Fault-proneness of a software module is the probability that the module contains faults. A correlation exists between the fault-proneness of the software and the measurable attributes of the code(i.e. the static metri...
详细信息
Fault-proneness of a software module is the probability that the module contains faults. A correlation exists between the fault-proneness of the software and the measurable attributes of the code(i.e. the static metrics) and of the testing(i.e. the dynamic metrics). Early detection of fault-prone software components enables verification experts to concentrate their time and resources on the problem areas of the software system under development. Among various clustering techniques available in literature K-means clustering approach is most widely being used. This paper introduces K-means based Clustering approach for software finding the fault proneness of the Object-Oriented systems. The contribution of this paper is that it has used metric values of JEdit open source software for generation of the rules for the categorization of software modules in the categories of Faulty and non faulty modules and thereafter empirically validation is performed. The results are measured in terms of accuracy of prediction, probability of Detection and Probability of False Alarms.
The Trivial association rule mining which should be fixed in order to avoid both that early trivial rules is retained and also that interesting rules are not *** fact the situations which use the relative comparison t...
详细信息
The Trivial association rule mining which should be fixed in order to avoid both that early trivial rules is retained and also that interesting rules are not *** fact the situations which use the relative comparison to express association rules are more complete than the situations that generate association rules that use the absolute *** traditional concept of association rule mining will lose some information in generating association *** user does have to determine the degree of support and confidence thresholds before generating association *** our paper,we proposed new approach in finding association *** new approach uses the concept of rough set theory and Bayesian network classification to generate association *** provides a way for decision maker to get more information to generate association rules than traditional *** new approach for revving association rules has the ability to handle the certainty in the classifying process so that we can reduceinformation loss and enhance the result of data *** new algorithm can simulate the value of probability which is based on continuous data set.
The field of mobile Ad hoc Networks(mANETs) has gained an important part of the interest of researchers and become very popular in last few *** can operate without fixed infrastructure and can survive rapid changes in...
详细信息
The field of mobile Ad hoc Networks(mANETs) has gained an important part of the interest of researchers and become very popular in last few *** can operate without fixed infrastructure and can survive rapid changes in the network *** Hoc wireless networks have their own unique nature of distributed resources,dynamic topology and mobile device has routing *** the recent year variety of existing routing protocol have been tested and compare in various research *** a previous comparative performance study between omnidirectional and directional antennas for DSR(on-demand routing protocol) using simulation with OPNET,by using directional antennas,substantial gain is achieved in terms of end-to-end delay,aggregate throughput average,average data packets dropped,packet delivery ratio,and routing overhead[12].In this paper we analysis the DSDV,DSR and AODV routing protocol on the basis of shared media interface with Omni-directional *** using the shared media interface we substantial gain is achieved in terms of TCP,UDP packet comparison,end to end delay,throughput,routing packets,packet delivery *** use ns-2 simulator for *** our simulation we generate the similar test traffic and node mobility pattern for all routing protocol.
Computation of real numbers has been a challenging task for many years. Because of its unique nature of infinity, it is considered as a very good area of research. This paper tries to convey the nature of the real num...
详细信息
Computation of real numbers has been a challenging task for many years. Because of its unique nature of infinity, it is considered as a very good area of research. This paper tries to convey the nature of the real numbers and the difficulty to compute them i.e. to approximate the value and some respective development processes related to the real numbers. While making a general calculation the approximation can go on and on, this still doesn't give the exact value. computer system's memory is finite. Goal is to approximate the real numbers but the problem arises where to stop and which basis they are subjected for approximation on. [ABSTRACT FROm AUTHOR]
multiple types of networks are evolving with different radio technologies(RATs) which are having different capabilities,price and performance *** these networks are collocated with each other and when mobile devices r...
详细信息
multiple types of networks are evolving with different radio technologies(RATs) which are having different capabilities,price and performance *** these networks are collocated with each other and when mobile devices roam around across these networks,a heterogeneous network access is *** mobile device is equipped with multiple interfaces to access all types of networks of heterogeneous *** interfaces can be included in the mobile device by using separate hardware and software *** mobile user always wanted to be Always Best Connected(ABC) as per its requirements and availability in a given *** the mobile user leaves and joins the networks,a handover operation is *** Handover operation is used to achieve seamless *** operation is of two types,one is in between the same RAT and the other is in between the different *** seamless and smooth handover operations across heterogeneous networks, IEEE has defined a standard named as IEEE *** paper presents a novel vertical handover scheme applicable for IEEE 802.11(WLAN) and Universal mobile Telecommunication System(UmTS) based on IEEE 802.21. UmTS is a 3GPP(Third Generation Partnership Project) technology,which is being used in cellular *** is a LAN technology which supports smaller coverage area than the cellular *** handover between these two is needed because they have different RAT.
<正>Energy is one of the most important metric when we talk about mobile ad-hoc *** order to increase the system’s life-time,energy consumption has to be minimized. Here we will look at some energy saving *** initi...
详细信息
<正>Energy is one of the most important metric when we talk about mobile ad-hoc *** order to increase the system’s life-time,energy consumption has to be minimized. Here we will look at some energy saving *** initial analysis tells us that LECA conserves more energy than SPAN or any other *** present a Localized Energy Conservation Algorithm(LECA)[3]for routing in mobile Adhoc Networks(mANETs),to reduce energy consumption while being able to maintain performance *** LECA a small subset of nodes,called coordinators,is selected to participate in routing while the others are put off to conserve *** number of coordinators selected is lower than the corresponding number in the existing *** makes it possible for the network to attain high performance levels although a sparse set of coordinators are elected to reduce energy consumption to the bare minimum,we proposed a localized algorithm for conservation of energy in mANETs, without compromising the system *** algorithm presented here(LECA) selects minimum number of coordinators which constitute a connected backbone.
The paper proposes a new approach to fuzzy abduction by extending the contraposition rule of propositional logic. The main difficulty of fuzzy abduction is due to the restriction of single antecedent clause in a fuzzy...
详细信息
The paper proposes a new approach to fuzzy abduction by extending the contraposition rule of propositional logic. The main difficulty of fuzzy abduction is due to the restriction of single antecedent clause in a fuzzy production rule. When more than one antecedent clause occurs jointly in a fuzzy rule, the membership value of the derived antecedent clauses become equal, which should not be the case in general. The paper overcomes this problem and demonstrates a simple but elegant method to compute premises in a multi-chained reasoning system.
作者:
BOHm, SELHAKEEm, AKHACHICHA, mDepartment of Electrical and Computer Engineering
Concordia University 1455 De Maisonneuve Blvd. West Montreal H3A 1M8 Canada Was born in Montreal
Canada on 14 September 1966. He received the B. Eng. degree in electrical engineering from Concordia University Montreal Canada in 1989. He is at present completing the M.A.Sc. degree in electrical engineering at Concordia University. (S'75–S'79–M'79–SM'86) received the Ph.D. degree from Southern Methodist University
Dallas TX in 1979. He spent the next two years working as a Visiting Professor in Egypt after which he moved to Ottawa Canada in 1982. He assumed teaching and research positions in Carleton and Manitoba Univerities and later moved to Concordia University Montreal Canada in 1983 where he is now a Professor in the Electrical and Computer Engineering Department. He has published numerous papers in IEEE and international journals in the areas of spread spectrum and networking. He is a well-known expert in these areas and serves as a consultant to many companies. His current research interests include wide-band metropolitan networks switching architectures and performance of on-board multibeam satellites acquisitionless CDMA networks code distribution and orthogonalization of CDMA signals responsive congestion control for ATM-based networks ARQ techniques and investigation of the novel SUGAR CDMA systems in fading channels. Dr. Elhakeem is a Senior Member of the Canadian Electrical Engineering Society and Armed Forces Association. He has chaired numerous technical sessions in IEEE Conferences was the Technical Program Chairman for IEEE Montech 1986 Montreal Canada. Dr. Elhakeem is the key guest editor of theIEEE Journal of Selected Areas in Communicationsfor the May June issues 1993 covering CDMA networks. Advanced Technology & Networks
VISTAR Telecommunications Inc. Ottawa Ontario K1G 3J4 Canada An Associate Director of Advanced Technology & Networks Group
VISTAR Telecommunications Inc. Ottawa Canada. He is also an Adjunct Pr
In this paper, we study the performance of a prioritized on-board baseband switch in conjunction with a multibeam satellite handling integrated services. The services considered for the analysis include voice, video, ...
详细信息
In this paper, we study the performance of a prioritized on-board baseband switch in conjunction with a multibeam satellite handling integrated services. The services considered for the analysis include voice, video, file transfer and interactive data. The prioritized switch uses both input and output buffering, switch speed-up as well as a two-phase head-of-line resolution algorithm, in order to reduce the buffer loss while maintaining acceptable user delays. The minimum required buffer capacity and switch speed-up for each service in a prioritized environment are found under uniform traffic conditions. It is shown that under uniform traffic conditions, only minimal buffering and switch speed-up are needed even for the lowest priority users. The performance dependence on the switch size is also substantially reduced with head of line resolution and buffering even in a prioritized environment.
暂无评论