13 research outputs found

    A software architecture for electro-mobility services: a milestone for sustainable remote vehicle capabilities

    Get PDF
    To face the tough competition, changing markets and technologies in automotive industry, automakers have to be highly innovative. In the previous decades, innovations were electronics and IT-driven, which increased exponentially the complexity of vehicle’s internal network. Furthermore, the growing expectations and preferences of customers oblige these manufacturers to adapt their business models and to also propose mobility-based services. One other hand, there is also an increasing pressure from regulators to significantly reduce the environmental footprint in transportation and mobility, down to zero in the foreseeable future. This dissertation investigates an architecture for communication and data exchange within a complex and heterogeneous ecosystem. This communication takes place between various third-party entities on one side, and between these entities and the infrastructure on the other. The proposed solution reduces considerably the complexity of vehicle communication and within the parties involved in the ODX life cycle. In such an heterogeneous environment, a particular attention is paid to the protection of confidential and private data. Confidential data here refers to the OEM’s know-how which is enclosed in vehicle projects. The data delivered by a car during a vehicle communication session might contain private data from customers. Our solution ensures that every entity of this ecosystem has access only to data it has the right to. We designed our solution to be non-technological-coupling so that it can be implemented in any platform to benefit from the best environment suited for each task. We also proposed a data model for vehicle projects, which improves query time during a vehicle diagnostic session. The scalability and the backwards compatibility were also taken into account during the design phase of our solution. We proposed the necessary algorithms and the workflow to perform an efficient vehicle diagnostic with considerably lower latency and substantially better complexity time and space than current solutions. To prove the practicality of our design, we presented a prototypical implementation of our design. Then, we analyzed the results of a series of tests we performed on several vehicle models and projects. We also evaluated the prototype against quality attributes in software engineering

    MEDICT: A Malay<-> English Bilingual Dictionary For Java Mobile Phones

    Get PDF
    Today, mobile phones provide number of advanced functions, among which possibility of running mobile applications seems to be the most interesting feature. It changes a standard mobile phone into a mini-size yet still powerful computer that able to run various applications, for example games, stock checkup, map guide, dictionary and so on. This paper presents a project currently in progress which aims at the construction of bi-directional Malay - English translation dictionary named MEDict. MEDict is an easy-to-use mobile dictionary that is the ideal reference tool for all those requiring quick access to word translations. MEDict will ideally suit J2ME mobile phones with GPRS connectivity. This paper delivers the initial development progress of MEDict. It covers the functional requirements and possible development approaches followed in building MEDict. The project incorporates the development of four main components: (1) a java-based mobile client that provides interface for front-end query input; (2) a back-end database for serving dictionary contents; (3) a dictionary service for handling the exchange between the mobile client's queries and the database; (4) a web system that allows the administrator to manage the dictionary contents. The key contribution of this study is the use of Java and mobile technologies to develop a translation dictionary between two languages that has not been previously supported. The developed mobile dictionary is expected to meet the needs of a wide range of users such as language learners, native speakers, travelers and business professionals in Malaysia

    Ontologizing Lexicon Access Functions based on an LMF-based Lexicon Taxonomy

    Get PDF
    This paper discusses ontologization of lexicon access functions in the context of a service-oriented language infrastructure, such as the Language Grid. In such a language infrastructure, an access function to a lexical resource, embodied as an atomic Web service, plays a crucially important role in composing a composite Web service tailored to a user?s specific requirement. To facilitate the composition process involving service discovery, planning and invocation, the language infrastructure should be ontology-based; hence the ontologization of a range of lexicon functions is highly required. In a service-oriented environment, lexical resources however can be classified from a service-oriented perspective rather than from a lexicographically motivated standard. Hence to address the issue of interoperability, the taxonomy for lexical resources should be ground to principled and shared lexicon ontology. To do this, we have ontologized the standardized lexicon modeling framework LMF, and utilized it as a foundation to stipulate the service-oriented lexicon taxonomy and the corresponding ontology for lexicon access functions. This paper also examines a possible solution to fill the gap between the ontological descriptions and the actual Web service API by adopting a W3C recommendation SAWSDL, with which Web service descriptions can be linked with the domain ontology

    Bedeutungsbeziehungen in fachlexikographischen Nachschlagewerken

    Get PDF
    No abstract

    Search techniques in electronic dictionaries: a classification for translators

    Get PDF
    Translators, and language professionals in general, have long claimed that dictionaries are deficient, especially regarding access and updating of content. Some authors have also noted that these deficiencies are compounded by the fact that language professionals do not receive (proper) training in dictionary use, and therefore do not fully benefit from them. Electronic dictionaries include new search capabilities, not found in traditional dictionaries, that could meet users’ needs. However, the diversity of search options in electronic dictionaries makes their classification difficult, and consequently hinders training in their use. Systematization of search techniques in electronic dictionaries would favor the teaching and learning process, and could also facilitate the task of lexicographers and terminographers in the creation of new and more standardized electronic dictionaries. In this paper we classify search techniques in electronic dictionaries by focusing on three elements that are common to every search and that, taken together, encompass all the search possibilities we have observed in electronic dictionaries

    Effective Detection of Vulnerable and Malicious Browser Extensions

    Get PDF
    Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security threat for browsers include: i) the wide popularity of browser extensions, ii) the similarity of browser extensions with web applications, and iii) the high privilege of browser extension scripts. Furthermore, mechanisms that specifically target to mitigate browser extension-related attacks have received less attention as opposed to solutions that have been deployed for common web security problems (such as SQL injection, XSS, logic flaws, client-side vulnerabilities, drive-by-download, etc.). To address these challenges, recently some techniques have been proposed to defend extension-related attacks. These techniques mainly focus on information flow analysis to capture suspicious data flows, impose privilege restriction on API calls by malicious extensions, apply digital signatures to monitor process and memory level activities, and allow browser users to specify policies in order to restrict the operations of extensions. This article presents a model-based approach to detect vulnerable and malicious browser extensions by widening and complementing the existing techniques. We observe and utilize various common and distinguishing characteristics of benign, vulnerable, and malicious browser extensions. These characteristics are then used to build our detection models, which are based on the Hidden Markov Model constructs. The models are well trained using a set of features extracted from a number of browser extensions together with user supplied specifications. Along the course of this study, one of the main challenges we encountered was the lack of vulnerable and malicious extension samples. To address this issue, based on our previous knowledge on testing web applications and heuristics obtained from available vulnerable and malicious extensions, we have defined rules to generate training samples. The approach is implemented in a prototype tool and evaluated using a number of Mozilla Firefox extensions. Our evaluation indicated that the approach not only detects known vulnerable and malicious extensions, but also identifies previously undetected extensions with a negligible performance overhead

    On Web-scale Reasoning

    Get PDF
    Bal, H.E. [Promotor]Harmelen, F.A.H. van [Promotor

    The dictionary server

    No full text
    corecore