The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Coverage analysis defines the tracing of a program by test cases. It also helps in the testing process by finding the areas of a program not exercised by a set of test cases. Introducing new test cases to increase coverage, and determine the quantitative measure of the code, which is an indirect measure of quality. Coverage analysis provides more benefit when applied to an application that makes a...
User requirements obtained through text data mining are very important to improve the competitiveness of enterprises. In this paper an algorithm of acquiring user requirements in machinery products by using text association rule is proposed. In the algorithm, the user requirement documents are represented by vector space model. The feature words matrix is obtained by transposing the documents matrix...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
Over the last decade blogs became an important part of the Web, where people can announce anything that is on their mind. Due to their high popularity blogs have great potential to mine public opinions regarding products. Such knowledge is very valuable as it could be used to adjust marketing campaigns or advertisement of products accordingly. In this paper we investigate how the blogosphere can be...
Performance regression testing detects performance regressions in a system under load. Such regressions refer to situations where software performance degrades compared to previous releases, although the new version behaves correctly. In current practice, performance analysts must manually analyze performance regression testing data to uncover performance regressions. This process is both time-consuming...
The presence of design flaws in a software system has a negative impact on the quality of the software, as they indicate violations of design practices and principles, which make a software system harder to understand, maintain, and evolve. Software defects are tangible effects of poor software quality. In this paper we study the relationship between software defects and a number of design flaws....
A method of using statistical analysis on site-sampled sphygmogram data sets and support vector machines classifier to diagnose coronary heart disease is proposed. The hemodynamic parameters derived from sphygmogram reflect the status of human cardiovascular system. Based on homodynamic parameters, the dimension reduction methods and a modified support vector machines classifier are applied to meliorate...
In functional magnetic resonance imaging (fMRI) data, activated voxels are usually very small in number and are embedded in a mass of inactive voxels. For clustering analysis, this situation generates an ill-balanced data problem among different classes of voxels. In this paper we propose a novel method to overcome the ill-balanced data problem, by reducing the number of voxels to be processed by...
RNAi is a naturally occurring, highly conserved phenomenon of RNA mediated gene silencing among the multicellular organisms. Currently, RNAi has been successfully applied in functional genomics, therapeutics and new drug target identification in mammals and other eukaryotes. The uniqueness lies in sequence specific gene knock down which made RNAi an indispensible technology. In the mechanism of RNAi,...
An iterative source-channel decoding scheme which exploits the source residual redundancies on symbol-basis is proposed. We first derive a modified BCJR algorithm based on the sectionalized code trellis for symbol decoding of the convolutional codes. This is used in conjunction with a softbit source decoder that computes the interpolative a posteriori probabilities of quantizer indexes. Simulation...
This study was aimed at investigating the factors influencing value in pursuing studies at private vocational schools and the level of such factors. The sample consisted of 379 students of 53 private vocational schools, which were selected through stratified random sampling. The instrument used for collecting the data was the questionnaire with reliability of 0.987 that consisted of three parts: Part...
Binary sequences having good aperiodic autocorrelation functions (ACFs) with low range sidelobes are required for many communication applications. However, few such good binary sequences are available having large sequence length. In this paper nondominated sorting genetic algorithm-II (NSGA-II) is used to generate biphase pulse compression codes from length 49 to 100. Pulse compression technique...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
Modeling of real world financial time series such as stock returns are very difficult, because of their inherent characteristics. ARIMA and GARCH models are frequently used in such cases. It is proven of late that, the traditional models may not produce the best results. Lot of recent literature says the successes of hybrid models. The modeling and forecasting ability of ARFIMA-FIGARCH model is investigated...
Recommender systems are widely used by companies that sell all or some of their products via the Internet. Furthermore, they are destined to take on an even more important role when their use is generalized as a Web 2.0 social service and is no longer only linked to e-commerce companies. The recommendations that a recommender system offers any given user are based on the preferences shown by a given...
A novel method of watermarking in image spatial domains is proposed in this paper. The level transformation previously proposed for embedding watermark bits into each pixel of a source image is used adaptively with estimating the resulting subjective image quality. Thus, a desired subjective quality can be achieved on the watermarked image. First, the measurements of image quality by subjective evaluations...
The issue of ownership of digital watermark is addressed in this paper. An audio watermarking scheme is presented where the biometric pattern of iris is used to generate the watermark that has a stamp of ownership. The watermark is embedded in the high-energy regions selectively in wavelet domain that makes the embedding process robust against signal processing attacks. The watermark extraction process...
Recently, the ant colony optimization (ACO) meta-heuristic has received more attention as an efficient searching method for feature selection. This paper addresses various solution representation schemes of ACO and their effectiveness with respect to whether they consider correlations between features. A generic code of ACO using on-edge representation is presented. The paper formulates the ??-component...
In this correspondence, pseudochaotic sequences with maximum length derived from one-to-one discretized tent maps is considered as a source of pseudorandom number generators. It is examined that the maximum length pseudochaotic integer and binary sequences derived from the discretized tent maps have delta-like autocorrelations as for the sequences obtained by using the corresponding continuous maps...
Usage of compressed Electrocardiography (ECG) for fast and efficient telecardiology application is crucial, as ECG signals are enormously large in size. However, conventional ECG diagnosis algorithms require the compressed ECG to be decompressed before diagnosis can be applied. This added step of decompression before performing diagnosis for every ECG packets introduces unnecessary delays, which is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.