The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, we developed rehabilitation software for SEMUL (simple exercise machine for upper limbs). SEMUL has eight software routines; however, these routines do not manage to combine quantitative evaluation with user amusement. To solve this problem, we developed training software in the form of coin-collecting software. In addition, we developed the coin-collecting software such that it was...
Software defect prediction is important for improving software quality. Defect predictors allow software test engineers to focus on defective modules. Cross-Project Defect Prediction (CPDP) uses data from other companies to build defect predictors. However, outliers may lower prediction accuracy. In this study, we propose a transfer learning based model called VAB-SVM for CPDP robust in handling outliers...
Mechatronics as an interdisciplinary field, which combines knowledge from multiple fields uses a comprehensive approach in the design of any technical object. It combines the requirements and their integration into all subsystems of the technical object. This approach, which is described by the VDI 2006 norm, can generally be used in the suggestion of regulation for the pressure pipe networks.
Case-Based Reasoning (CBR) is considered as one of the efficient methods in the area of software effort estimation because of its outstanding performance and capability of handling noisy datasets. This study examines the performance of multi-objective Particle Swarm Optimization algorithm to find the best configuration parameters for the adaptation process. Particularly, we propose a new adaptation...
In this paper we present TNT10G (multi-Terabyte trace Network Tester), an FPGA-based tool for replaying and capturing massive Ethernet traces at 10 Gb/s. The tool is capable of reproducing and storing terabytes of network traffic at line rate, even if small packets are being used. Moreover, since the design works at low level (XGMII), accuracy is better than 10 ns, and it is also possible to observe...
The paper presents a measure to improve the Tarantula spectral fault localization algorithm and solves the problems that the weight of the statements with a high-frequency coverage is significantly lower than the statements with a low-frequency coverage when Tarantula algorithm calculate the statement suspicious degrees. The improved algorithm has better discrimination when calculating the statement...
In the software development, defects affect quality and cost in an adverse way. Therefore, various studies have been proposed defect prediction techniques. Most of current defect prediction approaches use past project data for building prediction models. That is, these approaches are difficult to apply new development projects without past data. In this study, we focus on the cross project prediction...
Static analysis tools such as bug pattern tools are useful to detect bugs early in software development. However, existing tools sometimes yield so many warnings that developers tend to ignore such warnings. To deal with this problem, we propose a gamified tool for motivating developers to remove such warnings. Our tool employs the gamification technique that calculates points by counting removed...
Mutation analysis is often used to compare the effectiveness of different test suites or testing techniques. One of the main assumptions underlying this technique is the Competent Programmer Hypothesis, which proposes that programs are very close to a correct version, or that the difference between current and correct code for each fault is very small. Researchers have assumed on the basis of the...
BACKGROUND: Several studies in software effort estimation have found that it can be effective to use a window of recent projects as training data for building an effort estimation model. The previous studies evaluated the use of a window with popular estimation models: linear regression (LR) and estimation by analogy (EbA). Many effort estimation models have been proposed, and the generality of windowing...
In this paper, we consider second order elliptic ODE eigen problems on general grids. We construct an efficient algorithm for computing the eigen value by using weighted mean combination of the linear finite element method and corresponding 2nd-order finite difference method. We first take the arithmetic mean of the two methods. Then we compute the quasi-optimal combined parameters for different eigen...
We address a classification method for motor imagery tasks-based brain computer interface (BCI). The wavelet coefficients are used to extract the features from the motor imagery electroencephalographic (EEG) signals and the k-nearest neighbor classifier is applied to classify the pattern of left or right hand imagery movement and rest. The performance of the proposed method is evaluated using EEG...
Appearing social networks these days, the capacity of produced information has an increasing growing. The usual learning techniques don't have an efficient performance and the need of utilizing increasing learning methods is seen as a necessary factor. In mining the text in social networks we can see that text mining and social analyzing in texts are new topics in data analyzing which are considered...
Appearing social networks these days, the capacity of produced information has an increasing growing. The usual learning techniques don't have an efficient performance and the need of utilizing increasing learning methods is seen as a necessary factor. In mining the text in social networks we can see that text mining and social analyzing in texts are new topics in data analyzing which are considered...
Digital Elevation Model (DEM) is a numerical representation of topography and is made up of equal-sized grid cells, each with a value of elevation. The DEMs that were generated from the spot heights by general interpolation techniques namely Inverse Distance Weighted (IDW), Kriging, Topo to Raster, Natural Neighbor (NN) and Spline approaches have been compared. The relative performance of each method...
The popularity of internet along with the huge number of reviews posted daily via social media, blogs and review sites invokes the research challenges on topic or aspect based analysis. In the recent years, it also has become a challenging task to mine opinions with respect to the aspects from the available unstructured and noisy data. In this paper, we present a novel approach to identify the key...
An increasing interest in energy-efficiency combined with the decreasing cost of embedded networked sensors is lowering the cost of outlet-level metering. If these trends continue, new buildings in the near future will be able to install “smart” outlets, which monitor and transmit an outlets power usage in real time, for nearly the same cost as conventional outlets. One problem with the pervasive...
Metamorphic virus detection is one of the most challenging tasks of antivirus software and the most difficult ones are among known viruses. In this article we have used Bayesian network to recognize these kinds of viruses. The body of these virusesis made of assembly codes. At first opcodes are extracted as 1-gram from virus body, these opcodes are known as the characteristics of Bayesian network...
This paper has discuss the image processing of aerial photograph acquired from unmanned aerial imagery capturing system (UAiCs) in generating a digital orthophoto and digital elevation model of a small catchment. The purpose of the study is to produce a recent digital elevation model of the study area which comprise of terrain and water bodies particularly in depicting river water level during rainy...
A 3D motion control system is designed and constructed to position the manipulating microprobe of an ultrasonic micro/nano manipulator. It is composed of a computer, controller, 3-DOF platform, jig, ultrasonic transducer and manipulating microprobe. The controller utilizes the STM32F103RBT6, which receives the instruction from a computer (via serial port communication), to drive the stepping motors...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.