This paper primarily analyzes the impact of tester capabilities on the quality of aerospace software testing and elaborates on how to assess tester abilities from both technical and cognitive perspectives. The researc...
详细信息
ISBN:
(数字)9798350365658
ISBN:
(纸本)9798350365665
This paper primarily analyzes the impact of tester capabilities on the quality of aerospace software testing and elaborates on how to assess tester abilities from both technical and cognitive perspectives. The research was supported by the Aerospace Software Testing Center of the China Aerospace Science and Industry Corporation (CASIC), which allowed researchers to collect data on the center's testing personnel and conduct interviews with relevant testers. The findings of this research have been used by the center to coordinate the efforts to improve quality and human resource management. This paper provides valuable insights and guidance for the field of aerospace software testing, contributing to the enhancement of tester capabilities and software testing quality, and ultimately promoting the reliability and safety of aerospace software.
In this paper, we propose the speech quality assessment transformer utilizing listener dependent modeling (SQAT-LD) mean opinion score (MOS) prediction system, which was submitted to the 2023 VoiceMOS Challenge. The s...
详细信息
The driver feeling drowsy while driving is a common situation which has become a major reason for the cause of accidents on road. A drunk person and a person in drowsy state are in the same condition with blur eyes an...
详细信息
In lossy image compression, the objective is to achieve minimal signal distortion while compressing images to a specified bit rate. The increasing demand for visual analysis applications, particularly in classificatio...
详细信息
Addressing the challenges of high cost, low accuracy, and poor real-time performance in anomaly detection within industrial production processes, this study proposes a multi-modal instrument recognition method based o...
详细信息
Flying Ad-Hoc Networks (FANETs) enable the deployment of Unmanned aerial vehicles (UAVs) in a clustered manner to execute complex missions, yet their inherent openness poses significant challenges to communication sec...
详细信息
ISBN:
(数字)9798331531409
ISBN:
(纸本)9798331531416
Flying Ad-Hoc Networks (FANETs) enable the deployment of Unmanned aerial vehicles (UAVs) in a clustered manner to execute complex missions, yet their inherent openness poses significant challenges to communication security. However, as a crucial part of ensuring communication security, most existing FANET key management schemes rely on base stations or other infrastructures. This reliance not only complicates communication between UAVs and base stations but also makes the system vulnerable to single point of failure. To address these issues, we introduce a key management scheme based on Blockchain. This scheme in-tegrates the key tree with the secret sharing scheme, which achieves the autonomous generation and updating of group keys, the dynamic joining or exiting of UAVs, and the withdraw of malfunctioning UAVs. Security and performance analyses demonstrate that our scheme effectively resists a variety of security threats, exhibits lower computational overhead and energy consumption compared to similar schemes, making it well-suited for heterogeneous FANET environments.
Identifying dangerous behaviors of workers in complex production operation scenarios is an important research field of intelligent monitoring technology. When implementing practical applications, it often has complex ...
详细信息
Because chaotic systems are unpredictable,ergodic and sensitive to initial values and parameters,they are often used in the field of *** avoid the bad randomness of the random key generated by the low dimensional chao...
详细信息
Because chaotic systems are unpredictable,ergodic and sensitive to initial values and parameters,they are often used in the field of *** avoid the bad randomness of the random key generated by the low dimensional chaotic map system,a 5-dimensional multi-wing hyperchaotic system is adopted in this *** key stream generated by the chaotic system is related to the plaintext *** it can effectively resist the attacks of selecting *** plaintext graph is decomposed into binary form by bit plane decomposition technique,and then these bit planes are divided into high and low *** designed control matrix is used to identify the specific scrambling mode,and each bit is permuted within and between ***,bit diffusion is used to change the pixel value of each *** analysis and numerical simulation show that the algorithm has good encryption performance for image encryption.
Chronic Diseases are a very significant problem around the world. Manhandling medical cases often leads to significant repercussions in the treatment process and needs to be detected and dealt with early on. Unusual c...
详细信息
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i...
详细信息
暂无评论