Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Vulnerability Assessment and Penetration Testing is an important activity to improve cyber defense of systems/networks. It assist to make systems/networks vulnerability free. But it is a costly process. Premium VAPT tools are very costly. Even premium VAPT tools are not able to give 100 % accuracy to find out vulnerability. In addition to that, single VAPT tool cannot find all type of vulnerabilities...
Sybil (fake) accounts penetrate the OSN security by hosting multiple threats. Multiple social-graph-based defence schemes have been proposed till date which can effectively detect and isolate the sybils based on the ground truth of limited social connections between non-sybil (honest) and sybil users. In real world scenario, sybils may elude these defenses by imploring many social connections to real...
Graphic image is compulsory in delivering information and communication in this information technology era. Graphic applications are used widely to manipulate images in advertising industries and in animation movie productions. In order to manipulate numerous and complex images, it is required long period of time and high-performance computers. However, computers with high-performance specification...
Development of computer technology today has a major role in the development process of interaction in computer-based applications. Various innovations in creating the user experience of applications began are increasing. Augmented reality is a technology model the interaction between humans and computers by using a model of a merger between the real world with the virtual world. This development...
Cloud computing simply referred as cloud is a pay per use technology. To be simple a cloud computing by using resource allocation algorithms will allocate resource to the user as per his/her request and the user will pay only for what they use similar to electricity. There are several available services in cloud like SaaS, IaaS, PaaS, TaaS etc. We are going to concentrate on TaaS (Testing as a Service)...
To ensure software is performing as intended it can be black-box or white-box tested. Category partition is a black box, specification based testing technique which begins by identifying the parameters, categories (characteristics of parameters) and choices (acceptable values for categories). These choices are then combined to form test frames on the basis of various criteria such as base choice and...
Exhaustive testing of all possible combinations of input parameter values of a large system is impossible. Here, pairwise testing technique is often chosen owing to its effectiveness for bug detection. For pairwise testing, test cases are designed to cover all possible pair combinations of input parameter values at least once. In this paper, we investigate the adoption of Migrating Birds Optimization...
Since 1990's Combinatorial explosion is a crucial topic in software testing domain. In this domain the exhaustive input interaction test is not practical solution to test all software configurations for generating test cases. T-way test strategy provides a solution to overcome the problem. To date, most of the research on designing methods focus on combinations of input parameter values, where the...
This paper presents an approach to aid teaching of Digital Logic and Computer Organization through generation of dynamic assignment statements along with development of automatic generic checkers for those assignments using the COLDVL virtual laboratory package. Dynamically generated problem statements ensure a fairly large set of, distinct problems. The automated generic checkers allow the solutions...
In order to detect the nonlinear characteristics (flow hysteresis) of aviation fuel valves and to improve the accuracy and efficiency of fuel valve performance test, a computer aided fuel valve automatic test system is designed. The test system mainly consists of industrial control computer, data acquisition card, signal conditioning circuit and test software developed on the LabVIEW virtual instrument...
When we have an integer sequence that can be realized as the degree sequence of some graph, we say that the sequence is graphic. While almost any graph theory book describes how a sequence can be tested to see if it's graphic, surprisingly (because this testing has common applications), very little has been written about how to do it efficiently. This highlights the gap between simply knowing that...
Described in this paper is ongoing research in the development of methods to detect failures and anomalies within electronic components and printed circuit boards based upon observations of the interaction of energy applied to their physical materials and consequent radiated emissions that lie within the electromagnetic spectrum. These emissions are created using stimulus applied directly to power...
This paper presents a new concolic execution-based smart fuzzer for detecting heap-based buffer overflow in the executable codes. The proposed fuzzer executes the target program with concrete input data and calculates the constraints of the executed path symbolically. The path constraints are used to generate test data that traverse new execution paths in the target program. For each executed path,...
Keylogger is a dangerous device that can capture all word that typed on the keyboard. There are two kinds of keylogger, it is hardware and software keylogger. It is very easy to detect them because both of them already listed as a malware. There are a lot of antivirus application that can detect software keylogger and for the hardware keylogger, it is easily can be seen if there is a strange thing...
Digital Game-Based Learning (DGBL) is becoming increasingly prevalent. Its participant-players are in millions and its revenues are in billions of dollars. There is a gap in how effectiveness DGBL software is to encourage students in learning and increase their motivation in learning process. This paper aims to discuss children and teenagers' education with DGBL software and the motivation design...
Given a terrain and a query point p on or above it, we want to count the number of triangles of terrain that are visible from p. We present an approximation algorithm to solve this problem. We implement the algorithm and then we run it on the real data sets. The experimental results show that our approximation solution is very close to the real solution and compare to the other similar works, the...
A random sampling function Sample: U → {0, 1} for a key universe U is a distinguisher with probability. If for any given assignment of values v(x) to the keys x ε U, including at least one non-zero v(x) ≠ 0, the sampled sum ∑{v(x)|x ε U ^. Sample(x) = 1} is non-zero with probability at least Α...
It has been planned that the whole region of Slovak Republic's surface would be scanned, and there arose a need for storing the resulting data and making it publicly available. For this purpose, a scalable file-based database system for storing and accessing a large amount of geographic point cloud data was developed. The principle of the system was tested and proved to be sufficient in most situations,...
Students in engineering are well trained in solving specified problems, but some have trouble when given problems where there is more than one solution. In their professional life they are much more often confronted with open-ended problems, where there may be more than one solution, and where there may be many ways to reach each one. The goals may be vague, the problem may be underspecified, and...
Metaphors help create realities for us, especially social realities. A metaphor influences behavior; to attract and/or divide. Metaphors for education provide symbolic representations of what we intend in education; insight into the philosophy that underlines both how we educate, and what we are trying to educate. E.g., "Education as a journey" conveys a different meaning and intention than...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.