The autonomous navigation of an Unmanned Aerial Vehicle(UAV)relies heavily on the navigation sensors.The UAV’s level of autonomy depends upon the various navigation systems,such as state measurement,mapping,and obsta...The autonomous navigation of an Unmanned Aerial Vehicle(UAV)relies heavily on the navigation sensors.The UAV’s level of autonomy depends upon the various navigation systems,such as state measurement,mapping,and obstacle avoidance.Selecting the correct components is a critical part of the design process.However,this can be a particularly difficult task,especially for novices as there are several technologies and components available on the market,each with their own individual advantages and disadvantages.For example,satellite-based navigation components should be avoided when designing indoor UAVs.Incorporating them in the design brings no added value to the final product and will simply lead to increased cost and power consumption.Another issue is the number of vendors on the market,each trying to sell their hardware solutions which often incorporate similar technologies.The aim of this paper is to serve as a guide,proposing various methods to support the selection of fit-for-purpose technologies and components whilst avoiding system layout conflicts.The paper presents a study of the various navigation technologies and supports engineers in the selection of specific hardware solutions based on given requirements.The selection methods are based on easy-to-follow flow charts.A comparison of the various hardware components specifications is also included as part of this work.展开更多
Software testing has been attracting a lot of attention for effective software development.In model driven approach,Unified Modelling Language(UML)is a conceptual modelling approach for obligations and other features ...Software testing has been attracting a lot of attention for effective software development.In model driven approach,Unified Modelling Language(UML)is a conceptual modelling approach for obligations and other features of the system in a model-driven methodology.Specialized tools interpret these models into other software artifacts such as code,test data and documentation.The generation of test cases permits the appropriate test data to be determined that have the aptitude to ascertain the requirements.This paper focuses on optimizing the test data obtained from UML activity and state chart diagrams by using Basic Genetic Algorithm(BGA).For generating the test cases,both diagrams were converted into their corresponding intermediate graphical forms namely,Activity Diagram Graph(ADG)and State Chart Diagram Graph(SCDG).Then both graphs will be combined to form a single graph called,Activity State Chart Diagram Graph(ASCDG).Both graphs were then joined to create a single graph known as the Activity State Chart Diagram Graph(ASCDG).Next,the ASCDG will be optimized using BGA to generate the test data.A case study involving a withdrawal from the automated teller machine(ATM)of a bank was employed to demonstrate the approach.The approach successfully identified defects in various ATM functions such as messaging and operation.展开更多
Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the attacker.There have been several reported high-profile ransomware attacks including...Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the attacker.There have been several reported high-profile ransomware attacks including WannaCry,Petya,and Bad Rabbit resulting in losses of over a billion dollars to various individuals and businesses in the world.The analysis of ransomware is often carried out via sandbox environments;however,the initial setup and configuration of such environments is a challenging task.Also,it is difficult for an ordinary computer user to correctly interpret the complex results presented in the reports generated by such environments and analysis tools.In this research work,we aim to develop a user-friendly model to understand the taxonomy and analysis of ransomware attacks.Also,we aim to present the results of analysis in the form of summarized reports that can easily be understood by an ordinary computer user.Our model is built on top of the well-known Cuckoo sandbox environment for identification of the ransomware as well as generation of the summarized reports.In addition,for evaluating the usability and accessibility of our proposed model,we conduct a comprehensive user survey consisting of participants from various fields,e.g.,professional developers from software houses,people from academia(professors,students).Our evaluation results demonstrate a positive feedback of approximately 92%on the usability of our proposed model.展开更多
文摘The autonomous navigation of an Unmanned Aerial Vehicle(UAV)relies heavily on the navigation sensors.The UAV’s level of autonomy depends upon the various navigation systems,such as state measurement,mapping,and obstacle avoidance.Selecting the correct components is a critical part of the design process.However,this can be a particularly difficult task,especially for novices as there are several technologies and components available on the market,each with their own individual advantages and disadvantages.For example,satellite-based navigation components should be avoided when designing indoor UAVs.Incorporating them in the design brings no added value to the final product and will simply lead to increased cost and power consumption.Another issue is the number of vendors on the market,each trying to sell their hardware solutions which often incorporate similar technologies.The aim of this paper is to serve as a guide,proposing various methods to support the selection of fit-for-purpose technologies and components whilst avoiding system layout conflicts.The paper presents a study of the various navigation technologies and supports engineers in the selection of specific hardware solutions based on given requirements.The selection methods are based on easy-to-follow flow charts.A comparison of the various hardware components specifications is also included as part of this work.
基金support from the Deanship of Scientific Research,University of Hail,Saudi Arabia through the project Ref.(RG-191315).
文摘Software testing has been attracting a lot of attention for effective software development.In model driven approach,Unified Modelling Language(UML)is a conceptual modelling approach for obligations and other features of the system in a model-driven methodology.Specialized tools interpret these models into other software artifacts such as code,test data and documentation.The generation of test cases permits the appropriate test data to be determined that have the aptitude to ascertain the requirements.This paper focuses on optimizing the test data obtained from UML activity and state chart diagrams by using Basic Genetic Algorithm(BGA).For generating the test cases,both diagrams were converted into their corresponding intermediate graphical forms namely,Activity Diagram Graph(ADG)and State Chart Diagram Graph(SCDG).Then both graphs will be combined to form a single graph called,Activity State Chart Diagram Graph(ASCDG).Both graphs were then joined to create a single graph known as the Activity State Chart Diagram Graph(ASCDG).Next,the ASCDG will be optimized using BGA to generate the test data.A case study involving a withdrawal from the automated teller machine(ATM)of a bank was employed to demonstrate the approach.The approach successfully identified defects in various ATM functions such as messaging and operation.
基金support of Security Testing-Innovative Secured Systems Lab(ISSL)established at University of Engineering&Technology,Peshawar,Pakistan under the Higher Education Commission initiative of National Center for Cyber Security(Grant No.2(1078)/HEC/M&E/2018/707).
文摘Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the attacker.There have been several reported high-profile ransomware attacks including WannaCry,Petya,and Bad Rabbit resulting in losses of over a billion dollars to various individuals and businesses in the world.The analysis of ransomware is often carried out via sandbox environments;however,the initial setup and configuration of such environments is a challenging task.Also,it is difficult for an ordinary computer user to correctly interpret the complex results presented in the reports generated by such environments and analysis tools.In this research work,we aim to develop a user-friendly model to understand the taxonomy and analysis of ransomware attacks.Also,we aim to present the results of analysis in the form of summarized reports that can easily be understood by an ordinary computer user.Our model is built on top of the well-known Cuckoo sandbox environment for identification of the ransomware as well as generation of the summarized reports.In addition,for evaluating the usability and accessibility of our proposed model,we conduct a comprehensive user survey consisting of participants from various fields,e.g.,professional developers from software houses,people from academia(professors,students).Our evaluation results demonstrate a positive feedback of approximately 92%on the usability of our proposed model.