of the user, has different properties than objects. For example, objects are passive entities that react to external stimuli, but do not exhibit goal directed behavior. On the other hand, agents are active entities that may learn about their environment and react to changes. Because of such crucial differences between objects and agents, object-oriented analysis and design methods cannot accommodate the requirements of engineering agent-based systems. Agents, however, can learn a few things from object-oriented analysis and design. In this paper, we present the AgentViews approach for applying the Model View Controller (MVC) design pattern in designing agent-based systems. this approach will help software developers use a familiar design pattern to determine the types of agents needed to build successful agent-based systems.
Mobility service for hospital technicians involved in telemedicine applications is one of the key issues in providing more flexible and efficient in-house or remote health care services. Today, the Internet based comm...
详细信息
Electronic Navigational Charts (ENCs) are official nautical charts which are equivalent to paper charts with supplementary information. Although their main purpose is to be used for the safe navigation of ships, they ...
详细信息
Security violations occur in systems even if security design is carried out or security tools are deployed. Social engineering attacks, vulnerabilities that can not be captured in the relatively abstract design model ...
详细信息
ISBN:
(纸本)3540330933
Security violations occur in systems even if security design is carried out or security tools are deployed. Social engineering attacks, vulnerabilities that can not be captured in the relatively abstract design model (as buffer-overflows), or unclear security requirements are only some examples of such unpredictable or unexpected vulnerabilities. One of the aims of autonomous systems is to react to these unexpected events through the system itself. Subsequently, this goal demands further research about how such behavior can be designed and sufficiently supported throughout the software development process. We present an approach to engineer self-protection rules for autonomous systemsthat is integrated into a model-driven softwareengineering process and provides concepts to formally verify that a given intrusion response model satisfies certain security requirements.
this roadmap describes ways that researchers in four areas - -specification languages, program generation, correctness by construction, and programming languages - -might help further the goal of verified software. It...
详细信息
暂无评论