The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Testing of product is perform to discover or detect the errors and defects in the developed system. But testing is usually time consuming especially when complex projects are canvass. Testing of a product lead off with generation of test cases. The Test case generation are based on three parts coding, design and specification. The Specification based testing deals with generation of test cases from...
Metamorphic testing uses domain-specific properties about a program’s intended behaviour to alleviate the oracle problem. From a given set of source test inputs, a set of follow- up test inputs are generated which have some relation to the source inputs, and their outputs are compared to outputs from the source tests, using metamorphic relations. We evaluate the use of an automated test input generation...
As Convolutional Neural Networks continue to produce state of the art results, more types of data are being used to see the results that would be produced. Using the heart rate data that was collected using sensors from various subjects who consumed alcohol, we converted it from the 1D waveform into a set of spectrograms. The spectrograms were fed into two pretrained CNNs, CaffeNet and AlexNet, to...
While the network anomaly detection is essential in network operations and management, it becomes further challenging to perform the first line of detection against the exponentially increasing volume of network traffic. In this work, we develop a technique for the first line of online anomaly detection with two important considerations: (i) availability of traffic attributes during the monitoring...
The recognition system when concerned with high-security, authentication of authorized person and invalidation of an imposter is a vital task for the system. The system based on iris feature is considered as highly secure and most reliable system due to the intrinsic property of an iris. This paper presents an efficient iris recognition approach based on the fusion of modular neural network output...
The main objective of the spatial image classification is to extract information classes from a multiband raster spatial image. The network structure and number of inputs are the key factors in deciding the performance and accuracy of the traditional pixel based image classification techniques like Support Vector Machines (SVM), Artificial Neural Networks (ANN), Fuzzy logic, Decision Trees (DT) and...
In this paper, we present a new data mining framework for discovering sequence effects. In particular, we focus on the sequences consisting of actions that are taken in chronological order, like sequences of clinical procedures or marketing actions. Each sequence is associated with a binary outcome, a success or a failure. We investigate the hypothesis that certain subsequences of actions contribute...
With the ever shrinking dimension of a chip on a die, it is evident that the channels of on-chip networks (NoCs) are often exposed to logic level manufacturing faults such as stuck-at faults. The faults coercively put the networks into miscellaneous system level failures like packet corruption, misrouting, and dropping. Thus, the reliability has become a special interest. Additionally, the performance...
Today, most students are with their smartphone. In classroom, teachers often ask questions to evaluate the students' understanding on a topic. An easy-to-use interactive response system with a companion mobile app will be useful for improving the teaching and learning experience. There are some voting systems in the market. However, most of them are not convenient to use and configure, making students...
Clustering is one of the fundamental data mining procedures. Bisecting K-means (BKM) clustering has been studied to have higher computing efficiency and better clustering quality when compared with the basic Lloyd version of the K-means clustering. Elkan's method of utilizing triangle inequality significantly reduces distance calculations, and is applicable to each K-means iteration without affecting...
While the topic of validating simulation models is rich in literature, validating the environments in which models run has been poorly researched. Despite the fact that such environments have high face validity, in most of the cases there are no formal methods developed for validating them. In this project, we first distinguish between the different forms of validity, such as data, model, and environment...
This paper proposes a cluster-based, distributed scheme for on-line testing of short faults in NoC interconnects. Proposed scheme detects both intra-and inter-interconnect short faults and identifies faulty interconnect-wires at a node. Then nodes are scheduled such that the proposed scheme offers comparative lower test time. We further see that the proposed scheduling suggests same time for larger...
In this paper, we try to make an author identification of two ancient Arabic religious books dating from the 6th century: The holy Quran and the Hadith. The authorship identification process is achieved through four phases which are: documents collection, text preprocessing, features extraction and classification model building. Thus, two series of experiments are undergone and commented. The first...
Designing high-quality formative and summative assessment system are challenging quest for educators. Effective assessment system requires mastering professional knowledge and skill. The background idea of making the system is to ensure that all students receive fair treatment during the process of learning Chinese. In this study, the authors purpose the analytical concept study of multiple-choice...
Direct speaking exam by one to one interaction between an examiner and an examinee requires a lot of time and efforts. Therefore, a speaking exam needs to be automated. The purpose of this research is to develop a computer assisted (automated) speaking exam called Bingar. This application incorporates multimedia elements, i.e. texts, images, audios, and videos, is developed. Furthermore, it consists...
PT. XYZ is a company that moves in glue manufacturing. The business activities includes purchases of raw materials, manufacturing process, and finished goods sales. The company implemented OpenERP which focused on Purchase and sales modules to integrate their business processes. OpenERP implementation uses Accelerated SAP (ASAP) methodology. Initial stages in the ASAP method are preparing schedules,...
The visual comfort of human being has been gradually considered in high performance building since the higher living quality and lower energy use requirements. Good lighting layout is more and more important, especially in classroom for the students' vision. The number and location of light sources are traditionally determined by the experimented engineer or technician. However, un-precise results...
The purpose of present study was to examine the intelligence system for evaluation the multi-dimension abilities for occupational bus drivers. Intelligence system involved the cognition abilities test, visual pursuit abilities test, and tachistoscopic traffic responses test. Results of stidy showed that gender and age had significant relationships to cognitive responses and visual tracking capabilities...
The Cross-Entropy (CE) method has been designed to solve rare event simulation problems and later extended to single-objective optimization problems. In this paper, we propose a novel CE approach for multi-objective optimization and applied it to the multiobjective version of TEAM (Testing Electromagnetic Analysis Method) workshop problem 22, demonstrating promising results in terms of performance.
Preference reasoning is a central problem in decision support. There exist various ways to interpret a set of qualitative preferences. Conditional preference logics allow to deal with semantics such as optimistic, pessimistic, strong or not. In this paper, we study the complexity of the main problems in optimistic/pessimistic preference logic: undominated, consistency and dominance. We show that they...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.