The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Change in a software is crucial to incorporate defect correction and continuous evolution of requirements and technology. Thus, development of quality models to predict the change proneness attribute of a software is important to effectively utilize and plan the finite resources during maintenance and testing phase of a software. In the current scenario, a variety of techniques like the statistical...
The current traditional system of paper documents adopted by Fire Department had lead to the inability of the fire fighters to locate usable and functioning hydrants in an efficient and effective manner which can jeopardize any rescue mission. Hence, there is a need to revised the Fire Department current system and develop a new system that is much more easier, portable and also time and cost effective...
This paper describes, and illustrates using documented applications, a general framework methodology for wide-area forest and land use mapping and change detection using Synthetic Aperture Radar (SAR) remote sensing. Consideration is given to implementation of the SAR-based methodology using both commercial and free/open-source software. Our experience shows that constructing a complete processing...
According to the shadows and shading constraints in the Lambert illumination model, the paper proposes a method to detect image forgery. This method describes a multitude of constraints in shading and shadows based on the direction of the light source, by analyzing the intersection of the wedges to verify the images. The linear programming problem is employed to confine the direction and angle in...
System call analysis is a behavioral malware detection technique that is popular due to its promising detection results and ease of implementation. This study describes a system that uses system call analysis to detect malware that evade traditional defenses. The system monitors executing processes to identify compromised hosts in production environments. Experimental results compare the effectiveness...
While empowering a wide range of software engineering tasks, the traditional fine-grained software dependence (TSD) model can face great scalability challenges that hinder its applications. Many dependence abstraction approaches have been proposed, yet most of them either target very specific clients or model partial dependencies only, while others have not been fully evaluated for their accuracy...
Most of the landslide and flood prediction models require the Digital elevation Model (DEM) as the input. DEM is the digital representation of topographic and manmade features located on the surface of the earth. DEM also needed in hydrologic analyses, resource management and environmental assessment and including interferometry synthetic aperture radar (InSAR) applications. The increased use of DEM...
The author has introduced a generic method for photogrammetric survey using a multi-rotor unmanned aerial vehicle (UAV) for mapping a simulated model and slope area. The objective of this study is to assess the capabilities of UAV for slope mapping. This study only concentrates on multi-rotor UAV, which is known as Hexacopter. Several ground control points (GCP) and checked point (CP) were established...
In this case study we investigate software reliability models and their applicability to process improvement at an IT help desk. We propose a model selection framework and demonstrate its success using real help desk incident data from a portfolio of 156 desktop software applications. Incidents are predicted at five intervals and measured against actual numbers of submitted incidents. We analyze incident...
To study the characteristic of aerostatic thrusting gas bearing with non-continuous slot-restricted, pressure distribution formula of continuous slots was derived by the equations of motion, continuity equation and the equation of state, the pressure of theoretical calculations was compared with the Fluent numerical analysis in determining the parameters of conditions, obtained Fluent numerical calculations...
Emerging Camera Sensor Networks (CSN) leverage the collaboration, processing and communication capabilities of modern cameras to handle a wide variety of security and safety-critical tasks, including target tracking. However, the performance of CSN in terms of tracking accuracy can be severely degraded when faults occur. Faults may be caused by unpredictable software errors (e.g., in the image processing,...
Recently, some commercial software to generate digital surface model (DSM) were provided from some vender. One software is based on the bundle method using conventional Photogrammetry, another one is based on structure-from-motion method (SfM) under computer graphics technology. It is wavered to choose which software to generate DSM derived from drones. In this work, the accuracies of DSM were verified...
The accuracy of COSMO-SkyMed DEMs is investigated using StripMap mode images, acquired during the interferometric Tandem-Like mission characterized by a temporal baseline of 24 hours and spatial baselines maintained around 150–200 m. Some Couples of both Ascending and Descending interferometric pairs, acquired on selected test sites located in the California have been processed using the open source...
This paper deals with fair public service system design formulated as the weighted p-median problem minimizing the total disutility, like social costs. The social costs are often proportional to the total distance travelled by all users to the nearest located service center. The above objective denoted as min-sum criterion may cause such situation that the total social costs are minimal, but the disutility...
Effort estimation is a project management activity that is mandatory for the execution of software projects. Despite its importance, there have been just a few studies published on such activities within the Agile Global Software Development (AGSD) context. Their aggregated results were recently published as part of a secondary study that reported the state of the art on effort estimation in AGSD...
People often need help when filling out paper forms, because they do not fully understand the meaning of form fields. Commonly adopted solutions are referring to the form filling instructions or consulting other people. However, they are either inefficient or inconvenient. In this paper, we propose a situation-aware and interactive system, named Interact Form, to help people fill out paper forms....
Software watermarking is a tool used to combat software piracy by embedding identifying information into a program. Most existing proposals for software watermarking have the shortcoming that they heavily rely on the stealth of watermark to prevent adversaries removing marks. Besides, the watermark is separate from the original program and can be destroyed via fairly straightforward semantics-preserving...
Welcome to this special panel aiming to reexamine the history of modern computing during early 20th century. During our discussion we will recognize some of the earliest efforts in transforming the world through electronic digital computing.
In Substation Automation Systems, application functions such as monitoring, control, and protection are deployed in intelligent electronic devices (IEDs). Before the IEDs are installed in the substation, functions are tested by the manufactures to ensure that the functions operate properly as designed. A conventional function test platform is made of amplifiers with copper wire connection to the IEDs...
Numerical solutions of mathematical equations in scientific models are the result of several approximation steps. Konrad Hinsen uses a simulation of the solar system as an example for illustrating these approximations and explaining their role in the difficult problem of testing scientific software.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.