The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Random numbers find their usefulness and utility in domains which have a significant role, sometimes even critical or obtaining some unpredictable results: Simulations based on Monte Carlo methods, simulations from mathematical modeling simulations, statistics, prime numbers generation, cryptography, spreaded spectrum communication, games, etc. In cryptography, the property of being random is fundamental...
Control systems for autonomous robots are concurrent, distributed, embedded, real-time and data intensive software systems. A real-world robot control system is composed of tens of software components. For each component providing robotic functionality, tens of different implementations may be available. The difficult challenge in robotic system engineering consists in selecting acoherent set of components,...
We introduce a bi-objective effort estimation algorithm that combines Confidence Interval Analysis and assessment of Mean Absolute Error. We evaluate our proposed algorithm on three different alternative formulations, baseline comparators and current state-of-the-art effort estimators applied to five real-world datasets from the PROMISE repository, involving 724 different software projects in total...
Scalability is a major challenge for existing behavioral log analysis algorithms, which extract finite-state automaton models or temporal properties from logs generated by running systems. In this paper we present statistical log analysis, which addresses scalability using statistical tools. The key to our approach is to consider behavioral log analysis as a statistical experiment.Rather than analyzing...
Software defect localization is an important step in the process of fixing defects and is a necessary means to improve software quality. In the process of fixing defects, it is also the most time-consuming and laborious task to accurately locate the files where the defects should be fixed. In order to clarify the research progress in the field of defect localization, we introduce the key technologies...
The continuous development of trustworthy software promotes the in-depth study of formal methods. This paper focuses on the formal derivation of algorithm based on recurrence relations. We show two examples of automated transformation processes by combining Isabelle theorem prover with Dijkstra weakest precondition method, that can avoid the error-prone and long-winded problems in manual verification...
The present-day fighter pilot is desired to have maximum awareness of his surroundings despite the excessive workload in a highly dynamic environment. So, it is necessary to provide him decision aiding tools that can help him perform the tasks without compromising on his mission. In-flight Route Replanning under High threat Air defence system is one such aid as part of the Decision Support System...
The rapid development of information technologies give rise to the big data era. In this age, large amounts of unlabeled software defect metric data at a significantly lower cost is collected. It is how to exploit the unlabeled data to predict software defect has become a hot topic during the past few years. In this paper, a novel method called chaotic and immune spectral clustering (CISC) is proposed...
Many modern systems cannot adapt themselves to changing requirements. Maintenance of these systems require a lot of expertise and cost. In recent years focusing on systems with the ability to dynamic adapt with runtime environment. One kind of these systems, are self-adaptive websites. One of the main objectives in achieving to self-adaptive is planning for choose the structure or appropriate behavior...
We propose a technique based on symbolic execution for analyzing the algorithmic complexity of programs. The technique uses an efficient guided analysis to compute bounds on the worst-case complexity (for increasing input sizes) and to generate test values that trigger the worst-case behaviors. The resulting bounds are fitted to a function to obtain a prediction of the worst-case program behavior...
In this paper, a general model is proposed for the systems that optimize the linear antenna array parameters to synthesize a desired pattern by using metaheuristic algorithms. The model consists of a masking mechanism for the pattern shaping and a modular system for the whole optimization structure. To validate the skills of the proposed model, an antenna array synthesizer software is developed and...
In the automotive industry, as the complexity of electronic control units (ECUs) increase, there is a need for the creation of models that facilitate early tests to ensure functionality, but there is little guidance on how to write these tests in order to achieve maximum coverage. Our prototype CANoe+, which builds on the CANoe and GraphWalker tools, was evaluated against CANoe with regard to coverage...
A code clone is a code fragment identical or similar to another code fragment in source code. Some of code clones are considered as a factor of bug replications and make it more difficult to maintain software. Various code clone detection tools have been proposed so far. However, in most algorithms adopted by existing clone detection tools, if program statements are reordered, they are not detected...
The effort required for the development of a software system is predicted through the cost of software estimation. Completion of project within time and budget limits is required for accurate cost estimation. Effort and cost estimation can be done through various modes. A new hybrid algorithm which is a combination of concepts of Artificial Bee Colony (ABC) and Local search procedures is used here...
Floating point operations of addition, subtraction, multiplication and division for normalization require removing the leading zeros. Algorithms to remove the leading zeroes using NOR logic for input bits along with carry, XOR logic on result of floating point operation are proposed in literature. This paper proposes leading zero count algorithm using NAND logic for adjacent bits of result of floating...
Software has gained its importance in all aspects of every walk of life. Algorithms play a vital role in ensuring the successful operation of any software. According to the applications, various algorithms have been designed in order to accomplish the desired goals. This paper therefore aims to provide an insight on significance of performance and further, throw light on various matrix multiplication...
Software developers can search, share and learn development experience, solutions, bug fixes and open source projects in software information sites such as StackOverflow and Freecode. Many software information sites rely on tags to classify their contents, i.e. software objects, in order to improve the performance and accuracy of various operations on the sites. The quality of tags thus has a significant...
Fault prediction on high quality industry grade software often suffers from strong imbalanced class distribution due to a low bug rate. Previous work reports on low predictive performance, thus tuning parameters is required. As the State of the Art recommends sampling methods for imbalanced learning, we analyse effects when under- and oversampling the training data evaluated on seven different classification...
Current source code analyses driving software maintenance tools treat methods as either a single unit or a set of individual statements or words. They often leverage method names and any existing internal comments. However, internal comments are rare, and method names do not typically capture the method's multiple high-level algorithmic steps that are too small to be a single method, but require more...
To alert diabetes patients of incipient hypoglycemia, we developed a hypoglycemia prediction algorithm and elicited design inspiration for new glucose management software. To identify the predictive factors, we conducted surveys, interviews, and diary studies, and developed a prediction model that uses self-monitored blood glucose. We tested the accuracy of prediction algorithms achieved by different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.