The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances in computing technologies are increasing the expectations of high accuracy and reliability from sophisticated arithmetic programs. Multi Precision Arithmetic (MPA) plays a vital role in majority of scientific applications, where the accuracy levels are more considerable and even a small mistake may misguide the downstream experimental results. Normal testing strategies rely on test...
Machine learning techniques have been earnestly explored by many software engineering researchers. At present state of art, there is no conclusive evidence on the kind of machine learning techniques which are most accurate and efficient for software defect prediction but some recent studies suggest that combining multiple machine learners, that is, ensemble learning, may be a more accurate alternative...
With the substantial growth of IT sector in the 21st century, the need for system security has also become inevitable. While the developments in the IT sector have innumerable advantages but attacks on websites and computer systems are also increasing relatively. One such attack is zero day malware attack which poses a great challenge for the security testers. The malware pen testers can use bypass...
A technique was developed by which seafloor images gathered by a hovering AUV can be mosaicked based on the vehicle position at each image. In the first phase of development, software was produced to interpret the AUV logs and output parametric files for each image. The images and their parameters are then assembled into a mosaic using GIS software. The improvements to the overall chain of mosaic...
Dynamic taint analysis (DTA) is to analyze execution paths that an attacker may use to exploit a system. Dynamic taint analysis is a method to analyze executable files by tracing information flow without source code. DTA marks certain inputs to program as tainted, and then propagates values operated with tainted inputs. Due to the increased popularity of dynamic taint analysis, there have been a few...
Effort estimation is important part of software project management. Based on applied strategy these models can be classified into groups of algorithmic and non-algorithmic models. In this study we present the model for expert effort estimation developed using data mining techniques - a multilayer perceptron (MLP) artificial neural network. The data set used in the study contains 785 records collected...
One of the most important signs of systemic disease that presents on the retina is vascular abnormalities such as in hypertensive retinopathy. Manual analysis of fundus images by human readers is qualitative and lacks in accuracy, consistency and repeatability. Present semi-automatic methods for vascular evaluation are reported to increase accuracy and reduce reader variability, but require extensive...
In this study, we compared the effectiveness of two approaches to effort estimation for organizations utilizing SCRUM. We compared SCRUM's native effort estimation method Story Points and poker planning, with effort estimation models based on COSMIC Function Points (CFP) for a selection of projects. We utilized different regression models and ANN methodology to develop estimation model from the backlog...
The surveying technique of close-range Photogrammetry is based on an approach of representation of the image forming mechanism of photography and extract spatial information through computation on photos. This research used the fundamentals of close-range Photogrammetry and is applied to model leaves, measure the geometric model of leaf length and width and compare with the conventional measurement...
The exploding volume of network traffic and expanding Quality of Service (QoS) requirements from emerging multimedia and interactive applications in the last decade demand improved internet traffic engineering techniques. In particular, traffic classification and packet marking became essential components for end-to-end QoS assurance of different traffic classes. In this paper we present WekaTIE,...
Approaches to detect fault-prone modules have been studied for a long time. As one of these approaches, we proposed a technique using a text filtering technique. We assume that bugs relate to words and context that are contained in a software module. Our technique treats a module as text information. Based on the dictionary which was learned by classifying modules which induce bugs, the bug inducing...
Land-use maps provide important data and basic information for accomplishing the optimal allocation of resources and for ensuring sustainable development. However, the land-use data interpreted from various sources of remotely sensed, low-resolution imagery are highly variable. Therefore, an analysis of these deviations in land-use data is imperative for correcting the accuracy of the land-use maps...
Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such threats is of great importance. Detecting machines infected with malware by identifying their malicious activities at the network level is an appealing approach, due to the ease of deployment. Nowadays, the most common communication channels used...
Current manual techniques of static reverse engineering are inefficient at providing semantic program understanding. We have developed an automated method to categorize applications in order to quickly determine pertinent characteristics. Prior work in this area has had some success, but a major strength of our approach is that it produces heuristics that can be reused for quick analysis of new data...
Software development in free and open source (FOSS) projects is a collective human activity. Software developers in these projects collaborate via FOSS informalisms, i.e. mailing list, bug repository and code repository. Analysing the human collaborative work of these software developers over a time period, e.g. five years, sheds light on the underlying structure and dynamics of how the software is...
This paper proposes a method to optimize the Nonorthogonal Space Distance (NoSD) based on the Particle Swarm Optimization (PSO) algorithm so as to increase estimation accuracy in analogy-based software cost estimation. NoSD is a measure of projects similarity that uses a matrix defined based on mutual information to take both feature redundancies and feature weights into distance computation. We assumes...
Bug fixing is an essential activity in the software maintenance, because most of the software systems have unavoidable defects. When new bugs are submitted, triagers have to find and assign appropriate developers to fix the bugs. However, if the bugs are at first assigned to inappropriate developers, they may later have to be reassigned to other developers. That increases the time and cost for fixing...
Applications with a Graphical User Interface (GUI) front-end are ubiquitous, thus it is of great importance to assure the quality of such systems. Model-based GUI testing provides an effective mechanism for automated testing of applications with a GUI. However, most existing model-based GUI test generation techniques produce many infeasible (i.e., Broken) event sequences which are used as test cases...
During the last three decades, there has been great progress in the field of risk management. Risk management is particularly significant when it comes to software projects. This is because software projects are exposed to various serious risks, including interaction with humans, need for continuous development and occasional lack of proper evaluation procedures. These factors, combined with the extensive...
Software build system (e.g., Make) plays an important role in compiling human-readable source code into an executable program. One feature of build system such as make-based system is that it would use a build configuration file (e.g., Make file) to record the dependencies among different target and source code files. However, sometimes important dependencies would be missed in a build configuration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.