The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study uses non-minutiae fingerprint recognition methods to confirm earlier results on the existence of fingerprint template ageing. We performed the experiments on datasets including a time-span of 4 years. The acquisition was performed by using three different commercial off-the-shelf optical fingerprint sensors. Furthermore, we compared the results of those non-minutiae experiments to investigations...
This paper investigates two metrics related to the traceability relationships that exist between requirements and architectural design. In particular, we look into cross-cutting requirements, i.e., requirements that are implemented by several components, and, conversely, into overloaded components, i.e., components that implement several requirements. The intuition is that intricate dependencies between...
The Ministry of Research, Technology, and Higher Education of Indonesia has requirements to answer five main questions, i.e. what are the most popular research topics; which research topics tend to diminish; what are the trending research topics; who are the most influential researchers in a specific research topic, and; who are leading researchers in a specific topic. This study is a part of our...
In order to effectively control the risk of software project and overcome the effect of lack data and human subjective factors in the traditional evaluation, the transformation of quantification and reduction of natural language is realized, so a new evaluation model is put forward. Based on the concepts of risk weight, expert trust, risk consequence and so on, we use the correlation coefficient to...
Code coverage is the dominant criterion in test-suite reduction. Typically, most test-suite reduction techniques repeatedly remove tests covering code that has been covered by other tests from the test suite. However, test-suite reduction based on code coverage alone may incur fault-detection capability loss, because a test detects faults if and only if its execution covers buggy code and its test...
The effort required for the development of a software system is predicted through the cost of software estimation. Completion of project within time and budget limits is required for accurate cost estimation. Effort and cost estimation can be done through various modes. A new hybrid algorithm which is a combination of concepts of Artificial Bee Colony (ABC) and Local search procedures is used here...
The testing process of a low noise RF pre-amp in most of the semiconductor fabrication industries is either fully manual or employs expensive test systems. An efficient and low cost automated testing system is elucidated in this paper. The design and development of the automated RF test system is realized. The whole process involves the development of an Automated Test System (ATE) and a software...
Template matching is an important technique used for object tracking. It aims at finding a given pattern within a frame sequence. Pearson's Correlation Coefficient (PCC) is widely used to quantify the degree of similarity of two images. This coefficient is computed for each image pixel. This entails a computationally very expensive process. In this paper, aiming at accelerating this process, we propose...
Infrastructure as Code (IaC) is the practice of specifying computing system configurations through code, and managing them through traditional software engineering methods. The wide adoption of configuration management and increasing size and complexity of the associated code, prompt for assessing, maintaining, and improving the configuration code's quality. In this context, traditional software engineering...
The paper presents an analysis of developer commit logs for GitHub projects. In particular, developer sentiment in commits is analyzed across 28,466 projects within a seven year time frame. We use the Boa infrastructure’s online query system to generate commit logs as well as files that were changed during the commit. We analyze the commits in three categories: large, medium, and small based on the...
Software defect prediction provides actionable outputs to software teams while contributing to industrial success. Empirical studies have been conducted on software defect prediction for both cross-project and within-project defect prediction. However, existing studies have yet to demonstrate a method of predicting the number of defects in an upcoming product release. This paper presents such a method...
Research on education has indicated that students have different abilities and needs. In other words, they tend to learn in different ways, these ways were called a learning style. Although the learning style in many developed countries has seen a significant amount of research [1, 2], unfortunately, in Arabic region this work is still in its infancy [3–5]. The literature review revealed that there...
Crashing of program is an annoying experience for users. Whenever a program crashes, an event log is generated. Sometimes built in crash reporting programs send crash reports automatically to developing site whereas sometimes, user is presented with an option to report the crash himself. This reporting is often useful for the development team to diagnose and fix the problem. It happens quite often...
Fixing some security failures are difficult because they cannot be easily reproduced. To address Hardly Reproducible Vulnerabilities (HRVs), security experts spend a significant amount of time, effort, and budget. Sometimes they do not succeed in the reproduction step and ignore some security failures. The exploitation of a vulnerability due to its irreproducibility may cause severe consequences....
It is crucial for Internet company to provide highly reliable web-based services. The web-based services always have many components running in the large-scale infrastructure with complex interactions. As an indispensable part of high reliability, the diagnosis remains to be a thorny problem. With the growth of system scale and complexity, it becomes even more difficult. In this paper, we propose...
In this paper, the correlation between the speech features of the vowel /a/ and depression severity was investigated, so as to derive a depression severity meter mobile application that can accurately detect depression quantitatively. Results showed a correlation between depression severity and speech features, and an application prototype was created and tested to assess for predictive accuracy of...
In this paper the key indicators of sports tourism competitiveness were selected through the factor analysis method, by using the factor analysis method in Spss22.0 software, all kinds of sports tourism data in each city and county of Hainan were analyzed according to the factor analysis method and the sports tourism competitiveness of each city and county were also evaluated in comprehensive scores...
Emotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design...
Current Security Information and Event Management systems (SIEMs) constitute the central platform of modern security operations centers. They gather events from multiple sensors (intrusion detection systems, anti-virus, firewalls, etc.), correlate these events, and deliver synthetic views of the alerts for threat handling and security reporting. However, as the number of security incidents, and thus...
Continuous Integration (CI) is a common practice in agile software development processes. It improves the quality of the developed software and reduces the risk of integration problems. However, the effectiveness of CI depends heavily on the frequency of integration problems. For systematic improvement of the applied agile development process, the effect of large commits on the likelihood of integration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.