We propose a procedure for applying a teaching-learning methodology, where the student's interest is considered a relevant issue. This procedure is based on: a) resources and material available;b) specific classro...
详细信息
Due to the mobility of the vehicle, the communication link between the vehicle and the edge server changes dynamically in the vehicle edge computing, leading to the increase of task completion time, transmission energ...
详细信息
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t...
详细信息
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize their testing efforts. Previous researches focus on exploring different machine learning algorithms based on the features that encode the characteristics of *** problem of data redundancy exists in software defect data set, which has great influence on prediction *** propose a defect distribution prediction model(Deep belief network prediction model, DBNPM), a system for detecting whether a program module contains defects. The key insight of DBNPM is Deep belief network(DBN)technology, which is an effective deep learning technique in image processing and natural language processing,whose features are similar to defects in source *** results show that DBNPM can efficiently extract and process the data characteristics of source program and the performance is better than Support vector machine(SVM), Locally linear embedding SVM(LLE-SVM), and Neighborhood preserving embedding SVM(NPE-SVM).
With the advances of computer science and technology, the visualization computer technology profoundly affects and changes people's understanding of the traditional visual language and promotes the continuous prog...
详细信息
Many software-related degrees exist, and a diversity of programs makes it difficult for candidates to choose where they wish to study. Selecting the wrong program costs students time, money, and considerable effort. T...
详细信息
Machine Learning (ML)-based Intrusion Detection Systems (IDS) is an effective technology to automatically detect cyber attacks in the Internet of Things (IoT) dependent Industrial Control Systems (ICS). It is faster, ...
详细信息
Many different dynamic routing architectures are available, including sidecar-based routing, routing through a central entity such as an event store or gateway, or architectures with multiple routers. These architectu...
详细信息
ISBN:
(纸本)9781665458146
Many different dynamic routing architectures are available, including sidecar-based routing, routing through a central entity such as an event store or gateway, or architectures with multiple routers. These architectures are currently based on vastly different implementation concepts, such as API Gateways, Message Brokers, or Service Proxies. We propose a new approach that abstracts all these architecture patterns using one Adaptive Dynamic Routers architecture. We hypothesize that a dynamic self-adaptation of the routing architecture is beneficial over any fixed architecture selections for reliability and performance trade-offs. That is, if encountered with traffic and load changes, our approach dynamically self-adapts between more central or distributed routing to optimize system reliability and performance. We evaluate our approach by analyzing our previously-measured data during an experiment of 1200 hours of runtime. Our extensive systematic evaluation with 1089 cases confirms that our hypothesis holds and our approach is beneficial in terms of reliability and performance. Moreover, we empirically validate our results on Google Cloud Platform infrastructure.
The analysis of individual characteristics in this paper refers to analyze the individual characteristics in a certain field to draw the relevant conclusions such as classification, scoring and so on. The main purpose...
详细信息
The analysis of individual characteristics in this paper refers to analyze the individual characteristics in a certain field to draw the relevant conclusions such as classification, scoring and so on. The main purpose of this study is to apply deep learning, trajectory and social network data to enhance the process of individual characteristics analysis. We developed an algorithm for extracting features from trajectory data based on LSTM and an algorithm for retrieving features from social network data based on the network structural characteristics. A series of computational experiments were conducted by employing the features extracted by our algorithms. According the experimental results and the comparisons with some existing classification models, we can conclude that our approach can improve the accuracy of individual feature classification by 5% on average.
This paper presents a study on effectively predicting office building rentals based on the surrounding spatiotemporal data. During the planning, development, and construction stages of an office building, the stakehol...
详细信息
This paper presents a study on effectively predicting office building rentals based on the surrounding spatiotemporal data. During the planning, development, and construction stages of an office building, the stakeholders of the building may have one question to be answered, i.e., what the potential value of the office building *** potential value of office buildings may be hard to be measured directly, however, it can be reflected in the rental after the office is put into operation. An accurate prediction of the office building rental will provide the solid base for the corresponding stakeholders to make business decisions. The rental of office buildings is affected by many factors, such as its location, floors, number of parking spots, the convenience of transportation, as well as the activities of the surrounding business. To support the rental prediction, we collect the datasets from different data sources in Shanghai. The linear regression, the decision tree, and the random forest models are employed in the computational experiments to predict the office building rentals and the most suitable prediction methodology for predicting the office building rental is suggested upon the experiments.
暂无评论