The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Extreme Learning machines (ELM) and Support Vector Machines have become two of the most widely used machine learning techniques for both classification and regression problems of recent. However the comparison of both ELM and SVM for classification and regression problems has often caught the attention of several researchers. In this work, an attempt has been made at investigating how SVM and ELM...
Load testing and cross-browser testing are ones of the web testing types particularly reliant on the support of cloud computing platforms for the implementation of TaaS. The main challenge involved in the composition of heterogeneous web application testing tools is the incompatibility of their inputs and outputs. However, the need to manually configure the tools greatly undermines the convenience...
The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally. There is a large set of software available which can be used to prevent data leak, however they fail...
Vulnerability Assessment and Penetration Testing is an important activity to improve cyber defense of systems/networks. It assist to make systems/networks vulnerability free. But it is a costly process. Premium VAPT tools are very costly. Even premium VAPT tools are not able to give 100 % accuracy to find out vulnerability. In addition to that, single VAPT tool cannot find all type of vulnerabilities...
This paper presents a new concolic execution-based smart fuzzer for detecting heap-based buffer overflow in the executable codes. The proposed fuzzer executes the target program with concrete input data and calculates the constraints of the executed path symbolically. The path constraints are used to generate test data that traverse new execution paths in the target program. For each executed path,...
A random sampling function Sample: U → {0, 1} for a key universe U is a distinguisher with probability. If for any given assignment of values v(x) to the keys x ε U, including at least one non-zero v(x) ≠ 0, the sampled sum ∑{v(x)|x ε U ^. Sample(x) = 1} is non-zero with probability at least Α...
This paper considers a problem of distributed hypothesis testing and cooperative learning. Individual nodes in a network receive noisy local (private) observations whose distribution is parameterized by a discrete parameter (hypotheses). The conditional distributions are known locally at the nodes, but the true parameter/hypothesis is not known. We consider a social (“non-Bayesian”) learning rule...
Combinatorial interaction testing (CIT) is an effective failure detection method for many types of software systems. This review discusses the current approaches CIT uses in detecting parameter interactions, the difficulties of applying it in practice, recent advances, and opportunities for future research.
Generating invariants for loops is often a grueling obstacle in formal program verification. Researchers have employed methods from formal techniques based on abstract interpretation to test-driven dynamic analysis to tackle this problem. Even though powerful techniques for generating conjunctive invariants (invariants that employ only conjunction of terms) have been developed, disjunctive invariants...
The evaluation of the students' knowledge is an essential part of the learning process. Currently, new technologies allow making on-line assessments, but this is not the favorite method for all the teachers. Specifically, written examinations are still widely used by many teachers to measure the knowledge level of their students. At the University of Vigo we have developed a platform to correct handwritten...
This paper proposes a universal system for automatic functional testing of Set-Top boxes (STB) in the form of a Starter Kit solution. The proposed testing system consists of appropriate software and hardware modules necessary to perform complete set of functional tests of the STB. Within the proposed Starter-Kit the „Synaps“ STB is used, for which the functional tests have been specifically developed...
This paper proposes a new solution for simultaneous functional verification system of multiple Set-Top Boxes based on Black Box Testing (BBT). In our work, a methodology and system is proposed, with specially developed software and hardware modules. The proposed framework for simultaneous testing for Set-Top Boxes is implemented with device under test (DUT) preview window. The proposed methodology...
This paper proposes a novel approach and system for functional verification of the Set-Top Boxes (STB) related to Conditional Access Kernel (CAK) functionality. The proposed solution is built on already existing BBT testing system with supporting audio-video capturing device, in the form of two newly developed functional device drivers. Since the CAK functionality, within the STB with a smart card,...
This paper describes a new solution for automated error free navigation through the STB menu for effective functional verification of the STB. The proposed testing solution is based on the existing BBT testing system for testing STB, by specially designed functional drivers. The proposed testing solution provides greater testing efficiency and robustness for the STB functional verification.
The theory, methods and the architecture of parallel information's analysis is presented by the form of analytical, graph and table forms of associative relations for the search, recognition, diagnosis of destructive components and the decision making in n-dimensional vector cybernetic individual space. Vector -logical processes-models of actual oriented tasks are considered. They include the diagnostic...
We present a polynomial-time deterministic algorithm for testing whether constant-read multilinear arithmetic formulae are identically zero. In such a formula each variable occurs only a constant number of times and each subformula computes a multilinear polynomial. Before our work no subexponential-time deterministic algorithm was known for this class of formulae. We also present a deterministic...
The aim of this study was to establish a set of criteria by analyzing the results obtained from non-destructive testing of the colored-clay sculptures in the Jinci Temple, Shanxi Province, China. The set of criteria were established by examining the surface fissure conditions, the total damaged and scaling areas of the sculptures. By analyzing the twenty four colored-clay sculptures, the results indicated...
This paper presents principles and results of dynamic testing of an SRAM-based FPGA using time- resolved fault injection with a pulsed laser. The synchronization setup and experimental procedure are detailed. Fault injection results obtained with a DES crypto-core application implemented on a Xilinx Virtex II are discussed.
Today's mobile devices have inherited many of the characteristics of desktop computing -- including the assumptions that the user's full attention and dexterity can be focused on the interface. Unfortunately, on-the-go users are impaired by their mobility and often find desktop-style Windows Icon Menu and Pointer (WIMP) interfaces difficult, if not impossible, to use while performing their primary...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.