State identification sequences, such as homing and distinguishing sequences (HS and DS), are widely used in FSM (Finite State Machine) based testing in order to reduce the size of a returned complete test suite as wel...
详细信息
In this paper, the heat conduction equation for composite materials posed and solved. This problem is known as an inverse initial value problem for the heat conduction equation. In order to solve and formulate this in...
In this paper, the heat conduction equation for composite materials posed and solved. This problem is known as an inverse initial value problem for the heat conduction equation. In order to solve and formulate this inverse problem, the function spaces must be defined and represented. By studying and solving the direct problem for the heat equation in composite materials, it is possible to determine the function spaces and solve the inverse initial value problem. Scientific methods used: the separation of variables method used to solve the direct problem for the heat equation. It found that method separation of variables does not completely lead to the solution of the inverse initial value problem, since this method leads to a divergent series of solutions and rather massive errors. The heat conduction problem can be formulated as Fredholm integral first kind equations. The discretization algorithm applied to reformulated the problem as linear operator problem as matrix and vectors form. Then, Tikhonov's regularization inversion method has been used to find an approximation solution. Finally, as shown in the numerical example the regularized approximate solutions obtained.
Spectral analysis plays an important role in the interpretation of astronomical data. The determination of the number and parameters of each nested Gaussian curve on spectrum of any object in the sky gives information...
详细信息
Spectral analysis plays an important role in the interpretation of astronomical data. The determination of the number and parameters of each nested Gaussian curve on spectrum of any object in the sky gives information about the physical and chemical structure of the object. In this study, determination of each nested Gaussian curve's number and parameters such as position, width and amplitude in a given frequency range are performed. Thus, we have knowledge of about, which molecules there are in the observation region. Autonomous Gaussian Decomposition algorithm is implemented with additional scipy, numpy, h5py, lmfit packages. The algorithm is tested on spectral data that comes from active star forming region called as Orion KL obtained by SMA (Submillimeter Array) devices are used. Finally, information is given about positive and negative aspects of these study and in the future what should we do to improve the accuracy.
The methods of digital and pulse signal modulation in modern computer systems of data transmission are analysed. Process of forming non-redundant coding that use the errors detection and correction in the Galois basis...
详细信息
ISBN:
(数字)9781728155661
ISBN:
(纸本)9781728155678
The methods of digital and pulse signal modulation in modern computer systems of data transmission are analysed. Process of forming non-redundant coding that use the errors detection and correction in the Galois basis are offered. Structures of special processors for forming signal correcting codes are built. Working algorithms for proposed coding methods are developed and their software implementation are offered. Circuit design of Galois code sequence generator is implemented. Work simulation and synthesis on FPGA of Xilinx are performed.
The paper deals with the development of the method of activity and the realization of the intelligent agent (IA) for semantic analysis of the natural language software requirements. This IA performs the analysis of th...
详细信息
ISBN:
(纸本)9781728140704
The paper deals with the development of the method of activity and the realization of the intelligent agent (IA) for semantic analysis of the natural language software requirements. This IA performs the analysis of the requirements, determines the number and percentage of missing indicators for determining the metrics of complexity and quality of software, displays which indicators are missing for each metric, and also forms the real ontology of the domain "Software engineering" (part "Quality and complexity of software. Metric analysis"). During an experiment, which is conducted with the help of the realized IA, the semantic analysis of requirements for the Internet of Things (IoT)-system was performed. Such analysis provides an increase of the volume and ensures of the sufficiency of metric information in the software requirements, which, in turn, provides an improvement in the quality of the software of IoT-system.
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making it difficult for organizations t...
详细信息
The Virtual Reality (VR) experiences are great for an engaging presentation creating wide public awareness of cultural heritage, especially if the experience is built on a web-based technology. One of the still posing...
The Virtual Reality (VR) experiences are great for an engaging presentation creating wide public awareness of cultural heritage, especially if the experience is built on a web-based technology. One of the still posing challenges is that once an application has been developed, for example for a virtual museum or a virtual tour, it usually remains fixed to an embedded in the application model. Adding new functionalities or interaction paradigms needs additional development and new deployment. In this paper, we propose a framework, which achieves the decoupling of an experience from the used models and interaction paradigms through scene and input templates and configuration files. This allows an easy way for generation of a variety of experiences even by people with no or limited programming skills.
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to ste...
详细信息
ISBN:
(纸本)9781728139937
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to steal the private information of their victims through the content they send in their SMS messages. Therefore, the detection of smishing messages has a vital role in information security. In this work, a machine learning-based model is proposed to detect smishing messages. Experiments conducted on a relatively large dataset, which contains legitimate and smishing messages, have shown that the proposed model offers a promising detection performance.
The paper presents a new technique for the botnets' detection in the corporate area networks. It is based on the usage of the algorithms of the artificial immune systems. Proposed approach is able to distinguish b...
详细信息
A new technique for the DDoS botnet detection based on the botnets network features analysis is proposed. It uses the semi-supervised fuzzy c-means clustering. The proposed approach includes the learning and the detec...
详细信息
暂无评论