The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Scenario analysis is an effective way to evaluate and identify regional disaster risk. This paper focuses on the construction of regional disaster scenario, in order to adapt to the inference of disaster evolution paths and risk identification. Disaster scenario can be described through disaster consequence and evolution trends of disaster consequence. Since the states of elements at risk (EARs) directly...
Domain analysis is an essential activity in software product line engineering to identify common and variable features among the products of a product family. Feature models are commonly used for depicting the identified commonalities and variations. However, it requires significant time and effort to perform domain analysis and to create a feature model. We introduce a method and a tool for automatic...
Phishing emails have affected users seriously due to the enormous increasing in numbers and exquisite camouflage. Users spend much more effort on distinguishing the email properties, therefore current phishing email detection system demands more creativity and consideration in filtering for users. The proposed research tries to adopt creative computing in detecting phishing emails for users through...
In tourism industry, a challenge is how to handle emergency situations during a journey. Although most of the tourism travel agencies focus on generating travel plans, an important part that has been ignored is to provide a creative emergency travel plan when a user meets an unforeseen situation during the journey. Thus, in order to address problems like this, the study to build a system that can...
In this paper, the adaptive synchronization transmission of target signal within the nonlinearly unidirectional-coupled neural network is proposed, in which individual neuron is described by the FitzHugh-Nagumo (FHN) model in external electrical noisy environment. We design a network architecture of the unidirectional-coupled FHN system and propose an adaptive coupling strategy to synchronize the...
fault injection is an effective technique in software testing. By introducing faults to software under test, fault injection can improve the coverage of a test, as the same time, the fault injected in software contributes significantly to find true fault related to fault injected. In this paper we propose a software testing method based on fault injection. In this method, we first use neural network...
For runtime verification techniques, the most important part that limits its usage is how to reduce the influence of monitors. An important indicator is the amount of software codes after monitor instrumentation. The application of RV is hindered from the size-explosion problem of monitor construction. Namely, the state number of the monitor obtained is doubly exponential in the size of the input...
In the enterprise marketing process, on-line data plays more and more important role. As a type of data, spam (or fake) reviews of the products, however, have been seriously affecting the reliability of both decision making and data analysis of the enterprise. To detect spam reviews, the paper presents a set of opinion spam detection's identification indicators based on behavior features of the spammer...
A large amount of risk evaluation formulas have been proposed for spectrum-based fault localization (SBFL) in prior studies. A recent study by Xie et al. developed an innovative framework to theoretically analyze the effectiveness of those risk evaluation formulas in SBFL. Xie et al.'s study was based on the assumption that program has only one fault. In other words, they investigated SBFL in the...
Software development for Cyber-Physical Systems (CPS), e.g., autonomous vehicles, requires both functional and non-functional quality assurance to guarantee that the CPS operates safely and effectively. EAST-ADL is a domain specific architectural language dedicated to safety-critical automotive embedded system design. We have previously modified EAST-ADL to include energy constraints and transformed...
Software, in many different fields and tasks, hasplayed a critical role and even replaced humans to improveefficiency and safety. However, catastrophic consequences can becaused by implementation bugs and design defects. Modifiedcondition/decision coverage (MC/DC), required by the FederalAviation Administration on Level A (the most safety criticalsystem), has been shown to be effective in detecting...
Since the low SNR environment, generally the modulation recognition rate of signal modulation type is not very high. In this paper, we studied an automatic recognition method of communication signal modulation type in the low SNR. According to analyze the signal entropy as the feature, three characteristics are selected, and the random forest is as the classifier, finally we get a high recognition-rate...
Cognitive radio (CR) is the enabling technology for supporting dynamic spectrum access. This sort of communication paradigm can utilize increasingly scarce spectrum resources more efficiently and has become one of the the hot issues of wireless communication in recent years. With in-depth research, some unique security risks of the CR network has been revealed. A new method named RF "Distinct...
We proposed an algorithm using Rényi entropy to distinguish the M-QAM signals in this article. There is no requirement of prior information of the parameters of the signal, because the method we proposed making Wigner-Ville distribution time-frequency transform to signal, then calculate the Rényi entropy, and the last the theory of Dempster-Shafer evidence was used to classify the signals. The results...
Understanding the function of software code is the basis for software reuse. Topic modeling technologies can mine functional topics from source code and help developers comprehend the functional concerns about a software system and the corresponding implementations in source code. However, lacking clear explanations makes these functional topics hard to be understood by the developers. Furthermore,...
Understanding the trend of software defect density at the time of delivery has significant implications for organizations or agencies to make long-term risk control strategies. Software development is a knowledge-intensive activity. Organizations and software developers are expected to reduce defects rates with the accumulation of knowledge and experience, however, they are constantly confronted with...
Hyper-heuristics are advanced high-level search methodologies that solve hard computational problems indirectly via low-level heuristics. Choice function based hyper-heuristics are selection and acceptance hyper-heuristics that use statistical information to rank low-level heuristics for selection. In this paper, we describe a choice function based hyper-heuristic called Pairwise Choice Function based...
Testing is an important activity in engineering of industrial software. For such software, testing is usually performed manually by handcrafting test suites based on specific design techniques and domain-specific experience. To support developers in testing, different approaches for producing good test suites have been proposed. In the last couple of years combinatorial testing has been explored with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.