A Development Support Tool for Fault-tolerant Routing Methods on Network-on-Chips

Author(s):  
Yota Kurokawa ◽  
Daiki Kajimoto ◽  
Masaru Fukushi
Author(s):  
Anders Claesson ◽  
Bjo¨rn Rosvall ◽  
Hans Johannesson

Development of complex, platform-based, and variant-rich products within the automotive industry is in many respects a challenging task. The competitive pressure within the industry requires more and more collaborative development and utilization of systems and components not only within, but also across, product platforms. In such an environment the ability to effectively and efficiently deal with how variability is achieved is an important issue. Many approaches to deal with configuration issues have been subject to extensive research and exploration. In the research presented here the basic idea is to merge influences from established design tools and methods with concepts from research on configuration tasks as well as from product description approaches used within the industry. The presented work has an exploratory nature that aims at increased understanding of the mechanisms, methodology and value of the application of the configurable component concept as a development support tool during platform-based vehicle development. The work presented here has been performed in parallel with a feasibility study for a vehicle cock-pit family. The study aims at investigating prerequisites for enabling a cock-pit solution to be shared as a common solution in several vehicle platforms as well as within each of the platforms. The paper contributes to the understanding of how configurable components can improve the definition and maintenance of design variants and facilitate reuse of these design solutions through the captured trail of design rationale that is achieved through the systematic use of the component definitions.


2018 ◽  
Vol 9 (2) ◽  
pp. 14-23
Author(s):  
Jana Selepová

Abstract The Zádielska dolina (“Zadiel Gorge“) belongs to the most beautiful and from a natural science perspective to the most interesting landscape formations of the Slovak Karst. The area represents the National Nature Reserve in the National Park and is part the European Network of Protected Areas NATURA 2000. The site is characterized by climbing activity. This article provides suggestions of attractiveness in the field of climbing that respect the development of tourism in accordance with nature and landscape conservation. The basis for the proposals were theoretical knowledge, thorough analysis of the area and own experience with the issue. Recommendations from other climbing places and identification of problems between climbing and nature, have been key for us in making appropriate proposals. The increasing interest in adventure tourism, including climbing, means a global trend in tourism and therefore it is necessary to pay close attention to this issue.


Author(s):  
Woojin Lee ◽  
Ilwoo Choi ◽  
Cheeyang Song ◽  
Juil Kim

This paper proposes a framework for the development of sensor node software for various operating systems in a sensor network environment. The proposed development framework consists of attributes, code templates and development support tool. Sensor node software is developed, based on the framework through four steps —sensor network modeling, PIM design, PSM design and code generation. Accordingly, this paper presents the methods for attributes design, code templates design, PIM-to-PSM mapping, and source code generation. Through the proposed technique, reusability of sensor network software will be increased since models, attributes and code templates can be reused for various operating systems through the framework. Productivity of software development will be increased, because software design is easily performed using attributes and software codes for all nodes in the sensor network can be generated at once from a model. Also, expandability of sensor network software will be increased, since new functions of existing operating systems or new operating systems can be added through the framework and sensor network software can be rebuilt by applying the added functions or operating systems.


2019 ◽  
Vol 8 (2) ◽  
pp. 3282-3287

This paper proposes a software development tracing technique as a means for source of requirement verification. It is a pragmatic process since the methods employed in this research are well-known and practiced by software developers. The proposed technique helps trace any missing unimplemented or erroneously implemented requirements to insure their completeness. The underlying principles are governed by the proposed apriori algorithm and precedence relation that link all the cross-reference action items in the UML diagrams. These links are then recorded in a checklist that serves as the reference to requirement items and action sign-off confirmation. Thus, the contributions of this research work are two folds. First, the proposed tracing technique is simple, pragmatic, and inexpensive to learn and implement. Second, it helps reduce human errors caused by manual process that are often performed by different parties. The result statistics show that many errors incurred in the development process can be identified and rectified accordingly. Future work should focus on automating the proposed technique to be a development support tool for the benefits of software practitioners and technology.


2018 ◽  
Vol 7 (S1) ◽  
pp. 20-23
Author(s):  
Yaswanth Kumar Alapati ◽  
Suban Ravichandran

MANET routing is complex task and selecting secured route ought to be made sooner before the node leaves the network. Quick choices dependably redress network execution. Most MANET routing conventions are intended to work in a cordial and agreeable condition which makes them powerless against different assaults. Further, nodes need to forward data packets to different nodes to empower information correspondence between the nodes that are not in the radio scope of each other. Be that as it may, a node may decline to forward data packets or halfway do the sending or even endeavor to intrude on the system tasks. This is for the most part thought to be a sort of bad conduct which demonstrates the presence of malicious node in a system. Trust and Reputation would fill in as a noteworthy answer for these issues. Secured data transmission is a complex task in MANET as there is a maximum chance for attackers to crash the network. Taking in the system qualities and picking right routing choices at right occasions would be a noteworthy arrangement. In this work, we have completed a broad overview of fault tolerant methods connected to routing in MANETs. Because of the proximity of attacker nodes, the procedure of administration disclosure is extraordinarily influenced, which may prompt poorer execution of the network. This may prompt less packet delivery proportion, throughput, expanded control overhead;add up to overhead and packet drops. Further, anchoring administration revelation task is exceptionally troublesome since, it includes the notoriety of the extensive number of middle of the road nodes present in the system[3]. This paper presents a survey on different techniques for routing,key management and reductions method on packer droppings.


Sign in / Sign up

Export Citation Format

Share Document