Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi...
详细信息
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and *** of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’*** goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO *** projects belong to OSMO vendors,having offices in developing countries while providing services to developed *** the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed *** proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden *** results express that the suggested model has gained a notable recognition rate in comparison to any previous *** current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment.
While moving towards a low-carbon, sustainable electricity system, distribution networks are expected to host a large share of distributed generators, such as photovoltaic units and wind turbines. These inverter-based...
详细信息
While moving towards a low-carbon, sustainable electricity system, distribution networks are expected to host a large share of distributed generators, such as photovoltaic units and wind turbines. These inverter-based resources are intermittent, but also controllable, and are expected to amplify the role of distribution networks together with other distributed energy resources, such as storage systems and controllable loads. The available control methods for these resources are typically categorized based on the available communication network into centralized, distributed, and decentralized or local. Standard local schemes are typically inefficient, whereas centralized approaches show implementation and cost concerns. This paper focuses on optimized decentralized control of distributed generators via supervised and reinforcement learning. We present existing state-of-the-art decentralized control schemes based on supervised learning, propose a new reinforcement learning scheme based on deep deterministic policy gradient, and compare the behavior of both decentralized and centralized methods in terms of computational effort, scalability, privacy awareness, ability to consider constraints, and overall optimality. We evaluate the performance of the examined schemes on a benchmark European low voltage test system. The results show that both supervised learning and reinforcement learning schemes effectively mitigate the operational issues faced by the distribution network.
Protecting software-defined networking (SDN) against cyber-attacks has become crucial in an expanding digital threat environment. Distributed Denial-of-Service (DDoS) attacks are risky since they may seriously interru...
详细信息
Sign Language Recognition (SLR) tries to convert sign language into written or spoken form to enable communication between a deaf-mute person and a normal person. The task of communicating with disabled and impaired p...
详细信息
The security guard profession is no longer a profession that only relies on the physical but also other aspects, such as attitude, leadership, language, and others. There are several problems faced by companies provid...
详细信息
Mirror detection aims to identify mirror areas in a scene, with recent methods either integrating depth information (RGB-D) or making use of temporal information (video). However, utilizing both data is still under-ex...
详细信息
Dear editor, Security experts have been fighting against cybercriminals for many years and existing research shows that this battle will continue. Malicious software has no remorse when it targets different organizati...
详细信息
Dear editor, Security experts have been fighting against cybercriminals for many years and existing research shows that this battle will continue. Malicious software has no remorse when it targets different organizations, regardless of its forms [1]. Ransomware [2] has caused serious issues in different industries, especially in healthcare. The existing report shows that 34% of ransomware is targeting healthcare organizations. Nowadays, criminals prefer crypto-jacking over ransomware (which also relies on cryptocurrency for anonymous ransom payments).
An Intrusion Detection System monitors the network for any malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ...
详细信息
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable t...
详细信息
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and *** the exponential growth of digital data,robust security measures are *** encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key *** their individual benefits,both require significant computational ***,performing them separately for the same data increases complexity and processing *** the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and *** on 128-bit block sizes and a 256-bit secret key *** combines Huffman coding for compression and a Tent map for ***,an iterative Arnold cat map further enhances cryptographic confusion *** analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field.
In a cloud environment,consumers search for the best service provider that accomplishes the required tasks based on a set of criteria such as completion time and *** the other hand,Cloud Service Providers(CSPs)seek to...
详细信息
In a cloud environment,consumers search for the best service provider that accomplishes the required tasks based on a set of criteria such as completion time and *** the other hand,Cloud Service Providers(CSPs)seek to maximize their profits by attracting and serving more consumers based on their resource *** literature has discussed the problem by considering either consumers’needs or CSPs’capabilities.A problem resides in the lack of explicit models that combine preferences of consumers with the capabilities of CSPs to provide a unified process for resource allocation and task scheduling in a more efficient *** paper proposes a model that adopts a Multi-Criteria Decision Making(MCDM)method,called Analytic Hierarchy Process(AHP),to acquire the information of consumers’preferences and service providers’capabilities to prioritize both tasks and *** model also provides a matching technique to assign each task to the best resource of a CSP while preserves the fairness of scheduling more tasks for resources with higher *** experimental results prove the feasibility of the proposed model for prioritizing hundreds of tasks/services and CSPs based on a defined set of criteria,and matching each set of tasks/services to the best CSPS.
暂无评论