The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The data mining and machine learning community is often faced with two key problems: working with imbalanced data and selecting the best features for machine learning. This paper presents a process involving a feature selection technique for selecting the important attributes and a data sampling technique for addressing class imbalance. The application domain of this study is software engineering,...
This paper presents a hybrid intelligent method to design Morphological-Rank-Linear (MRL) perceptrons to solve the Software Development Cost Estimation (SDCE) problem. The proposed method uses a modified genetic algorithm (MGA) to determine the best particular features to improve the MRL perceptron performance, as well as its initial parameters. Furthermore, for each individual of MGA, a gradient...
Sealed storage and access control are the characteristics of USB KEY integrated with smart card, a kind of USB KEY-based approach for virtual assets protection is presented. Virtual assets of users are stored in the hidden partition of USB KEY which is not able to read out, it would be displayed on the screen of USB KEY after user's PIN verified. If a PIN is blocked, it must be reloaded, it is designed...
A higher level, for the Nios II soft processor realizes the IFF encryption authentication technology is discussed in this paper. Through configuration Secure Hash Algorithm (SHA-1) on the Nios II soft processor within Altera FPGA, and communication with the secure EEPROM, an Identification Friend or Foe is completed. This method can provide secure IP protection and license management solution for...
After exploring multi-round difference feature of Serpent encryption algorithm and using the method of constructing S-boxes algebraic equations, we put forward Rectangle algebraic attack of 10-round Serpent-256. This method analyzed that 10-round Serpent-256 needed 2 × 2144 × 210 = 2155 pairs of selective plaintexts, 2155 times of 10-round encryption and 2155 times of 10-round decipher, as well as...
Neural networks are often selected as tool for software effort prediction because of their capability to approximate any continuous function with arbitrary accuracy. A major drawback of neural networks is the complex mapping between inputs and output, which is not easily understood by a user. This paper describes a rule extraction technique that derives a set of comprehensible IF-THEN rules from a...
Although many studies proved that it was possible to embed application servers on a chip with limited resources, security considerations were generally marginalized. Due to their frontal position, application servers are subject to an increasing number of threats. These vulnerabilities are actually ignored in most cases mainly because of cost constraints. This paper introduces the concept of Secure...
Combines three programs based on Vague Set application papers, we obtain a complete program of Vague preferred method. Vague proposed single value data to the data conversion formula for the similarity measures between Vague sets formula, they become the preferred program method Vague technical support. Through the optimal selection of small hydropower installed capacity of the discussion, the conclusion...
Evolutionary testing has successfully applied search based optimization algorithms to the test data generation problem. The existing works use different techniques and fitness functions. However, the used functions consider only one objective, which is, in general, related to the coverage of a testing criterion. But, in practice, there are many factors that can influence the generation of test data,...
A improved algorithm based on UMHexagonS is proposed in this paper. Experiment results show that, the improved algorithm can improve the search efficiency and reduce the search time by about 14% on average, at the same time, ensure the signal to noise ratio basically unchanged.
This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72 bytes of the initial key of AES_256, with a complexity of 2.
This paper describes a graphical method for the optimization of Quadrature Voltage Controlled Oscillators (QVCOs) based on the coupling of two LC-tank VCO. A three-dimensional phase noise analysis diagram and graphical optimization approach is presented, to optimize QVCO phase noise while satisfying design constraints such as power dissipation, tank amplitude, tuning range and start up condition....
The testing and verification technology for system HDL models, focused to the significant improvement of the quality of design components for digital systems on chips and reduction the development time (time-to-market) by using the simulation environment, testable analysis of the logical structure HDL-program and the optimal placement of assertion engine is proposed.
On the basis of interrelated researches, this essay summarizes the basic definition and classification, and provides a model which consists of six views to modeling composite connector. The center of this model is function view, with the aspect view, framework view, logic/data view, behavior view and integrated view running through, and then the above six views form a systematic whole describing and...
Aiming at the disadvantages of conventional analog DC speed adjusting in mine hoists, based on the analysis DC speed control system mathematical model, this article induces application of full digital DC speed adjusting device based on 6RA70 DC device. This article gives the drive system hardware configuration and software design. This system has performed stably, safely and economically, gaining...
Module programmer inherits and develops the Object Oriented programmer. It makes use of object technology in system design and makes further abstract of the realize process of Object Oriented programmer. Using of modules decreases repeated work, advances modularize, customization and expansibility of system. In this paper, professional software was introduced to design graphic elements which then...
Data loss incidents, where data of sensitive nature are exposed to the public, have become too frequent and have caused damages of millions of dollars to companies and other organizations. Repeatedly, information leaks occur over the Internet, and half of the time they are accidental, caused by user negligence, misconfiguration of software, or inadequate understanding of an application's functionality...
We propose an approach in the form of a light weight smart fuzzer to generate string based inputs to detect buffer overflow vulnerability in C code. The approach is based on an evolutionary algorithm which is a combination of genetic algorithm and evolutionary strategies. In this preliminary work we focus on the problem that there are constraints on string inputs that must be satisfied in order to...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
The application of network computing technology, more and more widely, its security is particularly important to the emergence of trusted computing research for the security of network computing application technology research has provided new opportunities. In this paper, the credibility of Web-based computing environment, the structure of thought and its implementation model.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.