We demonstrate, for the first time, micromechanical detection of the neurotransmitter dopamine and its discrimination from ascorbic acid. Microcantilever sensors were fabricated and coated with the polysaccharide chit...
详细信息
Some applicants, developers, and commercial-off-the-shelf (COTS) software vendors have proposed reverse engineering as an approach for satisfying RTCA/DO-178B objectives for airborne software. RTCA/DO-178B, Software C...
详细信息
Some applicants, developers, and commercial-off-the-shelf (COTS) software vendors have proposed reverse engineering as an approach for satisfying RTCA/DO-178B objectives for airborne software. RTCA/DO-178B, Software Considerations in Airborne systems and Equipment Certification, serves as the means of compliance for most airborne software in civil aircraft. DO-178B defines reverse engineering as "the method of extracting software design information from the source code" and provides guidance particular to reverse engineering, when it is used to upgrade a development baseline. For purposes of this paper, reverse engineering is an approach for creating software life cycle data that did not originally exist, cannot be found, is not adequate, or is not available to a developer in order to meet applicable DO-178B objectives. Reverse engineering is not just the generation of data-rather it is a process to assure that the data is correct, the software functionality is understood and well documented, and the software functions as intended and required by the system. Reverse engineering is not, as some software developers propose, just an effort to generate the software life cycle data without intent to build in quality and the resulting design assurance. This paper explores reverse engineering in airborne software projects, by explaining a definition for the certification domain, describing the motivation for its use, and documenting the certification concerns. Two actual cases of reverse engineering are also described to illustrate the certification concerns in real projects.
Enhancement of light extraction in a GaInN light-emitting diode employing a conductive omnidirectional reflector consisting of GaN, an indium-tin oxide nanorod low-refractive-index layer, and an Ag layer is presented....
详细信息
This paper presents an ontology modeling and engineering approach to semantic description and integration of product development processes. Using OWL and OWL-S, the proposed method formalizes the underlying semantic r...
详细信息
This paper presents an ontology modeling and engineering approach to semantic description and integration of product development processes. Using OWL and OWL-S, the proposed method formalizes the underlying semantic representations of the product development process in domain object ontologies and the generic problem solving structures in domain task ontologies. Both the domain object and task ontologies are incorporated in the OWL-S based application service ontologies to facilitate the semantic process description and semantic service discovery, composition in the integration of product development processes. The approach has been applied to the development of ontological models for the consumer product development process in a pilot project of a national research program in Singapore namely the Integrated Manufacturing and Service systems (IMSS).
This paper addresses methodic implementation of a credible ISHM capability for elements of Constellation systems. ISHM capability must be implemented by a combination of on-board and ground elements, each contributing...
详细信息
ISBN:
(纸本)1563478188
This paper addresses methodic implementation of a credible ISHM capability for elements of Constellation systems. ISHM capability must be implemented by a combination of on-board and ground elements, each contributing to determining the health of systems in the most effective manner. Implementation of ISHM capability must evolve continuously to reach higher and higher levels of functional capability. The implication is that a sustainable approach must be defined in order to accomplish a believable capability. This paper describes the methodology, the elements, and the technology to implement ISHM capability throughout the life cycle of elements of Constellation systems, reaching beyond individual elements that might have a limited life while the constellation moves on.
This paper proposes a new high-speed reclosing operation method to improve the stability in power system with the fault current limiter. From an angular velocity, a field system voltage and a phase of the generator, t...
详细信息
ISBN:
(纸本)0889865868
This paper proposes a new high-speed reclosing operation method to improve the stability in power system with the fault current limiter. From an angular velocity, a field system voltage and a phase of the generator, the proposed operation method calculates the optimum reclosing time domain. The fault current limiter is used the reactance type or the resistive type. The examination was carried out using the Inst. of Electrical Engineers of Japan one-machine infinite bus system model in order to demonstrate the effectiveness of the proposed method. The Impact Ver2.3 was used in the computer simulation.
Enhancement of light extraction in a GaInN light-emitting diode employing a conductive omnidirectional reflector consisting of GaN, an indium-tin oxide nanorod low-refractive-index layer, and an Ag layer is presented.
ISBN:
(纸本)1557528136
Enhancement of light extraction in a GaInN light-emitting diode employing a conductive omnidirectional reflector consisting of GaN, an indium-tin oxide nanorod low-refractive-index layer, and an Ag layer is presented.
In this paper the authors propose a structural method for a genetic algorithm (GA) for the optimization problem of cable routing in which cables have to be laid optimally. When there are no limits on the layout routes...
详细信息
The advantage of magnetic resonance imaging (MRI)-guided surgery, in which MR images taken during surgery are used to guide the surgery, has been recognized recently. However, there is a problem, due to long imaging t...
详细信息
作者:
James CraftWilliam ClevelandThe Information Systems Security Officer at the United States Agency for International Development (USAID)
Bureau for Management Information Resources Management (M/IRM) Information Systems Security Team. He has a BS in business management from George Mason University and has 22 years of experience focusing primarily on systems engineering cybersecurity and enterprise operations. He has played a major role in the implementation of the U.S. Government's Model Information Security Policy. The USAID PRIME Security Program Manager
Computer Sciences Corporation in Arlington Virginia. He has MS degrees in information and telecommunications systems management and in military science. Cleveland has over 20 years of experience in the planning and management of a wide variety of functions including business process reengineering and IT security.
This article is derived from a Best Security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, Information Resources Management (M/IRM), Information systems Secu...
This article is derived from a Best Security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, Information Resources Management (M/IRM), Information systems Security Team. The USAID is an independent agency that provides economic, development, and humanitarian assistance around the world in support of the foreign policy goals of the United States. It is located in the Ronald Reagan Building in Washington, D.C.
暂无评论