The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In software projects, there is a data repository which contains the bug reports. These bugs are required to carefully analyse and resolve the problem. Handling these bugs humanly is extremely time consuming process, and it can result the deleying in addressing some important bugs resolutions. To overcome this problem, researchers have introduced many techniques. One of the commonly used algorithm...
The concept of Precise Point Positioning (PPP) for Global Navigation Satellite System (GNSS) technology was introduced in 1976, however it took until the 1990s for PPP to generate interest amongst the greater GNSS community. In order to evaluate the performance of PPP and its uses for CORSs Network definition, data collected from geodetic receivers belonging to permanent stations of Nigeria network...
Reliability is a software quality characteristic that refer to the probability a system will work correctly over a period of time. Reliability prediction is important as it can be used to plan deployment, maintenance and test activities. This study assesses the efficiency of several techniques in software reliability model (SRM) selection and aims to find out the possible enhancement to improve software...
Recent research has established the negative impact of facial cosmetics on the matching accuracy of automated face recognition systems. In this paper, we analyze the impact of cosmetics on automated gender and age estimation algorithms. In this regard, we consider the use of facial cosmetics for (a) gender spoofing where male subjects attempt to look like females and vice versa, and (b) age alteration...
In this work, a practical evaluation of the filtering method for weighing system is provided. The analyzed system form a part of the horticultural fruits sorting machine, which requires a fast and reliable weight measurements. Dynamic weighing of moving objects requires fast and adaptive signal processing techniques in order to guaranty a timely response. Thus, applied signal filtration technique...
Software misconfigurations are responsible for a substantial part of today's system failures, causing about one-quarter of all customer-reported issues. Identifying their root causes can be costly in terms of time and human resources. We present an approach to automatically pinpoint such defects without error reproduction. It uses static analysis to infer the correlation degree between each configuration...
Due to the increase in network attacks, anomaly detection has gained importance. In this paper, we present and investigate the idea of institutions cooperating for performing anomaly detection, i.e. institutions jointly analyzing their network traffic, in order to identify malicious attacks, using classification-based machine learning techniques. We compare the results of such a collaborative analysis...
Feature location is a program comprehension activity in which a developer inspects source code to locate the classes or methods that implement a feature of interest. Many feature location techniques (FLTs) are based on text retrieval models, and in such FLTs it is typical for the models to be trained on source code snapshots. However, source code evolution leads to model obsolescence and thus to the...
Reconstructing architectural components from existing software applications is an important task during the software maintenance cycle because either those elements do not exist or are outdated. Reverse engineering techniques are used to reduce the effort demanded during the reconstruction. Unfortunately, there is no widely accepted technique to retrieve software components from source code. Moreover,...
Software code review is a process of developers inspecting new code changes made by others, to evaluate their quality and identify and fix defects, before integrating them to the main branch of a version control system. Modern Code Review (MCR), a lightweight and tool-based variant of conventional code review, is widely adopted in both open source and proprietary software projects. One challenge that...
Confirmation bias is the human tendency to search for, collect, interpret, analyse, or recall information in a way that confirms one's prior beliefs or preferences. In this paper, we review previous research and demonstrate confirmation bias and its effect in two software engineering contexts. The first study documents that managers bias their interpretation of randomly generated project data towards...
The emerging new data types bring tremendous challenges to data mining. There is an enormous amount of high-dimensional class-imbalanced data in different fields. In this case, traditional classification methods are not appropriate because they are prone to ensure the accuracy of the majority class. Meanwhile, the curse of dimensionality makes situations more complicated. Finding a complicated classifier...
Software evolution has been extensively studied in the past decade for various properties and interesting patterns. In this work, we study the effect of evolution on branch prediction techniques. Typically for any program, at the hardware level, all dynamic branch prediction strategies learn the branch behaviors at run time and later re-use them to predict the direction of future branches. The duration...
Change in a software is crucial to incorporate defect correction and continuous evolution of requirements and technology. Thus, development of quality models to predict the change proneness attribute of a software is important to effectively utilize and plan the finite resources during maintenance and testing phase of a software. In the current scenario, a variety of techniques like the statistical...
The current traditional system of paper documents adopted by Fire Department had lead to the inability of the fire fighters to locate usable and functioning hydrants in an efficient and effective manner which can jeopardize any rescue mission. Hence, there is a need to revised the Fire Department current system and develop a new system that is much more easier, portable and also time and cost effective...
This paper describes, and illustrates using documented applications, a general framework methodology for wide-area forest and land use mapping and change detection using Synthetic Aperture Radar (SAR) remote sensing. Consideration is given to implementation of the SAR-based methodology using both commercial and free/open-source software. Our experience shows that constructing a complete processing...
According to the shadows and shading constraints in the Lambert illumination model, the paper proposes a method to detect image forgery. This method describes a multitude of constraints in shading and shadows based on the direction of the light source, by analyzing the intersection of the wedges to verify the images. The linear programming problem is employed to confine the direction and angle in...
System call analysis is a behavioral malware detection technique that is popular due to its promising detection results and ease of implementation. This study describes a system that uses system call analysis to detect malware that evade traditional defenses. The system monitors executing processes to identify compromised hosts in production environments. Experimental results compare the effectiveness...
While empowering a wide range of software engineering tasks, the traditional fine-grained software dependence (TSD) model can face great scalability challenges that hinder its applications. Many dependence abstraction approaches have been proposed, yet most of them either target very specific clients or model partial dependencies only, while others have not been fully evaluated for their accuracy...
Most of the landslide and flood prediction models require the Digital elevation Model (DEM) as the input. DEM is the digital representation of topographic and manmade features located on the surface of the earth. DEM also needed in hydrologic analyses, resource management and environmental assessment and including interferometry synthetic aperture radar (InSAR) applications. The increased use of DEM...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.