The approach to creation of complex (information and applied) systems from ready resources (modules, components, reusable components, services, reuses, etc.) is considered. At the heart of the approach of creating systems, Web systems is a component model (CM), which includes functional, system, service and interface resources (GOR), and the algebra of components to perform various operations on the GOR. Application functions components of the KPI are described in the programming languages (PL), interfaces in languages IDL and WSDL, and service components are created in SOA, SCA IBM Sphere, or get out of the Internet libraries, as a ready. The initial components are verified and stored in the repository of GOR and interfaces. The method of assembling GOR: Link in IBM and MS.VS environment are presented; make in BSD, config in JavaEE; IEEE standard 828–96–2012 (Configuration). GOR tested on many test data, verified their accuracy and reliability. A quality certificate based by ISO/IEC 9000 (1–4) is generated for the finished configured product. The prospects of development of security and quality of web systems are given.
Requirements are an integral part of any software and hardware development process. The area where requirements become significantly important is the development of safety-critical systems which usage may cause risks on human lives. So the process of their development is often maintained by certification centers that requires from developers to meet the best practices supporting the safety of end product. This article reveals one possible approach to requirements management that was based on experience of embedded hardware development for civil avionics. This approach is now spread over different areas. Authors list the set of common tasks related to given approach. They also define the set of software features used to reduce the complexity of development and to mitigate risks. Authors review set of existing solutions in requirements management area using the listed features. In this article it is also defined on how given features can be applied within the given approach.
Software developers often resort to borrowing code both within one project and from another. Due to the possible content of errors in the source code snippet, this can lead to error propagation across program. Libraries used without source code may also contain potential errors. The purpose of this work is developing methods for analyzing the nature of changes between versions of software components for which source code is missing. And for changes potentially related to the correction of defects, search for similar, but not fixed defects using the code clone search methods. The implementation of the proposed approach to the analysis of the components used in software development will ensure the assessment of the quality of the proposed software patches. Since the implemented method is independent of the architecture of the operating system, and also works with executable software code, this allows it to be used for analyzing third-party components and for analyzing binary builds of proprietary software. The average percentage of true positives on the CoreBench test suite is ~ 73%.
This article discusses the different types of virtual machine migration between computing resources, their logical and physical limitations. For live migration, such memory migration methods as pre-copy and post-copy, their temporary differences are considered. Chapter 2 discusses the work in which the requirements for physical and logical constraints. In chapter 2.1 for the post-copy method, the algorithm for working at the hypervisor level is described. For the pre-copy and post-copy methods a comparison of time indicators was made. Chapter 2.2 describes the physical constraints for virtual environments, which should be taken into account when drawing up a service level agreement. Logical restrictions on the migration of virtual machines are described in chapter 2.3, which should be taken into account when building a resource allocation strategy in the cloud. In conclusion, it is noted that constraints must be considered when developing resource allocation strategies.
Human gait is an important biometric index that allows to identify a person at a great distance without direct contact. Due to these qualities, which other popular identifiers such as fingerprints or iris do not have, the recognition of a person by the manner of walking has become very common in various areas where video surveillance systems can be used. With the development of computer vision techniques, a variety of approaches for human identification by movements in a video appear. These approaches are based both on natural biometric characteristics (human skeleton, silhouette, and their change during walking) and abstract features trained automatically which do not have physical justification. Modern methods combine classical algorithms of video and image analysis and new approaches that show excellent results in related tasks of computer vision, such as human identification by face and appearance or action and gesture recognition. However, due to the large number of conditions that can affect the walking manner of a person itself and its representation in video, the problem of identifying a person by gait still does not have a sufficiently accurate solution. Many methods are overfitted by the conditions presented in the databases on which they are trained, which limits their applicability in real life. In this paper, we provide a survey of state-of-the-art methods of gait recognition, their analysis and comparison on several popular video collections and for different formulations of the problem of recognition. We additionally reveal the problems that prevent the final solution of gait identification challenge.
We describe an open source software package aimed at solving reverse engineering problems for CAD models defined in the polygonal form. We briefly discuss the main principles behind the new software, its architecture, and directions for further development. Examples of a turbine blade demonstrate the use of the software. In the first example, a turbine blade is reconstructed automatically from a structured point cloud. Another example is the interactive reconstruction of a turbine blade from an unstructured surface triangulation. In both cases, we use surface skinning strategy enhanced by a curve fairing operator. We illustrate by an example that the modified skinning operator does not minimize the total bending energy of the surface, but allows constructing a smooth patch where input inaccuracies are compensated. The reconstruction result is a parametric model of a turbine blade where the design variables are the coordinates of the poles of each profile curve. The presented software architecture can be used for partial or complete parameterization of the reconstructed CAD models aimed at their subsequent optimization.
Diseases of the respiratory system are currently quite common, so the development of new effective ways to diagnose them is relevant. In this paper, we describe a mathematical model developed by us for the interaction of air flows with moving parts of a device for a recently created turbine spirometer of a new type. It has a number of technical features that must be taken into account when modeling. Among others, this is quite substantial inertia of the turbine and low friction. The model is based on the moment equation and contains several empirical parameters. Since the friction in the system is small, the main relations are considered in the linear approximation. Experimental verification of the model was carried out in two modes of operation of the spirometer. Firstly, the inertial motion of the turbine after turning off the external air source was investigated. Secondly, the dependence of the angular velocity of rotation of the turbine on the speed of an external constant air flow was analyzed. The calculations showed that in this two modes, the developed mathematical model describes the experimental results quite well. Also in this paper a simple method is given for determining empirical parameters at the device calibration stage. It is based on the use of the least squares method and does not require the involvement of large computational powers. This is an important circumstance, since the spirometer under investigation is intended for use not only in specialized medical institutions, but also in home conditions. On the base of the relations of the developed mathematical model, a numerical method is proposed for finding the velocity of the incoming air flow. This allows, basing on the readings of the device, to obtain clinically relevant information about the state of the respiratory system.
A new method of combinational circuits concurrent checking is considered based on Boolean complement of the working functions of the diagnosis object to the constant-weight code words with parallel checkout of the bits functions belonging to the self-dual functions class of the Boolean logic. The described approach to the organization of concurrent error-detection (CED) systems allows to increase the detection ability in comparison with the traditional checkout by constant-weight code. In this case, the undetectable error can be a such error, which will lead to the preservation of the code word weight generated at the outputs of the Boolean complement block, if the distortions of all the functions bits on the opposite sets is coincide. This condition is more stringent than the checkout of the vector belonging a pre-selected code, it means that it gives a greater probability of detecting distortion arising from errors. The described method allows checkout of combinational circuit based on constant-weight codes with the same number of single and zero bits. In this case, the priority is in the widely used «2-out-of-4» code, which has a simple checker structure. A detailed description of the new CED system structure is given, and algorithms for the extension of definition of the values of the checkout functions that provide testability of technical diagnostic tools are given.
ISSN 2220-6426 (Online)