Deploying high-performance convolutional neural network (CNN) models on low-earth orbit (LEO) satellites for rapid remote sensing image processing has attracted significant interest from industry and academia. However...
详细信息
The proactive caching technique known as “predictive caching” attempts to improve file system performance by anticipating and pre-fetching data that is likely to be requested in the future. Conventional caching stra...
详细信息
ISBN:
(数字)9798350355611
ISBN:
(纸本)9798350355628
The proactive caching technique known as “predictive caching” attempts to improve file system performance by anticipating and pre-fetching data that is likely to be requested in the future. Conventional caching strategies, such LRU (Least Recently Used) and LFU (Least Frequently Used), base their decision on which material to keep in the cache on historical access patterns. Although these methods work well in many situations, they could not completely take advantage of the temporal and geographical proximity of file system access patterns, which could result in less-than-ideal cache use. Utilizing machine learning algorithms, statistical analysis, or heuristics, predictive caching makes predictions about future access patterns based on past data, system status, file properties, or user activity. So we propose a predictive caching technique which reduce access latency and boost system performance by pre-fetching and storing pertinent data ahead of time in anticipation of incoming data accesses.
Context: Testing plays an important role in securing the success of a software development project. Various techniques of automated testing have been developed, including automated acceptance testing which represent t...
详细信息
Context: Testing plays an important role in securing the success of a software development project. Various techniques of automated testing have been developed, including automated acceptance testing which represent the customer’s expectations where requirements can be translated into automated tests seamlessly. Prior studies have demonstrated beneficial effects of applying acceptance testing within a Behavioural-Driven Development method. Objectives: In this research, we investigate whether we can quantify the effects various types of testing have on functional suitability, i.e. the software conformance to users’ functional expectations. We explore which combination of software testing (automated and manual, including acceptance testing) should be applied to ensure the expected functional requirements are met, as well as whether the lack of testing during a development iteration causes a significant increase of effort spent fixing the project later on. Method: To answer those questions, we collected and analysed data from a year-long softwareengineering project course. Collected data per sprint included delivered story points, testing coverage metrics, and testing effort as per students work-logs. We combined manual observations and statistical methods, namely Linear Mixed-Effects Modelling, to evaluate the effects of coverage metrics as well as time effort on passed stories over 5 Scrum sprints. Results: The results suggest that a combination of a high code coverage for all of automated unit, acceptance, and manual testing has a significant impact on functional suitability. Similarly, but to a lower extent, front-end unit testing and manual testing can predict the success of a software delivery when taken independently. However, students time work-logs do not show statistically significant relationship between the time efforts and neither of the number of user stories delivered, nor the time spent fixing their software product in the following sprint. We observed
Prior strategies for scaling microservices encompassed various techniques, including diverse processing approaches and mathematical models. However, these methodologies often exhibited limitations in predictive accura...
详细信息
ISBN:
(数字)9798350370249
ISBN:
(纸本)9798350370270
Prior strategies for scaling microservices encompassed various techniques, including diverse processing approaches and mathematical models. However, these methodologies often exhibited limitations in predictive accuracy and management complexity. This study employs Reinforcement Learning as an innovative alternative, particularly the Double Deep Q-Networks Algorithm. This approach autonomously monitors and evaluates essential scaling parameters, promptly triggering on-site actions when warranted. It adeptly balances the dual aspects of environment exploitation and exploration, optimizing computational resource usage while enhancing cost-effectiveness. Empirical evaluations substantiate the superiority of this approach in dynamically scaling cloud services with precision and resource optimization. By integrating LSTM and RNN predictive capabilities with Reinforcement Learning, this research contributes to efficient cloud resource management, a vital facet of contemporary cloud computing paradigms.
Image translation for change detection or classification in bi-temporal remote sensing images is unique. Although it can acquire paired images, it is still unsupervised. Moreover, strict semantic preservation in trans...
详细信息
With the rapid development of artificial intelligence, a wide variety of deep learning models have emerged across various fields. Nevertheless, the quality of these models varies significantly, making the effective ev...
详细信息
In large-scale engineering experiments, such as hydrodynamics and aerodynamics experiments, computer aided software (CAE) is always used to manage a large number of parameters and experimental data to simulate the phy...
详细信息
Selfish mining attacks pose a significant and ongoing security threat to blockchain networks, including major platforms like Bitcoin and Ethereum. Understanding and effectively countering these attacks is crucial for ...
详细信息
ISBN:
(数字)9798350365658
ISBN:
(纸本)9798350365665
Selfish mining attacks pose a significant and ongoing security threat to blockchain networks, including major platforms like Bitcoin and Ethereum. Understanding and effectively countering these attacks is crucial for maintaining the stability and integrity of these networks. This attack strategy involves a miner or a group of miners seeking to gain an advantage by delaying the immediate broadcasting of their mined blocks to the network. The selfish miners potentially mine more blocks in secret, increasing their rewards at the expense of other miners and the stability of the blockchain. Research has mainly focused on detecting this attack by analyzing data related to blocks and forks. This paper presents a new approach to efficiently detect selfish mining attacks in large-scale networks by analyzing various network indicators. To achieve this, we simulate a Bitcoin network and generate a dataset consisting of several features of individual miners and the overall network. We select the most reliable indicators by analyzing network features and reducing feature dimensions. Then, we employ random forest classification (RFC) to classify benign and selfish network behaviors. This approach not only achieves enhanced accuracy (99.96%), surpassing state-of-the-art methods utilizing deep learning, but also significantly reduces computational, storage, and temporal complexities. In doing so, it fortifies blockchain security more efficiently and accurately.
Parkinson's disease (PD) profoundly impacts millions in Sri Lanka, emphasizing the importance of early detection for better patient outcomes. We introduce 'NeuraTrace PD,' an innovative application for ear...
详细信息
暂无评论