The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
Multi-class learning from network data is an important but challenging problem with many applications, including malware detection in computer networks, user modeling in social networks, and protein function prediction in biological networks. Despite the extensive research on large multi-class learning, there are still numerous issues that have not been sufficiently addressed, such as efficiency of...
Dictionary learning for sparse representation has drawn considerable attention in recent years. In particular, the K-SVD algorithm is an efficient approach, and various modifications of the K-SVD have been developed for applications such as face recognition. However, the efficient storage of the dictionary has not been studied. Currently, the dictionary is simply normalized and saved as floating-point...
Attackers who designed malware seem to be so cautious that most of the malware are disguised as normal apps. This brings about huge difficulties to detect the malware. Similar with traditional PC testing, there are two main detection methods for Android malware: static analysis and dynamic monitoring. However, these methods inevitably face the challenge of code confusion performance cost. In this...
Many object recognition or concept identification tasks require accurate detection of large number of classes. These applications present enormous challenges to traditional classification methods, which are mostly designed for solving problems with small number of classes. In this paper, we develop a method called recursive non-negative matrix factorization (RNMF) for building a hierarchical label...
In this paper, a model of the roller brake tester is established to simulate the braking process when the wheels are tested on the rollers by Simulink. The real vehicle experiments are used to verify the simulation model. The simulation and experiment results show that the tester will not be influenced by other system structure dimensions when the installation angle is 32°-35° and the experimental...
The technology of testing fuel economy is not only a comprehensive parameter for evaluating the level of cars' technology and maintenance, but also an important reference for diagnosing and analyzing the troubles of cars. Using the method of Ultrasonic Flow Detection to measure the fuel consumption, this essay is based on a comprehensive comparison of several traditional fuel economy detection systems...
Based on the protein sequence, by selecting the amino acid composition, motif frequency, low frequency of power spectral density, the predicted secondary structure and the value of auto-correlation function as characteristic parameters, an approach of support vector machine for predicting 27-class protein folds is proposed. Overall recognition accuracy reaches 65.54% in the independent testing. With...
In e-learning, to provide personalized service according to learner's characteristics is becoming a hot area which is concerned by many researchers. Learner model and reasoning algorithm are two important factors of impacting the system's effects. In this paper, we analyzed learner's characteristics, proposed an ontology-based learner model and its representation method, described the mechanism of...
Testing from formal specifications offers a simple, structured, and more rigorous approach to the development of functional tests than standard testing techniques. Therefore, model-based testing (Specification-based testing) has been employed widely in software development. Interface automata is a light-weight formalism that captures the temporal aspects of software component interfaces, which has...
Automatic acquisition of ISA relations is a basic problem in knowledge acquisition from text. We present a method that acquires and verifies ISA relations from large Chinese free text. It initially discovers a set of sentences using Chinese lexicosyntactic patterns. Then we combine outside layer removal and inside layer gathering for acquiring concepts of constituting ISA relation. Finally, ISA relations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.