The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a description of the software is provided that allows to obtain an automated objective quantitative assessment of the patient's speech quality. The evaluation is carried out in the process of speech rehabilitation after surgical treatment of oncological diseases of the organs of the speech-forming tract. The evaluation is obtained based on comparing patient records before the operation...
Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities will be reported for the operating systems (OSs) they use in a given time period. Our approach consists of clustering vulnerabilities by leveraging the text information within vulnerability records, and then simulating the mean value function...
Static software metrics are increasingly used for assessing software quality, with multiple tools commercially available for measuring software metrics, non are based on research proven to have direct correlation with software quality. This study makes use of the results from [20] by building a tool for measuring software metrics on code to show possible weak links that are likely to fail. The tool...
Indoor positioning technique has been attracting more and more attention in recent years. In this paper, we propose a multi-path profile fingerprinting localization system based on software defined radio (SDR) platform. The system initially calibrates the multi-path profile (MP) and received signal strength (RSS) information to construct a fingerprint database. In the online positioning phase, the...
Algorithmic composition refers to the process of composing a melody automatically using algorithms. A bulk of methods have been proposed for this task. Among them, a novel idea is to utilize the correlation information between the pitches of melodies and the tones of lyrics for melody composition. Unfortunately, the existing method adopting this idea suffers from several severe shortcomings and thus...
In this paper, we investigate the problem of detecting correlations among datasets containing malicious data concerned with various types of network attacks and related events of the infections taken from a numerous sources and organizations. We propose a graph based technique to depict relationships between malicious data based on values of attributes related both to attackers and victims, and referred...
Software development effort estimation is a very important issue in software engineering and several models have been defined to this end. In this paper, we carry out an empirical study on the estimation of software development effort broken down by phase, so that estimation can be used along the software development lifecycle. More specifically, our goal is twofold. At any given point in the software...
Human emotional and cognitive states evolve with variable intensity and clarity through the course of social interactions and experiences, and they are continuously influenced by a variety of input multimodal information from the environment and the interaction participants. This has motivated the development of a new area within affective computing that treats emotions as continuous variables and...
Network attack path analysis is an important method for analyzing the security status of computer network, which can automatically analyze the correlation between network vulnerabilities and potential threats resulting from vulnerabilities. It plays a guiding role in establishing network security policy. This paper chooses NVD and Bugtraq as vulnerability data sources, and extracts key properties...
The authors analyzed 2500 communication activities of student teams engaged in global software development projects during an 18 month period to determine the temporal behavior of students engaged in distributed group activities. The data revealed a number of daily, weekly, and project regularities, which provide insights into how distributed teams use their time. The results from this study show...
There is a lack of published studies providing empirical support for the assumption at the heart of product line development, namely, that through structured reuse later products will be less fault-prone. This paper presents results from an empirical study of pre-release fault and change proneness from four products in an industrial software product line. The objectives of the study are (1) to determine...
With China's rapid economic development and the improvement of people's living standard, the demands for energy also rise. More economic development and utilization of new energy for heating and hot water systems, is an effective way to solve the current shortage of resources and reduce the price of heating and hot water system. The quantitative comparative analysis is conducted through Method of...
In this work the ALSWEB framework is presented. The ALSWEB is a virtual linguistic laboratory for linguistic research developed as a web application. The purpose of the framework is to model the entire process regarding the different steps of data acquisition, data transformation, information acquisition from different data and research hypotheses verification in the ALS (Linguistic Atlas of Sicily)...
The third formant of vowels is generally known to have multiple correlates. F3 is generally associated with lip rounding in the articulation of vowels as well as with a lowering effect on other formants. The present study addresses the question whether `the third formant effects ± back and ± open feature of the vowels?' with data from two languages Hindi and Thai. A contrastive study of seven long...
Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is limited in size since event sets can be succinctly represented. While this minimizes the bandwidth consumed and helps scale the detection to a large number of nodes, it limits the infrastructure's ability to identify the source of anomalies. We...
Intrusion Detection Systems (IDS) have been used widely to detect malicious behavior in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the distributed environment. Sophisticated attacks are difficult...
Software engineering process information extracted from version control systems and bug tracking databases are widely used in empirical software engineering. In prior work, we showed that these data are plagued by quality deficiencies, which vary in its characteristics across projects. In addition, we showed that those deficiencies in the form of bias do impact the results of studies in empirical...
Server consolidation and virtualization technology are used in modern data center as a method to improve the server utilization rate by encouraging the sharing of physical resources between virtual machines (VM). Although, this can be realized by plenty of virtualization softwares available in markets, creating a good management policy for the server consolidation environment is still a challenging...
Software defects are the key factors to evaluate the dependable software. This paper analyzes the attributes of software defects, and applies positive and negative association rules method to the research of software defects. This method can not only overcome the weak point of the traditional association rules method that can only mine the explicit rules, but also output some more meaningful rules...
Research has provided evidence that type usage in source files is correlated with the risk of failure of software components. Previous studies that investigated the correlation between type usage and component failure assigned equal blame to all the types imported by a component with a failure history, regardless of whether a type is used in the component, or associated to its failures. A failure-prone...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.