The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this study is to determine the sleep status of college students. 12 volunteers(mean ± SE: 22 ± 2 yr, 170 ± 10cm, 61 ± 16 kg) take part in the research. The sleep situation are got by the waistband sleep monitor system. The average heart rate of the whole night, the average breath rate of the whole night, bed time, get up time, onset latency, total sleep time are monitored. These important...
Finding suitable developers for a given task is critical and challenging for successful crowdsourcing software development. In practice, the development skills will be improved as developers accomplish more development tasks. Prior studies on crowdsourcing developer recommendation do not consider the changing of skills, which can underestimate developers' skills to fulfill a task. In this work, we...
Power Analysis (PA) is a powerful method to extract leakage information from theoretically secure cryptographic devices. In general, Differential Power Analysis (DPA) correlates the processed data with power consumption of devices through statistical analysis to reveal systems' secret key. A common approach to counteract DPA is a low-entropy lightweight masking strategy. This masking scheme, known...
Empirical studies in software engineering frequently rely on correlation data in an effort to demonstrate that a process or tool affects an important or meaningful outcome, with the ultimate goal of improving software engineering practice. But all students of statistics know that "correlation does not imply causation," and so causal conclusions (using traditional methods) from observational...
In this paper it is presented the second stage analysis used to determine the signal quality coefficient for vibro-acoustic signals. After successfully determining the integrity coefficient in the “first stage analysis on determining the Signal Quality Coefficient in vibro-acoustic domain-waveform integrity analysis” paper a second and deeper analysis is presented. This is a frequency domain analysis...
The segment of post-quantum cryptography rises its importance with increasing improvements in the quantum computing. Cryptographic post-quantum algorithms have been proposed since 1970s. However, side-channel attack vulnerabilities of these algorithms are still in focus of the recent research. In this paper, we present a differential power analysis attack on the McEliece public-key cryptosystem. We...
The pillars of Computer Science and Engineering (CSE) curriculum are Data Structures, Database management systems, languages, operating systems and algorithms. This article explains the relationship and connectivity of these core courses. Authors follow the pedagogy technique to teach the Data Structures (DS) by considering its evolution. The article focus on the method of providing connectivity between...
In the process of software testing, correlated defects raise researchers' attention worldwide. Some potential defects are hard to be detected in the test. To address these potential defects, this paper adopts an error propagation model to describe the process of defect evolution and applies fault injection method to introduce known seed-defects. Subsequently, seed-defects are activated and related...
Algorithmic composition refers to the process of composing a melody automatically using algorithms. A bulk of methods have been proposed for this task. Among them, a novel idea is to utilize the correlation information between the pitches of melodies and the tones of lyrics for melody composition. Unfortunately, the existing method adopting this idea suffers from several severe shortcomings and thus...
Present day software engineering concept gives emphasis on the use of design patterns for developing software which are recurring in nature. Detection of design pattern is one of the emerging field of Software Reverse Engineering. In this work, an attempt has been made to present an approach for design pattern detection with the help of Graph Isomorphism and Normalized Cross Correlation techniques...
Side-channel attacks have been a real threat against many embedded cryptographic systems. A commonly used algorithmic countermeasure, random masking, incurs large execution delay and resource overhead. The other countermeasure, operation shuffling or permutation, can mitigate side-channel leakage effectively with minimal overhead. In this paper, we target automatically implementing operation shuffling...
Cardiac output (CO) is the key indicator of the state of cardiac function. To realize noninvasive, continuous, portable, reproducible cardiac output monitoring, we design a cardiac output monitoring system based on photoplethysmography(PPG) which is stable, non-invasive and convenient to collect. K-calibration algorithm is used in the software part of this system. The main idea of K-calibration algorithm...
Bursts of abnormally high use of resources are thought to be an indirect cause of failures in large cluster systems, but little work has systematically investigated the role of high resource usage on system failures, largely due to the lack of a comprehensive resource monitoring tool which resolves resource use by job and node. The recently developed TACC_Stats resource use monitor provides the required...
This paper presents a method to automatically count nodules that are present in the roots of many legume plants, using digital images captured after the nodules have been removed from the roots. This problem poses a significant challenge due to a number of reasons: the size and shape of the nodules vary greatly, they may appear clustered, and their texture is not uniform. The proposed method exploits...
Solving complex real world Multi-Objective Optimization problems is the forte of Multi-Objective Evolutionary Algorithms (MOEA). Such algorithms have been part of many scientific and engineering endeavors. This study applies the NSGA-II and SPEA2 MOEAs to the radar phase coded waveform design problem. The MOEAs are used to generate a series of radar waveform phase codes that have excellent range resolution...
Data analytics involves choosing between many different algorithms and experimenting with possible combinations of those algorithms. Existing approaches however do not support scientists with the laborious tasks of exploring the design space of computational experiments. We have developed a framework to assist scientists with data analysis tasks in particular machine learning and data mining. It takes...
The topic of this paper is about prediction of performance anomalies caused by software aging. We have developed a framework for detection of performance anomalies that is targeted to web and component-based applications. In this study, we selected some amount of historical data previously collected and we conducted a correlation analysis with this data. The resulting dataset was then submitted to...
H.264/AVC is a powerful and high performance video compression standard. To achieve high coding efficiency, it employs many new techniques, such as spatial prediction in intra coding, adaptive block size inter coding and motion compensation, multiple reference pictures, and so on. Especially the complex intra and inter encoding modes, obtain notable coding gains. The high computation burden of mode...
This paper puts forward a new method (Cost Assessment of the inter-Project Dependence with Correlation Right algorithm) for quantitative analysis to the dependence of inter-project. It is a good guide for the project development and implementation. It can make a great help for program designer, programmer, and program users to analyze the special project. It provides a quantitative value; and with...
Path-sensitive analysis is an important feature of static program analysis that can assist to performance the software testing and ensure the software quality. Currently most analysis models are based on symbolic execution analysis. Our approach faces on some challenges like how to deal with the "path explosion" problem due to the number of paths growing exponentially with the number of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.