194 research outputs found
Advanced flight control system study
A fly by wire flight control system architecture designed for high reliability includes spare sensor and computer elements to permit safe dispatch with failed elements, thereby reducing unscheduled maintenance. A methodology capable of demonstrating that the architecture does achieve the predicted performance characteristics consists of a hierarchy of activities ranging from analytical calculations of system reliability and formal methods of software verification to iron bird testing followed by flight evaluation. Interfacing this architecture to the Lockheed S-3A aircraft for flight test is discussed. This testbed vehicle can be expanded to support flight experiments in advanced aerodynamics, electromechanical actuators, secondary power systems, flight management, new displays, and air traffic control concepts
Technology Changes In Aeronautical Systems
International audienceGuidance for producing airborne software today must be developed to the expectations of ED- 12B/DO-178B âSoftware Considerations in Airborne Systems and Equipment Certificationâ.[1] EASA and the FAA have formally recognized this âobjective-basedâ aviation software guidance and it has proven to be extremely successful in the development of safe, in-service, operational aircraft containing software. Since its publication in 1992, ED-12B/DO- 178B has gain respect as a standard that meets the goals of safety in the airborne community. However recent technology advances such as Object Oriented Technology, Model Based Design, Software Tools and Formal Methods have applied methods that require elaboration of how the ED-12B/DO-178B objectives will be met. This paper discusses the approach for introducing new technologies with legacy aviation standards
Berkeley Packet Filter: theory, practice and perspectives
Inizialmente in molte versioni di Unix il meccanismo di filtraggio dei pacchetti era implementato nello spazio utente, richiedendo la copia di ogni pacchetto dallo spazio kernel, prima di essere filtrato. L'introduzione di BPF ha permesso di migliorare la performance consentendo il filtraggio dei pacchetti direttamente nel kernel space. La prima implementazione, classic BPF (cBPF) permette di iniettare dallo spazio utente codice assembly per la macchina virtuale che risiede nel kernel, in modo che il programmatore possa scrivere filtri personalizzati. L' utilizzo di cBPF e' stato esteso anche al filtraggio delle system call tramite l'implementazione di seccomp che sfrutta la stessa sintassi ma per agire su una struttura dati che rappresenta la system call eseguita, invece che il pacchetto di rete.
Successivamente la macchina virtuale e' stata riscritta sia per adeguarla alle innovazioni riguardanti l'architettura dei moderni processori (e.g. piu'
registri, piu' istruzioni) sia con lo scopo di aggiungere ulteriori funzionalita'.
La nuova implementazione prende il nome di extended BPF (eBPF) e prevede molte piu' tipologie di programmi, la possibilita' di utilizzare mappe per la comunicazione tra user space e kernel space, la possibilita' di chiamare da un programma BPF altri programmi BPF o un sottoinsieme di funzioni del kernel chiamate helpers, nonche' la possibilita' di fissare alcuni oggetti in un file system virtuale in modo da poterli recuperare successivamente. Il supporto eBPF per seccomp non e' stato introdotto sebbene vi siano state alcune patch proposte. Il seguente lavoro di tesi ha l'obiettivo di introdurre cBPF ed eBPF, sia a livello teorico descrivendone le componenti, che pratico tramite la creazione di un repository github ed di una documentazione tecnica ed infine di analizzare alcuni aspetti relativi a seccomp
An Empirical Analysis to Control Product Counterfeiting in the Automotive Industry\u27s Supply Chains in Pakistan
The counterfeits pose significant health and safety threat to consumers. The quality image of firms is vulnerable to the damage caused by the expanding flow of counterfeit products in todayâs global supply chains. The counterfeiting markets are swelling due to globalization and customersâ willingness to buy counterfeits, fueling illicit activities to explode further. Buyers look for the original parts are deceived by the false (deceptive) signalsâ communication. The counterfeiting market has become a multi-billion industry but lacks detailed insights into the supply side of counterfeiting (deceptive side). The study aims to investigate and assess the relationship between the anti-counterfeiting strategies and improvement in the firmâs supply performance within the internal and external supply chain quality management context in the auto-parts industryâs supply chains in Pakistan
Docker security in web simulation tools: a layered approach
International Conference on Wireless Networks and Mobile Communication (EUIWNMC), 26/08/2021-27/08/2021, Marrakesh, Marruecos.In this work, container security issues and strengths are studied using Docker as the main implementation. First,
the container infrastructure is described and compared against the traditional approach of virtual machines. Secondly, the
Docker containers security is discussed by the different infrastructure layers that compose them and different solutions are
proposed to try to decrease the attack surface over this kind of applications.Universidad de Alcal
Recommended from our members
Software configuration management plan for the Hanford site technical database
The Hanford Site Technical Database (HSTD) is used as the repository/source for the technical requirements baseline and programmatic data input via the Hanford Site and major Hanford Project Systems Engineering (SE) activities. The Hanford Site SE effort has created an integrated technical baseline for the Hanford Site that supports SE processes at the Site and project levels which is captured in the HSTD. The HSTD has been implemented in Ascent Logic Corporation (ALC) Commercial Off-The-Shelf (COTS) package referred to as the Requirements Driven Design (RDD) software. This Software Configuration Management Plan (SCMP) provides a process and means to control and manage software upgrades to the HSTD system
Next generation software process improvement
Software is often developed under a process that can at best be described as ad hoc. While it is possible to develop quality software under an ad hoc process, formal processes can be developed to help increase the overall quality of the software under development. The application of these processes allows for an organization to mature. The software maturity level, and process improvement, of an organization can be measured with the Capability Maturity Model. The scope of this work is to use organizationally improved software processes on a small scale software product developed by the U.S. Army . The goal is to establish process improvement based on the Capability Maturity Model.http://archive.org/details/nextgenerationso10945895Civilian, United States Army TACOMApproved for public release; distribution is unlimited
- âŠ