Abstract:UML sequence diagrams are visual representations of object interactions in a system and can provide valuable information for program comprehension, debugging, maintenance, and software archeology. Sequence diagrams generated from legacy code are independent of existing documentation that may have eroded. We present a framework for static generation of UML sequence diagrams from object-oriented source code. The framework provides a query refinement system to guide the user to interesting interactions in the sou… Show more
“…Figure 4 shows that the Transportation Agency officers carry out activities to monitor vehicles on the road, see vehicles that violate the road, look for vehicles that violate, and take action against vehicles that violate the road. DINHUB officers monitor vehicles on the highway, check vehicles that violate, and take action against vehicles that violate the highway 3) Sequence diagram [27]: Figure 6 above shows that the e-overload application [28] system will send a signal to the DINHUB officer in the field if a driver is carrying a load exceeding capacity; after receiving a signal from the vehicle, the officer immediately looks for and takes action on vehicles that exceed the load on the highway. Figure 7 shows the activities that occur in the e-overload application.…”
Vehicles can be used to facilitate humans in carrying out their daily activities. Motorized vehicles are divided into 3: land, sea, and air. Apart from the many benefits that can be obtained, motorized vehicles have dangers related to high-risk accidents. The highest cause of motorized vehicle accidents on land is road damage due to overload vehicles. Brake failure due to overload vehicles also contributes to vehicle accidents. This research aims to create an Internet of Things (IoT) based application to detect motorized vehicle load conditions. It was combined with several other technologies to produce a tool for detecting motor vehicle load conditions. The Extreme Programming Method is being used in this research. The Extreme Programming method is considered more suitable for completing this research because the communication with stakeholders is quite different. The Extreme Programming Method enables it to go back to the next step if discrepancies are encountered in making the system. The result of this research is an IoT-based tool called e-overload. It can detect vehicle loads, provide information for the drivers, and inform the results to related officers at the same time. E-overload tool will enable the drivers to get real-time information on the load on their vehicles. Officers will get additional evidence and the latest position of the vehicle to carry out actions against motorists who operate their vehicles with excessive loads.
“…Figure 4 shows that the Transportation Agency officers carry out activities to monitor vehicles on the road, see vehicles that violate the road, look for vehicles that violate, and take action against vehicles that violate the road. DINHUB officers monitor vehicles on the highway, check vehicles that violate, and take action against vehicles that violate the highway 3) Sequence diagram [27]: Figure 6 above shows that the e-overload application [28] system will send a signal to the DINHUB officer in the field if a driver is carrying a load exceeding capacity; after receiving a signal from the vehicle, the officer immediately looks for and takes action on vehicles that exceed the load on the highway. Figure 7 shows the activities that occur in the e-overload application.…”
Vehicles can be used to facilitate humans in carrying out their daily activities. Motorized vehicles are divided into 3: land, sea, and air. Apart from the many benefits that can be obtained, motorized vehicles have dangers related to high-risk accidents. The highest cause of motorized vehicle accidents on land is road damage due to overload vehicles. Brake failure due to overload vehicles also contributes to vehicle accidents. This research aims to create an Internet of Things (IoT) based application to detect motorized vehicle load conditions. It was combined with several other technologies to produce a tool for detecting motor vehicle load conditions. The Extreme Programming Method is being used in this research. The Extreme Programming method is considered more suitable for completing this research because the communication with stakeholders is quite different. The Extreme Programming Method enables it to go back to the next step if discrepancies are encountered in making the system. The result of this research is an IoT-based tool called e-overload. It can detect vehicle loads, provide information for the drivers, and inform the results to related officers at the same time. E-overload tool will enable the drivers to get real-time information on the load on their vehicles. Officers will get additional evidence and the latest position of the vehicle to carry out actions against motorists who operate their vehicles with excessive loads.
“…Since in this way the information is ordered for its understanding. Performing any type of modification of the components [27]. As shown in Figure 5, the sequence diagram is formed by the user, graph, data, and azure machine learning.…”
In recent years, both locally and globally, many citizens are cornered by different diseases which grates a lot of concern in the person, due to the collapse of different medical centers, it is necessary to use information systems. The objective of the research is to develop a mobile application that allows detecting what type of disease a patient suffers from and maintaining communication with the expert in the field using an expert system such as azure machine learning studio that allows detecting the deadliest diseases. For the development of this research, the rup methodology was applied, which allows the use of different techniques where the necessary activities can be carried out with efficient communication. For the validation of this project, a survey was used for the experts with a questionnaire of questions, giving a positive result in the implementation of this project. The result was an acceptance of 83.3% in a high way in their survey responses. In conclusion, this mobile application was successfully designed, benefiting many people and, above all, preventing dangerous diseases that can even lead to death.
“…This nonce with its components are stored in the vehicle memory for future comparisons. The vehicle challenge Ch is computed according to (23), then its value is published into the TA website.…”
Section: Registration Phasementioning
confidence: 99%
“…To simplify comprehension of the message flow within the authentication phase, the unified modeling language (UML) diagram is utilized. The UML diagram can be considered as a visual representation of the interactions between different entities in the protocol [23]. A short summarization that reflects the general idea of this phase is given in Fig.…”
It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services. Additionally, the communication channels between vehicles and the infrastructure lack various security features due to the inferior wireless characteristics of their environment. However, most of the existing authentication schemes which are used to fix the security drawbacks lead to heavy computations and large storage burdens on the vehicle onboard unit (OBU). These schemes utilize secure channels while distributing the network parameters between the various participants. Yet, it is not efficient to establish secure channels during the interactions between entities. Furthermore, lightweight cryptography is an efficient security solution which is adequate for OBU to maintain a reasonable efficiency with low computational and communication costs. Two basic demerits for lightweight authentication protocols are highlighted as follows: Firstly, symmetric key-based authentication protocols dismiss achieving non-repudiation feature, leading to several security attacks in VANET. Secondly, public key-based authentication schemes are relied on elliptic curve cryptography (ECC) which makes the protocol implementation more difficult. Hence, this paper introduces a novel authentication protocol that utilizes Chebyshev chaotic maps to secure connectivity between the vehicles and infrastructure without using secure channels to distribute the network parameters. The new protocol combines the concept of the symmetric key cryptography with the public key signature to satisfy both the lightweight property and non-repudiation feature. Thus, this protocol introduces a novel network model which is the lowest hardware complexity, compared with others. The performance analysis is performed by Wolfram Mathematica, proving that the proposed protocol is superior in terms of security and performance aspects; its computation and storage costs of OBU are enhanced with 24.09% and 16.99%, respectively, compared to the most competing scheme. Besides, the Scyther simulation confirms the security of the protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.