Simultaneous Localization and Mapping (SLAM) equips machines with the capability to map and navigate unfamiliar environments autonomously. By employing sensor fusion, SLAM's precision and dependability are signifi...
详细信息
The area of brain-computer interface research is widely spreading as it has a diverse array of potential applications. Motor imagery classification is a boon to several people with motor impairment. Low accuracy and d...
详细信息
Recent years have seen the rise of big data workflow management solutions as widespread data analytic platforms for handling massive amounts of data in the cloud. However, keeping information private and ensuring the ...
详细信息
Machine learning algorithms face important implementation difficulties due to imbalanced learning since the Synthetic Minority Oversampling Technique (SMOTE) helps improve performance through the creation of new minor...
详细信息
E-commerce has revolutionized the retail landscape, offering consumers unparalleled convenience and a vast array of choices from the comfort of their homes. Enabling e-commerce in native languages is crucial for creat...
详细信息
Lung cancer is the most lethal form of cancer. This paper introduces a novel framework to discern and classify pulmonary disorders such as pneumonia, tuberculosis, and lung cancer by analyzing conventional X-ray and C...
详细信息
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results...
详细信息
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results to mislead the fusion center on channel availability decisions. By using traditional voting rule, the cooperative spectrum sensing performance deteriorates significantly due to incorrect local sensing results. Then, reliability weight strategy becomes the popular solution to avoid incorrect sensing results from BAs and unreliable cognitive radio users (CRUs). However, it is very difficult to detect the attackers since they also occasionally provide correct sensing results to the fusion center for concealing the attack objective. Based on existing techniques, the BAs and CRUs may be assigned with low reliability weights or distinguished from the data fusion account. However, it is very difficult to detect the attackers since they also occasionally provide correct sensing results to the fusion center for concealing the attack objective. Then, existing techniques still suffer from BAs and negative impact of unreliable CRUs. In this paper, we propose the adaptive cooperative quality weight algorithm for mitigating the Byzantine attack issue by distinguishing the BAs and CRUs from the data fusion account while selecting only useful CRUs since the number of members in the account is also the important factor for cooperative spectrum sensing. In our proposed algorithm, we adopt a stable preference ordering towards ideal solution (SPOTIS) for determining the reliability of SUs which shows low computational complexity as compared to other reliability weight-based techniques. To achieve high sensing performance, our global decision threshold is adapted according to the reliability of reliable users. From the simulation results, our proposed algorithm significantly improves global detection probability and total error probability compared to the traditional votin
The life expectancy of a population is a vital measure of its overall health and healthcare quality. This study use machine learning methods, notably XGBoost, to predict life expectancy in industrialized and emerging ...
详细信息
Regression testing of software systems is an important and critical activity but can be expensive and resource-intensive. An approach to enhance its efficiency is Regression Test Selection (RTS), which selectively re-...
详细信息
Regression testing of software systems is an important and critical activity but can be expensive and resource-intensive. An approach to enhance its efficiency is Regression Test Selection (RTS), which selectively re-executes a subset of relevant tests that are impacted by code modifications. Previous studies on static and dynamic RTS for Java software have shown that selecting tests at the class level is more effective than using finer granularities like methods or statements. Nevertheless, RTS at the package level, which is a coarser granularity than class level, has not been thoroughly investigated or evaluated for Java projects. To address this gap, we propose PKRTS, a static package-level RTS approach that utilizes the structural dependencies of the software system under test to construct a package-level dependency graph. PKRTS analyzes dependencies in the graph and identifies relevant tests that can reach modified packages, i.e., packages containing altered classes. In contrast to conventional static RTS techniques, PKRTS implicitly considers dynamic dependencies, such as Java reflection and virtual method calls, among classes belonging to the same package by treating all those classes as a single cohesive node in the dependency graph. We evaluated PKRTS on 885 revisions of 9 open-source Java projects, with its performance compared to Ekstazi, a state-of-the-art dynamic class-level approach, and STARTS, a state-of-the-art static class-level approach. We used Ekstazi as the baseline to measure the safety and precision violations of PKRTS and STARTS. The results indicated that PKRTS outperformed static class-level RTS in terms of safety violation, which measures the extent to which relevant test cases are missed. PKRTS showed an average safety violation of 2.29%, while STARTS recorded 5.94%. Despite this, PKRTS demonstrated lower average precision violation than class-level RTS, as it selected a higher number of irrelevant test cases. The average reduction in te
Background: Cloud services have become a popular approach for offering efficient services for a wide range of activities. Predicting hardware failures in a cloud data center can minimize downtime and make the system m...
详细信息
暂无评论