13 research outputs found
A software architecture for electro-mobility services: a milestone for sustainable remote vehicle capabilities
To face the tough competition, changing markets and technologies in automotive industry,
automakers have to be highly innovative. In the previous decades, innovations were
electronics and IT-driven, which increased exponentially the complexity of vehicle’s internal
network. Furthermore, the growing expectations and preferences of customers oblige these
manufacturers to adapt their business models and to also propose mobility-based services.
One other hand, there is also an increasing pressure from regulators to significantly reduce
the environmental footprint in transportation and mobility, down to zero in the foreseeable
future.
This dissertation investigates an architecture for communication and data exchange
within a complex and heterogeneous ecosystem. This communication takes place between
various third-party entities on one side, and between these entities and the infrastructure
on the other. The proposed solution reduces considerably the complexity of vehicle
communication and within the parties involved in the ODX life cycle. In such an
heterogeneous environment, a particular attention is paid to the protection of confidential
and private data. Confidential data here refers to the OEM’s know-how which is enclosed
in vehicle projects. The data delivered by a car during a vehicle communication session
might contain private data from customers. Our solution ensures that every entity of this
ecosystem has access only to data it has the right to. We designed our solution to be
non-technological-coupling so that it can be implemented in any platform to benefit from
the best environment suited for each task. We also proposed a data model for vehicle
projects, which improves query time during a vehicle diagnostic session. The scalability and
the backwards compatibility were also taken into account during the design phase of our
solution.
We proposed the necessary algorithms and the workflow to perform an efficient vehicle
diagnostic with considerably lower latency and substantially better complexity time and
space than current solutions. To prove the practicality of our design, we presented a
prototypical implementation of our design. Then, we analyzed the results of a series of tests
we performed on several vehicle models and projects. We also evaluated the prototype
against quality attributes in software engineering
MEDICT: A Malay<-> English Bilingual Dictionary For Java Mobile Phones
Today, mobile phones provide number of advanced functions, among which possibility of running mobile applications
seems to be the most interesting feature. It changes a standard mobile phone into a mini-size yet still powerful computer
that able to run various applications, for example games, stock checkup, map guide, dictionary and so on. This paper
presents a project currently in progress which aims at the construction of bi-directional Malay - English translation
dictionary named MEDict. MEDict is an easy-to-use mobile dictionary that is the ideal reference tool for all those
requiring quick access to word translations. MEDict will ideally suit J2ME mobile phones with GPRS connectivity. This
paper delivers the initial development progress of MEDict. It covers the functional requirements and possible
development approaches followed in building MEDict. The project incorporates the development of four main
components: (1) a java-based mobile client that provides interface for front-end query input; (2) a back-end database for
serving dictionary contents; (3) a dictionary service for handling the exchange between the mobile client's queries and the
database; (4) a web system that allows the administrator to manage the dictionary contents. The key contribution of this
study is the use of Java and mobile technologies to develop a translation dictionary between two languages that has not
been previously supported. The developed mobile dictionary is expected to meet the needs of a wide range of users such
as language learners, native speakers, travelers and business professionals in Malaysia
Ontologizing Lexicon Access Functions based on an LMF-based Lexicon Taxonomy
This paper discusses ontologization of lexicon access functions in the context of a service-oriented language infrastructure, such as the Language Grid. In such a language infrastructure, an access function to a lexical resource, embodied as an atomic Web service, plays a crucially important role in composing a composite Web service tailored to a user?s specific requirement. To facilitate the composition process involving service discovery, planning and invocation, the language infrastructure should be ontology-based; hence the ontologization of a range of lexicon functions is highly required. In a service-oriented environment, lexical resources however can be classified from a service-oriented perspective rather than from a lexicographically motivated standard. Hence to address the issue of interoperability, the taxonomy for lexical resources should be ground to principled and shared lexicon ontology. To do this, we have ontologized the standardized lexicon modeling framework LMF, and utilized it as a foundation to stipulate the service-oriented lexicon taxonomy and the corresponding ontology for lexicon access functions. This paper also examines a possible solution to fill the gap between the ontological descriptions and the actual Web service API by adopting a W3C recommendation SAWSDL, with which Web service descriptions can be linked with the domain ontology
Search techniques in electronic dictionaries: a classification for translators
Translators, and language professionals in general, have long claimed that dictionaries are deficient, especially regarding access and updating of content. Some authors have also noted that these deficiencies are compounded by the fact that language professionals do not receive (proper) training in dictionary use, and therefore do not fully benefit from them. Electronic dictionaries include new search capabilities, not found in traditional dictionaries, that could meet users’ needs. However, the diversity of search options in electronic dictionaries makes their classification difficult, and consequently hinders training in their use. Systematization of search techniques in electronic dictionaries would favor the teaching and learning process, and could also facilitate the task of lexicographers and terminographers in the creation of new and more standardized electronic dictionaries. In this paper we classify search techniques in electronic dictionaries by focusing on three elements that are common to every search and that, taken together, encompass all the search possibilities we have observed in electronic dictionaries
Effective Detection of Vulnerable and Malicious Browser Extensions
Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security threat for browsers include: i) the wide popularity of browser extensions, ii) the similarity of browser extensions with web applications, and iii) the high privilege of browser extension scripts. Furthermore, mechanisms that specifically target to mitigate browser extension-related attacks have received less attention as opposed to solutions that have been deployed for common web security problems (such as SQL injection, XSS, logic flaws, client-side vulnerabilities, drive-by-download, etc.). To address these challenges, recently some techniques have been proposed to defend extension-related attacks. These techniques mainly focus on information flow analysis to capture suspicious data flows, impose privilege restriction on API calls by malicious extensions, apply digital signatures to monitor process and memory level activities, and allow browser users to specify policies in order to restrict the operations of extensions. This article presents a model-based approach to detect vulnerable and malicious browser extensions by widening and complementing the existing techniques. We observe and utilize various common and distinguishing characteristics of benign, vulnerable, and malicious browser extensions. These characteristics are then used to build our detection models, which are based on the Hidden Markov Model constructs. The models are well trained using a set of features extracted from a number of browser extensions together with user supplied specifications. Along the course of this study, one of the main challenges we encountered was the lack of vulnerable and malicious extension samples. To address this issue, based on our previous knowledge on testing web applications and heuristics obtained from available vulnerable and malicious extensions, we have defined rules to generate training samples. The approach is implemented in a prototype tool and evaluated using a number of Mozilla Firefox extensions. Our evaluation indicated that the approach not only detects known vulnerable and malicious extensions, but also identifies previously undetected extensions with a negligible performance overhead