The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The template matching is an important technique used in pattern recognition. It aims at finding a given pattern within a frame sequence. Pearson's Correlation Coefficient (PCC) is widely used to evaluate the similarity of two images. This coefficient is computed for each image pixel, which entails a computationally very expensive process. This paper proposes an implementation of the template matching...
This paper presents the development of decision support model through the development of an information system JKP Parking servis Kragujevac. This paper is an attempt of approaching the classical methodology and modern demands of information systems for creation of effective decisions. The paper proves that the design of an information system is inseparably from the process of decision-making and...
Applications are generally written assuming a predictable and well-behaved OS. In practice, they experience unpredictable misbehavior at the OS level and across OSes: different OSes can handle network events differently, APIs can behave differently across OSes, and OSes may be compromised or buggy. This unpredictability is challenging because its sources typically manifest during deployment and are...
Static software metrics are increasingly used for assessing software quality, with multiple tools commercially available for measuring software metrics, non are based on research proven to have direct correlation with software quality. This study makes use of the results from [20] by building a tool for measuring software metrics on code to show possible weak links that are likely to fail. The tool...
Marking duplicate bugs from bug report data has the significance to reduce effort and costs of software development, maintenance and evolution. Prior work has used machine learning techniques to mark duplicate bugs but has employed incomplete knowledge which can be not very effective with the explosive growth in data volume and complexity. To redress this situation, in this paper we discover knowledge...
Electronic systems, like they are embedded in road vehicles, have to be compliant to functional safety standards like ISO 26262 [1], which limit the impacts of malfunctions for safety critical systems. ISO 26262, for instance, defines different safety levels for road vehicles, which require different means and measures for a safety compliant system and its development process like risk analysis and...
The Data Over Cable Service Interface Specification (DOCSIS) provides internet access via cable TV networks. The latest version 3.1 replaces the Physical Layer of previous DOCSIS versions. With DOCSIS 3.1, broadband cable network operators want to accelerate their networks to gigabit-per-second speeds. Enhancements include an increased bandwidth per downstream channel of up to 192MHz, Orthogonal Frequency-Division...
Indoor positioning technique has been attracting more and more attention in recent years. In this paper, we propose a multi-path profile fingerprinting localization system based on software defined radio (SDR) platform. The system initially calibrates the multi-path profile (MP) and received signal strength (RSS) information to construct a fingerprint database. In the online positioning phase, the...
In terms of capturing software requirements, the most appropriate elicitation technique must be selected, but what does this mean? This paper makes a comparison between what researchers and software engineers see as adequate technique for capturing relevant information to meet software requirements. A systematic mapping of constructs which researchers define as good techniques is presented and compared...
This work develops a new basis for evaluating the reliability benefits of diverse software, based on fault injection testing. In particular, the work investigates new forms of argumentation that could in principle be used to justify diversity as a basis for the construction of safety claims. Failure distributions of two versions of diverse software under various fault conditions are revealed separately...
We present a new algorithm for the detection of infinite loop bugs in software. Source code is not needed. The algorithm is based on autocorrelation of a program execution's branch target address sequence. We describe the implementation of the algorithm in a dynamic binary instrumentation tool, the result is lightweight enough to be applied continuously at runtime. Functionality of the tool is evaluated...
The industrial, scientific and medical band is widely used by different wireless systems. The identification of other wireless technologies in the common environment is one of the keys for correct system coexistence. In this work, a sensing platform for the detection of IEEE 802.11g and IEEE 802.15.4 primary signals in the 2.4 GHz band is proposed. The sensing platform makes use of a combined scheme...
With an ever-increasing trend of cybercrimes and incidents due to software vulnerabilities and exposures, effective and proactive vulnerability management becomes imperative in modern organisations regardless large or small. Forecasting models leveraging rich historical vulnerability disclosure data undoubtedly provide important insights to inform the cyber community with the anticipated risks. In...
Scientific and accurate cultivated quality grade results are an important guarantee for applications. However, the phenomenon of abnormal cultivated land quality is always occurred due to the error of investigation or computation, so exploring effective method to inspect abnormal data of the grade results is an important problem to be solved. Cultivated land quality grade results of Wuhan Hannan district...
Blinking has two functions: to moisturize eyes and as a defensive response to the environment and responses caused by the by mental processes. In this paper, we investigate statistical characteristics of blinks and blink rate variability of 11 subjects. The subjects are presented with a reading/memorization session preceded and followed by resting sessions. EEG signals were recorded during these sessions...
It is assumed that stability and maintainability are relating to each other. We attempt to verify and validate this assumption in object-oriented paradigm. Two candidate metrics were chosen, one for stability and one for maintainability. CSM is used in stability due to its high accuracy and wide coverage. MI was chosen for maintainability due to its clarity, ease of use and solely based on source...
By comparing the test verification method, the testability virtual verification technique based on Modelica is proposed. This paper designs the model architecture of testability virtual verification, completes implementations of the testability virtual verification and develops a software about testability virtual verification based on OpenModelica. And through a system instance, practicality and...
In this paper it is presented the second stage analysis used to determine the signal quality coefficient for vibro-acoustic signals. After successfully determining the integrity coefficient in the “first stage analysis on determining the Signal Quality Coefficient in vibro-acoustic domain-waveform integrity analysis” paper a second and deeper analysis is presented. This is a frequency domain analysis...
Satellite signal acquisition is indispensable for signal tracking and solution, and its operating time directly determines the starting speed of the software receiver. The length of Beidou code is twice of Global Positioning System (GPS) C/A code. Therefore, the acquisition time will increase with the traditional algorithm. This paper proposed a fast acquisition algorithm which decomposed the N points...
In a software development project, project management is indispensable, and effort estimation is one of the important factors on the management. To improve estimation accuracy, outliers are often removed from dataset used for estimation. However, the influence of the outliers to the estimation accuracy is not clear. In this study, we added outliers to dataset experimentally, to analyze the influence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.