the fundamental physical principle and core mathematical formulations of the energy transport theorem (ETT)-based decoupling mode theory (DMT) for analyzing the energy-decoupled modes (DMs) of the wave-port-fed transm...
详细信息
the topics concerning involute meshing are discussed in numerous disciplines like "Machine Elements", "theory of mechanism and the machines", "Machine design" and others, which are in the...
详细信息
ISBN:
(纸本)140205260X
the topics concerning involute meshing are discussed in numerous disciplines like "Machine Elements", "theory of mechanism and the machines", "Machine design" and others, which are in the basis of the education of machine designers. their better understanding is of main importance for wide range of specialists. the theory of the involute meshing includes many abstract terms and definitions. Usually their mastering is assisted with figures, posters, overlaid images, metal and transparent plastic models, etc. the goal of this work is to improve the assimilation of the theoretical matter from the field of involute gearing, withthe creation of new and more impressive and memorable multimedia software product.
Bionic mechanical hands are playing an increasingly important role in the intelligent equipment industry. However, at this stage, the degrees of freedom of bionic mechanical hands are increasing, and their structures ...
详细信息
Intrusion detection can decide whether there are dangerous user behaviors. It can also timely detect network security vulnerabilities of inner attacks, and it can make quick response and improve network security. ther...
详细信息
Effort estimation is essential for successful software project planning, budgeting, and risk identification. However, the techniques used to estimate effort are often inaccurate, outdated, and only consider technical ...
Effort estimation is essential for successful software project planning, budgeting, and risk identification. However, the techniques used to estimate effort are often inaccurate, outdated, and only consider technical factors while neglecting project management or stakeholder engagement. Expert estimation remains an important technique for leveraging human expertise in software estimation, but solely relying on this technique causes biased and subjective predictions. Machine learning (ML) techniques have shifted the direction of software project effort estimation towards computational intelligence. Nonetheless, there is a lack of deployment due to ambiguous outcomes and ineffective model-building approaches. this study presents an ensemble-based framework that can estimate software project effort more accurately withthe incorporation of domain knowledge and experiences. To achieve this, six homogeneous classifier ensembles will be constructed using six distinct classifiers on the proposed USP05-FT dataset. the collected expert estimations will be integrated into the proposed dataset as an additional feature in the form of numerical values such as expert-provided software project effort estimations (in person hours) that provide additional insight and knowledge. Subsequently, the predictions of all six homogeneous classifier ensembles will be combined through majority voting to obtain a more accurate and reliable prediction with increased robustness against errors and uncertainties. the performance of the proposed framework will be evaluated using Recall, F-measure, Precision, and Accuracy. It is expected that the proposed ensemble-based framework for software project effort estimation will lead to more efficient and effective software project management, an improvement in resource allocation, empowering informed decision-making, and timely project delivery.
In the current era, software security requirements domain has changed thoroughly, and has been considered an essential aspect for software quality. Machine learning and artificial intelligence have become the emerging...
In the current era, software security requirements domain has changed thoroughly, and has been considered an essential aspect for software quality. Machine learning and artificial intelligence have become the emerging trends to automate the identification and specification of security requirements. As an active research area, security requirements specifications are recognized and persuaded in softwareengineering and security assurance communities. Overfitting of security requirements after system design can result in security issues in current system architecture. Consistency, completeness, and correctness are critical requirements for ensuring the effectiveness of systems architecture. However, without these security requirements, the system is vulnerable to attacks and organization's assets, and its reputation is at risk. Moreover, it increases the cost and time to fix the security problem. therefore, to avoid such problems security requirements need to be identified more precisely and consistently. Realizing the benefits of assurance case, A conceptual framework is proposed for identification of security requirements correctness, consistency and completeness using assurance case. Objective of the proposed conceptual framework to assist the security requirement engineer to identify the security requirements using assurance case during requirement phase i.e., the security requirements are correct, complete, and consistent. the proposed conceptual framework involves five phases: (1) assets identification, (2) threat identification, (3) security objectives, (4) security requirements identification and (5) security requirement assessment.
Node failure is one of the most typical issues in distributed storage systems. the classic fault-tolerance methods can meet the fault tolerance needs of systems deployed in edge storage, 5G IoT, and other high-perform...
详细信息
Pose estimation is a fundamental task in computer vision that aims to localize human body joints in images or videos. However, the performance of pose estimation algorithms can be limited by various factors such as oc...
详细信息
In high data-rate differential transmission, even small asymmetries can significantly impact signal integrity and electromagnetic compatibility performance. To address this issue, wideband common-mode filters have bee...
详细信息
Based on 5G the realization of network environment of virtual simulation system is studied in this paper. It breaks through the limitations of the simultaneous trainees, the time and space in the current virtual simul...
详细信息
暂无评论