The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Assessments constitute a crucial part of an academic learning process due to its importance in evaluating students' knowledge and forming a basis for their grade. The rapid evolution of technology has influenced the way assessments are now being conducted in academic institutions. Tertiary institutions are adopting Computer-Based Assessments (CBAs), in tandem with traditional Paper-Based Assessments...
Formal verification utilizing symbolic computer algebra has demonstrated the ability to formally verify large Galois field arithmetic circuits and basic architectures of integer arithmetic circuits. The technique models the circuit as Gröbner basis polynomials and reduces the polynomial equation of the circuit specification wrt. the polynomials model. However, during the Gröbner basis reduction, the...
Malware is one of the most serious security threats on the Internet today, it has been seen that malware authors employ variety of techniques to evade security detection but most of their techniques are discovered and blocked by antivirus programs. Still there are some evasion techniques which are not exploited in wild and are effective against antivirus programs. This paper studies the working of...
The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally. There is a large set of software available which can be used to prevent data leak, however they fail...
Context: One of the factors that leads to improved code maintainability is its readability. When code is difficult to read, it is difficult for subsequent developers to understand its flow and its side effects. They are likely to introduce new bugs while trying to fix old bugs or adding new features. But how do software developers know they have written readable code? Objective: This paper presents...
The North Central Province, the largest province in Sri Lanka, has encountered with various problems related to the education field. Gaining poor results in Mathematics in national level exams, especially in the Ordinary level, is one of them. Although the knowledge of Mathematics is very important to the Implementation of every stream of subjects, statistical data of the Department of Examinations...
Wi-Fi is a local area wireless networking technology that is widely used for different purposes such as data transmission and wireless communication. Wi-Fi connection will most often result in faster, more reliable internet access and it is cheap. A penetration test on Wi-Fi is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system...
The advancement in technologies has been increasing with increase in integrating scales which allow fabricating millions of transistors on a chip. This demands the efficient testing circuit to evaluate the fault present, where the large volume of data volume needs to be tested during manufacturing and fabrication. Therefore the challenging fact arises in methodologies to achieve the test data compression...
Reliability stress testing of power semiconductors requires significant development effort for a test apparatus to provide the required functionality. This paper presents a modular test system architecture which focuses on flexibility, reusability and adaptability to future test requirements. Different types of tests for different devices in application circuit configuration can be implemented based...
In this study, we present a preliminary exploration about the added value of vibration information for guiding navigation in a VE. The exploration consists of two parts. Firstly, we designed two different vibration patterns. These patterns, pushing pattern and compass pattern, differ conceptually in the levels of abstraction. Secondly, we undertook an experiment to compare the two patterns in guiding...
The Icefin vehicle is a novel, custom under-ice unmanned underwater vehicle. This vehicle was designed for polar sub-ice deployment and was deployed to McMurdo, Antarctica in November of 2014. An overview of the unique vehicle design is presented here, along with a summary of the deployment testing in Antarctica. Lessons learned from this deployment provided an opportunity for design improvements...
This paper discusses the efficiency of statistical tests for evaluating of pseudorandom number generators. We present the method to reduce a number of false negatives for pseudorandom sequences testing. We discuss this method applicability for specific tests and provide calculations of confidence intervals based on the tests significance. Also we describe the approach based on the calculation of the...
Vulnerability Assessment and Penetration Testing is an important activity to improve cyber defense of systems/networks. It assist to make systems/networks vulnerability free. But it is a costly process. Premium VAPT tools are very costly. Even premium VAPT tools are not able to give 100 % accuracy to find out vulnerability. In addition to that, single VAPT tool cannot find all type of vulnerabilities...
Sybil (fake) accounts penetrate the OSN security by hosting multiple threats. Multiple social-graph-based defence schemes have been proposed till date which can effectively detect and isolate the sybils based on the ground truth of limited social connections between non-sybil (honest) and sybil users. In real world scenario, sybils may elude these defenses by imploring many social connections to real...
Graphic image is compulsory in delivering information and communication in this information technology era. Graphic applications are used widely to manipulate images in advertising industries and in animation movie productions. In order to manipulate numerous and complex images, it is required long period of time and high-performance computers. However, computers with high-performance specification...
Development of computer technology today has a major role in the development process of interaction in computer-based applications. Various innovations in creating the user experience of applications began are increasing. Augmented reality is a technology model the interaction between humans and computers by using a model of a merger between the real world with the virtual world. This development...
Cloud computing simply referred as cloud is a pay per use technology. To be simple a cloud computing by using resource allocation algorithms will allocate resource to the user as per his/her request and the user will pay only for what they use similar to electricity. There are several available services in cloud like SaaS, IaaS, PaaS, TaaS etc. We are going to concentrate on TaaS (Testing as a Service)...
To ensure software is performing as intended it can be black-box or white-box tested. Category partition is a black box, specification based testing technique which begins by identifying the parameters, categories (characteristics of parameters) and choices (acceptable values for categories). These choices are then combined to form test frames on the basis of various criteria such as base choice and...
Exhaustive testing of all possible combinations of input parameter values of a large system is impossible. Here, pairwise testing technique is often chosen owing to its effectiveness for bug detection. For pairwise testing, test cases are designed to cover all possible pair combinations of input parameter values at least once. In this paper, we investigate the adoption of Migrating Birds Optimization...
Since 1990's Combinatorial explosion is a crucial topic in software testing domain. In this domain the exhaustive input interaction test is not practical solution to test all software configurations for generating test cases. T-way test strategy provides a solution to overcome the problem. To date, most of the research on designing methods focus on combinations of input parameter values, where the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.