scispace - formally typeset
Search or ask a question

Showing papers on "Application software published in 2021"


Journal ArticleDOI
TL;DR: In this article, the authors used speech recognition technology to build an intelligent search and recommendation system for mobile intelligent devices based on speech information extraction, analysis, and final recommendation, which is more efficient and intelligent.
Abstract: With the progress of science and technology, artificial intelligence as the emerging tool has been deeply into our lives. The application of modern intelligent equipment is more and more extensive, and also inseparable from our lives. The mobile intelligent terminal represented by smart phone is a powerful intelligent computing and networking device, which has more perception and interaction capabilities. Due to the emergence of a large number of application software, it is not easy to find and get the app that you really need. Therefore, this paper uses speech recognition technology to build an app intelligent search and recommendation system. We designed the system from the levels of speech information extraction, analysis and finalized recommendation. Experimental results show that the proposed method is more efficient and intelligent.

17 citations


Book ChapterDOI
01 Apr 2021
TL;DR: It turns out, the platform can significantly outperform most legacy network emulators regarding to the scalability, agility, and extensibility, with much lower emulation costs.
Abstract: Network emulation is an essential method to test network architecture, protocol and application software during a network’s entire life-cycle. Compared with simulation and test-bed methods, network emulation possesses the advantages of accuracy and cost-efficiency. However, legacy network emulators are typically restricted in scalability, agility, and extensibility, which builds barriers to prevent them from being widely used. In this paper, we introduce the currently prevalent cloud computing and related technologies including resource virtualization, NFV (network functional virtualization), SDN (software-defined networking), traffic control and flow steering to the network emulation domain. We design and implement an innovative cloud-based network emulation platform, aiming at providing users Network Emulation as a Service (NEaaS), which can be conveniently deployed on both public and private clouds. We carried out performance evaluation and discussion on this platform. It turns out, the platform can significantly outperform most legacy network emulators regarding to the scalability, agility, and extensibility, with much lower emulation costs.

16 citations


Proceedings ArticleDOI
02 Mar 2021
TL;DR: This study is based on the examination of the SetXRM platform, which is one of the new generation low-code applications that helps to produce more flexible and short-term solutions to the increasing software needs of the enterprise.
Abstract: The dependence on technology, digital transformation and the need to work remotely are increasing day by day. It is predicted to increase further after this COVID-19 pandemic. The desire to digitize every object also leads to the need to develop or update many application software. It is very difficult with traditional software development methods to produce flexible solutions to such dynamic and changing demands on time. At the same time, there are problems such as finding qualified human resources and high cost in writing and updating corporate program codes that can be considered complex on a large scale. Low-code software development platforms provide solutions for such problems. These platforms aim to produce flexible and less costly programs in a shorter time by using drag-and-drop components through visual interfaces without requiring deep programming knowledge.This study is based on the examination of the SetXRM platform, which is one of the new generation low-code applications that helps to produce more flexible and short-term solutions to the increasing software needs of the enterprise.

11 citations


Proceedings ArticleDOI
25 Mar 2021
TL;DR: A Machine Learning Algorithm is proposed in this paper which is mainly used to train the shape models and helps to detect the shape for Traffic Sign detection and Lane Detection in Autonomous cars.
Abstract: The Self-Driving Cars are also known as Autonomous Vehicles. This Car has the ability to sense around the environment. These sensed parameters are processed and according to it the different actuators in the car will work without any human involvement. An Autonomous car work like a normal car but without any human driver. Autonomous cars rely on sensors, actuators, machine learning algorithms and Software to perform all the Automated Functions. The Software part is very important for Autonomous vehicles. The Software architecture acts as a bridge between Hardware Components and Application. The Standardized Software for Automotive cars is AUTOSAR. The AUTOSAR is a Standardized Architecture between Application Software and Hardware. This Standardized Architecture provide all Communication Interfaces, Device Drivers, Basic Software and Run-Time Environment. There are two important modules in Self-Driving Cars. They are Lane Detection and Traffic Signal detection which works automatically without any Human Intervention. A Machine Learning Algorithm is proposed in this paper. This Algorithm is mainly used to train the shape models and helps to detect the shape for Traffic Sign detection and Lane Detection. These both tasks are programmed using python with Open cv2 library file, numpy library file and Hough Detection technique is used to detect the appropriate circles of the traffic signals.By using all these tools, all the shape models are trained using Supervised training Algorithm and the detection is performed in such a way to help Autonomous cars to detect the lane and traffic Sign.

9 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present the mobile application software Patrony to promote the learning of Computational Thinking, especially pattern recognition, in specific sectors of education in Mexico through the simple use of a software application.
Abstract: Pattern recognition is an important skill of Computational Thinking and is one of the most important competences for solving a problem that involves finding similarities or patterns in small problems to solve more complex ones. In this work, we present the mobile application software Patrony. The main contribution of this work is to promote the learning of Computational Thinking, especially pattern recognition, in specific sectors of education in Mexico through the simple use of a software application. To evaluate the effectiveness of the mobile application, tests were carried out in two elementary schools with a total of 43 students, which were divided into 2 groups: a control group and an experimental group. The results of the tests showed that the learning gain (M = 6.50 in postest compared to M = 4.94 on pretest) of the students who used our mobile application produces a significant difference with respect to students who learned using a traditional method of classroom teaching. The results also infer that computational thinking applications can be used as effective learning tools within some important Mathematics topics in public and private schools in Mexico.

6 citations


Journal ArticleDOI
TL;DR: In this article, the authors proposed a corresponding trust chain method for industrial control system application software and a component analysis method based on security sensitivity weights, which can effectively meet the integrity measurement under the condition of high real-time performance, protect the integrity of files, and improve the software credibility.
Abstract: Aiming at the real-time requirements for industrial control systems, we proposed a corresponding trust chain method for industrial control system application software and a component analysis method based on security sensitivity weights. A dynamic length trust chain structure is also proposed in this paper. Based on this, the industrial control system software integrity measurement method is constructed. Aimed at the validity of the model, a simulation attack experiment was performed, and the performance of the model was repeated from multiple perspectives to verify the performance of the method. Experiments show that this method can effectively meet the integrity measurement under the condition of high real-time performance, protect the integrity of files, and improve the software credibility of industrial control system.

5 citations


Journal ArticleDOI
TL;DR: The Goal-Oriented (GO) methodology is applied to detailed analyze the reliability of a C4ISR system and contributes to the reliability analysis of all hard-and-software integrated systems.
Abstract: Hard-and-software integrated systems such as command and control systems (C4ISR systems) are typical systems that are comprised of both software and hardware, the failures of such devices result from complicated common cause failures and common (or shared) signals that make classical reliability analysis methods will be not applicable. To this end, this paper applies the Goal-Oriented (GO) methodology to detailed analyze the reliability of a C4ISR system. The reliability as well as the failure probability of the C4ISR system, are reached based on the GO model constructed. At the component level, the reliability of units of the C4ISR system is computed. Importance analysis of failures of such a system is completed by the qualitative analysis capability of the GO model, by which critical failures of hardware failures like communication module failures and motherboard module failures as well as software failures like network module application software failures and decompression module software failures are ascertained. This method of this paper contributes to the reliability analysis of all hard-and-software integrated systems.

5 citations


Journal ArticleDOI
15 Oct 2021
TL;DR: APIFix as mentioned in this paper is a program synthesis algorithm to automate API usage adaptation via program transformation, which can reduce the overfitting of transformation rules in the client code while synthesizing and applying the transformation rules.
Abstract: Use of third-party libraries is extremely common in application software. The libraries evolve to accommodate new features or mitigate security vulnerabilities, thereby breaking the Application Programming Interface(API) used by the software. Such breaking changes in the libraries may discourage client code from using the new library versions thereby keeping the application vulnerable and not up-to-date. We propose a novel output-oriented program synthesis algorithm to automate API usage adaptations via program transformation. Our aim is not only to rely on the few example human adaptations of the clients from the old library version to the new library version, since this can lead to over-fitting transformation rules. Instead, we also rely on example usages of the new updated library in clients, which provide valuable context for synthesizing and applying the transformation rules. Our tool APIFix provides an automated mechanism to transform application code using the old library versions to code using the new library versions - thereby achieving automated API usage adaptation to fix the effect of breaking changes. Our evaluation shows that the transformation rules inferred by APIFix achieve 98.7% precision and 91.5% recall. By comparing our approach to state-of-the-art program synthesis approaches, we show that our approach significantly reduces over-fitting while synthesizing transformation rules for API usage adaptations.

5 citations


Journal ArticleDOI
TL;DR: In this paper, a mobile terminal system of intelligent college English teaching and training mode is proposed, based on the introduction of the concept, architecture, characteristics of WAP technology, and the development tools for WAP application software that need to be used in the teaching mode of the mobile smart terminals.
Abstract: With the increasing maturity and wide application of wireless mobile communication technology and 4G networks, the use of mobile smart terminals has been popularized and has become an indispensable thing for people to live, study, and entertain. Taking college English course as an example, this paper aims to study the mobile terminal system of intelligent college English teaching and training mode. Based on the introduction of the concept, architecture, characteristics of WAP technology, and the development tools of WAP application software that need to be used in the teaching mode of the mobile terminal system, this article tentatively constructs a teaching mode of the mobile terminal system. The model is described, the collaborative filtering algorithm is proposed, and how to construct the matrix and calculate the similarity with the collaborative filtering algorithm is discussed. In order to verify the effectiveness of the system model, a test level comparison and a questionnaire survey of the teaching model were carried out. The experimental results of this article show that 91.8% of students said that their comprehensive English level has been improved in the process of applying the mobile terminal system teaching mode. In addition, 87.5% of the students said that it is necessary or basically necessary to use English for professional teaching and 76.2% of the students are very satisfied and basically satisfied with this model.

5 citations


Journal ArticleDOI
TL;DR: This research proposed an IoT-enabled cashless vending machine that incorporates both cloud computing and payment gateway for ordering and purchasing items through digital payment systems by using a mobile application and performed an average response time of 14500 milliseconds to pick a product.
Abstract: The advent of the Internet envisions a cashless society by enabling financial transactions through digital payments. Significantly, the emergence of coronavirus (COVID-19) disrupted our traditional cash handling means and triggered an inflection point for switching towards contactless digital payments from physical cash payments. Furthermore, Internet of Things (IoT) technology escalates digital payments to the next level by enabling devices to render goods and services without requiring any human interaction. This research proposed an IoT-enabled cashless vending machine that incorporates both cloud computing and payment gateway for ordering and purchasing items through digital payment systems by using a mobile application. The system enables a pre-installed mobile application to scan the Quick Response (QR) code attached to the body of a vending machine, opens the portal of a web-based virtual machine through the code, allows user to choose and order items from the virtual vending, initiates and authorizes a digital payment through an IoT gateway installed inside the physical vending machine by establishing a connection between user's and vendor's financial entities, and finally, dispenses the ordered items by unlocking the shelves of the vending machine after the successful payment transaction. It operates in the Arduino platform with an ATmega 2560 Microcontroller and Esp8266 Wi-fi module as hardware components, mobile application software, and payment gateway API. The system performed an average response time of 14500 milliseconds to pick a product after running 150 consecutive API test calls. This result shows a satisfying time for enhancing customers' buying experiences with digital payment systems and a customizable and cost-effective IoT-based intelligent vending machine to introduce for mass production.

5 citations


Proceedings ArticleDOI
04 Feb 2021
TL;DR: The conclusion obtained is that students can use Tinkercad software well to understand programming competency upon a microcontroller.
Abstract: The impact of the Covid-19 pandemic has hits many sectors, one of which is the educational sector. Lockdown policy has closed schools in most countries from natural teaching and learning process. This study aims to analyze students' experiences during the online learning process in electronics and microprocessors subject in Vocational High School (VHS) according to competency to implementing programming a microcontroller using Tinkercad software. The research method used is a qualitative approach. The results of this study that students able to properly implement programming a microcontroller both in theory and practice using Tinkercad software. Most students show a positive response, feel enthusiastic and motivated to develop their abilities, while a small number of students show a negative response, this is due to constraints both from internal and external factors. The conclusion obtained is that students can use Tinkercad software well to understand programming competency upon a microcontroller. Most of the students showed a positive response when using Tinkercad and the obstacles experienced by a small part of students related to internal and external factors. Keywords—COVID-19, VHS, online learning, tinkercad

Journal ArticleDOI
29 Mar 2021
TL;DR: A model is proposed that uses some parameters of the future computer program, data on the influence of various factors on its reliability, and further testing of the program to determine the predicted failure rate of the planned application computer program and the reliability of the computer-based information system as a whole.
Abstract: The reliability of computer-based information systems is largely determined by the reliability of the developed application software The failure rate of its computer program is considered as an indicator of the reliability of the application software To determine the expected reliability of the application software planned for the development (until writing the code of a program), the model is proposed that uses some parameters of the future computer program, data on the influence of various factors on its reliability, and further testing of the program The model takes into account the field of software application and computer processor performance The process of model parameters obtaining is analyzed, It is possible by use of proposed model to determine the predicted failure rate of the planned application computer program, and then the reliability of the computer-based information system as a whole If necessary, the measures can be developed to ensure the required level of reliability of the computer-based information system

Journal ArticleDOI
TL;DR: In this article, a static dynamic analysis of the mobile malicious program is carried out, and the social network social diagram is constructed to model the propagation of mobile malicious programs. And the authors extended the approach of deriving common malware behavior through graph clustering, and summarized the architecture of mobile malware security analysis.
Abstract: In recent years, the application of smartphones, Android operating systems and mobile applications have become more prevalent worldwide. To study the traceability, propagation, and detection of the threats, we perform research on all aspects of the end-to-end environment. With machine learning based on the mobile malware detection algorithms that integrate the dynamic and static research of the identification algorithm, application software samples are collected to study sentences. Through knowledge labeling and knowledge construction, the association relationship of knowledge is extracted to realize the research of knowledge map construction. Flooding is closely correlated with the complexity of the Android mobile version of the kernel and malicious programs. A static dynamic analysis of the mobile malicious program is carried out, and the social network social diagram is constructed to model the propagation of the mobile malicious program. We extended the approach of deriving common malware behavior through graph clustering. On this basis, Android behavior analysis is performed through our virtual machine execution engine. We extend the family characteristics to the concept of DNA race genes. By studying SMS/MMS, Bluetooth, 5G base station networks, metropolitan area networks, social networks, homogeneous communities, telecommunication networks, and application market ecosystem propagation scenarios, we discovered the law of propagation. In addition, we studied the construction of the mobile Internet big data knowledge graph. Quantitative data for the main family chronology of mobile malware are obtained. We conducted detailed research and comprehensive analysis of Android application package (APK) details and behavior, relationship, resource-centric, and syntactic aspects. Furthermore, we summarized the architecture of mobile malware security analysis. We also discuss encryption of malware traffic discrimination. These precise modeling and quantified research results constitute the architecture of mobile malware analysis.

Proceedings ArticleDOI
19 Jun 2021
TL;DR: In this paper, the authors present a verification of a realistic embedded system, with its application software, device drivers, compiler and RISC-V processor represented inside the Coq proof assistant as one mathematical object, with a machine-checked proof of functional correctness.
Abstract: The interfaces between layers of a system are susceptible to bugs if developers of adjacent layers proceed under subtly different assumptions. Formal verification of two layers against the same formal model of the interface between them can be used to shake out these bugs. Doing so for every interface in the system can, in principle, yield unparalleled assurance of the correctness and security of the system as a whole. However, there have been remarkably few efforts that carry out this exercise, and all of them have simplified the task by restricting interactivity of the application, inventing new simplified instruction sets, and using unrealistic input and output mechanisms. We report on the first verification of a realistic embedded system, with its application software, device drivers, compiler, and RISC-V processor represented inside the Coq proof assistant as one mathematical object, with a machine-checked proof of functional correctness. A key challenge is structuring the proof modularly, so that further refinement of the components or expansion of the system can proceed without revisiting the rest of the system.

Journal ArticleDOI
TL;DR: In this paper, the spatial layout of human-machine interface supported by the design cognition model and the use of Machine Learning algorithms is presented. But the layout optimization objective function was constructed according to each principle, and the problem of solving layout parties and cases was transformed into a combinatorial optimization problem.
Abstract: In recent years, progressive attention has been paid to the research of man–machine interface. In many fields of application software system development, experts have listed man–machine interface as one of the commands for the urgent research and advancement. This article has proposed the improvement to the man–machine interface system control design for the practical value of life, and has presented an approach for algorithms using Machine Learning. The method used in the paper includes the spatial layout of human–machine interface supported by the design cognition model and the use of Machine Learning algorithms. Based on Max–Min Ant System, the optimal path of ant construction is obtained, which is the optimal layout scheme. The experimental result in the paper shows that: with the support of the cognitive model, the cabin man–machine interface system control design method based on Genetic Algorithm-Ants Algorithm is obtained. The layout design principles were summarized by the cognitive model, and the layout optimization objective function was constructed according to each principle, and the problem of solving layout parties and cases was transformed into a combinatorial optimization problem. The form of fitness function, pheromone, and heuristic information for layout optimization was studied, and the algorithm of manual optimization process was implemented based on Genetic Algorithm and Ant Algorithm, in order to obtain a good optimization performance and time performance as a result. The practical value of the control design of man–machine interface system with the Machine Learning algorithm is proved.

Journal ArticleDOI
TL;DR: A platform-aware model-driven engineering process for building component-based embedded software systems using annotated analysis models is described, used to support the validation and verification of the on-board application software for the Instrument Control Unit of the Energetic Particle Detector of the Solar Orbiter mission.
Abstract: In this work a platform-aware model-driven engineering process for building component-based embedded software systems using annotated analysis models is described. The process is supported by a framework, called MICOBS, that allows working with different component technologies and integrating different tools that, independently of the component technology, enable the analysis of non-functional properties based on the principles of composability and compositionality. An actor, called Framework Architect, is responsible for this integration. Three other actors take a relevant part in the analysis process. The Component Provider supplies the components, while the Component Tester is in charge of their validation. The latter also feeds MICOBS with the annotated analysis models that characterize the extra-functional properties of the components for the different platforms on which they can be deployed. The Application Architect uses these components to build new systems, performing the trade-off between different alternatives. At this stage, and in order to verify that the final system meets the extra-functional requirements, the Application Architect uses the reports generated by the integrated analysis tools. This process has been used to support the validation and verification of the on-board application software for the Instrument Control Unit of the Energetic Particle Detector of the Solar Orbiter mission.

Proceedings ArticleDOI
05 Jan 2021
TL;DR: The architectural design of the software is presented particularly highlighting the low-level software adaptations needed to support the high demands from the centroid timing, as well as the current development status of the IASW with a detailed look at the design and expected performance of the algorithms.
Abstract: The Atmospheric Remote-sensing Infrared Exoplanet Large-survey was selected as M4 mission in the ESA Cosmic Vision programme. This mission will study the chemical composition of exoplanetary atmospheres via high resolution, multi-wavelength spectroscopy with high photometric precision. These tasks demand highly stable pointing during operation, which is provided by a dedicated Fine Guiding Sensor (FGS). The FGS uses two MCT detectors operating in 0.6-1.95μm range. The instrument provides target identification and centroid measurements to the spacecraft forming a closed loop in the guiding. In addition, the FGS detectors are also used for science including photometric and spectral windows. Our instrument contains it own Data Processing Unit (DPU). This is a dual core LEON-based computer running the Instrument Application Software (IASW). The software implements a large number of ECSS services to fulfill the various operating needs. The mission-specific modes cover target acquisition and tracking tasks, processing of the photometric and spectral windows as well as various calibration modes. Aside from that, the thermal control is also handled by the FGS software. The science data need to be compressed in a lossless manner. In this respect we build upon our experiences gathered in our contributions to the ESA missions Herschel and Cheops. While the science data processing has only soft real-timing needs, the centroiding is critical to run and provide results as fast as possible. We present the architectural design of the software particularly highlighting the low-level software adaptations needed to support the high demands from the centroid timing. The presented overview will cover the current development status of the IASW with a detailed look at the design and expected performance of the algorithms. Furthermore, we will present our development and testing workflow, which is built upon our own EGSE software.

01 Jan 2021
TL;DR: The main objective of this research is to measure the technical capabilities of object-based software app.
Abstract: Seeing the rapid progress of software app. in today's destructive era, the need for software app. is very reliable for industrial progress in the era of the 4.0 generation. Especially in object-oriented software app. The main objective of this research is to measure the technical capabilities of object-based software app. and to find out the process of selecting the best number of app.software in terms of the appropriate price. Many techniques can be developed in object-based software app. such as class implementation, Inheritance, Encapsulation, Polymorphic, Constructor, Accessor, Mutator, Visibility, Overwrite and Overload. This technique is an advantage of object-based software app. Taking advantage of these advantages causes difficulty in selecting and evaluating software. Indeed, it is very difficult to evaluate software products, because they are qualitative. In order for the assessment to be objective, it requires good method collaboration, thus an objective method is needed in the assessment of the selection of a number of program app. The test was carried out with the Multi Objective Optimization by Ratio Analysis (MOORA) method collaborated with the Price-Quality Ration approach. The results obtained are the selection of object-based software app. that can be done optimally and provide efficiency in the benefits and costs incurred.

Journal ArticleDOI
TL;DR: A mutation-based framework for effective and efficient conformance checking between virtual/silicon device implementations and their specifications and based on defined mutation operators, device specifications can be automatically instrumented with weak mutant-killing constraints to model potential erroneous device behaviors.
Abstract: Modern software systems, either system or application software, are increasingly being developed on top of virtualized software platforms. They may simply intend to execute on virtual machines or they may be expected to port to physical machines eventually. In either case, the devices, virtual or silicon, in the target virtual or physical machines are expected to conform to the specifications based on which the software systems have been developed. Non-conformance of these devices to the specifications can cause catastrophic failures of the software systems. In this article, we propose a mutation-based framework for effective and efficient conformance checking between virtual/silicon device implementations and their specifications. Based on our defined mutation operators, device specifications can be automatically instrumented with weak mutant-killing constraints to model potential erroneous device behaviors. To kill all feasible mutants, our approach adopts a cooperative symbolic execution mechanism that can efficiently automate the test case generation and conformance checking for virtual/silicon devices. By symbolically executing the instrumented specifications with virtual/silicon device traces obtained from the cooperative execution, our method can accurately measure whether the designs have been sufficiently validated and report the inconsistencies between device specifications and implementations. Comprehensive experiments on two industrial network adapters and their virtual devices demonstrate the effectiveness of our proposed approach in conformance checking for both virtual and silicon devices.

Journal ArticleDOI
TL;DR: In this article, Markov process, Laplace transformation and supplementary variable technique have been used to analyse the reliability measures of embedded system with its sensitivity and also discussed the effects of various failure rates on system performance.
Abstract: In today's era, the embedded system plays a very keen role in every field. However, the possibilities of errors occur in that system is so common, due to which the degradation of the system takes place or the system gets crash. The various types of errors that can be occurred in the embedded system are deliberated in its mathematical modelling. The interaction of the software with each system’s component and interaction of system software to application software are also considered. In this study, Markov process, Laplace Transformation and supplementary variable technique have been used to analyse the reliability measures of embedded system with its sensitivity and also discussed the effects of various failure rates on system performance. At last, a numerical example has been take to illustrate the results and their graphical representation are also given.

Book ChapterDOI
01 Jan 2021
TL;DR: This paper presents a home security camera system based on cloud and SNS that uses twitter as the user interface and takes advantage of the Amazon Web Service (AWS) cloud system for AI-based face authentication.
Abstract: Security network cameras are widely deployed not only in business offices and public facilities but also in general households. Most of commercial network camera systems come with dedicated application software to monitor and control the camera system. This paper presents a home security camera system based on cloud and SNS. Unlike most of the commercial network camera systems, our security camera system does not require dedicated application software to monitor or control the camera system. Instead, we use twitter as the user interface. Also, we take advantage of the Amazon Web Service (AWS) cloud system for AI-based face authentication.

Journal ArticleDOI
TL;DR: The energy consumption of the cloud data center is minimized through the proposed Rail Fence Region-based Load balancing (RFRLB) algorithm, and a security model to improve the user’s trust model providing in the cloud is introduced.
Abstract: Computer services, such as cloud computing and distributed computing, offer very low costs. These services can be calculated in the form of hardware, operating system or application software. However, the prospect of a cloud service provider (CSP), then they are not easy to find. Cloud-based companies are offering customer computing servers that have proven to be less expensive for energy. In this proposed work, a systematic method of balancing tasks with the consumption of loads and security is addressed. The energy consumption of the cloud data center is minimized through our proposed load balancing algorithm. And also introduced a security model to improve the user’s trust model providing in the cloud. In public key with encryption, properties are based on cryptography. In this proposed, a trusted and scalable load balancing approach named Rail Fence Region-based Load balancing (RFRLB) it is adaptive, dynamic, scalable and efficient. When one server fails, the task transfer to another VM server. It takes rows, queue lengths and heavy workloads, as well as account server confidence values. The load balancing technique deployment model used in various computing environments. In this regard, the main focus is on improving bandwidth usage and improving cloud user security performance, rather than issues such as power efficiency. This proposed RFLP method performs well in comparison with parameters analysis and its protection method.

Journal ArticleDOI
TL;DR: The results show the boot software vulnerability to this kind of permanent effects and have led to the implementation of a reliability-oriented design, presented in this paper.

Book ChapterDOI
01 Jan 2021
TL;DR: In this article, the authors focused on the design stage and identified some object-oriented design measures and further analyzed the impact of these measures on the identified quality attribute that is reliability of application software using the fuzzy inference system.
Abstract: Looking at the lifestyle that everyone of us is living, it can be easily noticed that the impact of information technology is growing exponentially. Whether it is urban or rural area, everyone is heavily dependent on software directly or indirectly. This dependence on software has been creating a pressure on the information technology industry to meet this exponential demand. At the same time, various software quality attributes have been gaining its importance. The roots of a reliable software lie in the careful and informed implementation of design stage. Therefore, author has focused on the design stage and identified some object-oriented design measures and further analyzed the impact of these measures on the identified quality attribute that is reliability of application software using the fuzzy inference system.

Proceedings ArticleDOI
24 Apr 2021
TL;DR: In this article, a novel architecture of campus science cloud computing is proposed which can support policy-based software and hardware management and allocation, and a model is set up considering resources, users, jobs and applications.
Abstract: Application software service is foundation in science cloud computing, but it's always related to limited software licenses and hardware resources. So, it is important to study the software and hardware co-allocation algorithm and strategy under the environment of science cloud computing. In this paper, a novel architecture of campus science cloud computing is proposed which can support policy-based software and hardware management and allocation. Then, a model is set up considering resources, users, jobs and applications. Furthermore, the software and hardware co-allocation algorithm SHA is proposed. The algorithm SHA has been used in the NPU campus cloud computing environment. The results show that it can improve the utilization rate of software, realize the difference of QoS between the users with different roles, and ensure the fairness between the users with the same role.

Journal ArticleDOI
J Wang, B J Liu, W He, J K Xue, X Y Han 
01 Jan 2021
TL;DR: This paper presents a software monitoring data processing scheme based on NLP that can provide effective data support for system failure prediction by characterizing theSoftware monitoring data.
Abstract: In the process of using computer application software, the system may fail because of software defects. During the operation of the computer system, the running state of the system is also monitored. This paper mainly studies the monitoring data processing technology of computer application software based on NLP and presents a software monitoring data processing scheme based on NLP. First, the data were preprocessed by word segmentation and data cleaning. Then the named entity recognition and extraction information are accomplished by fusing CRF and rule-based methods. It can provide effective data support for system failure prediction by characterizing the software monitoring data.

Journal ArticleDOI
18 Apr 2021
TL;DR: To emphasize the substantial role of semantic alignment of software component frameworks’ interface ontologies in semantic interoperability, a typical vehicle domain case study involving vehicle applications is considered for demonstration.
Abstract: Semantic alignment of application software components’ ontologies represents a great interest in vehicle application domains that manipulate heterogeneous overlapping knowledge application frameworks. In the past few years, with the growth in the novel vehicle service requirements such as autonomous driving, V2X (Vehicle-to-Vehicle communication) and many others, automotive application software component models are becoming increasingly collaborative with other qualified cross-enterprise industrial partners to accomplish these complex service requirements. The most daunting impediment to this cross-enterprise collaboration is semantic interoperability. For efficient services collaboration through cross-enterprise semantic interoperability between the vehicle application frameworks’ software components, aligning the interface ontologies of these components by identifying the depth of semantic alignment relationships between the concepts of the interface ontologies is the major focus of this paper. In contrast to several existing ontology structural metrics, this work defines, evaluates and validates ontology metrics to measure the depth of semantic alignment between the vehicle domain software component frameworks’ interface ontological models. To emphasize the substantial role of semantic alignment of software component frameworks’ interface ontologies in semantic interoperability, a typical vehicle domain case study involving vehicle applications is considered for demonstration.

Proceedings ArticleDOI
08 Sep 2021
TL;DR: In this article, the AADL (Architecture Analysis and Design Language) language is used to model the application software, the hardware, and the deployment of the software components onto the hardware.
Abstract: Robotic software can exhibit low performances even while running on allegedly powerful multi-core processor platforms. To find why is essential to guarantee the success of a mission. This paper presents an approach to analyze the processing resource demand of a ROS (Robotic Operating System) based robotic application. The AADL (Architecture Analysis and Design Language) language is used to model the application software, the hardware, and the deployment of the software components onto the hardware. The analysis of processor loads, and the checking of MIPS demand against MIPS capacity, is done with the OSATE2 tool, thanks to a few properties of the language. To set up those properties, a rapid profiling of the hardware and of the software components of the application is done, based on common Linux performance counting tools. The final accuracy is good enough to allow for a fast verification of the deployment options, and to help thinking or rethinking the software vs hardware architectures.

Journal ArticleDOI
TL;DR: Easy approach to a responsive website design using artisteer application software - Progressively, the unique mobile internet is being explored.
Abstract: Easy approach to a responsive website design using artisteer application software - Progressively, the unique mobile internet

Journal ArticleDOI
TL;DR: The results show that a combination of offline and online tuning leads to good tuning results, however, due to the different input characteristics of the two application classes, regular versus irregular, different tuning aspects are most essential.
Abstract: Scientific application codes are often long-running time- and energy-consuming parallel codes, and the tuning of these methods towards the characteristics of a specific hardware is essential for a good performance. However, since scientific software is often developed over many years, the application software usually survives several hardware generations, which might make a re-tuning of the existing codes necessary. To simplify the tuning process, it would be beneficial to have software with inherent tuning possibilities. In this article, we explore the possibilities of tuning methods for time-step-based applications. Two different time-step-based application classes are considered, which are solution methods for ordinary differential equations and particle simulation methods. The investigation comprises a broad range of tuning possibilities, starting from the choice of algorithms, the parallel programming model, static implementation variants, input characteristics as well as hardware parameters for parallel execution. An experimental investigation shows the different characteristics of the application classes on different multicore systems. The results show that a combination of offline and online tuning leads to good tuning results. However, due to the different input characteristics of the two application classes, regular versus irregular, different tuning aspects are most essential.