The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automated production systems (aPS) are complex systems with high reliability standards which can — besides through traditional testing — be ensured by verification using formal methods. In this paper we present a development process for aPS software supported by efficient formal techniques with easy-to-use specification formalisms to increase applicability in the aPS engineering domain. Our approach...
Now a days, web based applications have become intricate, popular and crucial in every organization which requires high quality and high reliability of web based application. Quality of web based applications effects security and functionalities (including functional and non-functional requirements). Web applications are complex due to its heterogeneous and distributed nature. With the increasing...
Different dynamic classifier selection techniques have been proposed in the literature to determine among diverse classifiers available in a pool which should be used to classify a test instance. The individual competence of each classifier in the pool is usually evaluated taking into account its accuracy on the neighborhood of the test instance in a validation dataset. In this work we investigate...
Issues related to verification and security are increasingly important in modern electronic systems. In particular, the huge complexity of electronic systems has led to growth in quality, reliability and security needs in several application domains as well as pressure for low cost products. There is a corresponding increasing demand for costeffective verification techniques and security solutions...
Due to ultra-low power consumption, demand of reversible logic has been increased. In this article, primary intention is to not to increase the garbage output, area and delay to introduce testable feature in reversible sequential circuit. By this proposed approach without changing the existing design, testable feature is easily introduced at reversible latch. Introducing testable feature into the...
This paper shows an EDCFG (extended differential control flow graph) to improve the accuracy of UCNs (update complexity numbers) that are utilized for the selection of existing test cases in regression testing.
Software changes are inevitable during maintenance, Object-oriented software (OOS) in particular. For change not to be performed in the “dark”, software change impact analysis (SCIA) is used. However, due to the exponential growth in the size and complexity of OOS, classes are not without faults and the existing SCIA techniques only predict change impact set. This means that a change implemented on...
Circuit camouflaging techniques have been proposed to thwart reverse engineering (RE) attacks to integrated circuits (IC). In one of the most well-known camouflaging methods, selective XOR, NAND, and NOR gates are replaced by configurable logic units which have the same appearance to the RE attackers. It is argued that a successful attack has to brute force search all the camouflaged gates' possible...
We investigate the parameters of pseudo-random number generator based on fuzzy logic (FRNG) and select the best one. The first parameter is the "size of buffer", the second parameter is the "number of membership functions for fuzzy variables in FRNG". These parameters play essential role for the FRNG and directly influence to the randomness of the output binary sequence. We investigate...
There exist various software development methodologies under agile software development method. Extreme programming (XP) is known as one of the agile development methods that has gained popularity in the recent past. Waterfall model which is termed as linear sequential development model has been the traditional model of development. Both extreme programming and waterfall focus on different aspects...
Technical debt (TD) is a concept used to describe a sub-optimal solution of a software artifact that negatively affects its comprehensibility, extendability and maintainability. As such, TD adversely affects the costs or quality associated with the artifact, which is also called interest. TD has through research been identified in all types of software artifacts, from architectural design to automated...
This paper presents a simplified automatic modulation classification system based on stepwise regression and Hierarchical Polynomial Classifier. The proposed system applies High Order Cumulants of the received signal to a polynomial network in order to calculate their second order polynomial expansion. Then, stepwise regression model is used as a feature selection system; whereas important features...
Teaching programming is an activity that becomes more and more popular. Assessment of students that attend introductory courses in programming can partly be done by presenting simple source code fragments. Students should be able to provide answer to the question: "What is the output of the given code?" When preparing the code segments, teachers should be aware of the complexity ('weight')...
Shrinking semiconductor feature sizes are giving rise to subtle defects that cause marginal circuit behavior rather than hard failures. As test and system modes of operation diverge in complex devices, marginal defects can escape production test but trigger end-system failures. Thus system-level testing (SLT) becomes imperative. But SLT adds extra cost and limits volume throughput. This paper describes...
Product platforms are well-established in many industries in order to offer a wide variety of products while realizing economies of scale on the inside for development and production. Nevertheless a study performed by Laboratory for Machine Tools and Production Engineering (WZL) of RWTH Aachen University shows that most companies do not use release management to systematically introduce technical...
Utilizing state diagram based techniques, state-transition based testing is being widely applied to software testing for the detection of software defects. The state diagrams that includes high complex design and processing can enhance the productive and positive application of state diagrams in the area of software system development. However, many traditional methods for automatic software analysis...
The aim of this work is to design and develop an online screening tool for dyslexia based on kinesthetic perception without much of manual intervention. Existing methods available for testing Dyslexia are done manually. Also these tests require psychologists and specialists who are scarce. This research aims to exploit the use of multimedia tests for screening of fine motor movements for dyslexia...
While a substantial body of prior research has investigated the form and nature of production code, comparatively little attention has examined characteristics of test code, and, in particular, test smells in that code. In this paper, we explore the relationship between production code properties (at the class level) and a set of test smells, in five open source systems. Specifically, we examine whether...
Growing number and complexity of material related regulatory regulations compel electronics manufacturers to rethink product compliance. Can your company state with confidence they can identify every substance in the final product, and from where each part was sourced, by all direct and indirect suppliers? The partly long supply chain is a challenge considering the short time and limited resources...
In this paper, we propose a hierarchical SVM framework for multiclass classification problems. Use of multiple SVMs in a hierarchical structure has been a popular approach to handle multiclass classification by Support Vector Machines which are otherwise known to two-class classifiers. Among commonly-used hierarchical structures, binary tree structured SVM has computational advantages over other techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.