The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Standard Commands for Programmable Instruments (SCPI) is the most widespread interface for measurement equipment control in many areas, for example, electronics or telecommunications. Typically, these instruments are used only by experts with the support of ad-hoc software tools provided by the hardware vendor. A way to expand their use to less experienced professionals is the development of control...
This article describes design and development of MariaDb Maxscale robust and easy extendable test automation tool — MariaDB Continuous Integration (MDBCI). For determining optimal architecture a comparison of analogs and a detailed review of existing solution is given. Developed instrument is described and discussed in details in order to determine its extendability level. For proving robustness the...
Breast cancer is the most prevalent form of cancer to strike women. There are four major subtypes of breast cancer, and therapies are different for each of these subtypes. In particular, two of the four subtypes are grouped into so-called ER-positive (ER+) subtype and are treated with tamoxifen. Therefore an important first step in personalizing breast cancer therapy is to classify a patient into...
Recent advances in Neural Networks (NN) are enabling more and more innovative applications. As an energy-efficient hardware solution, machine learning accelerators for CNNs or traditional ANNs are also gaining popularity in the area of embedded vision, robotics and cyberphysics. However, the design parameters of NN models vary significantly from application to application. Hence, it's hard to provide...
This work aims to solve the problem of musical instrument identification in monophonic audio samples. The instruments chosen for this work were piano, flute, violin, drums and guitar. The audio data were sampled into frames of fixed size & then MFCC and few other TIMBRAL features were extracted from them. These features were used for training and testing the network. But instead of selecting one...
This paper proposes a method which utilizing taint analysis to reduce the unnecessary analysis routine, concentrating on the control-flow altering input using concolic (concrete and symbolic) execution procedure. A prototype, Concolic Fuzz is implemented based on this method, which is built on Pin platform at x86 binary level and using Z3 as the SMT (Satisfiability Modulo Theories) solver. The results...
The Combined Armament Tester was designed for the A-10 to replace eight (8) existing armament testers. The primary goals of the design are field ruggedness coupled with a middle layer of software to enable test program set reuse with changes in the hardware. The unique middleware coupled with a streamlined development process enabled requirements to successful field demonstration in 10 months. The...
This paper presents a new concolic execution-based smart fuzzer for detecting heap-based buffer overflow in the executable codes. The proposed fuzzer executes the target program with concrete input data and calculates the constraints of the executed path symbolically. The path constraints are used to generate test data that traverse new execution paths in the target program. For each executed path,...
Due to the increasing usage of embedded instruments in many electronic devices, new solutions to effectively access these instruments appeared, including the new IEEE 1687 standard. The approach supported by IEEE 1687 allows a flexible access to embedded instruments through the Boundary Scan interface. The IEEE 1687 network includes a set of reconfigurable scan chains. This paper addresses the issue...
Based on the energy conservation related to elevator's load, motor power, elevator's velocity and machinery efficiency, a mathematical model for solving the elevator equilibrium coefficient was proposed in detail. In order to realize the proposed method, through real-time sampled data including the operating power in no-load mode and speed of the elevator, test results of the equilibrium coefficient...
Black tea is one of Indonesia's major leading export products. In terms of trading, quality of black tea, especially flavor and aroma, will determine its selling price. The purpose of this research is to design a prototype of electronic nose, which integrated gas sensors, data acquisition, and computer, to detect the aroma of brewed black tea. This electronic nose consists of four gas sensors (TGS...
This work explores the impact of teaching and learning if the rate of learner engagement outside the classroom is continuously measured and available to the instructor and students. We describe an ongoing implementation of a monitoring tool built within a software engineering continuous integration and testing (CI & Test) platform that integrates multiple streams of student activity and performance...
‘Flipping the Classroom’ is a well-known effective educational approach which can produce significant learning gains. Students are doing the preliminary cognitive work to gain knowledge and comprehension outside of class, then focusing on the advanced cognitive work on application, analysis, synthesis, and evaluation in class. However, practically its application is quite challenging due to the limited...
A self-contained cartridge and an integrated instrument for the automated molecular testing are described. The proposed cylindrical cartridge consists of multiple chambers containing all necessary reagents such as specimens, lysis, wash, and elution buffers. The system provides a chain of automatic processes for the molecular test of sample preparation, amplification, and detection. Sample preparation...
Increasing user acceptance remains as a critical issue to be resolved in the implementation of any new technology. This research aims to empirically distinguish the factors leading to an e-audit system acceptance in the public sector. The theoretical framework used in this study was adapted from Technology Acceptance Model (TAM), as well as external variables gathered from previous studies. In this...
Today, many of the research innovations in software visualization and comprehension are evaluated on small-scale programs in a way that avoids actual human evaluation, despite the fact that these techniques are designed to help programmers develop and understand large and complex software. The investments required to perform such human studies often outweigh the need to publish. As such, the goal...
This paper presents a novel reverse engineering technique for obtaining real-life event logs from distributed systems. This allows us to analyze the operational processes of software systems under real-life conditions, and use process mining techniques to obtain precise and formal models. Hence, the work can be positioned in-between reverse engineering and process mining. We present a formal definition,...
In software security testing, fuzz testing and symbolic execution are two main testing techniques. Fuzz testing finds program bugs by executing the target program with random inputs it generates while monitoring the execution for abnormal behaviors. Though fuzz testing is able to explore deep into a program's state space efficiently, it usually cannot guarantee the code coverage ratio in many situations...
Test coverage adequacy measures provide a widely used stopping criterion. Engineering of modern software-intensive systems emphasizes reuse. In the case that a program uses reused code or third-party components in a context that is different from the original one, some of their entities (e.g. Branches) might never be exercised, thus producing a code coverage level far from full and not meaningful...
Code coverage is one of the main metrics to measure the adequacy of a test case/suite. It has been studied a lot in academia and used even more in industry. However, a test case may cover a piece of code (no matter what coverage metric is being used) but miss its faults. In this paper, we studied several existing and standard control and data flow coverage criteria on a set of developer-written fault-revealing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.