By Topic

2016 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)

19-21 May 2016

Filter Results

Displaying Results 1 - 25 of 140
  • [Front cover]

    Publication Year: 2016, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (579 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): II
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • General chairs

    Publication Year: 2016, Page(s): III
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2016, Page(s): IV
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Program committee members

    Publication Year: 2016, Page(s):V - VI
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2016, Page(s): VII
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • TTTC: Test technology technical council

    Publication Year: 2016, Page(s): VIII
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2016, Page(s):IX - XV
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2016, Page(s): XVI
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Plenary

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (35 KB)

    Provides an abstract of the plenary presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2016, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Factories of future towards next industrial revolution: Extended abstract

    Publication Year: 2016, Page(s):3 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    The next industrial revolution progresses and will change markets, technologies, industries and society. Smart Systems Integration (SSI) with Cyber Physical Systems will have an high impact on the FoF. This paper introduces new concepts and new visions about next generation of the enterprises. The main capabilities of the CPS, IoT, IoS in the organization, management, optimization and control of p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality & testing

    Publication Year: 2016, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2016, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Titanium: Visualization of TTCN-3 system architecture

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    To help the work of TTCN-3 test system architects we created a tool that is able to visualize large test systems, fitting to daily work practices. We defined and implemented 2 layouts, clustering and interaction methods. We also show 2 structuring methods, that are not yet supported by the TTCN-3 standard. With this tool we have analyzed all standardized test suites available at www.ttcn3.org, fin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2016, Page(s): 12
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Markov analysis of an induction motor

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    The paper deals with the reliability of induction motors by using Markov techniques. The basis of this process is to perform the reliability predictions to obtain the necessary indicators in order to support the Markov analysis. The analysis is made on a single-phase induction motor, taking into consideration the most critical components that could lead to the failure of the motor. Furthermore, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile approach with Kanban in information security risk management

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    In an ever changing business environment, in order to bring value, security risk management must keep engaged at pace with the company, by following the enterprise goals and using the same methodologies as core business units. This paper analyses how information security risk management can be automated and interlinked with the processes in a software development company, using an Agile approach w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to assess maintainability change

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Maintenance is a very expensive activity in the software systems' lifecycle. The ISO 25010 standard considers it as one of its main eight characteristics. In this paper, we propose an approach to assess the maintainability characteristic by its own subcharacteristics as defined by ISO 25010, using several object oriented metrics. A set of rules is defined to capture the influence of the metrics va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-aware cloud storage service allocation for distributed data gathering

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    In today cyber-infrastructures, large datasets are produced in real-time by different sources geographically distributed. These data must be acquired and preserved for further use in knowledge extraction. In the context of multi-cloud environments, the cost-efficient storage service selection is a challenge. There are plenty of Cloud storage providers offering multiple options so, it is crucial to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2016, Page(s): 36
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • BITMIX: A hardware accelerated randomized symmetric encryption method

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    We propose a probabilistic symmetric encryption method that heavily relies on true-random numbers, both to XOR the plaintext with a random block of at least equal length (just like OTP) and to disperse resulting data at bit-level into even more randomness. Our method has several highly needed security properties. It has resistance against both CPA2 and CCA2 attacks, and it has provable ideal stati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Suppressing electromagnetic interference with chaos control: Methodologies and case study

    Publication Year: 2016, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    A modulation technique based on mathematical chaos is introduced and investigated with respect to suppress electromagnetic inference (EMI) in power electronics converters with replacing or complementing traditional filtering and schielding technologies in mind. The technique allows for parameter modulation and for chaos-based pulse width modulation (PWM). The latter can be implemented both in anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patching circuit design based on reserved CLBs

    Publication Year: 2016, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    The new approach to patching circuit design that allows masking any logical gate faults of combinational circuit (combinational part of sequential circuit) C is considered. It is supposed that only one gate may be fault. There are reserved Configurable Logic Blocks (CLBs) based on Look Up Tables (LUTs) that may mask a gate fault being included into the circuit through Multiplexer (MUX). The sugges... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.