Satellites are often used to make scientific observations of space or earth which are different from traditional application satellites. the mission operation and control requirements revolve around different scientif...
详细信息
ISBN:
(数字)9798331506612
ISBN:
(纸本)9798331506629
Satellites are often used to make scientific observations of space or earth which are different from traditional application satellites. the mission operation and control requirements revolve around different scientific goals, with many types, strong constraints, small granularity, and large changes, in addition, it is equipped with many types of payloads. In order to deal withthe complex control and changeable business process of satellites, a flexible and advanced system architecture is proposed, which based on cloud computing technology and used a layered architecture. through the actual operation results at the satellite operation and control center, it demonstrates that the proposed scheme is not only effective and state-of-the-art but also enhances scientific output.
Blockchain has received expanding interest from various domains. Institutions, enterprises, governments, and agencies are interested in Blockchain's potential to augment their softwaresystems. the unique requirem...
详细信息
ISBN:
(数字)9783030960681
ISBN:
(纸本)9783030960681;9783030960674
Blockchain has received expanding interest from various domains. Institutions, enterprises, governments, and agencies are interested in Blockchain's potential to augment their softwaresystems. the unique requirements and characteristics of Blockchain platforms raise new challenges involving extensive enhancement to conventional software development processes to meet the needs of these domains. softwareengineering approaches supporting Blockchain-oriented developments have been slow to materialize, despite proposals in the literature, and they have yet to be objectively analyzed. A critical appraisal of these innovations is crucial to identify their respective strengths and weaknesses. We present an analytical evaluation of several prominent Blockchain-oriented methods through a comprehensive, criteria-based evaluation framework. the results can be used for comparing, adapting, and developing a new generation of Blockchain-oriented software development processes and innovations.
Adding flexibility to 5G networks through circuit spinning an adaptable is a viable approach. Key components such as Network slicing, software-defined networking (SDN), and network service virtualization (NFV) are uti...
详细信息
Code clones, identical or substantially similar code segments in a code base, have both negative and positive impacts on evolving software. Detecting code clones is important for many reasons, such as bug fixing, chan...
详细信息
A large-scale system contains a huge configuration space because of its large number of configuration parameters. this leads to a combination explosion among configuration parameters when exploring the configuration s...
详细信息
In the rapidly evolving world of software development, maintaining user satisfaction and adapting to changing needs is critical to the success of software products. this tutorial paper focuses on a data-driven approac...
详细信息
the course Introduction to computer Networks (ICN) has become one of the most vital courses in computer Science and softwareengineering degrees and clearly is an imperative course for a degree in computer networking....
详细信息
ISBN:
(数字)9798331540425
ISBN:
(纸本)9798331540432
the course Introduction to computer Networks (ICN) has become one of the most vital courses in computer Science and softwareengineering degrees and clearly is an imperative course for a degree in computer networking. However, despite its importance, the course suffers from many issues which lead to a high failure rate and low success. Even students who pass the course have problems understanding key concepts in data communication. One of the key issues is the theoretical nature of the material of the course. Many of the concepts are abstract and dry, which the students find hard to understand and boring. At the Jerusalem College of Technology (JCT), we encountered such problems with our networking course. We therefore decided to suspend the course for a year, research successful networking courses, and apply our findings to a revised networking course. One of the strategic changes that was made was to introduce more practical material into the course. Top-down approach to networking replaced a bottom-up approach, hands-on lab were added to the course, and online quizzes were included. this paper presents some of our findings and changes that were made to the networking course. the problems that were present in our original version of the ICN course are not unique to the JCT but are common to networking courses throughout higher education institutions. We therefore believe that the findings of our research can benefit other faculty who wish to improve their networking courses.
Capability is an important security mechanism in operating systems. the Take-Grant model, as a classic capability system access control model, only has basic rewriting rules to meet the needs of security analysis, but...
详细信息
the proceedings contain 114 papers. the topics discussed include: towards effective safety and cybersecurity co-engineering in critical domains;analysis of the priorities and perspectives in artificial intelligence im...
ISBN:
(纸本)9798350396119
the proceedings contain 114 papers. the topics discussed include: towards effective safety and cybersecurity co-engineering in critical domains;analysis of the priorities and perspectives in artificial intelligence implementation;regression analysis in machine learning using conditioned Latin hypercube sampling;UAV-born narrowband radar complex for direction finding of radio sources;decision-making method for the humidity control subsystem of the cyber-physical system ‘smart house’;the WASM3 interpreter as a hard real-time software platform for the on-board computer of a student nanosatellite;on the 4D mixed lattice IIR digital filter: part I;statistical synthesis and analysis of optimal direction finding algorithms;development and interaction of the VTF concept with IoT platforms on the example of the 5G standard;and study on the evaluating the degree of investment attractiveness of IT-projects.
the goal of many companies is to provide auto drive system that meet SAE Level 5. Due to the much more complex software running on these systemsthan typical high-end cars today, a thorough testing strategy is require...
详细信息
暂无评论