506,625 research outputs found

    Enhanced cell controller for aerospace manufacturing

    Get PDF
    Aerospace manufacturing industry is unique in that production typically focuses on high variety and quality but extremely low volume. Manufacturing processes are also sometimes unique and not repeatable and, hence, costly. Production is getting more expensive with the introduction of industrial robots and their cells. This paper describes the development of the Flexa Cell Coordinator (FCC), a system that is providing a solution to manage resources at assembly cell level. It can control, organise and coordinate between the resources and is capable of controlling remote cells and resources because of its distributed nature. It also gives insight of a system to the higher management via its rich reporting facility and connectivity with company systems e.g., Enterprise Resource Planner (ERP). It is able to control various kinds of cells and resources (network based) which are not limited to robots and machines. It is extendable and capable of adding multiple numbers of cells inside the system. It also provides the facility of scheduling the task to avoid the deadlocking in the process. In FCC resources (e.g., tracker) can also be shared between cells

    Image Analysis Workflow for 2-D Electrophoresis Gels Based on ImageJ

    Get PDF
    A number of commercial software packages are currently available to perform digital two-dimensional electrophoresis (2D-GE) gel analysis. However, both the high cost of the commercial packages and the unavailability of a standard data analysis workflow, have prompted several groups to develop freeware systems to perform certain steps of gel analysis. Unfortunately, to the best of our knowledge none of them offer a package that performs all the steps envisaged in a 2D-GE gel analysis. Here we describe an ImageJ-based procedure, able to manage all the steps of a 2D-GE gel analysis. ImageJ is a free available image processing and analysis application developed by National Institutes of Health (NIH) and widely used in different life sciences fields as medical imaging, microscopy, western blotting and PAGE. Nevertheless no one has yet developed a procedure enabled to compare spots on 2D-GE gels. We collected all used ImageJ tools in a plug-in that allows us to perform the whole 2D-GE analysis. To test it, we performed a set of 2D-GE experiments on plasma samples from 9 patients victims of acute myocardial infarction and 8 controls, and we compared the results obtained by our procedure to those obtained using a widely diffuse commercial package, finding similar performance

    Software system integration - Middleware - an overview

    Get PDF
    The integration of different softwares written in different language and based on different platforms can be tricky. In that situation a middleware is necessary to enable the communication between different softwares. The middleware enables the software system not only to share data but also share the services. This paper gives an overview of some of middleware technologies which can be used to integrate different software systems

    A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols

    Get PDF
    AbstractThe verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [Gavin Lowe. Breaking and fixing the needham-schroeder public-key protocol using FDR. In TACAs'96: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pages 147–166, London, UK, 1996. Springer-Verlag] and OFMC [A.D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In D. Gollmann and E. Snekkenes, editors, ESORICS'03: 8th European Symposium on Research in Computer Security, number 2808 in Lecture Notes in Computer Science, pages 253–270, Gjøvik, Norway, 2003. Springer-Verlag]; and ii) theorem proving, e.g. the Isabelle inductive method [Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal in Computer Security, 6(1-2):85–128, 1998] and Coral [G. Steel, A. Bundy, and M. Maidl. Attacking the asokan-ginzboorg protocol for key distribution in an ad-hoc bluetooth network using coral. In H. König, M. Heiner, and A. Wolisz, editors, IFIP TC6 /WG 6.1: Proceedings of 23rd IFIP International Conference on Formal Techniques for Networked and Distributed Systems, volume 2767, pages 1–10, Berlin, Germany, 2003. FORTE 2003 (work in progress papers)]. Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct [M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, 1996]. We are interested in a problem related to verification but far less explored: the correction of faulty security protocols. Experience has shown that the analysis of counterexamples or failed proof attempts often holds the key to the completion of proofs and for the correction of a faulty model. In this paper, we introduce a method for patching faulty security protocols that are susceptible to an interleaving-replay attack. Our method makes use of Abadi and Needham's principles for the prudent engineering practice for cryptographic protocols in order to guide the location of the fault in a protocol as well as the proposition of candidate patches. We have run a test on our method with encouraging results. The test set includes 21 faulty security protocols borrowed from the Clark-Jacob library [J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, Department of Computer Science, University of York, November 1997. A complete specification of the Clark-Jacob library in CAPSL is available at http://www.cs.sri.com/millen/capsl/]

    Modernizing PHCpack through phcpy

    Full text link
    PHCpack is a large software package for solving systems of polynomial equations. The executable phc is menu driven and file oriented. This paper describes the development of phcpy, a Python interface to PHCpack. Instead of navigating through menus, users of phcpy solve systems in the Python shell or via scripts. Persistent objects replace intermediate files.Comment: Part of the Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013), Pierre de Buyl and Nelle Varoquaux editors, (2014

    Development of RMJ: A mirror of the development of the profession and discipline of record management

    Get PDF
    The purpose of this paper is to examine critically the history of Records Management Journal on its 20th anniversary; it aims to review and analyse its evolution and its contribution in the context of the development of the profession and the discipline of records management. The paper seeks to provide the context and justification for the selection of eight articles previously published in the journal to be reprinted in this issue
    • …
    corecore