IJMECS Vol. 7, No. 10, 8 Oct. 2015
Cover page and Table of Contents: PDF (size: 692KB)
Full Text (PDF, 692KB), PP.58-65
Views: 0 Downloads: 0
Finite State Machines, Spoken Web, Ve-hicular Computing, Ankle Monitor, Sensor Dust, Palm OS, Disaster Management
Finite State Machines (FSMs) are mathemati-cal abstractions which have a rich use in computer appli-cations. If we build a FSM for software, then it becomes much easier and simpler to understand, debug and modify. The insights developed in FSMs have had great influence on various domains. FSM is as important as any other computer science tool. This paper minimizes the gap which currently exists between software development and the formal method of theoretical com-puter science. So importance of FSMs has been explored over various such domains in this article. These domains include spoken web technology that enables a user to access a massive network of voice sites through speech. Information transfer protocol for Vehicular Computing is another domain, where users can get on road support services using vehicular sensors and global position system. Adding on to the domain list, we have modeled FSMs for Ankle Monitor and Sensor Dust which are applications of mobile ad-hoc networks. Ankle monitor is primarily used to track movements of an individual through wireless communication and Sensor Dusts are tiny sensors which monitor the environment in which they are deployed. We have also modeled Palm Operating System, which is a mobile OS that runs on Linux kernel. This paper presents the FSM for the booting sequence and the user interface of Palm OS. To conclude with we have taken up the domain of satellite simulation and have presented a FSM for the steps involved in Satellite launching and Image Handling within a satellite. Therefore, by modeling a range of applications using FSM we attempt to add-on to the significance of this concept and at the same time provide a single document comprising numerous FSM models. This concept can be used by software developers for easy modeling of their designs and can further use it to verify and debug the model whenever required.
Kavita Pandey, Dhruv Singh, Sumit Bansal, Vrishti Gahlaut, "Modeling and Recognition of Software Applications using FSM", International Journal of Modern Education and Computer Science (IJMECS), vol.7, no.10, pp.58-65, 2015. DOI:10.5815/ijmecs.2015.10.08
[1]M. Ali Qureshi, Abdul Aziz, and S. Hammad Raza, “A Verilog Model of Adaptable Traffic Control System Using Mealy State Machines”, International Journal of Computer and Electrical Engineering, Vol. 4, No. 3, June 2012.
[2]Noman Sohaib Qureshi, Hassan Mushtaq, Muhammad Shehzad Aslam, Muhammad Ahsan, Mohsin Ali and Mu-hammad Aqib Atta, “Computing Game Design with Au-tomata Theory”, International Journal of Multidisciplinary Sciences and Engineering, Vol. 3, No. 5, May 2012.
[3]Pengyu Hong, Matthew Turk, Thomas S. Huang, “Gesture Modeling and Recognition using Finite State Machine”, Microsoft Research.
[4]Ana Monga, Balwinder Singh, “Finite State Machine based Vending Machine Controller with Auto-Billing Features”, International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.2, April 2012.
[5]Andre1 Drumea, Camelia Popescu, “Finite State Machines and their applications in software for industrial control”, 27th International Spring Seminar on Electronics Technol-ogy.
[6]Vipin saxena, Santosh Kumar, “Validation of UML Class Model through Finite-State Machine”, International Journal of Computer Applications (0975 – 8887) Volume 41– No.19, March 2012.
[7]Eric Gribko, UC Davis, “Applications of Deterministic Finite Automata”, ECS 120, spring 2013.
[8]Deepak Chenthati, Supriya Vaddi, Hrushikesha Mohanty, Avula Damodaram, “Verification of web services modeled as finite state machines”, Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation (AMS), 2010.
[9]Maheswari S, Justus Selwyn, “Assessing the Behaviour of Web Services using Finite States”, International Journal of Information Engineering and Electronic Business, Vol.7, No.4, July 2015.
[10]G.Jose Moses,P.Suresh Varma,N.Supriya,G.NagaSatish, “Security Aspects and Challenges in Mobile Adhoc Net-works”, International Journal of Computer Network and Information Security(IJCNIS), Vol.4, No.6, June 2012.
[11]Qingqiang Yang,Wenxiong Kang, “General Research on Image Segmentation Algorithms”, International Journal of Image, Graphics and Signal Processing (IJIGSP), Vol.1, No.1, Oct. 2009.