共查询到20条相似文献,搜索用时 0 毫秒
1.
T. E. Shulga E. A. Ivanov M. D. Slastihina N. S. Vagarina 《Programming and Computer Software》2016,42(3):167-173
This paper is devoted to the development of the State Machine Generator system meant for automatic code generation based on the principles of automata-based programming. This system models program logic in terms of the finite-state automaton transition graph and generates program code on its basis. Basic functions of the developed software system and the mechanism of their implementation are described. This paper also proposes a new pattern for designing automaton programs. As an example, State Machine Generator is used to develop a bug tracker system for software testing. 相似文献
2.
针对航天器寿命延长与功能复杂度提升带来的对软件在轨重构和升级的迫切需求,基于SpaceWire设计了一种对星载软件升级与重构进行统一管理的网络,并设计实现了一款通用的软件维护控制器;星载软件重构网络通过SpaceWire路由器连接大容量存储模块以及星载计算机、载荷处理器等需要进行软件重构的终端设备,大容量存储器作为共享的存储资源池,用于接收各类星载设备的重构和升级软件程序,直接将软件程序通过SpaceWire分发到相应的设备,软件维护控制器位于终端设备内部,对软件重构数据进行统一格式封装,支持软件升级数据的片段化更新、软件ECC编码存储、软件APP切换控制等功能,解决星载软件升级缺乏统一操作流程、缺乏通用通信协议、缺乏高可靠设计支持的困境,并且该控制器采用抗辐射加固ASIC设计,满足宇航使用环境要求,为实现星载软件的灵活、便捷在轨重构奠定基础。 相似文献
3.
论述一种基于简单视听觉缩微智能车的软件系统架构,可实现在缩微道路环境下自主驾驶行为决策。缩微智能车系统采用分布式层次设计方法,遵循器件独立、算法独立、可扩展、易调试、数据可储存等原则,可以有效模拟车辆在真实交通环境中的基本驾驶行为。实验证明该软件系统具有很好的实效性和稳定性。 相似文献
4.
水表号码读取系统的设计与实现 总被引:1,自引:0,他引:1
介绍了一种水表号码图像读取系统的设计方案并详细分析了各功能模块的实现。使用CMOS图像传感器采集水表号码图像,在DSP中进行识别处理,并将识别结果在液晶模块上直观显示,在硬件采集器中实现号码图像的识别。 相似文献
5.
为了提高基于OCR技术的选举投票系统效率,提出了系统主机端软件的设计方法.该方法将主机端软件和票箱端软件统一起来考虑,充分考虑选举信息,利用选票中相关对象的位置数据设计选票,将选票格式数据发送到票箱,实现一系列选举投票系统功能,从而开发出一套主机端软件.该方法使得选票版面可以更复杂、基于选票格式数据而设计的票箱端识别软件定位速度更快,有效提高了系统效率,选举投票系统更加完善. 相似文献
6.
根据农田环境的水、空气、土壤环境的需求,设计了基于ZigBee无线传感器网络的智能灌溉系统。具体分析了系统功能,设计了总体结构。探讨了基于.Net的智能灌溉系统上位机的功能需求、系统架构、实现方案及关键技术等。 相似文献
7.
Some approaches to CAD/CAM software are presented based on the experience gained by the authors from the development and implementation of several such systems. The metamonitoring system MEMO and two examples of its implementation in mechanical and civil engineering are described. MEMO implies the family of complex multi-task software which can be used as a tool for building integrated packages and as a monitoring system for controlling the problem solution processes. MEMO can be considered a kernel of the supporting environment for CAD/CAM systems software development and implementation. 相似文献
8.
在对于一个增强现实系统的整体结构与各组成模块进行完整分析的基础之上,使用OpenCV、Coin3D和ARToolKit这3个软件开发包在Visual Studio 2003.net环境下开发了一个增强现实系统的软件平台.主要阐述了虚实环境的构建、三维注册、标志物检测、图像处理,视频融合等主要功能模块的实现原理与方法,最后给出了系统实际运行的效果. 相似文献
9.
Embedded software and hardware implementation system for a human machine interface based on ISOAgLib
Enkhbaatar TUMENJARGAL Luubaatar BADARCH Hyeokjae KWON Woonchul HAM 《浙江大学学报:C卷英文版》2013,14(3):155-166
Modern agricultural machinery demands adoption of embedded electronic and remote sensing technology for precision agriculture.One of the electronic devices commonly used is the virtual terminal(VT) for tractors.A VT’s functions and terminology are described in the ISO 11783 standard.This paper presents a control system design and implementation for a VT and some other electronic control units(ECUs) for agricultural vehicles based on that standard.Hardware and software development for the VT is implemented using the ISOAgLib open library,in the advanced embedded system.The main part of the system is an embedded board based on a Samsung S3C6410 ARM11 core microprocessor with a controller area network(CAN) module.Its working environment is Windows Embedded CE 6.0(WinCE6.0).The ISOAgLib library provides abundant open sources consistent implementation of ISO 11783.It is written in C++ programming language using object-oriented technology.In this paper,we describe an ISO 11783-based tractor control system with a CAN and its implementation in the embedded system.This paper also explains the operation of a CAN-bus device driver in WinCE6.0 and some modifications of ISOAgLib for our target system.The target system consists of the VT,an ECU for the global positioning system(GPS),and an ECU for lighting for an agricultural tractor.The ECU for GPS and the ECU of a light controller are implemented using STM32F107F ARM Cortex M3-based development boards. 相似文献
10.
Up to now, the assessment of work-effort in software engineering is based on statistical methods. Among the best known are COCOMO (Boehm [2]) or SPQR (Jones [6]). Nevertheless it is generally recognized that many qualitative factors enter into the cost of development, such as effectiveness of the team, user's motivation, and accuracy of the specifications. We have designed a Decision Support System (DSS) for estimating the work-effort, in which the processing of the qualitative data is made by an expert system while a function points analysis provides the theoretical work-effort according to the type of software and the past experience. The evaluation is performed at two levels: global and detailed. The global evaluation is made at the beginning of the development according to the data that are, at this moment, available. The detailed evaluation takes place when the design of the software becomes more precise. The software manager can follow the evolution of the changes at the detailed level during the development.In software development, project leaders mostly reason by using their past experience. It therefore follows that a DSS must contain a learning process. We have accordingly designed our system to record the data of the completed developments. These data serve for the new evaluations. At the end of each project, the learning module examines to what extent the already-recorded information must be updated. Thus our system combines statistic data and knowledge-based reasonings. 相似文献
11.
12.
13.
Web恶意代码主动检测与分析系统的设计与实现 总被引:1,自引:0,他引:1
在深入研究了客户端蜜罐的基础上,提出了动态与静态相结合的Web恶意代码检测方法,实现了Web恶意代码主动检测与分析系统(HoneyCat).该系统主动对指定的网站进行检测,并对可疑的页面进行分析,通过动态跟踪检测IE进程对注册表和文件的操作以及其网络行为,发现是否存在可疑行为,然后对有可疑行为的网页进行静态分析.静态分析利用漏洞特征库定位恶意代码的准确位置和所利用的漏洞.对于无法识别所利用漏洞的页面生成一个分析文件,为手工分析提供帮助,有助于对漏洞的研究,并有机会发掘未知漏洞.经过测试发现该系统运行稳定,准确率高,能有效地检测出页面中的恶意代码. 相似文献
14.
15.
16.
Muccini H. Inverardi P. Bertolino A. 《IEEE transactions on pattern analysis and machine intelligence》2004,30(3):160-171
Our research deals with the use of software architecture (SA) as a reference model for testing the conformance of an implemented system with respect to its architectural specification. We exploit the specification of SA dynamics to identify useful schemes of interactions between system components and to select test classes corresponding to relevant architectural behaviors. The SA dynamics is modeled by labeled transition systems (LTSs). The approach consists of deriving suitable LTS abstractions called ALTSs. ALTSs offer specific views of SA dynamics by concentrating on relevant features and abstracting away from uninteresting ones. Intuitively, deriving an adequate set of test classes entails deriving a set of paths that appropriately cover the ALTS. Next, a relation between these abstract SA tests and more concrete, executable tests needs to be established so that the architectural tests derived can be refined into code-level tests. We use the TRMCS case study to illustrate our hands-on experience. We discuss the insights gained and highlight some issues, problems, and solutions of general interest in architecture-based testing. 相似文献
17.
针对目前工业自动化用户的个性化需求,设计了一种连接CNC系统和套料软件的中间件系统。首先设计了一种适合普通工程师理解与使用的人机界面,并基于过程控制系统的PVI通信方式,实现CNC系统数据的实时显示与跟踪;通过FTP协议,将标准套料软件生成的G代码传输到CNC系统,并采用消息机制的进程通信方式,实时回传CNC系统自动解析并执行G代码时的运行参数,保证CNC系统执行路径与套料软件规划路径的一致性。最后,以某公司套料软件与B&R激光切割机CNC系统为对象,设计并实现了该中间件。经过工业现场测试表明,该中间件能够连接到B&R公司目前所有的硬件系统上,稳定性良好,并能满足用户个性化的开发,具有一定推广价值。 相似文献
18.
阐述了射频识别(radio frequency identification,RFlD)公共服务中的核心技术--RFID编码解析技术的概念,报告了该领域相关网络监控应用的现状,分析了在RFID编码解析网络中加入网络监控功能的必要性.在研究其网络特点的基础上,结合系统的实际需求选用了SNMP技术,对管理信息数据进行了详细地设计,开发实现了一种RFID编码解析网络监控系统.测试结果表明,该系统不但可以有效监控网络中各服务器RFID解析的运行状况,并且提供编码解析网络拓扑维护等功能. 相似文献
19.
在程序动态测试中,需要评价二进制代码动态测试效果.提出了一种二进制代码覆盖率评估方法,设计并实现了基于分支轨迹存储技术的二进制代码覆盖率评估系统.通过分支监视引擎记录动态测试中的代码分支轨迹,利用分支轨迹数据修正静态分析结果,综合静态分析结果和分支轨迹记录评估二进制代码覆盖率,并实现轨迹数据的可视化.实验结果表明,该系统能够有效提高覆盖率评估精度和效率. 相似文献
20.
Best practices in code inspection for safety-critical software 总被引:1,自引:0,他引:1
One of the most important issues in analyzing safety-critical systems is code verification through an inspection checklist, whose items must be applied to the source code. The attention given to this list will help ensure obedience to good coding rules and represents an important factor in the design of safety-critical systems. This list also helps in the development of non-safety-critical systems, improving their quality and correctness. 相似文献