The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the present paper we investigate a novel approach for optimal control based testing of flight control laws with respect to worst case pilot inputs, disturbances, such as wind gusts, and worst case parameter combinations. For the latter we consider parameters with fixed bounds, such as aircraft mass and statistically distributed parameters for the aerodynamic data set. In order to determine appropriate...
Innovation and optimization in software systems can occur from pre-development to post-deployment stages. Companies are increasingly reporting the use of experiments with customers in their systems in the post-deployment stage. Experiments with customers and users are can lead to a significant learning and return-on-investment. Experiments are used for both validation of manual hypothesis testing...
Knowing the execution time of test cases is importantto perform test scheduling, prioritization and progressmonitoring. This work in progress paper presents a novelapproach for predicting the execution time of test cases basedon test specifications and available historical data on previouslyexecuted test cases. Our approach works by extractingtiming information (measured and maximum execution time)for...
Accelerated degradation testing (ADT) Bayesian optimization design can determine prior distribution of model parameters by prior information, which avoiding the uncertainty to the result of design brought by assuming parameter selection arbitrarily. However, different people may have different tendencies when choosing prior distributions through the same prior information. It may result in different...
Platforms with different computation resource, e.g. CPUs and FPGAs, become one of the first choices to deploy performance-requiring embedded applications. On this technology, functionalities can be implemented either as hardware (HW) or software (SW) components. Here, we extend the MultiPar methodology to support the selection of optimal partitioning solutions with respect to system properties. We...
The commonly-used software fault localization approaches mainly utilize test coverage information and test cases execution results to calculate the suspiciousness of each program entity to identify the location of faults, namely spectrum based software fault localization (SBFL). It had been argued that such techniques are not helpful in real debugging process, since the low accuracy of localization...
In order to improve the efficiency of policy evaluation, the paper proposes a scheme of evaluation optimization. The scheme adopts policy reordering and clustering strategies to optimize policy procession. During evaluation, the scheme proposes to merge algorithm combined with policy priority assessment, preferably selects the satisfied policies and rules to improve the matching speed. The experimental...
Zero-shot recognition aims to accurately recognize objects of unseen classes by using a shared visual-semantic mapping between the image feature space and the semantic embedding space. This mapping is learned on training data of seen classes and is expected to have transfer ability to unseen classes. In this paper, we tackle this problem by exploiting the intrinsic relationship between the semantic...
As an effective software testing technique, combinatorial testing has been gradually applied in various types of test practice. In this case, it is necessary to provide useful combinatorial testing tools to support the application of combinatorial testing technique on industrial scenarios, as well as the academic research for combinatorial testing technique. To this end, on the basis of the research...
This paper presents the design, fabrication and testing of a micro-injector for precision injection of biological cells. Based on the specifications on travel range and injection speed, a single-axis translational motion mechanism is designed by using flexure mechanisms for precision motion guiding of the micro-injector. The mechanism parameters are designed and optimized to cater for the requirements...
The discrete time based transmission constraints are commonly used in transmission constrained unit commitment problems. However, the security operation requirements may be not satisfied by the solution of the discrete time based formulation for the instantaneous power flow may not be always within the secure limits. To address the problem, the paper proposes a way to revise the formulation of the...
Echo state network (ESN) is a powerful tool for nonlinear system modeling. However, the random setting of structure (mainly the reservoir) may degrade its estimation accuracy. To create the optimal reservoir for a given task, a novel ESN design method based on differential evolution algorithm is proposed. Firstly, the weight matrix of reservoir is constructed via the singular value decomposition (SVD)...
Hyper-heuristics are advanced high-level search methodologies that solve hard computational problems indirectly via low-level heuristics. Choice function based hyper-heuristics are selection and acceptance hyper-heuristics that use statistical information to rank low-level heuristics for selection. In this paper, we describe a choice function based hyper-heuristic called Pairwise Choice Function based...
Mutation Based Fault Localization(MBFL) is a fault localization technique based on mutation analysis, which precisely identifies the location of fault but incurs a high execution cost, since it needs to execute the test suite on a large amount of mutants. Reduction strategies proposed are usually regarding selecting mutation operators or sampling mutants directly, meanwhile at the cost of losing precision...
In this paper, the problem of robust minimax testing of binary composite hypothesis is considered, while the actual probability densities are located in neighborhoods characterized by the Itakura-Saito divergence. And then the existence of a saddle value condition is proved under Sion's minimax theorem. Moreover, we derive the least favorable distributions and the robust decision rule involved four...
Multifunctional information system for long remote monitoring and correction of the health state of people with the use of the advanced mobile communications, intelligent medical gadgets (navigators) and mobile applications for health control is proposed.
Recently, several methods for single image super-resolution(SISR) based on deep neural networks have obtained high performance with regard to reconstruction accuracy and computational performance. This paper details the methodology and results of the New Trends in Image Restoration and Enhancement (NTIRE) challenge. The task of this challenge is to restore rich details (high frequencies) in a high...
Covering arrays have been extensively used for software testing. Therefore, many covering array constructors have been developed. However, each constructor comes with its own pros and cons. That is, the best constructor to use typically depends on the specific application scenario at hand. To improve both the efficiency and effectiveness of covering arrays, we, in this work, present a classification-based...
As the use of low-power and low resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cyber security for the IoT through the exploration of a moving target defense to apply for limiting the time attackers...
This paper proposes a trading strategy based on a learning method to combine a set of technical trading signals. The learning employs a modified Particle Swarm Optimization to optimize the weights of signals. The set of weighted signals is then used to determine trading decisions, i.e. to buy, to sell or to hold. A trading simulation is conducted using historical daily stock prices of twenty stocks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.