the authors argue that immutability is a suitable base on which to build distributed softwareengineering environments. they discuss the various approaches to maintaining consistency in immutable object systems and co...
详细信息
ISBN:
(纸本)081860865X
the authors argue that immutability is a suitable base on which to build distributed softwareengineering environments. they discuss the various approaches to maintaining consistency in immutable object systems and compare D.P. Reed's model of time domain addressing (ACM Trans. Comput. Syst., vol. 1, no. 1, pp. 3-23, Feb. 1983), withtheir own model of domain relative addressing. they demonstrate the suitability of domain relative addressing for use in distributed-softwareengineering environments.
Recently, numerous applications of Intelligent Transportation systems (ITS) have gained increasingly more focus. One of the most crucial functions of ITS is Traffic Signs Detection and Recognition (TSDR) by notifying ...
详细信息
Wireless sensor networks (WSNs) play a crucial role in environmental monitoring and data collection. However, ensuring data security in WSNs poses challenges due to the vulnerabilities of wireless communication channe...
Wireless sensor networks (WSNs) play a crucial role in environmental monitoring and data collection. However, ensuring data security in WSNs poses challenges due to the vulnerabilities of wireless communication channels. In this paper, we address this concern by exploring the application of cryptographic techniques to enhance data security in WSNs. Considering the limited sensor power, computing power, and storage resources, we propose a novel approach that evaluates the suitability of symmetric and asymmetric cryptographic algorithms in WSNs. through performance comparisons based on computation power and storage capacity requirements, we identify key insights for selecting appropriate encryption algorithms in WSNs. Our findings emphasize the importance of considering the specific requirements and constraints of WSN applications, highlighting the efficiency of symmetric key-based encryption algorithms in resource-constrained environments and the stronger security and key distribution mechanisms provided by ECC-based asymmetric encryption algorithms for secure communication among multiple nodes. this research contributes to the existing knowledge by offering an effective solution to enhance data security in WSNs while considering computational and storage limitations
the environment of Cloud Computing (CC) offer, its users a platform to exchange resources, services, and information. With an increased demand for data, the cloud faces security threats and vulnerabilities. Organizati...
详细信息
A description is given of the Analyst system currently being developed to support software analysis and design methods. the method support facilities are being implemented using expert-system or knowledge-based techni...
详细信息
ISBN:
(纸本)0818606207
A description is given of the Analyst system currently being developed to support software analysis and design methods. the method support facilities are being implemented using expert-system or knowledge-based techniques. the user can add rules for additional analysis of the application facts. the explicit representation of rules and facts (i. e. , the knowledge base) makes it relatively easy to add methods to cover different phases or aspects of the software life cycle.
Higher education is the most important way to cultivating softwareengineering talents in China, but there is an education gap between the industry and the universities. the current curriculum in university lacked in ...
详细信息
ISBN:
(纸本)9780769546001
Higher education is the most important way to cultivating softwareengineering talents in China, but there is an education gap between the industry and the universities. the current curriculum in university lacked in transferring the experience and skills to students. In this paper, we present how to use project-based learning and collaborative learning in softwareengineering talent cultivation. We established a learning organization in college of informatics of South China Agricultural University which was named Human computer Interaction Studio (HCIS). Students can join HCIS on a voluntary basis, and then they can take part in a project team to become a team member. the team accepts a project according to their interest and ability, and then the project manager allocates tasks, formulated work and learning plan. the members of a team would exchange information, discuss some questions and accomplish their tasks together. the study had achieved many good effects in practice, employment and academia. Students can gain expertise, necessary experience and some skills after they used project-based learning and collaborative learning. the results indicated that using project-based learning and collaborative learning can be a good method for softwareengineering talent cultivation in university.
the properties of the Automatic Train Control System that has provided a reliable and safe function in Sweden since 1980 are described. Via an engineering view of the problem domain, an architecture evolved in the mid...
详细信息
ISBN:
(纸本)0769510868
the properties of the Automatic Train Control System that has provided a reliable and safe function in Sweden since 1980 are described. Via an engineering view of the problem domain, an architecture evolved in the mid-1970s that has been a key factor in the success of ATC. ATC version 1 functioned properly from 1980 to 1993 without a single change in the software. Since 1993, ATC version 2 has continued this outstanding record and has been adapted for new markers and new requirements. In Sweden, there are approximately 1000 ATC locomotive installations of the on-board system, the operating system core has been re-utilized several times for new product versions as well as the "black box" recorder and more than 20 ATC simulators. ATC is examined from the architectural, development and maintenance as well as the verification points of view. Finally, lessons learned from ATC as well as further usage of the concepts in Sweden are reviewed.
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environme...
详细信息
ISBN:
(纸本)9780769543802
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environments. By high complexity, adaptive programs are generally difficult to specify, verify, and validate. Assurance of high dependability of these programs is a great challenge. Efficiently and precisely specifying requirements and flexible model checking for adaptation are the key issues for developing dependably adaptive software. this paper introduces a formal model for adaptive programs which have different behavioral modes. We consider that adaptive programs have two behavioral level, functional behavior and adaptation. State machine is used to describe functional behavior in different modes and mode automata is proposed for adaptations. Specifications of adaptive programs are classified into three categories, local, adaptation and global properties from their different scope of dynamic adaptation. To specify and verify specifications on our model, We propose the Mode-extended Linear Temporal Logic (mLTL) and its model checking approach. mLTL extends Linear Temporal Logic (LTL) by adding mode related element and enables describing properties on different modes. Our formal model and mLTL formulae are translated to SMV language and verified in NuSMV model checker.
Binocular vision is a type of vision that allows an individual to perceive depth and distance using both eyes to create a single image of their environment. However, there is an illness called strabismus, where it is ...
Binocular vision is a type of vision that allows an individual to perceive depth and distance using both eyes to create a single image of their environment. However, there is an illness called strabismus, where it is difficult for some people to focus on seeing things clearly at a time. there are many diagnoses that need to be done for doctors to diagnose whether patients suffer from strabismus or not. Besides, a new practitioner could lead to misdiagnosis due to lack of professional experience and knowledge. To overcome these limitations, a machine learning algorithm, which is a case-based reasoning, is developed to automate the strabismus classification. the results showed that the case-based reasoning algorithm provides 91.8% accuracy, 89.29% precision, 92.59% recall and 90.91% F1-Score. this shows that using the case-based reasoning algorithm can give better performance in classifying the class.
E-wallet use has exploded, bringing in a new era of convenient and secure digital transactions;nevertheless, it has also led to a surge in fraudulent transactions. Using Recurrent Neural Networks (RNNs), this research...
详细信息
暂无评论