The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software bugs contribute to the cost of ownership for consumers in a software-driven society and can potentially lead to devastating failures. Software testing, including functional testing and structural testing, remains a common method for uncovering faults and assessing dependability of software systems. To enhance testing effectiveness, the developed artifacts (requirements, code) must be designed...
In this paper, a global algorithm for human action, facial and gesture recognition is presented. The proposed algorithm depends on the extraction of multiple transform domain features and Canonical Correlation Analysis (CCA) for features fusion and classification. The proposed algorithm achieved the best reported results for facial and facial expression recognition. Excellent comparable results were...
In this paper, we propose a hypothesis testing based sequential frame synchronization technique that is robust against fluctuations and imperfect estimation of channel gain at the receiver. The proposed detector uses division in the decision rule to cancel the effect of channel gain, and therefore is called division based hypothesis testing (DHT). We show that the receiver operating characteristic...
The widely known classifier chains method for multi-label classification, which is based on the binary relevance (BR) method, overcomes the disadvantages of BR and achieves higher predictive performance, but still retains important advantages of BR, most importantly low time complexity. Nevertheless, despite its advantages, it is clear that a randomly arranged chain can be poorly ordered. We overcome...
Feature selection algorithm in intrusion detection, data mining and pattern recognition plays a crucial role, it deletes unrelated and redundant features of the original data set to the optimal feature subset which are applied to some evaluation criteria. Due to the low accuracy, the high false positive rate and the long detection time of the existing feature selection algorithm, in the paper, we...
Data mining is to extract the potentially useful knowledge and information from large amounts of data. How to dig up effective, reliable, understandable, and interesting association rules from vast amounts of information to help people make decisions has become an urgent problem to be solved. People want to use a reasonable evaluation method to measure reliability or validity of association rules,...
Recently, some statistically optimal steganalyzers are proposed based on hypothesis testing theory, in which the cover pixels are supposed to be independent. However, the independent assumption is of limited interest since redundancy exists in natural images. In this paper, using a more appropriate image model considering pixel correlation, a new steganaly-sis method for the least significant bit...
Assessment of code and design quality using Software Code Assessment tools is important for continuous improvement and monitoring of code quality in the software industry in general and for global software development in particular. Static Analysis is believed to help identify issues at an early stage in the software development life cycle (SDLC), however it is still under utilized in the industry...
Matching of repeat optical satellite images is a powerful tool for the analysis of glacier movement. Due to the rapid growth of earth observation data archives there is an increasing potential for regional glacier flow studies on a decadal scale. However, exploitation of these image collections is hindered by the currently manual pre- and post-processing steps required. Automating these steps, and...
In software testing, test oracles do not always exist or are too hard to generate, which is called "test oracle problem". Metamorphic testing (MT) provide an effective way to alleviate the problem based on metamorphic relations (MR). As a MR is satisfied by a set of test cases, it does not mean that the test cases are success. Therefore, more MRs are needed to improve the effectiveness of...
Test case prioritization for regression testing is an approach that schedules test cases to improve the efficiency of service-oriented workflow application testing. Most of existing prioritization approaches range test cases according to various metrics (e.g., Statement coverage, path coverage) in different application context. Service-oriented workflow applications orchestrate web services to provide...
This paper, utilizing correlation analysis and path analysis methods, researches the impact path of negative Internet word related to the mouth on brand equity and quality through cognitive trust concept by regarding universal consumers as study principal body. This research aims to further promote the IWOM research system in China. The empirical conclusions unveil some relationship: (1) the cognitive...
In this paper, we explore service recommendation and selection in the reusable composition context. The goal is to aid developers finding the most appropriate services in their composition tasks. We specifically focus on mashups, a domain that increasingly targets people without sophisticated programming knowledge. We propose a probabilistic matrix factorization approach with implicit correlation...
Steganography methods are proposed for the authentication of the holder's photo in an ICAO-consistent (travel) document. The embedded message is heavily influenced by the print-scan process, as the electronic image is first printed to be included into the document (or identity card) and is scanned next to constitute the reference template in an automatic face verification procedure. Two sufficiently...
A large part of Web traffic on e-commerce sites is generated not by human users but by Internet robots: search engine crawlers, shopping bots, hacking bots, etc. In practice, not all robots, especially the malicious ones, disclose their identities to a Web server and thus there is a need to develop methods for their detection and identification. This paper proposes the application of a Bayesian approach...
Recently, a variety of new measures of quantum Rényi mutual information and quantum Rényi conditional entropy have been proposed, and some of their mathematical properties explored. Here, we show that the Rényi mutual information attains operational significance in the context of composite hypothesis testing, when the null hypothesis is a fixed bipartite state and the alternate hypothesis consists...
The purpose of this analysis is to identify the most influential degradation modes in the fielded photovoltaic (PV) modules in two different climatic conditions using statistical techniques. This study is based on the measured I–V data and visual inspection data on sampled modules in five different power plants located in Arizona (hot-dry climate) and in New York (cold-dry climate). Statistical tests...
The objective of the work described is to accurately predict, as early as possible in the software lifecycle, how reliably a new software release will behave in the field. The initiative is based on a set of innovative mathematical models that have consistently shown a high correlation between key in-process metrics and our primary customer experience metric, SWDPMH (Software Defects per Million Hours...
Intrusion detection system (IDS) research field has grown tremendously in the past decade. Improving the detection rate of user to root (U2R) attack classes is an open research problem. Current IDS uses all data features to detect intrusions. Some of the features may be redundant to the detection process. The purpose of this empirical study is to identify important features to improve the detection...
RESTCONF is a management protocol, based on REST principles, currently under design at the IETF. In this paper, we present our solution for automating conformance testing of RESTCONF agents. The solution takes as input the set of YANG modules supported by the agent and automatically generates test cases based on the YANG definitions. Test cases are consumed by a test execution environment, which issues...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.