Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Regression Testing is mainly done in software maintenance aiming to assure that the changes made in the software have correctly been implemented and also to achieve the confidence that the modifications have not affected the other parts of the software. It is very costly and expensive technique. There are number of techniques present in literature that focus on achieving various testing objectives...
Component-based software development is one of the proficient models of constructing eminent-quality software products. Reusability is the basic concept behind the component-based software. Reusability suggests re-use of existing software artifacts rather than developing them from the beginning. Components interact to share services and information in component-based software environment. In this...
As seen in many studies the relationship of object oriented matrices of the software and the calculated maintenance effort metric is very complicated, complex and nonlinear in nature. So with this kind of behavior, we can have got a research area where we can work upon to minimize the maintenance effort which can be used to develop and deploy models and systems for the forecasting of software maintenance...
Determining complexity of software is always a prime concern for the software developers. Higher the complexity, difficult to maintain the software. If software undergoes maintenance again and again, it gradually decreases the quality of software and cost of maintenance increases. One import concept of software engineering that improves the quality of software and makes the software more maintainable...
Cyclomatic complexity (CC) is used to find out the number of independent paths in a program or software. In literature, different algorithms have been proposed to compute the CC of a program or software. In this paper, we proposed an algorithm for the computation of CC based on graph theory. We apply the proposed method to compute the CC of login module of an Institute Examination System (IES).
Clustering is one of the most useful methods for data gathering in distributed wireless sensor networks (WSNs). In additions, sensors in such environment are energy constrained and generate the huge amount of data due to redundant data transmission and thus reducing lifetime of networks. Moreover, there is need to use efficient clustering techniques for collecting relevant data from nodes to eliminate...
Data Clustering in Data Mining is a domain which never gets out of focus. Clustering a data was always an easy task but achieving the required accuracy, precision and performance was never so easy. K means being an archaic clustering algorithm got tested and experimented thousands of times with variety of datasets and other combination of algorithm due to its robustness and simplicity but what this...
Internet of Things might appear to be relatively a new term, but it came back in the year 1999. The considerable survey has been conducted regarding various aspects associated with the Internet of Things in last decade. Most of these are literature reviews, targeting research challenges, applications, and architecture of Internet of Things. In this paper, we present a comprehensive multi-facet study...
In this era of social networking sites, people's behavior online could help us have an idea about their offline lives as well. Social check-ins, which store geo-tagged information about users, can be utilized by researchers to investigate the tastes and preferences of individuals for the places they live in or travel to. In this paper, I introduce one possible research direction that can be taken...
As the world population is growing at a rapid pace, the demand for better health care facilities is increasing steadily. It has been observed that many health problems are unpredictable; especially heart diseases; hence it is important to monitor heart continuously. Earlier it was not always possible to monitor the patient continuously and for longer durations, but thanks to the latest developments...
The present article describes the implementation of Battery energy storage system (BESS) for improved and better performance characteristics of load frequency control problem with a compact sized battery energy storage system (BESS) with respect to load frequency control (LFC) applications. It is observed there is significant reduction in the frequency deviations. Also tie-power variations get diminished...
Biometrie systems face several limitations like low accuracy, less robustness, low applicability and non-universality which can be minimized by the adoption of Fusion at different levels of Biometric systems. Fusion can be applied at sensor level, features level, score level as well as decision level. In this paper, we have compared the performance of a Face Recognition system without fusion and with...
In this paper general study on performance analysis like Entropy, Correlation, Execution time, Histograme etc are discussed. On the basis of this study a model on digital image analysis will propose which is also using hybrid & non-hybrid approaches like Fuzzy c-means (FCM), Possibilistic c-means (PCM).
In this current research an optimized mechanism with four bar closed linkage with appreciable clearances over joints is designed. The characteristics have been evaluated and mathematical simulations have been done using differential evolution for solving nonlinear differential equation in order to stabilize and reduce vibrations of the robotic arm in industrial implementation and research. It can...
This paper focuses on detecting a pedestrian in an image. This real time application aims for high detection accuracy as well as faster computation. For higher accuracy and detection rate Histogram of Oriented Gradients (HOG) algorithm is used. Further, Linear Support Vector Machine (LSVM) classification is used for faster and reliable classification. Since the HOG algorithm is compute expensive several...
The recent advancement in software industry such as Microsoft utilizing FPGAs (Field Programmable Gate Arrays) for acceleration in its search engine Bing and Intel's initiative to have its CPU along with Altera FPGA in the same chip indicates FPGA's potential as well as growing demand in the field of high performance computing. FPGAs provide accelerated computation due to their flexible architecture...
The comfort of the home and the Society are helped by the “things” which surround them. These things are connected to each other, either directly or indirectly via the internet of things. Having full access to controlling these devices remotely with reasonable precision within the network when required is a key element in the home automation process. Many aspects of home automation needs to be developed...
This paper aims at analysing the performance of a magnetic levitation system which is a highly unstable, non linear and contactless system. The transfer function of the model shows a pole in the RHS of the s plane. As the system performance is sensitive, optimum values of PID controllers are required to obtain the desired results. The number of controllers and placing of the controllers also play...
Existing indoor lighting systems consisting of incandescent bulbs and compact fluorescent lamps(CFLs) are being replaced by light emitting diodes(LEDs) at a much faster pace than envisaged. Such lighting systems are highly energy efficient, cost effective as well as environment-friendly. LEDs can also be used simultaneously for establishing indoor communication infrastructure known as visible light...
This paper studies and implements the existing encryption algorithm on 16-bit DICOM images using quaternions as the key, around which, the pixels of an image are rotated to get another image suitable for transmission over a network, such as internet, to the intended receiver. The existing algorithm is a strong encryption method that gives commendable results for random number sequence generation performed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.