95 research outputs found

    Analysis of Monitoring Tools for Java Applications

    Get PDF
    Abstract. Runtime Monitoring is performed during the execution of software to detect anomalies in them. Currently several tools are available that help in developing the monitors. We analyze the prominent monitoring tools available for Java applications based on two features, the properties that can be monitored using these tools and the specification language used to specify the monitorable properties. The analysis performed will help the users and developers better evaluate the characteristics of different monitoring tools available in order to select the one suitable for their application

    Design of a Spiral Double-Cutting Machine for an Automotive Bowden Cable Assembly Line

    Get PDF
    The manufacture of automotive components requires innovative technologies and equipment. Due to the competitiveness in the sector, the implementation of automatic and robotic equipment has been vital in its development to produce the largest number of products in the shortest amount of time. Automation leads to a significant reduction in defects and enables mass production and standardization of the final product. This work was based on the need of an automotive components’ company to increase the rate of spiral cable cutting, used as protection for Bowden (control) cables. Currently, this component, used in automotive systems, is processed with simple cutting machines and cleaning machines. Based on the design science research (DSR) methodology, this work aims to develop a machine capable of performing the cutting and cleaning of two spiral cables simultaneously and automatically. The development of this machine was based on existing machines, and the biggest challenge was the implementation of a double-cutting system. The designed machine met the initial requirements, such as enabling the simultaneous cut of two spirals, being fully automatic, doubling the output over the current solution, and fully complying with the current legislation.info:eu-repo/semantics/publishedVersio

    Improving the Efficiency of the Bowden Cable Terminal Injection Process for the Automotive Industry

    Get PDF
    Control cables transfer force between two separate locations by a flexible mean, and hence, they are important in the automotive industry and many others; their terminals interact with both moving and moved mechanisms, so they must be strong. Cable terminals are commonly made of ZAMAK and are created by injection molding. However, such a production method requires leaving extra material to allow the correct molding, also known as sprues, which are removed later in the process. In this case, the sprues were separating from the terminals in an uncontrolled way. In this work, the cause of sprues separating prematurely from the terminals in a production line is addressed. The whole process was analyzed, and each possible solution was evaluated using process improvement techniques and the Finite Element Method, leading to the best solutions. Molds, mold structures, and auxiliary equipment were improved, resulting in a minimally invasive intervention and remaining compatible with other equipment. Cost analyses were done, indicating an investment return in less than a year. The modification led to a reduction of 62.6% in the sprue mass, while porosity was reduced by 10.2% and 55.9%, corresponding to two terminal models. In conclusion, the interventions fulfilled the requirements and improved the operation of the line.info:eu-repo/semantics/publishedVersio

    Evaluation of biophysical, anatomical and biochemical traits of resistance to Sitophilus oryzae L (Coleoptera: Curculionidae) in stored maize

    Get PDF
    Sitophilus oryzae L is the most destructive insect pest of stored maize and is widely distributed in tropical regions. In the present study, eighteen maize genotypes were screened for several susceptibility parameters against S. oryzae by using «No Choice method». Biophysical traits (test weight, thousand kernel weight, kernel hardness), anatomical fractions (tip cap, germ, pericarp, endosperm), biochemical variants (starch, protein, oil, sugar) were correlated with insect susceptibility parameters. There is significant relationship among test weight, kernel hard- ness, and insect susceptibility parameters. Pericarp was positively correlated while endosperm, starch content were negatively correlated with median development period but were non-significant. Majority of the maize geno- types containing harder kernels and thick pericarp showed less susceptibility to S. oryzae. The results indicated that the biophysical, anatomical and biochemical traits are responsible for varying levels of resistance to S. oryzae

    Effect of angiotensin-converting enzyme inhibitor and angiotensin receptor blocker initiation on organ support-free days in patients hospitalized with COVID-19

    Get PDF
    IMPORTANCE Overactivation of the renin-angiotensin system (RAS) may contribute to poor clinical outcomes in patients with COVID-19. Objective To determine whether angiotensin-converting enzyme (ACE) inhibitor or angiotensin receptor blocker (ARB) initiation improves outcomes in patients hospitalized for COVID-19. DESIGN, SETTING, AND PARTICIPANTS In an ongoing, adaptive platform randomized clinical trial, 721 critically ill and 58 non–critically ill hospitalized adults were randomized to receive an RAS inhibitor or control between March 16, 2021, and February 25, 2022, at 69 sites in 7 countries (final follow-up on June 1, 2022). INTERVENTIONS Patients were randomized to receive open-label initiation of an ACE inhibitor (n = 257), ARB (n = 248), ARB in combination with DMX-200 (a chemokine receptor-2 inhibitor; n = 10), or no RAS inhibitor (control; n = 264) for up to 10 days. MAIN OUTCOMES AND MEASURES The primary outcome was organ support–free days, a composite of hospital survival and days alive without cardiovascular or respiratory organ support through 21 days. The primary analysis was a bayesian cumulative logistic model. Odds ratios (ORs) greater than 1 represent improved outcomes. RESULTS On February 25, 2022, enrollment was discontinued due to safety concerns. Among 679 critically ill patients with available primary outcome data, the median age was 56 years and 239 participants (35.2%) were women. Median (IQR) organ support–free days among critically ill patients was 10 (–1 to 16) in the ACE inhibitor group (n = 231), 8 (–1 to 17) in the ARB group (n = 217), and 12 (0 to 17) in the control group (n = 231) (median adjusted odds ratios of 0.77 [95% bayesian credible interval, 0.58-1.06] for improvement for ACE inhibitor and 0.76 [95% credible interval, 0.56-1.05] for ARB compared with control). The posterior probabilities that ACE inhibitors and ARBs worsened organ support–free days compared with control were 94.9% and 95.4%, respectively. Hospital survival occurred in 166 of 231 critically ill participants (71.9%) in the ACE inhibitor group, 152 of 217 (70.0%) in the ARB group, and 182 of 231 (78.8%) in the control group (posterior probabilities that ACE inhibitor and ARB worsened hospital survival compared with control were 95.3% and 98.1%, respectively). CONCLUSIONS AND RELEVANCE In this trial, among critically ill adults with COVID-19, initiation of an ACE inhibitor or ARB did not improve, and likely worsened, clinical outcomes. TRIAL REGISTRATION ClinicalTrials.gov Identifier: NCT0273570

    A framework for development of runtime monitors

    No full text
    Software Testing is the process used to assure the correctness, completeness, performance, security and reliability of the software. Different software testing techniques are used during pre-deployment phase of the software. But, these do not ensure that all possible behaviors of implementation are analyzed, executed and tested. Because of the incomplete assurance from the testing methodology, software can sometimes behave very differently during the post-deployment phase. This is termed as software anomaly and they are caused mostly by external attacks such as SQL injection, cross-site scripting, path-traversal attack, etc. To detect such anomalies and to ensure the security and reliability of software during the post-deployment phase, a technique known as runtime monitoring can be used. This paper presents a framework for the development of runtime monitors to accomplish post-deployment monitoring of software to detect and prevent path traversal attack. © 2012 IEEE

    Runtime monitors to detect and prevent union query based SQL injection attacks

    No full text
    Web applications are increasingly used in recent years to provide online services such as banking, shopping, social networking, etc. These applications operate with sensitive user information and hence there is a high need for assuring their confidentiality, integrity, and availability. Existing pre-deployment testing techniques, tools, and methodologies do not assure complete analysis, execution and testing of all possible behaviors of the software. This causes the software to sometimes behave differently than what it was designed for during its post-deployment. Such a deviation in the system\u27s behavior, also termed as Software Anomaly, is mostly due to external attacks such as Path Traversal Attacks, SQL Injection Attacks, etc., that in turn affect confidential user information stored in the application. In this paper, we present and evaluate a framework called Runtime Monitoring Framework to handle union query based SQL Injection Attacks. © 2013 IEEE

    Runtime monitors for tautology based SQL injection attacks

    No full text
    Increased usage of web applications in recent years has emphasized the need to achieve (i) confidentiality, (ii) integrity, and (iii) availability of web applications. Backend database being the main target for external attacks such as SQL Injection Attacks, there is an emerging need to handle such attacks to secure stored information. Pre-deployment testing alone does not ensure complete security and hence post-deployment monitoring of web applications during its interaction with the external world can help us to handle SQL Injection Attacks in a better way. In this paper, we present a framework which can be used to handle tautology based SQL Injection Attacks using post-deployment monitoring technique. Our framework uses two pre-deployment testing techniques i.e. basis path and data flow testing techniques to identify legal execution paths of the software. Runtime monitors are then developed and integrated to observe the behavior of the software for identified execution paths such that their violation will help to detect and prevent tautology based SQL Injection Attacks. © 2012 IEEE
    corecore