期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
1
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Saqib Raza Ahmad Salman Khan yasir mahmood Nazri Kama Azri Azmi Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2023年第1期1871-1886,共16页
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different w... Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and value.One of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’projects.The goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO clients.The projects belong to OSMO vendors,having offices in developing countries while providing services to developed countries.In the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed model.The proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden layers.The results express that the suggested model has gained a notable recognition rate in comparison to any previous studies.The current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment. 展开更多
关键词 Software outsourcing deep extreme learning machine(DELM) machine learning(ML) extreme learning machine ASSESSMENT
下载PDF
Experimental and numerical investigations of interface properties of Ti6Al4V/CP-Ti/Copper composite plate prepared by explosive welding 被引量:3
2
作者 yasir mahmood Peng-wan Chen +1 位作者 I.A.Bataev Xin Gao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第5期1592-1601,共10页
Explosive welding technique is widely used in many industries.This technique is useful to weld different kinds of metal alloys that are not easily welded by any other welding methods.Interlayer plays an important role... Explosive welding technique is widely used in many industries.This technique is useful to weld different kinds of metal alloys that are not easily welded by any other welding methods.Interlayer plays an important role to improve the welding quality and control energy loss during the collision process.In this paper,the Ti6Al4V plate was welded with a copper plate in the presence of a commercially pure titanium interlayer.Microstructure details of welded composite plate were observed through optical and scanning electron microscope.Interlayer-base plate interface morphology showed a wavy structure with solid melted regions inside the vortices.Moreover,the energy dispersive spectroscopy analysis in the interlayer-base interface reveals that there are some identified regions of different kinds of chemical equilibrium phases of CueTi,i.e.CuTi,Cu_(2)Ti,CuTi_(2),Cu_(4)Ti,etc.To study the mechanical properties of composite plates,mechanical tests were conducted,including the tensile test,bending test,shear test and Vickers hardness test.Numerical simulation of explosive welding process was performed with coupled Smooth Particle Hydrodynamic method,Euler and Arbitrary Lagrangian-Eulerian method.The multi-physics process of explosive welding,including detonation,jetting and interface morphology,was observed with simulation.Moreover,simulated plastic strain,temperature and pressure profiles were analysed to understand the welding conditions.Simulated results show that the interlayer base plate interface was created due to the high plastic deformation and localized melting of the parent plates.At the collision point,both alloys behave like fluids,resulting in the formation of a wavy morphology with vortices,which is in good agreement with the experimental results. 展开更多
关键词 Explosive welding Ti6Al4V/CP-Ti/Cu Smooth particle hydrodynamic(SPH) Microstructure Mechanical properties
下载PDF
High strain rate deformation of explosion-welded Ti6Al4V/pure titanium 被引量:1
3
作者 Yan-song Guo Peng-wan Chen +2 位作者 Ali Arab Qiang Zhou yasir mahmood 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第3期678-688,共11页
Multilayer materials are widely used in military,automobile and aerospace industries.In this paper,the response of an explosion-welded Ti6Al4V/pure titanium with a flat interface to dynamic loading is investigated.An ... Multilayer materials are widely used in military,automobile and aerospace industries.In this paper,the response of an explosion-welded Ti6Al4V/pure titanium with a flat interface to dynamic loading is investigated.An SHPB apparatus is used.Then,the dynamic behaviour of a bimetal sample is explored with a DIC system coupled to the SHPB.Result indicates that in the bimetal sample pure titanium is deformed and failed before Ti6Al4V.The stress curve of the sample shows two different peaks in a striker velocity higher than the 18.3 m/s.When the incident wave encounters the interface of the Ti6Al4V/pure titanium sample,only a small fraction of the wave is reflected owing to similar impedance.Using the direct interpretation stress-strain curve is unreasonable in this case because of unhomogenised plastic deformation.The micro structure of the sample is investigated after loading.An adiabatic shear band is formed in the pure titanium side before failure,and the interface of the sample remains intact under different loading conditions.The FEM simulation result for the sample is in good agreement with experimental observations. 展开更多
关键词 Explosion welded Dynamic behaviour SHPB Titanium alloy
下载PDF
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance
4
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan yasir mahmood Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2022年第11期3827-3845,共19页
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of images.Since the work is done offshore,these agreements or images must be shared through the Internet or stored over the cloud.The breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of danger.This article proposes a novel algorithm for securing the NDAs in the form of images.As an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the Internet.As the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of time.The confusion effects have been realized through an XOR operation between the confused image,and chaotic data.Besides,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it has.The machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images. 展开更多
关键词 Non-disclosure agreement encryption DECRYPTION secret key chaoticmap CONFUSION diffusion
下载PDF
Feasibility-Guided Constraint-Handling Techniques for Engineering Optimization Problems
5
作者 Muhammad Asif Jan yasir mahmood +6 位作者 Hidayat Ullah Khan Wali Khan Mashwani Muhammad Irfan Uddin Marwan Mahmoud Rashida Adeeb Khanum Ikramullah Noor Mast 《Computers, Materials & Continua》 SCIE EI 2021年第6期2845-2862,共18页
The particle swarm optimization(PSO)algorithm is an established nature-inspired population-based meta-heuristic that replicates the synchronizing movements of birds and sh.PSO is essentially an unconstrained algorithm... The particle swarm optimization(PSO)algorithm is an established nature-inspired population-based meta-heuristic that replicates the synchronizing movements of birds and sh.PSO is essentially an unconstrained algorithm and requires constraint handling techniques(CHTs)to solve constrained optimization problems(COPs).For this purpose,we integrate two CHTs,the superiority of feasibility(SF)and the violation constraint-handling(VCH),with a PSO.These CHTs distinguish feasible solutions from infeasible ones.Moreover,in SF,the selection of infeasible solutions is based on their degree of constraint violations,whereas in VCH,the number of constraint violations by an infeasible solution is of more importance.Therefore,a PSO is adapted for constrained optimization,yielding two constrained variants,denoted SF-PSO and VCH-PSO.Both SF-PSO and VCH-PSO are evaluated with respect to ve engineering problems:the Himmelblau’s nonlinear optimization,the welded beam design,the spring design,the pressure vessel design,and the three-bar truss design.The simulation results show that both algorithms are consistent in terms of their solutions to these problems,including their different available versions.Comparison of the SF-PSO and the VCHPSO with other existing algorithms on the tested problems shows that the proposed algorithms have lower computational cost in terms of the number of function evaluations used.We also report our disagreement with some unjust comparisons made by other researchers regarding the tested problems and their different variants. 展开更多
关键词 Constrained evolutionary optimization constraint handling techniques superiority of feasibility violation constraint-handling technique swarm based evolutionary algorithms particle swarm optimization engineering optimization proble
下载PDF
K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks
6
作者 Khalid Hamid Muhammad Waseem Iqbal +5 位作者 Erssa Arif yasir mahmood Ahmad Salman Khan Nazri Kama Azri Azmi Atif Ikram 《Computers, Materials & Continua》 SCIE EI 2022年第12期5423-5440,共18页
Any number that can be uniquely determined by a graph is called graph invariants.During the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation analysis.In the... Any number that can be uniquely determined by a graph is called graph invariants.During the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation analysis.In the fast and advanced environment of manufacturing of networks and other products which used different networks,no dependable assessment has been embraced to choose,how much these invariants are connected with a network graph or molecular graph.In this paper,it will talk about three distinct variations of bridge networks with great capability of expectation in the field of computer science,chemistry,physics,drug industry,informatics,and mathematics in setting with physical and synthetic constructions and networks,since K-Banhatti invariants are newly introduced and have various forecast characteristics for various variations of bridge graphs or networks.The review settled the topology of bridge graph/networks of three unique sorts with three types of K-Banhatti Indices.These concluded outcomes can be utilized for the modeling of interconnection networks of Personal computers(PC),networks like Local area network(LAN),Metropolitan area network(MAN)and Wide area network(WAN),the spine of internet and different networks/designs of PCs,power generation interconnection,bio-informatics and chemical structures. 展开更多
关键词 Bridge networks INVARIANTS k-banhatti indices MAPLE network graph molecular graph
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部