The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes the design of an adaptive e- learning system with gamification elements. In the context of the increasing need to keep learners motivated among so many distractions, our project aims to help a user acquire knowledge at his own pace, in a captivating environment and as flexible as possible. To achieve that the solution focuses on the course model, adaptive questions and a reward...
Testing of Android apps is particularly challenging due to the fragmentation of the Android ecosystem in terms of both devices and operating system versions. Developers must in fact ensure not only that their apps behave as expected, but also that the apps' behavior is consistent across platforms. To support this task, we propose DiffDroid, a new technique that helps developers automatically find...
When using formal verification on critical software, an important question involves whether we have we specified enough properties for a given implementation model. To address this question, coverage metrics for property-based formal verification have been proposed. Existing metrics are usually based on mutation, where the implementation model is repeatedly modified and re-analyzed to determine whether...
New and unseen network attacks pose a great threat to the signature-based detection systems. Consequently, machine learning-based approaches are designed to detect attacks, which rely on features extracted from network data. The problem is caused by different distribution of features in the training and testing datasets, which affects the performance of the learned models. Moreover, generating labeled...
Machine learning has become one of the go-to methods for solving problems in the field of networking. This development is driven by data availability in large-scale networks and the commodification of machine learning frameworks. While this makes it easier for researchers to implement and deploy machine learning solutions on networks quickly, there are a number of vital factors to account for when...
We present CoSTest, a tool that supports the validation of Conceptual Schemas by using testing. The tool implements techniques for transforming instantiations from a Requirements Model into test case implementations by supporting a Model-driven architecture.
Model-Based Testing rises hopes of project teams of meeting both eager time and budget constraints as well as achieving better system quality by thorough testing. However, toolchain and method impose a certain skill set on the project engineer. This paper presents a possible way forward and introduces the constraints to the system architecture.
Model transformations are used to automate model manipulation in Model-Driven Engineering (MDE). In particular, model-to-model transformations produce target models (conformant to a target meta-model) from source ones (conformant to a source meta-model). While transformation correctness is crucial in MDE, developing transformations is error-prone due to the difficulty in testing them. This problem...
The article considers the architecture of an information system for automating the testing of user interfaces based on the use of Internet technologies. The general description of the system operation, the description of the main modules, the structure of the interface of the Internet resource are given.
In many research areas where the hypothetical based study is performed p-value is most commonly used statistical measure for null hypothesis testing. This p-value is deciding factor in considering the hypothesis validity for given population. Such a critical value can sometimes mislead the entire research. So there is always scope in understanding such factors in all possible directions. One of such...
This article reports on our experiences in applying formal methods to verify the security mechanisms of Android. We have developed a comprehensive formal specification of Android's permission model, which has been used to state and prove properties that establish expected behavior of the procedures that enforce the defined access control policy. We are also interested in providing guarantees concerning...
This paper discusses how to enhance the ability of text modeling in Arabic during chat sessions. Hanini and Jabari et al. modeled the text in chat sessions, but there is still a problem when using Arabic, because the Arabic language is very difficult to comprehend, has complex derivative and many ambiguities. This paper enhanced the previous study and added MADAMIRA tool to analyze the Arabic text...
There are so many applications using Crowdsource techniques in retrieving data, especially data on the traffic density of vehicles on certain roads, sample applications that already implementing the concept Crowdsourced data such as Waze, Google Maps, Bing Maps, etc. However, from that Crowdsouced data it will arise the question, whether the given data valid? Or how accurate the data provided by the...
Statistical testing based on a Markov chain usage model, as a rigorous testing method, has been around for more than two decades. Through the comprehensive application of statistical science to the testing of software, it provides audit trails of evidence to support correctness arguments for a software-intensive system as well as a decision that the system is of requisite quality for its intended...
Software fault prediction models are employed to optimize testing resource allocation by identifying fault-prone classes before testing phases. We apply three different ensemble methods to develop a model for predicting fault proneness. We propose a framework to validate the source code metrics and select the right set of metrics with the objective to improve the performance of the fault prediction...
Advanced Persistent Threat (APT) and traditional cyber attacks are different in kinds of aspects, which make the traditional defense is difficult to detect APT and protect the network. Therefore, an APT detection framework based on OpenIOC is established for the characteristics of APT system attack. Firstly, real-time attack data related to APT from massive fragmented threat data is output. Secondly,...
Log files are used in many big data applications. If the log is meant for a different purpose, the analysis and finding the best log analyzer can be very complex. Our solution is to create a generic test case framework to model and create representative log data. Related work model the behavior as state machines, but our model uses a composition of elementary acyclic graphs, thus addressing the log...
The paper includes results of the theoretical research and practical application of soft-processors testing, in particular Nios compiler of Altera SoPC Builder core. The model is based on Model-Based Testing concept. ForSyDe programming formal language is used as instrument for the development of soft-processor reference program model. Stages of model development with the follow-up analysis and comparison...
The Sequential Probability Ratio Test (SPRT) is a classical detector for problems with an unfixed sample size. Though it is optimal under some conditions, SPRT can be directly used only for a binary hypothesis with exactly known distributions. In this paper, sequential detection problem with an uncertain hypothesis distribution is considered, in which the uncertain distribution is formulated in a...
Verification takes on a much greater importance in secure and reliable System-on-Programmable-Chip (SoPC) systems. A set of verification methods, containing static analysis and configuration-level simulation, is implemented and applied to a typical SoPC system in this paper. Static analysis methods are illustrated in detail, such as Coding-Style analysis, Clocking-Domain Crossing (CDC) analysis, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.