期刊文献+
共找到2,000篇文章
< 1 2 100 >
每页显示 20 50 100
The Analysis of Scientific and Commercial Softwares Accuracy in GPS Observation Processing
1
作者 Morteza Hamidi Peyman Javadi 《Open Journal of Geology》 2017年第3期267-278,共12页
The engineers use various softwares for observation processing and GPS networks, generally everyone who uses a device, he uses softwares with the same brand for the processing of it GPS processing networks by defined ... The engineers use various softwares for observation processing and GPS networks, generally everyone who uses a device, he uses softwares with the same brand for the processing of it GPS processing networks by defined default parameters and models. The most outstanding issue is that, it should be understood, the application of which kinds of softwares will help us to gain the desirable accuracy and whether the accuracy of coordinate estimation is acceptable in all commercial softwares or not. In this article, we compared a series of softwares which engineers use for their data processing with powerful scientific software that meanwhile it is too hard and time consuming to learn it. We have considered accuracy and validity of scientific software, which gives acceptable results, as a baseline to see how much errors and difference is between this software and the commercial softwares, so we selected Bernese as a scientific software and LGO, Ashtech Solutions, CGO softwares as commercial softwares and we analyzed them and compared the applied models of the softwares with each other. To do so, we choose a GPS network from Tehran city and discussed it, in order to evaluate the measured accuracy for baselines and also coordinate system that after data processing, it was understood that if the polygon of a network is small, commercial softwares can be utilized with very high acceptable accuracies and even by Ephemerides Precise data, their accuracy will increase more, but if our network is more extended and bigger, there is no other choice except using scientific softwares to calculate coordinate that performs a processing by many parameters. 展开更多
关键词 Commercial SOFTWARE SCIENTIFIC SOFTWARE GPS BERNESE LGO CGO
下载PDF
Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs
2
作者 Norah Abdullah Al-Johany Sanaa Abdullah Sharaf +1 位作者 Fathy Elbouraey Eassa Reem Abdulaziz Alnanih 《Computers, Materials & Continua》 SCIE EI 2024年第5期3139-3173,共35页
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memorysystems.However, MPI implementations can contain defects that impact the reliability and performance of par... The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memorysystems.However, MPI implementations can contain defects that impact the reliability and performance of parallelapplications. Detecting and correcting these defects is crucial, yet there is a lack of published models specificallydesigned for correctingMPI defects. To address this, we propose a model for detecting and correcting MPI defects(DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blockingpoint-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defectsaddressed by the DC_MPI model include illegal MPI calls, deadlocks (DL), race conditions (RC), and messagemismatches (MM). To assess the effectiveness of the DC_MPI model, we performed experiments on a datasetconsisting of 40 MPI codes. The results indicate that the model achieved a detection rate of 37 out of 40 codes,resulting in an overall detection accuracy of 92.5%. Additionally, the execution duration of the DC_MPI modelranged from 0.81 to 1.36 s. These findings show that the DC_MPI model is useful in detecting and correctingdefects in MPI implementations, thereby enhancing the reliability and performance of parallel applications. TheDC_MPImodel fills an important research gap and provides a valuable tool for improving the quality ofMPI-basedparallel computing systems. 展开更多
关键词 High-performance computing parallel computing software engineering software defect message passing interface DEADLOCK
下载PDF
Fuzzing:Progress,Challenges,and Perspectives
3
作者 Zhenhua Yu Zhengqi Liu +2 位作者 Xuya Cong Xiaobo Li Li Yin 《Computers, Materials & Continua》 SCIE EI 2024年第1期1-29,共29页
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target progr... As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system.In recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the technique.This paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its performance.Finally,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers. 展开更多
关键词 FUZZING VULNERABILITY software testing software security
下载PDF
A Hybrid Model for Improving Software Cost Estimation in Global Software Development
4
作者 Mehmood Ahmed Noraini B.Ibrahim +4 位作者 Wasif Nisar Adeel Ahmed Muhammad Junaid Emmanuel Soriano Flores Divya Anand 《Computers, Materials & Continua》 SCIE EI 2024年第1期1399-1422,共24页
Accurate software cost estimation in Global Software Development(GSD)remains challenging due to reliance on historical data and expert judgments.Traditional models,such as the Constructive Cost Model(COCOMO II),rely h... Accurate software cost estimation in Global Software Development(GSD)remains challenging due to reliance on historical data and expert judgments.Traditional models,such as the Constructive Cost Model(COCOMO II),rely heavily on historical and accurate data.In addition,expert judgment is required to set many input parameters,which can introduce subjectivity and variability in the estimation process.Consequently,there is a need to improve the current GSD models to mitigate reliance on historical data,subjectivity in expert judgment,inadequate consideration of GSD-based cost drivers and limited integration of modern technologies with cost overruns.This study introduces a novel hybrid model that synergizes the COCOMO II with Artificial Neural Networks(ANN)to address these challenges.The proposed hybrid model integrates additional GSD-based cost drivers identified through a systematic literature review and further vetted by industry experts.This article compares the effectiveness of the proposedmodelwith state-of-the-artmachine learning-basedmodels for software cost estimation.Evaluating the NASA 93 dataset by adopting twenty-six GSD-based cost drivers reveals that our hybrid model achieves superior accuracy,outperforming existing state-of-the-artmodels.The findings indicate the potential of combining COCOMO II,ANN,and additional GSD-based cost drivers to transform cost estimation in GSD. 展开更多
关键词 Artificial neural networks COCOMO II cost drivers global software development linear regression software cost estimation
下载PDF
SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks
5
作者 Jiehao Ye Wen Cheng +3 位作者 Xiaolong Liu Wenyi Zhu Xuan’ang Wu Shigen Shen 《Computers, Materials & Continua》 SCIE EI 2024年第5期2743-2769,共27页
The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which ... The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks. 展开更多
关键词 Edge computing Internet of Things malicious software propagation model HETEROGENEITY
下载PDF
A Tutorial on Federated Learning from Theory to Practice:Foundations,Software Frameworks,Exemplary Use Cases,and Selected Trends
6
作者 M.Victoria Luzón Nuria Rodríguez-Barroso +5 位作者 Alberto Argente-Garrido Daniel Jiménez-López Jose M.Moyano Javier Del Ser Weiping Ding Francisco Herrera 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期824-850,共27页
When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ... When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ML models to be trained on local devices without any need for centralized data transfer,thereby reducing both the exposure of sensitive data and the possibility of data interception by malicious third parties.This paradigm has gained momentum in the last few years,spurred by the plethora of real-world applications that have leveraged its ability to improve the efficiency of distributed learning and to accommodate numerous participants with their data sources.By virtue of FL,models can be learned from all such distributed data sources while preserving data privacy.The aim of this paper is to provide a practical tutorial on FL,including a short methodology and a systematic analysis of existing software frameworks.Furthermore,our tutorial provides exemplary cases of study from three complementary perspectives:i)Foundations of FL,describing the main components of FL,from key elements to FL categories;ii)Implementation guidelines and exemplary cases of study,by systematically examining the functionalities provided by existing software frameworks for FL deployment,devising a methodology to design a FL scenario,and providing exemplary cases of study with source code for different ML approaches;and iii)Trends,shortly reviewing a non-exhaustive list of research directions that are under active investigation in the current FL landscape.The ultimate purpose of this work is to establish itself as a referential work for researchers,developers,and data scientists willing to explore the capabilities of FL in practical applications. 展开更多
关键词 Data privacy distributed machine learning federated learning software frameworks
下载PDF
Developing Lexicons for Enhanced Sentiment Analysis in Software Engineering:An Innovative Multilingual Approach for Social Media Reviews
7
作者 Zohaib Ahmad Khan Yuanqing Xia +4 位作者 Ahmed Khan Muhammad Sadiq Mahmood Alam Fuad AAwwad Emad A.A.Ismail 《Computers, Materials & Continua》 SCIE EI 2024年第5期2771-2793,共23页
Sentiment analysis is becoming increasingly important in today’s digital age, with social media being a significantsource of user-generated content. The development of sentiment lexicons that can support languages ot... Sentiment analysis is becoming increasingly important in today’s digital age, with social media being a significantsource of user-generated content. The development of sentiment lexicons that can support languages other thanEnglish is a challenging task, especially for analyzing sentiment analysis in social media reviews. Most existingsentiment analysis systems focus on English, leaving a significant research gap in other languages due to limitedresources and tools. This research aims to address this gap by building a sentiment lexicon for local languages,which is then used with a machine learning algorithm for efficient sentiment analysis. In the first step, a lexiconis developed that includes five languages: Urdu, Roman Urdu, Pashto, Roman Pashto, and English. The sentimentscores from SentiWordNet are associated with each word in the lexicon to produce an effective sentiment score. Inthe second step, a naive Bayesian algorithm is applied to the developed lexicon for efficient sentiment analysis ofRoman Pashto. Both the sentiment lexicon and sentiment analysis steps were evaluated using information retrievalmetrics, with an accuracy score of 0.89 for the sentiment lexicon and 0.83 for the sentiment analysis. The resultsshowcase the potential for improving software engineering tasks related to user feedback analysis and productdevelopment. 展开更多
关键词 Emotional assessment regional dialects SentiWordNet naive bayesian technique lexicons software engineering user feedback
下载PDF
Numerical Simulation of the Settling Flux of Biodeposition in a Bay with Cage Culture Through Similarity Theory and a Simplified Pollution Source
8
作者 LIU Yao CHEN Yifan GE Changzi 《Journal of Ocean University of China》 CAS CSCD 2024年第1期247-254,共8页
The settling flux of biodeposition affects the environmental quality of cage culture areas and determines their environmental carrying capacity.Simple and effective simulation of the settling flux of biodeposition is ... The settling flux of biodeposition affects the environmental quality of cage culture areas and determines their environmental carrying capacity.Simple and effective simulation of the settling flux of biodeposition is extremely important for determining the spatial distribution of biodeposition.Theoretically,biodeposition in cage culture areas without specific emission rules can be simplified as point source pollution.Fluent is a fluid simulation software that can simulate the dispersion of particulate matter simply and efficiently.Based on the simplification of pollution sources and bays,the settling flux of biodeposition can be easily and effectively simulated by Fluent fluid software.In the present work,the feasibility of this method was evaluated by simulation of the settling flux of biodeposition in Maniao Bay,Hainan Province,China,and 20 sampling sites were selected for determining the settling fluxes.At sampling sites P1,P2,P3,P4,P5,Z1,Z2,Z3,Z4,A1,A2,A3,A4,B1,B2,C1,C2,C3 and C4,the measured settling fluxes of biodeposition were 26.02,15.78,10.77,58.16,6.57,72.17,12.37,12.11,106.64,150.96,22.59,11.41,18.03,7.90,19.23,7.06,11.84,5.19 and 2.57 g d^(−1)m^(−2),respectively.The simulated settling fluxes of biodeposition at the corresponding sites were 16.03,23.98,8.87,46.90,4.52,104.77,16.03,8.35,180.83,213.06,39.10,17.47,20.98,9.78,23.25,7.84,15.90,6.06 and 1.65 g d^(−1)m^(−2),respectively.There was a positive correlation between the simulated settling fluxes and measured ones(R=0.94,P=2.22×10^(−9)<0.05),which implies that the spatial differentiation of biodeposition flux was well simulated.Moreover,the posterior difference ratio of the simulation was 0.38,and the small error probability was 0.94,which means that the simulated results reached an acceptable level from the perspective of relative error.Thus,if nonpoint source pollution is simplified to point source pollution and open waters are simplified based on similarity theory,the setting flux of biodeposition in the open waters can be simply and effectively simulated by the fluid simulation software Fluent. 展开更多
关键词 fluent fluid simulation software pollution source simplification posterior difference ratio similarity theory Spear-man correlation
下载PDF
DeepOCL:A deep neural network for Object Constraint Language generation from unrestricted nature language
9
作者 Yilong Yang Yibo Liu +3 位作者 Tianshu Bao Weiru Wang Nan Niu Yongfeng Yin 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期250-263,共14页
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group projects.Although OCL provides a simple ... Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group projects.Although OCL provides a simple expressive syntax,it is hard for the developers to write correctly due to lacking knowledge of the mathematical foundations of the first-order logic,which is approximately half accurate at the first stage of devel-opment.A deep neural network named DeepOCL is proposed,which takes the unre-stricted natural language as inputs and automatically outputs the best-scored OCL candidates without requiring a domain conceptual model that is compulsively required in existing rule-based generation approaches.To demonstrate the validity of our proposed approach,ablation experiments were conducted on a new sentence-aligned dataset named OCLPairs.The experiments show that the proposed DeepOCL can achieve state of the art for OCL statement generation,scored 74.30 on BLEU,and greatly outperformed experienced developers by 35.19%.The proposed approach is the first deep learning approach to generate the OCL expression from the natural language.It can be further developed as a CASE tool for the software industry. 展开更多
关键词 deep learning OCL software engineering
下载PDF
Software Defect Prediction Method Based on Stable Learning
10
作者 Xin Fan Jingen Mao +3 位作者 Liangjue Lian Li Yu Wei Zheng Yun Ge 《Computers, Materials & Continua》 SCIE EI 2024年第1期65-84,共20页
The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and labor.In previous software defect predicti... The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and labor.In previous software defect prediction studies,transfer learning was effective in solving the problem of inconsistent project data distribution.However,target projects often lack sufficient data,which affects the performance of the transfer learning model.In addition,the presence of uncorrelated features between projects can decrease the prediction accuracy of the transfer learning model.To address these problems,this article propose a software defect prediction method based on stable learning(SDP-SL)that combines code visualization techniques and residual networks.This method first transforms code files into code images using code visualization techniques and then constructs a defect prediction model based on these code images.During the model training process,target project data are not required as prior knowledge.Following the principles of stable learning,this paper dynamically adjusted the weights of source project samples to eliminate dependencies between features,thereby capturing the“invariance mechanism”within the data.This approach explores the genuine relationship between code defect features and labels,thereby enhancing defect prediction performance.To evaluate the performance of SDP-SL,this article conducted comparative experiments on 10 open-source projects in the PROMISE dataset.The experimental results demonstrated that in terms of the F-measure,the proposed SDP-SL method outperformed other within-project defect prediction methods by 2.11%-44.03%.In cross-project defect prediction,the SDP-SL method provided an improvement of 5.89%-25.46% in prediction performance compared to other cross-project defect prediction methods.Therefore,SDP-SL can effectively enhance within-and cross-project defect predictions. 展开更多
关键词 Software defect prediction code visualization stable learning sample reweight residual network
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
11
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Quafu-Qcover:Explore combinatorial optimization problems on cloud-based quantum computers
12
作者 许宏泽 庄伟峰 +29 位作者 王正安 黄凯旋 时运豪 马卫国 李天铭 陈驰通 许凯 冯玉龙 刘培 陈墨 李尚书 杨智鹏 钱辰 靳羽欣 马运恒 肖骁 钱鹏 顾炎武 柴绪丹 普亚南 张翼鹏 魏世杰 增进峰 李行 龙桂鲁 金贻荣 于海峰 范桁 刘东 胡孟军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期104-115,共12页
We introduce Quafu-Qcover,an open-source cloud-based software package developed for solving combinatorial optimization problems using quantum simulators and hardware backends.Quafu-Qcover provides a standardized and c... We introduce Quafu-Qcover,an open-source cloud-based software package developed for solving combinatorial optimization problems using quantum simulators and hardware backends.Quafu-Qcover provides a standardized and comprehensive workflow that utilizes the quantum approximate optimization algorithm(QAOA).It facilitates the automatic conversion of the original problem into a quadratic unconstrained binary optimization(QUBO)model and its corresponding Ising model,which can be subsequently transformed into a weight graph.The core of Qcover relies on a graph decomposition-based classical algorithm,which efficiently derives the optimal parameters for the shallow QAOA circuit.Quafu-Qcover incorporates a dedicated compiler capable of translating QAOA circuits into physical quantum circuits that can be executed on Quafu cloud quantum computers.Compared to a general-purpose compiler,our compiler demonstrates the ability to generate shorter circuit depths,while also exhibiting superior speed performance.Additionally,the Qcover compiler has the capability to dynamically create a library of qubits coupling substructures in real-time,utilizing the most recent calibration data from the superconducting quantum devices.This ensures that computational tasks can be assigned to connected physical qubits with the highest fidelity.The Quafu-Qcover allows us to retrieve quantum computing sampling results using a task ID at any time,enabling asynchronous processing.Moreover,it incorporates modules for results preprocessing and visualization,facilitating an intuitive display of solutions for combinatorial optimization problems.We hope that Quafu-Qcover can serve as an instructive illustration for how to explore application problems on the Quafu cloud quantum computers. 展开更多
关键词 quantum cloud platform combinatorial optimization problems quantum software
下载PDF
Mangrove wetlands distribution status identification, changing trend analyzation and carbon storage assessment of China
13
作者 Chang Li Fu Wang +5 位作者 Peng Yang Fei-cui Wang Yun-zhuang Hu Yan-lin Zhao Li-zhu Tian Rui-bin Zhao 《China Geology》 CAS CSCD 2024年第1期1-11,共11页
This research investigates the ecological importance,changes,and status of mangrove wetlands along China’s coastline.Visual interpretation,geological surveys,and ISO clustering unsupervised classification methods are... This research investigates the ecological importance,changes,and status of mangrove wetlands along China’s coastline.Visual interpretation,geological surveys,and ISO clustering unsupervised classification methods are employed to interpret mangrove distribution from remote sensing images from 2021,utilizing ArcGIS software platform.Furthermore,the carbon storage capacity of mangrove wetlands is quantified using the carbon storage module of InVEST model.Results show that the mangrove wetlands in China covered an area of 278.85 km2 in 2021,predominantly distributed in Hainan,Guangxi,Guangdong,Fujian,Zhejiang,Taiwan,Hong Kong,and Macao.The total carbon storage is assessed at 2.11×10^(6) t,with specific regional data provided.Trends since the 1950s reveal periods of increase,decrease,sharp decrease,and slight-steady increases in mangrove areas in China.An important finding is the predominant replacement of natural coastlines adjacent to mangrove wetlands by artificial ones,highlighting the need for creating suitable spaces for mangrove restoration.This study is poised to guide future mangroverelated investigations and conservation strategies. 展开更多
关键词 MANGROVE WETLAND Carbon storage Ecological conservation ArcGIS software platform RESTORATION InVEST model Quantitative analysis Coastal zone of China
下载PDF
Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features
14
作者 Qazi Mazhar ul Haq Fahim Arif +4 位作者 Khursheed Aurangzeb Noor ul Ain Javed Ali Khan Saddaf Rubab Muhammad Shahid Anwar 《Computers, Materials & Continua》 SCIE EI 2024年第3期4379-4397,共19页
Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements.Researchers are exploring machine learn... Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements.Researchers are exploring machine learning to predict software bugs,but a more precise and general approach is needed.Accurate bug prediction is crucial for software evolution and user training,prompting an investigation into deep and ensemble learning methods.However,these studies are not generalized and efficient when extended to other datasets.Therefore,this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification problems.The methods involved feature selection,which is used to reduce the dimensionality and redundancy of features and select only the relevant ones;transfer learning is used to train and test the model on different datasets to analyze how much of the learning is passed to other datasets,and ensemble method is utilized to explore the increase in performance upon combining multiple classifiers in a model.Four National Aeronautics and Space Administration(NASA)and four Promise datasets are used in the study,showing an increase in the model’s performance by providing better Area Under the Receiver Operating Characteristic Curve(AUC-ROC)values when different classifiers were combined.It reveals that using an amalgam of techniques such as those used in this study,feature selection,transfer learning,and ensemble methods prove helpful in optimizing the software bug prediction models and providing high-performing,useful end mode. 展开更多
关键词 Natural language processing software bug prediction transfer learning ensemble learning feature selection
下载PDF
Optimizing Average Electric Power During the Charging of Lithium-Ion Batteries Through the Taguchi Method
15
作者 Mohd H.S.Alrashdan 《Transactions of Tianjin University》 EI CAS 2024年第2期152-166,共15页
In recent times, lithium-ion batteries have been widely used owing to their high energy density, extended cycle lifespan, and minimal self-discharge rate. The design of high-speed rechargeable lithium-ion batteries fa... In recent times, lithium-ion batteries have been widely used owing to their high energy density, extended cycle lifespan, and minimal self-discharge rate. The design of high-speed rechargeable lithium-ion batteries faces a significant challenge owing to the need to increase average electric power during charging. This challenge results from the direct influence of the power level on the rate of chemical reactions occurring in the battery electrodes. In this study, the Taguchi optimization method was used to enhance the average electric power during the charging process of lithium-ion batteries. The Taguchi technique is a statistical strategy that facilitates the systematic and efficient evaluation of numerous experimental variables. The proposed method involved varying seven input factors, including positive electrode thickness, positive electrode material, positive electrode active material volume fraction, negative electrode active material volume fraction, separator thickness, positive current collector thickness, and negative current collector thickness. Three levels were assigned to each control factor to identify the optimal conditions and maximize the average electric power during charging. Moreover, a variance assessment analysis was conducted to validate the results obtained from the Taguchi analysis. The results revealed that the Taguchi method was an eff ective approach for optimizing the average electric power during the charging of lithium-ion batteries. This indicates that the positive electrode material, followed by the separator thickness and the negative electrode active material volume fraction, was key factors significantly infl uencing the average electric power during the charging of lithium-ion batteries response. The identification of optimal conditions resulted in the improved performance of lithium-ion batteries, extending their potential in various applications. Particularly, lithium-ion batteries with average electric power of 16 W and 17 W during charging were designed and simulated in the range of 0-12000 s using COMSOL Multiphysics software. This study efficiently employs the Taguchi optimization technique to develop lithium-ion batteries capable of storing a predetermined average electric power during the charging phase. Therefore, this method enables the battery to achieve complete charging within a specific timeframe tailored to a specificapplication. The implementation of this method can save costs, time, and materials compared with other alternative methods, such as the trial-and-error approach. 展开更多
关键词 Lithium-ion batteries Average electric power during charging Taguchi method COMSOL Multiphysics software C rate L27 orthogonal array
下载PDF
Adaptive Sparse Grid Discontinuous Galerkin Method:Review and Software Implementation
16
作者 Juntao Huang Wei Guo Yingda Cheng 《Communications on Applied Mathematics and Computation》 EI 2024年第1期501-532,共32页
This paper reviews the adaptive sparse grid discontinuous Galerkin(aSG-DG)method for computing high dimensional partial differential equations(PDEs)and its software implementation.The C++software package called AdaM-D... This paper reviews the adaptive sparse grid discontinuous Galerkin(aSG-DG)method for computing high dimensional partial differential equations(PDEs)and its software implementation.The C++software package called AdaM-DG,implementing the aSG-DG method,is available on GitHub at https://github.com/JuntaoHuang/adaptive-multiresolution-DG.The package is capable of treating a large class of high dimensional linear and nonlinear PDEs.We review the essential components of the algorithm and the functionality of the software,including the multiwavelets used,assembling of bilinear operators,fast matrix-vector product for data with hierarchical structures.We further demonstrate the performance of the package by reporting the numerical error and the CPU cost for several benchmark tests,including linear transport equations,wave equations,and Hamilton-Jacobi(HJ)equations. 展开更多
关键词 Adaptive sparse grid Discontinuous Galerkin High dimensional partial differential equation Software development
下载PDF
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
17
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 Network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
下载PDF
Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction
18
作者 Sureka Sivavelu Venkatesh Palanisamy 《Computers, Materials & Continua》 SCIE EI 2024年第3期3469-3487,共19页
The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software w... The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software with defects negatively impacts operational costs and finally affects customer satisfaction. Numerous approaches exist to predict software defects. However, the timely and accurate software bugs are the major challenging issues. To improve the timely and accurate software defect prediction, a novel technique called Nonparametric Statistical feature scaled QuAdratic regressive convolution Deep nEural Network (SQADEN) is introduced. The proposed SQADEN technique mainly includes two major processes namely metric or feature selection and classification. First, the SQADEN uses the nonparametric statistical Torgerson–Gower scaling technique for identifying the relevant software metrics by measuring the similarity using the dice coefficient. The feature selection process is used to minimize the time complexity of software fault prediction. With the selected metrics, software fault perdition with the help of the Quadratic Censored regressive convolution deep neural network-based classification. The deep learning classifier analyzes the training and testing samples using the contingency correlation coefficient. The softstep activation function is used to provide the final fault prediction results. To minimize the error, the Nelder–Mead method is applied to solve non-linear least-squares problems. Finally, accurate classification results with a minimum error are obtained at the output layer. Experimental evaluation is carried out with different quantitative metrics such as accuracy, precision, recall, F-measure, and time complexity. The analyzed results demonstrate the superior performance of our proposed SQADEN technique with maximum accuracy, sensitivity and specificity by 3%, 3%, 2% and 3% and minimum time and space by 13% and 15% when compared with the two state-of-the-art methods. 展开更多
关键词 Software defect prediction feature selection nonparametric statistical Torgerson-Gower scaling technique quadratic censored regressive convolution deep neural network softstep activation function nelder-mead method
下载PDF
Electromechanical Transient Modeling Analysis of Large-Scale New Energy Grid Connection
19
作者 Shichao Cao Yonggang Dong Xiaoying Liu 《Energy Engineering》 EI 2024年第4期1109-1125,共17页
The synchronous virtual machine uses inverter power to imitate the performance of the conventional synchronous machine.It also has the same inertia,damping,frequency,voltage regulation,and other external performance a... The synchronous virtual machine uses inverter power to imitate the performance of the conventional synchronous machine.It also has the same inertia,damping,frequency,voltage regulation,and other external performance as the generator.It is the key technology to realize new energy grid connections’stable and reliable operation.This project studies a dynamic simulation model of an extensive new energy power system based on the virtual synchronous motor.A new energy storage method is proposed.The mathematical energy storage model is established by combining the fixed rotor model of a synchronous virtual machine with the charge-discharge power,state of charge,operation efficiency,dead zone,and inverter constraint.The rapid conversion of energy storage devices absorbs the excess instantaneous kinetic energy caused by interference.The branch transient of the critical cut set in the system can be confined to a limited area.Thus,the virtual synchronizer’s kinetic and potential energy can be efficiently converted into an instantaneous state.The simulation of power system analysis software package(PSASP)verifies the correctness of the theory and algorithm in this paper.This paper provides a theoretical basis for improving the transient stability of new energy-connected power grids. 展开更多
关键词 New energy grid connection transient electromechanical modeling synchronous virtual machine PSASP software energy storage
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
20
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
上一页 1 2 100 下一页 到第
使用帮助 返回顶部