The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many democratic countries choose their representatives through electronic elections. Even being a modern tool, its results can be explored maliciously. Because that, many instruments and protocols are using to protect electronic elections from attacks. This work propose a new system to improve the security in electronic elections. It is based on analyses of behavior voter to detect urns with dissonant...
Noises are inevitable when mining software archives for software fault prediction. Although some researchers have investigated the noise tolerance of existing feature selection methods, few studies focus on proposing new feature selection methods with a certain noise tolerance. To solve this issue, we propose a novel method FECS (FEature Clustering with Selection strategies). This method includes...
The reliability of a prediction model depends on the quality of the data from which it was trained. Therefore, defect prediction models may be unreliable if they are trained using noisy data. Recent research suggests that randomly-injected noise that changes the classification (label) of software modules from defective to clean (and vice versa) can impact the performance of defect models. Yet, in...
Understanding the severity of reported bugs is important in both research and practice. In particular, a number of recently proposed mining-based software engineering techniques predict bug severity, bug report quality, and bug-fix time, according to this information. Many bug tracking systems provide a field "severity" offering options such as "severe", "normal", and...
Large software development projects receive many bug reports and each of these reports needs to be triaged. An important step in the triage process is the assignment of the report to a developer. Most previous efforts towards improving bug report assignment have focused on using an activity-based approach. We address some of the limitations of activity-based approaches by proposing a two-phased location-based...
Software teams record their work progress in task repositories which often require them to encode their activities in a set of edits to field values in a form-based user interface. When others read the tasks, they must decode the schema used to write the activities down. We interviewed four software teams and found out how they used the task repository fields to record their work activities. However,...
The exponential growth of Web images has created a compelling need for innovative methods to retrieve and manage them. Automatic image annotation is an effective way for resolving this problem. In this paper, we propose a novel system that automatically annotates images by semantic corpus which is constructed by mining Web image data. It includes three parts: 1) constructing the semantic annotation...
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which represents the unique characteristic of a program, can be used for software theft detection. We propose two system call based software birthmarks: SCSSB (system call short sequence birthmark) and IDSCSB (input dependant system...
Focuses on the demand of the opening administration for the laboratory in high school, combined with the fingerprint recognition technology, this paper designs a universal laboratory management system, which contains checking on work attendance, students information management, querying, printing report sheet and course management functions. The fingerprint recognition technology is analyzed in detail...
This work addresses the segmentation of two-dimensional polyacrylamide gel electrophoresis images containing overlapping protein spots. A novel segmentation approach is proposed, which is capable of detecting spot boundaries within the region of overlap. The proposed approach is based on the observation that the spot boundaries in the overlap region are associated with local intensity minima. The...
Angiogenesis, a rigorously regulated process by which new blood vessels are formed, occurs under both physiological and pathological conditions, especially under tumor development. How to accurately quantify vessels in experimental models from angiogenesis assay is of great importance for assessing the angiogenic activity of drugs or chemical compounds. Currently, objective quantification of new vascular...
Twic and TwicPen are reading aid systems for readers of material in foreign languages. Although they include a sentence translation engine, both systems are primarily conceived to give word and expression translation to readers with a basic knowledge of the language they read. Twic has been designed for on-line material and consists of a plug-in for internet browsers communicating with our server...
Aim at the difficulties of measuring special pressure waveform, a set of data acquisition system based on AC1030 high-speed acquisition card has been developed. According to the characteristics of these pressure waveforms, we firstly design the gross structure of the acquisition system and make the matching and triggering circuits corresponding to the AC1030 acquisition card. Secondly we place a sampling...
The push toward voting via hand marked paper ballots has focused attention on the limitations of current optical scan systems. Discrepancies between human and machine interpretations of ballot markings can lead to a loss of trust in the election process. In this paper, a style-based approach to ballot recognition is proposed in which marks are recognized collectively rather than in isolation. The...
Mathematical language was developed by mathematicians in order to facilitate mathematical knowledge communication. It will be more interesting if we can use the same language for the human-machine communication. This requires an adequate representation, manipulation and recognition of the two dimensional structure of mathematical notation between human and machine. In this paper, we try to define,...
In this paper, we manage fault removal by classifying and prioritizing fault warnings reported by a static analysis tool. We present our findings from analyzing three cross-platform industrial code bases at Yahoo! totaling approximately 3.6+ MLOC. The tool found 1.2K potential fault warnings as follows: 52.29% true faults and 47.71% false/noise. The 52.29% correctly reported faults were prioritized...
A high resolution (σ≪3μm)beam telescope based on pixel sensors has been developed within the EUDET collaboration, a coordinated detector R&D programme for a future international linear collider. The telescope consists of up to six sensor planes and can be operated inside a solenoidal magnetic field of up to 1.2 T.A general purpose cooling, positioning and readout infrastructure is available. A...
The research adopts the classical visual evoked potentials paradigm, designs the stimulation program and experimental scheme base on the labview platform,and the way of visual stimulate is studied in this paper. In this way we can produce event-related potentials more effectively. On the platform in labview, achieve the event-related potential signal acquisition and processing. Explore how extract...
Source code mining algorithm should have the ability to cope with large volume of data and nominal attributes, which are two major characteristics of source code dataset. K-means algorithm is not suitable for clustering source code as it is generally difficult for the users to determine the count of clusters for a previously unknown dataset. CURD clustering algorithm works efficiently. However, it...
In this paper, we propose a sensor-based interaction for ubiquitous virtual reality (U-VR) systems that users are able to interact implicitly or explicitly with through a sensor. Due to the advances in sensor technology, we can utilize sensory data as a means of user interactions. To show the feasibility of the proposed method, we extend the Composar augmented reality (AR) authoring tool to add support...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.