The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By comparing the test verification method, the testability virtual verification technique based on Modelica is proposed. This paper designs the model architecture of testability virtual verification, completes implementations of the testability virtual verification and develops a software about testability virtual verification based on OpenModelica. And through a system instance, practicality and...
In a software development project, project management is indispensable, and effort estimation is one of the important factors on the management. To improve estimation accuracy, outliers are often removed from dataset used for estimation. However, the influence of the outliers to the estimation accuracy is not clear. In this study, we added outliers to dataset experimentally, to analyze the influence...
Virtual RINEX (VR) is a common product for Global Navigation Satellite System (GNSS) post-processing applications, useful if the distance between the rover and master is greater than 30 km. Many studies have been conducted in order to analyse the content of this kind of data, but few have proved the positioning performances obtainable in particular conditions. The VR is a synthetic file created from...
The BSS (Business Support Systems) has played a critical role in strictly competition telecom market. They constantly face stringent challenges such as quality assurance as well as time to market and budget. The test case design is an important step and a higher cost in system quality assurance phase. However by knowledge few test data correlation based approach has some drawbacks such as the coverage...
The objective of the work described is to accurately predict, as early as possible in the software lifecycle, how reliably a new software release will behave in the field. The initiative is based on a set of innovative mathematical models that have consistently shown a high correlation between key in-process metrics and our primary customer experience metric, SWDPMH (Software Defects per Million Hours...
Companies have employed for years 1st generation Functional Size Measurement (FSM) methods, e.g., IF PUG Function Points Analysis (FPA), collecting IF PUG-based historical data useful for benchmarking and estimation purposes. With the advent of 2nd generation FSM methods (e.g., COSMIC) the need for resizing past projects utilizing these new measures arises. The adoption of 2nd generation FSM methods...
Processing bug reports plays an important role for software maintenance. Recently, the issue of detecting duplicate bug reports has been noticed due to their considerable appearances. In the past, many NLP-based detection schemes have been proposed. However, the cluster-level correlation relationships are not extensively considered in the past studies. In this paper, we present an improved detection...
Software fault tolerance methods have been proposed to achieve high reliability. However, these methods suffer from the possibility of correlated failures, where the failure of multiple components leads to system failure. Furthermore, previous methods to assess the impact of correlated failure on software fault tolerance require extensive testing data and are therefore less suitable to conduct reliability...
Matrices and graph-based representations are commonly used visual models of system structures. Depending on the objective of the observer, both representations offer different opportunities and advantages. A standardized graph-based modeling language is SysML, while the design structure matrix (DSM) and the multiple domain matrix (MDM) are typical matrices used during the development of complex systems...
Within Software Product Lines (SPL) features are well understood and facilitate the communication among SPL developers and domain experts. However, the feature specification task is usually based on natural language, which can present lack of clarity, non-conformities and defects. In order to understand the feature non-conformity in SPL, this paper presents an empirical study to investigate the possible...
Team social capital is considered to be a key factor promoting team effectiveness of knowledge transfer, while it still lacks systematic theoretical analysis and empirical research on the internal mechanism of how social capital affecting team knowledge transfer in existing researches. This paper introduces transactive memory system as a mediator and study whether and how social capital affecting...
To improve the efficiency of localization technique, a parameter combination approach to direct multiple faults localization is proposed in this paper. We consider bisection methods as clustering rules to partition failed test cases into smaller fault-focused clusters with different kinds of combinations. Correlation coefficient can be a tolerance to accept or reject that one cluster aims at specific...
Human is the most important resource in the software project and has become the key success factor of the software project in terms of quality which is called “Human factor”. In this paper, the focus will be on the behavioral perspective of human factor in terms of psychological effect, especially on the cognitive bias at the early stages of the software development life cycle (SDLC). We aim to present...
A QSAR study on a series of N-aryl derivatives was performed to explore the important molecular descriptor which is responsible for their inhibitory activity towards choli nest erase enzyme, the common target for the treatment of Alzheimer's disease. Molecular descriptors were calculated using DRAGON version 5.2 software Two methods of descriptor selection, stepwise regression and forward selection...
Design of Experiments is a well-known method used to describe complicated processes in the way that we can recognize the dependencies between the input factors inside. Because of that we use this method in order to describe the personal performance process as a result from the individual employees' features. Adopting the FMEA over the different roles and responsibilities in the software process we...
In recent years, with its sustained and rapid economic development, the contradiction between supply and demand on China's petroleum is daily outstanding, and it makes the dependence rate of foreign oil resources going higher and higher. With the method of time series analysis and based on the data of China's oil self-sufficiency and proven reserves from 1980 to 2009, ARIMA models which is used for...
This paper introduces the concepts of complex networks. An improved multi-local world model is proposed and simulated by Matlab software, and then the generated network is visualized by Pajek software. Finally, the network parameters related to topological properties are calculated and some properties of the network are analyzed.
Implementation-level attacks are nowadays well known and most designers of security embedded systems are aware of them. However, both the number of vulnerabilities and of protections have seriously grown since the first public reporting of these threats in 1996. It is thus difficult to assess the correct countermeasures association to cover all the possible attack paths. The goal of this paper is...
A software system for a simulation model of a UAV's automatic landing system is presented herein. The simulation model allows us to determine the level of influence of different distortions of the observed image on the UAV's landing accuracy. The correlation extremal system of terminal guidance (CESTG) of an unmanned aerial vehicle (UAV) executed on the basis of an optoelectronic sensor has found...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.