Code comparison methods and tools are widely spread. However, most of the approaches target either only source code or only binary code, and methods for matching binary to source code are less investigated. In this ar...
详细信息
The new software retesting concept which bases on the idea of the hidden program errors detection was described in this paper. Purpose of this concept is the program hidden errors identification after basic testing. A...
详细信息
ISBN:
(纸本)9781605580760
The new software retesting concept which bases on the idea of the hidden program errors detection was described in this paper. Purpose of this concept is the program hidden errors identification after basic testing. As a result, the software life cycle was supplemented, because customer realizes retesting at incoming inspection stage. We use special architecture of artificial neural net for estimation of the software retesting necessity. It is a multi-layer- perceptron, which is composed with a simple Rosenblatt perceptron. The most effective training algorithms for this architecture are CGB on base conjugate-gradient method, one-step algorithm of secant method, algorithm SCG and threshold back-propagation error algorithm. The trained neural net gives information about total quantity and importance of the different levels errors in program. Copyright 2008 ACM.
Memory leaks are still one of the common bugs in programs written in languages without garbage collectors. There is a list of methods to detect such bugs. One of the approaches is to use static analysis. This paper di...
详细信息
The standard IEC/EN 61508 defines the requirements for safety systems to be applied to industrial plant safety independently of the application. It is not only intended as a basis for the development of future applica...
详细信息
ISBN:
(纸本)9784883254194
The standard IEC/EN 61508 defines the requirements for safety systems to be applied to industrial plant safety independently of the application. It is not only intended as a basis for the development of future application orientated standards, but also as a basis of all safety related electrical, electronic and programmable electronic systems, in order to apply it to safety critical applications. The purpose of this paper is to describe the SILCas tool which enables the user to determine the Safety Integrity Level (SIL) and the probability of failure on demand (PFD) for entire SIFs (consisting of sensor, signal processing, actuator) and for different system architectures.
In this paper, the heat conduction equation for composite materials posed and solved. The inverse Boundary Value Problem (BVP) described and solved. By studying and solving the direct problem for the heat equation in ...
详细信息
The article describes the principles of forming an optimal trajectory for controlling the active power of an electric arc furnace (EAF). Thereat, a complex synergetic model of the melting process has been used, and a ...
详细信息
Software Defined Network (SDN) technology is one of the modern network virtualization technologies. When implementing a virtual network on the SDN data plane, undesired effects may occur: the appearance of undesired p...
详细信息
Artificial intelligence (AI), machine learning (ML), and deep learning (DL) are just a few of the technologies that can help healthcare organizations support real-time decision-making to control the spread of a pandem...
详细信息
The concept of grid computing has become a standard way of collaboration of scientific community computational resources while solving extra-large and resource-intensive tasks. On the other hand, the "cloud compu...
详细信息
This paper is concerned with the design procedures of an automated testing tool, developed in Matlab®/Simulink® environment, that performs software verification during runtime on a PLC (Programmable Logic Co...
详细信息
暂无评论