Search
Search Results
-
Traffic collision avoidance system: false injection viability
Safety is a simple concept but an abstract task, specifically with aircraft. One critical safety system, the Traffic Collision Avoidance System II...
-
WSAD-Net: Weakly Supervised Anomaly Detection in Untrimmed Surveillance Videos
Weakly supervised anomaly detection (WSAD) is a newfangled and challenging task, the goal of which is to detect anomalous activities in untrimmed... -
Model-Based Performance Enhancement for Compound Twisted and Coiled Actuators
Twisted and Coiled Actuators (TCAs) are a class of new artificial muscles for flexible actuations. However, the existing TCAs are difficult to... -
The Integrated Game Transformation Framework and Cyberwar: What 2×2 Games Tell Us About Cyberattacks
We apply a game theory framework to cyber war in the areas of Cyber Influence Operations (CIOs), Advanced Persistent Threats (APTs), and Traditional... -
CGWO: An Improved Grey Wolf Optimization Technique for Test Case Prioritization
AbstractThe convergence rate has been widely accepted as a performance measure for choosing a better metaheuristic algorithm. So, we propose a novel...
-
Dynamic Airspace Control via Spatial Network Morphing
In the coming years, a plethora of new and autonomous aircraft will fill the airspace, approaching a density similar to the ground traffic below. At... -
Graphical composite modeling and simulation for multi-aircraft collision avoidance
Modeling and simulation for multi-aircraft collision avoidance to understand the mechanistic behavior is an important activity. Building models using...
-
The Influence of Computer Aided System Teaching on Vocabulary Learning
Computer assisted instruction (CAI) has been widely used in the practice of vocabulary learning in classroom teaching. The methods of vocabulary... -
Leveraging Event-B Theories for Handling Domain Knowledge in Design Models
Formal system modelling languages lack explicit constructs to model domain knowledge, hindering clear separation of this knowledge from system design... -
Test input generation from cause–effect graphs
Cause–effect graphing is a well-known requirement-based and systematic testing method with a heuristic approach. Since it was introduced by Myers in...
-
A bounded constraint-based approach to aid in fault localization from a counterexample
A model checker can produce a trace of counter-example for an erroneous program, which is often difficult to exploit for locating faults. In this...
-
VGCas: distinguishing the cascade structure and the global structure in popularity prediction
Online social platforms like Twitter, Weibo, and Facebook have developed rapidly in recent years. These platforms offer people more opportunities to...
-
HyperPUT: generating synthetic faulty programs to challenge bug-finding tools
As research in automatically detecting bugs grows and produces new techniques, having suitable collections of programs with known bugs becomes...
-
Error Invariants for Fault Localization via Abstract Interpretation
Fault localization aims to automatically identify the cause of an error in a program by localizing the error to a relatively small part of the... -
Analysis of Airline Pilots’ Risk Perception While Flying During COVID-19 Through Flight Data Monitoring and Air Safety Reports
The onset of the COVID-19 pandemic has created a new operating environment (involving less traffic and ATC shortcuts, therefore more direct... -
Brain MRI tumour classification using quantum classical convolutional neural net architecture
The use of quantum machines leverages the performance of classical machines in many aspects of solving real-world problems. Classification of a brain...
-
Crowdsourcing of labeling image objects: an online gamification application for data collection
This study aimed to improve the labeling of objects inside images in the crowdsourcing process. Images are one of the most widely used types of data...
-
A coincidental correctness test case identification framework with fuzzy C-means clustering
Cleansing coincidental correctness test cases has been proven to be useful in software fault localization. However, k -means clustering-based...
-
Deadline-aware and energy efficient IoT task scheduling using fuzzy logic in fog computing
Fog computing is an emerging paradigm that extends cloud computing (CC) by providing computation, communication, and storage services at the edge of...