Applications in Information Technology

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Applications".

Deadline for manuscript submissions: closed (30 November 2016) | Viewed by 13151

Special Issue Editors


E-Mail Website
Guest Editor
Software Engineering Lab, University of Aizu, Tsuruga, Ikki-Machi, Aizu-Wakamatsu, 965-8580, Japan
Interests: information retrieval; software engineering; analysis of computer algorithms; programming languages
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Active Knowledge Engineering Lab, University of Aizu, Tsuruga, Ikki-Machi, Aizu-Wakamatsu, 965-8580, Japan
Interests: visual and parallel programming; software engineering; e-Learning

E-Mail
Guest Editor
Software Engineering Lab, University of Aizu, Tsuruga, Ikki-Machi, Aizu-Wakamatsu, 965-8580, Japan
Interests: human-centric computing; cloud computing; higher education in programming and software engineering

Special Issue Information

Dear Colleagues,

Nowadays, information technology strongly influences our lives. Wide use of mobile devices generates a huge demand for new types of applications. To develop these applications, a new style of “vision” is needed from the researchers.

The main objective of the 2nd Conference on Applications in Information Technology (http://kspt.icc.spbstu.ru/conf/icait-2016/) is to encourage young scientists to participate actively in open discussions with their colleagues. This conference is to discover new names in the next generation of researchers.

Prof. Dr. Vitaly Klyuev
Prof. Dr. Alexander Vazhenin
Senior Associate Prof. Dr. Evgeny Pyshkin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Information Technology
  • Cloud Computing and Networking
  • Intelligent and Embedded Systems
  • Knowledge Engineering

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

2381 KiB  
Article
TESMA: Requirements and Design of a Tool for Educational Programs
by Nicolas Guelfi, Benjamin Jahic and Benoît Ries
Information 2017, 8(1), 37; https://doi.org/10.3390/info8010037 - 22 Mar 2017
Cited by 3 | Viewed by 6665
Abstract
Defining and managing teaching programs at universities or other institutions is a complex task for which there is not much support in terms of methods and tools. This task becomes even more critical when the time comes to obtain certifications w.r.t. official standards. [...] Read more.
Defining and managing teaching programs at universities or other institutions is a complex task for which there is not much support in terms of methods and tools. This task becomes even more critical when the time comes to obtain certifications w.r.t. official standards. In this paper, we present an on-going project called TESMA, whose objective is to provide an open-source tool dedicated to the specification and management (including certification) of teaching programs. An in-depth market analysis regarding related tools and conceptual frameworks of the project is presented. This tool has been engineered using a development method called Messir for its requirements elicitation and introduces a domain-specific language dedicated to the teaching domain. This paper presents the current status of this project and the future activities planned. Full article
(This article belongs to the Special Issue Applications in Information Technology)
Show Figures

Figure 1

791 KiB  
Article
Model Based Safety Analysis with smartIflow
by Philipp Hönig, Rüdiger Lunde and Florian Holzapfel
Information 2017, 8(1), 7; https://doi.org/10.3390/info8010007 - 03 Jan 2017
Cited by 19 | Viewed by 5879
Abstract
Verification of safety requirements is one important task during the development of safety critical systems. The increasing complexity of systems makes manual analysis almost impossible. This paper introduces a new methodology for formal verification of technical systems with smartIflow (State Machines for Automation [...] Read more.
Verification of safety requirements is one important task during the development of safety critical systems. The increasing complexity of systems makes manual analysis almost impossible. This paper introduces a new methodology for formal verification of technical systems with smartIflow (State Machines for Automation of Reliability-related Tasks using Information FLOWs). smartIflow is a new modeling language that has been especially designed for the purpose of automating the safety analysis process in early product life cycle stages. It builds up on experience with existing approaches. As is common practice in current approaches, components are modeled as finite state machines. However, new concepts are introduced to describe component interactions. Events play a major role for internal interactions between components as well as for external (user) interactions. Our approach to the verification of formally specified safety requirements is a two-step method. First, an exhaustive simulation creates knowledge about a great variety of possible behaviors of the system, especially including reactions on suddenly occurring (possibly intermittent) faults. In the second step, safety requirements specified in CTL (Computation Tree Logic) are verified using model checking techniques, and counterexamples are generated if these are not satisfied. The practical applicability of this approach is demonstrated based on a Java implementation using a simple Two-Tank-Pump-Consumer system. Full article
(This article belongs to the Special Issue Applications in Information Technology)
Show Figures

Figure 1

Back to TopTop