Software Product Line(SPL)is a group of software-intensive systems that share common and variable resources for developing a particular system.The feature model is a tree-type structure used to manage SPL’s common an...Software Product Line(SPL)is a group of software-intensive systems that share common and variable resources for developing a particular system.The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints(CTC).CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things(IoT)devices because different Internet devices and protocols are communicated.Therefore,managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex,time-consuming,and hard.However,the CTC problem needs to be considered in previously proposed approaches such as Commonality VariabilityModeling of Features(COVAMOF)andGenarch+tool;therefore,invalid products are generated.This research has proposed a novel approach Binary Oriented Feature Selection Crosstree Constraints(BOFS-CTC),to find all possible valid products by selecting the features according to cardinality constraints and cross-tree constraint problems in the featuremodel of SPL.BOFS-CTC removes the invalid products at the early stage of feature selection for the product configuration.Furthermore,this research developed the BOFS-CTC algorithm and applied it to,IoT-based feature models.The findings of this research are that no relationship constraints and CTC violations occur and drive the valid feature product configurations for the application development by removing the invalid product configurations.The accuracy of BOFS-CTC is measured by the integration sampling technique,where different valid product configurations are compared with the product configurations derived by BOFS-CTC and found 100%correct.Using BOFS-CTC eliminates the testing cost and development effort of invalid SPL products.展开更多
Today’s forensic science introduces a new research area for digital image analysis formultimedia security.So,Image authentication issues have been raised due to the wide use of image manipulation software to obtain a...Today’s forensic science introduces a new research area for digital image analysis formultimedia security.So,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or createmisleading publicity by using tempered images.Exiting forgery detectionmethods can classify only one of the most widely used Copy-Move and splicing forgeries.However,an image can contain one or more types of forgeries.This study has proposed a hybridmethod for classifying Copy-Move and splicing images using texture information of images in the spatial domain.Firstly,images are divided into equal blocks to get scale-invariant features.Weber law has been used for getting texture features,and finally,XGBOOST is used to classify both Copy-Move and splicing forgery.The proposed method classified three types of forgeries,i.e.,splicing,Copy-Move,and healthy.Benchmarked(CASIA 2.0,MICCF200)and RCMFD datasets are used for training and testing.On average,the proposed method achieved 97.3% accuracy on benchmarked datasets and 98.3% on RCMFD datasets by applying 10-fold cross-validation,which is far better than existing methods.展开更多
文摘Software Product Line(SPL)is a group of software-intensive systems that share common and variable resources for developing a particular system.The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints(CTC).CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things(IoT)devices because different Internet devices and protocols are communicated.Therefore,managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex,time-consuming,and hard.However,the CTC problem needs to be considered in previously proposed approaches such as Commonality VariabilityModeling of Features(COVAMOF)andGenarch+tool;therefore,invalid products are generated.This research has proposed a novel approach Binary Oriented Feature Selection Crosstree Constraints(BOFS-CTC),to find all possible valid products by selecting the features according to cardinality constraints and cross-tree constraint problems in the featuremodel of SPL.BOFS-CTC removes the invalid products at the early stage of feature selection for the product configuration.Furthermore,this research developed the BOFS-CTC algorithm and applied it to,IoT-based feature models.The findings of this research are that no relationship constraints and CTC violations occur and drive the valid feature product configurations for the application development by removing the invalid product configurations.The accuracy of BOFS-CTC is measured by the integration sampling technique,where different valid product configurations are compared with the product configurations derived by BOFS-CTC and found 100%correct.Using BOFS-CTC eliminates the testing cost and development effort of invalid SPL products.
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R236),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Today’s forensic science introduces a new research area for digital image analysis formultimedia security.So,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or createmisleading publicity by using tempered images.Exiting forgery detectionmethods can classify only one of the most widely used Copy-Move and splicing forgeries.However,an image can contain one or more types of forgeries.This study has proposed a hybridmethod for classifying Copy-Move and splicing images using texture information of images in the spatial domain.Firstly,images are divided into equal blocks to get scale-invariant features.Weber law has been used for getting texture features,and finally,XGBOOST is used to classify both Copy-Move and splicing forgery.The proposed method classified three types of forgeries,i.e.,splicing,Copy-Move,and healthy.Benchmarked(CASIA 2.0,MICCF200)and RCMFD datasets are used for training and testing.On average,the proposed method achieved 97.3% accuracy on benchmarked datasets and 98.3% on RCMFD datasets by applying 10-fold cross-validation,which is far better than existing methods.