A large system often goes through multiple software project development cycles, in part due to changes in operation and development environments. For example, rapid turnover of the development team between releases ca...
详细信息
A large system often goes through multiple software project development cycles, in part due to changes in operation and development environments. For example, rapid turnover of the development team between releases can influence software quality, making it important to mine software project data over multiple system releases when building defect predictors. Data collection of software attributes are often conducted independent of the quality improvement goals, leading to the availability of a large number of attributes for analysis. Given the problems associated with variations in development process, data collection, and quality goals from one release to another emphasizes the importance of selecting a best-set of software attributes for software quality prediction. Moreover, it is intuitive to remove attributes that do not add to, or have an adverse effect on, the knowledge of the consequent model. Based on real-world software projects' data, we present a large case study that compares wrapper-based feature ranking techniques (WRT) and our proposed hybrid feature selection (HFS) technique. The comparison is done using both threefold cross-validation (CV) and three-fold cross-validation with risk impact (CVR). It is shown that HFS is better than WRT, while CV is superior to CVR.
In order to satisfy users’ individual QoS requirements,the paper studied the QoS attributes of grid service,and put forward several ways to describe QoS preference information: ordering vector,AHP judgement matrix an...
详细信息
In order to satisfy users’ individual QoS requirements,the paper studied the QoS attributes of grid service,and put forward several ways to describe QoS preference information: ordering vector,AHP judgement matrix and language evaluation collection,and gave out the concrete methods of conversion and *** the same time,a method of selecting the relatively optimal service was presented which can reflect users’ QoS *** numerical example analysis indicates that the method for user QoS preference is conscientiously feasible.
By the relation of oil throttle pressure to flow volume and the deformation of throttle slice,the mathematics model and target function of valves parameters optimization design was *** on,the CAD soft ware of valves p...
详细信息
By the relation of oil throttle pressure to flow volume and the deformation of throttle slice,the mathematics model and target function of valves parameters optimization design was *** on,the CAD soft ware of valves parameters of telescopic shock absorber was developed.A practical design with the CAD soft ware was given,the performance test was conducted for the telescopic shock absorber designed by CAD,and the tested values fit the desired ones *** experiment results show that the model of optimization design is accurate,and the CAD soft ware is reliable.
Despite many technology advances, the limited computing power of sensors encumber them from taking part in service-oriented architectures. In recent years, the sensor-networking subject has been extensively studied, w...
详细信息
Despite many technology advances, the limited computing power of sensors encumber them from taking part in service-oriented architectures. In recent years, the sensor-networking subject has been extensively studied, with the focus on efficient usage of energy in sensors and efficient usage of sensor node processing power. However, providing sensor nodes with the relevant computing power and network sensor management is seldom addressed. With the availability of federated meta-computing environments, sensors can participate in service oriented computing, by exporting sensor probe data with relevant processing as a network service. The framework introduced in this paper allows for building highly scalable and dynamic sensor networks, providing sensors with corresponding federated computing environment. A novel approach using the SORCER metacomputing model to integrate several different sensors and sensor networks into a dynamic service-oriented sensor network is presented. The framework makes use of provisioning mechanism, which autonomically allocates required resources to sensor services. Furthermore, the dynamically typed language, Groovy, provides the runtime computing mechanism involving variables of sensor services. The framework is generic and extensible and allows incorporating different standard and non-standard sensor technologies. It also helps expedite the development process for service-to-service applications involving sensor data.
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the applicatio...
详细信息
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test, one may choose to setup defense facilities at the front-end of the server - such as: application-layer intrusion prevention system, or application software and hardware firewall to enhance the defense mechanism or to gain more time to patch the vulnerability. This paper presents an optimum tuning method utilizing the application firewall widely used by the modern enterprises. We explore several attacking methods commonly used nowadays, such as the signature of cross-site scripting and SQL injection, and introduce a new method to setup the parameters of the device to strengthen the defense. To enhance the security of the back-end application servers, we use keyword filtering and re-treatment to rule out the blacklist, and to adjust the system settings so that it can effectively block the assaults or reduce the possibility of successful attacks. In addition, we also simulate attacks to web browsing and application through vulnerability scanning tools to test the security of application system and to make sure the necessary defense of the optimum tuning parameters. This concept does produce good results in our implementation of verification tests. It is worth promoting as a reference.
Nowadays,there still exists marked gap between the talent training structure & level of marketing discipline set up by higher learning institutions in China and that of social *** Article,analyzed demand on market...
详细信息
Nowadays,there still exists marked gap between the talent training structure & level of marketing discipline set up by higher learning institutions in China and that of social *** Article,analyzed demand on marketing talents,explored problems existed in current marketing professional education conducted in higher learning institutions in China and introduced the practice of construction and reform of marketing discipline in Jiangxi University of Finance and Economics,and as a consequence,pointed out that development of marketing discipline should follow the development law of the discipline and conduct reform on teaching system,teaching mode and teaching contents based on market orientation.
Financing difficulty of small- and medium-sized enterprises has become a major problem severely restraining healthy development of small- and medium-sized enterprises in *** counterparts have also experienced the same...
详细信息
Financing difficulty of small- and medium-sized enterprises has become a major problem severely restraining healthy development of small- and medium-sized enterprises in *** counterparts have also experienced the same dilemma and effective measures which they adopted to solve this difficulty can serve as beneficial reference to *** Article,based on introducing the development of small- and medium-sized enterprises in Japan and their financial support,has herein analyzed the main problems in financing difficulty of small- and medium-sized enterprises in China and put forwards some suggestions concerning financial support to small- and medium-sized enterprises in reference to Japanese experience.
Along with incessant emergence of new media as mobile phone and internet etc.,the advertisement sources and readership of traditional newspaper have been divided and their space of subsistence has shrunk *** with the ...
详细信息
Along with incessant emergence of new media as mobile phone and internet etc.,the advertisement sources and readership of traditional newspaper have been divided and their space of subsistence has shrunk *** with the advent of digital times in the new century,newspaper industries have encountered crisis worldwide and fallen across their inflexion in their development *** response to this fact,the Author holds that it is imperative to further clarify the development orientation of "digital newspaper industry",actively promote updating of newspaper industry's talent strategy concepts,and put high emphasis on "corporate" management and operation of newspaper industry group to realize the transformation and transcendence of newspaper industry from conceptual level to institutional level in the New Era.
Based on analysis of the requirements of task allocation for Product Cooperative development(PCD),an evaluation index system was established for task *** paper introduced the mathematical method of Fuzzy Analytic Hier...
详细信息
Based on analysis of the requirements of task allocation for Product Cooperative development(PCD),an evaluation index system was established for task *** paper introduced the mathematical method of Fuzzy Analytic Hierarchy Process(FAHP)firstly,and established a hierarchy evaluation model of task allocation for PCD,which uses time,quality,cost as the first class evaluation indexes and uses work efficiency,technical merit,cooperation ability,work experience,personnel interest,work attitude,personnel wages and cooperation expenses as the secondary class evaluation *** on FAHP method,this paper realized task allocation for complicated product cooperative development.A software prototype of task allocation tool for PCD is implemented,which has features of friendly interface,easy operation and rapid calculation,etc.
Because of the indeterminations in Merger and Acquisition(M&A) trading,the participants are not always able to achieve the *** paper conducts a study on the comprehensive evaluation of M&A uncertainty from the...
详细信息
Because of the indeterminations in Merger and Acquisition(M&A) trading,the participants are not always able to achieve the *** paper conducts a study on the comprehensive evaluation of M&A uncertainty from the angle of complexity *** the process of study,beginning with the discussion of uncertainties in M&A transaction and trading environment,a structure diagram of the system uncertainty is created,and then the system is evaluated based on the entropy information *** is concluded that a low information entropy would be helpful to reduce the system uncertainty and facilitate the development of M&A transaction towards an orderly,steady and efficient direction
暂无评论