期刊文献+
共找到453,183篇文章
< 1 2 250 >
每页显示 20 50 100
ProTSA: A Testing Process for Automotive Software Domain
1
作者 Renato Rafael Arcanjo Luiz Eduardo Galvão Martins Dirceu Lavoiser Fernandes Graci 《Journal of Software Engineering and Applications》 2024年第7期571-615,共45页
This study evaluates the development of a testing process for the automotive software domain, highlighting challenges stemming from the absence of adequate processes. The research demonstrates the application of Desig... This study evaluates the development of a testing process for the automotive software domain, highlighting challenges stemming from the absence of adequate processes. The research demonstrates the application of Design Science Research methodology in developing, an automotive software testing process—ProTSA, using six functional testing modules. Additionally, the study evaluates the benefits of implementing ProTSA in a specific Original Equipment Manufacturer (OEM) using an experimental single-case approach with industry professionals’ participation through a survey. The study concludes that combining testing techniques with effective communication and alignment is crucial for enhancing software quality. Furthermore, survey data indicates that implementing ProTSA leads to productivity gains by initiating tests early, resulting in time savings in the testing program and increased productivity for the testing team. Future work will explore implementing ProTSA in cybersecurity, over-the-air software updates, and autonomous vehicle testing processes. . 展开更多
关键词 Verification and Validation Automotive software Automotive Systems
下载PDF
A Parallel Hybrid Testing Technique for Tri-Programming Model-Based Software Systems
2
作者 Huda Basloom Mohamed Dahab +3 位作者 Abdullah Saad AL-Ghamdi Fathy Eassa Ahmed Mohammed Alghamdi Seif Haridi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4501-4530,共30页
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ... Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple levels.Combining different programming paradigms,such as Message Passing Interface(MPI),Open Multiple Processing(OpenMP),and Open Accelerators(OpenACC),can increase computation speed and improve performance.During the integration of multiple models,the probability of runtime errors increases,making their detection difficult,especially in the absence of testing techniques that can detect these errors.Numerous studies have been conducted to identify these errors,but no technique exists for detecting errors in three-level programming models.Despite the increasing research that integrates the three programming models,MPI,OpenMP,and OpenACC,a testing technology to detect runtime errors,such as deadlocks and race conditions,which can arise from this integration has not been developed.Therefore,this paper begins with a definition and explanation of runtime errors that result fromintegrating the three programming models that compilers cannot detect.For the first time,this paper presents a classification of operational errors that can result from the integration of the three models.This paper also proposes a parallel hybrid testing technique for detecting runtime errors in systems built in the C++programming language that uses the triple programming models MPI,OpenMP,and OpenACC.This hybrid technology combines static technology and dynamic technology,given that some errors can be detected using static techniques,whereas others can be detected using dynamic technology.The hybrid technique can detect more errors because it combines two distinct technologies.The proposed static technology detects a wide range of error types in less time,whereas a portion of the potential errors that may or may not occur depending on the 4502 CMC,2023,vol.74,no.2 operating environment are left to the dynamic technology,which completes the validation. 展开更多
关键词 software testing hybrid testing technique OpenACC OPENMP MPI tri-programming model exascale computing
下载PDF
Personalized Learning Path Recommendations for Software Testing Courses Based on Knowledge Graphs
3
作者 Wei Zheng Ruonan Gu +2 位作者 Xiaoxue Wu Lipeng Gao Han Li 《计算机教育》 2023年第12期63-70,共8页
Software testing courses are characterized by strong practicality,comprehensiveness,and diversity.Due to the differences among students and the needs to design personalized solutions for their specific requirements,th... Software testing courses are characterized by strong practicality,comprehensiveness,and diversity.Due to the differences among students and the needs to design personalized solutions for their specific requirements,the design of the existing software testing courses fails to meet the demands for personalized learning.Knowledge graphs,with their rich semantics and good visualization effects,have a wide range of applications in the field of education.In response to the current problem of software testing courses which fails to meet the needs for personalized learning,this paper offers a learning path recommendation based on knowledge graphs to provide personalized learning paths for students. 展开更多
关键词 Knowledge graphs software testing Learning path Personalized education
下载PDF
Strategy and Methodology of Integration Testing for GUI Software
4
作者 Mengqing TanLi Jiyi Xiao Ying Zhang 《Journal of Software Engineering and Applications》 2023年第8期361-396,共36页
In this paper, by means of effective testing practices, main strategies of integration testing for GUI software, including differentiating strategy for distinguished system, strategy of personnel organization, increme... In this paper, by means of effective testing practices, main strategies of integration testing for GUI software, including differentiating strategy for distinguished system, strategy of personnel organization, incremental testing strategy based on baseline version, testing strategy of circulating loop through the whole life, and the strategy of test suite construction, were briefly investigated. Moreover, for the code analysis, the FTA (Fault Tree analysis) is proposed to deal with the software change in regression testing. For test suite constructing, the constructing methods for baseline version and the incremental change are deeply discussed, in which main points focus on the testing strategy based on “Sheet/Form”, the “Grey-box approach” for integration testing process, and the application of the improved STD (State Transform Diagram) in state testing. At the same time, the suite construction of integration testing for two types, including small scale program and large scale software, is analyzed and discussed in detail. For testing execution, the specific method based on “Cross-testing” is investigated. Concurrently, by a lot of examples, all results of testing activity indicate that these strategies and methods are useful and fitted to integration testing for GUI software. 展开更多
关键词 Integration testing Strategy and Methodology Grey-Box Approach GUI software
下载PDF
Unbound^(28)O,the heaviest oxygen isotope observed:a cutting-edge probe for testing nuclear models 被引量:1
5
作者 Jian-Guo Li Bai-Shan Hu +1 位作者 Shuang Zhang Fu-Rong Xu 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第2期1-2,共2页
The beyond-dripline oxygen isotopes^(27,28)O were recently observed at RIKEN,and were found to be unbound decaying into^(24)O by emitting neutrons.The unbound feature of the heaviest oxygen isotope,^(28)O,provides an ... The beyond-dripline oxygen isotopes^(27,28)O were recently observed at RIKEN,and were found to be unbound decaying into^(24)O by emitting neutrons.The unbound feature of the heaviest oxygen isotope,^(28)O,provides an excellent test for stateof-the-art nuclear models.The atomic nucleus is a self-organized quantum manybody system comprising specific numbers of protons Z and neutrons N. 展开更多
关键词 testing QUANTUM system
下载PDF
Open-Source Software Defined Networking Controllers:State-of-the-Art,Challenges and Solutions for Future Network Providers
6
作者 Johari Abdul Rahim Rosdiadee Nordin Oluwatosin Ahmed Amodu 《Computers, Materials & Continua》 SCIE EI 2024年第7期747-800,共54页
Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN t... Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN technology.Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them.There are several SDN controllers available in the open market besides a large number of commercial controllers;some are developed tomeet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System(ONOS).This paper presents a comparative study between open source SDN controllers,which are known as Network Controller Platform(NOX),Python-based Network Controller(POX),component-based SDN framework(Ryu),Java-based OpenFlow controller(Floodlight),OpenDayLight(ODL)and ONOS.The discussion is further extended into ONOS architecture,as well as,the evolution of ONOS controllers.This article will review use cases based on ONOS controllers in several application deployments.Moreover,the opportunities and challenges of open source SDN controllers will be discussed,exploring carriergrade ONOS for future real-world deployments,ONOS unique features and identifying the suitable choice of SDN controller for service providers.In addition,we attempt to provide answers to several critical questions relating to the implications of the open-source nature of SDN controllers regarding vendor lock-in,interoperability,and standards compliance,Similarly,real-world use cases of organizations using open-source SDN are highlighted and how the open-source community contributes to the development of SDN controllers.Furthermore,challenges faced by open-source projects,and considerations when choosing an open-source SDN controller are underscored.Then the role of Artificial Intelligence(AI)and Machine Learning(ML)in the evolution of open-source SDN controllers in light of recent research is indicated.In addition,the challenges and limitations associated with deploying open-source SDN controllers in production networks,how can they be mitigated,and finally how opensource SDN controllers handle network security and ensure that network configurations and policies are robust and resilient are presented.Potential opportunities and challenges for future Open SDN deployment are outlined to conclude the article. 展开更多
关键词 ONOS open source software SDN software defined networking
下载PDF
Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs
7
作者 Norah Abdullah Al-Johany Sanaa Abdullah Sharaf +1 位作者 Fathy Elbouraey Eassa Reem Abdulaziz Alnanih 《Computers, Materials & Continua》 SCIE EI 2024年第5期3139-3173,共35页
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memorysystems.However, MPI implementations can contain defects that impact the reliability and performance of par... The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memorysystems.However, MPI implementations can contain defects that impact the reliability and performance of parallelapplications. Detecting and correcting these defects is crucial, yet there is a lack of published models specificallydesigned for correctingMPI defects. To address this, we propose a model for detecting and correcting MPI defects(DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blockingpoint-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defectsaddressed by the DC_MPI model include illegal MPI calls, deadlocks (DL), race conditions (RC), and messagemismatches (MM). To assess the effectiveness of the DC_MPI model, we performed experiments on a datasetconsisting of 40 MPI codes. The results indicate that the model achieved a detection rate of 37 out of 40 codes,resulting in an overall detection accuracy of 92.5%. Additionally, the execution duration of the DC_MPI modelranged from 0.81 to 1.36 s. These findings show that the DC_MPI model is useful in detecting and correctingdefects in MPI implementations, thereby enhancing the reliability and performance of parallel applications. TheDC_MPImodel fills an important research gap and provides a valuable tool for improving the quality ofMPI-basedparallel computing systems. 展开更多
关键词 High-performance computing parallel computing software engineering software defect message passing interface DEADLOCK
下载PDF
HV Process Model of Software Development
8
作者 Hemant Kumar Vipin Saxena 《Journal of Software Engineering and Applications》 2024年第7期553-570,共18页
Software Development Life Cycle (SDLC) is one of the major ingredients for the development of efficient software systems within a time frame and low-cost involvement. From the literature, it is evident that there are ... Software Development Life Cycle (SDLC) is one of the major ingredients for the development of efficient software systems within a time frame and low-cost involvement. From the literature, it is evident that there are various kinds of process models that are used by the software industries for the development of small, medium and long-term software projects, but many of them do not cover risk management. It is quite obvious that the improper selection of the software development process model leads to failure of the software products as it is time bound activity. In the present work, a new software development process model is proposed which covers the risks at any stage of the development of the software product. The model is named a Hemant-Vipin (HV) process model and may be helpful for the software industries for development of the efficient software products and timely delivery at the end of the client. The efficiency of the HV process model is observed by considering various kinds of factors like requirement clarity, user feedback, change agility, predictability, risk identification, practical implementation, customer satisfaction, incremental development, use of ready-made components, quick design, resource organization and many more and found through a case study that the presented approach covers many of parameters in comparison of the existing process models. . 展开更多
关键词 software Process Model software Development software Engineering software Risk Management and software Quality
下载PDF
Failure characterization of fully grouted rock bolts under triaxial testing
9
作者 Hadi Nourizadeh Ali Mirzaghorbanali +3 位作者 Mehdi Serati Elamin Mutaz Kevin McDougall Naj Aziz 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第3期778-789,共12页
Confining stresses serve as a pivotal determinant in shaping the behavior of grouted rock bolts.Nonetheless,prior investigations have oversimplified the three-dimensional stress state,primarily assuming hydrostatic st... Confining stresses serve as a pivotal determinant in shaping the behavior of grouted rock bolts.Nonetheless,prior investigations have oversimplified the three-dimensional stress state,primarily assuming hydrostatic stress conditions.Under these conditions,it is assumed that the intermediate principal stress(σ_(2))equals the minimum principal stress(σ_(3)).This assumption overlooks the potential variations in magnitudes of in situ stress conditions along all three directions near an underground opening where a rock bolt is installed.In this study,a series of push tests was meticulously conducted under triaxial conditions.These tests involved applying non-uniform confining stresses(σ_(2)≠σ_(3))to cubic specimens,aiming to unveil the previously overlooked influence of intermediate principal stresses on the strength properties of rock bolts.The results show that as the confining stresses increase from zero to higher levels,the pre-failure behavior changes from linear to nonlinear forms,resulting in an increase in initial stiffness from 2.08 kN/mm to 32.51 kN/mm.The load-displacement curves further illuminate distinct post-failure behavior at elevated levels of confining stresses,characterized by enhanced stiffness.Notably,the peak load capacity ranged from 27.9 kN to 46.5 kN as confining stresses advanced from σ_(2)=σ_(3)=0 to σ_(2)=20 MPa and σ_(3)=10 MPa.Additionally,the outcomes highlight an influence of confining stress on the lateral deformation of samples.Lower levels of confinement prompt overall dilation in lateral deformation,while higher confinements maintain a state of shrinkage.Furthermore,diverse failure modes have been identified,intricately tied to the arrangement of confining stresses.Lower confinements tend to induce a splitting mode of failure,whereas higher loads bring about a shift towards a pure interfacial shear-off and shear-crushed failure mechanism. 展开更多
关键词 Rock bolts Bolt-grout interface Bond strength Push test Triaxial tests
下载PDF
A Hybrid Model for Improving Software Cost Estimation in Global Software Development
10
作者 Mehmood Ahmed Noraini B.Ibrahim +4 位作者 Wasif Nisar Adeel Ahmed Muhammad Junaid Emmanuel Soriano Flores Divya Anand 《Computers, Materials & Continua》 SCIE EI 2024年第1期1399-1422,共24页
Accurate software cost estimation in Global Software Development(GSD)remains challenging due to reliance on historical data and expert judgments.Traditional models,such as the Constructive Cost Model(COCOMO II),rely h... Accurate software cost estimation in Global Software Development(GSD)remains challenging due to reliance on historical data and expert judgments.Traditional models,such as the Constructive Cost Model(COCOMO II),rely heavily on historical and accurate data.In addition,expert judgment is required to set many input parameters,which can introduce subjectivity and variability in the estimation process.Consequently,there is a need to improve the current GSD models to mitigate reliance on historical data,subjectivity in expert judgment,inadequate consideration of GSD-based cost drivers and limited integration of modern technologies with cost overruns.This study introduces a novel hybrid model that synergizes the COCOMO II with Artificial Neural Networks(ANN)to address these challenges.The proposed hybrid model integrates additional GSD-based cost drivers identified through a systematic literature review and further vetted by industry experts.This article compares the effectiveness of the proposedmodelwith state-of-the-artmachine learning-basedmodels for software cost estimation.Evaluating the NASA 93 dataset by adopting twenty-six GSD-based cost drivers reveals that our hybrid model achieves superior accuracy,outperforming existing state-of-the-artmodels.The findings indicate the potential of combining COCOMO II,ANN,and additional GSD-based cost drivers to transform cost estimation in GSD. 展开更多
关键词 Artificial neural networks COCOMO II cost drivers global software development linear regression software cost estimation
下载PDF
C-CORE:Clustering by Code Representation to Prioritize Test Cases in Compiler Testing
11
作者 Wei Zhou Xincong Jiang Chuan Qin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2069-2093,共25页
Edge devices,due to their limited computational and storage resources,often require the use of compilers for program optimization.Therefore,ensuring the security and reliability of these compilers is of paramount impo... Edge devices,due to their limited computational and storage resources,often require the use of compilers for program optimization.Therefore,ensuring the security and reliability of these compilers is of paramount importance in the emerging field of edge AI.One widely used testing method for this purpose is fuzz testing,which detects bugs by inputting random test cases into the target program.However,this process consumes significant time and resources.To improve the efficiency of compiler fuzz testing,it is common practice to utilize test case prioritization techniques.Some researchers use machine learning to predict the code coverage of test cases,aiming to maximize the test capability for the target compiler by increasing the overall predicted coverage of the test cases.Nevertheless,these methods can only forecast the code coverage of the compiler at a specific optimization level,potentially missing many optimization-related bugs.In this paper,we introduce C-CORE(short for Clustering by Code Representation),the first framework to prioritize test cases according to their code representations,which are derived directly from the source codes.This approach avoids being limited to specific compiler states and extends to a broader range of compiler bugs.Specifically,we first train a scaled pre-trained programming language model to capture as many common features as possible from the test cases generated by a fuzzer.Using this pre-trained model,we then train two downstream models:one for predicting the likelihood of triggering a bug and another for identifying code representations associated with bugs.Subsequently,we cluster the test cases according to their code representations and select the highest-scoring test case from each cluster as the high-quality test case.This reduction in redundant testing cases leads to time savings.Comprehensive evaluation results reveal that code representations are better at distinguishing test capabilities,and C-CORE significantly enhances testing efficiency.Across four datasets,C-CORE increases the average of the percentage of faults detected(APFD)value by 0.16 to 0.31 and reduces test time by over 50% in 46% of cases.When compared to the best results from approaches using predicted code coverage,C-CORE improves the APFD value by 1.1% to 12.3% and achieves an overall time-saving of 159.1%. 展开更多
关键词 Compiler testing test case prioritization code representation
下载PDF
Development and Evaluation of 3D Delivery Animation Software Designed to Improve the Mother’s and Spouse’s Satisfaction with Delivery
12
作者 Ayako Sasaki Sachi Chikazawa +4 位作者 Nojima Kumiko Tomita Takako Hatakeyama Keiko Imoto Yasufumi Imoto Nobutane 《Health》 2024年第5期439-458,共20页
Purpose: To clarify the effectiveness of 3-D delivery animation software for the mother’s and husband’s satisfaction with delivery. Subjects and Method: We independently developed a software application used to disp... Purpose: To clarify the effectiveness of 3-D delivery animation software for the mother’s and husband’s satisfaction with delivery. Subjects and Method: We independently developed a software application used to display the pelvic region and explain the labor process. The study involved a collaboration with hospital staff who recruited 18 primiparous and 18 multiparous mothers who were hospitalized for delivery at Facility A. The midwife explained the process of delivery using the “Delivery Animation Software”. A self-administered, anonymous questionnaire was distributed and analyzed separately for primiparous and multiparous mothers and their husbands. Results: 1) For both primiparous and multiparous couples, both mothers and their husbands gained a significantly higher level of understanding after delivery than during pregnancy. 2) The Self-Evaluation Scale for Experience of Delivery results were as follows: “I did my best for the baby even if it was painful” was selected more often for “birth coping skills”;“reliable medical staff” was selected more often for “physiological birth process”;“the birth progressed as I expected” was selected frequently by primiparous mothers;and “the birth progressed smoothly” was selected often by multiparous mothers. 3) In terms of husbands’ satisfaction with the delivery, “I was satisfied with the delivery”, “I was given an easy-to-understand explanation”, and “They explained the process to me” was selected of primiparous and multiparous fathers. 4) All primiparous and multiparous mothers positively evaluated whether the delivery animation was helpful in understanding the process of delivery. Conclusion: The delivery animation was effective in improving the understanding and satisfaction of both the mothers and their husbands. 展开更多
关键词 MOTHER SPOUSE SATISFACTION 3D Delivery Animation software
下载PDF
Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory
13
作者 Ziqiao Zhou Tianyang Zhou +1 位作者 Jinghao Xu Junhu Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2613-2634,共22页
Intelligent penetration testing is of great significance for the improvement of the security of information systems,and the critical issue is the planning of penetration test paths.In view of the difficulty for attack... Intelligent penetration testing is of great significance for the improvement of the security of information systems,and the critical issue is the planning of penetration test paths.In view of the difficulty for attackers to obtain complete network information in realistic network scenarios,Reinforcement Learning(RL)is a promising solution to discover the optimal penetration path under incomplete information about the target network.Existing RL-based methods are challenged by the sizeable discrete action space,which leads to difficulties in the convergence.Moreover,most methods still rely on experts’knowledge.To address these issues,this paper proposes a penetration path planning method based on reinforcement learning with episodic memory.First,the penetration testing problem is formally described in terms of reinforcement learning.To speed up the training process without specific prior knowledge,the proposed algorithm introduces episodic memory to store experienced advantageous strategies for the first time.Furthermore,the method offers an exploration strategy based on episodic memory to guide the agents in learning.The design makes full use of historical experience to achieve the purpose of reducing blind exploration and improving planning efficiency.Ultimately,comparison experiments are carried out with the existing RL-based methods.The results reveal that the proposed method has better convergence performance.The running time is reduced by more than 20%. 展开更多
关键词 Intelligent penetration testing penetration testing path planning reinforcement learning episodic memory exploration strategy
下载PDF
A Proposed Approach for Measuring Maturity Level of Software Delivery
14
作者 Osama Hassan Mansour Atef Raslan Nagy Ramadan 《Journal of Software Engineering and Applications》 2024年第5期228-245,共18页
Software delivery is vital for modern organizations, driving innovation and competitiveness. Measuring an organization’s maturity in software delivery is crucial for efficiency and quality. The Capability Maturity Mo... Software delivery is vital for modern organizations, driving innovation and competitiveness. Measuring an organization’s maturity in software delivery is crucial for efficiency and quality. The Capability Maturity Model (CMM) framework provides a roadmap for improvement but assessing an organization’s CMM Level is challenging. This paper offers a quantitative approach tailored to the CMM framework, using Goal-Question-Metric (GQM) frame-works for each key process area (KPA). These frameworks include metrics and questions to compute maturity scores effectively. The study also refines practices into questions for a thorough assessment. The result is an Analysis Matrix that calculates weighted scores and an overall maturity score. This approach helps organizations assess and enhance their software delivery processes systematically, aiming for improved practices and growth. 展开更多
关键词 CMM CMMI software Delivery MATURITY KPAs GQM PRACTICES
下载PDF
A Tutorial on Federated Learning from Theory to Practice:Foundations,Software Frameworks,Exemplary Use Cases,and Selected Trends
15
作者 M.Victoria Luzón Nuria Rodríguez-Barroso +5 位作者 Alberto Argente-Garrido Daniel Jiménez-López Jose M.Moyano Javier Del Ser Weiping Ding Francisco Herrera 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期824-850,共27页
When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ... When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized environment.FL allows ML models to be trained on local devices without any need for centralized data transfer,thereby reducing both the exposure of sensitive data and the possibility of data interception by malicious third parties.This paradigm has gained momentum in the last few years,spurred by the plethora of real-world applications that have leveraged its ability to improve the efficiency of distributed learning and to accommodate numerous participants with their data sources.By virtue of FL,models can be learned from all such distributed data sources while preserving data privacy.The aim of this paper is to provide a practical tutorial on FL,including a short methodology and a systematic analysis of existing software frameworks.Furthermore,our tutorial provides exemplary cases of study from three complementary perspectives:i)Foundations of FL,describing the main components of FL,from key elements to FL categories;ii)Implementation guidelines and exemplary cases of study,by systematically examining the functionalities provided by existing software frameworks for FL deployment,devising a methodology to design a FL scenario,and providing exemplary cases of study with source code for different ML approaches;and iii)Trends,shortly reviewing a non-exhaustive list of research directions that are under active investigation in the current FL landscape.The ultimate purpose of this work is to establish itself as a referential work for researchers,developers,and data scientists willing to explore the capabilities of FL in practical applications. 展开更多
关键词 Data privacy distributed machine learning federated learning software frameworks
下载PDF
SARS-CoV-2 Pooled Testing Methodology for PCR Testing Applied in Private Laboratory in Armenia
16
作者 Inessa Nazaryan Narek Pepanyan +3 位作者 Arshag Keshishyan Susanna Petrosyan Naira Margaryan Shahane Mnatsakanyan 《Advances in Infectious Diseases》 CAS 2024年第1期67-73,共7页
Since the beginning of COVID-19 pandemics many countries were facing challenges with testing capacity recourse limitations. Throughout the waves of the pandemic countries were trying to address the existing constrains... Since the beginning of COVID-19 pandemics many countries were facing challenges with testing capacity recourse limitations. Throughout the waves of the pandemic countries were trying to address the existing constrains exploring solutions to increase the testing capacity with more cost-effective approaches. Pooled methodology was one of the methods which many have validated and used. It is evident that in case of pooled sample testing the sensitivity becomes lower, however the variation highly depends on the pool size as well as the incidence rate at the certain point. Armenia as well as many other countries has adopted regulations for mandatory COVID-19 PCR testing for all the travelers. Current study aimed to explore the efficiency of COVID-19 pooled PCR testing for nasopharyngeal swabs of individuals with no symptoms in a time period with good epidemiological state of the infection. Nasopharingeal swab samples from individuals were collected. The manual extraction of RNAs of samples was performed after pooling up to 5 samples. The pools with Cycle Threshold (CT) of < 37 were considered positive and were retested individually. In total 28,015 samples were grouped in 667 pools of which 57 were positive. The total number of positive samples was 65. The median difference (CT-pool–CT samples) was 2.4 (ranging from–3.0 to 8.9). The correlation of CT of pools and positive samples was positive. The correlation coefficient r = 0.84, P < 0.000, 95% CI range 0.7423 to 0.9243). The total economic saving when using pools compared to the individual testing was 72%. The minor difference between CT values of pools and samples can be explained by the dilution effect in the pool. However, the positive correlation between the values as well as the amount of cost saving demonstrate that pooling on nasopharyngeal samples for COVID-19 PCR testing can be a good method for efficient screening with significant resource saving. One of the most important advantages of the proposed method is the fact that samples are pooled prior extraction, which avoids the possibilities with misinterpretation of IC due to low yield of RNA in the extraction process. 展开更多
关键词 COVID-19 SCREENING Grouped testing
下载PDF
SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks
17
作者 Jiehao Ye Wen Cheng +3 位作者 Xiaolong Liu Wenyi Zhu Xuan’ang Wu Shigen Shen 《Computers, Materials & Continua》 SCIE EI 2024年第5期2743-2769,共27页
The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which ... The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks. 展开更多
关键词 Edge computing Internet of Things malicious software propagation model HETEROGENEITY
下载PDF
Contribution of Stress Testing to the Management of Ischemic Heart Disease in Mali
18
作者 Youssouf Camara Hamidou Oumar Ba +7 位作者 Ibrahima Sangaré Boubacar Sonfo Coumba Adiaratou Thiam Mahamadou Sékou Diakité Koniba Diarra Karamba Touré Massama Konaté Ichaka Menta 《World Journal of Cardiovascular Diseases》 CAS 2024年第2期77-87,共11页
Introduction: Exercise stress testing (on a treadmill or ergometer bicycle) is an important test in cardiology for diagnosing myocardial ischemia. This test in Mali is still in its beginning compared to other countrie... Introduction: Exercise stress testing (on a treadmill or ergometer bicycle) is an important test in cardiology for diagnosing myocardial ischemia. This test in Mali is still in its beginning compared to other countries in the sub-region. The lack of data in Mali prompted this study, which aimed to evaluate the indications of this activity and its diagnostic contribution to cardiology in Mali. Materials and Methods: This was a retrospective, descriptive study. The study was conducted at the “TOUCAM” medical clinic in Kati based on the analysis of stress test reports between January 2016 and August 2022. Result: During the study period, we documented 73 patients who underwent exercise testing on a bicycle ergometer for suspected coronary heart disease. The mean age of our patients was 47.5 ± 13.8 years (14 and 79 years). Males accounted for the majority (78.1%). The sex ratio is 3.5. More than half of our patients were overweight or obese (77.1%). Hypertension and diabetes affected 52.1% and 25.8% of patients, respectively. 20.8% of patients had coronary artery disease. renin-angiotensin-aldosterone system blockers (56.8%) and beta-blockers (51.3%). The main indications were chest pain (63.0%) and ischemia detection (15.1%). A modified STEEP protocol was used. The majority of our patients (71.2%) achieved at least 85% of their maximum theoretical heart rate. The main reason for the termination of the study was fatigue (57.3%). The average duration was 11.3 ± 4.2 minutes. 24.7% thought the stress tests were positive and 17.8% thought they were controversial. Conclusion: This study demonstrates the importance of stress testing in the diagnosis and treatment of ischemic heart disease, especially in settings where we have very limited access to coronary angiography. 展开更多
关键词 Stress test Ischemic Heart Disease MALI
下载PDF
Software Defect Prediction Method Based on Stable Learning
19
作者 Xin Fan Jingen Mao +3 位作者 Liangjue Lian Li Yu Wei Zheng Yun Ge 《Computers, Materials & Continua》 SCIE EI 2024年第1期65-84,共20页
The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and labor.In previous software defect predicti... The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and labor.In previous software defect prediction studies,transfer learning was effective in solving the problem of inconsistent project data distribution.However,target projects often lack sufficient data,which affects the performance of the transfer learning model.In addition,the presence of uncorrelated features between projects can decrease the prediction accuracy of the transfer learning model.To address these problems,this article propose a software defect prediction method based on stable learning(SDP-SL)that combines code visualization techniques and residual networks.This method first transforms code files into code images using code visualization techniques and then constructs a defect prediction model based on these code images.During the model training process,target project data are not required as prior knowledge.Following the principles of stable learning,this paper dynamically adjusted the weights of source project samples to eliminate dependencies between features,thereby capturing the“invariance mechanism”within the data.This approach explores the genuine relationship between code defect features and labels,thereby enhancing defect prediction performance.To evaluate the performance of SDP-SL,this article conducted comparative experiments on 10 open-source projects in the PROMISE dataset.The experimental results demonstrated that in terms of the F-measure,the proposed SDP-SL method outperformed other within-project defect prediction methods by 2.11%-44.03%.In cross-project defect prediction,the SDP-SL method provided an improvement of 5.89%-25.46% in prediction performance compared to other cross-project defect prediction methods.Therefore,SDP-SL can effectively enhance within-and cross-project defect predictions. 展开更多
关键词 software defect prediction code visualization stable learning sample reweight residual network
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
20
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部