Modelica is a modern, strongly typed, declarative, equation-based, and object-oriented (EOO) language for modeling and simulation of complex cyber-physical systems. Major features are: ease of use, visual design of mo...
详细信息
Modelica is a modern, strongly typed, declarative, equation-based, and object-oriented (EOO) language for modeling and simulation of complex cyber-physical systems. Major features are: ease of use, visual design of models with combination of lego-like predefined model building blocks, ability to define model libraries with reusable components, support for modeling and simulation of complex applications involving parts from several application domains, and many more useful facilities. this paper gives an overview of some aspects of the Modelica language and the OpenModelica environment - the most complete Modelica open-source tool for modeling, simulation, and development of Modelica applications. Special features are MetaModeling for efficient model transformations, the ModelicaML profile for UML-Modelica cyber-physical hardware-software modeling, as well as generation of parallel code for multi-core architectures.
Deployment of cameras in Wireless Multimedia Sensor Networks (WMSNs) is crucial in achieving good coverage, accuracy and fault tolerance. Withthe decreased costs of wireless cameras, WMSNs provide opportunities for r...
详细信息
Deployment of cameras in Wireless Multimedia Sensor Networks (WMSNs) is crucial in achieving good coverage, accuracy and fault tolerance. Withthe decreased costs of wireless cameras, WMSNs provide opportunities for redundant camera deployment in order to get multiple disparate views of events. Referred to as multi-perspective coverage (MPC), this paper proposes an optimal solution for camera deployment that can achieve full MPC for a given region. the solution is based on a Bi-Level mixed integer program (MIP) which works by solving two sub-problems named master and sub-problems. the master problem identifies a solution based on an initial set of points and then calls the sub-problem to cover the uncovered points iteratively. Experiments show that our solution can provide full MPC with less number of cameras compared to traditional solutions.
this paper presents a novel approach of using unmanned vehicles for Automated Meter Reading (AMR) applications in rural areas where there are a few consumers scattered around a wide area. the proposed system does not ...
详细信息
this paper presents a novel approach of using unmanned vehicles for Automated Meter Reading (AMR) applications in rural areas where there are a few consumers scattered around a wide area. the proposed system does not require a fixed network infrastructure to transfer data to a central database, since data collection is carried out by unmanned vehicles. Compared to traditional meter reading systems, the use of unmanned vehicles for AMR brings several advantages, such as low cost operation, flexibility, and online system management. However, the realization of these potential gains directly depends on reliable communication capabilities of the deployed system and successful navigation of unmanned vehicles. Overall, in this paper, the design principles and challenges of using unmanned vehicles for AMR applications in rural areas have been presented. Also, the communication architecture of the proposed system has been explained and comparative simulation studies have been performed in terms of energy efficiency and navigation accuracy.
One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have signif...
详细信息
One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, we propose a new method to find joint policies for SUs which not only tries to guarantee QoS requirements but also maximize network throughput. We use Decentralized Partially Observable Markov Decision Process (Dec-POMDP) to formulate interactions between SUs. Meanwhile, a tractable approach for Dec-POMDP is utilized to extract sub-optimum joint policies for large horizons. Among these policies, the QoS-aware joint policy is selected as the joint sensing strategy for SUs. To show the efficiency of the proposed method, we consider two SUs trying to access two-channel primary users (PUs) network modeled by discrete Markov chains. Simulations demonstrate two interesting findings: 1- Optimum joint policies for large horizons can be obtained using the proposed method. 2- Our method outperforms other related works in terms of network throughput.
Software security problems exist since the early days of computer systems. Operating system level approaches, network level approaches and machine level approaches are not sufficient for the security of software syste...
详细信息
Software security problems exist since the early days of computer systems. Operating system level approaches, network level approaches and machine level approaches are not sufficient for the security of software systems. Software security has gained attention in the recent years as an internal security issue of software systems as compared to external protective measures. threat modeling is a technique being used to model threats into software systems. By applying threat modeling at the early stages of software development life cycle, all possible threats to software systems can be identified and mitigated and hence in this way, a more secure software application can be developed. Various threat modeling approaches such as CLASP, SDL, STRIDE, DREAD, TAM and Touch Points are being used by many organizations for threat modeling into software systems. But all of the approaches being used for threat modeling are based on informal and semi formal techniques. Formal methods are based on mathematics and provide state of the art techniques for secure software development. Formal methods had been used successfully in many critical systems such as CICS, Paris Railway System and British Air Traffic Control System etc. In the proposed approach VDM++, will be used for specification of core components: STRIDE, DREAD and Security Mechanisms. VDM++Tools will be used for type checking and proof obligations.
Today, many computers are using to manage many applications, like management of bank accounts, to keep medical records, etc. Withthe progress of computer science and become more complicated, the amount of threats and...
详细信息
Today, many computers are using to manage many applications, like management of bank accounts, to keep medical records, etc. Withthe progress of computer science and become more complicated, the amount of threats and risks is also increased strongly and attacks in this area have also been complicated and advanced. Today, withthis huge amount of vast and complicated threats and attacks on computer systems, security has very important place, because at any moment the amount of threats and attacks in this area is added and these risks in some cases will have to follow heavy and irreparable damages. In the world of computer, software security is one of the important issues all the time. We are insensitive about the threats to the software that we design most of the time and consider security as a solution after the completion of design and constructing programs. In fact, to avoid creating security problems and deal with security threats and attacks properly we must be prevented about fragmented and temporary activities and our activities should have an appropriate structured process and be raised on a specific standard form in this regard. the important point here is if software should have a secure entity, this only is possible by having a secure architecture. there are various techniques that help to develop secure architecture and software systems. these techniques block hackers' ways to attack the applications. this paper tries to clarify the position and importance of software architecture in order to create secure software systems. Also in this article the role of software architecture in order to provide permanent security for software systems, has been described.
the proceedings contain 22 papers. the topics discussed include: actor frameworks for the JVM platform: a comparative analysis;development of a java-based unified and flexible natural language discourse system;java fo...
ISBN:
(纸本)9781605585987
the proceedings contain 22 papers. the topics discussed include: actor frameworks for the JVM platform: a comparative analysis;development of a java-based unified and flexible natural language discourse system;java for high performance computing: assessment of current research and practice;a framework for constructing peer-to-peer overlay networks in java;unit test support for java via reflection and annotations;three approaches to object evolution;parsing fortress syntax;a discipline of tree processing;automatic parallelization for graphics processing units;the use of hardware transactional memory for the trace-based parallelization of recursive java programs;parallelizing calling context profiling in virtual machines on multicores;and analyzing performance and dynamic behavior of embedded java software with calling-context cross-profiling.
functionalprogramming languages, which emphasize a paradigm in which code modules return a value, have traditionally been used primarily in research and academia rather than in commercial software development and tes...
详细信息
Current process support technology for crisis management is often limited to either sharing of information or hard-coded process support through dedicated systems. Workflow management systems have the potential to imp...
详细信息
Current process support technology for crisis management is often limited to either sharing of information or hard-coded process support through dedicated systems. Workflow management systems have the potential to improve crisis response operations by automating coordination aspects. Unfortunately most contemporary systems can only support static workflows, hence yielding inflexible support systems. Recent work on the use of functionalprogramming techniques for workflow modeling has led to the development of the iTask system. It uses function combination to model dynamic data-driven processes and generates executable workflow support systems. Because of its focus on dynamic processes it appears promising for development of flexible crisis response systems. In this paper we present an initial discussion of the potential of the iTask system for crisis management applications. We give an overview of the iTask system, and discuss to what extent it meets the requirements of the crisis management domain.
this paper sets up a Malmquist Productivity Index system of economic growth to study the comprehensive capacities and important economic indicators for the 16 cities in the Yangtze River Delta Region. In the progress,...
详细信息
暂无评论