Search results for " verification"

showing 10 items of 91 documents

The impact of thermophysical properties and hysteresis effects on the energy performance simulation of PCM wallboards: Experimental studies, modellin…

2020

Abstract This paper presents a combined experimental and numerical procedure, developed to test the thermophysical behaviour of a real scale PCM wallboard, aiming at providing reliable data for the validation of building energy performance simulation tools. Data obtained from two experimental tests, conducted on real building elements integrating PCM undergoing complete and incomplete phase change, are considered for assessing the impact of thermal properties and hysteresis. A comprehensive comparative numerical analysis, performed by means of an in-house developed simulation tool, called DETECt, is carried out to investigate the reliability of several modelling and simulation approaches av…

Phase transitionMaterials scienceScale (ratio)Renewable Energy Sustainability and the Environment020209 energyNumerical analysisNuclear engineeringEnergy performanceExperimental verification02 engineering and technologyTemperature dependent specific heatHeat capacityBuilding energy performance simulation modelHysteresisHysteresis effectThermal0202 electrical engineering electronic engineering information engineeringReliability (statistics)Phase change materialRenewable and Sustainable Energy Reviews
researchProduct

Quality System for Production Software as Tool for Monitoring and Improving Organization KPIs

2013

In this paper we propose a solution as support for quality systems for production software. The motivation behind this study was to reduce that cost in the production area caused by gaps in the quality of the production software. Our proposal: QSPS (Quality System for Production Software) is offering support in the "vulnerable points" of these quality systems which usually generate nonconformities and have proved to be difficult or impossible to control. QSPS is a method in seven steps or modules that integrates also software tools, templates, checklists, evaluating tools elaborated complying to products, process and system quality standards. If other analyzed methods like: Scrum, XP, Fuzzy…

Quality managementComputer Networks and CommunicationsComputer sciencecomputer.software_genreSoftware qualityManufacturing engineeringComputer Science ApplicationsQuality management systemComputational Theory and MathematicsSoftware quality managementOperating systemSoftware quality analystSoftware verification and validationcomputerCapability Maturity Model IntegrationSoftware quality controlInternational Journal of Computers Communications & Control
researchProduct

Use and Identification of Components in Component-Based Software Development Methods

2000

New software systems are needed ever more but to keep up with this trend software developers must learn to create quality software more efficiently. One approach is to (re-)use components as building blocks of the new software. Recently there has been more interest to create component-based software development methods to support this. In this article we first set out requirements for reuse-based software development and then evaluate three component-based methods, namely Catalysis, OMT++, and Unified Process. As a conclusion we argue that evaluated methods produce prefabricated components and that component-based means that software developers can change better components to existing syste…

Resource-oriented architectureComputer scienceKnowledge engineeringReuseSoftware walkthroughcomputer.software_genreSoftware development processSoftware analyticsSoftwareSoftware verification and validationSoftware systemSoftware requirementsUnified ProcessReusabilitySocial software engineeringbusiness.industrySoftware developmentSoftware frameworkSoftware deploymentComponent-based software engineeringSoftware constructionPersonal software processPackage development processBackportingSoftware architecturebusinessSoftware engineeringcomputer
researchProduct

Architectural Implementation of a Reconfigurable NoC Design for Multi-Applications

2021

With the increasing number of applications running on a Network-on-Chip (NoC) based System-on-Chip (SoC), there is a need for designing a reconfigurable NoC platform to achieve acceptable performance for all the applications. This paper proposes a novel architecture for implementing a reconfiguration logic to the NoC platform executing multiple applications. The proposed architecture reconfigures SoC modules to the routers in the NoC with the help of tri-state buffers based on the applications running. The overhead in implementing the reconfiguration circuitry is significantly less, approximately 0.9% of the area and 1% of the total power consumed by the router network. The architectures pr…

RouterFunctional verificationComputer sciencebusiness.industryOverhead (engineering)Control reconfigurationHardware_PERFORMANCEANDRELIABILITYNetwork topologyMultiplexerNetwork on a chipEmbedded systemHardware_INTEGRATEDCIRCUITSVerilogbusinesscomputercomputer.programming_language2021 24th Euromicro Conference on Digital System Design (DSD)
researchProduct

Morphological Enhancement and Triangular Matching for Fingerprint Recognition

2008

Among the principal problems for realizing a robust Automated Fingerprint Identification System (AFIS) there are the images quality and matching algorithms. In this paper a fingerprint enhancement algorithm based on morphological filter and a triangular matching are introduced. The enhancement phase is based on tree steps: directional decomposition, morphological filter and composition. For the matching phase a global transformation to overcame the effects of rotation, displacement and deformation between acquired and stored fingerprint is performed using the number of similar triangular, having fingerprint minutiae as vertexes. The performance of the proposed approach has been evaluated on…

ScannerMatching (graph theory)business.industryComputer scienceFingerprint (computing)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONFingerprint Verification CompetitionPattern recognitionFingerprint recognitionAutomated Fingerprint Identification System (AFIS)Tree (data structure)Computer Science::Computer Vision and Pattern RecognitionArtificial intelligenceAutomated fingerprint identificationbusinessRotation (mathematics)ComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and Security
researchProduct

Which Test Artifacts Testing Service Providers should Reuse and How? Experiences from a Case Study in the Chinese ICT Sourcing Market

2011

Software testing service providers are facing new requirements to shorten service times, lower costs, and increase service customization and quality. Reuse of test artifacts is a possible solution that can help providers to meet the requirements because reuse can improve software quality and productivity. However, the extant literature does not explain in depth which test artifacts should be reused and how. This paper focuses on ICT-enabled sourcing of software testing services in the Chinese market to identify the most important reusable test artifacts. There are two reasons for this research. First, most Chinese service providers are small or medium-sized and have to overcome obstacles su…

Service (systems architecture)Process managementComputer scienceSoftware walkthroughReuseSoftware peer reviewGlobalizationSoftware quality analystSoftware verification and validationMarketingta113Social software engineeringbusiness.industrySoftware as a serviceSoftware developmentService providerSoftware qualityInformation and Communications TechnologySoftware deploymentPersonal software processSoftware quality managementPackage development processbusinessSystem integration testingSoftware project managementSoftware quality control
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct

Challenges in preparing for Environmental Technology Verification in a demonstration project: A case study of three innovative water treatment techno…

2022

The European Union's Environmental Technology Verification (ETV) program aims to foster innovative environmental technologies to reach the market and reassure potential users. This paper presents an investigation of using ETV for three technologies, being developed within the EU Zero Brine research and innovation project. The technologies were designed to recover high quality water, salts and minerals from brine solutions. The technologies in focus are the forward feed MED evaporator, the Multi Feed - Plug Flow Reactor Crystalliser and Eutectic Freeze Crystallization. The study sought to understand the challenges of the ETV process, the readiness and eligibility of technologies, and possibl…

Settore ING-IND/26 - Teoria Dello Sviluppo Dei Processi ChimiciGeography Planning and DevelopmentForward feed - Multiple effect distillationPerformance claimsEutectic freeze crystallization (EFC)Environmental technology verificationPerformance claims Environmental technology verification Forward feed-Multiple effect distillation Multi feed plug flow reactor crystalliser (MF-PFR) Eutectic freeze crystallization (EFC)Water Science and TechnologyMulti feed plug flow reactor crystalliser (MF-PFR)
researchProduct

A Frequency-based Approach for Features Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems

2010

The basic aim of a biometric identification system is to discriminate automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependability. In this paper, an innovative multimodal biometric identification system based on iris and fingerprint traits is proposed. The paper is a state-of-the-art advancement of multibiometrics, offering an innovative perspective on features fusion. In greater detail, a frequency-based approach result…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniBiometricsComputer sciencebusiness.industryIris recognitionFeature extractionFingerprint Verification CompetitionPattern recognitionFingerprint recognitionSensor fusionComputer Science ApplicationsHuman-Computer InteractionIdentification (information)Control and Systems EngineeringMultimodal biometricsFingerprintFusion techniques identification systems iris and fingerprint biometry multimodal biometric systemsComputer visionArtificial intelligenceElectrical and Electronic EngineeringbusinessSoftwareInformation Systems
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct