Working with Imbalance data in real-world problems is not so easy due to the different cardinality of classes. Several machine learning Techniques have been used to overcome this kind of problem for 100% original data...
详细信息
The complexity and diversity of bug fixes require developers to understand bug fixes from multiple perspectives in addition to fine-grained code changes. The dependencies among files in a software system are an import...
详细信息
The complexity and diversity of bug fixes require developers to understand bug fixes from multiple perspectives in addition to fine-grained code changes. The dependencies among files in a software system are an important dimension to inform software quality. Recent studies have revealed that most bug-prone files are always architecturally connected with dependencies, and as one of the best practices in the industry,changes in dependencies should be avoided or carefully made during bug fixing. Hence, in this paper, we take the first attempt to understand bug fixes from the dependencies perspective, which can complement existing code change perspectives. Based on this new perspective, we conducted a systematic and comprehensive study on bug fixes collected from 157 Apache open source projects, involving 140456 bug reports and182621 bug fixes in total. Our study results show that a relatively high proportion of bug fixes(30%) introduce dependency-level changes when fixing the corresponding 33% bugs. The bugs, whose fixes introduce dependency-level changes, have a strong correlation with high priority, large fixing churn, long fixing time,frequent bug reopening, and bug inducing. More importantly, patched files with dependency-level changes in their fixes, consume much more maintenance costs compared with those without these changes. We further summarized three representative patch patterns to explain the reasons for the increasing costs. Our study unveils useful findings based on qualitative and quantitative analysis and also provides new insights that might benefit existing bug prediction techniques. We release a large set of benchmarks and also implement a prototype tool to automatically detect dependency-level changes from bug fixes, which can warn developers and remind them to design a better fix.
Currently,mobile communication is one of the widely used means of ***,it is quite challenging for a telecommunication company to attract new *** recent concept of mobile number portability has also aggravated the pro...
详细信息
Currently,mobile communication is one of the widely used means of ***,it is quite challenging for a telecommunication company to attract new *** recent concept of mobile number portability has also aggravated the problem of customer *** need to identify beforehand the customers,who could potentially churn out to the *** the telecommunication industry,such identification could be done based on call detail *** research presents an extensive experimental study based on various deep learning models,such as the 1D convolutional neural network(CNN)model along with the recurrent neural network(RNN)and deep neural network(DNN)for churn *** use the mobile telephony churn prediction dataset obtained from ***,containing the data for around 100,000 individuals,out of which 86,000 are non-churners,whereas 14,000 are churned *** imbalanced data are handled using undersampling and *** accuracy for CNN,RNN,and DNN is 91%,93%,and 96%,***,DNN got 99%for ROC.
The evolving landscape of manufacturing systems and the increasing complexity of production lines necessitate innovative approaches for efficient information management and process modeling. The System Modeling Langua...
详细信息
The efficient scheduling of tasks on virtual machines (VMs) is paramount in cloud computing environments. The complexity and dynamism of today's applications require a more insightful and adaptive approach to task...
详细信息
ISBN:
(纸本)9798331300579
The efficient scheduling of tasks on virtual machines (VMs) is paramount in cloud computing environments. The complexity and dynamism of today's applications require a more insightful and adaptive approach to task allocation to ensure optimal resource utilization and service delivery. Traditional scheduling approaches often fall short when it comes to considering the multi-dimensional attributes of tasks and VMs, such as makespan, deadline, memory, and bandwidth requirements. These methodologies lack the ability to dynamically adapt to the ever-evolving requirements of tasks and the capacities of VMs, leading to suboptimal performance and resource wastage. In this paper, we present a novel approach that fuses BiLSTM & BiGRU with Exponential Smoothing Recurrent Neural Network (ES-RNN) to create a more robust and adaptive task scheduling mechanism under real-time scenarios. This model holistically assesses task capacity based on its makespan, deadline, memory, and bandwidth requirements. Similarly, VM capacity is evaluated based on its RAM, MIPS, bandwidth, and the number of processing elements. The fusion of these advanced neural architectures provides a deeper understanding of the task-VM mapping, enabling a more intelligent and efficient scheduling decision. Our approach demonstrates a marked improvement over traditional techniques, with tangible benefits such as reduced makespan by 4.9% and improved VM computation efficiency by 3.5%. The practical implications of our methodology are profound. By integrating our model into real-world cloud environments, organizations can expect to see an enhanced deadline hit ratio by 1.5%, ensuring that critical tasks meet their time-sensitive objectives. Moreover, the decision-making process becomes significantly more agile, resulting in a decision delay reduction of 4.5%, thereby promoting more responsive and efficient cloud computing operations. This work paves the way for a new era of intelligent cloud resource management, opt
As Flying Ad Hoc Networks (FANETs) continue to advance, ensuring robust security, privacy, and data reliability remains a significant challenge. This research presents a novel framework known as HE-FSMF-short for Homo...
详细信息
Bangla is one of the most spoken language globally, with approximately 228 million native speakers. But there isn't much research done in the Bangla chatbot field. There are a few closed domain retrievals based on...
详细信息
the dependability of IIoT functionality is strongly influenced by its communication protocols. One of the most popular communication standards for the Internet of Things, whose features make it attractive in the IIoT ...
详细信息
The increasing computational demand for real-time mobile applications has led to the development of mobile edge computing (MEC), with support from unmanned aerial vehicles (UAVs), as a promising paradigm for construct...
详细信息
Recently., through the messy events that happen in the world, many people have been threatened by various terrorist assaults. Therefore, there is a need to provide various intelligent techniques for recognizing and di...
详细信息
暂无评论