12 resultados para Laboratorio remotorobotica mobileweb applicationsmodel driven software architecture

em Universidad de Alicante


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Comunicación y póster presentados en las VIII Jornadas de Redes de Investigación en Docencia Universitaria "Nuevas titulaciones y cambio universitario", Alicante, 8-9 Julio 2010.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article presents an interactive Java software platform which enables any user to easily create advanced virtual laboratories (VLs) for Robotics. This novel tool provides both support for developing applications with full 3D interactive graphical interface and a complete functional framework for modelling and simulation of arbitrary serial-link manipulators. In addition, its software architecture contains a high number of functionalities included as high-level tools, with the advantage of allowing any user to easily develop complex interactive robotic simulations with a minimum of programming. In order to show the features of the platform, the article describes, step-by-step, the implementation methodology of a complete VL for Robotics education using the presented approach. Finally, some educational results about the experience of implementing this approach are reported.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Póster y resumen de la comunicación presentada en el VI Congreso Internacional de Docencia Universitaria e Innovación (CIDUI), Barcelona, 30 junio-2 julio 2010.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Nowadays, data mining is based on low-level specications of the employed techniques typically bounded to a specic analysis platform. Therefore, data mining lacks a modelling architecture that allows analysts to consider it as a truly software-engineering process. Here, we propose a model-driven approach based on (i) a conceptual modelling framework for data mining, and (ii) a set of model transformations to automatically generate both the data under analysis (via data-warehousing technology) and the analysis models for data mining (tailored to a specic platform). Thus, analysts can concentrate on the analysis problem via conceptual data-mining models instead of low-level programming tasks related to the underlying-platform technical details. These tasks are now entrusted to the model-transformations scaffolding.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Data mining is one of the most important analysis techniques to automatically extract knowledge from large amount of data. Nowadays, data mining is based on low-level specifications of the employed techniques typically bounded to a specific analysis platform. Therefore, data mining lacks a modelling architecture that allows analysts to consider it as a truly software-engineering process. Bearing in mind this situation, we propose a model-driven approach which is based on (i) a conceptual modelling framework for data mining, and (ii) a set of model transformations to automatically generate both the data under analysis (that is deployed via data-warehousing technology) and the analysis models for data mining (tailored to a specific platform). Thus, analysts can concentrate on understanding the analysis problem via conceptual data-mining models instead of wasting efforts on low-level programming tasks related to the underlying-platform technical details. These time consuming tasks are now entrusted to the model-transformations scaffolding. The feasibility of our approach is shown by means of a hypothetical data-mining scenario where a time series analysis is required.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Integrity assurance of configuration data has a significant impact on microcontroller-based systems reliability. This is especially true when running applications driven by events which behavior is tightly coupled to this kind of data. This work proposes a new hybrid technique that combines hardware and software resources for detecting and recovering soft-errors in system configuration data. Our approach is based on the utilization of a common built-in microcontroller resource (timer) that works jointly with a software-based technique, which is responsible to periodically refresh the configuration data. The experiments demonstrate that non-destructive single event effects can be effectively mitigated with reduced overheads. Results show an important increase in fault coverage for SEUs and SETs, about one order of magnitude.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Comunicación y póster presentados en las VIII Jornadas de Redes de Investigación en Docencia Universitaria "Nuevas titulaciones y cambio universitario", Alicante, 8-9 Julio 2010.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Model-driven Engineering (MDE) approaches are often acknowledged to improve the maintainability of the resulting applications. However, there is a scarcity of empirical evidence that backs their claimed benefits and limitations with respect to code-centric approaches. The purpose of this paper is to compare the performance and satisfaction of junior software maintainers while executing maintainability tasks on Web applications with two different development approaches, one being OOH4RIA, a model-driven approach, and the other being a code-centric approach based on Visual Studio .NET and the Agile Unified Process. We have conducted a quasi-experiment with 27 graduated students from the University of Alicante. They were randomly divided into two groups, and each group was assigned to a different Web application on which they performed a set of maintainability tasks. The results show that maintaining Web applications with OOH4RIA clearly improves the performance of subjects. It also tips the satisfaction balance in favor of OOH4RIA, although not significantly. Model-driven development methods seem to improve both the developers’ objective performance and subjective opinions on ease of use of the method. This notwithstanding, further experimentation is needed to be able to generalize the results to different populations, methods, languages and tools, different domains and different application sizes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Context: Today’s project managers have a myriad of methods to choose from for the development of software applications. However, they lack empirical data about the character of these methods in terms of usefulness, ease of use or compatibility, all of these being relevant variables to assess the developer’s intention to use them. Objective: To compare three methods, each following a different paradigm (Model-Driven, Model-Based and Code-Centric) with respect to their adoption potential by junior software developers engaged in the development of the business layer of a Web 2.0 application. Method: We have conducted a quasi-experiment with 26 graduate students of the University of Alicante. The application developed was a Social Network, which was organized around a fixed set of modules. Three of them, similar in complexity, were used for the experiment. Subjects were asked to use a different method for each module, and then to answer a questionnaire that gathered their perceptions during such use. Results: The results show that the Model-Driven method is regarded as the most useful, although it is also considered the least compatible with previous developers’ experiences. They also show that junior software developers feel comfortable with the use of models, and that they are likely to use them if the models are accompanied by a Model-Driven development environment. Conclusions: Despite their relatively low level of compatibility, Model-Driven development methods seem to show a great potential for adoption. That said, however, further experimentation is needed to make it possible to generalize the results to a different population, different methods, other languages and tools, different domains or different application sizes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

La constante innovación tecnológica y al abaratamiento de los dispositivos, han hecho que el fototrampeo se convierta en una técnica ampliamente utilizada para la realización de inventarios biológicos, generando gran cantidad de registros de alto interés ecológico. El principal objetivo de esta comunicación es presentar una herramienta de software libre (FOSS), desarrollada para facilitar el manejo de datos, obtenidos mediante fototrampeo en un espacio protegido de la Comunidad Valenciana. Así, a partir de un estudio iniciado en 2009, se ha analizado la composición de la comunidad de vertebrados en el Parque Natural de la Sierra de Mariola. Para la realización de los muestreos se han empleado cámaras de infrarrojos con sensor de movimiento (Moultrie Game Spy I-60®), obteniendo un total de 29,941 contactos que han servido para determinar la abundancia de las especies muestreadas en las 63 cuadrículas (2*2 Km) establecidas en la zona de estudio. La aplicación FOSS, denominada “Camera Trap Manager”, se ha diseñado para agilizar el tratamiento de esta información y funciona sobre la plataforma .NET, pudiendo ser utilizada en varios sistemas operativos. Además, este software dispone de un interfaz de usuario muy intuitivo, capacidad de extraer automáticamente distintos tipos de metadatos (fecha, hora, fase lunar, localización, temperatura, presión atmosférica, etc), basados en el estándar Exif; disponibilidad de listas taxonómicas para permitir a los usuarios etiquetar fácilmente las imágenes con las identidades de las especies, capacidad de análisis y creación de informes. El uso de esta aplicación ha permitido simplificar el procesado, análisis y edición de datos, consiguiendo una significativa reducción de los costes económicos y temporales. Mientras que en el procesado manual se alcanzaba una media de 55 fotografías/hora, el uso de esta herramienta permite procesar más de 1,000 fotografías/hora, obteniendo una mayor cantidad de información. Finalmente, se pone de manifiesto la gran utilidad de esta aplicación, que puede ser adaptada a las necesidades de otros proyectos de gestión de fauna, haciendo su uso extensivo no solamente a los profesionales del sector, sino a todos aquellos que requieran procesar gran cantidad de imágenes de fototrampeo.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

El diseño de recursos educacionales y materiales didácticos vía on-line permite mejorar el aprendizaje autónomo y a distancia (o no presencial). El proceso de convergencia Europea del Espacio de Educación Superior determina que el empleo de este tipo de recursos dota al estudiante de más flexibilidad, aunque la metodología de educación dominante sea la tradicional (es decir, las clases presenciales). Los recursos educacionales on-line juegan un rol importante en este contexto. En trabajos previos se ha experimentado diseñando cursos con ayuda de un LCMS (Learning Content Management System) como el Moodle corporativo de la UA, incorporando documentos SCORM para diseñar lecciones de autoevaluación, con laboratorios virtuales y otras herramientas de simulación de diseño propio (KIVANS, applets KIVANS+EJS). En esta nueva red se pretende generar nuevos recursos didácticos basados en software libre. Ninguno de los laboratorios virtuales desarrollados hasta ahora permiten a los alumnos poner en práctica los desarrollos de las clases presenciales a distancia. Para ello, usando el software de libre distribución GNS3, y teniendo como base la configuración de la red del laboratorio L24 de la EPS, se pretende construir un entorno virtual que simule las posibilidades reales de este laboratorio.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The majority of the organizations store their historical business information in data warehouses which are queried to make strategic decisions by using online analytical processing (OLAP) tools. This information has to be correctly assured against unauthorized accesses, but nevertheless there are a great amount of legacy OLAP applications that have been developed without considering security aspects or these have been incorporated once the system was implemented. This work defines a reverse engineering process that allows us to obtain the conceptual model corresponding to a legacy OLAP application, and also analyses and represents the security aspects that could have established. This process has been aligned with a model-driven architecture for developing secure OLAP applications by defining the transformations needed to automatically apply it. Once the conceptual model has been extracted, it can be easily modified and improved with security, and automatically transformed to generate the new implementation.