期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
A Hybrid Model for Improving Software Cost Estimation in Global Software Development
1
作者 Mehmood Ahmed Noraini B.Ibrahim +4 位作者 Wasif Nisar Adeel Ahmed Muhammad Junaid Emmanuel Soriano Flores divya anand 《Computers, Materials & Continua》 SCIE EI 2024年第1期1399-1422,共24页
Accurate software cost estimation in Global Software Development(GSD)remains challenging due to reliance on historical data and expert judgments.Traditional models,such as the Constructive Cost Model(COCOMO II),rely h... Accurate software cost estimation in Global Software Development(GSD)remains challenging due to reliance on historical data and expert judgments.Traditional models,such as the Constructive Cost Model(COCOMO II),rely heavily on historical and accurate data.In addition,expert judgment is required to set many input parameters,which can introduce subjectivity and variability in the estimation process.Consequently,there is a need to improve the current GSD models to mitigate reliance on historical data,subjectivity in expert judgment,inadequate consideration of GSD-based cost drivers and limited integration of modern technologies with cost overruns.This study introduces a novel hybrid model that synergizes the COCOMO II with Artificial Neural Networks(ANN)to address these challenges.The proposed hybrid model integrates additional GSD-based cost drivers identified through a systematic literature review and further vetted by industry experts.This article compares the effectiveness of the proposedmodelwith state-of-the-artmachine learning-basedmodels for software cost estimation.Evaluating the NASA 93 dataset by adopting twenty-six GSD-based cost drivers reveals that our hybrid model achieves superior accuracy,outperforming existing state-of-the-artmodels.The findings indicate the potential of combining COCOMO II,ANN,and additional GSD-based cost drivers to transform cost estimation in GSD. 展开更多
关键词 Artificial neural networks COCOMO II cost drivers global software development linear regression software cost estimation
下载PDF
Stress Detector Supported Galvanic Skin Response System with IoT and LabVIEW GUI
2
作者 Rajesh Singh Anita Gehlot +5 位作者 Ritika Saxena Khalid Alsubhi divya anand Irene Delgado Noya Shaik Vaseem Akram Sushabhan Choudhury 《Computers, Materials & Continua》 SCIE EI 2023年第1期1217-1233,共17页
Stress is now a serious disease that exists due to changes in working life and food ecosystems around the world.In general,it is difficult for a person to know if they are under stress.According to previous research,t... Stress is now a serious disease that exists due to changes in working life and food ecosystems around the world.In general,it is difficult for a person to know if they are under stress.According to previous research,temperature,heart rate variability(HRV),humidity,and blood pressure are used to assess stress levels with the use of instruments.With the development of sensor technology and wireless connectivity,people around the world are adopting and using smart devices.In this study,a bio signal detection device with Internet of Things(IoT)capability with a galvanic skin reaction(GSR)sensor is proposed and built for real-time stress monitoring.The proposed device is based on an Arduino controller and Bluetooth communication.To evaluate the performance of the system,physical stress is created on 10 different participants with three distinct tasks namely reading,visualizing the timer clock,and watching videos.MATLAB analysis is performed for identifying the three different levels of stress and obtaining the threshold values as if the person GSR voltage i.e.,relaxed for<1.75 volts;Normal:between 1.75 and 1.44 volts and stressed:>1.44 volts.In addition,LabVIEW is used as a data acquisition system,and a Blueterm mobile application is also used to view the sensor reading received from the device through Bluetooth communication. 展开更多
关键词 GSR LABVIEW stress detection MATLAB IOT BLUETOOTH
下载PDF
Energy Efficient Unequal Fault Tolerance Clustering Approach
3
作者 Sowjanya Ramisetty divya anand +4 位作者 Kavita Sahil Verma NZ Jhanjhi Mehedi Masud Mohammed Baz 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1971-1983,共13页
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network lifetime.For saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor Networks.Because of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure.For increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor nodes.An Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster Head.The data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the BS.Thus,the MCH overhead reduces.During the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods. 展开更多
关键词 ENERGY-EFFICIENCY unequal fault tolerant clustering approach particle swarm optimization master data aggregator energy efficient time division multiple access optimal nodes
下载PDF
Load Balancing Algorithm for Migrating Switches in Software-Dened Vehicular Networks 被引量:4
4
作者 Himanshi Babbar Shalli Rani +3 位作者 Mehedi Masud Sahil Verma divya anand Nz Jhanjhi 《Computers, Materials & Continua》 SCIE EI 2021年第4期1301-1316,共16页
In Software-Dened Networks(SDN),the divergence of the control interface from the data plane provides a unique platform to develop a programmable and exible network.A single controller,due to heavy load trafc triggered... In Software-Dened Networks(SDN),the divergence of the control interface from the data plane provides a unique platform to develop a programmable and exible network.A single controller,due to heavy load trafc triggered by different intelligent devices can not handle due to it’s restricted capability.To manage this,it is necessary to implement multiple controllers on the control plane to achieve quality network performance and robustness.The ow of data through the multiple controllers also varies,resulting in an unequal distribution of load between different controllers.One major drawback of the multiple controllers is their constant conguration of the mapping of the switch-controller,quickly allowing unequal distribution of load between controllers.To overcome this drawback,Software-Dened Vehicular Networking(SDVN)has evolved as a congurable and scalable network,that has quickly achieved attraction in wireless communications from research groups,businesses,and industries administration.In this paper,we have proposed a load balancing algorithm based on latency for multiple SDN controllers.It acknowledges the evolving characteristics of real-time latency vs.controller loads.By choosing the required latency and resolving multiple overloads simultaneously,our proposed algorithm solves the loadbalancing problems with multiple overloaded controllers in the SDN control plane.In addition to the migration,our algorithm has improved 25%latency as compared to the existing algorithms. 展开更多
关键词 Software-dened networking load balancing multiple controllers ryu controller mininet
下载PDF
A Secure and Efficient Signature Scheme for IoT in Healthcare 被引量:1
5
作者 Latika Kakkar Deepali Gupta +5 位作者 Sarvesh Tanwar Sapna Saxena Khalid Alsubhi divya anand Irene Delgado Noya Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2022年第12期6151-6168,共18页
To provide faster access to the treatment of patients,healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient.There is a huge limitation in the sensing la... To provide faster access to the treatment of patients,healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient.There is a huge limitation in the sensing layer as the IoT devices here have low computational power,limited storage and less battery life.So,this huge amount of data needs to be stored on the cloud.The information and the data sensed by these devices is made accessible on the internet from where medical staff,doctors,relatives and family members can access this information.This helps in improving the treatment as well as getting faster medical assistance,tracking of routine activities and health focus of elderly people on frequent basis.However,the data transmission from IoT devices to the cloud faces many security challenges and is vulnerable to different security and privacy threats during the transmission path.The purpose of this research is to design a Certificateless Secured Signature Scheme that will provide a magnificent amount of security during the transmission of data.Certificateless signature,that removes the intricate certificate management and key escrow problem,is one of the practical methods to provide data integrity and identity authentication for the IoT.Experimental result shows that the proposed scheme performs better than the existing certificateless signature schemes in terms of computational cost,encryption and decryption time.This scheme is the best combination of high security and cost efficiency and is further suitable for the resource constrained IoT environment. 展开更多
关键词 CSSS digital signature ECC IOT security SIGNCRYPTION smart healthcare system
下载PDF
Fault Pattern Diagnosis and Classification in Sensor Nodes Using Fall Curve 被引量:1
6
作者 Mudita Uppal Deepali Gupta +5 位作者 divya anand Fahd S.Alharithi Jasem Almotiri Arturo Mansilla Dinesh Singh Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2022年第7期1799-1814,共16页
The rapid expansion of Internet of Things(IoT)devices deploys various sensors in different applications like homes,cities and offices.IoT applications depend upon the accuracy of sensor data.So,it is necessary to pred... The rapid expansion of Internet of Things(IoT)devices deploys various sensors in different applications like homes,cities and offices.IoT applications depend upon the accuracy of sensor data.So,it is necessary to predict faults in the sensor and isolate their cause.A novel primitive technique named fall curve is presented in this paper which characterizes sensor faults.This technique identifies the faulty sensor and determines the correct working of the sensor.Different sources of sensor faults are explained in detail whereas various faults that occurred in sensor nodes available in IoT devices are also presented in tabular form.Fault prediction in digital and analog sensors along with methods of sensor fault prediction are described.There are several advantages and disadvantages of sensor fault prediction methods and the fall curve technique.So,some solutions are provided to overcome the limitations of the fall curve technique.In this paper,a bibliometric analysis is carried out to visually analyze 63 papers fetched from the Scopus database for the past five years.Its novelty is to predict a fault before its occurrence by looking at the fall curve.The sensing of current flow in devices is important to prevent a major loss.So,the fall curves of ACS712 current sensors configured on different devices are drawn for predicting faulty or non-faulty devices.The analysis result proved that if any of the current sensors gets faulty,then the fall curve will differ and the value will immediately drop to zero.Various evaluation metrics for fault prediction are also described in this paper.At last,this paper also addresses some possible open research issues which are important to deal with false IoT sensor data. 展开更多
关键词 Fault identification fault classification IoT sensor nodes analog sensors digital sensors fall curve
下载PDF
A Novel Deep Learning Based Healthcare Model for COVID-19 Pandemic Stress Analysis
7
作者 Ankur Dumka Parag Verma +5 位作者 Rajesh Singh Anil Kumar Bisht divya anand Hani Moaiteq Aljahdali Irene Delgado Noya Silvia Aparicio Obregon 《Computers, Materials & Continua》 SCIE EI 2022年第9期6029-6044,共16页
Coronavirus(COVID-19)has impacted nearly every person across the globe either in terms of losses of life or as of lockdown.The current coronavirus(COVID-19)pandemic is a rare/special situation where people can express... Coronavirus(COVID-19)has impacted nearly every person across the globe either in terms of losses of life or as of lockdown.The current coronavirus(COVID-19)pandemic is a rare/special situation where people can express their feelings on Internet-based social networks.Social media is emerging as the biggest platform in recent years where people spend most of their time expressing themselves and their emotions.This research is based on gathering data from Twitter and analyzing the behavior of the people during the COVID-19 lockdown.The research is based on the logic expressed by people in this perspective and emotions for the suffering of COVID-19 and lockdown.In this research,we have used a Long Short-Term Memory(LSTM)network model with Convolutional Neural Network using Keras python deep-learning library to determine whether social media platform users are depressed in terms of positive,negative,or neutral emotional out bust based on their Twitter posts.The results showed that the model has 88.14%accuracy(representation of the correct prediction over the test dataset)after 10 epochs which most tweets showed had neutral polarity.The evaluation shows interesting results in positive(1),negative(–1),and neutral(0)emotions through different visualization. 展开更多
关键词 COVID-19 lockdown stress analysis depression analysis sentiment analysis social media COVID-19 twitter dataset CORONAVIRUS
下载PDF
Intelligent Approach for Clustering Mutations’ Nature of COVID-19 Genome
8
作者 Ankur Dumka Parag Verma +5 位作者 Rajesh Singh Anuj Bhardwaj Khalid Alsubhi divya anand Irene Delgado Noya Silvia Aparicio Obregon 《Computers, Materials & Continua》 SCIE EI 2022年第9期4453-4466,共14页
In December 2019,a group of people in Wuhan city of Hubei province of China were found to be affected by an infection called dark etiology pneumonia.The outbreak of this pneumonia infection was declared a deadly disea... In December 2019,a group of people in Wuhan city of Hubei province of China were found to be affected by an infection called dark etiology pneumonia.The outbreak of this pneumonia infection was declared a deadly disease by the China Center for Disease Control and Prevention on January 9,2020,named Novel Coronavirus 2019(nCoV-2019).This nCoV-2019 is now known as COVID-19.There is a big list of infections of this coronavirus which is present in the form of a big family.This virus can cause several diseases that usually develop with a serious problem.According to the World Health Organization(WHO),2019-nCoV has been placed as the modern generation of Severe Acute Respiratory Syndrome(SARS)and Middle East Respiratory Syndrome(MERS)coronaviruses,so COVID-19 can repeatedly change its internal genome structure to extend its existence.Understanding and accurately predicting the mutational properties of the genome structure of COVID-19 can form a good leadership role in preventing and fighting against coronavirus.In this research paper,an analytical approach has been presented which is based on the k-means cluster technique of machine learning to find the clusters over the mutational properties of the COVID-19 viruses’complete genome.This method would be able to act as a promising tool to monitor and track pathogenic infections in their stable and local genetics/hereditary varieties.This paper identifies five main clusters of mutations with k=5 as best in most cases in the coronavirus that could help scientists and researchers develop disease control vaccines for the transformation of coronaviruses. 展开更多
关键词 nCoV-2019 SARS-CoV-2 COVID-19 genome structure ETIOLOGY COVID-19 mutations COVID-19 genomes
下载PDF
A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks
9
作者 Vivek Kumar Sinha divya anand +1 位作者 Fahd S.Alharithi Ahmed H.Almulihi 《Computers, Materials & Continua》 SCIE EI 2022年第6期6293-6305,共13页
The 3PAKE(Three-Party Authenticated Key Exchange)protocol is a valuable cryptographic method that offers safe communication and permits two diverse parties to consent to a new safe meeting code using the trusted serve... The 3PAKE(Three-Party Authenticated Key Exchange)protocol is a valuable cryptographic method that offers safe communication and permits two diverse parties to consent to a new safe meeting code using the trusted server.There have been explored numerous 3PAKE protocols earlier to create a protected meeting code between users employing the trusted server.However,existing modified 3PAKE protocols have numerous drawbacks and are incapable to provide desired secrecy against diverse attacks such as manin-the-middle,brute-force attacks,and many others in social networks.In this article,the authors proposed an improved as well as safe 3PAKE protocol based on the hash function and the symmetric encryption for the social networks.The authors utilized a well-acknowledged AVISPA tool to provide security verification of the proposed 3PAKE technique,and findings show that our proposed protocol is safer in opposition to active as well as passive attacks namely the brute-force,man-in-the-middle,parallel attack,and many more.Furthermore,compared to other similar schemes,the proposed protocol is built with a reduced computing cost as our proposed protocol consumes less time in execution and offers high secrecy in the social networks with improved accuracy.As a result,this verified scheme is more efficient as well as feasible for implementation in the social networks in comparison to previous security protocols.Although multifarious authors carried out extensive research on 3PAKE protocols to offer safe communication,still there are vital opportunities to explore and implement novel improved protocols for higher safety in the social networks and mobile commerce environment in the future in opposition to diverse active as well as passive attacks. 展开更多
关键词 AVISPA tool 3PAKE protocol hash function symmetric encryption social networks
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部