The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The software of global system for mobile channel is designed. The use of global system for mobile channel will permit to improve the accuracy of unmanned aerial vehicle location coordinates.
Over the last decade, feature point descriptors such as SIFT have become indispensable tools in the computer vision community. But, the descriptor's high computational overhead becomes a significant concern when it has to be on a device with limited computational and storage resources. In order to make descriptors faster to compute and more compact, several binary descriptors such as ORB and BRISK...
Automating functional size measurement (FSM) is important for organizations needing to measure a large number of projects within a short timeframe, provided, of course, that the results automatically generated are accurate, particularly when such measurement is based on an international measurement standard. A literature review has shown that very little work has been conducted on verifying measurement...
Software metrics are not widely used and trusted, especially by senior IT management. We should not be surprised at this given that much that much published material is worthless, even dangerous. This talk is designed to alert everyone to the wide range of reasons for this state of affairs. I recommend several practical, simple steps to raise the level of professionalism, which is vital if software...
Software development organizations applying continuous process improvement, when faced with the limits of qualitative approaches, are looking into quantitative approaches to support decision making, namely for improvement of the software project estimation process. Quantitative approaches include sizing functional requirements with standards such as ISO 19761, known as the COSMIC method. But defects...
In this paper we introduce CrowdSource, a statistical natural language processing system designed to make rapid inferences about malware functionality based on printable character strings extracted from malware binaries. CrowdSource “learns” a mapping between low-level language and high-level software functionality by leveraging millions of web technical documents from StackExchange, a popular network...
As various software management activities including cost estimation and project control are conducted based on the software size measurement, achieving high accuracy in functional size measurement (FSM) is critical. Several studies examined the relation between FSM training and improvement in the accuracy of FSM. However, those studies propose comprehensive frameworks and approaches that require fundamental...
This work falls within the framework of CHAMS I project funded by IRESEN (Research Institute for Solar Energy and New Energy). Its principal objective is to develop a low cost solar field based on a new generation of Fresnel collectors. To attempt this goal, we have developed a code package for scientific computing in order to help in design of the desired solar field. This numerical tool is able...
Nowadays, online credit card transactions has become a hot spot for frauds. The amount spent by a person using his credit card can vary and there is never a particular pattern of a person's expenses. Due to this characteristic of credit card use and its fraud, traditional algorithms cannot be implemented for credit card fraud detection. We required some trial and error methods which also gained experience...
Anomaly detection holds significant promise for automating network operations and security monitoring. Many detection techniques have been proposed. To evaluate and compare such techniques requires up to date datasets, useful truth data and the ability to record the outputs of the techniques in a common format. Existing datasets for network anomaly detection are either limited / aged or lacking in...
The growing concerns of energy efficiency and performance scalability motivate research in the area of many-core embedded systems. The software development of such systems plays an important role on the system performance, while accounting for a significant part of the total energy consumption. Thus, it becomes imperative to consider the software energy consumption at early stages of the software...
Power hardware-in-the-loop (PHIL) is a developing simulation technology for the virtual prototyping of electrical systems, wherein switching power converters are controlled to represent the dynamic behavior of a simulated system at their power terminals. PHIL allows for advanced studies to be performed on system interactions by virtually coupling a realtime software simulation of electrical components...
Development of software change prediction models, based on the change histories of a software, are valuable for early identification of change prone classes. Classification of these change prone classes is vital to yield competent use of limited resources in an organization. This paper validates Artificial Immune System (AIS) algorithms for development of change prediction models using six open source...
Predicting the changes in the next release of software, during the early phases of software development is gaining wide importance. Such a prediction helps in allocating the resources appropriately and thus, reduces costs associated with software maintenance. But predicting the changes using the historical data (data of past releases) of the software is not always possible due to unavailability of...
In large-scale software projects, build code has a high level of complexity, churn rate, and defect proneness. While it is desirable to have automated tools to help developers in localizing faults in build code, it is challenging to build such tools due to the dynamic nature of build code. Existing automatic fault localization methods focus on traditional code and none of them has such support for...
Software maintenance tasks such as feature location and traceability link recovery are search-oriented. Most of the recently proposed approaches for automation of search-oriented tasks are based on a traditional text retrieval (TR) model in which documents are unstructured representations of text and queries consist only of keywords. Because source code has structure, approaches based on a structured...
Software evolves and thus developers frequently make changes to systems that are logged in version control systems. These changes are often poorly documented -- often commit logs are empty or only contain minimal information. Thus, it is often a challenge to understand why certain changes are made especially if they were introduced many months or even years ago. Understanding these changes is important...
Fault localization is a critical procedure in software development process. Previous studies based their research on the precondition that test results are conveniently acquired and 100% correct, which does not happen in the real world. In this article, we propose the concept of gamma-reliable test-suite to demonstrate the potential unreliability of test results. By modeling this unreliability using...
Spectrum-based fault localization techniques leverage coverage information to identify the faulty elements of the program via passed and failed runs. However, the effectiveness of these techniques can be affected adversely by coincidental correctness, which occurs when faulty elements are executed, but the program produces the correct output. This paper proposes a clustering-based strategy to improve...
Refactorings are behavior-preserving source code transformations. While tool support exists for (semi) automatically identifying refactoring solutions, applying or not a recommended refactoring is usually up to the software developers, who have to assess the impact that the transformation will have on their system. Evaluating the pros (e.g., the bad smell removal) and cons (e.g., side effects of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.