The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on a software framework to support face recognition, a specific area of image processing. For the processing approach, we use principal component analysis (PCA), a data dimensionality reduction approach. The goal of this study is to understand the entire face recognition process with PCA and to present a software framework supporting multiple variations, which can be used to help...
Physical layer security can ensure secure communication over noisy channels in the presence of an eavesdropper with unlimited computational power. We adopt an information theoretic variant of semantic-security (SS) (a cryptographic gold standard), as our secrecy metric and study the open problem of the type II wiretap channel (WTC II) with a noisy main channel is, whose secrecy-capacity is unknown...
Honey pots are computer resources that are used to detect and deflect network attacks on a protected system. The data collected from honey pots can be utilized to better understand cyber-attacks and provide insights for improving security measures, such as intrusion detection systems. In recent years, attackers' sophistication has increased significantly, thus additional and more advanced analytical...
The paper lists some of the quotations gathered during interviews and focus groups during a consulting engagement to help the client company improve its requirements engineering (RE) process. The paper describes in detail one of the phenomena observed, namely that of the problem of the lack of benefit of a document to its producer (PotLoBoaDtiP). It goes on to report other manifestations, including...
In this paper, the author utilizes typical mistakes of third year undergraduate Computer Science and Software Engineering students in advanced software engineering courses to categorize and anticipates errors in engineering practice. In elementary courses, the students learn and apply techniques locally to relatively simple problems. In advanced courses the students are trained to select and integrate...
We describe software-engineering lessons we learned by building, deploying, and operating a large-scale distributed wildlife tracking system. The design started four years ago, the system has been operational for the past two years, but kept evolving during this time. The paper describes the structure of the system and then a series of interesting and well-documented lessons we learned. Most of the...
Multilevel system modeling deals with the representation and implementation of relationships among types and among types and instances in software systems. It raises questions of interpretation and organization of types and instances in strict or interleaved layers. Reasoning over multilevel models requires a logic language that provides a uniform, extensible and flexible account for intra-type relationships,...
Object-Process Methodology (OPM) is a model-based systems engineering methodology which has been recognized as an ISO 19450:2015 standard for automation systems and integration. It is domain-independent and intended for conceptual modeling of systems of various kinds. We collaborated remotely with a team that had implemented this methodology for modeling their proposed international standard, which...
Mining closed frequent item sets is a key objective in the field of data mining due to its wide range of applications. Given a database of transactions, the task is to find closed subsets which appear frequently in different transactions. This subject has been studied thoroughly, and many efficient algorithms had been presented, however, most of them were designed for a non-distributed setting. The...
The Cyberspace presents enormous challenges to computer professionals. In addition to enhancing education in security, reliability, and privacy, it is important for students to have more understanding of ethics, law, policy, regulation, and responsible software development. This paper suggests the necessity of a course Law for Computer Professionals and a relevant curriculum that includes: legal aspects,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.