The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we consider the problem of autonomous landing on a horizontally moving platform with vertical unpredictable oscillatory dynamics using a quadrotor system. The quadrotor is equipped with an external Raspberry PI as a companion computer used for communications. The task is divided in two subproblems: tracking and landing. We present the algorithms involved for the entire procedure; a PI...
Unit testing is based on the idea that units under test behave in a reproducible and deterministic way. If the unit's code is dependent on external context factors like time or location, these factors have to be controlled in order to produce meaningful results. Spaced repetition mobile learning games in which users are reminded to play at time intervals are based on previous user interaction with...
Currently, there are many tools that modify the program code of the compiled protected modules. The authors of the considered tools do not publish technique of embedding their protection system and any proofs of their tools' algorithm correctness. This article describes the technique of program module modification with algorithm preservation for the subsequent embedding a protection system. The article...
The software composition using high-granularity entities nowadays is a common practice. The process of software composition is supported by various CASE tools. First tools were made on the basis of very simple formalisms (e.g. intuitionistic propositional logic). During the years the tools evolved to more efficient ones, which are able to deal with concurrency, multiparty sessions and other advanced...
New software applications for linear multivariable system identification are presented. The incorporated algorithms use subspace-based techniques (MOESP, N4SID, or their combination) to find a standard discrete-time state-space description, and optionally the covariance matrices and Kalman predictor gain, using input and output (I/O) trajectories. For flexibility, separate applications are offered...
Determinism is a key concern in the certification of software for safety-critical systems. In this paper, we evaluate the role of determinism in certification standards, using airborne software as example. We analyze and speculate how the requirements and underlying concepts related to determinism can be adapted for Machine Learning algorithms.In addition, we systematically identify and analyze a...
We develop a cache-efficient RNA folding algorithm, ByBox, that is based on Zuker's method. Using a simple LRU cache model, we show that the traditional implementation, Zuker, of Zuker's method has a much higher number of cache misses than ByBox. Extensive experiments conducted on the Xeon E5 server show that cache efficiency translates into time and energy efficiency. Our benchmarking shows that,...
The primary motivation of much of software analytics is decision making. How to make these decisions? Should one make decisions based on lessons that arise from within a particular project? Or should one generate these decisions from across multiple projects? This work is an attempt to answer these questions. Our work was motivated by a realization that much of the current generation software analytics...
Integrated development environments (IDEs) are complex applications that integrate multiple tools for creating and manipulating software project artifacts. To improve users' knowledge and the effectiveness of usage of the available functionality, the inclusion of recommender systems into IDEs has been proposed. We present a novel IDE command recommendation algorithm that, by taking into account the...
Predicting the number of defects in software modules can be more helpful in the case of limited testing resources. The highly imbalanced distribution of the target variable values (i.e., the number of defects) degrades the performance of models for predicting the number of defects. As the first effort of an in-depth study, this paper explores the potential of using resampling techniques and ensemble...
In recent years there has been a growing interest in Internet of Thing, Big Data and Mobile Internet. With the rapid growth of the amount of data in the embedded environment, using a traditional embedded processor is hard to satisfy the requirements of big data processing. Sorting is one of the fundamental operation in data processing and is also frequently used for search, filter, feature analysis...
This work presents a case of integration of a transient stability simulation algorithm in an Automatic Disturbance Analysis software. The transient stability simulation algorithm is presented in a step by step solution of the chosen case. The algorithm is available for free download1, in order to allow others engineers to reproduce the results and to discuss the developed code. The algorithm was validated...
Finite state machines being intuitively understandable and suitable for modeling in many domains, they are adopted by many software designers. Therefore, testing systems that are modeled with state machines has received genuine attention. Among the studied testing strategies are complete round-trip paths and transition trees that cover round-trip paths in a piece wise manner. We present an empirical...
Commit messages are a valuable resource in comprehension of software evolution, since they provide a record of changes such as feature additions and bug repairs. Unfortunately, programmers often neglect to write good commit messages. Different techniques have been proposed to help programmers by automatically writing these messages. These techniques are effective at describing what changed, but are...
In order to solve the problems which existing in the software program management and control of the electric energy data acquire terminal. In this paper a method of software comparison based on MD5 algorithm is proposed. By adding MD5 algorithm to the terminal program. The measured terminal executes the instruction by the software comparison system and generated MD5 value, by comparing the MD5 value...
The article is devoted to the experience of the Russian and Soviet Fund of algorithms and programs. The fund, created more than half a century, played a noticeable role in creating a regulatory framework for requirements for replicable software. Fund experience also contributed to the development of the copyright to the software. Currently, due to the widespread use of free software, the fund performs...
Left ventricular ejection time (LVET) is an important component of systolic time intervals. It has been used as a surrogate for left ventricular contractility and stroke volume. We developed a method for the assessment of LVET from wrist cuff pulse waveforms. The waveforms are obtained from a partially inflated cuff held at the level of the heart. Each test involved acquisition of 10 second sample...
During software regression testing, the code coverage of target program is a crucial factor while we perform test case reduction and prioritization. Modified Condition/ Decision Coverage (MC/DC) is one of the most strict and high-accuracy criterion in code coverage and it is usually considered necessary for adequate testing of critical software. In the past, Hayhurst et al proposed a method to implement...
Many techniques of software vulnerability exploitation rely on deep and comprehensive analysis of vulnerable program binaries. If a copy of the vulnerable software is available to attackers, they can compose their attack scripts and payloads by studying the sample copy and launch attacks on other copies of the same software in deployment. By transforming software into different forms before deployment,...
The two-dimensional mathematical model of rheological behavior of wood in non-isothermal moisture transfer conditions which consider the medium fractal structure, available memory and spatial correlation effects was synthesized. Difference schemes of differential equations of heat and moisture transfer and visco-elastic deformation in the two-dimensional area with appropriate boundary conditions was...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.