The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of synthesis and optimization of reversible and quantum circuits have drawn the attention of researchers in recent years. The typical design flow for such circuits first carries out the step of synthesis in terms of reversible gates, and then maps (decomposes) each reversible gate into equivalent set of quantum gates (e.g. from the NCV library). Since its initial proposal in realizing...
Quantitative risk assessment is a critical first step in risk management and assured design of networked computer systems. It is challenging to evaluate the marginal probabilities of target states/conditions when using a probabilistic attack graph to represent all possible attack paths and the probabilistic cause-consequence relations among nodes. The brute force approach has the exponential complexity...
Ensuring software security is essential for developing a reliable software. A software can suffer from security problems due to the weakness in code constructs during software development. Our goal is to relate software security with different code constructs so that developers can be aware very early of their coding weaknesses that might be related to a software vulnerability. In this study, we chose...
Segmentation divides an image into different regions with each pixels having similar characteristics. Each of the segmented regions should strongly relate to objects in the image or features of interest for segmentation to be meaningful in image processing. Many methods for image segmentation depends on partitioning of an image into several similar regions. The superpixels generation method have gained...
Magnetoencephalography (MEG) is a brain imaging method affording real-time temporal, and adequate spatial resolution to reveal aberrant neurophysiological function associated with dyslexia. In this study we analyzed sensor-level resting-state neuromagnetic recordings from 25 reading-disabled children and 27 non-impaired readers under the notion of symbolic dynamics and complexity analysis. We compared...
Polar codes under cyclic redundancy check-aided successive cancellation list (CA-SCL) decoding can outperform the turbo codes and the LDPC codes at the cost of high complexity and decoding delay. In order to reduce the decoding complexity, in this paper we propose a hybrid parity-check and CRC aided SCL decoding scheme for polar codes. Simulation results under the binary input additive white Gaussian...
This paper presents analysis of existing empirical studies of software metric-based refactorings opportunities identification (ROI) for object-oriented (OO) software systems. We carried out a comprehensive analysis on sixteen (16) primary studies to identify the state-of-the-practice in ROI, focusing on their operations, refactoring activities, programming languages and the impact on software quality...
This paper addresses the problem of determining whether an observed subject has already been seen in a stream of biometric samples. Given a new sample, unlike the common practice of comparing a related match score to a constant threshold, this work introduces a function which takes as input the match score and the position of that sample in the stream, and produces as output a duplicate/non-duplicate...
It is widely observed that the poor event logs quality poses a significant challenge to the process mining project both in terms of choice of process mining algorithms and in terms of the quality of the discovered process model. Therefore, it is important to control the quality of event logs prior to conducting a process mining analysis. In this paper, we propose a qualitative model which aims to...
We propose a Coordinated Non-Orthogonal Multiple Access (CO-NOMA) scheme for resource allocation in the context of mobile networks. NOMA refers to schemes where multiple users can access the wireless channel in the same frequency band simultaneously. In this study, we consider NOMA with power domain multiplexing, where the near- far property in space is exploited through appropriate power allocations...
The performance of List Successive-Cancellation Decoding (LSCD) of Polar Codes with large list size have exceeded that of Turbo codes and Low-Density Parity-Check codes. However, large list size results in huge computation complexity and this limits the applicability of LSCD in high-throughput and power- sensitive applications. In this work, a low complexity design for LSCD with large list size based...
The K L1-norm Principal Components (L1-PCs) of a data matrix X Ε RD × N can be found optimally with cost O(2NK), in the general case, and O(Nrank(X)K - K + 1), when rankX is a constant with respect to N [1],[2]. Certainly, in real-world applications where N is large, even the latter polynomial cost is prohibitive. In this work, we present L1-BF: a novel, near-optimal algorithm that calculates the...
The development of Web applications has a crucial role as most organizations have their own corporate Web applications to meet the needs of their respective businesses. Different needs create different complexities which represent a new challenge to Web application development. In order to ensure the timely delivery of a project, software providers offering this service choose to use Open Sources...
The aim of this paper is to compare the complexity of three simple sort algorithm; selection sort algorithm, bubble sort algorithm, and insertion sort algorithm. The measurement of the complexity is based on control flow structure and time processing. The control flow structure is illustrated into flowgraph and measured by number of out-degree and number of in-degree. The algorithm is coded in C programming...
We overview several local text reuse detection methods based on fingerprinting techniques. We first define the context of local text reuse and situate it within the general spectrum of information retrieval in order to pinpoint its particular applicability and challenges. After a brief description of the major text reuse detection approaches, we introduce the general principles of fingerprinting algorithms...
In order to cover the ever increasing demands for computational power, while meeting electrical power and budget constraints, HPC systems are continuing to increase in hardware and software complexity. As a direct consequence, this also leads to increased development efforts to parallelize, tune or port applications. For an informed decision on how to spend available budgets, we therefore need quantitative...
This paper proposes a new semi-supervised clustering framework to represent and integrate quantitative preferences on attributes. A new metric learning algorithm is derived that achieves a compromise clustering between a data-driven and a user-driven solution and converges with a good complexity. We observe experimentally that the addition of preferences may be essential to achieve a better clustering...
Understanding existing pieces of software is a challenge faced by many software developers regardless of their experience. This project researches into existing reverse engineering tools used for code comprehension and identifies the limitations of the current approaches. Furthermore, a prototype implementation was developed to extract design models from available source code in order to achieve better...
Communication systems subjected to strong impulse noise are prone to performance degradation when the impulse occurrence is neglected in the decoding process: turbo decoders are likely to exhibit error propagation because the decision-making is dictated by excessive samples corrupted by impulses when the conventional decision metric, which is based on the assumption of additive white Gaussian noise,...
Teaching agile software development by pairing lectures with hands-on projects has become the norm. This approach poses the problem of grading and evaluating practical project work as well as process conformance during development. Yet, few best practices exist for measuring the success of students in implementing agile practices. Most university courses rely on observations during the course or final...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.