The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Understanding the hydrodynamic maneuvering capabilities of our Navy's submarines is a vital aspect of submarine design and in-service life. In the Hydrodynamics Testing Branch at the Naval Surface Warfare Center, Carderock Division (NSWCCD), autonomous underwater vehicles (AUVs) that are scale models of the Navy's submarines are developed to provide high fidelity data on maneuvering characteristics...
Over the last decade several model merging approaches have been proposed. Most of these approaches focused on version control systems. We are interested in merging test models. We present a merging approach to reconcile unit test models and generate integration test models using the UML Testing Profile.
In this article, acoustics characteristics is used for testing muskmelon interior quality, sends out the tone frequency through the rap method, established the acoustics characteristic and the quality relevance of fruits and vegetables. PRO/E 4.0 is used for modeling and simulation, automation computer-controlled stroking device is made, microphone is used for receiving the signal, LABVIEW software...
In e-government evaluation of the validity of the security system, the testing and evaluation data obtained need synthetic evaluation, which will be influenced by human subjectivity and the results of the testing and evaluation will be affected accordingly. This paper presents an integrated AHP and multi-level fuzzy synthetic evaluation method to quantitative evaluation and analysis of safety data,...
Mutual interference between parallel test tasks is a well know problem of spacecraft testing systems. It results in sequential testing with very low efficiency. This paper proposed a cooperative strategy to solve this problem. By analysis of the interference patterns, spacecraft parallel conflicts are defined and a conflict detection method is given. With the conflict detection, a collaborative strategy...
Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in...
Knowledge-based Fuzzing technology successfully applies in software vulnerability mining, however, current Fuzzing technology mainly focuses on fuzzing target software based on single data sample and thus the vulnerability mining results are not stable, false negatives of vulnerability are high and the selection of data sample depends on people's analysis. To solve these problems, this paper proposes...
At INPE1 researchers and software engineers have been using Statechart-based testing for some time to test on-board satellite software. On the other hand, a group of researchers at CIFASIS2 and Flowgate Consulting have been applying Z-based testing for unit testing. Both groups started to compare their approaches and tools a year ago. What started as a comparison to share ideas and results, is now...
Recently, the studies on Computerized Adaptive Testing are very popular in Chinese Mainland. The researchers care much about details of CAT, such as the psychometric models, the methods of estimating competency, termination rules, and item selection strategies. Several Cognitive Diagnosis CATs have been designed and evaluated. As to the perspectives, more attention should be paid to differential item...
Deploying radiation portal monitors (RPMs) at U.S. ports of entry requires an understanding of an RPM system's performance at sites with a large number of RPMs. This paper describes an RPM Multi-Lane Simulator that has been designed and implemented to simulate vehicle traffic at these sites. The Simulator's flexible architecture simulates vehicle traffic with its associated radiation profiles and...
In this paper, the models which display different kinds of nondeteminsim in protocol are presented from either control flow or data flow point of view. From control flow side, the information attached is not enough for the analysis of nondeteminsim, therefore the data flow is achieved according to the description in the specification. From data flow side, data is analyzed from packet as well as field...
In order to generate self-similar network traffics, researchers designed network traffic simulation system using sequential methods to generate network traffics with self-similar property on a short time scale. But there is one difficulty in how the simulation system can generate network traffics with high accuracy on a much larger time scale. So, in this paper, we present an architecture design for...
Building information modelling (BIM) is only a tool in the procurement of a building, but it is changing the way the whole process is undertaken. Having a single model which is used by all disciplines requires a different management structure and by consequence a restructuring of the resources required to complete a project.These changes are encompassed in Integrated Practice and more recently Integrated...
Today's mobile devices have inherited many of the characteristics of desktop computing -- including the assumptions that the user's full attention and dexterity can be focused on the interface. Unfortunately, on-the-go users are impaired by their mobility and often find desktop-style Windows Icon Menu and Pointer (WIMP) interfaces difficult, if not impossible, to use while performing their primary...
The purpose of TAFT fault tolerance studies conducted at CNES is to prepare the space community for the significant evolution linked to the usage of COTS components for developing spacecraft supercomputers. CNES has patented the DMT and DT2 fault-tolerant architectures with 'light' features. The development of a DMT/DT2 testbench based on a PowerPC7448 microprocessor from e2v is presented in this...
The paper addresses the problem of creating a comprehensive fault injection environment, which integrates and improves various simulation and supplementary functions. This is illustrated with experimental results.
We have investigated a technique for recognising faces invariant of facial expressions. We apply multi-linear tensor algebra, which subsumes linear algebra, to analyse and recognise 3D face surfaces. This potent framework possesses a remarkable ability to deal with the shortcomings of principle component analysis in less constrained situations. A set of vector spaces can be used to represent the variation...
Developing sustainable urban environments is complex as it requires consideration of interacting social, economic and environmental sustain ability factors. The task is made even more difficult by the wide variety of stakeholders (e.g. planners, architects, businesses and the public) that may be involved in the process and the lack of a common language for all to understand. This paper describes a...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.