The literature abounds with discussions on the relative security merits of various voting systems, and on whether a move towards electronic voting is, from a security perspective, something to be encouraged or discour...
详细信息
Background:The occurrences of missing data in software project data set bring significant impact on effort *** significant impacts of this problem are wasted information and biased *** common studies conducted to inve...
详细信息
Background:The occurrences of missing data in software project data set bring significant impact on effort *** significant impacts of this problem are wasted information and biased *** common studies conducted to investigate in depth this area is to find sophisticated missing imputation techniques but there are only small numbers of research questioning the quality of ***:This paper aims to systematically analyze researches done on missing data imputation techniques to estimate software effort and review the current approaches exist in the ***:We performed a systematic literature of empirical studies of data imputation techniques published in from 2000-2012.
One of the applications that motivates this research is a system for detection of the anomalies in wireless sensor networks (WSNs). Individual sensor measurements are converted to ellipsoidal summaries;a data matrix D...
详细信息
ISBN:
(纸本)9781467314886
One of the applications that motivates this research is a system for detection of the anomalies in wireless sensor networks (WSNs). Individual sensor measurements are converted to ellipsoidal summaries;a data matrix D is built using a dissimilarity measure between pairs of ellipsoids;clusters of ellipsoids are suggested by dark blocks along the diagonal of an iVAT (improved Visual Assessment of Tendency) image of D;and finally, the single linkage algorithm extracts clusters from D, using the iVAT image as a guide to the selection of an optimal partition. We illustrate this model for higher dimensional data with synthetic, real and benchmark data sets. Our examples show that two of the four measures, viz, Focal distance and Bhattacharyya distance, provide very similar and reliable bases for estimating cluster structures in sets of higher dimensional ellipsoids, that single linkage can successfully extract the indicated clusters, and that our model can find both first and second order anomalies in WSN data.
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t...
详细信息
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primar...
详细信息
ISBN:
(纸本)9781467321112
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primary methods to make the morphing based information hiding technology practically useful is interactive evolutionary algorithm (IEA). When using IEA, however, the user who is rating the images for their naturalness must rate a large amount of images. During this period of time, it is possible for the user to subconsciously shift the rating criteria, thus skewing the results of the algorithm. To help solve this problem, we propose a k-nearest neighbor (k-NN) reminder, which analyzes the user's previous inputs and creates an estimated fitness rating for images to aid the user in grounding his or her ratings. We ran experiments testing the differences in using the IEA with and without the k-NN reminder, looking to see what impact the algorithm had on the speed of the analysis and the ease of the user's rating ability. Results show that in many instances, the k-NN makes it easier for the user to maintain a standard criterion for the rating of images, with no noticeable impact on the speed of the process.
User interface development and maintenance is one of the most time consuming parts of software application *** interfaces provide numerous graphical visualizations of user data,these are often influenced by multiple f...
详细信息
User interface development and maintenance is one of the most time consuming parts of software application *** interfaces provide numerous graphical visualizations of user data,these are often influenced by multiple factors such as available interface elements,data constraints,layouts,user operating devices or user *** complexity of the development and maintenance raises from duplicated and restated *** occurs multiple times in the application,for example data model already contains data constraints and these are restated in the *** only information but also decisions are duplicated when an interface element is selected and bound to a particular data *** driven code-inspection and its transformation to user interface brings the way to address complex efforts related to user *** this paper we present code-inspection approach to automate user interface development and maintenance,we also provide a case study that compares the approach with manual development.
Assessment is an important and widely used element of the taught ***-Assisted Assessment (CAA) systems are helping teachers by automatic marking of assessments of low-stake high volume exams (e.g.,school level).Fo...
详细信息
Assessment is an important and widely used element of the taught ***-Assisted Assessment (CAA) systems are helping teachers by automatic marking of assessments of low-stake high volume exams (e.g.,school level).For accurate and efficient marking of the exams,these systems require either training on pre-marked data or creating detailed representation of templates of the model *** of these reasons,CAA systems are not adequate for high-stake low volume assessments (e.g.,university level).As compared to fully automatic assessment approaches,semi-automatic approaches are ***-computer Collaborative Assessment (HCCA) is one such approach that involves human marker in the marking *** clusters short text answers and then present these clusters to the human marker for *** of long text answers is problematic because of problems pose by natural *** this research,we suggest automatic summarization as a means to reduce noise and length of the text answers to improve clustering of answers and hence marking.
A trimaran is a multihulled boat consisting of a main hull and two smaller outrigger hulls, attached to the main hull with lateral struts. There have been many studies highlighting that a trimaran takes many advantage...
详细信息
ISBN:
(纸本)9781467308298
A trimaran is a multihulled boat consisting of a main hull and two smaller outrigger hulls, attached to the main hull with lateral struts. There have been many studies highlighting that a trimaran takes many advantages over other types of hulls especially the roll performance, because of the greater resistance to rolling that the outrigger hulls offer. In order to study the rolling motion of a trimaran, an accurate roll motion model is needed. The rolling motion of a trimaran is inherently nonlinear due to both nonlinearities in the restoring moment and damping moment. This paper presents an estimation method to predict the linear and nonlinear roll damping parameters based on free roll decay experiments of a trimaran, whose outrigger hulls are movable both along the longitudinal and transverse direction. The estimation method is based on least square support vector regression (LS-SVR) theory. In order to verify the performance of this new estimation method, the least square (LS) estimation method is also applied to identify the parameters. Both methods show satisfying performances, however models generated by LS-SVR shows less accumulated errors than models generated by LS.
Production level software applications consist of thousands lines of source code. Although, the "main information" is captured by a small amount of code, it must be restated and extended on multiple places a...
详细信息
Production level software applications consist of thousands lines of source code. Although, the "main information" is captured by a small amount of code, it must be restated and extended on multiple places as it is used for interaction among components or for user interface visualization. Restated information leads to code dependency, complex maintenance efforts and increased potential for errors. Even in modern frameworks it is a common practice to restate and enhance information among components. In this paper we suggest that the main information is captured only once and components that need to restate it are generated from the machine-driven source code inspection. In this approach inspection gathers information that is supplied to extension components in the transformation process. Extension components are reused throughout the transformation and thus farther reduce duplication. Benefits of the approach are reduction of duplicates, error and inconsistency avoidance and reduced efforts in development and maintenance.
It is common practice for requirements traceability research to consider method call dependencies within the source code (e.g., fan-in/fan-out analyses). However, current approaches largely ignore the role of data. Th...
详细信息
It is common practice for requirements traceability research to consider method call dependencies within the source code (e.g., fan-in/fan-out analyses). However, current approaches largely ignore the role of data. The question this paper investigates is whether data dependencies have similar relationships to requirements as do call dependencies. For example, if two methods do not call one another, but do have access to the same data then is this information relevant? We formulated several research questions and validated them on three large software systems, covering about 120 KLOC. Our findings are that data relationships are roughly equally relevant to understanding the relationship to requirements traces than calling dependencies. However, most interestingly, our analyses show that data dependencies complement call dependencies. These findings have strong implications on all forms of code understanding, including trace capture, maintenance, and validation techniques (e.g., information retrieval).
暂无评论