期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Software Effort Prediction Using Ensemble Learning Methods
1
作者 omar h. alhazmi Mohammed Zubair Khan 《Journal of Software Engineering and Applications》 2020年第7期143-160,共18页
<div style="text-align:justify;"> <span style="font-family:Verdana;">Software Cost Estimation (SCE) is an essential requirement in producing software these days. Genuine accurate estima... <div style="text-align:justify;"> <span style="font-family:Verdana;">Software Cost Estimation (SCE) is an essential requirement in producing software these days. Genuine accurate estimation requires cost-and-efforts factors in delivering software by utilizing algorithmic or Ensemble Learning Methods (ELMs). Effort is estimated in terms of individual months and length. Overestimation as well as underestimation of efforts can adversely affect software development. Hence, it is the responsibility of software development managers to estimate the cost using the best possible techniques. The predominant cost for any product is the expense of figuring effort. Subsequently, effort estimation is exceptionally pivotal and there is a constant need to improve its accuracy. Fortunately, several efforts estimation models are available;however, it is difficult to determine which model is more accurate on what dataset. Hence, we use ensemble learning bagging with base learner Linear regression, SMOReg, MLP, random forest, REPTree, and M5Rule. We also implemented the feature selection algorithm to examine the effect of feature selection algorithm BestFit and Genetic Algorithm. The dataset is based on 499 projects known as China. The results show that the Mean Magnitude Relative error of Bagging M5 rule with Genetic Algorithm as Feature Selection is 10%, which makes it better than other algorithms.</span> </div> 展开更多
关键词 Software Cost Estimation (SCE) Ensemble Learning BAGGING Linear Regression SMOReg REPTree M5 Rule
下载PDF
Performance Analysis of the Hybrid MQTT/UMA and Restful IoT Security Model
2
作者 omar h. alhazmi Khalid S. Aloufi 《Advances in Internet of Things》 2021年第1期26-41,共16页
Internet of Things (IoT) environments are being deployed all over the globe. They have the potential to form solutions to applications, from small scale applications to national and international ones. Therefore, scal... Internet of Things (IoT) environments are being deployed all over the globe. They have the potential to form solutions to applications, from small scale applications to national and international ones. Therefore, scalability, performance, and security form a triangle of requirements that must be carefully set. Furthermore, IoT applications require higher security standards. A previously proposed IoT application framework with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA) is analyzed in this work. The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The results and analysis showed that the built-in security model had performed better than models with other frameworks, especially with fog implementation. 展开更多
关键词 IOT MQTT (Message Queuing Telemetry Transport) UMA (User-Managed Access) Network Security
下载PDF
A Hybrid IoT Security Model of MQTT and UMA
3
作者 Khalid S. Aloufi omar h. alhazmi 《Communications and Network》 2020年第4期155-173,共19页
IoT applications are promising for future daily activities;therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furth... IoT applications are promising for future daily activities;therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furthermore, IoT applications require higher security standards. In this work, an IoT application framework is presented with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA). The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The security in the model is a built-in feature in its structure. The model is built on recommended frameworks;therefore, it is ready for integration with other web standards for data sharing, which will help in making IoT applications integrated from different developing parties. 展开更多
关键词 IOT MQTT (Message Queuing Telemetry Transport) UMA (User-Managed Access) Network Security Smart City
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部