Development environment and software framework - the software environmentis an application virtual machine, providing important functions such as security,memory management and exception handling. The development environment supportsmultiple high level programming languages (C#, VB.NET, C++/CLI, etc.) thatare compiled to platform-independent intermediate language [4][5]; Operating system - the choice of operating system (OS) needs to be doneboth in terms of the chosen (or already available) hardware, the virtualization technologyif any and the budget provided by the client. The chosen development environment,software framework and DBMS allow the communications module to run onmultiple operating systems, including Windows Server based, most Linux distributionsand versions of BSD. The rich options for remote administration and monitoring,and the reduced risk of infection by computer viruses makes UNIX-based operatingsystems preferred;3.3. Application software requirementsTo allow the software of the communication module of the tow vehicle managementsystem to take advantage of the selected specialized hardware and system softwareand to “move” seamlessly from one computer to another, it is necessary to keep thecurrent state in non-volatile memory, i.e. the DBMS or the disk subsystem. The mainfunctions of the software are as follows: Management of the digital connection between the dispatcher center andonboard computers - the communication module and onboard computers contain a setof predefined short messages that can be quickly exchanged. In addition to these messagethe communication module can send a variety of settings to onboard computers; Management of the verbal communication between driver and dispatcher -the dispatchers and the drivers use the GSM network for verbal communication. Theconnections are managed using an appropriate modem. Upon request from the dispatcherthe communication module searches for the phone number of the driver in theDBMS, and if possible makes a connection with him; Processing and storage in DBMS of data about the location and state of thecar - in a fixed time interval the onboard computers send data packets containing theirlocation and current state. The communication module receives the packets, decodesthem and stores them in a DBMS for subsequent use to generate various reportsrequired for the operation of roadside assistance service; Processing and storage in DBMS of requests for repatriation of damagedcars and the data on the status of their execution, received from onboard computers -when request for repatriation of customer car is received in the dispatcher center thedispatcher enters the necessary data in the dispatcher's application and send them tothe communication module. Data is stored in DBMS. From this moment the communicationmodule monitors the status of the request and sends information for the194
execution to the dispatcher application until it is completed or terminated by the dispatcher; Processing of run-time errors - when an error occurs during execution of thesoftware the .NET platform generates an exception. Everywhere in the code where itis possible to happen, exceptions are catches and processed in an appropriate manner; Maintenance of log with all events and errors occurred, or part of themthereof at the discretion of the administrator of the system - any exceptions, as well assignificant events and information about the program execution is recorded in the logfile; Monitoring of the performance of the communication module and promptlynotifying the administrator of the system for possible problems - the software of thecommunication module includes a separate application that monitors for unusualentries in the log file, lack of regularity of the received packets from the onboardcomputer, network load, CPU utilization, memory usage, available disk space andothers.4. ConclusionsTo ensure effective communication between roadside assistance service and itscustomers, quick reaction to every customer call, twenty-four hour customer servicethroughout the territory of Bulgaria and effective control of the drivers for qualityservice, specific hardware, system and application software is needed.The described components allow meeting the continuously growing demands on themanagement and control of the tow vehicle, allowing easy expansion of functionality,increase in the volume of processed and stored data, increase of the number of systemusers, easy data and configuration backup and self-recovery in many cases of systemmalfunction.As future work are the design of the core components of the communication modulesoftware and its specific realization.5. References1. F. Piedad, M. W. Hawkins, High Availability: Design, Techniques, and Processes,20002. The Greaves Group, Virtualization in education, 20073. C. Y. Date, An Introduction to Database Systems, 19874. J. Richter, Garbage Collection: Automatic Memory Management in the Microsoft.NET Framework, 20075. ECMA, Standard 335: Common Language Infrastructure (CLI), Partitions I to IV,2001195
- Page 1 and 2:
ISSN 1311-0829ГОДИШНИК НА
- Page 3 and 4:
Годишник на Технич
- Page 5 and 6:
Годишник на Технич
- Page 7:
Годишник на Технич
- Page 10 and 11:
• If a neutral element 1 of the s
- Page 12 and 13:
Proof. (i) Since for arbitrary ≀
- Page 14 and 15:
)is the endomorphism ≀ 0, . . . ,
- Page 16 and 17:
∣∣E (k)C n∣ ∣∣ =Propositi
- Page 18 and 19:
For k = 0 and s = 1 from the last p
- Page 20 and 21:
Facts concerning semilattices can b
- Page 22 and 23:
described by the following join-tab
- Page 24 and 25:
Finally we observe{aj , if i = k(f
- Page 26 and 27:
Let us consider the endomorphisms f
- Page 28 and 29:
Proposition 3.8 For any n ≥ 2 in
- Page 30 and 31:
Cryptographic protocols based on DL
- Page 32 and 33:
2.5 Bi-Semigroup Action Problem (BS
- Page 35 and 36:
Theorem 4.5 [14]. In the center of
- Page 37 and 38:
The only way we know for an attacke
- Page 39 and 40:
Годишник на Технич
- Page 41 and 42:
The exact definitions of points and
- Page 43 and 44:
FirstIterationSecondIterationx 0 0
- Page 45 and 46:
* x4. Order of approximationBecause
- Page 47 and 48:
Годишник на Технич
- Page 49 and 50:
генератори, присъе
- Page 55 and 56:
№ РежимТабл.4.1 Бала
- Page 57 and 58:
Годишник на Технич
- Page 59 and 60:
Табл.11 2 3 4 5 6 7Загуби
- Page 61 and 62:
оцени разхода на ак
- Page 63 and 64:
сформатора се нала
- Page 65 and 66:
-да допуска претова
- Page 67 and 68:
Годишник на Технич
- Page 69 and 70:
-големи трудности п
- Page 71 and 72:
трансформаторът се
- Page 73 and 74:
При известно фазов
- Page 75 and 76:
KU BHOCHR (12)w w wЗа да се
- Page 77 and 78:
Годишник на Технич
- Page 79 and 80:
aided impregnation of wood and wood
- Page 81 and 82:
different as a result of the differ
- Page 83 and 84:
Table 2. Carbon peak C s1 component
- Page 85 and 86:
Годишник на Технич
- Page 87 and 88:
esults indicating that the reductio
- Page 89 and 90:
Change of Mass M, %100-10-20-30-40
- Page 91 and 92:
However, the correlation between re
- Page 93 and 94:
Electrical Apparatus and Technologi
- Page 95 and 96:
Годишник на Технич
- Page 97 and 98:
- преходът към стри
- Page 99 and 100:
или магнитно изоли
- Page 101 and 102:
от лист електротех
- Page 103 and 104:
Фиг. 6. Изменение на
- Page 105 and 106:
Годишник на Технич
- Page 107 and 108:
Fig.1 Block structure of proposed o
- Page 109 and 110:
Fig.4. Initial and best shape of po
- Page 111 and 112:
Fig.8 Calculated initial cogging to
- Page 113 and 114:
Годишник на Технич
- Page 115 and 116:
Octave/Lua interface is a Matlab to
- Page 117 and 118:
pends on the results of the thermal
- Page 119 and 120:
4. ResultsAs it has been mentioned
- Page 121 and 122:
A DC electromagnetic actuators with
- Page 123 and 124:
Годишник на Технич
- Page 125 and 126:
ращ се наблизо пров
- Page 127 and 128:
Фиг. 4. Зависимост н
- Page 129 and 130:
че максималната то
- Page 131 and 132:
3.7. Ефект близост в
- Page 133 and 134:
Годишник на Технич
- Page 135 and 136:
11 c x6T 2 c3c4c5ec p c1c , (2)
- Page 137 and 138:
От кривата на макси
- Page 139 and 140:
109.598.5Wind speed, m/s87.576.565.
- Page 141 and 142:
6. ЗаключениеВ стат
- Page 143 and 144: Годишник на Технич
- Page 145 and 146: Фиг.1. Заместваща сх
- Page 147 and 148: където t е времето м
- Page 149 and 150: Бяха проведени и ек
- Page 151 and 152: Представени са рез
- Page 153 and 154: Годишник на Технич
- Page 155 and 156: Фиг.3. Архитектури н
- Page 157 and 158: P SC_refP batP WP HGP storP bat_ref
- Page 159 and 160: 1500Фиг.9. Модел в Matlab/
- Page 161 and 162: Isc, AVsc, V50403020100-10-20-30-40
- Page 163 and 164: Годишник на Технич
- Page 165 and 166: шаване на температ
- Page 167 and 168: При променлив темп
- Page 169 and 170: Годишник на Технич
- Page 171 and 172: 2. Примерни компютъ
- Page 173 and 174: 3.3. Изследване на фо
- Page 175 and 176: алгебра. За целта с
- Page 177 and 178: 3.13. Изчисляване на
- Page 179 and 180: Годишник на Технич
- Page 181 and 182: Количеството на от
- Page 183 and 184: (CaSO 4 .2H 2 O) (фиг. 3). То
- Page 185 and 186: работят всички инс
- Page 187 and 188: (НДНТ), което за Бъл
- Page 189 and 190: Годишник на Технич
- Page 191 and 192: Communications software and hardwar
- Page 193: puter is running virtualization sof
- Page 197 and 198: Годишник на Технич
- Page 199 and 200: Тунелирането скрив
- Page 201 and 202: управление на ресу
- Page 203 and 204: Фиг.6: Симулационен
- Page 205 and 206: tunnel source 1.1.1.1tunnel destina
- Page 207 and 208: Годишник на Технич
- Page 209 and 210: При отворена вериг
- Page 211 and 212: Таблица 3Задвижващ
- Page 213 and 214: Фигура 3.При съотно
- Page 215 and 216: Годишник на Технич
- Page 217 and 218: Необходимо е така д
- Page 219 and 220: yследователно:( k )UOsi
- Page 221 and 222: Годишник на Технич
- Page 223 and 224: Laskin and Wang presented a detaile
- Page 225 and 226: Figure 2: Temperature dependence of
- Page 227 and 228: An additional analysis obtained at