The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-label classification (MLC), allowing instances to have multiple labels, has been received a surge of interests in recent years due to its wide range of applications such as image annotation and document tagging. One of simplest ways to solve MLC problems is label-power set method (LP) that regards all possible label subsets as classes. LP validates traditional multi-classification classifiers...
In this paper, we present a new data mining framework for discovering sequence effects. In particular, we focus on the sequences consisting of actions that are taken in chronological order, like sequences of clinical procedures or marketing actions. Each sequence is associated with a binary outcome, a success or a failure. We investigate the hypothesis that certain subsequences of actions contribute...
If software developers adopt test automation, the costs of development and maintenance will significantly decrease and the quality of regression testing will also increase. However, the number of test cases generally grows as the software under test evolves. It will take too much time to run all of the test cases during regression testing even though test automation is adopted. This may delay the...
The aim of this work is to propose a systematic penetration testing algorithm guided by a threat model. The use of the threat model in penetration testing ensures that all existing threats are checked and no threat is overlooked through the penetration test process. The objectives of this work are as follows: assembling a package of penetration testing tools (toolkit) to test the security of a equation...
Automated display testing for visual unpleasant and erroneous navigation sequences is an important step to preserve a high quality standard for premium vehicle manufacturers. This paper presents a novel error detection algorithm for navigation sequences based on novelty detection on motion parameters obtained from real world navigation sequences. Motion parameters are accumulated through key point...
Outlier detection or anomaly detection is an important and challenging issue in data mining, even so in the domain of energy data mining where data are often collected in large amounts but with little labeled information. This paper presents a couple of online outlier detection algorithms based on principal component analysis. Novel algorithmic treatments are introduced to build incremental PCA and...
This work describes Modified Condition/ Decision Coverage (MC/DC) criterion for performing testing of the interactions among a set of collaborating objects. This criterion is based on UML Sequence Diagrams. The sequences of Synchronized and Asynchronized messages in the sequence diagrams are used to define the code coverage goals for the family of criteria. In this paper, first we design an UML Sequence...
A transfer learning environment is characterized by a machine learning algorithm being trained with data from one domain (the source domain) and being tested on data from a different domain (the target domain). In a transfer learning scenario, the class probability of the source domain may be different from the class probability of the target domain, which is referred to as "domain class imbalance"...
In today's world, where information is vast and the journey to seek knowledge is extremely high paced and competitive, it has become imperative to identify the best learning methodologies, unique to each student. This paper discusses how psychological concepts like brain dominance and multiple intelligences can be used to cater to each student's individual needs using the concepts of machine learning,...
This paper deals with the problem of HDL (Hardware Description Language) models e-assessment in the process of determining level of students' knowledge of VHDL (VHSIC Hardware Description Language). The designed method for assessing a programming code takes into account whether student's code can be successfully compiled and whether the simulation output of student's code is the same as the reference...
In this paper, we try to make an author identification of two ancient Arabic religious books dating from the 6th century: The holy Quran and the Hadith. The authorship identification process is achieved through four phases which are: documents collection, text preprocessing, features extraction and classification model building. Thus, two series of experiments are undergone and commented. The first...
This paper proposes a new manifold learning method called "Soinnmanifold". Traditional manifold learning method needs a lot of computation and appropriate priori parameters. This has somewhat restricted the domains in which manifold learning can potentially be applied. However, with the high-dimensional inputs, our method can generate a lowdimensional manifold in the high-dimensional space...
Previous research focusing on the evaluation of transfer learning algorithms has predominantly used real-world datasets to measure an algorithm's performance. A test with a real-world dataset exposes an algorithm to a single instance of distribution difference between the training (source) and test (target) datasets. These previous works have not measured performance over a wide-range of source and...
In this paper, the problem of diagnostic strategy for multi-value attribute system is considered. Based on the principal characteristics that quasi-depth first search (QDFS) algorithm can improve the information heuristic algorithm, QDFS is used to improve the information entropy based diagnostic strategy for multi-value attribute system. Then, a new diagnostic strategy for multi-value attribute system...
One of the most exciting applications of V2X technologies, that is envisioned, is the platooning of a series of autonomous vehicles led by a manually driven vehicle. However, the realization of this application depends entirely on the efficacy of a platoon control algorithm and the communication channel amongst the platoon members. There are many different control algorithms that are being considered...
We present a methodology for algorithmic generation of test signals for thedetection and diagnosis of a variety of short and open-circuit defects in analogcircuits. Prior algorithms have focused on test generation for known short oropen defect values. This places the burden of failure coverage on accurateanalysis of observed defects in known failed parts at high cost. In this work, we optimize the...
Software updates often introduce new bugs to existing code bases. Prior regression testing tools focus mainly on test case selection and prioritization whereas symbolic execution tools only handle code changes in sequential software. In this paper, we propose the first incremental symbolic execution method for concurrent software to generate new tests by exploring only the executions affected by code...
The improvement of pattern matching algorithm is a key to improve the efficiency of network intrusion detection. Firstly, this thesis analyzes the current mainstream of single mode and multi-mode matching algorithm; then an improved multi-mode matching KR-BM2 algorithm based on KR algorithm and BM2 algorithm is proposed. BM2 algorithm using dual characters determines to move distance of the pattern...
Sequential Consistency (SC) is the most intuitivememory model for parallel programs. However, modern architectures aggressively reorder and overlap memory accesses, causing SC violations. An SC violation is virtually always abug. Most prior schemes either search the entire state spaceof a program, or use a constraint solver to find SC violations. A promising recent scheme uses active testing technique...
In the paper we present automated testing methods of physical behavior models of remote control laboratories by event streams. As a testing example of a physical model we use the elevator control project of the GOLDi-lab. We discuss the educational challenges that can be solved with the automatic input of the control event streams.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.