The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The reliability of software system is very important. Common cause failures(CCF) have an influence on assessing the reliability of software. This paper studies the influence of CCF on software system reliability, and gives the quantitative method of common cause failure. We present the method of software reliability assessment in the presence of CCF. A case study is given to verify the effectiveness...
NASA's Unmanned Aerial System (UAS) Traffic Management (UTM) project aims at enabling near-term, safe operations of small UAS vehicles in uncontrolled airspace, i.e., Class G airspace. A far-term goal of UTM research and development is to accommodate the expected rise in small UAS traffic density throughout the National Airspace System (NAS) at low altitudes for beyond visual line-of-sight operations...
This paper proposed a novel hybrid transactional memory(HyTM) that exploits the benefits of both Haswell's RTM(restricted transactional memory) and software transactional memory(STM). Unlike the existing HyTMs, the proposed HyTM can predict and resolve conflicts between transaction running concurrently by using a prediction matrix and transaction metadata. Also the proposed HyTM can provide the optimal...
Teledyne SeaBotix is developing a robotic subsea winch to be used in deep deployments of an observation class (20kg) ROV to 4000 m depths. The subsea winch system can be incorporated in a self-contained launch and recovery system or via larger vehicles like work class ROVs or submarines. High reliability is an underlying design objective in subsea systems due to the very high cost of downtime or system...
Software Projects are developed with the prior requirements and should be capable to complete on time under a fixed budget but it gets late to delivered, gets over-budget and even not able to meet user expectations. In agile approach, the estimation of software depends on expert opinion or on any historical data which is used as the input to previous methods like planning poker. The accuracy in estimation...
Software maintenance phase of Software Development Lifecycle (SDLC) is the most expensive and complex phase that requires nearly 60–70% of the total project cost. Due to this, many software fails to get repair within real time constraint. Ascribe to technology advancements and changing requirements, software must be well developed and maintained to get adapted. Hence, it is necessary to predict software...
Recent research has reported numerous studies bringing into question the gender inclusiveness of many kinds of software. Inclusiveness of software (gender or otherwise) matters because supporting diversity matters — it is well-known that the more diverse a group of problem-solvers, the higher the quality of the solution. To help software creators identify features within their software that are not...
Model-based development (MBD) has become important in the automobile domain. Automobile control systems consist of various software applications, and with MATLAB/Simulink, developers can design such applications using synchronous reactive models represented by synchronous block diagrams (SBD). The automotive open system architecture (AUTOSAR), a global development partnership formed to create open...
Software Cost Estimations (SCEs) are tools that used for the software elements classification with number of factors for overall cost estimation. For example resource availability, milestones, deadlines, skill sets, onshore/offshore ratio, knowledge transition etc. Software cost estimations is one of the efficient way to estimate software product's cost with higher accuracy considering the best quality...
In the context of motion estimation (ME) for video coding, the rate-constrained successive elimination algorithm (RC-SEA) safely eliminates candidate motion vectors while preserving the optimal candidate chosen by the block matching algorithm (BMA). This paper describes a technique for reusing ME information from rectangular to square prediction units in order to reduce the search area without altering...
This paper proposes a novel method named ScholarRank to evaluate the scientific impact of rising stars. Our proposed ScholarRank integrates the merits of both statistical indicators and influence calculation algorithms in heterogeneous academic networks. The ScholarRank method considers three factors, which are the citation counts of authors, the mutual influence among coauthors and the mutual reinforce...
Fault attacks are a serious threat for the secure embedded software running on a wide spectrum of embedded devices. Fault attacks can be thwarted using countermeasures in software. Among them, instruction-level countermeasures provide a fine-grained protection by executing redundant copies of an assembly instruction, and verifying their results for fault detection. It is assumed that this fine-grained...
We present a new algorithm for the detection of infinite loop bugs in software. Source code is not needed. The algorithm is based on autocorrelation of a program execution's branch target address sequence. We describe the implementation of the algorithm in a dynamic binary instrumentation tool, the result is lightweight enough to be applied continuously at runtime. Functionality of the tool is evaluated...
Recovering neural responses from electrode recordings is fundamental for understanding the dynamics of neural networks. This effort is often obscured by stimulus artifacts in the recordings, which result from stimuli injected into the electrode-tissue interface. Stimulus artifacts, which can be orders of magnitude larger than the neural responses of interest, can mask short-latency evoked responses...
Adaptive radiotherapy is a technique intended to increase the accuracy of radiotherapy. Currently, it is not clinically feasible due to the time required to process the images of patient anatomy. Hardware acceleration of image processing algorithms may allow them to be carried out in a clinically acceptable timeframe. This paper presents the experiences encountered using high-level synthesis tools...
Stereo matching is a crucial step for acquiring depth information from stereo images. However, it is still challenging to achieve good performance in both speed and accuracy for various stereo vision applications. In this paper, a hardware-compatible stereo matching algorithm is proposed; its associated hardware implementation is also presented. The proposed algorithm can produce high-quality disparity...
Public-key cryptosystems such as RSA have been widely used to secure digital data in many commercial systems. Modular arithmetic on large operands used during modular exponentiation makes RSA computationally challenging. Traditionally, software implementations of these algorithms provided the highest flexibility but lacked performance. On the contrary, custom hardware accelerators provided the highest...
Estimation is very important and integral part of software development life cycle. Without estimation of effort, duration and cost, software cannot be developed. It is important to do accurate estimation as much as possible. Today in Information technology Industry Estimation in agile software development is mostly based on heuristic approaches like expert judgment and planning poker. In absence of...
There are many algorithms used in software statistical testing such as: search algorithm, genetic algorithm, clustering algorithm, Particle Swarm Optimization (PSO), ant Colony Optimization (ACO) and so on. Based on research, ACO algorithm has been shown that it is outperforms the existing simulated annealing (search algorithm), genetic algorithm and other algorithm in statistical testing for the...
In this paper, a preconditioning algorithm for sparse, symmetric, diagonally dominant (SDD) linear systems is proposed by using combinatorial techniques. Firstly, we construct preconditioners by finding a subgraph based on the relationship between SDD matrices and undirected graphs. The subgraph is built by augmenting a low-stretch spanning tree with some extra high stretch edges. Then we implement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.