Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The paper uses machine learning methods to deal with the problem of reducing the cost of applying mutation testing. A method of classifying mutants of a program using structural similarity is proposed. To calculate such a similarity each mutant is firstly converted into a hierarchical graph, which represents the mutant's control flow, variables and conditions. Then using such a graph form graph kernels...
In this paper the authors present the results of research to develop the visual system for autonomous flying agent. The core elements of the vision system which were designed and implemented in the earlier stage of the project are brought together. The second aim is to show capabilities of a simulation environment designed and developed by the authors in order to enable testing of the vision systems...
Testing of software is a worthwhile aspect of software development life cycle. Effective and efficient test cases must be designed to test the software which will reduce the testing cost, time and effort. Nowadays, testing an aspect-oriented program is becoming a challenge for the testers. This paper proposes a novel approach to generate test case scenarios for an aspect oriented program derived from...
Intrusion detection system (IDS) is one of the implemented solutions against harmful attacks. Furthermore, attackers always keep changing their tools and techniques. However, implementing an accepted IDS system is also a challenging task. In this paper, several experiments have been performed and evaluated to assess various machine learning classifiers based on KDD intrusion dataset. It succeeded...
The market share of portable and loT (Internet of Things) devices has been rapidly growing over the last decade. In parallel the amount of non-volatile memories, especially flash memories, used in such devices has also increased significantly due to their low power consumption and capability of in-field programmability. Therefore, for achieving high production yield the reliability and testability...
This work reports an effective test design for memory. It realizes March algorithm employing a periodic boundary cellular automata (PBCA) structure. The irreversible single length cycle attractor cellular automata (CA), selected for the design, returns correct decision on the fault in memory even if the test logic is defective. It avoids the bit by bit comparison of memory words, practiced in the...
Graduate employability is an increasingly major concern for academic institutions and assessing student employability provides a way of linking student skills and employer business requirements. Enhancing student assessment methods for employability can improve their understanding about companies in order to get suitable company for them. So, enhanced employability prediction of student can help them...
For solving the problems of modern intelligence algorithms such as slow convergence and low precision, a new algorithm based on bionics principle has been proposed which is inspired by the foraging behavior of seven-spot ladybirds in the nature. By analyzing the bionic principle of Seven-spot ladybird Optimization(SLO), we simulate the region search pattern of predation of seven-spot ladybirds, combining...
Due to the fact that web services spread around the world, new threats are increasing. The misuse intrusion detection system is not able to provide enough protection for the security of Web Services, because it only detects formerly known attacks and cannot detect new unknown attacks. Web logs contain a lot of valuable information that is useful in preventing intrusion. In this paper, we present a...
The Hadith is one of the main sources of Islamic law beside the Qur'an and Ijma. We recognised certain false hadith since the first century of Hijra, even earlier. The effort to distinguish between the authentic and false hadith is somehow difficult in addition to the source of genuine document often releases in Arabic. That motivates the author to build a repository and its retrieval system for collection...
Several problems are rised in order to enhance the effectiveness of communication in online discussion. The similarity and repetition of comments in terms of questions in the sentences or text meanings as well as triggers the emerging of miscommunication amongst participants in a forum discussion are investigated. Moreover, some comments seems are ignored or not been touched by other participants...
In machine learning applications, there are scenarios of having no labeled training data, due to the data being rare or too expensive to obtain. In these cases, it is desirable to use readily available labeled data, that is similar to, but not the same as, the domain application of interest. Transfer learning algorithms are used to build high-performance classifiers, when the training data has different...
The following paper presents a new approach for analyzing learning style at the beginning of course. Learner styles, learning style models and existing methods to identify learning style are explained. With proper using of Item Response Theory for determining learner style, greater impact on learning experience can be achieved, such as personalized learning, effective learning as well high satisfaction...
Credit scoring is explored to assess default risk of consumer behaviors for financial institutions, banks in particular. The advanced Bayesian algorithm is proposed for credit assessment. The new trial ensembles logistic regression analysis (LRA), cluster and MLP-NN in Bayesian approach as an advanced classifier. The investigation contain evidence that Bayesian ensemble technique optimizes LRA, cluster...
Software fault prediction models are employed to optimize testing resource allocation by identifying fault-prone classes before testing phases. We apply three different ensemble methods to develop a model for predicting fault proneness. We propose a framework to validate the source code metrics and select the right set of metrics with the objective to improve the performance of the fault prediction...
Test case prioritization (TCP) attempts to order test cases such that those which are more important, according to some criterion or measurement, are executed earlier. TCP has been applied in many testing situations, including, for example, regression testing. An abstract test case (also called a model input) is an important type of test case, and has been widely used in practice, such as in configurable...
In order to improve the efficiency of policy evaluation, the paper proposes a scheme of evaluation optimization. The scheme adopts policy reordering and clustering strategies to optimize policy procession. During evaluation, the scheme proposes to merge algorithm combined with policy priority assessment, preferably selects the satisfied policies and rules to improve the matching speed. The experimental...
As an effective software testing technique, combinatorial testing has been gradually applied in various types of test practice. In this case, it is necessary to provide useful combinatorial testing tools to support the application of combinatorial testing technique on industrial scenarios, as well as the academic research for combinatorial testing technique. To this end, on the basis of the research...
In this paper, a self-adaptive least square method based on data driven is presented, in order to solve the problem of fitting data with severe outliers in motor testing system. Firstly, the mechanical properties of the motor are given, and the model of T-n curve based on the Taylor polynomial expansion approximation is designed. Secondly, the design process of the self-adaptive least-square method...
Echo state network (ESN) is a powerful tool for nonlinear system modeling. However, the random setting of structure (mainly the reservoir) may degrade its estimation accuracy. To create the optimal reservoir for a given task, a novel ESN design method based on differential evolution algorithm is proposed. Firstly, the weight matrix of reservoir is constructed via the singular value decomposition (SVD)...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.