The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software security is an important aspect of ensuring software quality. Early detection of vulnerable code during development is essential for the developers to make cost and time effective software testing. The traditional software metrics are used for early detection of software vulnerability, but they are not directly related to code constructs and do not specify any particular granularity level...
Recently, Technical Debt (TD) has gained popularity in the Software Engineering community to describe design decisions that allow software development teams to achieve short term benefits such as expedited release of code. Technical debt accrued should be managed to avoid the disastrous consequences of these temporary workarounds. Management of technical debt involve documenting the debt item in the...
Ensuring software security is essential for developing a reliable software. A software can suffer from security problems due to the weakness in code constructs during software development. Our goal is to relate software security with different code constructs so that developers can be aware very early of their coding weaknesses that might be related to a software vulnerability. In this study, we chose...
Security breaches in software systems are often caused by vulnerable code, which result in loss of confidential data in addition to reputation and financial damages. To achieve robust software security, developers must be given proper training on secure coding practices. Conventional training methods are limited as they do not take the prior code written by the developers into account. We propose...
Code decay is a gradual process that negatively impacts the quality of a software system. Developers need trusted measurement techniques to evaluate whether their systems have decayed. The research aims to find what is currently known about code decay detection techniques and metrics used to evaluate decay. We performed a systematic mapping study to determine which techniques and metrics have been...
The Opera-3D electrostatic modelling software, Tosca, has been used to model Mevex, a type of X-ray machine used at AWE for flash radiography since the early 1980s. The operating principle of the machine is to switch charge, stored in a Mark bank, into a Blumlein pulse-forming line. This causes the inner line of the Blumlein to rise in voltage to about 700 kV, driving a self-magnetic pinch (SMP) diode...
When simulation analyses first became at least somewhat commonplace (as opposed to theoretical and research endeavors often considered esoteric or exploratory), simulation studies were usually not considered “projects” in the usual corporate-management context. When the evolution from “special research investigation” to “analytical project intended to improve corporate profitability” began in the...
In March and April 2010, an ISE Explorer Autonomous Underwater Vehicle (AUV), built for Natural Resources Canada (NRCan), was deployed to Canada's high Arctic. Its mission was to undertake under-ice bathymetric surveys in support of Canada's submission to establish the outer limits of its continental shelf under the United Nations Convention on the Law of the Sea (UNCLOS). During this deployment several...
In this paper, we present a reconfigurable system on chip design framework that generates an architectural design along with binding and scheduling algorithm, specific to the input application in Kahn Process Network specification.The likelihood that tasks and communication channels may have many potential physical manifestations is explicitly recognised and embraced, to assist the design exploration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.