Most of the search-based software remodularization(SBSR)approaches designed to address the software remodularization problem(SRP)areutilizing only structural information-based coupling and cohesion quality ***,in prac...
详细信息
Most of the search-based software remodularization(SBSR)approaches designed to address the software remodularization problem(SRP)areutilizing only structural information-based coupling and cohesion quality ***,in practice apart from these quality criteria,there require other aspects of coupling and cohesion quality criteria such as lexical and changed-history in designing the modules of the software ***,consideration of limited aspects of software information in the SBSR may generate a sub-optimal modularization ***,such modularization can be good from the quality metrics perspective but may not be acceptable to the *** produce a remodularization solution acceptable from both quality metrics and developers’perspectives,this paper exploited more dimensions of software information to define the quality criteria as modularization ***,these objectives are simultaneously optimized using a tailored manyobjective artificial bee colony(MaABC)to produce a remodularization *** assess the effectiveness of the proposed approach,we applied it over five software *** obtained remodularization solutions are evaluated with the software quality metrics and developers view of *** demonstrate that the proposed software remodularization is an effective approach for generating good quality modularization solutions.
In Taiwan, the current electricity prices for residential users remain relatively low. This results in a diminished incentive for these users to invest in energy-saving improvements. Consequently, devising strategies ...
详细信息
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)*** are critical for emerging wireless services,especially for applications with limited *** attacks p...
详细信息
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)*** are critical for emerging wireless services,especially for applications with limited *** attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their *** attacks require intelligent analytics before processing service *** denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed *** attacks generate massive traffic that overwhelms the victim’s network,disrupting normal *** consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional *** centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this *** preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)*** implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to *** authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS *** results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment.
E-healthcare has significantly improved healthcare services and overall health by utilizing digital technologies such as the internet, computers, and mobile devices. However, secure communication channels play a criti...
详细信息
Fog computing is an emerging paradigm that provides services near the end-user. The tremendous increase in IoT devices and big data leads to complexity in fog resource allocation. Inefficient resource allocation can l...
详细信息
Neural network-based encoder and decoder are one of the emerging techniques for image compression. To improve the compression rate, these models use a special module called the quantizer that improves the entropy of t...
详细信息
Cloud computing has drastically changed the delivery and consumption of live streaming *** designs,challenges,and possible uses of cloud computing for live streaming are studied.A comprehensive overview of the technic...
详细信息
Cloud computing has drastically changed the delivery and consumption of live streaming *** designs,challenges,and possible uses of cloud computing for live streaming are studied.A comprehensive overview of the technical and business issues surrounding cloudbased live streaming is provided,including the benefits of cloud computing,the various live streaming architectures,and the challenges that live streaming service providers face in delivering high‐quality,real‐time *** different techniques used to improve the performance of video streaming,such as adaptive bit‐rate streaming,multicast distribution,and edge computing are discussed and the necessity of low‐latency and high‐quality video transmission in cloud‐based live streaming is *** such as improving user experience and live streaming service performance using cutting‐edge technology,like artificial intelligence and machine learning are *** addition,the legal and regulatory implications of cloud‐based live streaming,including issues with network neutrality,data privacy,and content moderation are *** future of cloud computing for live streaming is examined in the section that follows,and it looks at the most likely new developments in terms of trends and *** technology vendors,live streaming service providers,and regulators,the findings have major policy‐relevant *** on how stakeholders should address these concerns and take advantage of the potential presented by this rapidly evolving sector,as well as insights into the key challenges and opportunities associated with cloud‐based live streaming are provided.
The rapid advancement of technology has given rise to medical cyber-physical systems (MCPS), a subset of cyber-physical systems (CPS) specifically tailored for patient care and healthcare providers. MCPS generate subs...
详细信息
The growing realm of blockchain technology has captivated researchers and practitioners alike with its promise of decentralized, secure, and transparent transactions. This paper presents a comprehensive survey and ana...
详细信息
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict th...
详细信息
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict their utility ***,besides the cost of the physical assets and network resources,such scaling may also imposemore loads on the electricity power grids to feed the added nodes with the required energy to run and cool,which comes with extra costs ***,those CDNproviders who utilize their resources better can certainly afford their services at lower price-units when compared to others who simply choose the scaling *** utilization is a quite challenging process;indeed,clients of CDNs usually tend to exaggerate their true resource requirements when they lease their *** providers are committed to their clients with Service Level Agreements(SLAs).Therefore,any amendment to the resource allocations needs to be approved by the clients *** this work,we propose deploying a Stackelberg leadership framework to formulate a negotiation game between the cloud service providers and their client *** this,the providers seek to retrieve those leased unused resources from their *** is not expected from the clients,and they may ask high price units to return their extra resources to the provider’s ***,to motivate cooperation in such a non-cooperative game,as an extension to theVickery auctions,we developed an incentive-compatible pricingmodel for the returned ***,we also proposed building a behavior belief function that shapes the way of negotiation and compensation for each *** to other benchmark models,the assessment results showthat our proposed models provide for timely negotiation schemes,allowing for better resource utilization rates,higher utilities,and grid-friend CDNs.
暂无评论