Model Based Software Timing Analysis Using Sequence Diagramfor Commercial Applications
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: The verification of running time of a program is necessary in designing a system with real lifeconstrain. Verification defines lower and upper bounds which reflects control flow that depends on data as wellas instruction times execution. In previous days, the bounds were very wide due to a lack of efficient controlflow analysis and architectural modeling techniques. But in present days, significant progress have beenoccurred in both areas in a way such that execution cost of formal software analysis has become morepractical. In previous days various work has been done on code based complexity analysis for embeddedsoftware. This type of analysis is called as worst case execution time analysis(WCET). In our research we areapplying the concept of timing analysis for UML model based timing analysis, by which we can minimize theeffort of calculating timing from code snippet and it will also help the developer to identify the timingrequirement since requirement stage
Authors and Affiliations
Hrishikesh Mukherjee , Shrimann Upadhyay , Arup Abhinaa Achariya
Robust control for nonlinear uncertain descriptor systems
Abstract: The present paper considers the sliding mode control (SMC)design problem for nonlinear uncertain descriptor systems. The goal is todesign an adaptivesliding mode controllerto drive the trajectories of the resul...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspired Elephant Based Swarm Optimization
: The robust and complex real-time applications and dramatically increased sensor capabilities may play a vital role in enhancing the lifespan of WSNs. On the other hand majority of WSNs operate on battery powe...
Secure Data Transmission Using Dna Sequencing
The medical record system includes substantial information such as diagnoses of diseases, treatment undergone, patient's health condition, medication information, examination results and nursing actions.Consequently, the...
Steiner Tree: approach applying for shortest path in selected network
This paper focus on approach for shortest path from source to destination in which an autonomous system for virtual private network, whose communicate with each other in a private area. For selecting a shorte...
Data Analytics on Application Logs for Managing API-related Dependencies
Abstract: There are innumerable APIs (Application Programming Interface) that are being created every single day as they serve as a rudimentary tool in developing software applications in today’s technology-driven indust...