72 research outputs found

    TSML: A XML-based Format for Exchange of Training Samples for Pattern Recognition in Remote Sensing Images

    Get PDF
    The availability of large and complex data sets has shifted the focus of pattern recognition towards developing techniques that can efficiently handle these types of data sets. For example, Multiple Classifier Systems claim their ability in reducing the error and complexity of classification by partitioning the data space and combining classifiers predictions. However, it is not an easy task to generate several partitions and moreover to use them in an efficient manner. Another difficult aspect is related to the exchange of training data in different formats among systems to combine classifiers of different and heterogeneous systems. This paper presents a model and structure of training samples based on XML (eXtensible Markup Language) to facilitate the partitioning and exchange among different image classification system. The main contribution is to apply the flexibility of XML that addresses interoperability and communication among heterogeneous systems in partitioning data sets as well as to facilitate interchange of such sets among image processing and pattern recognition systems

    Transformation of UML Behavioral Diagrams to Support Software Model Checking

    Get PDF
    Unified Modeling Language (UML) is currently accepted as the standard for modeling (object-oriented) software, and its use is increasing in the aerospace industry. Verification and Validation of complex software developed according to UML is not trivial due to complexity of the software itself, and the several different UML models/diagrams that can be used to model behavior and structure of the software. This paper presents an approach to transform up to three different UML behavioral diagrams (sequence, behavioral state machines, and activity) into a single Transition System to support Model Checking of software developed in accordance with UML. In our approach, properties are formalized based on use case descriptions. The transformation is done for the NuSMV model checker, but we see the possibility in using other model checkers, such as SPIN. The main contribution of our work is the transformation of a non-formal language (UML) to a formal language (language of the NuSMV model checker) towards a greater adoption in practice of formal methods in software development.Comment: In Proceedings FESCA 2014, arXiv:1404.043

    Uma Proposta de Modelagem para a Generalização de Elos de Rastreabilidade

    Get PDF
    Several models proposed traceability links that provide pre–definedgroups of links for requirements traceability. These models are limited to pre–defined links without the ability to add new attributes to the existing links. This work proposes a model for requirements traceability that generalizes the types of links already establishedin the literature and enables addition of new standards allowing the inclusion of attributes to the links that will be used in a specific traceability process.Diversos modelos propõem tipos pré–definidos de elos para a rastreabilidade de requisitos. Tais modelos fazem extensivas observações sobre as práticas da rastreabilidade, mas são limitados tanto pelos tipos de elos pré–definidos quanto pelacapacidade de incluir atributos para os elos. Este trabalho propõe um modelo para rastreabilidade de requisitos que generaliza os tipos de elos já definidos, permitindo a adição de novos padrões e a inclusão de atributos para os elos que serão utilizados em um determinado processo de rastreabilidade

    Editorial

    Get PDF
    Editorial da Coordenação Científica da Edição Especial Computação Aplicada ao Meio Ambient

    On the Use of Hybrid Heuristics for Providing Service to Select the Return Channel in an Interactive Digital TV Environment

    Get PDF
    The technologies used to link the end-user to a telecommunication infrastructure, has been changing over time due to the consolidation of new access technologies. Moreover, the emergence of new tools for information dissemination, such as interactive digital TV, makes the selection of access technology, factor of fundamental importance. One of the greatest advantages of using digital TV as means to disseminate information is the installation of applications. In this chapter, a load characterization of a typical application embedded in a digital TV is performed to determine its behavior. However, it is important to note that applications send information through an access technology. Therefore, this chapter, based on the study on load characterization, developed a methodology combining Bayesian networks and technique for order preference by similarity to ideal solution (TOPSIS) analytical approach to provide support to service providers to opt for a technology (power line communication, PLC, wireless, wired, etc.) for the return channel

    Establishing a Search String to Detect Secondary Studies in Software Engineering

    Full text link
    Search for secondary studies is essential to establish whether the review on the intended topic has already been done, avoiding waste time. In addition, secondary studies are the inputs of a tertiary study. However, one critical step in searching for secondary studies is to elaborate a search string. The main goal of this work is to analyze search strings to establish directions to better detect secondary studies in Software Engineering (SE). We analyzed seven tertiary studies under two perspectives: (1) structure - strings' terms to detect secondary studies; and (2) field: where searching - titles alone or abstracts alone or titles and abstracts together, among others. We also performed a validation of the results found. The suitable search string for finding secondary studies in SE contain the terms "systematic review", "literature review", "systematic mapping", "mapping study", "systematic map", "meta-analysis", "survey" and "literature analysis". Furthermore, we recommend (1) researchers use the title, abstract and keywords search fields in their searches to increase studies recall; (2) researchers choose carefully their paper title, abstract and keyword terms to increase the chance of having such studies found on digital libraries

    Analysis of handover based on the use of femtocells in LTE networks

    Get PDF
    One of the key elements in the networks LTE (Long Term Evolution) is the possibility of deploying multiple femtocells for the improvement of coverage and data rate. However, arbitrary overlapping coverage of these cells makes the handover mechanism complex and challenging. In this paper, simulations of deploying LTE femtocells in a scenario were evaluated. With this objective, measure impact and correlation of the use of femtocell parameters of QoS (Quality of Service) and handover. Possible limitations of this integration are discussed. Will be the integration of LTE femtocell a panacea? Despite this promising alternative estimates are fraught with uncertainty. The results show that the use of femtocell got worse on indicators of handover, impact on indicators of QoS
    corecore