Loading...
Search for: computer-software
0.014 seconds
Total 233 records

    Java applets copy protection by steganography

    , Article 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006, Pasadena, CA, 18 December 2006 through 20 December 2006 ; 2006 , Pages 388-391 ; 0769527450 (ISBN); 9780769527451 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the... 

    Modeling and evaluation of software systems with object stochastic activity networks

    , Article 2006 International Conference on Software Engineering Advances, ICSEA'06, Tahiti, 29 October 2006 through 3 November 2006 ; 2006 , Pages 58-63 ; 0769527035 (ISBN); 9780769527031 (ISBN) Abdollahi Azgomi, M ; Movaghar, A ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Stochastic activity networks (SANs) are a stochastic generalization of Petri nets. SAN models have been used to evaluate a wide range of systems and are supported by several modeling tools. We have introduced object stochastic activity networks (OSANs) to overcome some restrictions of these models. OSANs integrate the concepts of object-orientation into SAN models. Elements of OSANs and their submodels are defined as classes. OSANs are more appropriate that most other objectoriented or high-level extensions of Petri nets for application on software systems. In this paper, we will present the definitions, behavior and an example of OSAN models. The objectorientation of OSANs and the... 

    Polynomial time second order mehrotra-type predictor-corrector algorithms

    , Article Applied Mathematics and Computation ; Volume 183, Issue 1 , 2006 , Pages 646-658 ; 00963003 (ISSN) Salahi, M ; Mahdavi Amiri, N ; Sharif University of Technology
    2006
    Abstract
    Salahi et al. [M. Salahi, J. Peng, T. Terlaky, On Mehrtora type predictor-corrector algorithms, Technical Report 2005/4, Advanced Optimization Lab, Department of Computing and Software, McMaster University, http://www.cas.mcmaster.ca/~oplab/publication, SIAM Journal on Optimization, submitted for publication] give a numerical example showing that Mehrotra's original predictor-corrector algorithm, which is the basis of interior point methods software packages, may be very inefficient in practice. This motivated Salahi et al. to come up with a safeguarded algorithm that enjoys a polynomial iteration complexity and is efficient in practice. Here we discuss a variation of Mehrotra's second order... 

    On validity assurance of dynamic reconfiguration for component-based programs

    , Article Electronic Notes in Theoretical Computer Science ; Volume 159, Issue 1 , 2006 , Pages 227-239 ; 15710661 (ISSN) Niamanesh, M ; Fekrazad Nobakht, N ; Jalili, R ; Heydarian Dehkordi, F ; Sharif University of Technology
    2006
    Abstract
    Growing the need for long-life and high-available programs, dynamic reconfiguration is going to be an important research issue. Dynamic reconfiguration enables the software systems to change at runtime to decrease their down-time in case of any updating, upgrading or in any changes. Any invalid reconfiguration at runtime may lead programs into invalid states. In this paper, we investigate on validity of dynamic reconfiguration for component-based programs and propose validity conditions for it. We show that the problem of validity assurance in general is undecidable and there is no general-purpose algorithm to verify dynamic reconfiguration validity. To have a computable algorithm for... 

    Rough terrain rovers dynamics analysis and optimization

    , Article DETC2005: ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, Long Beach, CA, 24 September 2005 through 28 September 2005 ; Volume 7 B , 2005 , Pages 903-909 ; 0791847446 (ISBN) Tavakoli Nia, H ; Alemohammad, S. H ; Bagheri, S ; Khiabani, R. H ; Meghdari, A ; Sharif University of Technology
    2005
    Abstract
    In this paper a new approach to dynamics optimization of rough terrain rovers is introduced. Since rover wheels traction has a significant role in rover mobility, optimization is based on the minimization of traction at rover wheel-ground interfaces. The method of optimization chosen is Genetic Algorithm (GA) which is a directed random search technique along with the usual optimization based on directional derivatives. GA is a suitable and efficient method of optimization for nonlinear problems. The procedure is applied on a specific rough terrain rover called CEDRA-I Shrimp Rover. Dynamical equations are obtained using Kane's method. Finally, the results are verified by modeling of the... 

    Development of an optimal software-pilot rating scale for flight in turbulence evaluation

    , Article AIAA Atmospheric Flight Mechanics Conference 2005, San Francisco, CA, 15 August 2005 through 18 August 2005 ; Volume 1 , 2005 , Pages 387-402 ; 156347736X (ISBN); 9781563477362 (ISBN) Pourtakdoust, S. H ; Shajiee, S ; Sharif University of Technology
    2005
    Abstract
    Traditionally, flying and handling quality evaluation of an aircraft in various flight phases is aimed at pilot workload assessment to guarantee a successful mission. Subsequently, Different levels of acceptability are defined for the aircraft based on the additional work required by the pilot to achieve a desired performance level, feting scales are usually numerical, which pilots utilize as a mean to quantify their subjective opinion about an existing aircraft after hours of flying. Cornell aeronautical laboratory used their own scales in flying qualities research for many years and Cooper of NASA originated a ten-point numerical scale that was used more universally. When Harper of Cornell... 

    Investigation of the micro-step control positioning system performance affected by random input signals

    , Article Mechatronics ; Volume 15, Issue 10 , 2005 , Pages 1175-1189 ; 09574158 (ISSN) Selk Ghafari, A ; Behzad, M ; Sharif University of Technology
    2005
    Abstract
    This paper gives the results of simulation and experimental investigation on the effects of random signals on the accuracy of micro-stepping control positioning. For studying and simulation of the effect of random noise signals on performance of the accurate position control systems, such as Hybrid Stepper Motors (HSMs), a micro-step driver and controlling unit using PID controller has been designed and constructed. Several parametric studies have been carried out including different white noise power and micro-step per revolution. Tracking problem for a HSM model has been simulated, and the experimental study for similar cases has been carried out by implementing the designed controller in... 

    Overhead-free polymorphism in network-on-chip implementation of object-oriented models

    , Article Proceedings - Design, Automation and Test in Europe Conference and Exhibition, DATE 04, Paris, 16 February 2004 through 20 February 2004 ; Volume 2 , 2004 , Pages 1380-1381 ; 0769520855 (ISBN); 9780769520858 (ISBN) Goudarzi, M ; Hessabi, S ; Mycroft, A ; Sharif University of Technology
    2004
    Abstract
    We unify virtual-method despatch (polymorphism implementation) and network packet-routing operations; virtual-method calls correspond to network packets, and network addresses are allocated such that routing the packet corresponds to dispatching the call. As the run-time routing structure is inherent in Network-on-Chip platforms, this unification implements polymorphism/or free.1  

    A survey of dynamic software updating

    , Article Journal of software: Evolution and Process ; Volume 25, Issue 5 , 2013 , Pages 535-568 ; 20477481 (ISSN) Seifzadeh, H ; Abolhassani, H ; Moshkenani, M. S ; Sharif University of Technology
    2013
    Abstract
    Application update at run-time remains a challenging issue in software engineering. There are many techniques with different evaluation metrics, resulting in different behaviours in the application being updated. In this paper, we provide an extensive review of research work on dynamic software updating. A framework for the evaluation of dynamic updating features is developed, and the articles are categorized and discussed based on the provided framework. Areas of online software maintenance requiring further research are also identified and highlighted. This information is deemed to not only assist practitioners in selecting appropriate dynamic updating techniques for their systems, but... 

    Mbtdd: Model based test driven development

    , Article International Journal of Software Engineering and Knowledge Engineering ; Volume 22, Issue 8 , 2012 , Pages 1085-1102 ; 02181940 (ISSN) Sadeghi, A ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2012
    Abstract
    Test Driven Development (TDD), as a quality promotion approach, suffers from some shortages that discourage its usage. One of the most challenging shortcomings of TDD is the low level of granularity and abstraction. This may lead to production of software that is not acceptable by the end users. Additionally, exploiting of TDD is not applicable in the enterprise systems development. To overcome this defect, we have merged TDD with Model Based Testing (MBT) and suggested a framework named Model Based Test Driven Development (MBTDD). According to TDD, writing test cases comes before programming, and based on our improved method of TDD, modeling precedes writing test cases. To validate the... 

    Nondetection zone assessment of an active islanding detection method and its experimental evaluation

    , Article IEEE Transactions on Power Delivery ; Volume 26, Issue 2 , 2011 , Pages 517-525 ; 08858977 (ISSN) Bahrani, B ; Karimi, H ; Iravani, R ; Sharif University of Technology
    2011
    Abstract
    This paper analytically determines the nondetection zone (NDZ) of an active islanding detection method, and proposes a solution to obviate the NDZ. The method actively injects a negative-sequence current through the interface voltage-sourced converter (VSC) of a distributed generation (DG) unit, as a disturbance signal for islanding detection. The estimated magnitude of the corresponding negative-sequence voltage at the PCC is used as the islanding detection signal. In this paper, based on a laboratory test system, the performance of the islanding detection method under UL1741 anti-islanding test conditions is evaluated. Then, determining the NDZ of the method and proposing the... 

    Toward an architecture-based method for selecting composer components to make software product line

    , Article ITNG2010 - 7th International Conference on Information Technology: New Generations, 12 April 2010 through 14 April 2010 ; April , 2010 , Pages 1233-1236 ; 9780769539843 (ISBN) Tanhaei, M ; Moaven, S ; Habibi, J ; Sharif University of Technology
    2010
    Abstract
    Nowadays, product line, as an important topic in software development domain, has been paid attention by software engineering practitioners. Finding suitable components to construct an efficient and comprehensive product line with low costs is one of the critical problems in this domain which demands to be satisfied. In this paper a method is presented which can manage and control complexities of component selection problem, an NP problem, and result in creation of declared product line. By making use of this method, a product line will be constructed with suitably-adopted components to cover up requirements based on architecture; that's why software product line development process will... 

    Equational reasoning on ad hoc networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 15 April 2009 through 17 April 2009, Kish Island ; Volume 5961 LNCS , 2010 , Pages 113-128 ; 03029743 (ISSN) ; 3642116221 (ISBN) Ghassemi, F ; Fokkink, W ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    We provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. We exploit an extended algebra called Computed Network Theory to axiomatize restricted broadcast. It allows one to define an ad hoc network with respect to the underlying topologies. We give a sound and complete axiomatization for the recursion-free part of the term algebra CNT, modulo what we call rooted branching computed network bisimilarity  

    Automata based model checking for reo connectors

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 15 April 2009 through 17 April 2009 ; Volume 5961 LNCS , 2010 , Pages 260-275 ; 03029743 (ISSN) ; 3642116221 (ISBN) Bonsangue, M. M ; Izadi, M ; Sharif University of Technology
    Abstract
    Reo is a connector language for the exogenous composition and orchestration of components in a software system. An operational semantics of Reo connectors can be given in terms of Büchi automata over a suitable alphabet of records, capturing both synchronization and context dependency requirements. In this paper, we define an action based linear time temporal logic for expressing properties of Reo connectors. Formulas can be synthesized into Büchi automata representing Reo connectors, thus leading to an automata based model checking algorithm. By generalizing standard automata based model checking algorithms for linear time temporal logic, we give an efficient on-the-fly algorithm for the... 

    A feature model based framework for refactoring software product line architecture

    , Article Journal of Computer Science and Technology ; Volume 31, Issue 5 , 2016 , Pages 951-986 ; 10009000 (ISSN) Tanhaei, M ; Habibi, J ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    Software product line (SPL) is an approach used to develop a range of software products with a high degree of similarity. In this approach, a feature model is usually used to keep track of similarities and differences. Over time, as modifications are made to the SPL, inconsistencies with the feature model could arise. The first approach to dealing with these inconsistencies is refactoring. Refactoring consists of small steps which, when accumulated, may lead to large-scale changes in the SPL, resulting in features being added to or eliminated from the SPL. In this paper, we propose a framework for refactoring SPLs, which helps keep SPLs consistent with the feature model. After some... 

    Microservices migration patterns

    , Article Software - Practice and Experience ; Volume 48, Issue 11 , 2018 , Pages 2019-2042 ; 00380644 (ISSN) Balalaie, A ; Heydarnoori, A ; Jamshidi, P ; Tamburri, D. A ; Lynn, T ; Sharif University of Technology
    John Wiley and Sons Ltd  2018
    Abstract
    Microservices architectures are becoming the defacto standard for building continuously deployed systems. At the same time, there is a substantial growth in the demand for migrating on-premise legacy applications to the cloud. In this context, organizations tend to migrate their traditional architectures into cloud-native architectures using microservices. This article reports a set of migration and rearchitecting design patterns that we have empirically identified and collected from industrial-scale software migration projects. These migration patterns can help information technology organizations plan their migration projects toward microservices more efficiently and effectively. In... 

    Convenient synthesis of chlorohydrins from epoxides using zinc oxide: Application to 5,6-epoxysitosterol

    , Article Heteroatom Chemistry ; Volume 20, Issue 3 , 2009 , Pages 157-163 ; 10427163 (ISSN) Matloubi Moghaddam, F ; Saeidian, H ; Mirjafary, Z ; Jebeli Javan, M ; Moridi Farimani, M ; Seirafi, M ; Sharif University of Technology
    2009
    Abstract
    Efficient synthesis of protected and unprotected chlorohydrins has been achieved by ring opening of epoxides with acetyl/benzoyl chloride and TMSCl using a catalytic amount of ZnO as a reusable catalyst. The applicability of ZnO is further extended by performing the cleavage of the natural product 5,6-epoxysitosterol with acetyl chloride. © 2009 Wiley Periodicals, Inc  

    Towards an architecture-centric approach for method engineering

    , Article IASTED International Conference on Software Engineering, SE 2008, Innsbruck, 12 February 2008 through 14 February 2008 ; February , 2008 , Pages 74-79 ; 9780889867154 (ISBN) Moaven, S ; Habibi, J ; Ahmadi, H ; Kamandi, A ; Sharif University of Technology
    2008
    Abstract
    Due to the extreme use of method engineering and increasing attention to construct methods customized for a specific project, domain, organization or a generic method compatible with the team characteristics and needs, existence of suitable and formalized frameworks and guidelines is one of the challenges method engineers are encountered. In this area, considering method construction as the goal of method engineering brings to the mind the software development process in which the product is a method adapting the method users' needs. This paper, with a new approach of applying software architecture in method engineering and making use of architecture styles, tries to take advantage of... 

    Architectural styles as a guide for software architecture reconstruction

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 985-989 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Khodamoradi, K ; Habibi, J ; Kamandi, A ; Sharif University of Technology
    2008
    Abstract
    Much effort has been put in defining methods, techniques, and tools for software architecture reconstruction (SAR) Software Architecture Transformation (SAT), and Software Architecture-based Development, but much less attention has been paid to what lies at the heart of architecture-based development, software architectural styles. We argue that architecture-based software development could be much more productive if centered around the concept of software architecture styles, hence the need for style recovery in the process of software architecture reconstruction. The reason behind this is generally. Furthermore, with the coherence architectural styles can bring to the process of automated... 

    Determination of installation capacity in reservoir hydro-power plants considering technical, economical and reliability indices

    , Article International Journal of Electrical Power and Energy Systems ; Volume 30, Issue 6-7 , 2008 , Pages 393-402 ; 01420615 (ISSN) Hosseini, S. M. H ; Forouzbakhsh, F ; Fotouhi, M ; Vakilian, M ; Sharif University of Technology
    2008
    Abstract
    One of the most important issues in planning the "reservoir" type of hydro-power plants (HPP) is to determine the installation capacity of the HPPs and estimate its annual energy value. In this paper, a method is presented. A computer program has been developed to analyze energy calculation and estimation of the most important economic indices of an HPP using the sensitivity analysis method. Another program, developed by Matlab software, calculates the reliability indices for a number of units of an HPP with a specified load duration curve using the Monte Carlo method. Ultimately, comparing the technical, economic and reliability indices will determine the installation capacity of an HPP. By...