291,618 research outputs found

    Communication Capability for a Simulation-Based Test and Evaluation Framework for Autonomous Systems

    Get PDF
    The design and testing process for collaborative autonomous systems can be extremely complex and time-consuming, so it is advantageous to begin testing early in the design. A Test & Evaluation (T&E) Framework was previously developed to enable the testing of autonomous software at various levels of mixed reality. The Framework assumes a modular approach to autonomous software development, which introduces the possibility that components are not in the same stage of development. The T&E Framework allows testing to begin early in a simulated environment, with the autonomous software methodically migrating from virtual to augmented to physical environments as component development advances. This thesis extends the previous work to include a communication layer allowing collaborative autonomous systems to communicate with each other and with a virtual environment. Traversing through the virtuality-reality spectrum results in different communication needs for collaborative autonomous systems, namely the use of different communication protocols at each level of the spectrum. For example, testing in a fully simulated environment might be on a single processor or allow wired communication if distributed to different computing platforms. Alternatively, testing in a fully physical environment imposes the need for wireless communication. However, an augmented environment may require the concurrent use of multiple protocols. This research extends the Test & Evaluation Framework by developing a heterogeneous communication layer to facilitate the implementation and testing of collaborative autonomous systems throughout various levels of the virtuality-reality spectrum. The communication layer presented in this thesis allows developers of the core autonomous software to be shielded from the configuration of communication needs, with changes to the communication environment not resulting in changes to the autonomous software

    Development of an Object-Oriented High-Level Language and Construction of an Associated Object-Oriented Compiler

    Get PDF
    Computerized automation has long past been in practice, and engineers are developing ways and means of improving strategies to achieve better performance. Related search is concentrated on developing methords to diversify the application of computing technologies by bringing software and its field of application close together. The idea is to eventually create a software configuration that makes itself transparent to the user by mapping reality onto the computer's monitor. This paper is a report on a portion of and interdisciplinary project that attempts to apply state-of-the-art software techniques in the design of an integrated programming environment for manufacturing purposes. The portion of the project described in this paper is concerned with two aspects: designing a special purpose object-oriented high-level language for programming a classroom research laboratory for manufacturing students and faculty, and designing and implementing an object-oriented compiler to allow students to write programs using this language. The purpose of the project is to integrate manufacturing devices and cells with the existing computer network to provide a flexible manufacturing system

    Design and implementation of a local area network utilizing Intel 310/80286 systems

    Get PDF
    The goal of this work was to provide the foundation for a course in networking by developing the hardware and software for a token ring Local Area Network (LAN). Any course work in networking would focus on the emerging International Standards Organization (ISO) Open Systems Interconnections (OSI) model. This model provides a seven layered structure, where each layer performs some logical aspect of the communication process. Thus, the software developed would have to provide the functionality of a multiple layered design, implying multiple tasks communicating by operating system primitives. Also, a simplified design would minimize the time for those students trying to assimilate the basic work prior to embarking on the design of their own work. Within an Intel 310 system running the iRMX operating system, the LAN hardware and software were developed. The package allows reliable transfer of files to the other nodes on a token ring LAN via access by user programs to lower layers. In addition, the user has a reasonable interface to interact with the file system of the home node. Once the physical configuration of the LAN is established, the software is self-initializing and self monitoring for pathological cases. The software runs as an application task on each node, thus maintaining each Intel 310 as a general purpose development environment

    Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs

    Get PDF
    Variability models are used to build configurators. Configurators are programs that guide users through the configuration process to reach a desired configuration that fulfils user requirements. The same variability model can be used to design different configura tors employing different techniques. One of the elements that can change in a configurator is the configuration workflow, i.e., the order and sequence in which the different configuration elements are presented to the configuration stakeholders. When developing a configurator, a challenge is to decide the configuration workflow that better suites stakeholders according to previous configurations. For example, when configuring a Linux distribution, the configura tion process start by choosing the network or the graphic card, and then other packages with respect to a given sequence. In this paper, we present COnfiguration workfLOw proceSS mIning (COLOSSI), an automated technique that given a set of logs of previous configu rations and a variability model can automatically assist to determine the configuration workflow that better fits the configuration logs generated by user activities. The technique is based on process discovery, commonly used in the process mining area, with an adaptation to configuration contexts. Our proposal is validated us ing existing data from an ERP configuration environment showing its feasibility. Furthermore, we open the door to new applications of process mining techniques in different areas of software product line engineering.Ministerio de Ciencia y TecnologĂ­a RTI2018-094283-B-C3

    Evidence-based Development of Trustworthy Mobile Medical Apps

    Get PDF
    abstract: Widespread adoption of smartphone based Mobile Medical Apps (MMAs) is opening new avenues for innovation, bringing MMAs to the forefront of low cost healthcare delivery. These apps often control human physiology and work on sensitive data. Thus it is necessary to have evidences of their trustworthiness i.e. maintaining privacy of health data, long term operation of wearable sensors and ensuring no harm to the user before actual marketing. Traditionally, clinical studies are used to validate the trustworthiness of medical systems. However, they can take long time and could potentially harm the user. Such evidences can be generated using simulations and mathematical analysis. These methods involve estimating the MMA interactions with human physiology. However, the nonlinear nature of human physiology makes the estimation challenging. This research analyzes and develops MMA software while considering its interactions with human physiology to assure trustworthiness. A novel app development methodology is used to objectively evaluate trustworthiness of a MMA by generating evidences using automatic techniques. It involves developing the Health-Dev ÎČ tool to generate a) evidences of trustworthiness of MMAs and b) requirements assured code generation for vulnerable components of the MMA without hindering the app development process. In this method, all requests from MMAs pass through a trustworthy entity, Trustworthy Data Manager which checks if the app request satisfies the MMA requirements. This method is intended to expedite the design to marketing process of MMAs. The objectives of this research is to develop models, tools and theory for evidence generation and can be divided into the following themes: ‱ Sustainable design configuration estimation of MMAs: Developing an optimization framework which can generate sustainable and safe sensor configuration while considering interactions of the MMA with the environment. ‱ Evidence generation using simulation and formal methods: Developing models and tools to verify safety properties of the MMA design to ensure no harm to the human physiology. ‱ Automatic code generation for MMAs: Investigating methods for automatically ‱ Performance analysis of trustworthy data manager: Evaluating response time generating trustworthy software for vulnerable components of a MMA and evidences.performance of trustworthy data manager under interactions from non-MMA smartphone apps.Dissertation/ThesisDoctoral Dissertation Computer Science 201

    Putting Teeth into Open Architectures: Infrastructure for Reducing the Need for Retesting

    Get PDF
    Proceedings Paper (for Acquisition Research Program)The Navy is currently implementing the open-architecture framework for developing joint interoperable systems that adapt and exploit open-system design principles and architectures. This raises concerns about how to practically achieve dependability in software-intensive systems with many possible configurations when: 1) the actual configuration of the system is subject to frequent and possibly rapid change, and 2) the environment of typical reusable subsystems is variable and unpredictable. Our preliminary investigations indicate that current methods for achieving dependability in open architectures are insufficient. Conventional methods for testing are suited for stovepipe systems and depend strongly on the assumptions that the environment of a typical system is fixed and known in detail to the quality-assurance team at test and evaluation time. This paper outlines new approaches to quality assurance and testing that are better suited for providing affordable reliability in open architectures, and explains some of the additional technical features that an Open Architecture must have in order to become a Dependable Open Architecture.Naval Postgraduate School Acquisition Research ProgramApproved for public release; distribution is unlimited

    Integrating Software Engineering Key Practices into an OOP Massive In-Classroom Course: an Experience Report

    Get PDF
    Programming and software engineering courses in computer science curricula typically focus on both providing theoretical knowledge of programming languages and best-practices, and developing practical development skills. In a massive course --- several hundred students --- the teachers are not able to adequately attend to the practical part, therefore process automation and incentives to students must be used to drive the students in the right direction. Our goals was to design an automated programming assignment infrastructure capable of supporting massive courses. The infrastructure should encourage students to apply the key software engineering (SE) practices --- automated testing, configuration management, and Integrated Development Environment (IDE) --- and acquire the basic skills for using the corresponding tools. We selected a few widely adopted development tools used to support the key software engineering practices and mapped them to the basic activities in our exam assignment management process. This experience report describes the results from the past academic year. The infrastructure we built has been used for a full academic year and supported four exam sessions for a total of over a thousand students. The satisfaction level reported by the students is generally high

    DISTRIBUTED COLLABORATION: ENGINEERING PRACTICE REQUIREMENTS

    Get PDF
    Designing a structure follows a pattern of creating a structural design concept, executing a finite element analysis and developing a design model. A project was undertaken to create computer support for executing these tasks within a collaborative environment. This study focuses on developing a software architecture that integrates the various structural design aspects into a seamless functional collaboratory that satisfies engineering practice requirements. The collaboratory is to support both homogeneous collaboration i.e. between users operating on the same model and heterogeneous collaboration i.e. between users operating on different model types. Collaboration can take place synchronously or asynchronously, and the information exchange is done either at the granularity of objects or at the granularity of models. The objective is to determine from practicing engineers which configurations they regard as best and what features are essential for working in a collaborative environment. Based on the suggestions of these engineers a specification of a collaboration configuration that satisfies engineering practice requirements will be developed

    A Model Based Framework for Service Availability Management

    Get PDF
    High availability of services is an important requirement in several domains, including mission critical systems. The Service Availability Forum (SA Forum) is a consortium of telecommunications and computing companies that defines standard middleware solutions for high availability. Availability Management Framework (AMF) manages the high availability of services by coordinating their application components according to redundancy models. To protect these services, AMF requires a configuration, i.e. a representation of the organization of the logical entities composing an application under its control. AMF configuration design is error-prone and tedious if done manually, due to the complexity of the AMF domain. This PhD thesis explores the effective design and analysis of AMF configurations, proposing a model-based management framework that facilitates this process. We propose a domain-specific modeling language that captures AMF domain concepts, relationships, and constraints, facilitating the management of AMF configurations. We define this language by extending UML through its profiling mechanism, capturing the concepts of AMF configurations and the description of the software for which the configuration will be generated. We introduce a new approach for the automatic generation of AMF configurations based on our UML profile using model transformation techniques. This approach consists of a set of transformations from the software description entities into AMF configurations while satisfying the requirements of the services to be provided as well as the constraints of the deployment infrastructure. We also propose a third-party AMF configuration validation approach consisting of syntactical and semantic validations. Syntactical validation checks the well-formedness of third-party configurations by validating them against AMF standard specification requirements captured in our UML profile. Semantic validation focuses on ensuring the runtime protection of services at configuration time (the SI-Protection problem). SI-Protection has combinatorial aspects and results in an NP-hard problem for most redundancy models, which we have tackled by devising a heuristic-based method, overcoming its complexity. We present proofs of concepts by using different available technologies: IBM Rational Software Architect (RSA) for implementing our UML profiles, Eclipse environment for developing a prototype tool for validating third-party configurations, and Atlas Transformation Language (ATL) for developing a prototype implementation of our model-based configuration generation approach
    • 

    corecore