The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
New software applications for linear multivariable system identification are presented. The incorporated algorithms use subspace-based techniques (MOESP, N4SID, or their combination) to find a standard discrete-time state-space description, and optionally the covariance matrices and Kalman predictor gain, using input and output (I/O) trajectories. For flexibility, separate applications are offered...
Determinism is a key concern in the certification of software for safety-critical systems. In this paper, we evaluate the role of determinism in certification standards, using airborne software as example. We analyze and speculate how the requirements and underlying concepts related to determinism can be adapted for Machine Learning algorithms.In addition, we systematically identify and analyze a...
Nowadays a number of universities collect and store information about the publications of their faculties and students which is represented as a collective report. The filling of the report is actually a routine process comprising transposition of the submitted data in an aggregate table that meets the specified requirements. Like every routine work which is done manually this procedure and its result...
Maintenance is a very expensive activity in the software systems' lifecycle. The ISO 25010 standard considers it as one of its main eight characteristics. In this paper, we propose an approach to assess the maintainability characteristic by its own subcharacteristics as defined by ISO 25010, using several object oriented metrics. A set of rules is defined to capture the influence of the metrics values...
The POLCA project develops annotations on fragments of imperative code to guide program transformations for better utilization of resources. These annotations express the computational essence of the code fragments without referring to memory usage or execution time. That makes the annotations mathematical in nature such that provably correct transformations can be applied to them and the corresponding...
The goal of test suite prioritization is maximizing fault detection and code coverage rate. Several nature inspired optimization algorithms such as Swarm Intelligence (SI) have been studied for the optimization of such problems. The studies revealed the benefits of Artificial Bee Colony (ABC) over other algorithms. ABC and its variations were implemented in software testing areas, test suite prioritization...
Just-in-time (JIT) requirements drive agile teams in planning and implementing software systems. In this paper, we start with the hypothesis that performing informal verification of JIT requirements is useful. For this purpose we propose a framework for quality criteria for JIT requirements. This framework can be used by JIT teams to define 'just-enough' quality criteria. The framework also includes...
The paper is devoted to the analysis of well-known methods of Edwards elliptic curves search. The suggested method is irrationally equivalent to the elliptic curves in Weierstrass form. The practical aspects of efficient software implementation of search irrationally equivalent curves algorithm are also considered in the paper. Authors describe a proposed modified search algorithm. Software implementation...
This article has probed an innovative conversion from micromouse competition to a systematic curriculum design that integrates practice with theory. Micromouse competition is an event where small robot mice are designed to solve a 16×16 maze. The process includes multi-disciplinary knowledge such as electrical and computer engineering, mechanical engineering and algorithm design. Limited by the competition...
In this paper, we propose a method that skips the complex encoding processes of coding unit (CU) for HEVC intra frame coding. To speed-up the encoding process that recursively explore all sizes of CUs, most researchers have exploited spatial information thus far. On the other hand, the temporal correlation among frames has not been thoroughly investigated. We exploited the temporal correlation as...
Testing of image processing applications is a challenging job especially, when evaluating the correctness of output image. Generally, output images are evaluated manually by visual inspection carried out by an expert tester, which is the main hindrance in automation of testing process. Recently, statistical and metamorphic testing approaches are presented to automate output evaluation of image processing...
In this paper, we proposed a new rate control algorithm for High Efficiency Video Coding (HEVC), the latest video coding standard from the ITU/ISO. We use the information of pre-encoded 16x16 coding units (CUs) to estimate the characteristics of the largest coding unit (LCU). Based on the estimates, the proposed R -- λ model can be refined before the real encoding process. This is in...
A fast intra-mode decision algorithm for High Efficiency Video Coding Range Extension (HEVC RExt) is presented. In the HEVC RExt encoder, the encoding performance of intra-coding is better than the previous HEVC still image encoding standard. In order to use textural information of the most probable mode for intra-prediction, the probability distribution of local binary patterns is analyzed. An intra-mode...
This paper describes a Hybrid Chi-Squared methodology of Project Plan deviations identification, including those for multiple deviations in a Project Plan system. The sampling methodology was used to analyze similarity, together with a statistical optimization methodology for Chi-Squared, to improve the existing methodology used to forecast data in the Project Plan phase. The created sampling methodology...
Based on analyzing the System of Systems (SoS) Capability Gaps (CG), this paper pointed out the important missions and the major difficulties in the process of SoS capability gaps analysis. Then the overall flow of carrying out the SoS CG analysis was created and prompted to guide the relevant researchers to perform CG analysis, which mainly including recognition of capability gaps, description of...
One of the pitfalls of FPGA design is the relatively long implementation time when compared to alternative architectures, such as CPU, GPU or DSP. This time can be greatly reduced however by using tools that can generate hardware systems in the form of a hardware description language (HDL) from high-level languages such as C, C++, or Python. Such implementations can be optimized by applying special...
Nowadays, there is a huge interest regarding the use of artificial intelligence techniques. From the associated methods, the current work is focusing on particle swarm optimization (PSO) study. The authors aim to present a synthesis regarding the PSO applications within the power system field. Two issues are addressed within the paper. Firstly, the PSO parameter tuning using mathematical test functions...
MD5 and SHA-1 are the two known Hash Algorithms which are widely applied in information security. They are both developed from MD4. This paper introduces their algorithm logic in detail and their realization using C Language, and compares them through software testing, forms, etc. And finally, we draw a conclusion.
Modernizing a large legacy system is a demanding and costly process which requires a deep understanding of the systemâs architecture and its components. However legacy systems are poorly documented and they have often undergone many changes that make them deviate from their initial architectural design. Approaches for reconstructing architectural views from legacy systems and re-documenting...
The aim of the software engineering is to enhance projects that produce the needed results within limited schedule and budget. So that, software effort estimation becomes a valuable manner since it limits the problems of overestimate and underestimate for the software. Software cost estimation is the process of predicting the effort required to develop a software system. There are many estimation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.