Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi...
详细信息
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and *** of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’*** goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO *** projects belong to OSMO vendors,having offices in developing countries while providing services to developed *** the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed *** proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden *** results express that the suggested model has gained a notable recognition rate in comparison to any previous *** current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment.
The authors propose a distributed field mapping algorithm that drives a team of robots to explore and learn an unknown scalar field using a Gaussian Process(GP).The authors’strategy arises by balancing exploration ob...
详细信息
The authors propose a distributed field mapping algorithm that drives a team of robots to explore and learn an unknown scalar field using a Gaussian Process(GP).The authors’strategy arises by balancing exploration objectives between areas of high error and high *** computing high error regions is impossible since the scalar field is unknown,a bio-inspired approach known as Speeding-Up and Slowing-Down is leveraged to track the gradient of the GP *** approach achieves global field-learning convergence and is shown to be resistant to poor hyperparameter tuning of the *** approach is validated in simulations and experiments using 2D wheeled robots and 2D flying mini-ature autonomous blimps.
The timely identification of mental health issues enables experts to more effectively provide treatment and enhance the well-being of patients. Mental health pertains to an individual’s emotional, mental, and interpe...
详细信息
This research aims to develop a new approach to increase the safety and reliability of Autonomous Vehicle (AV) through the proposed risk assessment framework, supported by the trust evaluation approach derived from a ...
详细信息
The Bézier curves submitted by Pierre Bézier in the mid-1950s are splendid differential geometric structures. The paper compares a mechanical–theoretical curve (classical-conventional) with a computer-based...
详细信息
This paper put forward an embedded scheme to execute image watermarking in light of the discrete wavelet transform (DWT), singular value decomposition (SVD) and Charge System Search (CSS) method. In the proposed schem...
详细信息
One of the drastically growing and emerging research areas used in most information technology industries is Bigdata *** is created from social websites like Facebook,WhatsApp,Twitter,*** about products,persons,initia...
详细信息
One of the drastically growing and emerging research areas used in most information technology industries is Bigdata *** is created from social websites like Facebook,WhatsApp,Twitter,*** about products,persons,initiatives,political issues,research achievements,and entertainment are discussed on social *** unique data analytics method cannot be applied to various social websites since the data formats are *** approaches,techniques,and tools have been used for big data analytics,opinion mining,or sentiment analysis,but the accuracy is yet to be *** proposed work is motivated to do sentiment analysis on Twitter data for cloth products using Simulated Annealing incorporated with the Multiclass Support Vector Machine(SA-MSVM)***-MSVM is a hybrid heuristic approach for selecting and classifying text-based sentimental words following the Natural Language Processing(NLP)process applied on tweets extracted from the Twitter dataset.A simulated annealing algorithm searches for relevant features and selects and identifies sentimental terms that customers ***-MSVM is implemented,experimented with MATLAB,and the results are *** results concluded that SA-MSVM has more potential in sentiment analysis and classification than the existing Support Vector Machine(SVM)***-MSVM has obtained 96.34%accuracy in classifying the product review compared with the existing systems.
The integration of Artificial Intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbo...
详细信息
The integration of Artificial Intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbon emissions as mobile technology continues to progress. Generative AI (GAI) possesses significant potential to mitigate carbon emissions associated with AIoT, owing to its higher reasoning and generative powers. Conventional security protocols frequently encounter issues with computational efficiency, latency, and overall security comprehensiveness. Blockchain technology, characterized by its decentralized and immutable properties, is a viable approach for improving electronic healthcare data transmission and node authentication in IoT networks. This research examines secure data transmission and node encryption in IoT systems, with a particular emphasis on data management. Conventional approaches encounter constraints in computational efficiency, latency, and comprehensive security. This study presents a novel protocol that combines GAI and blockchain technology with quantum encryption to enhance authentication and ensure secure data transmission. The algorithm comprises multiple consecutive processes, including the encoding and transmission of node requests, followed by the authentication process utilizing hash functions and digital signatures. The authentication approach utilizes a challenge-response technique, guaranteeing that only nodes with authentic credentials can advance. Thereafter, a dynamic key exchange protocol and quantum encryption method provide secure data delivery. The results indicate the procedure’s effectiveness in ensuring secure and regulated access to patient data, underscoring its significance in medical facilities. The system’s functionalities are augmented by a thorough evaluation employing machine learning. The findings indicate that the system exhibits an accuracy of 99.4%, precision of 99.10%, recall of 98.66%, F1-score of
The BART model is an advanced adaptation of transformers introduced by Facebook. It has incorporated elements from both BERT and GPT transformers, enabling significant advancements in language understanding and genera...
详细信息
Ultra-Wideband (UWB) technology has emerged as an emerging solution for a variety of applications in clinical establishments., offering significant advantages such as precise localization capabilities., high data rate...
详细信息
暂无评论