The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Field Programmable Gate Array (FPGA) system is widely used in deep learning application and cloud system for acceleration. Quality and reliability of IP block is essential to the successful development of today's complex hardware acceleration design. In this paper, we discuss the important issues of quality and reliability of digital soft IP, and propose a qualification measurement system that can...
A new generation of medical devices emerges to supportincreasingly more complex medical decisions and procedures.These Medical Devices (MD) combine data fromnovel sensors and existing modalities like scanners withelaborate software processing to assist caregivers in the sameway Flight Management Systems help a pilot flying planes.For instance, Blue Ortho’s MD allows performing TotalKnee Arthroplasty...
Not only in computer security, dealing with malware also presents one of vital challenges in computer forensics. Attempting to get away from their criminal activities, a suspect usually uses malware defense where they can claim that they did nothing wrong but malware did. Therefore, the burden of proof for the prosecution in pinning down the criminals is often extremely heavy due to the complex behavior...
Graphical user interfaces are important components of today's software. User interfaces often require checking correctness of user interactions. In web applications such checks can be a part of the JavaScript code. User interfaces in web applications can evolve, some elements can be removed and new elements can be added. To check JavaScript code covers all possible incorrect scenarios in user interactions...
Modeling and analysis of non–functional properties is crucial in energy-aware real-time (ERT) automotive systems. EAST-ADL is an architectural language dedicated to safety critical automotive embedded system design. We have previously modified EAST-ADL to include energy constraints and transformed ERT behaviors modeled in EAST-ADL/STATEFLOW into UPPAAL models amenable to formal verification. Previous...
The number of genome-wide association studies (GWAS) has recently exploded, becoming an important tool in helping researchers comprehend human variation and the role genetic variants play in disease. However, the majority of the GWAS conducted to date have not provided sufficient information to understand the genetic architecture for the usually novel genes identified. Thus, fine-mapping of the exact...
The correct prediction of faulty modules or classes has a number of advantages such as improving the quality of software and assigning capable development resources to fix such faults. There have been different kinds of fault/defect prediction models proposed in literature, but a great majority of them makes use of static code metrics as independent variables for making predictions. Recently, process...
We describe a cloud-based architecture for monitoring large numbers of industrial automation devices. We are interested in massive parallel monitoring of software components controlling critical automation facilities such as factories, mines or oil rigs. Monitoring focuses on post-deployment verification, aiming at discovering specification violations indicating for example bugs or incompatibilities...
Compared with other areas, knowledge management in education area has been lack of attention for a long time. This paper did a survey on undergraduate in a Chinese research university. By designing the questionnaire, implementing the survey website by programming, we got 515 original data from art students and science students. Then we analyzed the data by several data-mining algorithms, e.g. the...
This paper focuses on the design of dimensionality reduction based on Fisherface. We propose to apply the Fisherface algorithm in face recognition to automatic modulation recognition, and combine it with cyclic spectrum and k nearest neighbor classifier to realize the correct recognition of 9 kinds of modulation signals. Fisherface is an improved algorithm based on Fisher linear discriminant analysis,...
It is known that the features of the radio station vary with the signal to noise ratio (SNR) in a certain range which leads to the uncertainty of the radio station identification system. In this paper, we study the interval evidence recognizer by extending the individual features of the obtained radio from single value to interval and constructing the radio station feature database. Firstly, the range...
A web service reliability test method for C/S architecture software based on log analysis is presented in this paper. In this method, the software usage model is constructed automatically to describe the real situation on the users' access to the web service by Markov chain. The test cases are generated according to Random Walk and applied to software reliability test. In the experiment process, MTBF...
Cross domain data such as numerical or categorical types are ubiquitous in practical network. Network anomaly detection based on cluster analysis exist some difficulties, for example, the initial center of cluster analysis is sensitive and easy to fall into the local optimal solution. Cross domain data involved great information, but can't be effectively used, which will influence the performance...
Reliable detection of intrusion is the basis of safety in cognitive radio networks (CRNs). So far, few scholars applied intrusion detection systems (IDSs) to combat intrusion against CRNs. In order to improve the performance of intrusion detection in CRNs, a distributed intrusion detection scheme has been proposed. In this paper, a method base on Dempster-Shafer's (D-S) evidence theory to detect intrusion...
The existing network platform can not meet the new launch vehicle launch costs, and there is the need for high reliability storage and application of massive data. A scheme of measuring and controlling network system based on cloud platform is put forward. The centralized management of system resources is realized. Enhanced resource utilization and system scalability, and reduced the development cost...
Security cases—which document the rationale for believing that a system is adequately secure—have not been sufficiently used for a lack of practical construction method. This paper presents a hierarchical software security case development method to address this issue. We present a security concept relationship model first, then come up with a hierarchical asset-threat-control measure argument strategy,...
The rapidly increasing application of software contributes to the growing requirement of software quality. However, current software systems are far from being defectfree. Bugs are the root causes for various software/system failures. Although many rigorous quality assurance techniques are applied in the entire software life cycle, new bugs could be unintendedly injected during the software development...
Some type of tests especially functional tests and stress test requires a large amount of realistic test data. We are proposing a tool that uses random number generators in order to create such data. The tool is designed to be able to set simple attributes of any Java object and in many cases also to create complex structures when objects are connected via references. Random values are created according...
This presents a new model to support empirical failure probability estimation for a software-intensive system. The new element of the approach is that it combines the results of testing using a simulated hardware platform with results from testing on the real platform. This approach addresses a serious practical limitation of a technique known as statistical testing. This limitation will be called...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.