The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent past a number of researchers have proposed strategies for finding test order during Integration testing of object oriented applications while minimizing the cost of stub creation. Some researchers have used graph-based approach while others have suggested solutions using genetic algorithms. This paper presents a survey of various graph-based strategies and genetic algorithm based strategies...
Atomic-sized contacts have attracted significant attention by continuing miniaturization of nanoscale electronic components for the two past decades. In present work, the electronic transport properties of gold atomic-sized contacts are studied using the non-equilibrium Green's function technique on the density functional tight binding method for modelling the geometry dependent I-V characteristics...
Techniques for information hiding and steganography are becoming increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages is also becoming considerably more difficult. In this paper, we describe a universal approach to steganalyse the least significant bit steganography method for detecting the presence of hidden messages embedded within...
Ownership authentication of image attended a careful attention due to global availability of internet services. Illegal copying and misappropriation of digital image leads cyber crime in an epidemic form. In aforesaid regard we've already proposed different fragile color image authentication schemes which guarantees ownership of an image through embedding color watermarks into color host images. In...
`Separation of Concerns' in the field of Software Engineering has been an important issue for quite some time. And this issue is very much related to Aspect Oriented Software Development. This is so because Aspects happen to be certain concerns that get interleaved with the Core-Functionalities in such a way that they become inseparable. As a result of which the programmer, who is supposed to be concerned...
We have developed a new force measurement technique based on the random thermal motion of a nanoparticle in an optical trap. We demonstrate this method, in one-dimension, through numerical simulations and laboratory experiments. We show that computer simulations successfully recover the profile of the optical trapping force, beyond the inflection point of the trapping potential for a range of particle...
Biometrics has carved an important place in the field of identification and authentication. Identification in biometrics includes various applications like face recognition. There are scads of work done in the area of face recognition but we feel that there is not much of work has been done in the field of age determination. The age determination technique is useful to determine the age of an unknown...
A method to classify single ion channel is presented. The classes are built up by the K-means method and a generalized entropy based classifier is herein presented.
While Shamirpsilas identity-based public key cryptosystem does not need the certificates, the key escrow of userpsilas private keys is inherent in such scheme. In 2003,the concept of certificateless signature scheme was introduced. In this new paradigm, the necessity of certificates has been successfully removed and the key escrow problem does not exist. Based on the ideas of certificateless signatures...
This paper proposes a multi-agent model for the studying of the self-organization teampsilas behavior. The model is dependent on the interaction rules and the decision factors of team members. Three kinds of team members (reciprocators, cooperators and selfish) are proposed in the paper. The team members work with one of three work attitudes (diligence, average, shirking). A small-world network is...
A strong designated-verifier proxy signature scheme was proposed to protect the original signerpsilas interests. In this scheme, the verifier was designated by the original signer. The valid proxy signature generated by the proxy signer on behalf of the original signer can only be accepted by the designated verifier and no body else can be convinced about the proxy signaturespsila validity or invalidity...
In order to solve problems of semantics recognition and information extraction in the process of service composition, we proposed a Petri Net model of semantics service composition based on Ontology. Firstly, which build a described approach of semantics service composition ontology-oriented, and exploits property of WSMO to describe; Secondly,build Petri Net model of semantics service composition,...
The classification of quaternary [21s+t,3,d] codes with dges16s and without zero coordinates is reduced to the classification of quaternary [21c(3,s,t)+t,k,d] code for sges1 and 0lestles20, where c(3,s,t)les min{s, 3t} is a function of 3, s, and t. Quaternary optimal Hermitian self-orthogonal codes are characterized by systems of linear equations. Based on these two results, the complete classification...
We apply a new bootstrap statistical technique to distinguish between dasiaskillpsila and dasialuckpsila for individual funds. This methodology allows for non-normality in the idiosyncratic risk of the funds-a major issue when considering those funds which appear to be either very good or very bad performers, since these are the funds which investors are primarily interested in identifying. Our bootstrap...
In recent years, financial statement fraud of listed companies is a deleterious cancer of security market, the quality of accounting information has become focus of the whole society. Based on the empirical analysis of the annual report of China's 160 listed companies in 2006, this paper makes an empirical study on the relationship of characteristics of supervisory board and earnings quality. The...
The relationship between Leadership and Personal Initiative was explored. 255 employees and 45 superiors were surveyed by MLQ (5X), work-related self-efficacy questionnaire and personal initiative questionnaire. The results showed that leadership had close relationship with personal initiative, transformational leadership had augmentation validity based on transactional leadership in predicting personal...
Evolutionarily stable strategies (ESS) is used between species co-exist in small medium enterprise (SME) clusters. We assume that each of the potential helpers knows the otherspsila strategies in cluster in this paper. We show that the ability to observe their realizations influences the evolutionarily stable strategies (ESS) of the game. According to our results, under the partial information structure...
Government procurement is becoming a kind of important economic activity now, government procurement includes the procurement activities such as procurement mode and procurement process, it is a complex system engineering which includes commerce activity and administration activity. With the increase of government procurement operation, the management of government procurement will become very onerous...
Ontology is an explicit formal sharing conceptualization of one domain. Ontology maintenance is one of most important work during ontologypsilas development lifecycle. Cycle of concepts is one of the most common inconsistency errors in ontology. In this paper, we propose a method of eliminating direct super-class to detect cycle of concepts (EDS2DCC). This method firstly constructs oriented graphs...
Named Entities (NE) is widely used in various research areas such as machine translation, cross-language information retrieval, bilingual question answering, bilingual lexicon construction and so on. Although in recent years scientists have done great efforts to identify and translate NE, aligning named entities in bilingual documents is still a complex problem. In this paper, we propose a method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.