The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the Internet of Things (IoT) continues to grow, the need for lightweight cryptography intensifies. Research in this direction has presented us with novel encryption and hash algorithms that continue to decrease in circuit size at the cost of increase in execution time and relaxation in required security level. Perhaps the most resource constrained devices present in the IoT domain are RFID tags,...
The method for finding inverse element by the module is based on the stepwise addition of residue is developed in this paper. This method allows avoiding performing the complex arithmetic operations and implementing calculations on numbers much lower bit compared to the classical approach based on the Euclid's algorithm and its consequences. Analytical expressions of time complexity characteristics...
In Search based Software Engineering, well-known evolutionary algorithms are utilized to find the optimal solutions and address the configuration optimization problem for software product lines and trade off multiple often competing objectives. Previous work by Henard et al. showed the weakness of the constraint expressiveness and the optimality and speed. In this work, we propose a multi-objective...
In the open source community such as GitHub, developers usually need to find projects similar to their work, with the aim to reuse their functions and explore ideas of features that could be possibly added into their project at hand. Traditional text search engine can help detect similar resources. However, it is difficult for developers to use in open source community because a few query words cannot...
Finite state models, such as Mealy machines or state charts, are often used to express and specify protocol and software behavior. Consequently, these models are often used in verification, testing, and for assistance in the development and maintenance process. Reverse engineering these models from execution traces and log files, in turn, can accelerate and improve the software development and inform...
Bad smells are the surface indication of deeper problem into source code; therefore, they need to be identified as early as possible without compromising on the quality of the software. This lead towards the requirement of refactoring that is the process used in improving the internal attributes like maintainability of the software without affecting its external attributes. Hence, to enhance quality...
An essential attribute of the software quality is maintainability which incurs almost 60–70% of total project cost. Since software maintainability prediction is a complicated process; estimating maintainability in the prior phases of software development lifecycle (SDLC) is advantageous. Further, it helps in building economical software and improving resource planning well in advance. Software metrics...
The design of new device for electromagnetic compatibility testing — environmental shielded TEM-chamber — is considered. Diagnostic algorithms and functional structure decomposition of the chamber are presented. Tasks for a monitoring service of the chamber are indicated. The possibility of the diagnostic service implementation within a real-time operating system is considered for the chamber status...
University Course Timetabling Problem (UCTP) is common problem on high school and university. This problem is already solved by numerous method such as genetic algorithm, reinforcement learning algorithm, ant colony algorithm, or combination between them. Although the algorithms solved the timetabling problem, the previous researches limited discuss the pseudocode implementation only. This research...
This work addresses the problem of estimating the accuracy of a certain class of digital signal processing algorithms, known as linear signal transforms, when implemented on field programmable gate array (FPGA) hardware computational structure (HCS) units. A solution is provided through the formulation of a hardware development framework which uses complex multipliers and complex addition units as...
This brief presents the SoC-FPGA implementation of the modified Nearly Optimal Sparse Fast Fourier Transform (sFFT) algorithm. The implementation was carried out by using hardware/software co-design based on software profiling that helped to find out that pseudo-random Spectral Permutation, Windowing, and Sub-Sampling (SPWS) are the signal processing operations that require most processing time in...
Recently fault injection has increasingly been used both to attack software applications, and to test system robustness. Detecting fault injection vulnerabilities has been approached with a variety of different but limited methods. This paper proposes a general process without these limitations that uses model checking to detect fault injection vulnerabilities in binaries. The efficacy of this process...
We propose a fault injection attack on Salsa20 and ChaCha stream ciphers. In these stream ciphers, the initial matrix X, which consists of constants, a key, a block counter, and a nonce, is added to the matrix X(20) process with a round function to generate a keystream. Our proposed fault injection attack skips the corresponding addition (add) instruction to obtain the matrix X or X(20) and extracts...
Good quality software is a supporting factor that is important in any line of work in of society. But the software component defective or damaged resulting in reduced performance of the work, and can increase the cost of development and maintenance. An accurate prediction on software module prone defects as part of efforts to reduce the increasing cost of development and maintenance of software. An...
We propose a software-based approach to provide an efficient way for designing unit cells based on the optimization algorithm and commercial electromagnetic software. Unit cells are comprised of discretely random lattice, square sub-blocks. The approach combined binary particle swarm optimization (BPSO) and CST Microwave Studio is used to achieve the optimal arrangement of the square metal sub-blocks...
Link prediction has become an important research topic in the field of complex networks. The purpose of link prediction is to find the missing links or predict the emergence of new links that do not present currently in a complex networks. Considering that the local centrality of common neighbor nodes have an important effect on the similarity-based algorithm, but every centrality measure has its...
The era of rapid development technology, internet can help to exchange information and search information quickly and easy, but it also has a negative effect such as plagiarism. The effect of it has easily to make similarity of document. Examine of similarity or plagiarism in documents with manual method takes a long time. The tools to check similarity of document is important thing. It can save time...
Although there have lots of studies on using static code attributes to identify defective software modules, there still have many challenges. For instance, it is difficult to implement the Apriori-type algorithm to predict defects by learning from an imbalanced dataset. For more accurate and understandable defect prediction, a novel approach based on class-association rules algorithm is proposed....
When analyzing programs using static program analysis, we need to determine the reachability of each possible execution path of the programs. Many static analysis tools collect constraints of each path and use SMT solvers to determine the satisfiability of these constraints. The accumulated computing time can be long if we use SMT solvers too many times. In this paper, we propose a constraint-pattern...
Traction power supply system, as the only power source of high-speed railway, the safety and reliability of its equipment's operation are very important. The effective integration and usage of the operation data of traction power supply equipment has been a hot research topic during recent years. In order to improve the utility of equipment's operation data, it is necessary to build a comprehensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.