The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
People often need help when filling out paper forms, because they do not fully understand the meaning of form fields. Commonly adopted solutions are referring to the form filling instructions or consulting other people. However, they are either inefficient or inconvenient. In this paper, we propose a situation-aware and interactive system, named Interact Form, to help people fill out paper forms....
Comment Analysis for food recipe preferences is to identify user comments on the food recipes to the positive or the negative comments. The proposed method is suitable for analyzing comments or opinions about food recipes by counting the polarity words of food domain. The benefit of this research is to help users to choose the preferred recipes from different food recipes. To analyze food recipes,...
Recent developments in geotechnologies provide resources to propose innovative strategies for urban and environmental management, including remote sensing data and computational resources for processing them. With the main objective of identifying urban areas of illegal occupation, this work uses WorldView-2-sensor images and the InterIMAGE, an image interpretation software, based on knowledge, under...
Anomaly detection holds significant promise for automating network operations and security monitoring. Many detection techniques have been proposed. To evaluate and compare such techniques requires up to date datasets, useful truth data and the ability to record the outputs of the techniques in a common format. Existing datasets for network anomaly detection are either limited / aged or lacking in...
Software evolves and thus developers frequently make changes to systems that are logged in version control systems. These changes are often poorly documented -- often commit logs are empty or only contain minimal information. Thus, it is often a challenge to understand why certain changes are made especially if they were introduced many months or even years ago. Understanding these changes is important...
The reliability and security of software are affected by its constant changes. For that reason, developers use change-impact analysis early to identify the potential consequences of changing a program location. Dynamic impact analysis, in particular, identifies potential impacts on concrete, typical executions. However, the accuracy (precision and recall) of dynamic impact analyses for predicting...
In the NLP world the recognizing speech as in the voice recognition and also allowing voice to serve as the "main interface between the human and the computer. This paper mainly focuses on the tools that are used to deliver how current speech recognition technology facilitates the learning part of the students, and also in what way the technology will be help to developing the advance learning...
If two or more program entities change together (i.e., co-change) frequently (i.e., in many commits) during software evolution, it is likely that the entities are related and we say that the entities are showing evolutionary coupling. Association rules have been used to express evolutionary coupling and two related measures, support and confidence, have been used to measure the strength of coupling...
Maintenance costs can be substantial for large organizations (several hundreds of programmers) with very large and complex software systems. By large we mean lines of code in the range of hundreds of thousands or millions. Our research objective is to improve the process of handling anomaly reports for large organizations. Specifically, we are addressing the problem of the manual, laborious and time...
Malware landscape has been dramatically elevated over the last decade. The main reason of the increase is that new malware variants can be produced easily using simple code obfuscation techniques. Once the obfuscation is applied, the malware can change their syntactics while preserving semantics, and bypass anti-virus (AV) scanners. Malware authors, thus, commonly use the code obfuscation techniques...
It is well-known that effective requirements analysis plays a crucial role in the quality of software systems. However, the scattered and tangled nature of certain system's concerns can hinder the proper understanding and treatment of import requirements. A key goal of prominent Aspect-Oriented Requirement Engineering (AORE) techniques, such as EA-Miner and Theme/Doc, is to support the automatic identification...
This article introduces Range Lab, a simple tool to validate the accuracy of floating-point or fixed-point computations. Given intervals for the inputs, Range Lab computes the range of the outputs of simple functions with conditionals and loops as well as a range for the round off errors arising during the computation. Hence the user not only obtains the range of the result of the computation in the...
Our research addresses the question as to whether automatically collected quantitative data about people's behavior online can be analyzed to spot patterns that indicate behaviors of interest. Based on ethnographic studies, we find that people, going about their routine work, exhibit patterns in terms of their routine online activities and work rhythms. Such patterns can be comprised of many diverse...
Part of speech (PoS) is the classification of words according to form, function, and meaning. POS tagging is an important problem and is the first step in natural language processing. POS tagging directly affect the accuracy on the next steps in the processing of natural language like syntax parsing, ambiguity of the word, and machine translation
While the software development community has put a significant effort to capture the artifacts related to a discovered vulnerability in organized repositories, much of this information is not amenable to meaningful analysis and requires a deep and manual inspection. In the software assurance community a body of knowledge that provides an enumeration of common weaknesses has been developed, but it...
In computational linguistics, word sense disambiguation is an open problem and is important in various aspects of natural language processing. However, the traditional methods using case frames and semantic primitives are not effective for solving context ambiguities that require information beyond sentences. This paper presents a new method of solving context ambiguities using a field association...
We present an empirical study to statistically analyze the equivalence of several traceability recovery methods based on Information Retrieval (IR) techniques. The analysis is based on Principal Component Analysis and on the analysis of the overlap of the set of candidate links provided by each method. The studied techniques are the Jensen-Shannon (JS) method, Vector Space Model (VSM), Latent Semantic...
The main challenge for governments worldwide is to transform their systems to deliver efficient and cost effective services through information and communication technologies. Requirements engineering is a crucial activity in system development process, especially in the development of large scale systems such as E-gov applications. Inconsistencies and terminology conflicts are hindering many E-gov...
General purpose search engines utilize a very simple view on text documents: They consider them as bags of words. It results that after indexing, the semantics of documents is lost. In this paper, we introduce a novel approach to improve the accuracy of Web retrieval. We utilize the WordNet and WordNet SenseRelate All Words Software as main tools to preserve the semantics of the sentences of documents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.