Automation software need to be continuously updated by addressing software bugs contained in their ***,bugs have different levels of importance;hence,it is essential to prioritize bug reports based on their sever-ity ...
详细信息
Automation software need to be continuously updated by addressing software bugs contained in their ***,bugs have different levels of importance;hence,it is essential to prioritize bug reports based on their sever-ity and *** managing the deluge of incoming bug reports faces time and resource constraints from the development team and delays the resolu-tion of critical ***,bug report prioritization is *** study pro-poses a new model for bug prioritization based on average one dependence estimator;it prioritizes bug reports based on severity,which is determined by the number of *** more the number of attributes,the more the *** proposed model is evaluated using precision,recall,F1-Score,accuracy,G-Measure,and Matthew’s correlation *** of the proposed model are compared with those of the support vector machine(SVM)and Naive Bayes(NB)*** and Mozilla datasetswere used as the sources of bug *** proposed model improved the bug repository management and out-performed the SVM and NB ***,the proposed model used a weaker attribute independence supposition than the former models,thereby improving prediction accuracy with minimal computational cost.
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen...
详细信息
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.
In recent times, online shopping is major stream that refers to users for purchasing and also consume along development of internet technology. The user satisfaction is maximized efficiently through performing Sentime...
详细信息
A smart contract is a digital program of transaction protocol(rules of contract)based on the consensus architecture of *** contracts with Blockchain are modern technologies that have gained enormous attention in scien...
详细信息
A smart contract is a digital program of transaction protocol(rules of contract)based on the consensus architecture of *** contracts with Blockchain are modern technologies that have gained enormous attention in scientific and practical applications.A smart contract is the central aspect of a blockchain that facilitates blockchain as a platformoutside the cryptocurrency *** development of blockchain technology,with a focus on smart contracts,has advanced significantly in recent ***,research on the smart contract idea has weaknesses in the implementation sectors based on a decentralized network that shares an identical *** paper extensively reviews smart contracts based on multi-criteria analysis,challenges and ***,implementing blockchain in multicriteria research is required to increase the efficiency of interaction between users via supporting information exchange with high *** blockchain in the multi-criteria analysis is necessary to increase the efficiency of interaction between users via supporting information exchange and with high confidence,detecting malfunctioning,helping users with performance issues,reaching a consensus,deploying distributed solutions and allocating plans,tasks and joint *** smart contract with decision-making performance,planning and execution improves the implementation based on efficiency,sustainability and ***,the uncertainty and supply chain performance lead to improved users’confidence in offering new solutions in exchange for problems in smart *** includes code analysis and performance,while development performance can be under development.
In this article, we present a modified variant of the Dai-Liao spectral conjugate gradient method, developed through an analysis of eigenvalues and inspired by a modified secant condition. We show that the proposed me...
详细信息
Clustering is a method of grouping data based on similarities, and is an unsupervised technique for discovering patterns in data. In this research paper, various clustering algorithms such as k-Means, DBSCAN, Spectral...
详细信息
In India, globalization and reforms in the financial sector have brought about a major overhaul of the financial landscape. The connection between financial markets and the tangible economy is now highly valued in the...
详细信息
Visual object tracking has become a very active research area in recent years. Each year, a growing number of tracking algorithms are proposed. Object detection and tracking is a critical and challenging task in many ...
详细信息
Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from li...
详细信息
Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from limitations such as uncertainty and imprecise data, leading to late-stage diagnoses. To address this, various expert systems have been developed, but many rely on type-1 fuzzy logic and lack mobile-based applications for data collection and feedback to healthcare practitioners. This research investigates the development of an Enhanced Mobile-based Fuzzy Expert system (EMFES) for breast cancer pre-growth prognosis. The study explores the use of type-2 fuzzy logic to enhance accuracy and model uncertainty effectively. Additionally, it evaluates the advantages of employing the python programming language over java for implementation and considers specific risk factors for data collection. The research aims to dynamically generate fuzzy rules, adapting to evolving breast cancer research and patient data. Key research questions focus on the comparative effectiveness of type-2 fuzzy logic, the handling of uncertainty and imprecise data, the integration of mobile-based features, the choice of programming language, and the creation of dynamic fuzzy rules. Furthermore, the study examines the differences between the Mamdani Inference System and the Sugeno Fuzzy Inference method and explores challenges and opportunities in deploying the EMFES on mobile devices. The research identifies a critical gap in existing breast cancer diagnostic systems, emphasizing the need for a comprehensive, mobile-enabled, and adaptable solution by developing an EMFES that leverages Type-2 fuzzy logic, the Sugeno Inference Algorithm, Python Programming, and dynamic fuzzy rule generation. This study seeks to enhance early breast cancer detection and ultimately reduce breast cancer-related mortality.
Orthogonal Matching Pursuit (OMP) has been a powerful method in sparse signal recovery and approximation. However OMP suffers computational issue when the signal has large number of non-zeros. This paper advances OMP ...
详细信息
暂无评论