A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
MICROSERVICE BASED SYSTEM FOR PAPER DOCUMENTS COUNTERFEIT DETECTION
2020
Zenodo
The article represents a novel method of paper document validation using modern smartphones. ...
The proposed paper document validation method is based on paper surface structure comparison of the registered reference document and the candidate document under validation. ...
The work was approved at the International Conference on Electronics, Communications and Computing, ECCO -2019. ...
doi:10.5281/zenodo.3949688
fatcat:pd6s24wt5rfqfd4zvtfx4e7ll4
Information System for Automation of Counterfeited Documents Images Correlation
2016
Procedia Computer Science
Forgery detection of official documents is a continuous challenge encountered by documents' forensic experts. ...
Hence, we have used a scalable algorithm under the OpenCV framework, to compare images, match patterns and analyse textures and colours. ...
Acknowledgements The authors would like to thank the collaboration of the Questioned Documents Forensic Experts of the Scientific Police Laboratory of the Portuguese Judiciary Police. ...
doi:10.1016/j.procs.2016.09.178
fatcat:vk6mjj3yhjchrchyc3betalbcu
PerPaDa: A Persian Paraphrase Dataset based on Implicit Crowdsourcing Data Collection
[article]
2022
arXiv
pre-print
As an implicit crowdsourcing experience, we have gathered a large collection of original and paraphrased sentences from Hamtajoo; a Persian plagiarism detection system, in which users try to conceal cases ...
of text re-use in their documents by paraphrasing and re-submitting manuscripts for analysis. ...
Acknowledgment We would like to thank all of the members of ITBM and AIS research groups of ICT research institute for their contribution in developing the Hamtajoo platform. ...
arXiv:2201.06573v1
fatcat:kzj64olplvcmxomec4jho63sf4
Macro Malware Detection using Machine Learning Techniques - A New Approach
2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy
systems of the victims that open the file. ...
A malware macro (also called "macro virus") is the code that exploits the macro functionality of office documents (especially Microsoft Office's Excel and Word) to carry out malicious action against the ...
document that are external to the code using a system called SFEM, and that when combined with their learning system ALDOCX, help identify malware on office documents. ...
doi:10.5220/0006132202950302
dblp:conf/icissp/SantosT17
fatcat:qkmspf3grfhorlqurjuvqfj3sa
Evaluation of Software Requirement Specification Based on IEEE 830 Quality Properties
2020
International Journal on Advanced Science, Engineering and Information Technology
Completeness quality is used to evaluate the structure of the SRS document; meanwhile, the other three qualities used to evaluate the functional requirement. ...
Corpus contains libraries of term and topic are expected to increase the reliability of detection. ...
A Testdriven approach, which is a use case, has been chosen to validate the functional requirement [14] . Test engineer uses their knowledge and experience to create a test case [15] . ...
doi:10.18517/ijaseit.10.4.10186
fatcat:db6x7iwlvfgm5c2xonnxmg6atm
Candidate Document Retrieval for Web-Scale Text Reuse Detection
[chapter]
2011
Lecture Notes in Computer Science
The retrieved web documents can then be delivered to a text reuse detection system for an in-depth analysis. ...
Given a document d, the task of text reuse detection is to find those passages in d which in identical or paraphrased form also appear in other documents. ...
In our scenario a text reuse detection system "plays" against a retrieval system (the web search engine) in order to find promising queries that help to detect text reuse in or from a given document. ...
doi:10.1007/978-3-642-24583-1_35
fatcat:b3hnk7qitbb6xbme7akcnrgdka
Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing Applications
2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy
This work aims to verify whether using Machine Learning techniques for malware detection in PDF documents with JavaScript embedded could result in an effective way to reinforce traditional solutions like ...
Additionally, we have developed a base framework for malware detection in PDF files, specially designed for cloud computing services, that allows to analyse documents online without needing the document ...
deep analysis of the document content by human analysts or an intelligent system in this case. ...
doi:10.5220/0006609503370344
dblp:conf/icissp/TorresS18
fatcat:5hcbkm4is5hz3cdrft4ifkquva
Versioned Hypermedia can improve software document management
2002
Proceedings of the thirteenth ACM conference on Hypertext and hypermedia - HYPERTEXT '02
This short paper presents research issues, initial results and a scheme for using hypermedia versioning and time stamps to automate detection of possible semantic non-conformance among software artifacts ...
The Software Concordance project is addressing the software document management problem by providing a fine-grained version control model for software documents and their relationships using hypermedia ...
DETECTING NON-CONFORMANCE Software systems evolve over time as the system is constructed from scratch and then as the system goes through a series of release versions. ...
doi:10.1145/513338.513385
dblp:conf/ht/NguyenGM02
fatcat:yripqxwogrcltiafr6b4omdshe
REST service testing based on inferred XML schemas
2014
Network Protocols and Algorithms
In this article, we present an automatic error detection system for REST services, based on a statistical analysis over responses produced at multiple service invocations. ...
It can be also useful as a complement to other testing mechanisms. ...
Acknowledgement The work for this paper was partially supported by funding from ISBAN and PRODUBAN, under the Center for Open Middleware initiative. ...
doi:10.5296/npa.v6i2.5360
fatcat:wwnipl3ywbcqdcvi4llhxgcpxy
Experimental quantification of Geant4 PhysicsList recommendations: methods and results
2015
Journal of Physics, Conference Series
Limited documentation is available in the literature about Geant4 pre-packaged PhysicsLists and their validation. The reports in the literature mainly concern specific use cases. ...
This paper documents the epistemological grounds for the validation of Geant4 pre-packaged PhysicsLists (and their accessory classes, Builders and PhysicsConstructors) and some examples of the author's ...
Acknowledgments The authors acknowledge the support from their institutes and funding agencies in the course of the research documented in this paper. ...
doi:10.1088/1742-6596/664/7/072037
fatcat:rbehp47n2jhwfnk5wm7plm4sce
An experiment to observe the impact of UML diagrams on the effectiveness of software requirements inspections
2009
2009 3rd International Symposium on Empirical Software Engineering and Measurement
The results show that including UML diagrams in requirements specification document significantly impacts the number of reported defects, and there is no significant impact on the effectiveness of individual ...
Software inspections aim to find defects early in the development process and studies have found them to be effective. ...
Acknowledgment We wish to thank the subjects who collaborated with us. ...
doi:10.1109/esem.2009.5314229
dblp:conf/esem/Albayrak09
fatcat:2l5okahfkjgc7lgzhtaamvfez4
A review on automatic extraction and classification of non-functional requirements
2017
International Journal of Advanced and Applied Sciences
Specifically we have identified the limitations of these techniques, their significance and the possible improvements that can be made to make these techniques more useful. ...
In this paper, we have critically evaluated various techniques and methods proposed in the literature on the automatic extraction and classification of NFRs. ...
Detection techniques detect the low-level early aspects in design and code from different requirement specification document. ...
doi:10.21833/ijaas.2017.06.005
fatcat:g7xguri32nbifdgbnaznu7xeym
PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications
2011
International Journal on Web Service Computing
XML Path or XPath language is used for querying information from the nodes of an XML document. ...
The identified inputs are used to design an XML file and it would be validated through a schema. ...
Doing so would allow a malicious user to bypass authentication (if an XML-based authentication system is used) or to access restricted data from the XML data source. ...
doi:10.5121/ijwsc.2011.2305
fatcat:u6ulczt6avd75ndmgwcj2isxpq
Where the Event Lies
2016
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval - SIGIR '16
The system allows to specify events, retrieves candidate web documents, and assesses whether events occur in them. ...
The validation method relies on a supervised model to predict the occurrence of events in a non-annotated corpus. This system can also be used to build ground-truths for event corpora. ...
Acknowledgments This work was partially funded by the European Commission in the context of the FP7 project QualiMaster (grant No: 619525) and H2020 project AFEL (grant No. 687916). ...
doi:10.1145/2911451.2911452
dblp:conf/sigir/CeroniGMWF16
fatcat:ewmi7afxv5bf7nq5dyrjcnzqum
A Hybrid Approach and Unified Framework for Bibliographic Reference Extraction
[article]
2020
arXiv
pre-print
to detect and visualize references from a bibliographic document. ...
Bibliographic reference extraction from scientific publication is a challenging task due to diversity in referencing styles and document layout. ...
Philipp Zumstein, Laura Erhard, and Sylvia Zander for providing us dataset scans and annotations. We would also like to thank Muhammad Naseer Bajwa for his assistance during the evaluation process. ...
arXiv:1912.07266v2
fatcat:mmn4box3ubfq5matfmn666uoxy
« Previous
Showing results 1 — 15 out of 649,358 results