Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
As software engineering researchers, we are also zealous tool smiths. Building a research prototype is often a daunting task, let alone building an industry-grade family of tools supporting multiple platforms to ensure the generalizability of results. In this paper, we give advice to academic and industrial tool smiths on how to design and build an easy-to-maintain architecture capable of supporting...
.NET platform is increasingly being used in software development industry. Many data access technologies have been developed on this platform, thus choosing a suitable technology has become a difficult task. In this paper, an empirical study on fetch performance comparison by conducting experiments on common test data set of selected data access libraries; ADO.NET, Dapper and Entity Framework Core...
Despite the popularity of Fingerprinting Localization Algorithms (FPS), general theoretical frameworks for their performance studies have rarely been discussed in the literature. In this work, after setting up an abstract model for the FPS, we show that a fingerprinting-based localization problem can be cast as a Hypothesis Testing (HT) problem and therefore various results from the HT literature...
Face recognition is a personal identification method using biometrics that is gaining the attention in this research field. The face recognition process can be done without the human and devices interaction, so it can be applied in several applications. In additions, the face recognition systems are typically implemented at different places in unconstrained environments. Hence, the study of the factors...
Atrial fibrillation (AF) is one of the most common cardiac arrhythmia and effects nearly 1–2 of every 100 persons of the population. This paper evaluates the effectiveness of Machine Learning (ML) approach to detect AF episodes. Features, determined exclusively on the basis of beat intervals, are classified with linear classifier. Performances of the proposed approach are evaluated by means of the...
In the field of civil engineering, Ground Penetrating Radar (GPR) is the most widely used method of Non-Destructive Testing (NDT). Using supervised learning methods or signal processing methods, it is possible to analyze the sub-surface defects in pavement. In this paper, we propose to use a supervised machine learning method called Support Vector Machines (SVM) to detect the presence of debondings...
A novel RRAM-based pattern recognition system with locally inhibited post-neurons is developed. The system is able to learn the whole MNIST training set (60,000 patterns). By using the system, the same post-neuron is fired by the similar patterns in the same training class, which causes the reduction of hardware cost. With the locally inhibited post-neuron, the system can achieve more than 90.73%...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
The security of modern web applications is becoming increasingly important with their growing usage. As millions of people use these services, the availability, integrity, and confidentiality are critical. This paper describes the process of penetration testing of these applications. The goal of such testing is to detect application flaws and vulnerabilities and to propose a solution to mitigate them...
When interacting with their software systems, users may have to deal with problems like crashes, failures, and program instability. Faulty software running in the field is not only the consequence of ineffective in-house verification and validation techniques, but it is also due to the complexity and diversity of the interactions between an application and its environment. Many of these interactions...
Symbolic execution is a systematic program analysis technique that has received a lot of attention in the research community. However, scaling symbolic execution continues to pose a major challenge. This paper introduces Synergise, a novel two-fold integration approach. One, it integrates distributed analysis and constraint re-use to enhance symbolic execution using feasible ranges, which allow sharing...
When writing automated unit tests, developers often deal with software artifacts that have several dependencies. In these cases, one has the possibility of either instantiating the dependencies or using mock objects to simulate the dependencies' expected behavior. Even though recent quantitative studies showed that mock objects are widely used in OSS projects, scientific knowledge is still lacking...
Software development process encompasses multiple types of and differentiated versions of artefacts during the corresponding lifecycle. These artefacts are vulnerable to artefact drift or erosion when the product being developed gets changed. As a result different artefacts are subject to differential rates of updates compared to each other. Managing the software artefacts is one of the major problems...
How to accurately estimate facial age is a difficult problem due to insufficiency of training data. In this paper, an effective approach is proposed to estimate facial age by means of extreme learning machine (ELM). In the proposed method, a set of features is randomly selected from the original features to consist of a feature subspace. Given an initial weight matrix, the training samples within...
The number of devices that are being connected by the Internet is growing rapidly and hence, safeguarding private information by incorporating hardware and software security measures has become crucial. Physically unclonable functions (PUFs) have been proposed to enable lightweight hardware security which uses the inherent manufacturing variations as a way to generate unique signatures. However, given...
Current automatic program repair techniques often produce overfitting patches. Such a patch passes the test suite but does not actually repair the bug. In this paper, we propose two techniques to address the patch overfitting problem. First, we propose an automatic repair technique that performs syntactic code search to leverage bug-related code from a code database to produce patches that are likely...
Handwritten text in any language is believed to convey a great deal of information about writers' personality and identity. Handwritten documents are frequently used as evidences in forensic tasks. Handwriting skills is learnt and developed from the early schooling stages. Research interest in behavioral biometrics was the main driving force behind the growth in research into Writer Identification...
This paper aims to experimental evaluation of different methodologies to recognize human face based on different facial expression. The face and facial images were captured locally, as the experiment is aimed to be done in India domain. The features were extracted based on two techniques, viz, Discrete Wavelet Transform (DWT) and Local Binary Pattern (LBP). The range of extracted feature is 150,300,600,1200...
Vulnerabilities in web applications are due to various factors. Failure to properly validated user input is one of the factors that led to run unauthorized code in these programs. Sqli and Xss are two common vulnerabilities in web applications, That is due to lack of proper input validation. Therefore, in this paper we study how to protect organizational websites of north khorasan in iran against...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.