The monoalphabetic substitution cipher encrypts a given text by replacing every letter in the text with a different letter according to some predefined scheme. The cryptanalysis of this cipher involves the identificat...
详细信息
White box testing is a test technique that takes into account program code, code structure and internal design flow. White box testing is primarily of two kinds-static and structural. Whereas static testing requires o...
详细信息
White box testing is a test technique that takes into account program code, code structure and internal design flow. White box testing is primarily of two kinds-static and structural. Whereas static testing requires only the source code of the product, not the binaries or executables, in structural testing tests are actually run by the computer on built products. In this paper, we propose a technique for optimizing static testing efficiency by identifying the critical path clusters using genetic algorithm. The testing efficiency is optimized by applying the genetic algorithm on the test data. The test case scenarios are derived from the source code. The information flow metric is adopted in this work for calculating the information flow complexity associated with each node of the control flow graph generated from the source code. This research paper is an extension of our previous research paper [18].
Microarray is a potential tool to explore information inside *** simultaneously monitoring the expression levels of thousands of genes under specified experimental conditions and using clustering and statistical signa...
详细信息
ISBN:
(纸本)9781612848334
Microarray is a potential tool to explore information inside *** simultaneously monitoring the expression levels of thousands of genes under specified experimental conditions and using clustering and statistical signal processing techniques on these expression levels it is possible to classify biological specimens(***).However,a prime limitation of microarray data used for analytics and extrapolation is the presence of *** present a novel method utilizing the 2D MUSIC Algorithm for denoising,representation and classification of microarray *** 2D MUSIC algorithm is a frequency estimation technique that separates the high dimensional microarray data into a signal and a noise subspace. It is therefore possible to extract the complex frequency components of a signal in presence of *** algorithm was implemented on a publicly available microarray dataset of lung epithelial cells of smokers with and without cancer. Further,a difference frequency estimator function was used to train an eigenvector based classification tool to distinguish between the microarray data from smokers with and without *** application of this 2D MUSIC Algorithm to the input dataset containing variegated distribution of normal and diseased samples,it was possible to distinguish discernibly between cancerous and non-cancerous samples with good *** technique has potential applications for prognosis and treatment of cancer.
In this paper, a procedure to achieve efficient and high quality backside thinning of GaAs wafer using the lapping machine is demonstrated and the precautions and set of rules to be followed to utilize it productively...
详细信息
A state variable method of converting single-resistance-controlled- oscillators (SRCO), into universal current-mode biquad (offering realizations of all the five standard filter functions namely, low pass, band pass, ...
详细信息
A state variable method of converting single-resistance-controlled- oscillators (SRCO), into universal current-mode biquad (offering realizations of all the five standard filter functions namely, low pass, band pass, high pass, notch and all pass) has been highlighted. The workability of the exemplary implementation of the derived current-mode universal biquad has been demonstrated by PSPICE simulation results based upon 0.35 μ m technology. It is expected that the proposed method can be applied to other SRCOs to generate other multifunction filter structures.
This paper introduces a novel perspective by classifying the secure deletion methods into four categories based on their methodology. For each of the proposed deletion category its associated algorithm is explained an...
详细信息
This paper introduces a novel perspective by classifying the secure deletion methods into four categories based on their methodology. For each of the proposed deletion category its associated algorithm is explained and its merits and demerits are listed down. The deletion algorithm for each category have been simulated and evaluated with respect to security level and time complexity on commonly used file formats. Based on the results derived, the application scenarios suitable for each of the deletion category are presented. This research is likely to help the user make a more informed choice of the deletion method suitable for his need.
Five new electronically-controllable second order current-mode sinusoidal oscillators using three mul-ti-output operational transconductance amplifiers (MO-OTAs) and two grounded capacitors (GC) have been presented. S...
详细信息
Five new electronically-controllable second order current-mode sinusoidal oscillators using three mul-ti-output operational transconductance amplifiers (MO-OTAs) and two grounded capacitors (GC) have been presented. Simulation results are included to confirm the theoretical analysis based upon CMOS OTAs implementable in 0.5 μm technology.
Genetic algorithm (GA) is widely used for embedded system design optimization. GA needs repeated evaluation of fitness function, but for complex embedded systems fitness function evaluation is costly as it includes mu...
详细信息
A major impairment in Free Space Optical (FSO) links is the turbulence induced fading which severely degrades the link performance. To mitigate turbulence induced fading and, therefore, to improve the error rate perfo...
A major impairment in Free Space Optical (FSO) links is the turbulence induced fading which severely degrades the link performance. To mitigate turbulence induced fading and, therefore, to improve the error rate performance, error control coding schemes can be used. In this paper, we investigate the bit error performance of FSO links with different coding techniques over log normal atmospheric turbulence fading channels. The modulation scheme considered is BPSK. On the basis of computed results using Monte Carlo simulation, a comparative study of uncoded and coded systems is made.
Exponential burst of real-time information generated through Social Media Networks in recent years, creates a hot ubiquitous platform for research among data scientists. Main area under spotlight in Social Networks An...
详细信息
Exponential burst of real-time information generated through Social Media Networks in recent years, creates a hot ubiquitous platform for research among data scientists. Main area under spotlight in Social Networks Analysis (SNA) is friendship networks, user influence and computation of how deep and how fast the information diffuses. Amidst recent upsurge in Smartphone usage statistics, there is spectacular rise in tagging of feeds and post them with locations due to GPS localizations (Geo-tags and location coordinates of images and news feeds). For the local advertisers and social campaigners, it is vital to carve out phase based user reach models in a particular city/location. In this paper, an algorithm to calculate real-time geo influence of twitter users pertaining to location and time constraints is proposed and necessitate its requirement to meet the vital requisite to find out how fast information is spread by a particular user in a certain city/area and hence providing a platform for ranking them based on their influence in a particular place, and measuring speed of information travel. Subject Descriptors-Data mining and social computing, Social and Behavioural Sciences.
暂无评论