Loading...
Search for:
high-level-languages
0.005 seconds
Prediction of aerial-image motion blurs due to the flying vehicle dynamics and camera characteristics in a virtual environment
, Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Volume 227, Issue 7 , 2013 , Pages 1055-1067 ; 09544100 (ISSN) ; Malaek, S. M. B ; Sharif University of Technology
2013
Abstract
This study presents comprehensive studies on practical means to predict aerial-image motion blurs due to the flying vehicle dynamics, including flying altitude; cruising speed; and angular velocities and finally installed camera characteristics; such as, frame rate and image size. The resulting predictions of blur values are in-turn used to generate blurry images to be fed as input data for later use in a de-blurring-in-the-loop of a Mono-simultaneous localization and mapping system. The whole process is coordinated by means of an integrated aerial virtual environment. The integrated aerial virtual environment consists of a three-dimensional graphical engine which could communicate with a...
Generation of database schemas from Z specifications
, Article IEEE International Conference on Electro Information Technology, 15 May 2011 through 17 May 2011, Mankato, MN ; 2011 ; 21540357 (ISSN) ; Mirian Hosseinabadi, S. H ; IEEE Region 4 (R4) ; Sharif University of Technology
2011
Abstract
Automatic translation of a high-level specification language to an executable implementation would be highly useful in maximizing the benefits of formal methods. We will introduce a set of translation functions to fill the specification-implementation gap in the domain of database applications. Because the mathematical foundation of Z has many properties in common with SQL, a direct mapping from Z to SQL structures can be found. We derive a set of translation functions from Z to SQL for the generation of a database. The proposed methodology results in reducing the expenses and duration of the software development, and also, prevents the errors originated from the manual translation of...
A simulation environment for path and image generation in an aerial single-camera vision system
, Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Volume 225, Issue 5 , 2011 , Pages 541-558 ; 09544100 (ISSN) ; Malaek, S. M. B ; Sharif University of Technology
2011
Abstract
This work describes the essential tools and architecture of a simulation environment, which could help enhance general aviation training as well as safety issues, especially while dealing with flights over unfamiliar environments. It also describes how the authors could effectively generate any desired flight path and its associated surrounding images through implementing a virtual single camera with simultaneous localization and mapping (monocular simultaneous localization and mapping) techniques. The overall package enjoys an aerial three-dimensional (3D)/graphical engine integrated with a full six-degrees-of-freedom aircraft dynamics, which serves as its trajectory generator, together...
A robust and efficient SIP authentication scheme
, Article Scientia Iranica ; Volume 17, Issue 1 D , June , 2010 , Pages 25-38 ; 10263098 (ISSN) ; Darmani, Y ; Jalili, R ; Nourani, M ; Sayad Haghighi, M ; Sharif University of Technology
2010
Abstract
The Session Initiation Protocol (SIP), which is becoming the de facto standard for the next-generation VoIP networks, is currently receiving much attention in many aspects. One aspect that was not deeply addressed in the original SIP is its authentication procedure. Apart from its security, an SIP authentication procedure should be efficient. This paper proposes a robust and efficient three-party SIP authentication protocol. In this protocol, the. end users are. authenticated with the proxy server in their domain using the. registrar server. Compared to previous works, our proposed protocol is more efficient and secure. To support our protocol with a formal security proof, its model is...
Crowdsummarizer: automated generation of code summaries for java programs through crowdsourcing
, Article IEEE Software ; Volume 34, Issue 2 , 2017 , Pages 71-80 ; 07407459 (ISSN) ; Heydarnoori, A ; Sharif University of Technology
Abstract
To perform software maintenance, developers must have a relatively good understanding of the program's source code, which is often written by other developers. Code summaries, which describe a program's entities (for example, its methods), help developers better comprehend code more quickly. However, generating code summaries can be challenging. To mitigate this problem, CrowdSummarizer exploits crowdsourcing, gamification, and natural-language processing to automatically generate high-level summaries of Java program methods. Researchers have implemented it as an Eclipse plug-in together with a Web-based code summarization game that can be played by the crowd. Two empirical studies...
Generating semantically valid test inputs using constrained input grammars
, Article Information and Software Technology ; Volume 57, Issue 1 , January , 2015 , Pages 204-216 ; 09505849 (ISSN) ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
Elsevier
2015
Abstract
Context: Generating test cases based on software input interface is a black-box testing technique that can be made more effective by using structured input models such as input grammars. Automatically generating grammar-based test inputs may lead to structurally valid but semantically invalid inputs that may be rejected in early semantic error checking phases of a system under test. Objective: This paper aims to introduce a method for specifying a grammar-based input model with the model's semantic constraints to be used in the generation of positive test inputs. It is also important that the method can generate effective test suites based on appropriate grammar-based coverage criteria....