Cuckoo Search (CS) stands as a highly efficient meta-heuristic optimization algorithm. Existing literature showcases the ability of CS in multi-objective scenarios, delineated by the three fundamental rules. However, ...
详细信息
Urban congestion has been a known problem since the first urban revolution throughout the world. Today's major metropolises are synonymous with traffic congestion and complicated urban circulation. This paper intr...
详细信息
The message-passing mechanism of graph convolutional networks (i.e., GCNs) enables label information to be propagated to a broader range of neighbors, thereby increasing the utilization of labels. However, the label i...
详细信息
This paper proposes a novel approach for the design of stabilizing sliding manifolds for linear systems affected by model uncertainties and external disturbances. In classical sliding mode control approaches, rejectin...
详细信息
ISBN:
(数字)9783907144107
ISBN:
(纸本)9798331540920
This paper proposes a novel approach for the design of stabilizing sliding manifolds for linear systems affected by model uncertainties and external disturbances. In classical sliding mode control approaches, rejecting model uncertainties and external disturbances often relies on designing a dis-continuous control law with a suitable gain. Specifically, the greater the uncertainty, the larger the control gain. However, this approach might be detrimental to the plant. Instead, the proposed technique deals with this problem by focusing on the design of a suitable sliding manifold, where stability is guaranteed despite model uncertainties. This approach exhibits several benefits such as not needing any further identification process and designing a smaller control gain.
Integration processes involve Business Constraints and Service Level Agreements that, with current technology, are not monitored or enforced automatically at run–time. This approach leaves the participants with no me...
详细信息
Self-healing systems depend on following a set of predefined instructions to recover from a known failure state. Failure states are generally detected based on domain specific specialized metrics. Failure fixes are ap...
详细信息
Self-healing systems depend on following a set of predefined instructions to recover from a known failure state. Failure states are generally detected based on domain specific specialized metrics. Failure fixes are applied at predefined application hooks that are not sufficiently expressive to manage different failure types. Self-healing is usually applied in the context of distributed systems, where the detection of failures is constrained to communication problems, and resolution strategies often consist of replacing complete components. However, current complex systems may reach failure states at a fine granularity not anticipated by developers (for example, value range changes for data streaming in IoT systems), making them unsuitable for existing self-healing techniques. To counter these problems, in this paper we propose a new self-healing framework that learns recovery strategies for healing fine-grained system behavior at run time. Our proposal targets complex reactive systems, defining monitors as predicates specifying satisfiability conditions of system properties. Such monitors are functionally expressive and can be defined at run time to detect failure states at any execution point. Once failure states are detected, we use a Reinforcement Learning-based technique to learn a recovery strategy based on users’ corrective sequences. Finally, to execute the learned strategies, we extract them as Context-oriented Programming variations that activate dynamically whenever the failure state is detected, overwriting the base system behavior with the recovery strategy for that state. We validate the feasibility and effectiveness of our framework through a prototypical reactive application for tracking mouse movements, and the DeltaIoT exemplar for self-healing systems. Our results demonstrate that with just the definition of monitors, the system is effective in detecting and recovering from failures between 55% - 92% of the cases in the first application, and at pa
Software testing is an essential activity for developing and maintaining high-quality software. Unit testing with test code (test cases) is a fundamental testing activity, and developers can test their production code...
Software testing is an essential activity for developing and maintaining high-quality software. Unit testing with test code (test cases) is a fundamental testing activity, and developers can test their production code whenever they create or modify the code. However, such quality assurance relies on the correctness of the test code. If a test code had a flaw, it would mislead the developers about the hidden faults and prevent early detection of the faults. This paper focuses on "test smells," which may cause test code flaws in Python programs, and analyzes their changing trends over commit history (code changes) toward better Python test code management. Through an empirical data analysis of 100 open-source projects, the paper reports the following findings: (1) a few kinds of test smells constitute the majority of smells detected in the studied projects, and (2) most kinds of smells tend to increase over commits, i.e., many test smells are likely to have remained in test code as technical debt.
The traditional job recruitment process is time consuming and also undergoes certain difficulties such as data privacy, lack of transparency, and inefficient credential verification. These difficulties lead to mistrus...
详细信息
ISBN:
(数字)9798331539948
ISBN:
(纸本)9798331539955
The traditional job recruitment process is time consuming and also undergoes certain difficulties such as data privacy, lack of transparency, and inefficient credential verification. These difficulties lead to mistrust and also delay the process of hiring. There is a need for improvement in this process that could benefit both the companies and the job applicants. In this paper, a decentralized recruitment platform based on blockchain technology is proposed. This proposed technique will overcome the above-mentioned difficulties by ensuring secure, transparent, and efficient connections between the recruitment companies and the prospective candidates. This solution uses the merits of blockchain i.e., immutability and automation to record job postings, applications, and hiring decisions on an immutable ledger, protecting personal data with cryptographic techniques and automating qualification verification with smart contracts. By implementing the decentralization concepts in Job recruitment, it is proven that the transparency in the interview process is improved by $\mathbf{9 0 \%}$ and fraud risks are reduced considerably. Moreover, the efficiency of the entire job recruitment process is improved largely. Thus, the decentralized solution proposed in this paper demonstrates its potential in revolutionizing the job recruitment process by providing a secure, transparent and efficient hiring ecosystem
Precise polyp segmentation is vital for the early diagnosis and prevention of colorectal cancer (CRC) in clinical practice. However, due to scale variation and blurry polyp boundaries, it is still a challenging task t...
详细信息
Recent advancements in Artificial Intelligence (AI) and the proliferation of the Internet of Things (loT) and mobile devices have generated enormous data volumes, necessitating advanced data processing closer to data ...
详细信息
ISBN:
(数字)9798350354119
ISBN:
(纸本)9798350354126
Recent advancements in Artificial Intelligence (AI) and the proliferation of the Internet of Things (loT) and mobile devices have generated enormous data volumes, necessitating advanced data processing closer to data sources through edge computing to enhance efficiency and reduce latency. Nonetheless, privacy concerns in cloud storage and data transmission, alongside the inadequacy of traditional privacy protections, have highlighted the vulnerability to sophisticated data breaches. This paper offers a survey on edge computing, emphasizing privacy and security challenges, evaluating threats, and exploring solutions to promote the development of secure, robust and privacy-preserving edge computing frameworks.
暂无评论