The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Identification of malware is a critical problem in computer security. Many signature-identification, behavior-recognition, and reputation-based tools are available for host-based detection. However, so many files are present on systems today that checking all files is time-consuming, and better methods are needed to suggest which files are of highest priority to check in partial scans. This work developed...
We propose an efficient low-overhead methodology for screening key layouts for ultimate typing speed. It is fast and complementary to existing protocols in other ways. For equal overhead, it allows testing over a wider range of users. It is subject to potential biases, but they can be quantified and adjusted. It assumes an existing standard layout which is used as a comparator. It eliminates bias...
Finding a method which allows a computer recognition to be close to human recognition is a goal of many works in the present. We have set this goal too. According to us, we need to find function for simple recognition of shapes in the images as first step of this goal. Result of this method provides input of our system of recognition. System form depends on the result of shape recognition method....
State verification to check that the machine is in a specified state is a key technique in FSM-based conformance testing. This paper presents a special UIO sequence called CUIO which can verify as many states as possible and all transitions of FSM simultaneously. CUIO sequences are constructed by a chain algorithm which is proposed based on the traditional method of successor tree. As a result, desirable...
The Boundary Scan (BS) technology is widely used in the testing and debugging of Printed Circuit Boards (PCBs), being employed in various phases of product manufacturing and contributing to a very pronounced cost reduction when compared to alternative test techniques. Also, the BS technology is frequently used as a pedagogical tool. This technology is presented on a "Debug and Test of Electronic...
A framework is presented for industrial hygiene inspection using a remotely-operated ground vehicle with multiple sensor payloads attached to it for detecting various hazardous gases and chemicals. A control scheme and a graphical user interface between the vehicle and operator is strictly mandated for tasks requiring remote inspection. By leveraging existing navigation and path planning algorithms,...
This document represents a client server based application designed for the purpose of artefact recognition in a museum, based on photos made with the help of a mobile phone. Image recognition was conducted with the help of SURF (Speeded Up Robust Features) algorithm. Server was implemented with the usage of Netty library. Because of the parallel approach used both in the classification part and during...
The Pulserad electron beam accelerator at the University of New Mexico (UNM) was refurbished and reconfigured to provide a voltage pulse with a very fast risetime, inspired by simulation results that indicated that the magnetron output characteristic was very sensitive to the voltage risetime. The modified Pulserad has a 2 ns risetime after which it maintains a flat-top for 30 ns and is capable of...
Odometer is an instrument that functions to measure the vehicle mileage and is usually used for periodic inspection of vehicle lubricant replacement. For companies that have a large number of vehicles (for example banks, travel agencies, etc.), vehicle lubricant replacement is an important thing to do, because if it is not maintained well it may cause fatal damage to the vehicle and can even endanger...
The IEEE INFOCOM community has looked to large-scale computer networking testbeds such as PlanetLab, Emulab, and ORBIT to fulfill an essential role in the testing and validation of innovative ideas. Until very recently, testbeds such as these have existed in separate silos, each with its own authentication mechanisms and experiment support tools. The OneLab experimental facility breaks down the barriers...
The visually impaired face a number of challenges when performing their daily tasks. These tasks may be differentiating objects that have similar shapes or knowing the content of a restaurant menu. In fact, there is an increasing interest in developing effective solutions that can help the visually impaired to recognize objects. However, automatic techniques cannot answer most of the questions asked...
The quest for the essence of intelligence tailored around intelligent behaviors has been long exist in the history of human and artificial intelligence. The goal of such quest was to identify the behaviors capable of representing intelligence in human into artificial system. Based on claim that behavior is process and intelligent behaviors are intelligent processes, this paper proposes the framework...
Today, Online audits give profitable data about items and administrations to buyers. On the other hand, spammers are joining the group attempting to deceive pursuers by composing fake surveys. Past endeavors for spammer identification utilized reviewers' behaviors, text similarity, linguistics features and rating patterns. Those studies have the capacity recognize certain sorts of spammers, e.g.,...
This paper presents an advanced version of a configurable demonstrator platform developed for a new wireless local area network called TUTWLAN. TUTWLAN is targeted for limited service areas with stationary or portable terminals. Applications range from simple wireless sensors to multimedia laptops. The network supports the different Quality of Service (QoS) requirements of these applications. The...
Personalized medicine seems to be a potential solution to the known challenges facing clinical research and drug development. However, the personalized approach requires many new software tools that are able to interact with each other. These applications are often developed by academic groups as part of a research project. To be employed in clinical trials, these tools must undergo a process called...
The article presents basic concepts of GMSK modulation and ways creating signals with GMSK modulation. Special attention in the article is given description of testing receiving equipment of the automatic identification system. The design of the hardware-software complex by MATLAB is described. The correct operation of the hardware-software complex was checked by verified AIS Base Station T214. As...
Test case prioritization is a technique for selecting those test cases, which are expected to outperform for determining faulty modules earlier. Different phases of software development lifecycle represent the total software from different point of views, where priority module may vary from phase to phase. However, information from different phases of software development lifecycle is rarely introduced...
Reservation of adequate food is a major concern for many developing countries worldwide. Governments of those countries also want to meet the demand of food in the long term, especially during the period of natural calamity. For low lying region such as Bangladesh, predicting the supply of food is critical. Besides, rice productivity of Bangladesh has also changed due to varying climatic over the...
A number of efforts have been applied on human activity recognition such as face recognition and motion analysis. The major problems in recognition are: 1. Scale. 2. Shift. 3. Projection. Human Activities are identified by the pose of the body such as standing, sitting etc. and some of the activities are like the emotions, facial expressions etc. Generally, human activity recognition is achieved by...
Mobile devices are gradually taking over traditional computers' dominance in human lives. With the ever-increasing shipment of mobile apps running on these devices, their quality issues become a severe challenge. Although automated testing techniques are being widely studied, they mostly fall short of handling mobile apps' complex interactions, e.g., A finger swipe or device shaking gesture, leading...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.