期刊文献+
共找到115,752篇文章
< 1 2 250 >
每页显示 20 50 100
Software Defect Prediction Method Based on Stable Learning 被引量:1
1
作者 Xin Fan Jingen Mao +3 位作者 Liangjue Lian Li Yu Wei Zheng Yun Ge 《Computers, Materials & Continua》 SCIE EI 2024年第1期65-84,共20页
The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and labor.In previous software defect predicti... The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and labor.In previous software defect prediction studies,transfer learning was effective in solving the problem of inconsistent project data distribution.However,target projects often lack sufficient data,which affects the performance of the transfer learning model.In addition,the presence of uncorrelated features between projects can decrease the prediction accuracy of the transfer learning model.To address these problems,this article propose a software defect prediction method based on stable learning(SDP-SL)that combines code visualization techniques and residual networks.This method first transforms code files into code images using code visualization techniques and then constructs a defect prediction model based on these code images.During the model training process,target project data are not required as prior knowledge.Following the principles of stable learning,this paper dynamically adjusted the weights of source project samples to eliminate dependencies between features,thereby capturing the“invariance mechanism”within the data.This approach explores the genuine relationship between code defect features and labels,thereby enhancing defect prediction performance.To evaluate the performance of SDP-SL,this article conducted comparative experiments on 10 open-source projects in the PROMISE dataset.The experimental results demonstrated that in terms of the F-measure,the proposed SDP-SL method outperformed other within-project defect prediction methods by 2.11%-44.03%.In cross-project defect prediction,the SDP-SL method provided an improvement of 5.89%-25.46% in prediction performance compared to other cross-project defect prediction methods.Therefore,SDP-SL can effectively enhance within-and cross-project defect predictions. 展开更多
关键词 software defect prediction code visualization stable learning sample reweight residual network
下载PDF
Constructing long-cycling crystalline C_(3)N_(4)-based carbonaceous anodes for sodium-ion battery via N configuration control 被引量:1
2
作者 Ying Wang Hongguan Li +5 位作者 Shuanlong Di Boyin Zhai Ping Niu Antonios Kelarakis Shulan Wang Li Li 《Carbon Energy》 SCIE EI CAS CSCD 2024年第1期159-171,共13页
Carbon nitrides with two-dimensional layered structures and high theoretical capacities are attractive as anode materials for sodium-ion batteries while their low crystallinity and insufficient structural stability st... Carbon nitrides with two-dimensional layered structures and high theoretical capacities are attractive as anode materials for sodium-ion batteries while their low crystallinity and insufficient structural stability strongly restrict their practical applications.Coupling carbon nitrides with conductive carbon may relieve these issues.However,little is known about the influence of nitrogen(N)configurations on the interactions between carbon and C_(3)N_(4),which is fundamentally critical for guiding the precise design of advanced C_(3)N_(4)-related electrodes.Herein,highly crystalline C_(3)N_(4)(poly(triazine imide),PTI)based all-carbon composites were developed by molten salt strategy.More importantly,the vital role of pyrrolic-N for enhancing charge transfer and boosting Na+storage of C_(3)N_(4)-based composites,which was confirmed by both theoretical and experimental evidence,was spot-highlighted for the first time.By elaborately controlling the salt composition,the composite with high pyrrolic-N and minimized graphitic-N content was obtained.Profiting from the formation of highly crystalline PTI and electrochemically favorable pyrrolic-N configurations,the composite delivered an unusual reverse growth and record-level cycling stability even after 5000 cycles along with high reversible capacity and outstanding full-cell capacity retention.This work broadens the energy storage applications of C_(3)N_(4) and provides new prospects for the design of advanced all-carbon electrodes. 展开更多
关键词 ANODE highly crystalline C_(3)N_(4) N configuration sodium-ion batteries ultra-long cyclic stability
下载PDF
Open-Source Software Defined Networking Controllers:State-of-the-Art,Challenges and Solutions for Future Network Providers
3
作者 Johari Abdul Rahim Rosdiadee Nordin Oluwatosin Ahmed Amodu 《Computers, Materials & Continua》 SCIE EI 2024年第7期747-800,共54页
Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN t... Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN technology.Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them.There are several SDN controllers available in the open market besides a large number of commercial controllers;some are developed tomeet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System(ONOS).This paper presents a comparative study between open source SDN controllers,which are known as Network Controller Platform(NOX),Python-based Network Controller(POX),component-based SDN framework(Ryu),Java-based OpenFlow controller(Floodlight),OpenDayLight(ODL)and ONOS.The discussion is further extended into ONOS architecture,as well as,the evolution of ONOS controllers.This article will review use cases based on ONOS controllers in several application deployments.Moreover,the opportunities and challenges of open source SDN controllers will be discussed,exploring carriergrade ONOS for future real-world deployments,ONOS unique features and identifying the suitable choice of SDN controller for service providers.In addition,we attempt to provide answers to several critical questions relating to the implications of the open-source nature of SDN controllers regarding vendor lock-in,interoperability,and standards compliance,Similarly,real-world use cases of organizations using open-source SDN are highlighted and how the open-source community contributes to the development of SDN controllers.Furthermore,challenges faced by open-source projects,and considerations when choosing an open-source SDN controller are underscored.Then the role of Artificial Intelligence(AI)and Machine Learning(ML)in the evolution of open-source SDN controllers in light of recent research is indicated.In addition,the challenges and limitations associated with deploying open-source SDN controllers in production networks,how can they be mitigated,and finally how opensource SDN controllers handle network security and ensure that network configurations and policies are robust and resilient are presented.Potential opportunities and challenges for future Open SDN deployment are outlined to conclude the article. 展开更多
关键词 ONOS open source software SDN software defined networking
下载PDF
Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs
4
作者 Norah Abdullah Al-Johany Sanaa Abdullah Sharaf +1 位作者 Fathy Elbouraey Eassa Reem Abdulaziz Alnanih 《Computers, Materials & Continua》 SCIE EI 2024年第5期3139-3173,共35页
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memorysystems.However, MPI implementations can contain defects that impact the reliability and performance of par... The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memorysystems.However, MPI implementations can contain defects that impact the reliability and performance of parallelapplications. Detecting and correcting these defects is crucial, yet there is a lack of published models specificallydesigned for correctingMPI defects. To address this, we propose a model for detecting and correcting MPI defects(DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blockingpoint-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defectsaddressed by the DC_MPI model include illegal MPI calls, deadlocks (DL), race conditions (RC), and messagemismatches (MM). To assess the effectiveness of the DC_MPI model, we performed experiments on a datasetconsisting of 40 MPI codes. The results indicate that the model achieved a detection rate of 37 out of 40 codes,resulting in an overall detection accuracy of 92.5%. Additionally, the execution duration of the DC_MPI modelranged from 0.81 to 1.36 s. These findings show that the DC_MPI model is useful in detecting and correctingdefects in MPI implementations, thereby enhancing the reliability and performance of parallel applications. TheDC_MPImodel fills an important research gap and provides a valuable tool for improving the quality ofMPI-basedparallel computing systems. 展开更多
关键词 High-performance computing parallel computing software engineering software defect message passing interface DEADLOCK
下载PDF
Towards Improving the Quality of Requirement and Testing Process in Agile Software Development:An Empirical Study
5
作者 Irum Ilays Yaser Hafeez +4 位作者 Nabil Almashfi Sadia Ali Mamoona Humayun Muhammad Aqib Ghadah Alwakid 《Computers, Materials & Continua》 SCIE EI 2024年第9期3761-3784,共24页
Software testing is a critical phase due to misconceptions about ambiguities in the requirements during specification,which affect the testing process.Therefore,it is difficult to identify all faults in software.As re... Software testing is a critical phase due to misconceptions about ambiguities in the requirements during specification,which affect the testing process.Therefore,it is difficult to identify all faults in software.As requirement changes continuously,it increases the irrelevancy and redundancy during testing.Due to these challenges;fault detection capability decreases and there arises a need to improve the testing process,which is based on changes in requirements specification.In this research,we have developed a model to resolve testing challenges through requirement prioritization and prediction in an agile-based environment.The research objective is to identify the most relevant and meaningful requirements through semantic analysis for correct change analysis.Then compute the similarity of requirements through case-based reasoning,which predicted the requirements for reuse and restricted to error-based requirements.Afterward,the apriori algorithm mapped out requirement frequency to select relevant test cases based on frequently reused or not reused test cases to increase the fault detection rate.Furthermore,the proposed model was evaluated by conducting experiments.The results showed that requirement redundancy and irrelevancy improved due to semantic analysis,which correctly predicted the requirements,increasing the fault detection rate and resulting in high user satisfaction.The predicted requirements are mapped into test cases,increasing the fault detection rate after changes to achieve higher user satisfaction.Therefore,the model improves the redundancy and irrelevancy of requirements by more than 90%compared to other clustering methods and the analytical hierarchical process,achieving an 80%fault detection rate at an earlier stage.Hence,it provides guidelines for practitioners and researchers in the modern era.In the future,we will provide the working prototype of this model for proof of concept. 展开更多
关键词 Requirement prediction software testing agile software development semantic analysis case-based reasoning
下载PDF
Bound and Resonating Multiquark Configurations
6
作者 Jean-Marc Richard 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第8期8-12,共5页
We review the predictions of quark models for multiquark configurations that are bound or resonant states,and compare different methods for estimating the properties of resonances.
关键词 QUARK configuration RESONANT
下载PDF
HV Process Model of Software Development
7
作者 Hemant Kumar Vipin Saxena 《Journal of Software Engineering and Applications》 2024年第7期553-570,共18页
Software Development Life Cycle (SDLC) is one of the major ingredients for the development of efficient software systems within a time frame and low-cost involvement. From the literature, it is evident that there are ... Software Development Life Cycle (SDLC) is one of the major ingredients for the development of efficient software systems within a time frame and low-cost involvement. From the literature, it is evident that there are various kinds of process models that are used by the software industries for the development of small, medium and long-term software projects, but many of them do not cover risk management. It is quite obvious that the improper selection of the software development process model leads to failure of the software products as it is time bound activity. In the present work, a new software development process model is proposed which covers the risks at any stage of the development of the software product. The model is named a Hemant-Vipin (HV) process model and may be helpful for the software industries for development of the efficient software products and timely delivery at the end of the client. The efficiency of the HV process model is observed by considering various kinds of factors like requirement clarity, user feedback, change agility, predictability, risk identification, practical implementation, customer satisfaction, incremental development, use of ready-made components, quick design, resource organization and many more and found through a case study that the presented approach covers many of parameters in comparison of the existing process models. . 展开更多
关键词 software Process Model software Development software Engineering software Risk Management and software Quality
下载PDF
How Software Engineering Transforms Organizations: An Open and Qualitative Study on the Organizational Objectives and Motivations in Agile Transformations
8
作者 Alonso Alvarez Borja Bordel Sánchez 《Computers, Materials & Continua》 SCIE EI 2024年第11期2935-2966,共32页
Agile Transformations are challenging processes for organizations that look to extend the benefits of Agile philosophy and methods beyond software engineering.Despite the impact of these transformations on orga-nizati... Agile Transformations are challenging processes for organizations that look to extend the benefits of Agile philosophy and methods beyond software engineering.Despite the impact of these transformations on orga-nizations,they have not been extensively studied in academia.We conducted a study grounded in workshops and interviews with 99 participants from 30 organizations,including organizations undergoing transformations(“final organizations”)and companies supporting these processes(“consultants”).The study aims to understand the motivations,objectives,and factors driving and challenging these transformations.Over 700 responses were collected to the question and categorized into 32 objectives.The findings show that organizations primarily aim to achieve customer centricity and adaptability,both with 8%of the mentions.Other primary important objectives,with above 4%of mentions,include alignment of goals,lean delivery,sustainable processes,and a flatter,more team-based organizational structure.We also detect discrepancies in perspectives between the objectives identified by the two kinds of organizations and the existing agile literature and models.This misalignment highlights the need for practitioners to understand with the practical realities the organizations face. 展开更多
关键词 Business agility AGILE agile transformations agile enterprises adaptive organizations ADAPTABILITY agile software development software engineering computer engineering
下载PDF
A Hybrid Model for Improving Software Cost Estimation in Global Software Development
9
作者 Mehmood Ahmed Noraini B.Ibrahim +4 位作者 Wasif Nisar Adeel Ahmed Muhammad Junaid Emmanuel Soriano Flores Divya Anand 《Computers, Materials & Continua》 SCIE EI 2024年第1期1399-1422,共24页
Accurate software cost estimation in Global Software Development(GSD)remains challenging due to reliance on historical data and expert judgments.Traditional models,such as the Constructive Cost Model(COCOMO II),rely h... Accurate software cost estimation in Global Software Development(GSD)remains challenging due to reliance on historical data and expert judgments.Traditional models,such as the Constructive Cost Model(COCOMO II),rely heavily on historical and accurate data.In addition,expert judgment is required to set many input parameters,which can introduce subjectivity and variability in the estimation process.Consequently,there is a need to improve the current GSD models to mitigate reliance on historical data,subjectivity in expert judgment,inadequate consideration of GSD-based cost drivers and limited integration of modern technologies with cost overruns.This study introduces a novel hybrid model that synergizes the COCOMO II with Artificial Neural Networks(ANN)to address these challenges.The proposed hybrid model integrates additional GSD-based cost drivers identified through a systematic literature review and further vetted by industry experts.This article compares the effectiveness of the proposedmodelwith state-of-the-artmachine learning-basedmodels for software cost estimation.Evaluating the NASA 93 dataset by adopting twenty-six GSD-based cost drivers reveals that our hybrid model achieves superior accuracy,outperforming existing state-of-the-artmodels.The findings indicate the potential of combining COCOMO II,ANN,and additional GSD-based cost drivers to transform cost estimation in GSD. 展开更多
关键词 Artificial neural networks COCOMO II cost drivers global software development linear regression software cost estimation
下载PDF
Engineering of geometrical configurations in dual-atom catalysts for electrocatalytic applications
10
作者 Tao Zhang Yifan Liu +3 位作者 Liang Xue Jingwen Sun Pan Xiong Junwu Zhu 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2024年第7期273-287,共15页
Geometrical configurations play a crucial role in dual-atom catalysts(DACs)for electrocatalytic applications.Significant progress has been made to design DACs electrocatalysts with various geometri-cal configurations,... Geometrical configurations play a crucial role in dual-atom catalysts(DACs)for electrocatalytic applications.Significant progress has been made to design DACs electrocatalysts with various geometri-cal configurations,but in-depth understanding the relationship between geometrical configurations and metal-metal interaction mechanisms for designing targeted DACs is still required.In this review,the recent progress in engineering of geometrical configurations of DACs is systematically summarized.Based on the polarity of geometrical configuration,DACs can be classified into two different types that are homonuclear and heteronuclear DACs.Furthermore,with regard to the geometrical configurations of the active sites,homonuclear DACs are identified into adjacent and bridged configurations,and heteronuclear DACs can be classified into adjacent,bridged,and separated configurations.Subsequently,metal-metal interactions in DACs with different geometrical configurations are introduced.Additionally,the applications of DACs in different electrocatalytic reactions are discussed,including the oxygen reduction reaction(ORR),oxygen evolution reaction(OER),hydrogen evolution reaction(HER),and other catalysis.Finally,the future challenges and perspectives for advancements in DACs are high-lighted.This review aims to provide inspiration for the design of highly effcient DACs towards energy relatedapplications. 展开更多
关键词 Dual-atom catalysts Geometrical configurations HOMONUCLEAR HETERONUCLEAR ELECTROCATALYSIS
下载PDF
Development and Evaluation of 3D Delivery Animation Software Designed to Improve the Mother’s and Spouse’s Satisfaction with Delivery
11
作者 Ayako Sasaki Sachi Chikazawa +4 位作者 Nojima Kumiko Tomita Takako Hatakeyama Keiko Imoto Yasufumi Imoto Nobutane 《Health》 2024年第5期439-458,共20页
Purpose: To clarify the effectiveness of 3-D delivery animation software for the mother’s and husband’s satisfaction with delivery. Subjects and Method: We independently developed a software application used to disp... Purpose: To clarify the effectiveness of 3-D delivery animation software for the mother’s and husband’s satisfaction with delivery. Subjects and Method: We independently developed a software application used to display the pelvic region and explain the labor process. The study involved a collaboration with hospital staff who recruited 18 primiparous and 18 multiparous mothers who were hospitalized for delivery at Facility A. The midwife explained the process of delivery using the “Delivery Animation Software”. A self-administered, anonymous questionnaire was distributed and analyzed separately for primiparous and multiparous mothers and their husbands. Results: 1) For both primiparous and multiparous couples, both mothers and their husbands gained a significantly higher level of understanding after delivery than during pregnancy. 2) The Self-Evaluation Scale for Experience of Delivery results were as follows: “I did my best for the baby even if it was painful” was selected more often for “birth coping skills”;“reliable medical staff” was selected more often for “physiological birth process”;“the birth progressed as I expected” was selected frequently by primiparous mothers;and “the birth progressed smoothly” was selected often by multiparous mothers. 3) In terms of husbands’ satisfaction with the delivery, “I was satisfied with the delivery”, “I was given an easy-to-understand explanation”, and “They explained the process to me” was selected of primiparous and multiparous fathers. 4) All primiparous and multiparous mothers positively evaluated whether the delivery animation was helpful in understanding the process of delivery. Conclusion: The delivery animation was effective in improving the understanding and satisfaction of both the mothers and their husbands. 展开更多
关键词 MOTHER SPOUSE SATISFACTION 3D Delivery Animation software
下载PDF
Review of the Configuration and Transient Stability of Large-scale Renewable Energy Generation through Hybrid DC Transmission
12
作者 Xinshou Tian Yongning Chi +1 位作者 Longxue Li Hongzhi Liu 《CES Transactions on Electrical Machines and Systems》 EI CSCD 2024年第2期115-126,共12页
Based on the complementary advantages of Line Commutated Converter(LCC)and Modular Multilevel Converter(MMC)in power grid applications,there are two types of hybrid DC system topologies:one is the parallel connection ... Based on the complementary advantages of Line Commutated Converter(LCC)and Modular Multilevel Converter(MMC)in power grid applications,there are two types of hybrid DC system topologies:one is the parallel connection of LCC converter stations and MMC converter stations,and the other is the series connection of LCC and MMC converter stations within a single station.The hybrid DC transmission system faces broad application prospects and development potential in large-scale clean energy integration across regions and the construction of a new power system dominated by new energy sources in China.This paper first analyzes the system forms and topological characteristics of hybrid DC transmission,introducing the forms and topological characteristics of converter-level hybrid DC transmission systems and system-level hybrid DC transmission systems.Next,it analyzes the operating characteristics of LCC and MMC inverter-level hybrid DC transmission systems,provides insights into the transient stability of hybrid DC transmission systems,and typical fault ride-through control strategies.Finally,it summarizes the networking characteristics of the LCC-MMC series within the converter station hybrid DC transmission system,studies the transient characteristics and fault ridethrough control strategies under different fault types for the LCC-MMC series in the receiving-end converter station,and investigates the transient characteristics and fault ride-through control strategies under different fault types for the LCC-MMC series in the sending-end converter station. 展开更多
关键词 Hybrid DC transmission Transient stability configuration Control system
下载PDF
Seismic fragility analysis of three-tower cable-stayed bridges with different connection configurations
13
作者 Chen Chen Liu Jinlong +1 位作者 Lin Junqi Li Suchao 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第4期1009-1027,共19页
Seismic fragility analysis of three-tower cable-stayed bridges with three different structural systems,including rigid system(RS),floating system(FS),and passive energy dissipation system(PEDS),is conducted to study t... Seismic fragility analysis of three-tower cable-stayed bridges with three different structural systems,including rigid system(RS),floating system(FS),and passive energy dissipation system(PEDS),is conducted to study the effects of connection configurations on seismic responses and fragilities.Finite element models of bridges are established using OpenSees.A new ground motion screening method based on the statistical characteristic of the predominant period is proposed to avoid irregular behavior in the selection process of ground motions,and incremental dynamic analysis(IDA)is performed to develop components and systems fragility curves.The effects of damper failure on calculated results for PEDS are examined in terms of seismic response and fragility analysis.The results show that the bridge tower is the most affected component by different structural systems.For RS,the fragility of the middle tower is significantly higher than other components,and the bridge failure starts from the middle tower,exhibiting a characteristic of local failure.For FS and PEDS,the fragility of the edge tower is higher than the middle tower.The system fragility of RS is higher than FS and PEDS.Taking the failure of dampers into account is necessary to obtain reliable seismic capacity of cable-stayed bridges. 展开更多
关键词 seismic fragility cable-stayed bridge connection configuration viscous damper comparison analysis
下载PDF
Sliding and damming properties of granular debris with different geometric configurations and grain size distributions
14
作者 HE Ligeng TAN Longmeng +2 位作者 YANG Xingguo ZHOU Jiawen LIAO Haimei 《Journal of Mountain Science》 SCIE CSCD 2024年第3期932-951,共20页
Granular debris plays a significant role in determining damming deposit characteristics. An indepth understanding of how variations in grain size distribution(GSD) and geometric configurations impact the behavior of g... Granular debris plays a significant role in determining damming deposit characteristics. An indepth understanding of how variations in grain size distribution(GSD) and geometric configurations impact the behavior of granular debris during the occurrence of granular debris is essential for precise assessment and effective mitigation of landslide hazards in mountainous terrains. This research aims to investigate the impact of GSD and geometric configurations on sliding and damming properties through laboratory experiments. The geometric configurations were categorized into three categories based on the spatial distribution of maximum volume: located at the front(Type Ⅰ), middle(Type Ⅱ), and rear(Type Ⅲ) of the granular debris. Our experimental findings highlight that the sliding and damming processes primarily depend on the interaction among the geometric configuration, grain size, and GSD in granular debris. Different sliding and damming mechanisms across various geometric configurations induce variability in motion parameters and deposition patterns. For Type Ⅰ configurations, the front debris functions as the critical and primary driving component, with energy dissipation primarily occurring through inter-grain interactions. In contrast, Type Ⅱ configurations feature the middle debris as the dominant driving component, experiencing hindrance from the front debris and propulsion from the rear, leading to complex alterations in sliding motion. Here, energy dissipation arises from a combination of inter-grain and grain-substrate interactions. Lastly, in Type Ⅲ configurations, both the middle and rear debris serve as the main driving components, with the rear sliding debris impeded by the front. In this case, energy dissipation predominantly results from grainsubstrate interaction. Moreover, we have quantitatively demonstrated that the inverse grading in damming deposits, where coarse grain moves upward and fine grain moves downward, is primarily caused by grain sorting due to collisions among the grains and between the grain and the base. The impact of grain on the horizontal channel further aids grain sorting and contributes to inverse grading. The proposed classification of three geometric configurations in our study enhances the understanding of damming properties from the view of mechanism, which provides valuable insights for related study about damming granular debris. 展开更多
关键词 Landslide dam Geometric configuration Energy dissipation Inverse grading Physical experiment
下载PDF
Network Configuration Entity Extraction Method Based on Transformer with Multi-Head Attention Mechanism
15
作者 Yang Yang Zhenying Qu +2 位作者 Zefan Yan Zhipeng Gao Ti Wang 《Computers, Materials & Continua》 SCIE EI 2024年第1期735-757,共23页
Nowadays,ensuring thequality of networkserviceshas become increasingly vital.Experts are turning toknowledge graph technology,with a significant emphasis on entity extraction in the identification of device configurat... Nowadays,ensuring thequality of networkserviceshas become increasingly vital.Experts are turning toknowledge graph technology,with a significant emphasis on entity extraction in the identification of device configurations.This research paper presents a novel entity extraction method that leverages a combination of active learning and attention mechanisms.Initially,an improved active learning approach is employed to select the most valuable unlabeled samples,which are subsequently submitted for expert labeling.This approach successfully addresses the problems of isolated points and sample redundancy within the network configuration sample set.Then the labeled samples are utilized to train the model for network configuration entity extraction.Furthermore,the multi-head self-attention of the transformer model is enhanced by introducing the Adaptive Weighting method based on the Laplace mixture distribution.This enhancement enables the transformer model to dynamically adapt its focus to words in various positions,displaying exceptional adaptability to abnormal data and further elevating the accuracy of the proposed model.Through comparisons with Random Sampling(RANDOM),Maximum Normalized Log-Probability(MNLP),Least Confidence(LC),Token Entrop(TE),and Entropy Query by Bagging(EQB),the proposed method,Entropy Query by Bagging and Maximum Influence Active Learning(EQBMIAL),achieves comparable performance with only 40% of the samples on both datasets,while other algorithms require 50% of the samples.Furthermore,the entity extraction algorithm with the Adaptive Weighted Multi-head Attention mechanism(AW-MHA)is compared with BILSTM-CRF,Mutil_Attention-Bilstm-Crf,Deep_Neural_Model_NER and BERT_Transformer,achieving precision rates of 75.98% and 98.32% on the two datasets,respectively.Statistical tests demonstrate the statistical significance and effectiveness of the proposed algorithms in this paper. 展开更多
关键词 Entity extraction network configuration knowledge graph active learning TRANSFORMER
下载PDF
A numerical survey of parameters to reach ignition condition for axial compression of a large-sized field reversed configuration
16
作者 李宜霖 廖晖 +1 位作者 周海洋 孙玄 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第5期47-55,共9页
Field reversed configuration(FRC)is widely considered as an ideal target plasma for magnetoinertial fusion.However,its confinement and stability,both proportional to the radius,will deteriorate inevitably during radia... Field reversed configuration(FRC)is widely considered as an ideal target plasma for magnetoinertial fusion.However,its confinement and stability,both proportional to the radius,will deteriorate inevitably during radial compression.Hence,we propose a new fusion approach based on axial compression of a large-sized FRC.The axial compression can be made by plasma jets or plasmoids converging onto the axial ends of the FRC.The parameter space that can reach the ignition condition while preserving the FRC's overall quality is studied using a numerical model based on different FRC confinement scalings.It is found that ignition is possible for a large FRC that can be achieved with the current FRC formation techniques if compression ratio is greater than 50.A more realistic compression is to combine axial with moderate radial compression,which is also presented and calculated in this work. 展开更多
关键词 field reversed configuration magnetized target fusion axial compression
下载PDF
Configuration Synthesis and Grasping Performance Analysis of Multi-Loop Coupling Capture Mechanism for Launch and Recovery of Torpedo-Shaped Autonomous Underwater Vehicle
17
作者 ZHANG Guo-xing XIA Xin-lu GUO Jin-wei 《China Ocean Engineering》 SCIE EI CSCD 2024年第3期453-466,共14页
Research of capture mechanisms with strong capture adaptability and stable grasp is important to solve the problem of launch and recovery of torpedo-shaped autonomous underwater vehicles(AUVs).A multi-loop coupling ca... Research of capture mechanisms with strong capture adaptability and stable grasp is important to solve the problem of launch and recovery of torpedo-shaped autonomous underwater vehicles(AUVs).A multi-loop coupling capture mechanism with strong adaptability and high retraction rate has been proposed for the launch and recovery of torpedo-shaped AUVs with different morphological features.Firstly,the principle of capturing motion retraction is described based on the appearance characteristics of torpedo-shaped AUVs,and the configuration synthesis of the capture mechanism is carried out using the method of constrained chain synthesis.Secondly,the screw theory is employed to analyze the degree of freedom(DoF)of the capture mechanism.Then,the 3D model of the capture mechanism is established,and the kinematics and dynamics simulations are carried out.Combined with the capture orientation requirements of the capture mechanism,the statics and vibration characteristics analyses are carried out.Furthermore,considering the capture process and the underwater working environment,the motion characteristics and hydraulics characteristics of the capture mechanism are analyzed.Finally,a principle prototype is developed and the torpedo-shaped AUVs capture experiment is completed.The work provides technical reserves for the research and development of AUV capture special equipment. 展开更多
关键词 capture mechanism torpedo-shaped AUVs configuration synthesis launch and recovery grasping performance analysis
下载PDF
A Proposed Approach for Measuring Maturity Level of Software Delivery
18
作者 Osama Hassan Mansour Atef Raslan Nagy Ramadan 《Journal of Software Engineering and Applications》 2024年第5期228-245,共18页
Software delivery is vital for modern organizations, driving innovation and competitiveness. Measuring an organization’s maturity in software delivery is crucial for efficiency and quality. The Capability Maturity Mo... Software delivery is vital for modern organizations, driving innovation and competitiveness. Measuring an organization’s maturity in software delivery is crucial for efficiency and quality. The Capability Maturity Model (CMM) framework provides a roadmap for improvement but assessing an organization’s CMM Level is challenging. This paper offers a quantitative approach tailored to the CMM framework, using Goal-Question-Metric (GQM) frame-works for each key process area (KPA). These frameworks include metrics and questions to compute maturity scores effectively. The study also refines practices into questions for a thorough assessment. The result is an Analysis Matrix that calculates weighted scores and an overall maturity score. This approach helps organizations assess and enhance their software delivery processes systematically, aiming for improved practices and growth. 展开更多
关键词 CMM CMMI software Delivery MATURITY KPAs GQM PRACTICES
下载PDF
A Tutorial on Federated Learning from Theory to Practice:Foundations,Software Frameworks,Exemplary Use Cases,and Selected Trends
19
作者 M.Victoria Luzón Nuria Rodríguez-Barroso +5 位作者 Alberto Argente-Garrido Daniel Jiménez-López Jose M.Moyano Javier Del Ser Weiping Ding Francisco Herrera 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期824-850,共27页
When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ... When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ML models to be trained on local devices without any need for centralized data transfer,thereby reducing both the exposure of sensitive data and the possibility of data interception by malicious third parties.This paradigm has gained momentum in the last few years,spurred by the plethora of real-world applications that have leveraged its ability to improve the efficiency of distributed learning and to accommodate numerous participants with their data sources.By virtue of FL,models can be learned from all such distributed data sources while preserving data privacy.The aim of this paper is to provide a practical tutorial on FL,including a short methodology and a systematic analysis of existing software frameworks.Furthermore,our tutorial provides exemplary cases of study from three complementary perspectives:i)Foundations of FL,describing the main components of FL,from key elements to FL categories;ii)Implementation guidelines and exemplary cases of study,by systematically examining the functionalities provided by existing software frameworks for FL deployment,devising a methodology to design a FL scenario,and providing exemplary cases of study with source code for different ML approaches;and iii)Trends,shortly reviewing a non-exhaustive list of research directions that are under active investigation in the current FL landscape.The ultimate purpose of this work is to establish itself as a referential work for researchers,developers,and data scientists willing to explore the capabilities of FL in practical applications. 展开更多
关键词 Data privacy distributed machine learning federated learning software frameworks
下载PDF
Software Vulnerability Mining and Analysis Based on Deep Learning
20
作者 Shibin Zhao Junhu Zhu Jianshan Peng 《Computers, Materials & Continua》 SCIE EI 2024年第8期3263-3287,共25页
In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current secu... In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection rates.Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false alarms.So,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)injection.Also,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency graph.The feature vector is then used as the learning target for the neural network.Four types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection defects.Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method. 展开更多
关键词 Vulnerability mining software security deep learning static analysis
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部