GakuNin is a federation for constructing an academic authn & authz infrastructure by using single sign-on (SSO) technology in Japan and it consists of academic eresource providers and consumers, e.g. Universities,...
详细信息
GakuNin is a federation for constructing an academic authn & authz infrastructure by using single sign-on (SSO) technology in Japan and it consists of academic eresource providers and consumers, e.g. Universities, Electric Journal Publishers and so on. The expansion of SSO target systems causes several issues in its infrastructure. In this paper, we focus on the issues, (1) rapidly increasing the importance of the user credential at the identity provider, (2) its phishing risk at service providers and (3) the difficulty of choosing own identity provider from the large number of federated providers. We propose a framework to solve the problems using web browser add-on. We have implemented a prototype of the framework. We also discuss the issues in the current implementation.
In this paper we have proposed to present a system for automatic recording of the main physiological parameters of the human body: body temperature, blood pressure, respiratory rate, electrocardiogram (ECG), skin resi...
详细信息
In this paper we have proposed to present a system for automatic recording of the main physiological parameters of the human body: body temperature, blood pressure, respiratory rate, electrocardiogram (ECG), skin resistance, etc. To realize this system, we have developed a program that can read and automatically save in a file, the data from specialized sensors. Further it is possible to interpret of the results, by comparing them with known normal values and thus offering the possibility for a primary health status diagnosis by specialized personnel. The data received from the sensors is taken by an interface circuit, provided with signal conditioning (filtering, amplification, etc). Data acquisition is controlled by a microcontroller using an Arduino Uno standard development platform. The data are transferred to a PC, using serial communication port of Arduino platform. The whole process of health assessment is commissioned by a new program developed by us in the Python programming language. The program provides automatic recording of the aforementioned parameters in a predetermined sequence, or if you want only certain parameters are registered.
The logic TEAMLOG proposed by Dunin-Kȩplicz and Verbrugge is used to express properties of agents' cooperation in terms of individual, bilateral and collective informational and motivational attitudes like beliefs...
详细信息
In this paper, we evaluate the effectiveness of Generalized Procrustes Analysis into an Iterative Closest Point(GPA-ICP) for 3D surface reconstruction of underwater coral reef imagesInstead of using original ICP we us...
详细信息
In this paper, we evaluate the effectiveness of Generalized Procrustes Analysis into an Iterative Closest Point(GPA-ICP) for 3D surface reconstruction of underwater coral reef imagesInstead of using original ICP we use GPA-ICP for final alignment to build 3D modelIn land 3D reconstruction, GPA-ICP is preferable for efficiency and robustnessThis is challenging task to implement GPA-ICP for 3D reconstruction of underwater imagesThis paper generates 3D point cloud of underwater coral reef images from dataset acquired by stereo camera systemThe performance of GPA-ICP is measured by computation time of registration process, visual appearance and Mean Square Error between the point and their closest neighbor compared to the original ICPThe result shows that GPA-ICP is more accurate and faster than the original ICP for 3D surface reconstruction of seafloor images.
Unit testing aims to ensure that methods correctly implement the specified and implied pre- and post-conditions, while integration testing ensures that modules correctly follow interaction protocols. While the generat...
详细信息
ISBN:
(纸本)9781467359610
Unit testing aims to ensure that methods correctly implement the specified and implied pre- and post-conditions, while integration testing ensures that modules correctly follow interaction protocols. While the generation of unit test cases has been explored extensively in the literature, there is still little work on the generation of integration test cases. In this paper we present a new technique to generate integration test cases that leverages existing unit test cases. Our key observation is that both, unit and integration testing, use method calls as the atoms to construct test cases from. Unit tests contain information on how to instantiate classes in meaningful ways, how to construct arguments for method calls, and what the resulting system state should be after calling methods with those arguments. We use this information to construct more complex test cases that focus on class interactions rather than on individual state transformations caused by single method calls. This paper presents the approach and shows that the generated test cases can find interesting faults, compared to test suites generated with state of the art approaches.
With the omnipresent usage of APIs in software development, it has become important to analyse how the routines and functionalities of APIs are actually used. This information is in particular useful for API developer...
详细信息
With the omnipresent usage of APIs in software development, it has become important to analyse how the routines and functionalities of APIs are actually used. This information is in particular useful for API developers, to make decisions about future updates of the API. However, also for developers of static analysis and verification tools this information is highly important, because it indicates where and how to put the most efficient effort in annotating APIs, to make them usable for the static analysis and verification tools. This paper presents an analysis of the usage of the routines and functionalities of the Java concurrency library java. util. concurrent. It discusses the Histogram tool that we developed for this purpose, i.e., to efficiently analyse a large collection of bytecode classes. The Histogram tool is used on a representative benchmark set, the Qualitas Corpus. The paper discusses the results of the analysis of this benchmark set in detail. This covers both an analysis of the important classes and methods used by the current releases of the benchmark collection, as well as an analysis of the time it took for the Java concurrency library to start being used in released software.
This paper deals with the problem of estimating and reducing residual echo components that result from reverberant component beyond the length of FFT block. The residual echo reduction process suppresses the residual ...
详细信息
ISBN:
(纸本)9781627485715
This paper deals with the problem of estimating and reducing residual echo components that result from reverberant component beyond the length of FFT block. The residual echo reduction process suppresses the residual echo by applying a multiplicative gain calculated from the estimated residual echo power spectrum. However, the estimated power spectrum reproduces only a fraction of the echo-path impulse response and so all the reverberant component are not considered. To address this problem, we introduce a finite nonnegative convolution method by which each segment of echo-impulse response is convoluted with a received signal in a power spectral domain. With the proposed method, the power spectra of each segment of echo-impulse response are collectively estimated by solving the least-mean-squares problem between the microphone and the estimated-residual-echo power spectra. The performance of this method was demonstrated by simulation results in which speech distortions were decreased compared with the conventional method.
Agile maintenance is the best choice if you want to keep step with your customer needs. It is a result of trying to respond to customer change requests with the high efficiency. High involvement of the customer in the...
详细信息
ISBN:
(纸本)9781479904297
Agile maintenance is the best choice if you want to keep step with your customer needs. It is a result of trying to respond to customer change requests with the high efficiency. High involvement of the customer in the maintenance process is good but also can have negative effects. Change in the behavior of the customer can influence the execution of the change management process or cause the change of the release plan, etc. All that can destabilize normal maintenance velocity and lead to a chaotic relationship with the customer, if not controlled or prevented. This paper describes problems in agile maintenance caused mostly by the change of the customer behavior at the beginning of the economic crisis. It also presents results of the analysis of these problems and recommendations how to identify them and how to prevent them.
Mobile devices such as cell phones become the widest instrument handed in the students daily activities including browsing Internet and sending e-mails. Several countries such as Japan and US have already applied it i...
详细信息
ISBN:
(纸本)9781479905980
Mobile devices such as cell phones become the widest instrument handed in the students daily activities including browsing Internet and sending e-mails. Several countries such as Japan and US have already applied it in the education and learning processes due to its outstanding characteristics including portability and accessibility. In this work, a mobile-quiz application is suggested and described to facilitate the assessment process inside the high-density classrooms and to increase the interactivity among the instructors and students. Also, a case study of the proposed application in a particular academic Egyptian institution is applied and discussed for the first time with respect of our best knowledge. Basically, three different methods have been suggested to settle this application inside the Egyptian academia according to the available e-learning resources. The preliminary outcomes of the conducted experiment demonstrated the possibility of applying mobile devices within the various academic Egyptian environments.
Recently, software theft was continually reported. The one of technique for detecting software theft was proposed, named software birthmarks. The software birthmark extracts the set of native and unique characteristic...
详细信息
ISBN:
(纸本)9781479903719
Recently, software theft was continually reported. The one of technique for detecting software theft was proposed, named software birthmarks. The software birthmark extracts the set of native and unique characteristics from binary program and compares them to detect suspected copy. The software birthmark is classified by extraction methods into static birthmark and dynamic birthmark. In this paper proposed a dynamic birthmark based on operand stack runtime behaviors of Java Virtual Machine (JVM). The birthmark is originally proposed by Park et al. as a static birthmark. Contributions of this paper are (1) to port a static birthmark to a dynamic birthmark, and (2) to construct basic dynamic analysis technique based on opcode at runtime. To show the effectiveness of the proposed birthmark, we conduct three experiments. The experiments evaluate distinction performance and preservation performance of the birthmark. The preservation performance shows that the proposed birth-mark tolerates against automatic program transformation (About 90% of the birthmark is preserved). The distinction performance shows that the proposed birthmark can distinguish non-copied programs.
暂无评论