TRIREME Commander: Managing Simulink Simulations And Large Datasets In Java

Size: px
Start display at page:

Download "TRIREME Commander: Managing Simulink Simulations And Large Datasets In Java"

Transcription

1 TRIREME Commander: Managing Simulink Simulations And Large Datasets In Java Andrew Newell Electronic Warfare & Radar Division, Defence Science and Technology Organisation Abstract. The Tactical Radar and InfraRed Engagement Modelling Environment (TRIREME) is a flexible framework for simulating military engagement scenarios in Simulink. TRIREME simulations are used to determine the effectiveness of countermeasures through experimentation and analysis. Simulink does not offer an effective environment to analyse complex models in a range of scenarios, as the simulations do not run fast enough. The models also produce large amounts of data that are difficult to manage and view efficiently. The TRIREME Commander (TC) was created using Java to manage the execution of simulations and examine their resulting large datasets. Development of the application overcame issues of manipulating Simulink simulations and limitations of Java s memory model when analysing data. The TC interfaces with Simulink simulations compiled using Real Time Workshop (RTW). Utilising tuneable parameters specified in a MATLAB MAT-File, the application can modify simulations on an individual run basis. The datasets created by an executed simulation are read into application memory for fast access to achieve real-time graphical displays. The large datasets posed problems in Java s memory model during analysis. Data structures using object-orientated design proved too memory intensive. To counter this, a simple array data structure was implemented to reduce overheads and keep access times low. Java Out of Memory exceptions are minimised by reducing precision to acceptable levels and selectively storing data. The TC is a flexible and easy to use application, allowing both the simulation and analysis of TRIREME configurations to be separated from the development environment. TC runs compiled Simulink simulations quickly and implements a slim memory model to view and analyse results in real-time. Importantly, compiled simulations and the TC can be deployed to users and clients with ease and minimal overheads. 1. INTRODUCTION In electronic warfare (EW), engagement simulation and modelling is a valuable tool in the analysis of countermeasures. Simulation to determine the viability and effectiveness of electronic countermeasures and techniques supports and enhances the Australian Defence Force (ADF) [9]. Importantly, the analysis of simulations can support field trials of countermeasures, allowing for pre-planning of limited trial resources. Simulink is an existing modelling and simulation environment from MathWorks Inc. The environment is integrated with MathWorks MATLAB program to provide graphical modelling, simulation and analysis of generic dynamic systems. Simulink, being necessarily broad in application scope, lacks certain features required by Defence Science and Technology Organisation (DSTO) EW simulations. The Tactical Radar and InfraRed Engagement Modelling Environment (TRIREME) was developed in 2004 by the Electronic Warfare and Radar Division in DSTO to tailor Simulink to the specific requirements of EW simulations. The TRIREME framework defines rules and common functionality to the Simulink environment. The framework is designed to provide for development of models in an object oriented manner with high reusability [3]. interface to manipulate simulations and easier portability to other developers and clients than Simulink provides. The TRIREME Commander (TC), a Java application, has been developed to solve these issues, streamlining both the experimentation and analysis phases of simulation development. To meet TRIREME s requirements in experimentation and analysis, both phases are performed in the TC application, external to the Simulink environment and TRIREME framework. To realise the goals in an external application, the Java environment needed to manage, interact with and control TRIREME-based Simulink simulations and overcome issues found in Java s memory model when analysing the resulting large data sets. 2. SIMULINK SIMULATIONS USING TRIREME The fundamental purpose of TRIREME is to create a developer friendly environment in Simulink that promotes ease of use and development. An example TRIREME framework layout is shown in Figure 1. The TRIREME framework s customisation of the Simulink environment greatly enhances the development of simulations. After the development of models, Simulink does not prove as suitable for TRIREME s requirements in the experimentation and analysis phases. As a framework using Simulink, TRIREME is limited in the areas of experimentation and analysis due to the complex and broad nature of Simulink. TRIREME requires faster execution time of simulations, a simpler

2 simulations replayed and outcomes reviewed. Simulations are compared and contrasted, and batch runs of simulations are required to build an overall view of effectiveness. Figure 1: Example TRIREME Simulink framework layout [1] 2.1 The Experimentation Phase In Simulink TRIREME simulations need to be able to be used and run by developers, EW specialists and end users alike. The interfaces, usage and deployment of simulations need to be as undemanding as possible. Simulations require fast execution and the output data to be stored for future analysis. Parameters within the TRIREME models are modifiable to alter the simulation to test countermeasures and strategies. In order to compare and validate simulated measures, multiple runs of varying simulations are required. Simulink provides an environment for experimentation, which only meets some of the TRIREME framework s requirements. Variables within the models can be modified before, or even during, simulation runs [8]. By default, Simulink provides no central or standard means of access to all simulation parameters. The TRIREME framework provides control over variables by utilising a Simulink Graphical User Interface (GUI) to modify variable parameters of a Simulink block, or component. This is known as a mask. Despite employing the GUI masks, parameters can only be accessed and modified by traversing through all masked blocks in the simulation. This requires a level of expertise with Simulink not assumed to be present in all end users of TRIREME models. In order to deploy a TRIREME simulation to clients or other users, MATLAB and Simulink licences are required to take advantage of the full functionality available. The programs are very powerful and provide an excellent experimentation environment that can be very daunting for novice users. Distributing TRIREME models in Simulink also allows access to areas of the model that end users should not be allowed to access or modify. 2.2 The Analysis Phase In Simulink The analysis phase of TRIREME simulations is vital in producing simulations for the ADF. The analysis process validates models, suggests new countermeasures and improves the knowledge of the ADF [9]. In this phase, data from TRIREME simulations is required to be managed and plotted, Simulink provides the ability to analyse simulations during run time. Any part of a simulation can be scoped, monitored or output. Since Simulink simulations may not run in real time, the analysis is limited to the speed of the computer running the simulation. The resource intensive nature of Simulink and its licensing requirements may prevent multiple simulations from running and hence analysis of multiple runs becomes infeasible. The examination of completed simulation run data in MATLAB is a viable alternative to analysing running simulations in Simulink. MATLAB commands can be written to create batch runs to iterate through changing parameters. The resulting data can be placed directly into MATLAB or written to files for storage. The data can be plotted using the powerful plot tools included with MATLAB [6]. The analysis phase in MATLAB thus requires an expert level of knowledge that cannot be expected of all end users of TRIREME models. 2.3 Analysis In A Post Processing Tool A Java Post Processing Tool was developed originally to meet the TRIREME requirements of data analysis. This tool became the basis of the TC application. The TC analysis application requirements for TRIREME were: Ease of use by clients and TRIREME developers. Deployable to clients and TRIREME developers. Ability to compare and contrast simulation results. Ability to view simulation results in real time. The development of the original tool into a complete experimentation and analysis application was driven by the need to meet the TRIREME requirements unfulfilled by Simulink. Java was selected for its ease of portability and development. To effectively use Java to experiment with TRIREMEbased Simulink simulations, investigation had to be undertaken to enable Java to control the simulations. When analysing the resulting data, a solution had to be found to the memory issues arising from problematic storing and manipulating of large amounts of data in the Java environment. 3. MANAGING SIMULINK SIMULATIONS IN TRIREME COMMANDER The TC is designed to be a viable alternative to managing and running TRIREME-based Simulink simulations. This is achieved by the TC meeting and

3 exceeding the functionality of, and providing extra benefits over Simulink execution. The aims of the experimentation phase in the TC are: To modify variable parameters of simulations. To execute simulations utilising default or user defined parameters. To provide an ability to create batch run patterns (i.e. Coverage Diagrams). To run any Simulink simulation created using the TRIREME framework. To organise output of simulations in a meaningful and accessible manner. The application has to be able to interact with Simulink simulations and provide a general interface to manipulate any number of varying parameters. The Real Time Workshop Simulink extension provides a means to meet all our requirements by creating a better execution environment than Simulink. 3.1 Real Time Workshop And Tuneable Parameters Real Time Workshop (RTW) is a Simulink extension that compiles Simulink simulations into standalone executable files [7]. This is performed by converting the Simulink simulation into C-code, to be then compiled and executed. Simulation parameters can be accessed in the compiled C-code via tuneable parameters created with the executable file. A tuneable parameter is a simulation parameter specifically marked in the simulation to be accessed and modified in the compiled executable file. Examples of parameters that are made tuneable for users to modify in the simulation are: Threat Initial Position, Aircraft Initial Velocity, Aircraft Type, etc. MAT-File. The display information added is vital for the creation of the dynamic GUI to modify parameter values in the TC application. The display information is gathered from the GUI masks used to present the parameters to the developers in TRIREME. 3.2 Dynamic Graphical User Interface Creation To enable the user to modify simulation parameters in the TC, an interface to the tuneable parameters stored in the MAT-File is required. To facilitate greater ease of use, the TC creates a GUI to display the tuneable parameters. The GUI is dynamic in the content and controls it displays to the user, based on the tuneable parameters contained in the MAT-File. The first step in creating the dynamic GUI is embedding the required display information into the MAT-File for the application to read. Each tuneable parameter can be displayed as a numerical edit field, combo box list or a check box. Developers of TRIREME simulations select the required type for each tuneable parameter. Depending on the variable type, information such as array size for numerical edit fields or list contents for combo box lists is additionally required. The MAT-File reader in the TC parses the created MAT-File and extracts the required information for each parameter. Each GUI component is recreated in Java using the type and value information stored in the MAT-File. The components are then laid out on screen for the user to access. Figure 2 illustrates a dynamic GUI for parameter modifying, created from tuneable parameters in a MAT-File. When the executable file is created, all tuneable parameter values are defined in an associated MATLAB MAT-File. The executable file reads the associated MAT-File to obtain the current values of the parameters to use during the simulation s execution [7]. Utilising the compiled C executable and the associated tuneable parameters, the TC application can start and manipulate the running of a Simulink simulation. The MAT-File is an open standard defined by MathWorks [5] and can be parsed into the TC application via specifically written code. A standard RTW MAT-File contains information about the parameter and its value. By manipulating the creation of the MAT-File in MATLAB, extra data regarding the parameters can be written. This extra data provides details on input and output files for the simulation, parameter defaults and, importantly, display information. A DSTO developed MATLAB script automates the process of adding the additional information into the Figure 2: Dynamic GUI with edit box values, a combo box value and a check box value displayed Modified values are then written back into the MAT- File at the user s request. When the compiled Simulink simulation is next executed, the new values from the MAT-File are read to initialise the parameters within the simulation. By utilising the RTW compiled Simulink simulations and their associated tuneable parameters, the TC application provides a robust, easy to use and flexible experimentation environment. TRIREME-based

4 Simulink simulations can be executed from within the application either as single runs or batch run patterns, set by modifying tuneable parameters. Utilising Java s threads, multiple simulations can be executed and managed at the same time, meeting the requirements of TRIREME experimentation. 4. DATA ANALYSIS IN TRIREME COMMANDER Data resulting from TRIREME-based Simulink simulations are defined by two categories; description and summary. The description data describes the simulation at each time step. Every item in the simulation, every position, and each informative data signal is recorded. The summary data presents single values that are recorded or calculated at the termination of the simulation and summarise aspects of the run. Summary data files can include multiple runs when performing batch runs. The TC application presents the data in a meaningful manner to the user for analysis. The data is presented in a variety of plots. Plan Plots shows a bird s eye view of the simulation for reference and requires positional data for all items at every time step. Data Plots graph any data on a plot against the simulation time. Coverage Plot displays summary information based on a coverage area manipulated over multiple runs. A large Coverage Plot example is shown in Figure 3. Creation of this plot involved 10,830 simulation runs, which produced 32,492 data files totalling 5.89GBs of data. Real-time viewing and analysis of results is important to obtain a clear picture of the simulation. The Java data structure developed to store in the data in application memory must provide fast access to ensure all plots are able to update in real time. Multiple plots can be synchronised and viewed from multiple simulations at the same time. The data structure implemented must be scaleable to hold multiple large data sets for all displayed plots. The Java platform is designed with portability as a priority. The Java Virtual Machine (JVM) that ensures this portability also limits the amount of system memory a Java application can utilise [4]. It is important, when reading data sets of large sizes, to carefully manage the data, to avoid reaching or exceeding this limit. An Out of Memory Java exception is thrown when this limit is surpassed and unpredictable behaviour of the application follows. The data structure used must minimise the likelihood of the memory limit being reached. 4.2 A Data Structure For Handling Large Data Sets The information used to visualise the simulation lends itself very well to Java s object oriented approach. Each piece of information is encapsulated in a relevant object for every time step of the simulation. The first approach developed to read in TRIREME data sets involved an object oriented data structure. The objects were created encapsulating data for each simulation object at each simulation time step. Access to the data is performed by knowing the desired object and information required. When reading in large files, it became apparent that an object orientated approach did not scale up to the sizes required. A TRIREME simulated EW engagement can run up to and beyond 2000 simulated seconds, depending on the complexity of the scenario. With typical simulation time steps of seconds, each recorded signal and item in the simulation contains at least 10,000 data entries. The memory overheads in creating each object for each item at each time step quickly become infeasible. Figure 3: A large Coverage Plot in the TC All plots require the large data sets of the simulation results to be stored in the Java application s internal memory. The size of the datasets is the cause of memory and speed issues, which can affect the performance and usability of the analysis tool. 4.1 Analysis Requirements To ensure the simulations can be deployed to and analysed by any developer or client, data resulting from TRIREME based Simulink simulations is stored in a flat file database. The files are comma delimited, ensuring the data is platform independent and easy to read in numerous other applications. An approach to storing data in Java s memory was required that did not involve object memory overheads. The data structure has to allow fast access to the stored data, to keep the plots updating in real time. It was determined that a simple array data structure was the best fit for these requirements. Dismissing object orientated design altogether, data is stored in a two dimensional array of Java primitive values. Rows of the array are accessed by the time step of the simulation. Columns are accessed through a known data order. Each item in the simulation has an indexed position in the array. The item s data is then stored in a pre-determined order from the indexed position. Figure 4 shows how an item s index and the required data s offset can be used to obtain any pieces of data in the data array structure.

5 Figure 4: 2D data array access using item index and data offsets Access to arrays using direct indexing is performed in O(1) time [2], maintaining the requirement for fast access time. The size of the data array to allocate can be determined before storing the data by quickly reading the size of the data files. The extra time required for the pre-allocation of the array s size is offset by the improvement in memory. When plotting or visualising the simulation data, not all the recorded data is required. Only the required information is read into Java s memory. If a new plot is requested for an open simulation utilising un-read data, the data needs to be re-read to store the required information. Care is taken to ensure that all plots for a single simulation read from the one data array in memory. Data for a simulation is only stored in the one location and shared between the plots that require it. 4.3 Assumptions And Compromises Storing the information in the array data structure assumes that the time required setting up the structure is offset by the resulting memory efficiency, as the set up of the data array structure requires two reads of the files. Where the time taken to read-in data is notably large, progress bars are used as a visual feedback to users. A compromise in the precision is made to reduce the data storage memory requirements. Data is stored as Java floats, requiring only 4 bytes of storage. Storing the data as Java doubles requires 8 bytes for each value 1. This loss in precision is acceptable because data values are only used in graphical displays. The screen operates in discreet integer whole values for pixel positions. All data positions are converted to the correct integer pixel position for display. Any data items within a small range of each other become mapped to the same pixel on screen. The range of values which are mapped to the same pixel when plotted on screen depends on the plot scale and screen resolution. For the current plot in the TC application, this compromise was deemed satisfactory. This decision may be reviewed in the future, depending on the long term use of the application. The data files are not modified and still retain their original precision. 1 Memory sizes of Java primitives are JVM dependent. These results were calculated on a win32 implementation of Sun s JVM, version 1.6.0_03. If memory problems still persist as data set size increases, the JVM itself can be made more efficient. The size of memory the JVM can obtain from the system can be increased to use more resources [4]. This is currently implemented as a user definable option in the TC. Third party JVM s can also be used to run the TC application. A third party JVM may implement memory allocation with greater efficiency than the standard JVM released by Sun Microsystems Inc. An example of a JVM that has been successfully used with the TC application to increase memory performance is BEA System s JRockit [1]. 5. FUTURE WORK The TC application has proven valuable in the experimentation and analysis of TRIREME-based Simulink simulations. The successful integration of compiled TRIREME Simulink simulations into the TC is opening up to further possibilities for integration with Simulink. The future of the TC is driven largely by the needs of clients when running and analysing simulations. The power of TC comes from the ability to develop extra functionality to meet the exact requirements of users. 5.1 Expanding Simulink Interoperability It is common in the Defence market for simulation models to be shared. Models developed in Simulink that do not conform to the TRIREME framework cannot easily be accessed in the TC. Investigation is required into the possibility of interfacing the TC application more directly with MATLAB. It may be feasible to create dynamic scripts to execute non-trireme simulations from TC with or without RTW compilation. Decoupling the TRIREME framework from the TC would allow for the application to be shared and utilised by more Simulink simulation developers. 6. CONCLUSIONS The TRIREME Commander (TC) is a flexible and easy to use application, allowing both the simulation and analysis of TRIREME-based Simulink simulations to be separated from the development environment. The TC overcomes limitations found in the experimentation and analysis phases when using the Simulink environment. In the experimentation phase, the TC was developed to control Simulink simulations. This was achieved by utilising RTW compiled Simulink simulations. Using the tuneable parameters, the TC Java application is able to modify and control the simulations. All the available parameters are presented in a central and easy to use GUI. This provides all developers and clients with immediate and total control over the simulations. When analysing simulation results in Java, the Java memory model becomes problematic with the large data sets required. A data structure to store and access data was developed to meet the needs of EW simulation

6 analysis. The implemented data structure has proven robust and scalable when viewing large and multiple data sets. Both the compiled Simulink simulations and the TC can be deployed to developers and clients with no licensing or other environmental overheads. Simulink simulations can be accessed, controlled and analysed with ease by any non-technical user through the use of the TC. REFERENCES 1. BEA Systems. (2006) BEA JRockit s/bea_jrockit_entjava_business_wp.pdf. 2. Goodrich, M. T; Tamassia, R. (2001) Data Structures and Algorithms in Java (Second Edition), Data Structures and Algorithms in Java (Second Edition), Wiley College. 3. Hatfield, B; Reynolds, S; Hermans, B. J. (2005) The Tactical Radar and InfraRed Engagement Modelling Environment (TRIREME) SimTecT Simulation Technology and Training Conference. 4. Lindholm, T.; Yellin, F. (1996) The Java Virtual Machine Specification, Addison-Wesley. 5. MathWorks, T. (2007) MAT-File Format, doc/matlab/matfile_format.pdf. 6. MathWorks, T. (2000) MATLAB User's Guide, MATLAB User's Guide. 7. MathWorks, T. (2004) Real-Time Workshop User's Guide, Real-Time Workshop User's Guide. 8. MathWorks, T. (2000) Simulink User's Guide, Simulink User's Guide. 9. Mc Farlane, D; Kruzins, E. (2006) Australian Defence Simulation - Status, ralian_defence_simulation-status.pdf.

Implementing Precision Tracking within a Distributed Simulation Environment: Overcoming Limitations

Implementing Precision Tracking within a Distributed Simulation Environment: Overcoming Limitations Implementing Precision Tracking within a Distributed Simulation Environment: Overcoming Limitations Mr Lee Blucher; Mr Bjorn Wharff QinetiQ Pty Ltd lblucher@qinetiq.com.au; bjwharff@qinetiq.com.au Abstract.

More information

A Private Heap for HDF5 Quincey Koziol Jan. 15, 2007

A Private Heap for HDF5 Quincey Koziol Jan. 15, 2007 A Private Heap for HDF5 Quincey Koziol Jan. 15, 2007 Background The HDF5 library currently stores variable-sized data in two different data structures in its files. Variable-sized metadata (currently only

More information

Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading

Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading Presenters: John Ingram - British Gas Trading Ty Sapsford - OCS Consulting Plc

More information

Methods for Interfacing Common Utility Services in Simulink Models Used for Production Code Generation

Methods for Interfacing Common Utility Services in Simulink Models Used for Production Code Generation 2009-01-0155 Methods for Interfacing Common Utility Services in Simulink Models Used for Production Code Generation Copyright 2009 SAE International Jeffrey M. Thate and Robert A. Kagy Caterpillar, Inc.

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

Screen Saver Science: Realizing Distributed Parallel Computing with Jini and JavaSpaces

Screen Saver Science: Realizing Distributed Parallel Computing with Jini and JavaSpaces Screen Saver Science: Realizing Distributed Parallel Computing with Jini and JavaSpaces William L. George and Jacob Scott National Institute of Standards and Technology Information Technology Laboratory

More information

Migrating to Object Data Management

Migrating to Object Data Management Migrating to Object Data Management Arthur M. Keller * Stanford University and Persistence Software Paul Turner Persistence Software Abstract. We discuss issues of migrating to object data management.

More information

IBM Global Technology Services May IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7.

IBM Global Technology Services May IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7. IBM Global Technology Services May 2008 IBM Internet Security Systems Proventia Management SiteProtector system version 2.0, SP 7.0 Preview Guide Page 1 Executive Summary IBM Internet Security Systems

More information

Learning to Provide Modern Solutions

Learning to Provide Modern Solutions 1 Learning to Provide Modern Solutions Over the course of this book, you will learn to enhance your existing applications to modernize the output of the system. To do this, we ll take advantage of the

More information

GUI Development in TDD Model Case Study

GUI Development in TDD Model Case Study GUI Development in TDD Model Case Study Sowmya Dhandapani* Broadcom Limited, Bangalore, India. * Corresponding author. Email: sowmya.dhandapani.1979@ieee.org Manuscript submitted May 17, 2016; accepted

More information

Data Model Considerations for Radar Systems

Data Model Considerations for Radar Systems WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,

More information

COP 1170 Introduction to Computer Programming using Visual Basic

COP 1170 Introduction to Computer Programming using Visual Basic Course Justification This course is the first computer programming course in the Computer Information Systems Associate in Arts degree program; is required in the Computer Programming and Analysis, Database

More information

6.871 Expert System: WDS Web Design Assistant System

6.871 Expert System: WDS Web Design Assistant System 6.871 Expert System: WDS Web Design Assistant System Timur Tokmouline May 11, 2005 1 Introduction Today, despite the emergence of WYSIWYG software, web design is a difficult and a necessary component of

More information

Using Java for Scientific Computing. Mark Bul EPCC, University of Edinburgh

Using Java for Scientific Computing. Mark Bul EPCC, University of Edinburgh Using Java for Scientific Computing Mark Bul EPCC, University of Edinburgh markb@epcc.ed.ac.uk Java and Scientific Computing? Benefits of Java for Scientific Computing Portability Network centricity Software

More information

Moving MATLAB Algorithms into Complete Designs with Fixed-Point Simulation and Code Generation

Moving MATLAB Algorithms into Complete Designs with Fixed-Point Simulation and Code Generation Moving MATLAB Algorithms into Complete Designs with Fixed-Point Simulation and Code Generation Houman Zarrinkoub, PhD. Product Manager Signal Processing Toolboxes The MathWorks Inc. 2007 The MathWorks,

More information

Developing an Electronic Records Preservation Strategy

Developing an Electronic Records Preservation Strategy Version 7 Developing an Electronic Records Preservation Strategy 1. For whom is this guidance intended? 1.1 This document is intended for all business units at the University of Edinburgh and in particular

More information

Test On Line: reusing SAS code in WEB applications Author: Carlo Ramella TXT e-solutions

Test On Line: reusing SAS code in WEB applications Author: Carlo Ramella TXT e-solutions Test On Line: reusing SAS code in WEB applications Author: Carlo Ramella TXT e-solutions Chapter 1: Abstract The Proway System is a powerful complete system for Process and Testing Data Analysis in IC

More information

What s New with the MATLAB and Simulink Product Families. Marta Wilczkowiak & Coorous Mohtadi Application Engineering Group

What s New with the MATLAB and Simulink Product Families. Marta Wilczkowiak & Coorous Mohtadi Application Engineering Group What s New with the MATLAB and Simulink Product Families Marta Wilczkowiak & Coorous Mohtadi Application Engineering Group 1 Area MATLAB Math, Statistics, and Optimization Application Deployment Parallel

More information

Integrating MATLAB Analytics into Business-Critical Applications Marta Wilczkowiak Senior Applications Engineer MathWorks

Integrating MATLAB Analytics into Business-Critical Applications Marta Wilczkowiak Senior Applications Engineer MathWorks Integrating MATLAB Analytics into Business-Critical Applications Marta Wilczkowiak Senior Applications Engineer MathWorks 2015 The MathWorks, Inc. 1 Problem statement Democratization: Is it possible to

More information

Java Software Solutions for AP Computer Science 3rd Edition, Lewis et al. 2011

Java Software Solutions for AP Computer Science 3rd Edition, Lewis et al. 2011 A Correlation of AP Computer Science 3rd Edition, Lewis et al. 2011 To the INTRODUCTION This document demonstrates how AP (Advanced Placement) Computer Science, 3rd Edition 2011, Lewis et al. meets the

More information

An approach to quantifying the run-time behaviour of Java GUI applications

An approach to quantifying the run-time behaviour of Java GUI applications An approach to quantifying the run-time behaviour of Java GUI applications Aine Mitchell, James F. Power Abstract This paper outlines a new technique for collecting dynamic trace information from Java

More information

A Java Agent Environment for Simulation and Modelling

A Java Agent Environment for Simulation and Modelling A Java Agent Environment for Simulation and Modelling Martin Cross Air Operations Division Defence Science and Technology Organisation 506 Lorimer Street FISHERMANS BEND VIC 3207 Ralph Rönnquist Agent

More information

Appendix A Integrated Network Planning Tool: Nokia NetAct Planner

Appendix A Integrated Network Planning Tool: Nokia NetAct Planner Appendix A Integrated Network Planning Tool: Nokia NetAct Planner Ari Niininen Nokia Networks A.1 OVERVIEW OF NETACT PLANNER NetAct Planner is a multi-user environment planning tool based on a Windows

More information

Data Centre NetCDF Implementation Pilot

Data Centre NetCDF Implementation Pilot Data Centre NetCDF Implementation Pilot Peter Miu EUMETSAT User Conference Oslo, Sep. 2011 Splinter Session, Facilitating Data Access and Utilisation Slide: 1 EUM/OPS/VWG/11/2600 V.1 What is this Pilot

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Goverment CCTV security HD video transmission in real time Layer

More information

The Need for a Holistic Automation Solution to Overcome the Pitfalls in Test Automation

The Need for a Holistic Automation Solution to Overcome the Pitfalls in Test Automation The Need for a Holistic Automation Solution to Overcome the Pitfalls in Test Automation Abstract Many organizations opt for test automation with the primary objectives of reducing the cost of quality and

More information

MetaSuite : Advanced Data Integration And Extraction Software

MetaSuite : Advanced Data Integration And Extraction Software MetaSuite Technical White Paper March, 2000 A Minerva SoftCare White Paper MetaSuite : Advanced Data Integration And Extraction Software WP-FPA-101998 Content CAPITALIZE ON YOUR VALUABLE LEGACY DATA 3

More information

Model-Based Test Criteria for Validating Annotated Web Applications

Model-Based Test Criteria for Validating Annotated Web Applications Model-Based Test Criteria for Validating Annotated Web Applications Jonatan Alava and Peter J. Clarke School of Computing and Information Sciences Florida International University Miami, FL 33199 jalav001@cis.fiu.edu

More information

Accelerating FASGW(H) / ANL Image Processing with Model-Based Design Issue 2

Accelerating FASGW(H) / ANL Image Processing with Model-Based Design Issue 2 Accelerating FASGW(H) / ANL Image Processing with Model-Based Design Issue 2 Andy Sherriff Technical Expert Image Processing MBDA UK Ltd 7 th October 2015 294/FS/AJS/15/0029/FASGW Introduction Why Model-Based

More information

Approaches to Capturing Java Threads State

Approaches to Capturing Java Threads State Approaches to Capturing Java Threads State Abstract This paper describes a range of approaches to capturing the state of Java threads. The capture and restoration of Java threads state have two main purposes:

More information

Agent-Enabling Transformation of E-Commerce Portals with Web Services

Agent-Enabling Transformation of E-Commerce Portals with Web Services Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:

More information

A RAPID PROTOTYPING ENVIRONMENT FOR MOBILE REHABILITATION ROBOTICS

A RAPID PROTOTYPING ENVIRONMENT FOR MOBILE REHABILITATION ROBOTICS A RAPID PROTOTYPING ENVIRONMENT FOR MOBILE REHABILITATION ROBOTICS Ir. B.J.F. Driessen, ing. J.A. v. Woerden, Prof. Dr. G. Bolmsjö (Lund University), Dipl.- Ing. O. Buckmann (BIBA) TNO-TPD, PO-BOX 155,

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major

More information

Model Based Design Development Environment for Simulink /Stateflow Product Specification

Model Based Design Development Environment for Simulink /Stateflow Product Specification Model Based Design Development Environment for Simulink /Stateflow Product Specification November 2012 Overview extends MATLAB and Simulink by providing a development environment that both increases information

More information

Data Mining with Oracle 10g using Clustering and Classification Algorithms Nhamo Mdzingwa September 25, 2005

Data Mining with Oracle 10g using Clustering and Classification Algorithms Nhamo Mdzingwa September 25, 2005 Data Mining with Oracle 10g using Clustering and Classification Algorithms Nhamo Mdzingwa September 25, 2005 Abstract Deciding on which algorithm to use, in terms of which is the most effective and accurate

More information

Developing Agents with the Managed Object Toolkit

Developing Agents with the Managed Object Toolkit CITR TECHNICAL JOURNAL VOLUME 2 57 Developing Agents with the Managed Object Toolkit GORDON MCNAIR AND JASON ETHERIDGE Abstract Software agents are critical to the management of network elements as they

More information

Introduction to Programming Using Java (98-388)

Introduction to Programming Using Java (98-388) Introduction to Programming Using Java (98-388) Understand Java fundamentals Describe the use of main in a Java application Signature of main, why it is static; how to consume an instance of your own class;

More information

Java Primer 1: Types, Classes and Operators

Java Primer 1: Types, Classes and Operators Java Primer 1 3/18/14 Presentation for use with the textbook Data Structures and Algorithms in Java, 6th edition, by M. T. Goodrich, R. Tamassia, and M. H. Goldwasser, Wiley, 2014 Java Primer 1: Types,

More information

Procedural Programming

Procedural Programming Unit 18: Procedural Unit code: D/601/1293 QCF Level 4: BTEC Higher National Credit value: 15 Aim To provide learners with an understanding of the principles of procedural programming and to enable them

More information

Automatic Code Generation Technology Adoption Lessons Learned from Commercial Vehicle Case Studies

Automatic Code Generation Technology Adoption Lessons Learned from Commercial Vehicle Case Studies 08AE-22 Automatic Code Generation Technology Adoption Lessons Learned from Commercial Vehicle Case Studies Copyright 2007 The MathWorks, Inc Tom Erkkinen The MathWorks, Inc. Scott Breiner John Deere ABSTRACT

More information

Interaction of JVM with x86, Sparc and MIPS

Interaction of JVM with x86, Sparc and MIPS Interaction of JVM with x86, Sparc and MIPS Sasikanth Avancha, Dipanjan Chakraborty, Dhiral Gada, Tapan Kamdar {savanc1, dchakr1, dgada1, kamdar}@cs.umbc.edu Department of Computer Science and Electrical

More information

PRINCIPLES AND FUNCTIONAL REQUIREMENTS

PRINCIPLES AND FUNCTIONAL REQUIREMENTS INTERNATIONAL COUNCIL ON ARCHIVES PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS RECORDKEEPING REQUIREMENTS FOR BUSINESS SYSTEMS THAT DO NOT MANAGE RECORDS OCTOBER

More information

Configuration Management for Component-based Systems

Configuration Management for Component-based Systems Configuration Management for Component-based Systems Magnus Larsson Ivica Crnkovic Development and Research Department of Computer Science ABB Automation Products AB Mälardalen University 721 59 Västerås,

More information

Lossy Compression of Scientific Data with Wavelet Transforms

Lossy Compression of Scientific Data with Wavelet Transforms Chris Fleizach Progress Report Lossy Compression of Scientific Data with Wavelet Transforms Introduction Scientific data gathered from simulation or real measurement usually requires 64 bit floating point

More information

ARCHIVE ESSENTIALS

ARCHIVE ESSENTIALS EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has

More information

OCL Support in MOF Repositories

OCL Support in MOF Repositories OCL Support in MOF Repositories Joachim Hoessler, Michael Soden Department of Computer Science Technical University Berlin hoessler@cs.tu-berlin.de, soden@cs.tu-berlin.de Abstract From metamodels that

More information

White Paper: Delivering Enterprise Web Applications on the Curl Platform

White Paper: Delivering Enterprise Web Applications on the Curl Platform White Paper: Delivering Enterprise Web Applications on the Curl Platform Table of Contents Table of Contents Executive Summary... 1 Introduction... 2 Background... 2 Challenges... 2 The Curl Solution...

More information

DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA

DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA M. GAUS, G. R. JOUBERT, O. KAO, S. RIEDEL AND S. STAPEL Technical University of Clausthal, Department of Computer Science Julius-Albert-Str. 4, 38678

More information

Towards Reusable Heterogeneous Data-Centric Disentangled Parts

Towards Reusable Heterogeneous Data-Centric Disentangled Parts Towards Reusable Heterogeneous Data-Centric Disentangled Parts Michael Reinsch and Takuo Watanabe Department of Computer Science, Graduate School of Information Science and Technology, Tokyo Institute

More information

Verification, Validation, and Test with Model-Based Design

Verification, Validation, and Test with Model-Based Design 2008-01-2709 Verification, Validation, and Test with Model-Based Design Copyright 2008 The MathWorks, Inc Tom Erkkinen The MathWorks, Inc. Mirko Conrad The MathWorks, Inc. ABSTRACT Model-Based Design with

More information

Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures

Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures Muhammad Ali Babar National ICT Australia Ltd. and University of New South

More information

A Java-based Computer Simulator and its Applications

A Java-based Computer Simulator and its Applications A Java-based Computer Simulator and its Applications John K. Estell Bluffton College Session 2220 Abstract This paper describes a learning philosophy for computer science that is based on having students

More information

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER EMAIL ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER preface The last few years have seen significant changes in the way organisations conduct business. There has been

More information

WEB APPLICATION MANAGEMENT: IMPLEMENTING A DYNAMIC DATABASE UPGRADE MODEL

WEB APPLICATION MANAGEMENT: IMPLEMENTING A DYNAMIC DATABASE UPGRADE MODEL WEB APPLICATION MANAGEMENT: IMPLEMENTING A DYNAMIC DATABASE UPGRADE MODEL Richard Wilson 1 & Daniel Lowes 2 1 Dept. of Computer Science and Software Engineering, University of Melbourne (Australia) 2 Dept.

More information

National 5 Computing Science Software Design & Development

National 5 Computing Science Software Design & Development National 5 Computing Science Software Design & Development 1 Stages of Development 2 Analysis 3 Design 4 Implementation 5 Testing 6 Documentation 7 Evaluation 8 Maintenance 9 Data Types & Structures 10

More information

A Collation & Analysis Methodology for Substation Event Data via a Web Interface (supporting COMTRADE, GOOSE & MMS Data Sources from Multiple Vendors)

A Collation & Analysis Methodology for Substation Event Data via a Web Interface (supporting COMTRADE, GOOSE & MMS Data Sources from Multiple Vendors) 1 A Collation & Analysis Methodology for Substation Event Data via a Web Interface (supporting COMTRADE, GOOSE & MMS Data Sources from Multiple Vendors) Abstract Author: Bruce Mackay Email Address: bruce.mackay@concogrp.com

More information

Figure 1. Closed-loop model.

Figure 1. Closed-loop model. Model Transformation between MATLAB Simulink and Function Blocks Chia-han (John) Yang and Valeriy Vyatkin Department of Electrical and Computer Engineering University of Auckland cyan034@ec.auckland.ac.nz,

More information

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7 Computing at Cox Green Curriculum Plan Key Stage 3 Year 7 Term 1 Term 2 Term 3 Term 4 Term 5 Term 6 E-safety Database Programming Spreadsheet and modelling Web design How data is represented in s? How

More information

EMC GREENPLUM MANAGEMENT ENABLED BY AGINITY WORKBENCH

EMC GREENPLUM MANAGEMENT ENABLED BY AGINITY WORKBENCH White Paper EMC GREENPLUM MANAGEMENT ENABLED BY AGINITY WORKBENCH A Detailed Review EMC SOLUTIONS GROUP Abstract This white paper discusses the features, benefits, and use of Aginity Workbench for EMC

More information

The UML Extension Mechanisms

The UML Extension Mechanisms Jasmine Farhad Dept of Computer Science University College London 13-Dec-02 The UML Extension Mechanisms Introduction There is an important need for organisations to evolve in today s market. This has

More information

A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients

A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients Edith Cowan University Research Online ECU Publications Pre. 2011 2006 A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients Kim Morfitt Edith Cowan University Craig Valli Edith Cowan University

More information

DOWNLOAD PDF TELEPHONE BILLING SYSTEM PROJECT

DOWNLOAD PDF TELEPHONE BILLING SYSTEM PROJECT Chapter 1 : Telephone Billing System In VB Project Report Projects The project thus calculates the t elephone bills automatically. It does almost every work which is related to automatic telephone billing

More information

OPEN. INTELLIGENT. Laser Scanning Software Solutions

OPEN. INTELLIGENT. Laser Scanning Software Solutions OPEN. INTELLIGENT. Laser Scanning Software Solutions www.lfm-software.com The Future of Laser Scanning Safe and efficient operation of complex engineering assets, and the efficient management of their

More information

Generation Rules in POMA Architecture

Generation Rules in POMA Architecture J. Software Engineering & Applications, 2010, 3, 1040-1046 doi:10.4236/jsea.2010.311122 Published Online November 2010 (http://www.scirp.org/journal/jsea) Mohamed Taleb 1, Ahmed Seffah 2, Alain Abran 1

More information

Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS

Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS Structure Page Nos. 2.0 Introduction 4 2. Objectives 5 2.2 Metrics for Performance Evaluation 5 2.2. Running Time 2.2.2 Speed Up 2.2.3 Efficiency 2.3 Factors

More information

Topics. From UI prototype... About user interfaces. ... via design to implementation. Pearson Education 2005 Chapter 7 (Maciaszek - RASD 2/e) 6

Topics. From UI prototype... About user interfaces. ... via design to implementation. Pearson Education 2005 Chapter 7 (Maciaszek - RASD 2/e) 6 MACIASZEK, L.A. (2005): Requirements Analysis and System Design, 2 nd ed. Addison Wesley, Harlow England, 504p. ISBN 0 321 20464 6 Chapter 7 User Interface Design Topics From UI prototype to implementation

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) NEED FOR DESIGN PATTERNS AND FRAMEWORKS FOR QUALITY SOFTWARE DEVELOPMENT

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) NEED FOR DESIGN PATTERNS AND FRAMEWORKS FOR QUALITY SOFTWARE DEVELOPMENT INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Review of Basic Software Design Concepts. Fethi Rabhi SENG 2021

Review of Basic Software Design Concepts. Fethi Rabhi SENG 2021 Review of Basic Software Design Concepts Fethi Rabhi SENG 2021 1 Topics The development process Planning Designing Implementing 2 1. The development process How to organise activities related to the creation,

More information

Quality-Driven Architecture Design Method

Quality-Driven Architecture Design Method Quality-Driven Architecture Design Method Matinlassi Mari, Niemelä Eila P.O. Box 1100, 90571 Oulu Tel. +358 8 551 2111 Fax +358 8 551 2320 {Mari.Matinlassi, Eila.Niemela}@vtt.fi Abstract: In this paper

More information

Study Of Spatial Biological Systems Using a Graphical User Interface

Study Of Spatial Biological Systems Using a Graphical User Interface Study Of Spatial Biological Systems Using a Graphical User Interface Nigel J. Burroughs, George D. Tsibidis Mathematics Institute, University of Warwick, Coventry, CV47AL, UK {njb,tsibidis}@maths.warwick.ac.uk

More information

STATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project

STATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project STATEMENT OF WORK BETWEEN UNIVERSITY SERVICES PMO and ENVIRONMENTAL SYSTEMS RESEARCH INSTITUTE INC. for the GIS Interactive Campus Web Map Project I. Scope This Statement of Work (SOW) is effective May

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

Frontline Interoperability Test Team Case Studies

Frontline Interoperability Test Team Case Studies Frontline Interoperability Test Team Case Studies Frontline IOT Means Maximum Device Compatibility Case Summary A large Bluetooth developer (Customer X) created a new Bluetooth-enabled phone for commercial

More information

Chapter 1 Preliminaries

Chapter 1 Preliminaries Chapter 1 Preliminaries Chapter 1 Topics Reasons for Studying Concepts of Programming Languages Programming Domains Language Evaluation Criteria Influences on Language Design Language Categories Language

More information

Pearson Education 2005 Chapter 7 (Maciaszek - RASD 2/e) 2

Pearson Education 2005 Chapter 7 (Maciaszek - RASD 2/e) 2 MACIASZEK, L.A. (2005): Requirements Analysis and System Design, 2 nd ed. Addison Wesley, Harlow England, 504p. ISBN 0 321 20464 6 Chapter 7 User Interface Design Pearson Education Limited 2005 Topics

More information

RSA ADVANCED SOC SERVICES

RSA ADVANCED SOC SERVICES RSA ADVANCED SOC SERVICES Consulting services to improve threat detection and response EXECUTIVE SUMMARY A holistic approach to enhanced cybersecurity operations This service is for organizations needing

More information

Special Topics: Programming Languages

Special Topics: Programming Languages Lecture #23 0 V22.0490.001 Special Topics: Programming Languages B. Mishra New York University. Lecture # 23 Lecture #23 1 Slide 1 Java: History Spring 1990 April 1991: Naughton, Gosling and Sheridan (

More information

Higher National Unit specification: general information

Higher National Unit specification: general information Higher National Unit specification: general information Unit code: H1EM 34 Superclass: CD Publication date: June 2013 Source: Scottish Qualifications Authority Version: 03 Unit purpose This Unit is designed

More information

Testing the Date Maintenance of the File Allocation Table File System

Testing the Date Maintenance of the File Allocation Table File System Abstract Testing the Date Maintenance of the File Allocation Table File Tom Waghorn Edith Cowan University e-mail: twaghorn@student.ecu.edu.au The directory entries used in the File Allocation Table filesystems

More information

Real-Time and Embedded Systems (M) Lecture 19

Real-Time and Embedded Systems (M) Lecture 19 Low-Level/Embedded Programming Real-Time and Embedded Systems (M) Lecture 19 Lecture Outline Hardware developments Implications on system design Low-level programming Automatic memory management Timing

More information

1.1 Jadex - Engineering Goal-Oriented Agents

1.1 Jadex - Engineering Goal-Oriented Agents 1.1 Jadex - Engineering Goal-Oriented Agents In previous sections of the book agents have been considered as software artifacts that differ from objects mainly in their capability to autonomously execute

More information

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,

More information

Product Security Briefing

Product Security Briefing Product Security Briefing Performed on: Adobe ColdFusion 8 Information Risk Management Plc 8th Floor Kings Building Smith Square London SW1 P3JJ UK T +44 (0)20 7808 6420 F +44 (0)20 7808 6421 Info@irmplc.com

More information

GENERATION TOOL FOR DBMS FOCUSED APPLICATIONS

GENERATION TOOL FOR DBMS FOCUSED APPLICATIONS GENERATION TOOL FOR DBMS FOCUSED APPLICATIONS Carlos del Cuvillo Universidad Politecnica de Madrid Ctra. de Valencia km. 7 E28031 Madrid Hector Garcia Universidad Politecnica de Madrid Ctra. de Valencia

More information

Case Study: Business Data Management

Case Study: Business Data Management 1 P a g e Case Study: Business Data Management The Application-focused organisation Traditionally organisations have seen themselves as being application-focused. The organisation took in data from a variety

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java

Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java Andrew Foster Product Manager PrismTech Corporation The Case for Java in Enterprise Real-Time Systems

More information

Untyped Memory in the Java Virtual Machine

Untyped Memory in the Java Virtual Machine Untyped Memory in the Java Virtual Machine Andreas Gal and Michael Franz University of California, Irvine {gal,franz}@uci.edu Christian W. Probst Technical University of Denmark probst@imm.dtu.dk July

More information

Introduction to software architecture Revision : 732

Introduction to software architecture Revision : 732 Introduction to software architecture Revision : 732 Denis Conan Septembre 2018 Foreword The content of these slides is extracted from the following references: L. Bass, P. Clements, and R. Kazman. Software

More information

Data Management Glossary

Data Management Glossary Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative

More information

Tutorial 1 Answers. Question 1

Tutorial 1 Answers. Question 1 Tutorial 1 Answers Question 1 Complexity Software in it what is has to do, is often essentially complex. We can think of software which is accidentally complex such as a large scale e-commerce system (simple

More information

After Conversation - A Forensic ICQ Logfile Extraction Tool

After Conversation - A Forensic ICQ Logfile Extraction Tool Edith Cowan University Research Online ECU Publications Pre. 2011 2005 After Conversation - A Forensic ICQ Logfile Extraction Tool Kim Morfitt Edith Cowan University Craig Valli Edith Cowan University

More information

Jazz: A Tool for Demand-Driven Structural Testing

Jazz: A Tool for Demand-Driven Structural Testing Jazz: A Tool for Demand-Driven Structural Testing J. Misurda, J. A. Clause, J. L. Reed, P. Gandra, B. R. Childers, and M. L. Soffa Department of Computer Science University of Pittsburgh Pittsburgh, Pennsylvania

More information

Appendix A - Glossary(of OO software term s)

Appendix A - Glossary(of OO software term s) Appendix A - Glossary(of OO software term s) Abstract Class A class that does not supply an implementation for its entire interface, and so consequently, cannot be instantiated. ActiveX Microsoft s component

More information

Ch 1: The Architecture Business Cycle

Ch 1: The Architecture Business Cycle Ch 1: The Architecture Business Cycle For decades, software designers have been taught to build systems based exclusively on the technical requirements. Software architecture encompasses the structures

More information

Principles of Simulation Architecture-Independent Model Development

Principles of Simulation Architecture-Independent Model Development Principles of rchitecture-independent Development Duncan Fletcher; Nick Luckman Defence Science and Technology Organisation Edinburgh, Weapons Systems Division duncan.fletcher@dsto.defence.gov.au nick.luckman@dsto.defence.gov.au

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

CERT C++ COMPLIANCE ENFORCEMENT

CERT C++ COMPLIANCE ENFORCEMENT CERT C++ COMPLIANCE ENFORCEMENT AUTOMATED SOURCE CODE ANALYSIS TO MAINTAIN COMPLIANCE SIMPLIFY AND STREAMLINE CERT C++ COMPLIANCE The CERT C++ compliance module reports on dataflow problems, software defects,

More information

Military Messaging. Over Low. Bandwidth. Connections

Military Messaging. Over Low. Bandwidth. Connections Military Messaging Over Low Bandwidth Connections White Paper Contents Paper Overview 3 The Technical Challenges 4 Low Bandwidth 4 High Latency 4 High Error Rates 4 Multicast 4 Emission Control (EMCON)

More information

B16 Object Oriented Programming

B16 Object Oriented Programming B16 Object Oriented Programming Michael A. Osborne mosb@robots.ox.ac.uk http://www.robots.ox.ac.uk/~mosb/teaching.html#b16 Hilary 2013 This course will introduce object-oriented programming (OOP). It will

More information