Mobile application development has emerged as one of the most focused areas in software industry due to exponential growth of mobile users and applications. The focus of the current mobile industry is on direct implem...
详细信息
Mobile application development has emerged as one of the most focused areas in software industry due to exponential growth of mobile users and applications. The focus of the current mobile industry is on direct implementation, rather than analysis and design. Model-driven engineering practices are ignored, which results in low reusability and lack of portability along with other challenges. In addition, mobile applications also have to support multiple platforms, as an application written for one platform (e.g., Android) cannot run on another platform (e.g., Windows Phone). Each of the platforms in turn suffers from fragmentation. This results in multiple versions of an application that need to be simultaneously maintained. This is a huge burden on the development team, both in terms of cost and effort, due to various platforms that an application supports. This paper proposes a model-driven approach to generate mobile applications for multiple platforms. We carefully identify a subset of UML and propose a modeling methodology for this purpose. We use real use-cases for requirement gathering, class diagram for structural modeling, while state machine are used for behavioral modeling. We focus on modeling business logic layer for the mobile application. We also propose a UML profile for modeling mobile domain specific concepts. Our approach uses Action Language for Foundational Subset of UML (ALF) to specify actions in the state machines. Our approach allows the modeler to automatically generate business logic code for multiple platforms. The approach is supported by an automated tool MAG (Mobile Application Generator). We apply our model-driven approach on an industrial case study 'Scramble' app developed by 'Next In' to demonstrate its viability.
Olfactory-based mobile robots use odors as a guide to navigate and track in the unknown environments. The key issue of localizing the odor plume source is how to trace odor plume effectively. This paper presents an ef...
详细信息
Olfactory-based mobile robots use odors as a guide to navigate and track in the unknown environments. The key issue of localizing the odor plume source is how to trace odor plume effectively. This paper presents an effective olfactory-based planning and search algorithms for using on mobile robots. The algorithms are based on Bayesian inference theory and artificial potential field methods. The Bayesian inference theory is used to construct the probability map of plume source based on the flow records and plume detection information collected from sensors. Then the Artificial Potential Field (APF) method is used for planning a plume tracking path. The robot follows the path to trace odor plume until the source is detected. The algorithms were implemented on a Pioneer 3 Mobile Robot in an indoor airflow environment. Experiment results show that the search algorithms are effective and feasible to odor plume source localization problem.
State-of-the-art gateways are connected to several distributed computing infrastructures (DCIs) and are able to run jobs and workflows simultaneously in all those different DCIs. However, the flexibility of accessing ...
详细信息
State-of-the-art gateways are connected to several distributed computing infrastructures (DCIs) and are able to run jobs and workflows simultaneously in all those different DCIs. However, the flexibility of accessing data storages belonging to different DCIs is a missing feature of current gateways. SZTAKI (Institute for computer Science and Control) has developed a Data Avenue Blacktop service and aLiferay-based Data Avenue port let that open the door for integrating such features into science gateways. The paper explains the design considerations of the Data Avenue Blacktop service and its usage scenarios in science gateways through the Data Avenue port let.
In this paper, we tackle a novel problem of mining contrast subspaces. Given a set of multidimensional objects in two classes C+ and C - and a query object o, we want to find top-k subspaces S that maximize the ratio ...
详细信息
software process simulation (SPS) has been evolving over the past two decades after being introduced to the softwareengineering community in the 1980s. At that time the SPS technology attracted a great deal of intere...
详细信息
This demonstration presents an intelligent information platform MODEST. MODEST will provide enterprises with the services of retrieving news from websites, extracting commercial information, exploring customers' o...
详细信息
With the development of the Internet,people share their emotion statuses or attitudes on online social websites,leading to an explosive rise on the scale of *** sentiment information behind these data helps people kno...
详细信息
ISBN:
(纸本)9781479948109
With the development of the Internet,people share their emotion statuses or attitudes on online social websites,leading to an explosive rise on the scale of *** sentiment information behind these data helps people know about public opinions and social *** this paper a sentiment analysis algorithm adapting to Weibo(Microblog) data is *** that a Weibo post is usually short,LDA model is used to generate text features based on semantic information instead of text *** decide the sentiment polar and degree,SVR model is used *** shows the algorithm performs well on Weibo data.
Service innovation has assumed considerable significance with the growth of the services sectors of economies globally, yet progress has been slow in devising carefully formulated, systematic techniques to under pin s...
详细信息
The objective of this work is to define and measure cyber resiliency of the “cloud” in a Moving Target Defense (MTD) environment that applies the software Behavior Encryption (SBE) method. Implementation of SBE has ...
详细信息
The objective of this work is to define and measure cyber resiliency of the “cloud” in a Moving Target Defense (MTD) environment that applies the software Behavior Encryption (SBE) method. Implementation of SBE has shown to increase vulnerability tolerance in a particular software system by introducing software diversity and redundant version shuffling to obfuscate the system to attackers. With this in mind, this paper nominates attack surface, confidentiality, integrity, availability, and survivability as the critical components of cyber resiliency, and a notional example is provided to demonstrate the components application and aggregation.
A large portion of people suffer from Chronic Kidney Disease (CKD) in the world. Unfortunately, some of them don't know they have been contracted CKD until they need dialysis treatment at the end stage. Diagnosis ...
详细信息
ISBN:
(纸本)9781479951499
A large portion of people suffer from Chronic Kidney Disease (CKD) in the world. Unfortunately, some of them don't know they have been contracted CKD until they need dialysis treatment at the end stage. Diagnosis through non-invasive ultrasonic imaging techniques become important clinical approaches for detecting CKD, and high potential or at-risk CKD patients could avoid being infected via blood test and/or reduce chances of abrupt deterioration in renal function by taking iodinated contrast medium. This research established a detection system based on computer vision and machine learning techniques for facilitating diagnosis of CKD and different stages of CKD. Novel features and support vector machine were applied for rapid detection. In this study, several evaluations on different clustered groups were performed and compared according to estimated glomerular filtration rates (GFR). In addition, the proposed system required 0.016 seconds in average for feature extraction and classification for each testing case. The results showed that the system could produce consistent diagnosis based on noninvasive ultrasonographic approaches and which could be considered as the most proper clinical diagnosis and medical treatment for CKD patients.
暂无评论