Working with design patterns made significant progress towards the goal of improving the quality of software production. One of the major issues confronting used design pattern is the appropriate selection for them. H...
详细信息
ISBN:
(纸本)9780889869431
Working with design patterns made significant progress towards the goal of improving the quality of software production. One of the major issues confronting used design pattern is the appropriate selection for them. However, developers of experienced are able to choose the occasion design patterns for a given problem effectively;unluckily, are difficult task for inexperienced. Thus, there several tools for help choose of pattern. In this paper presents our attempt to use agent technology to enhance assistant the developers to selecting fits design pattern that need to solve their problem. This study focused on the improving the process of pattern selection through proposing an architecture Design Pattern Selection (DPS) based on Multi-Agent System (MAS) supports to obtain the appropriate recommendation.
Due to the proliferation of touch screen devices, both technical and non-technical users are increasingly using these devices including the older adults. Interaction with input devices while on the go is increasing an...
详细信息
Generative deep learning models are able to create realistic audio and video. This technology has been used to impersonate the faces and voices of individuals. These "deepfakes"are being used to spread misin...
详细信息
Deep learning has proven itself to be an incredible asset to the medical community. However, with offensive AI, the technology can be turned against medical community;adversarial samples can be used to cause misdiagno...
详细信息
The accurate identification of smart meter(SM)fault types is crucial for enhancing the efficiency of operationand maintenance(O&M)and the reliability of power ***,the intelligent classification of SM fault typesfa...
详细信息
The accurate identification of smart meter(SM)fault types is crucial for enhancing the efficiency of operationand maintenance(O&M)and the reliability of power ***,the intelligent classification of SM fault typesfaces significant challenges owing to the complexity of featuresand the imbalance between fault *** address these issues,this study presents a fault diagnosis method for SM incorporatingthree distinct *** first module employs acombination of standardization,data imputation,and featureextraction to enhance the data quality,thereby facilitating improvedtraining and learning by the *** enhance theclassification performance,the data imputation method considersfeature correlation measurement and sequential imputation,and the feature extractor utilizes the discriminative enhancedsparse *** tackle the interclass imbalance of datawith discrete and continuous features,the second module introducesan assisted classifier generative adversarial network,which includes a discrete feature generation ***,anovel Stacking ensemble classifier for SM fault diagnosis is *** contrast to previous studies,we construct a two-layerheuristic optimization framework to address the synchronousdynamic optimization problem of the combinations and hyperparametersof the Stacking ensemble classifier,enabling betterhandling of complex classification tasks using SM *** proposedfault diagnosis method for SM via two-layer stacking ensembleoptimization and data augmentation is trained and validatedusing SM fault data collected from 2010 to 2018 in Zhejiang Province,*** results demonstrate the effectivenessof the proposed method in improving the accuracyof SM fault diagnosis,particularly for minority classes.
In this paper we present TangiWheel, a collection manipulation widget for tabletop displays. Our implementation is flexible, allowing either multi-touch or interaction, or even a hybrid scheme to better suit user choi...
详细信息
In this paper we present TangiWheel, a collection manipulation widget for tabletop displays. Our implementation is flexible, allowing either multi-touch or interaction, or even a hybrid scheme to better suit user choice and convenience. Different TangiWheel aspects and features are compared with other existing widgets for collection manipulation. The study reveals that TangiWheel is the first proposal to support a hybrid input modality with large resemblance levels between touch and tangible interaction styles. Several experiments were conducted to evaluate the techniques used in each input scheme for a better understanding of tangible surface interfaces in complex tasks performed by a single user (e.g., involving a typical master-slave exploration pattern). The results show that tangibles perform significantly better than fingers, despite dealing with a greater number of interactions, in situations that require a large number of acquisitions and basic manipulation tasks such as establishing location and orientation. However, when users have to perform multiple exploration and selection operations that do not require previous basic manipulation tasks, for instance when collections are fixed in the interface layout, touch input is significantly better in terms of required time and number of actions. Finally, when a more elastic collection layout or more complex additional insertion or displacement operations are needed, the hybrid and tangible approaches clearly outperform finger-based interactions.
A number of researchers make efforts to examine the nature of user bug reporting, tracking, assignment policy, reward systems, and make recommendations for selecting the right combinations for an organization. These r...
详细信息
A number of researchers make efforts to examine the nature of user bug reporting, tracking, assignment policy, reward systems, and make recommendations for selecting the right combinations for an organization. These researchers suggest that tools, such as open source Bugzilla detect-tracking system can be helpful in collecting and analyzing error reports. A more effective bug classification system is needed to reduce bug-report duplication and assist in error-assignment. It has been observed that each of the bug-repair assignment has specific advantages, disadvantages, and effects on customer or user perceptions. Random bug assignment is one of the approaches that distributes bug workload to maintainers and better predicts the time required to close bug reports. The clustering policy is another approach that groups errors by their behavior, aiming to reduce effort when related bugs have the same cause.
An empirical study of high-speed software development practices was conducted in US companies. Fast development, along with low cost and high quality has formed a tripartite tension among softwareengineering goals. T...
详细信息
An empirical study of high-speed software development practices was conducted in US companies. Fast development, along with low cost and high quality has formed a tripartite tension among softwareengineering goals. The detailed case studies of Internet software development were reviewed in 10 companies and then knowledge was synthesized on best practice for quality and agility. Agile methodologies, including Extreme Programming and Scrum are found increasing in the software development field. Some of the problems identified in high speed software development, include demands of time-to-market compression, insufficient programmer productivity, ambiguous requirements, fluid requirements, lack of design time and experience, and changing environment. The solutions to the problems identified, include parallel development and frequent releases, greater reliance on tools and reusable components, production prototyping, customer implantation, multitiered architecture and emphasis on acquiring the right expertise and tailored methodology.
Nowadays, access control to Web pages relay mostly on identification and authentication. After successful authentication, however, subsequent access may not necessarily be performed by the same user. Aimed at separati...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
Nowadays, access control to Web pages relay mostly on identification and authentication. After successful authentication, however, subsequent access may not necessarily be performed by the same user. Aimed at separating identity authentication and behavior authentication in open network environments, this paper proposes an access control method based on the analysis of user behavior in Web browsing as an additional access control mechanism to traditional identity authentication. The paper provides the definition of user behavior, uses browsing time and navigated path to determine the normality of user behavior based on the result of comparing the value calculated using a proposed algorithm with a threshold, thus modeling user behavior in both temporal and spatial dimensions. The proposed method relies on a database that contains the frequency of previous access to the path by the same user. Experiment shows that the proposed method can detect abnormal behavior while adapting to continuous changes in user behavior and can thus be used to prevent the theft of user accounts to improve network security.
Context-aware systems keep on emerging in all of our daily activities. Context, which can be a location, a user, an actual activity, or physical conditions, plays a major role in such systems. Actually, everything we ...
详细信息
暂无评论