The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Fault Tolerance is an ability of computer software to continue its normal operation despite the presence of system or hardware faults. Most companies are moving towards a microservices-based architecture where complex applications are developed with a suite of small services, each of which communicates using some common protocols like Hypertext Transfer Protocol (HTTP). While this architecture...
Testing software based on symbolic execution is a promising and well-researched approach. Recently, various dynamic symbolic execution approaches have been proposed that are of interest for industrial practice. However, the corresponding tools are typically not directly usable on model-based languages that are predominantly used in the automotive sector. To this end, we use an internal software analysis...
Model-based testing is used for automatically generating test cases based on models of the system under test. The effectiveness of tests depends on the contents of these models. Therefore, we introduce a novel three-step model refinement approach. We represent test models in the form of Markov chains. First, we update state transition probabilities in these models based on usage profile. Second, we...
With the goal of extending the possibilities for practical experience in engineering tasks, the project ELLI (Excellent Teaching and Learning in Engineering Sciences) follows the idea of providing virtual and remote labs for students, teachers and even interested people from different disciplines, countries or skill levels. To integrate these labs into the existing curriculum and to get students and...
The advancement in technologies has been increasing with increase in integrating scales which allow fabricating millions of transistors on a chip. This demands the efficient testing circuit to evaluate the fault present, where the large volume of data volume needs to be tested during manufacturing and fabrication. Therefore the challenging fact arises in methodologies to achieve the test data compression...
My PhD research aims to develop a general framework for a behavior control architecture that will provide customized interaction between the robot and an elderly individual suffering from mild cognitive impairment (MCI). This framework will enable the robot to learn from past events and to adapt its behavior to the specific needs of the person that it interacts with. For this purpose, models will...
While training a model with data from a dataset, we have to think of an ideal way to do so. The training should be done in such a way that while the model has enough instances to train on, they should not over-fit the model and at the same time, it must be considered that if there are not enough instances to train on, the model would not be trained properly and would give poor results when used for...
Remotely operated vehicle (ROV) is an unmanned underwater vehicle (UUV) used for conducting underwater task to replace a human diver in the risky job. X4-ROV is a micro observation class ROV to be used mainly for visual observation of underwater structure or environment by utilizing a high definition web camera. The designed vehicle structure was aims towards portability and maneuverability in attitude...
This paper presents the development of unmanned double hull blimp for low altitude surveillance system. In this proposed design, it offers simpler construction for smaller units however may be difficult to control in turbulences. Studies on the design were employed to find the setup based on the payload limitation based on small-size prototype which to use for the applications; such as communication...
Active exploitation of the previously proposed Set Top Box testing framework has given rise to new requirements such as remote monitoring of test execution. The system described in this paper is web-based and receives periodic updates of each registered test station, thus being a real-time web application. The system displays the video output of each tested device as an MJPEG stream. The large number...
This paper investigates the generalized sequential probability ratio test (GSPRT) with multiple sensors. Focusing on the communication-constrained scenario, where sensors transmit one-bit messages to the fusion center, we propose a decentralized GSRPT based on level-triggered sampling scheme (LTS-GSPRT). The proposed LTS-GSPRT amounts to the algorithm where each sensor successively reports the decisions...
In an attempt to ensure good-quality software, there is need to test all possible inputs. Owing to the fact that the exhaustive testing is hardly feasible, many software testing approaches has been proposed. Combinatorial Interaction Testing (CIT) is very promising technique to minimize the number of test cases. Although useful, most of exiting CIT strategies and tools focus on data inputs and assume...
Since 1990's Combinatorial explosion is a crucial topic in software testing domain. In this domain the exhaustive input interaction test is not practical solution to test all software configurations for generating test cases. T-way test strategy provides a solution to overcome the problem. To date, most of the research on designing methods focus on combinations of input parameter values, where the...
One of the main difficulty faced by students after their secondary education, is in taking critical decisions regarding their academic itinerary. As a preliminary approach a web based guidance system has been proposed to help the 10th standard students to select an appropriate stream of study.
Random instruction sequence (RIS) tools continue to be the main strategy for verifying and validating chip designs. In every RIS tool, test suites are created targeted to a particular functionality and run on the design. Coverage metrics provide us one mechanism to ensure and measure the completeness and thoroughness of these test suites and create new test suites directed towards unexplored areas...
We study sequential change-point detection using sketches (or linear projections) of the high-dimensional data vectors, and present a new sketching procedure, which is based on the generalized likelihood ratio statistic. We derive theoretical approximations to two fundamental performance metrics for the sketching procedures: the average run length (ARL) and the expected detection delay (EDD), and...
We propose a new type of score function for Tardos traitor tracing codes. It is related to the recently introduced tally-based score function [28], but it utilizes more of the information available to the decoder. It does this by keeping track of sequences of symbols in the distributed codewords instead of looking at columns of the code matrix individually. We derive our new class of score functions...
The advantages of software development using Agile methodology is a well researched and documented topic. However, testing in agile software methodologies is not as well researched. The four values and twelve principles of the Agile Manifesto say nothing concrete about testing or quality assurance. An agile approach such as Scrum also doesn't talk much about Quality Assurance. It's already proven...
Nowadays all organizations tend to shift their daily business processes into web. This shifting requires from web developer's detailed knowledge about security techniques, such as Structured Query Language (SQL) injection and Cross Site Scripting Attack (XSS), otherwise the data managed and protected by web application could be exposed to not authorized parties. This paper aims to link and measure...
A new criterion is introduced for determining the order of an autoregressive model fit to time series data. The proposed technique is shown to give a consistent and asymptotically efficient order estimation. It has the benefits of the two well-known model selection techniques, the Akaike information criterion and the Bayesian information criterion. When the true order of the autoregression is relatively...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.