Pairwise testing, which requires that every combination of valid values of each pair of system factors be covered by at lease one test case, plays an important role in software testing since many faults are caused by ...
详细信息
Pairwise testing, which requires that every combination of valid values of each pair of system factors be covered by at lease one test case, plays an important role in software testing since many faults are caused by unexpected 2-way interactions among system factors. Although meta-heuristic strategies like simulated annealing can generally discover smaller pairwise test suite, they may cost more time to perform search, compared with greedy algorithms. We propose a new method, improved Extremal Optimization (EO) based on the Bak-Sneppen (BS) model of biological evolution, for constructing pairwise test suites and define fitness function according to the requirement of improved EO. Experimental results show that improved EO gives similar size of resulting pairwise test suite and yields an 85% reduction in solution time over SA.
Radio frequency identification (RFID) is a technology where a reader device can "sense" the presence of a close by object by reading a tag device attached to the object. To guarantee the coverage quality, mu...
详细信息
It is not trivial to tune the swarm behavior just by parameter setting because of the randomness, complexity and dynamic involved in particle swarm optimizer (PSO). Hundreds of variants in the literature of last decad...
详细信息
The deep two-stream architecture [23] exhibited excellent performance on video based action recognition. The most computationally expensive step in this approach comes from the calculation of optical flow which preven...
详细信息
ISBN:
(纸本)9781467388511
The deep two-stream architecture [23] exhibited excellent performance on video based action recognition. The most computationally expensive step in this approach comes from the calculation of optical flow which prevents it to be real-time. This paper accelerates this architecture by replacing optical flow with motion vector which can be obtained directly from compressed videos without extra calculation. However, motion vector lacks fine structures, and contains noisy and inaccurate motion patterns, leading to the evident degradation of recognition performance. Our key insight for relieving this problem is that optical flow and motion vector are inherent correlated. Transferring the knowledge learned with optical flow CNN to motion vector CNN can significantly boost the performance of the latter. Specifically, we introduce three strategies for this, initialization transfer, supervision transfer and their combination. Experimental results show that our method achieves comparable recognition performance to the state-of-the-art, while our method can process 390.7 frames per second, which is 27 times faster than the original two-stream method.
Road boundary detection and tracking is an important and integral function in advanced driver-assistance system. This paper proposes an algorithm, which can follow multi-kinds of lane, straight and curved, quickly and...
详细信息
Cloud computing is a recently developed new technology for complex systems with massive service sharing, which is different from the resource sharing of the grid computingsystems. In a cloud environment, service requ...
详细信息
To deal with the discrepancy between global and local objectives in the federated learning invoked by the non-independent, identically distributed (non-IID) data and mitigate the impact of catastrophic forgetting in t...
详细信息
This paper presents a method to detect vehicles from a moving camera. The detection component involves a cascade of modules. First, motion estimation of singular points in video sequences is used to detect moving vehi...
详细信息
Top-n recommendation technology has recently received a lot of attention in information service community. In this paper, we study the problem of top-n recommendation under the cloud data. Firstly, we propose a multil...
详细信息
With the development of the Internet, a lot of people trapped in the network, especially the adolescent depending on the network game and disturbing their normal life. 579 freshmen participated in this work who were c...
详细信息
ISBN:
(纸本)9781509040940
With the development of the Internet, a lot of people trapped in the network, especially the adolescent depending on the network game and disturbing their normal life. 579 freshmen participated in this work who were collected the personality questionnaires in the first week they came in university and their grades points average (GPA) after half year. The questionnaires were including Self-Control (SCS), Barratt impulse Inventory (BIS) and Chinese Big Five Personality (CBF). This work used multi-clustering algorithms to construct the models of predicting for Internet game disorder (IGD) risk, including FCM, K-means, and Hierarchical for training model. This is the first try to predict the risk of IGD by personality traits. The results shown the questionnaire data were well separated by different clustering algorithms into three groups who were shared the analogous personality traits which has a relationship with the behavior of IGD. But compared to the GPA of each group, the efficiency of the prediction model seems not so satisfactory. There need more efforts to optimized the model in the future.
暂无评论