The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As software engineering researchers, we are also zealous tool smiths. Building a research prototype is often a daunting task, let alone building an industry-grade family of tools supporting multiple platforms to ensure the generalizability of results. In this paper, we give advice to academic and industrial tool smiths on how to design and build an easy-to-maintain architecture capable of supporting...
.NET platform is increasingly being used in software development industry. Many data access technologies have been developed on this platform, thus choosing a suitable technology has become a difficult task. In this paper, an empirical study on fetch performance comparison by conducting experiments on common test data set of selected data access libraries; ADO.NET, Dapper and Entity Framework Core...
Despite the popularity of Fingerprinting Localization Algorithms (FPS), general theoretical frameworks for their performance studies have rarely been discussed in the literature. In this work, after setting up an abstract model for the FPS, we show that a fingerprinting-based localization problem can be cast as a Hypothesis Testing (HT) problem and therefore various results from the HT literature...
Face recognition is a personal identification method using biometrics that is gaining the attention in this research field. The face recognition process can be done without the human and devices interaction, so it can be applied in several applications. In additions, the face recognition systems are typically implemented at different places in unconstrained environments. Hence, the study of the factors...
Atrial fibrillation (AF) is one of the most common cardiac arrhythmia and effects nearly 1–2 of every 100 persons of the population. This paper evaluates the effectiveness of Machine Learning (ML) approach to detect AF episodes. Features, determined exclusively on the basis of beat intervals, are classified with linear classifier. Performances of the proposed approach are evaluated by means of the...
In the field of civil engineering, Ground Penetrating Radar (GPR) is the most widely used method of Non-Destructive Testing (NDT). Using supervised learning methods or signal processing methods, it is possible to analyze the sub-surface defects in pavement. In this paper, we propose to use a supervised machine learning method called Support Vector Machines (SVM) to detect the presence of debondings...
A novel RRAM-based pattern recognition system with locally inhibited post-neurons is developed. The system is able to learn the whole MNIST training set (60,000 patterns). By using the system, the same post-neuron is fired by the similar patterns in the same training class, which causes the reduction of hardware cost. With the locally inhibited post-neuron, the system can achieve more than 90.73%...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
The security of modern web applications is becoming increasingly important with their growing usage. As millions of people use these services, the availability, integrity, and confidentiality are critical. This paper describes the process of penetration testing of these applications. The goal of such testing is to detect application flaws and vulnerabilities and to propose a solution to mitigate them...
When interacting with their software systems, users may have to deal with problems like crashes, failures, and program instability. Faulty software running in the field is not only the consequence of ineffective in-house verification and validation techniques, but it is also due to the complexity and diversity of the interactions between an application and its environment. Many of these interactions...
Symbolic execution is a systematic program analysis technique that has received a lot of attention in the research community. However, scaling symbolic execution continues to pose a major challenge. This paper introduces Synergise, a novel two-fold integration approach. One, it integrates distributed analysis and constraint re-use to enhance symbolic execution using feasible ranges, which allow sharing...
When writing automated unit tests, developers often deal with software artifacts that have several dependencies. In these cases, one has the possibility of either instantiating the dependencies or using mock objects to simulate the dependencies' expected behavior. Even though recent quantitative studies showed that mock objects are widely used in OSS projects, scientific knowledge is still lacking...
Software development process encompasses multiple types of and differentiated versions of artefacts during the corresponding lifecycle. These artefacts are vulnerable to artefact drift or erosion when the product being developed gets changed. As a result different artefacts are subject to differential rates of updates compared to each other. Managing the software artefacts is one of the major problems...
How to accurately estimate facial age is a difficult problem due to insufficiency of training data. In this paper, an effective approach is proposed to estimate facial age by means of extreme learning machine (ELM). In the proposed method, a set of features is randomly selected from the original features to consist of a feature subspace. Given an initial weight matrix, the training samples within...
The number of devices that are being connected by the Internet is growing rapidly and hence, safeguarding private information by incorporating hardware and software security measures has become crucial. Physically unclonable functions (PUFs) have been proposed to enable lightweight hardware security which uses the inherent manufacturing variations as a way to generate unique signatures. However, given...
Current automatic program repair techniques often produce overfitting patches. Such a patch passes the test suite but does not actually repair the bug. In this paper, we propose two techniques to address the patch overfitting problem. First, we propose an automatic repair technique that performs syntactic code search to leverage bug-related code from a code database to produce patches that are likely...
Handwritten text in any language is believed to convey a great deal of information about writers' personality and identity. Handwritten documents are frequently used as evidences in forensic tasks. Handwriting skills is learnt and developed from the early schooling stages. Research interest in behavioral biometrics was the main driving force behind the growth in research into Writer Identification...
This paper aims to experimental evaluation of different methodologies to recognize human face based on different facial expression. The face and facial images were captured locally, as the experiment is aimed to be done in India domain. The features were extracted based on two techniques, viz, Discrete Wavelet Transform (DWT) and Local Binary Pattern (LBP). The range of extracted feature is 150,300,600,1200...
Vulnerabilities in web applications are due to various factors. Failure to properly validated user input is one of the factors that led to run unauthorized code in these programs. Sqli and Xss are two common vulnerabilities in web applications, That is due to lack of proper input validation. Therefore, in this paper we study how to protect organizational websites of north khorasan in iran against...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.