Software defect prediction technology mainly relies on machine learning algorithm to learn the measurement data of existing software. There is some redundant data in the measurement element of software defect, which w...
详细信息
ISBN:
(数字)9781728140346
ISBN:
(纸本)9781728140353
Software defect prediction technology mainly relies on machine learning algorithm to learn the measurement data of existing software. There is some redundant data in the measurement element of software defect, which will reduce the accuracy of machine learning algorithm. This paper proposes a software defect prediction model based on ***, the dimension reduction pretreatment of software defect data sets is carried ***, This paper using support vector machines for *** accuracy of the model can be improved by keeping global features in the selection of the dimension reduction ***, the kernel principal component analysis (KPCA) algorithm was selected for dimensionality reduction. For the selection of classification algorithm, this paper considering that the defect prediction data set has small samples and non-linear characteristics, the support vector machine has better advantages in this kind of data set, so SVM is selected as the *** order to verify the performance of this model, this paper adopts the NASA MDP data set which is widely used in the field of software defect *** paper use the CM1, JM1, PC1 and KC1 dataset to contrast KPCA -SVM model with a single SVM and LLE - SVM. This paper proved that KPCA - SVM model can better solve the problem of data redundancy of defect prediction data *** can keep the global characteristics, and can have better prediction precision.
Geo-spatial ontologies can provide a formal description of concepts, relationships, activities, features and rules in GIS domain. However, simply use them only allows to partially solve semantic conflicts, and does no...
详细信息
The development of PMSM is inseparable from the continuous improvement of the performance-to-price ratio of permanent magnet materials and the development of power electronic equipment. This is exactly the study of PM...
详细信息
The development of PMSM is inseparable from the continuous improvement of the performance-to-price ratio of permanent magnet materials and the development of power electronic equipment. This is exactly the study of PMSM. Entered a new stage, PMSM plays an important role in military, industry and daily life. Dating vector control theory to the field of PMSM speed regulation is also a major breakthrough. Researchers combined the mathematical model of PMSM with the vector control model. It is based on this that the PMSM vector control double closed-loop model was established. Simulate in MATLAB software. There are current module, speed module and PMSM main module in the simulation diagram, and then analyze the simulation results.
Multi-view clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multi-view clustering...
详细信息
Multi-view clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multi-view clustering methods. Missing instances may make these methods difficult to use directly, and noises will lead to unreliable clustering results. In this paper, we propose a novel Auto-weighted Noisy and Incomplete Multi-view Clustering approach (ANIMC) via a soft auto-weighted strategy and a doubly soft regular regression model. Firstly, by designing adaptive semi-regularized nonnegative matrix factorization (adaptive semi-RNMF), the soft auto-weighted strategy assigns a proper weight to each view and adds a soft boundary to balance the influence of noises and incompleteness. Secondly, by proposing θ-norm, the doubly soft regularized regression model adjusts the sparsity of our model by choosing different θ. Compared with previous methods, ANIMC has three unique advantages: 1) it is a soft algorithm to adjust our approach in different scenarios, thereby improving its generalization ability;2) it automatically learns a proper weight for each view, thereby reducing the influence of noises;3) it performs doubly soft regularized regression that aligns the same instances in different views, thereby decreasing the impact of missing instances. Extensive experimental results demonstrate its superior advantages over other state-of-the-art methods. Impact Statement-As an effective method to process data from multiple sources, multi-view clustering has attracted more and more attention. However, most previous works ignore missing instances and noises in original multi-view data, which limits the applications of these works. By a soft approach, our proposed ANIMC can effectively reduce the negative influence of missing instances and noises. Moreover, ANIMC outperforms the stateof- the-art works by about 20% in representative cases. With satisfactory performance on multiple rea
Several special properties of Smart and Vercauteren’s encryption scheme are put *** are all based on the special parameter,which is a recommended modulus *** properties not only show that the secret key is deduced fr...
详细信息
Several special properties of Smart and Vercauteren’s encryption scheme are put *** are all based on the special parameter,which is a recommended modulus *** properties not only show that the secret key is deduced from an N-dimensional vector into its any entry,but also produce the triplet(grade-i reduced plaintext space,grade-i reduced ciphertext space,grade-i reduced secret key) for each i,where grade-i reduced secret key can decrypt grade-i reduced ciphertexts and can be efficiently computed from grade-i delegated *** the same time,sequentially grade-(i + 1)delegated key can be efficiently computed from grade-i delegated *** work also discusses a sequential computation in opposite direction,i.e.,computing grade-i delegated key from grade-(i + 1) delegated *** the sequential computation in the opposite direction is difficult except at most the first steps of such sequential *** on the properties given,we then propose a simple hierarchical encryption scheme with relatively small key and ciphertext sizes.
Ghost imaging incorporating deep learning technology has recently attracted much attention in the optical imaging field. However, deterministic illumination and multiple exposure are still essential in most scenarios....
详细信息
The deadline effect and threshold effect are common in product development and group buying. We consider these two effects also exist in crowdfunding, affecting the crowdfunding performance in the future. We conduct a...
详细信息
The deadline effect and threshold effect are common in product development and group buying. We consider these two effects also exist in crowdfunding, affecting the crowdfunding performance in the future. We conduct an empirical study using a dataset from *** to examine these two effects and their interactive relationship on the following crowdfunding performance. We find the threshold effect exists in crowdfunding and has a positive influence on the following contribution behaviour. The deadline effect also can stimulate the crowdfunding behaviour via limited fundraising time. Furthermore, we find the threshold effect and deadline effect are complements that increase the amount pledged.
Opinion Mining (OM) of Internet reviews is one of the key issues in Natural Language Processing (NLP) field. This paper proposes a stacked Bi-LSTM aspect opinion extraction model in which semantic and syntactic featur...
详细信息
To lower communication complexity, a Certificateless homomorphic encryption(CLHE) scheme based on the Learning with errors(LWE) problem is constructed by introducing a new technique called probabilistic encoding with ...
详细信息
To lower communication complexity, a Certificateless homomorphic encryption(CLHE) scheme based on the Learning with errors(LWE) problem is constructed by introducing a new technique called probabilistic encoding with weakly homomorphic property. This technique can conveniently convert an intended message into two elements in a ring, which will be respectively encrypted under both public keys of a user in certificateless *** knowing both elements simultaneously, the original message can be easily recovered. It is hidden perfectly by the probabilistic property of encoding. This CLHE removes evaluation keys by using the approximate eigenvector method given by Gentry et al., which makes it into a pure CLHE. It is proven to be semantic secure in the Random oracle model(ROM). The results indicate it is able to homomorphically evaluate any functions in a class functions with given multiplicative depth L.
暂无评论