The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With their increasing number, it is getting important that decentralized and renewable energy sources are supporting the stabilization of the system voltage after short voltage dropouts. Often, in the past, these generators were disconnected during network faults. This is not adequate anymore, as it would lead to a loss of a considerable amount of feed-in power. However, if the generators stay connected,...
With their increasing number, it is getting important that decentralized and renewable energy sources are supporting the stabilization of the system voltage after short voltage dropouts. Often, in the past, these generators were disconnected during network faults. This is not adequate anymore, as it would lead to a loss of a considerable amount of feed-in power. However, if the generators stay connected,...
With their increasing number, it is getting important that decentralized and renewable energy sources are supporting the stabilization of the system voltage after short voltage dropouts. Often, in the past, these generators were disconnected during network faults. This is not adequate anymore, as it would lead to a loss of a considerable amount of feed-in power. However, if the generators stay connected,...
Intrusion Detection Systems (IDSs) are important components in the strategy of defense in depth for network security. Whether an IDS detects intrusions correctly or not depends on the correctness of both its design and the implementation. A survey of the literatures over the last decade reveals various methodologies for the evaluation and testing of network intrusion detection algorithms. However...
A Trojan horse is a malicious altering of hardware specification or implementation in such a way that its functionality is altered under a set of conditions defined by the attacker. The paper presents a technique for designing secure systems that can detect an active Trojan. The technique is based on utilizing specific information about the system's behavior, which is known to the designer of the...
With the development of reform in China, many theorists have made a lot of further research in the theory of national synthetically reform testing district. This paper attempts to give a systematic introduction and critical review of domestic theoretical documents, and shows a distinct frame of the existing achievements in this field. Four research fields have been introduced. This paper offers that...
In object-oriented programs, a unit test often consists of a sequence of method calls that create and mutate objects. It is challenging to automatically generate sequences that are legal and behaviorally-diverse, that is, reaching as many different program states as possible. This paper proposes a combined static and dynamic test generation approach to address these problems, for code without a formal...
With regard to e-voting system certification, political bodies around the world show very different approaches, ranging from high-level recommendations on the electoral system, not providing the associated details, to procedures that describe specific controls over critical components, not framing them in a "big picture". In this work, we compare and integrate two approaches that effectively...
Fastest is an automatic implementation of Phil Stocks and David Carrington's Test Template Framework (TTF), a model-based testing (MBT) framework for the Z formal notation. In this paper we present a new feature of Fastest that helps TTF users to eliminate inconsistent test classes automatically. The method is very simple and practical, and makes use of the peculiarities of the TTF. Perhaps its most...
Theories and designs are similar. Because they are similar, design researchers in information systems can learn much from the philosophy of science. Neither large data sets nor papers that generate and statistically test theory are necessary for the publication of contributions to the field. Moreover, the philosophy of pragmatism provides a more solid base than logical positivism from which to launch...
Based on the data of Chinese listed companies sampled from 2002 to 2006, the paper did an empirical study on the influencing mechanism of income tax to the financial distress cost, and found that differences in tax rates didn't influence financial distress cost, but preference in tax base and amount could reduce the financial distress cost, and the financial support of government could reduce the...
A firewall is the most important tool of network security defense. Its proper functioning is critical to the network it protects. Therefore a firewall should be tested rigorously with respect to its implemented network protocols and security policy specification. We propose a combined approach for test case generation to uncover errors both in firewall software and in its configuration. In the proposed...
Pathological myopia, the seventh leading cause of legal blindness in United States, is a condition caused by pathological axial elongation and eyes that deviates from the normal distribution curve of axial length, resulting in impaired vision. Studies have shown that ocular risks associated with myopia should not be underestimated, and there is a public health need to prevent the onset or progression...
The paper discusses foundations and requirements for testing security robustness aspects in operational environments while adhering to defined protection values for data. It defines the problem space and special characteristics of security testing in large IT infrastructures. In this area there are different environments with varying characteristics, e.g., regarding confidentiality of data. Common...
The amount of counterfeit pharmaceuticals in the European-pharmaceutical supply chain increased enormously in the past years. Thus, the European Commission introduced an amendment which will lead to new information systems. No realistic test data for these information systems is available yet which hinders the progress in designing and implementing appropriate information systems. We make a first...
Complex measurement systems being assembled on site have been found to suffer from electromagnetic interference although components of the systems passed the required electromagnetic compatibility (EMC) tests. We present an on-site test system that allows for the EMC evaluation of on-site assembled large measuring system installations in the frequency range from 27 MHz up to 5.8 GHz and propose a...
The aim of this paper is to detect incoherences in concepts, ideas, values, and others contained in technical document corpora. The way in which document collections are generated, modified or updated generates problems and mistakes in the information coherency, leading to legal, economic and social problems. A solution based on summarization, matching and neuro-fuzzy systems is proposed to dealt...
Canvass audit by sampling and testing (CAST) is a method to decide on the basis of a hand count of a random sample of batches of ballots whether to count the entire audit trail of a contest by hand. Data are collected in stages. At stage s, one computes Ps , an upper bound on the P-value of the hypothesis that the apparent outcome is wrong, conditional on the results of previous audit stages. If Ps...
High voltage technology, such as hybrid and electric drives, affects a number of international regulatory frameworks. A comprehensive approach to functional, electrical and chemical safety together with expert know-how on high voltage vehicles, systems, components and energy storage devices is necessary when deciding to export to overseas markets.
Because of the fast growth of Web application and relative technology, the automatic testing for Web has become more and more complexity. This paper proposed an automatic system for Web-app functional testing which based on a XML description and also integrated the web pagespsila structure analysis. It improved the traditional way of record, and it can auto-generate test data and test cases by the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.