The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes an implementation of a Secure Coding learning package for Undergraduate students in the Kulliyyah of Information and Communication Technology (KICT) at the International Islamic University Malaysia. The learning package consists of three components which are SCALT, WebGoat and notes on several vulnerabilities in programming languages. This work aims to create awareness among the...
Finding the best possible encoding decisions for compressing a video sequence is a highly complex problem. In this work, we propose a multi-objective Design Space Exploration (DSE) method to automatically find HEVC encoder implementations that are optimized for several different criteria. The DSE shall optimize the coding mode evaluation order of the mode decision process and jointly explore early...
In this paper, two improved intra angular prediction methods are proposed to enhance coding performance. The first method applies new four-tap interpolation filter algorithm. The reference samples at fractional position are interpolated by DCT-based or Gaussian interpolation filter. The second method proposes extended boundary prediction filter to reduce the prediction error. The experimental results...
This work presents a coding efficiency evaluation of the recently published first release of the video coding scheme of the Alliance for Open Media (AOM), so called AOM/AV1, in comparison to the video coding standards H.264/MPEG-AVC (Advanced Video Coding) and H.265/MPEG-HEVC (High-Efficiency Video Coding). As representatives of the two last-mentioned video coding standards, the corresponding reference...
With the exponential growth of digital cameras and the aid of powerful video editing softwares, videos with various resolutions become ever more popular. Therefore, there is a great demand for video coding schemes supporting arbitrary resolutions with higher efficiency. In the latest standard, only a simple padding with direct copying is adopted to meet this requirement, and the coding efficiency...
Since the introduction of the H.261 standard in 1990, the transform step has always been a key feature of video coding technologies. The successive generations of standard have always found a better way to further de-correlate the residual signals and thus improve the coding efficiency. Recently, MPEG and the ITU have jointly launched the Joint Video Exploration Team (or JVET) to prepare the next...
This paper proposes a decoder-side intra mode derivation algorithm for block-based video coding. Instead of explicitly coding intra mode, the algorithm derives intra mode at both encoder and decoder using a template-based method. Based on rate-distortion optimization, the encoder locally determines whether intra mode derivation or intra mode explicit coding is used. Further, as no intra mode is coded,...
When supervising software engineering team projects, having all team members contribute actively to the project is often a challenge. Most often than not, there will be teams having some members with limited or no contribution. Thus one of the key roles of a team leader and academic supervisor are to monitor who is contributing and who is falling behind. Assessing the progress information of each...
Curated platforms provide an architectural basis for third parties to develop platform complements and for platform owners to control their implementation as a form of open innovation. The refusal to implement complements as innovations can cause tension between platform owners and developers. The dynamic concerning this control of innovation is not well understood in platform literature. This research...
As the need of software has been increasing, the danger of malicious attacks against software has been worse. In order to fortify software systems against adversaries, researchers have devoted significant efforts on mitigating software vulnerabilities. To eliminate security vulnerabilities from software with lower inspection effort, vulnerability prediction approaches have been emerged. By allocating...
High-level synthesis (HLS) promises high-quality hardware with minimal development effort. In this paper, we evaluate the current state-of-the-art in HLS and design techniques based on software references and architecture references. We present a software reference study developing a JPEG encoder from pre-existing software, and an architecture reference study developing an AES block encryption module...
There has been a continuously growing interest in radio frequency identification (RFID) and more recently, in <bold> computational</bold> RFID, i.e. battery-less sensors that piggyback sensed information, rather than a constant ID bit stream, utilizing Gen2, the physical layer of commercial RFID systems. This work offers a complete software-defined radio (SDR) reader with 1) coherent detection...
Web applications dependent on back-end databases are currently not immune to SQL injection attacks despite huge investment in security artefacts and defensive software mechanisms deployed by organizations. These forms of attacks involve the insertion of malformed strings or specially crafted input encoded as SQL query into web forms or http header requests to web servers. While many techniques have...
Screen Content (SC) video coding is becoming more important in screen sharing and screen broadcasting applications. There are many distinctly different characteristics between the SC video and the camera-captured video. In this paper, we propose a rearrangement pixel granularity template matching method for lossy SC intra picture coding with higher compression ratio. Firstly, the original picture...
Depth-based 3D formats for state of the art High Efficiency Video Coding standard facilitate the synthesis of virtual views with a brief binary representation. Depth maps coding error results in synthesis artefacts for virtual views rendered during Depth Image Based Rendering (DIBR) process. Based on depth maps distortion, synthesized view distortion estimation models are integrated in 3D-High Efficiency...
This paper compares widely employed simulation modeling approaches: System Dynamics (SD) and Discrete Event Simulation (DES). SD and DES follow two quite different modeling philosophies and can bring very different but complimentary insights in understanding to the same ‘real world’ problem. An exploratory study is undertaken to investigate the ability of new practitioners to assimilate and then put...
Through three Internet software company 40 people were Behavioral Event Interview (BEI), the establishment of a discriminative Competency Model Java software engineers that companies need innovation and strong emphasis on interpersonal communication, customer service-oriented software developer, interpersonal communication, customer service orientation and innovation will become the core of Internet...
As the software industry develops rapidly, protecting software intellectual property from reverse attacker has become more and more important. The technical way is to make software hard to understand and will cost attackers more time and energy to crack the software than they can take. Self-modifying code is a code changing mechanism based on stored program architecture and has been widely used in...
A cyclic redundancy check (CRC) is an error-detecting code commonly used in data communication and storage devices to detect accidental changes to raw data. This paper provides an overview and principle of CRC. Emphasis is placed on the implementation of the CRC algorithm by method of hardware as well as software. It is proved that the implementation method present has high practical value.
In this paper, we present a series of methods to improve testing efficiency especially for regression testing from a novel view, namely dynamic analysis of test cases suitable for class testing in object-oriented systems. We mine static call graphs and dynamic call trees to represent the static features and dynamic tests of the program. By graph analysis, we present a series of methods and testing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.