The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper describes the development of a universal test functions generator to validate and setup the algorithms for investigating multiextremal systems characteristics. The main difference between the proposed functions and the set of known multiextremal test functions is their irregularity related to the extremes coordinate location and their respective quantitative values, since all known test...
Many services are being moved to digital environments with industry 4.0. however, But the information in the digital environment poses a great risk. Ensuring the security of information on the users of online applications is a necessity. This perspective requires safe signal processing. But it is difficult to guarantee safe signal processing for resource constrained devices. Lightweight cryptology,...
The paper explores the features of functional modeling of the process of development of control and monitoring systems, using the example of the system of energy-saving control of technological objects.
Finite state models, such as Mealy machines or state charts, are often used to express and specify protocol and software behavior. Consequently, these models are often used in verification, testing, and for assistance in the development and maintenance process. Reverse engineering these models from execution traces and log files, in turn, can accelerate and improve the software development and inform...
Design and implementation are two major aspects of the software development and the deviation between them needs to be minimized to the best extent possible. Of the many difficulties in detecting the deviation is the absence of common notation to compare the implementation artefact (code) against the design artefact. In this paper we present an approach to bridge the gap by providing a methodology...
Novel applications demand computational resources that are provided by multiprocessor systems-on-chip (MPSoCs). At the same time, they increasingly process sensitive data and incorporate security-relevant functions like encryption or authentication. This paper discusses the implications of the MPSoC technology on security. It provides an overview of hardware-oriented techniques to enhance security...
An essential attribute of the software quality is maintainability which incurs almost 60–70% of total project cost. Since software maintainability prediction is a complicated process; estimating maintainability in the prior phases of software development lifecycle (SDLC) is advantageous. Further, it helps in building economical software and improving resource planning well in advance. Software metrics...
Simulating real world applications containing many functionalities using programs tend to become very complex in structure and behaviour. Validating such programs for its correctness require correct outputs and their ability to cope with erroneous scenarios. This work proposes a methodology for the verification of such programs defined using Java, based on their design-time and run-time model, where...
University Course Timetabling Problem (UCTP) is common problem on high school and university. This problem is already solved by numerous method such as genetic algorithm, reinforcement learning algorithm, ant colony algorithm, or combination between them. Although the algorithms solved the timetabling problem, the previous researches limited discuss the pseudocode implementation only. This research...
This brief presents the SoC-FPGA implementation of the modified Nearly Optimal Sparse Fast Fourier Transform (sFFT) algorithm. The implementation was carried out by using hardware/software co-design based on software profiling that helped to find out that pseudo-random Spectral Permutation, Windowing, and Sub-Sampling (SPWS) are the signal processing operations that require most processing time in...
Recently fault injection has increasingly been used both to attack software applications, and to test system robustness. Detecting fault injection vulnerabilities has been approached with a variety of different but limited methods. This paper proposes a general process without these limitations that uses model checking to detect fault injection vulnerabilities in binaries. The efficacy of this process...
We propose a fault injection attack on Salsa20 and ChaCha stream ciphers. In these stream ciphers, the initial matrix X, which consists of constants, a key, a block counter, and a nonce, is added to the matrix X(20) process with a round function to generate a keystream. Our proposed fault injection attack skips the corresponding addition (add) instruction to obtain the matrix X or X(20) and extracts...
This paper contains presentation of the flexible control system for an autonomous UAV (unmanned air vehicle). The complete description of hardware and software solutions used to realize autonomous flight are presented in this work. Main objective of the research was to develop software which provides ease of adjustment and extendibility to drone system with different equipment. Presented system is...
At present, radio frequency identification technology has been widely used in many fields, such as data acquisition, transportation, logistics management and so on. However, the collision problem in RFID technology seriously affects the performance of RFID system. Aimed at the shortcomings of search times and traffic by the traditional binary search algorithm, this paper propose an improved binary...
The era of rapid development technology, internet can help to exchange information and search information quickly and easy, but it also has a negative effect such as plagiarism. The effect of it has easily to make similarity of document. Examine of similarity or plagiarism in documents with manual method takes a long time. The tools to check similarity of document is important thing. It can save time...
The software defined optical network (SDON) service plays an important role in the production and operation of the network system. It's important to solve the problem of how to reduce the risk and distribute the service path more rationally. However, most of the existing algorithms do not take into account service importance. In this paper, a risk balancing routing assignment mechanism based service...
Program invariant is formal description of properties that should hold at certain program location in every valid execution. It is very useful for program analysis and verification. In this paper, we introduce an abstraction interpretation approach for generating program invariant efficiently and precisely. A polynomial interval domain is proposed for representing abstract state and precise loop effect...
This paperwork proposes a more economical and efficient Local Public Transport (LPT) transit routes for Rome. Optimization of public transit will result in greater capacity and efficiency for transit users. This proposal is based on real data of the public transit network of Rome, elaborated by an Ant Colony System (ACS) algorithm. The source information has been obtained via recorded phone data of...
When analyzing programs using static program analysis, we need to determine the reachability of each possible execution path of the programs. Many static analysis tools collect constraints of each path and use SMT solvers to determine the satisfiability of these constraints. The accumulated computing time can be long if we use SMT solvers too many times. In this paper, we propose a constraint-pattern...
Test case prioritization (TCP) attempts to order test cases such that those which are more important, according to some criterion or measurement, are executed earlier. TCP has been applied in many testing situations, including, for example, regression testing. An abstract test case (also called a model input) is an important type of test case, and has been widely used in practice, such as in configurable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.