首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10篇
  免费   0篇
工业技术   10篇
  2023年   2篇
  2022年   2篇
  2021年   4篇
  2018年   1篇
  2013年   1篇
排序方式: 共有10条查询结果,搜索用时 125 毫秒
1
1.
Component-based software development is rapidly introducing numerous new paradigms and possibilities to deliver highly customized software in a distributed environment. Among other communication, teamwork, and coordination problems in global software development, the detection of faults is seen as the key challenge. Thus, there is a need to ensure the reliability of component-based applications requirements. Distributed device detection faults applied to tracked components from various sources and failed to keep track of all the large number of components from different locations. In this study, we propose an approach for fault detection from component-based systems requirements using the fuzzy logic approach and historical information during acceptance testing. This approach identified error-prone components selection for test case extraction and for prioritization of test cases to validate components in acceptance testing. For the evaluation, we used empirical study, and results depicted that the proposed approach significantly outperforms in component selection and acceptance testing. The comparison to the conventional procedures, i.e., requirement criteria, and communication coverage criteria without irrelevancy and redundancy successfully outperform other procedures. Consequently, the F-measures of the proposed approach define the accurate selection of components, and faults identification increases in components using the proposed approach were higher (i.e., more than 80 percent) than requirement criteria, and code coverage criteria procedures (i.e., less than 80 percent), respectively. Similarly, the rate of fault detection in the proposed approach increases, i.e., 92.80 compared to existing methods i.e., less than 80 percent. The proposed approach will provide a comprehensive guideline and roadmap for practitioners and researchers.  相似文献   
2.
The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for classifying COVID-CT images. Secondly, an alpha fusion attack is generated to fool the classification model. The alpha fusion attack is tested in the last phase on a modified LSTM-based CNN (CNN-MLSTM) model and other pre-trained models. The results of CNN models show that the accuracy of these models dropped greatly after the alpha-fusion attack. The highest F1 score before the attack was achieved is 97.45 And after the attack lowest F1 score recorded is 22%. Results elucidate the performance in terms of accuracy, precision, F1 score and Recall.  相似文献   
3.
Learning analytics is a rapidly evolving research discipline that uses the insights generated from data analysis to support learners as well as optimize both the learning process and environment. This paper studied students’ engagement level of the Learning Management System (LMS) via a learning analytics tool, student’s approach in managing their studies and possible learning analytic methods to analyze student data. Moreover, extensive systematic literature review (SLR) was employed for the selection, sorting and exclusion of articles from diverse renowned sources. The findings show that most of the engagement in LMS are driven by educators. Additionally, we have discussed the factors in LMS, causes of low engagement and ways of increasing engagement factors via the Learning Analytics approach. Nevertheless, apart from recognizing the Learning Analytics approach as being a successful method and technique for analyzing the LMS data, this research further highlighted the possibility of merging the learning analytics technique with the LMS engagement in every institution as being a direction for future research.  相似文献   
4.
Coronaviruses are responsible for various diseases ranging from the common cold to severe infections like the Middle East syndromes and the severe acute respiratory syndrome. However, a new coronavirus strain known as COVID-19 developed into a pandemic resulting in an ongoing global public health crisis. Therefore, there is a need to understand the genomic transformations that occur within this family of viruses in order to limit disease spread and develop new therapeutic targets. The nucleotide sequences of SARS-CoV-2 are consist of several bases. These bases can be classified into purines and pyrimidines according to their chemical composition. Purines include adenine (A) and guanine (G), while pyrimidines include cytosine (C) and tyrosine (T). There is a need to understand the spatial distribution of these bases on the nucleotide sequence to facilitate the development of antivirals (including neutralizing antibodies) and epitomes necessary for vaccine development. This study aimed to evaluate all the purine and pyrimidine associations within the SARS-CoV-2 genome sequence by measuring mathematical parameters including; Shannon entropy, Hurst exponent, and the nucleotide guanine-cytosine content. The Shannon entropy is used to identify closely associated sequences. Whereas Hurst exponent is used to identifying the auto-correlation of purine-pyrimidine bases even if their organization differs. Different frequency patterns can be used to determine the distribution of all four proteins and the density of each base. The GC-content is used to understand the stability of the DNA. The relevant genome sequences were extracted from the National Center for Biotechnology Information (NCBI) virus database. Furthermore, the phylogenetic properties of the COVID-19 virus were characterized to compare the closeness of the COVID-19 virus with other coronaviruses by evaluating the purine and pyrimidine distribution.  相似文献   
5.
Thermo-physiological comfort of clothing designed for next-to-skin applications is influenced by the clothing’s ability to manage heat and moisture transfer thereby maintaining dry skin microclimate. Plated knit structures designed and engineered with correct selection of fiber and yarn constituents in the distinct bottom (exposed to environment) and top (next to sin) layers can serve well for next-to-skin applications. In this study, plated fabrics with altering hydrophilic and hydrophobic fibers in top and bottom layers and different types of hydrophobic fibers in top layers have been compared for the moisture management properties. Results show that fabrics knitted with hydrophobic fibers (polypropylene, polyester) in top layers seem suitable for next-to-skin applications as they were classified as moisture management fabrics owing to high values of accumulative one-way transport index and bottom spreading speed. Though both fabrics can be recommended for next-to-skin applications, however, polypropylene on account of superior moisture management properties in the top layer would be more effective in providing dry feel next to skin and hence, seems to be a preferred choice over polyester for such applications. Fabric knitted with nylon in top layer was classified as water penetration fabric due to poor liquid transfer properties. Fabrics knitted with cotton in top layer irrespective of the hydrophobic fiber in bottom layer were poor in moisture management properties. Univariate analysis of variance with a confidence level of 95% showed the results to be statistically significant. Pearson correlation coefficient was obtained for all the moisture management indices by bivariate correlation procedure to determine strength and direction of association between the different moisture management indices. Most of the indices were found to be significantly correlated also, OWTC and OMMC were found to be positively and linearly related to each other.  相似文献   
6.
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study observed information security awareness, policy, experience, attitude, subjective norms, perceived behavioral control, threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling. The data analysis did not support threat severity relationship with conscious care behaviour. The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management.  相似文献   
7.
COVID-19 is a novel coronavirus disease that has been declared as a global pandemic in 2019. It affects the whole world through person-to-person communication. This virus spreads by the droplets of coughs and sneezing, which are quickly falling over the surface. Therefore, anyone can get easily affected by breathing in the vicinity of the COVID-19 patient. Currently, vaccine for the disease is under clinical investigation in different pharmaceutical companies. Until now, multiple medical companies have delivered health monitoring kits. However, a wireless body area network (WBAN) is a healthcare system that consists of nano sensors used to detect the real-time health condition of the patient. The proposed approach delineates is to fill a gap between recent technology trends and healthcare structure. If COVID-19 affected patient is monitored through WBAN sensors and network, a physician or a doctor can guide the patient at the right time with the correct possible decision. This scenario helps the community to maintain social distancing and avoids an unpleasant environment for hospitalized patients Herein, a Monte Carlo algorithm guided protocol is developed to probe a secured cipher output. Security cipher helps to avoid wireless network issues like packet loss, network attacks, network interference, and routing problems. Monte Carlo based covid-19 detection technique gives 90% better results in terms of time complexity, performance, and efficiency. Results indicate that Monte Carlo based covid-19 detection technique with edge computing idea is robust in terms of time complexity, performance, and efficiency and thus, is advocated as a significant application for lessening hospital expenses.  相似文献   
8.
Clothing plays an important role in maintaining thermal equilibrium between a human body and the ambient environment by serving as a medium for heat, moisture vapour and liquid moisture transfer. The ability of fabric to maintain this equilibrium is related to thermo-physiological comfort. Plating is an innovative knitted fabric production technique to obtain bi-layered fabrics. An attempt has been made to engineer plated knit structures with such a combination of fibre cross section in the back (inner/next to skin) and the yarn type in the face (outer) layer, so that a rapid liquid transfer from back layer by wicking and quick liquid absorption and evaporation by the face layer can be achieved. Plated fabrics using the combination of triangular polyester fibre in the back and carded cotton yarn in the face layer showed the higher thermal resistance, higher absorbent capacity and would be warmer to the initial touch. However, the combination of combed cotton yarn with triangular polyester fibre resulted in fabrics with the higher air permeability, moisture vapour transmission rate and transplanar wicking.  相似文献   
9.
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.  相似文献   
10.
Twitter has emerged as a platform that produces new data every day through its users which can be utilized for various purposes. People express their unique ideas and views on multiple topics thus providing vast knowledge. Sentiment analysis is critical from the corporate and political perspectives as it can impact decision-making. Since the proliferation of COVID-19, it has become an important challenge to detect the sentiment of COVID-19-related tweets so that people’s opinions can be tracked. The purpose of this research is to detect the sentiment of people regarding this problem with limited data as it can be challenging considering the various textual characteristics that must be analyzed. Hence, this research presents a deep learning-based model that utilizes the positives of random minority oversampling combined with class label analysis to achieve the best results for sentiment analysis. This research specifically focuses on utilizing class label analysis to deal with the multiclass problem by combining the class labels with a similar overall sentiment. This can be particularly helpful when dealing with smaller datasets. Furthermore, our proposed model integrates various preprocessing steps with random minority oversampling and various deep learning algorithms including standard deep learning and bi-directional deep learning algorithms. This research explores several algorithms and their impact on sentiment analysis tasks and concludes that bidirectional neural networks do not provide any advantage over standard neural networks as standard Neural Networks provide slightly better results than their bidirectional counterparts. The experimental results validate that our model offers excellent results with a validation accuracy of 92.5% and an F1 measure of 0.92.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号