The software Effort Estimation (SEE) process is used to predict the effort involved in developing a software project inaccuracy. This process permeates the development stages of the software project. Although there ar...
详细信息
ISBN:
(纸本)9781665426329
The software Effort Estimation (SEE) process is used to predict the effort involved in developing a software project inaccuracy. This process permeates the development stages of the software project. Although there are many models for estimating the effort, we will do our best to follow the best model for estimating the effort. The main objective of this research is to apply the Long Short-Term Memory (LSTM) algorithm and discover its accuracy in estimating the software effort. Then, compare the results with other models taken from previous work and find the best one among the models. The LSTM algorithm has been used with two data sets: China, which contains 499 projects, and Kitchenham, 145 projects. The metrics adopted to measure the accuracy of the models are Root Mean Squared Error (RMSE), respectively, Mean Absolute Error (MAE), and R_Squared. The results of RMSE, MAE, and R_Squared are 0.016, 0.019, and 0.972, respectively, in the china dataset. At the same time, the RMSE, MAE, and R_Squared results are also 0.017, 0.058, and 0.896, respectively, in the Kitchenham dataset. Therefore, the experiments' results showed the LSTM algorithm's superiority over the other algorithms in both data sets.
In this design scheme, in order to improve the transmit rate and the reliability of the wireless communication links, an improved extended space index modulation (IESIM) scheme is proposed by designing the spatial con...
详细信息
With the rapid development of artificial intelligence technology, its application in the field of education and teaching is becoming increasingly widespread, bringing revolutionary changes to traditional education mod...
详细信息
Some satellites are designed to be capable of autonomous flight in order to be intelligent. However, many autonomous flight tasks need to be designed because of the complexity of satellite system, which brings heavy s...
详细信息
Image processing algorithms, which supply the image quality, are used by modern mobile devices to capture images. These methods need more RAM to process an image and fix these problems. software pipelines are utilized...
详细信息
software defect prediction, an integral facet of softwareengineering, proactively identifies and resolves potential flaws before they escalate into disruptive issues during production. Insights gleaned from dedicated...
详细信息
Clever fitness management software using the Internet of Factors (IoT) and smart sensors are a modern answer for powerful and personalized health care. This technology integrates innovative sensors with IoT, creating ...
详细信息
computer Vision (CV) is used in a broad range of Cyber-Physical Systems such as surgical and factory floor robots and autonomous vehicles including small Unmanned Aerial Systems (sUAS). It enables machines to perceive...
详细信息
ISBN:
(纸本)9798350301137
computer Vision (CV) is used in a broad range of Cyber-Physical Systems such as surgical and factory floor robots and autonomous vehicles including small Unmanned Aerial Systems (sUAS). It enables machines to perceive the world by detecting and classifying objects of interest, reconstructing 3D scenes, estimating motion, and maneuvering around objects. CV algorithms are developed using diverse machine learning and deep learning frameworks, which are often deployed on limited resource edge devices. As sUAS rely upon an accurate and timely perception of their environment to perform critical tasks, problems related to CV can create hazardous conditions leading to crashes or mission failure. In this paper, we perform a systematic literature review (SLR) of CV-related challenges associated with CV, hardware, andsoftwareengineering. We then group the reported challenges into five categories and fourteen sub-challenges and present existing solutions. As current literature focuses primarily on CV and hardware challenges, we close by discussing implications for softwareengineering, drawing examples from a CV-enhanced multi-sUAS system.
Blockchain (BC) technology and Artificial Intelligence (AI) are promising areas with potential for powerful, secure, and decentralized applications in various sectors. Also, LLMs, are essential advanced machine learni...
详细信息
As the viruses are increasing efficiently, our project aims to develop a keylogger software. The purpose of this software is to continuously monitor and assess the activities of employees, and to address security conc...
详细信息
暂无评论