Search results for "computer.software_genre"

showing 10 items of 3858 documents

A reverse engineering approach to measure the deformations of a sailing yacht

2016

In this work, a multidisciplinary experience, aimed to study the permanent deformations of the hull of a regatta sailing yacht is described. In particular, a procedure to compare two different surfaces of the hull of a small sailing yacht, designed and manufactured at the University of Palermo, has been developed. The first one represents the original CAD model while the second one has been obtained by means of a reverse engineering approach. The reverse engineering process was performed through an automatic close-range photogrammetry survey, that has allowed to obtain very accurate measures of the hull, and a 3D modelling step by the well-known 3D computer graphics software Rhinoceros. The…

Reverse engineeringEngineeringProcess (engineering)Mechanical engineeringCADcomputer.software_genre03 medical and health sciences0302 clinical medicine3D computer graphics softwareHull0502 economics and businessGenerative algorithmReverse engineeringSettore ING-IND/15 - Disegno E Metodi Dell'Ingegneria IndustrialeMeasure (data warehouse)business.industry05 social sciences030206 dentistryPhotogrammetryCAE toolClose range photogrammetrySailing yachtSettore ICAR/17 - DisegnoCAE tools; Close range photogrammetry; Generative algorithms; Reverse engineering; Sailing yacht;businesscomputer050203 business & managementSettore ICAR/06 - Topografia E CartografiaMarine engineering
researchProduct

Influence of some relevant process parameters on the dimensional accuracy in incremental forming: a numerical and experimental investigation

2004

Abstract As known, incremental forming is a flexible and innovative sheet metal forming process which allows complex shape shells forming without the need for any die. For these reasons, incremental forming is nowadays suggested for rapid prototyping and customised products. The present paper is focused on material formability in incremental forming and, in particular, on the evaluation and compensation of elastic springback. The latter significantly modifies the imposed shape. For this purpose, a deeper assessment of the process was developed following three different approaches. First of all, a wide experimental investigation on the influence of some relevant process parameters was develo…

Reverse engineeringFEMEngineeringbusiness.product_categorybusiness.industryIncremental formingDesign toolMetals and AlloysProcess (computing)Forming processesStructural engineeringGeometrical accuracycomputer.software_genreIndustrial and Manufacturing EngineeringFinite element methodComputer Science ApplicationsModeling and Simulationvisual_artCeramics and Compositesvisual_art.visual_art_mediumFormabilityDie (manufacturing)Sheet metalbusinesscomputerJournal of Materials Processing Technology
researchProduct

Rational supershapes for surface reconstruction

2007

Simple representation of complex 3D data sets is a fundamental problem in computer vision. From a quality control perspective, it is crucial to use efficient and simple techniques do define a reference model for further recognition or comparison tasks. In this paper, we focus on reverse engineering 3D data sets by recovering rational supershapes to build an implicit function to represent mechanical parts. We derive existing techniques for superquadrics recovery to the supershapes and we adapt the concepts introduced for the ratioquadrics to introduce the rational supershapes. The main advantage of rational supershapes over standard supershapes is that the radius is now expressed as a ration…

Reverse engineeringImplicit functionComputer scienceSimple (abstract algebra)SuperquadricsRepresentation (mathematics)Focus (optics)computer.software_genreReference modelAlgorithmMeasure (mathematics)computerEighth International Conference on Quality Control by Artificial Vision
researchProduct

ASLA: reverse engineering approach for software license information retrieval

2006

Software maintenance and reuse require identification of the applied software licenses. The information needs of maintainers and reusers can be supported by reverse engineering tools at different information retrieval levels. The paper presents a reverse engineering approach called ASLA for retrieving license information typically used in OSS. User needs, system architecture, tool features, and tool evaluation are presented. The implemented tool features include support for identifying source file dependencies and licenses in source files. The tool is evaluated against another tool for license information extraction. ASLA supports the same programming languages as GCC. License identificatio…

Reverse engineeringInformation retrievalSource codeDatabaseComputer sciencebusiness.industrymedia_common.quotation_subjectInformation needsSoftware maintenancecomputer.software_genreSoftware licenseSoftwareSoftware engineeringbusinessSoftware architecturecomputerLicensemedia_commonConference on Software Maintenance and Reengineering (CSMR'06)
researchProduct

Analysis of Ten Reverse Engineering Tools

2009

Reverse engineering tools can be used in satisfying the information needs of software maintainers. Especially in case of maintaining large-scale legacy systems tool support is essential. Reverse engineering tools provide various kinds of capabilities to provide the needed information to the tool user. In this paper we analyze the provided capabilities in terms of four aspects: provided data structures, visualization mechanisms, information request specification mechanisms, and navigation features. We provide a compact analysis of ten representative reverse engineering tools for supporting C, C++ or Java: Eclipse Java Development Tools, Wind River Workbench (for C and C++), Understand (for C…

Reverse engineeringJavabusiness.industryImagix 4DComputer scienceLegacy systemInformation needsJavadocSoftware maintenancecomputer.software_genreData structureData miningSoftware engineeringbusinesscomputercomputer.programming_language
researchProduct

Contact between the components of a knee prosthesis: numerical and experimental study

2012

The aim of this work is the analysis of the contact area in a knee prosthesis using two different approaches. In particular, the interface between the femoral component and the polyethylene insert has been studied both numerically and experimentally. The interest in studying the contact area is related to the fact that the wear of the polyethylene insert, due to the high contact pressures, represents one of the major causes of failure of the total knee prosthesis. The possibility to evaluate the contact area at different loads and mutual position between femur and tibia is, therefore, of fundamental importance to study the service life of a prosthesis and to improve its performance. The fin…

Reverse engineeringMaterials sciencebusiness.industryMechanical Engineeringlcsh:Mechanical engineering and machineryWork (physics)lcsh:TA630-695Analisi FEMSurface finishStructural engineeringlcsh:Structural engineering (General)computer.software_genreFinite element methodMechanics of MaterialsService lifeUltrasuoniUltrasonic sensorlcsh:TJ1-1570Reverse engineeringbusinessContact areacomputerProtesi di ginocchioReliability (statistics)Biomedical engineeringFrattura ed Integrità Strutturale
researchProduct

The stability problem and noisy projections in discrete tomography

2004

Abstract The new field of research of discrete tomography will be described in this paper. It differs from standard computerized tomography in the reduced number of projections. It needs ad hoc algorithms which usually are based on the definition of the model of the object to reconstruct. The main problems will be introduced and an experimental simulation will prove the robustness of a slightly modified version of a well known method for the reconstruction of binary planar convex sets, even in case of projections affected by error. To the best of our knowledge this is one of the first experimental study of the stability problem with a statistical approach. Prospective applications include c…

Reverse engineeringMathematical optimizationSettore INF/01 - InformaticaComputer scienceRegular polygonBinary numbercomputer.software_genreLanguage and LinguisticsComputer Science ApplicationsHuman-Computer InteractionRobustness (computer science)Tomographynoisy projectionscomputerDiscrete tomographydiscrete tomography
researchProduct

Reverse engineering expert visual observations: From fixations to the learning of spatial filters with a neural-gas algorithm

2013

Human beings can become experts in performing specific vision tasks, for example, doctors analysing medical images, or botanists studying leaves. With sufficient knowledge and experience, people can become very efficient at such tasks. When attempting to perform these tasks with a machine vision system, it would be highly beneficial to be able to replicate the process which the expert undergoes. Advances in eye-tracking technology can provide data to allow us to discover the manner in which an expert studies an image. This paper presents a first step towards utilizing these data for computer vision purposes. A growing-neural-gas algorithm is used to learn a set of Gabor filters which give h…

Reverse engineeringNeural gasComputer sciencebusiness.industryProcess (engineering)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONGeneral Engineeringcomputer.software_genreMachine learningComputer Science ApplicationsTask (project management)Image (mathematics)Artificial IntelligenceEye trackingArtificial intelligenceSet (psychology)businesscomputerAlgorithmExpert Systems with Applications
researchProduct

A modified moiré technique for three-dimensional surface topography

2002

In this paper we present an optical technique based on the shadow moire method which allows the measurement and digitization of three-dimensional surfaces. The technique was tested through experimental work and the results were compared with those obtained by a coordinate measuring machine. Moving from the conventional shadow moire method, new features were implemented enabling us to overcome the main shortcomings of the conventional moire method. These include the need to assign the fringe order, the incapability of discerning concavity or convexity, the poor resolution and the complexity in the signal processing. All these problems have been solved by adding an element to generate a carri…

Reverse engineeringSignal processingbusiness.industryComputer scienceApplied MathematicsMoiré patternCoordinate-measuring machinecomputer.software_genreSignalConvexitysymbols.namesakeOpticsFourier transformvisual_artvisual_art.visual_art_mediumsymbolsComputer visionArtificial intelligenceSheet metalbusinessInstrumentationEngineering (miscellaneous)computerMeasurement Science and Technology
researchProduct

ISAdetect

2020

Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…

Reverse engineeringprosessoritComputer scienceFirmware02 engineering and technologycomputer.file_formatcomputer.software_genrehaittaohjelmatInstruction setObject codeComputer engineering020204 information systemsEndianness0202 electrical engineering electronic engineering information engineeringMalwareesineiden internet020201 artificial intelligence & image processingBinary codeExecutabletietoturvacomputerProceedings of the Tenth ACM Conference on Data and Application Security and Privacy
researchProduct