期刊文献+
共找到2,124篇文章
< 1 2 107 >
每页显示 20 50 100
A Feature Selection Method for Software Defect Prediction Based on Improved Beluga Whale Optimization Algorithm
1
作者 Shaoming Qiu Jingjie He +1 位作者 Yan Wang Bicong E 《Computers, Materials & Continua》 2025年第6期4879-4898,共20页
Software defect prediction(SDP)aims to find a reliable method to predict defects in specific software projects and help software engineers allocate limited resources to release high-quality software products.Software ... Software defect prediction(SDP)aims to find a reliable method to predict defects in specific software projects and help software engineers allocate limited resources to release high-quality software products.Software defect prediction can be effectively performed using traditional features,but there are some redundant or irrelevant features in them(the presence or absence of this feature has little effect on the prediction results).These problems can be solved using feature selection.However,existing feature selection methods have shortcomings such as insignificant dimensionality reduction effect and low classification accuracy of the selected optimal feature subset.In order to reduce the impact of these shortcomings,this paper proposes a new feature selection method Cubic TraverseMa Beluga whale optimization algorithm(CTMBWO)based on the improved Beluga whale optimization algorithm(BWO).The goal of this study is to determine how well the CTMBWO can extract the features that are most important for correctly predicting software defects,improve the accuracy of fault prediction,reduce the number of the selected feature and mitigate the risk of overfitting,thereby achieving more efficient resource utilization and better distribution of test workload.The CTMBWO comprises three main stages:preprocessing the dataset,selecting relevant features,and evaluating the classification performance of the model.The novel feature selection method can effectively improve the performance of SDP.This study performs experiments on two software defect datasets(PROMISE,NASA)and shows the method’s classification performance using four detailed evaluation metrics,Accuracy,F1-score,MCC,AUC and Recall.The results indicate that the approach presented in this paper achieves outstanding classification performance on both datasets and has significant improvement over the baseline models. 展开更多
关键词 software defect prediction feature selection beluga optimization algorithm triangular wandering strategy cauchy mutation reverse learning
在线阅读 下载PDF
Architecture design of GPS software receiver and implementation of its acquisition algorithm with fine frequency estimation 被引量:3
2
作者 祝雪芬 陈熙源 李滋刚 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期38-41,共4页
The design of a global positioning system (GPS) software receiver is introduced. This design uses the concept of software radio, and it consists of the following parts: front-end, acquisition, tracking, synchroniza... The design of a global positioning system (GPS) software receiver is introduced. This design uses the concept of software radio, and it consists of the following parts: front-end, acquisition, tracking, synchronization, navigation solution and some assisting modules. In the acquisition module, the acquisition algorithm based on circular correlation is utilized. The input data and the local code are converted into the frequency domain by means of the fast Fourier transform (FFT). After performing circular correlation, the initial phase of the C/A code can be obtained and the cartier frequency can be found in 1 kHz frequency resolution, which is too coarse to use for the tracking loop. In order to improve the frequency resolution, the fine frequency estimation through a phase relationship is then achieved, by which, the frequency resolution is improved dramatically. Experiments show that the inaccuracy of the carrier frequency can be estimated within a few hertz by the fine frequency estimation method, and the fine frequency attained can be directly used for the tracking loop. 展开更多
关键词 GPS software receiver acquisition algorithm circular correlation fine frequency estimation
在线阅读 下载PDF
Quantum Software Engineering: Best Practices from Classical to Quantum Approaches
3
作者 Abdullah Ibrahim S. Alsalman 《Journal of Quantum Information Science》 2024年第4期234-258,共25页
As quantum computing transitions from a theoretical domain to a practical technology, many aspects of established practice in software engineering are being faced with new challenges. Quantum Software Engineering has ... As quantum computing transitions from a theoretical domain to a practical technology, many aspects of established practice in software engineering are being faced with new challenges. Quantum Software Engineering has been developed to address the peculiar needs that arise with quantum systems’ dependable, scalable, and fault-tolerant software development. The present paper critically reviews how traditional software engineering methodologies can be reshaped to fit into the quantum field. This also entails providing some critical contributions: frameworks to integrate classical and quantum systems, new error mitigation techniques, and the development of quantum-specific testing and debugging tools. In this respect, best practices have been recommended to ensure that future quantum software can harness the evolving capabilities of quantum hardware with continued performance, reliability, and scalability. The work is supposed to act as a foundational guide for the researcher and developer as quantum computing approaches widespread scientific and industrial adoption. 展开更多
关键词 Quantum software Engineering Quantum Computing Quantum algorithms Quantum software Development Lifecycle Error Mitigation Classical-Quantum Integration Quantum Debugging Scalable Quantum Systems Fault Tolerant Computing
在线阅读 下载PDF
A Performance Fault Diagnosis Method for SaaS Software Based on GBDT Algorithm 被引量:3
4
作者 Kun Zhu Shi Ying +4 位作者 Nana Zhang Rui Wang Yutong Wu Gongjin Lan Xu Wang 《Computers, Materials & Continua》 SCIE EI 2020年第3期1161-1185,共25页
SaaS software that provides services through cloud platform has been more widely used nowadays.However,when SaaS software is running,it will suffer from performance fault due to factors such as the software structural... SaaS software that provides services through cloud platform has been more widely used nowadays.However,when SaaS software is running,it will suffer from performance fault due to factors such as the software structural design or complex environments.It is a major challenge that how to diagnose software quickly and accurately when the performance fault occurs.For this challenge,we propose a novel performance fault diagnosis method for SaaS software based on GBDT(Gradient Boosting Decision Tree)algorithm.In particular,we leverage the monitoring mean to obtain the performance log and warning log when the SaaS software system runs,and establish the performance fault type set and determine performance log feature.We also perform performance fault type annotation for the performance log combined with the analysis result of the warning log.Moreover,we deal with the incomplete performance log and the type non-equalization problem by using the mean filling for the same type and combination of SMOTE(Synthetic Minority Oversampling Technique)and undersampling methods.Finally,we conduct an empirical study combined with the disaster reduction system deployed on the cloud platform,and it demonstrates that the proposed method has high efficiency and accuracy for the performance diagnosis when SaaS software system runs. 展开更多
关键词 GBDT algorithm SaaS software performance log performance fault diagnosis
在线阅读 下载PDF
Optimizing Software Effort Estimation Models Using Firefly Algorithm 被引量:2
5
作者 Nazeeh Ghatasheh Hossam Faris +1 位作者 Ibrahim Aljarah Rizik M. H. Al-Sayyed 《Journal of Software Engineering and Applications》 2015年第3期133-142,共10页
Software development effort estimation is considered a fundamental task for software development life cycle as well as for managing project cost, time and quality. Therefore, accurate estimation is a substantial facto... Software development effort estimation is considered a fundamental task for software development life cycle as well as for managing project cost, time and quality. Therefore, accurate estimation is a substantial factor in projects success and reducing the risks. In recent years, software effort estimation has received a considerable amount of attention from researchers?and became a challenge for software industry. In the last two decades, many researchers and practitioners proposed statistical and machine learning-based models for software effort estimation. In this work, Firefly Algorithm is proposed as a metaheuristic optimization method for optimizing the parameters of three COCOMO-based models. These models include the basic COCOMO model and other two models proposed in the literature as extensions of the basic COCOMO model. The developed estimation models are evaluated using different evaluation metrics. Experimental results show high accuracy and significant error minimization of Firefly Algorithm over other metaheuristic optimization algorithms including Genetic Algorithms and Particle Swarm Optimization. 展开更多
关键词 software QUALITY EFFORT Estimation METAHEURISTIC Optimization FIREFLY algorithm
在线阅读 下载PDF
Managing Software Testing Technical Debt Using Evolutionary Algorithms 被引量:1
6
作者 Muhammad Abid Jamil Mohamed K.Nour 《Computers, Materials & Continua》 SCIE EI 2022年第10期735-747,共13页
Technical debt(TD)happens when project teams carry out technical decisions in favor of a short-term goal(s)in their projects,whether deliberately or unknowingly.TD must be properly managed to guarantee that its negati... Technical debt(TD)happens when project teams carry out technical decisions in favor of a short-term goal(s)in their projects,whether deliberately or unknowingly.TD must be properly managed to guarantee that its negative implications do not outweigh its advantages.A lot of research has been conducted to show that TD has evolved into a common problem with considerable financial burden.Test technical debt is the technical debt aspect of testing(or test debt).Test debt is a relatively new concept that has piqued the curiosity of the software industry in recent years.In this article,we assume that the organization selects the testing artifacts at the start of every sprint.Implementing the latest features in consideration of expected business value and repaying technical debt are among candidate tasks in terms of the testing process(test cases increments).To gain the maximum benefit for the organization in terms of software testing optimization,there is a need to select the artifacts(i.e.,test cases)with maximum feature coverage within the available resources.The management of testing optimization for large projects is complicated and can also be treated as a multi-objective problem that entails a trade-off between the agile software’s short-term and long-term value.In this article,we implement a multi-objective indicatorbased evolutionary algorithm(IBEA)for fixing such optimization issues.The capability of the algorithm is evidenced by adding it to a real case study of a university registration process. 展开更多
关键词 Technical debt software testing optimization large scale agile projects evolutionary algorithms multiobjective optimization indicatorbased evolutionary algorithm(IBEA) pareto front
在线阅读 下载PDF
A Software Pattern of the Genetic Algorithm ——a Study on Reusable Object Model of Genetic Algorithm
7
作者 Zhuo Shi, Liu Chao, He Ke\|qing School of Computer,Wuhan University, Wuhan 430072, China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期209-217,共9页
The Genetic Algorithm (GA) has been a pop research field, but there is little concern on GA in view of Software Engineering and this result in a series of problems. In this paper, we extract a GA's software patter... The Genetic Algorithm (GA) has been a pop research field, but there is little concern on GA in view of Software Engineering and this result in a series of problems. In this paper, we extract a GA's software pattern, draw a model diagram of the reusable objects, analyze the advantages and disadvantages of the pattern, and give a sample code at the end. We are then able to improve the reusability and expansibility of GA. The results make it easier to program a new GA code by using some existing successful operators, thereby reducing the difficulties and workload of programming a GA's code, and facilitate the GA application. 展开更多
关键词 genetic algorithm software pattern UML
在线阅读 下载PDF
Test Case Generation of Component Software Based on UML Activity Diagram and Genetic Algorithm
8
作者 Yu Song Xinhong Wang 《通讯和计算机(中英文版)》 2011年第6期503-507,共5页
关键词 测试用例生成 UML活动图 组件软件 遗传算法 软件测试 统一建模语言 测试方法 生成方法
在线阅读 下载PDF
Design and realization of synchronization circuit for GPS software receiver based on FPGA 被引量:5
9
作者 Xiaolei Yu Yongrong Sun +1 位作者 Jianye Liu Jianfeng Miao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期20-26,共7页
With research on the carrier phase synchronization and symbol synchronization algorithm of demodulation module, a synchronization circuit system is designed for GPS software receiver based on field programmable gate a... With research on the carrier phase synchronization and symbol synchronization algorithm of demodulation module, a synchronization circuit system is designed for GPS software receiver based on field programmable gate array (FPGA), and a series of experiment is done on the hardware platform. The result shows the all-digital synchronization and demodulation of GPS intermediate frequency (IF) signal can be realized and applied in embedded real-time GPS software receiver system. It is verified that the decision-directed joint tracking algorithm of carrier phase and symbol timing for received signals from GPS is reasonable. In addition, the loop works steadily and can be used for receiving GPS signals using synchronous demodulation. The synchronization circuit for GPS software receiver designed based on FPGA has the features of low cost, miniaturization, low power and real-time. Surely, it will become one of the development directions for GPS and even GNSS embedded real-time software receiver. 展开更多
关键词 software receiver synchronization circuit field programmable gate army GPS joint tracking algorithm.
在线阅读 下载PDF
Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem
10
作者 Mohammad Al-Khatib Wafaa Saif 《Computers, Materials & Continua》 SCIE EI 2022年第3期4847-4865,共19页
The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem i... The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem is compulsory to provide necessary security services.Elliptic curve cryptosystem(ECC)has been introduced as a considerable option.However,the usual sequential implementation of ECC and the standard elliptic curve(EC)form cannot achieve required performance level.Moreover,the widely used Hardware implementation of ECC is costly option and may be not affordable.This research aims to develop a high-performance parallel software implementation for ECC.To achieve this,many experiments were performed to examine several factors affecting ECC performance including the projective coordinates,the scalar multiplication algorithm,the elliptic curve(EC)form,and the parallel implementation.The ECC performance was analyzed using the different factors to tune-up them and select the best choices to increase the speed of the cryptosystem.Experimental results illustrated that parallel Montgomery ECC implementation using homogenous projection achieves the highest performance level,since it scored the shortest time delay for ECC computations.In addition,results showed thatNAF algorithm consumes less time to perform encryption and scalar multiplication operations in comparison withMontgomery ladder and binarymethods.Java multi-threading technique was adopted to implement ECC computations in parallel.The proposed multithreaded Montgomery ECC implementation significantly improves the performance level compared to previously presented parallel and sequential implementations. 展开更多
关键词 Elliptic curve cryptosystem parallel software implementation MULTI-THREADING scalar multiplication algorithms modular arithmetic
在线阅读 下载PDF
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph 被引量:2
11
作者 ZHOU Minmin CHEN Jinfu +4 位作者 LIU Yisong ACKAH-ARTHUR Hilary CHEN Shujie ZHANG Qingchen ZENG Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期149-160,共12页
With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great signific... With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes and maintaining system security and integrity. This paper focuses on detecting three common types of vulnerabilities: Unused_Variable, Use_of_Uninitialized_Variable, and Use_After_ Free. We propose a method for software vulnerability detection based on an improved control flow graph(ICFG) and several predicates of vulnerability properties for each type of vulnerability. We also define a set of grammar rules for analyzing and deriving the three mentioned types of vulnerabilities, and design three vulnerability detection algorithms to guide the process of vulnerability detection. In addition, we conduct cases studies of the three mentioned types of vulnerabilities with real vulnerability program segments from Common Weakness Enumeration(CWE). The results of the studies show that the proposed method can detect the vulnerability in the tested program segments. Finally, we conduct manual analysis and experiments on detecting the three types of vulnerability program segments(30 examples for each type) from CWE, to compare the vulnerability detection effectiveness of the proposed method with that of the existing detection tool Cpp Check. The results show that the proposed method performs better. In summary, the method proposed in this paper has certain feasibility and effectiveness in detecting the three mentioned types of vulnerabilities, and it will also have guiding significance for the detection of other common vulnerabilities. 展开更多
关键词 software SECURITY software VULNERABILITY IMPROVED control FLOW GRAPH VULNERABILITY detection algorithm
原文传递
Automatic software fault localization based on artificial bee colony 被引量:2
12
作者 Linzhi Huang Jun Ai 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第6期1325-1332,共8页
Software debugging accounts for a vast majority of the financial and time costs in software developing and maintenance. Thus, approaches of software fault localization that can help automate the debugging process have... Software debugging accounts for a vast majority of the financial and time costs in software developing and maintenance. Thus, approaches of software fault localization that can help automate the debugging process have become a hot topic in the field of software engineering. Given the great demand for software fault localization, an approach based on the artificial bee colony (ABC) algorithm is proposed to be integrated with other related techniques. In this process, the source program is initially instrumented after analyzing the dependence information. The test case sets are then compiled and run on the instrumented program, and execution results are input to the ABC algorithm. The algorithm can determine the largest fitness value and best food source by calculating the average fitness of the employed bees in the iteralive process. The program unit with the highest suspicion score corresponding to the best test case set is regarded as the final fault localization. Experiments are conducted with the TCAS program in the Siemens suite. Results demonstrate that the proposed fault localization method is effective and efficient. The ABC algorithm can efficiently avoid the local optimum, and ensure the validity of the fault location to a larger extent. 展开更多
关键词 software debugging software fault localization arti-ficial bee colony (ABC) algorithm program instrumentation.
在线阅读 下载PDF
A New Software for GIS Image Pixel Topographic Fac-tors in Remote Sensing Monitoring of Soil Losses 被引量:4
13
作者 TANGWAN-LONG BUZHAO-HONG 《Pedosphere》 SCIE CAS CSCD 1995年第1期67-74,共8页
Based on the new algorithm for GIS image pixel topographic factors in remote sensing monitoring ofsoil losses, a software was developed for microcomputer to carry out computation at a medium river basin(county). This ... Based on the new algorithm for GIS image pixel topographic factors in remote sensing monitoring ofsoil losses, a software was developed for microcomputer to carry out computation at a medium river basin(county). This paper lays its emphasis on algorithmic skills and programming techniques as well as applicationof the software. 展开更多
关键词 algorithmic skills programming techniques remote sensing monitoring software soil losses
在线阅读 下载PDF
Singularity of Some Software Reliability Models and Parameter Estimation Method 被引量:1
14
作者 XU Ren-zuo ZHOU Rui YANG Xiao-qing (State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China) 《Wuhan University Journal of Natural Sciences》 EI CAS 2000年第1期35-40,共6页
According to the principle, “The failure data is the basis of software reliability analysis”, we built a software reliability expert system (SRES) by adopting the artificial intelligence technology. By reasoning out... According to the principle, “The failure data is the basis of software reliability analysis”, we built a software reliability expert system (SRES) by adopting the artificial intelligence technology. By reasoning out the conclusion from the fitting results of failure data of a software project, the SRES can recommend users “the most suitable model” as a software reliability measurement model. We believe that the SRES can overcome the inconsistency in applications of software reliability models well. We report investigation results of singularity and parameter estimation methods of experimental models in SRES. 展开更多
关键词 software reliability measurement models software reliability expert system SINGULARITY parameter estimation method path following method maximum likelihood ML-fitting algorithm
在线阅读 下载PDF
A Creative Approach to Reducing Ambiguity in Scenario-based Software Architecture Analysis 被引量:1
15
作者 Xi-Wen Wu Chen Li +1 位作者 Xuan Wang Hong-Ji Yang 《International Journal of Automation and computing》 EI CSCD 2019年第2期248-260,共13页
In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is ... In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is widely used in various tasks, especially in the design stage of software architectures. Although researchers have proposed various scenario-based approaches to analyse software architecture, there are still limitations in this research field, and a key limitation is that scenarios are typically not formally defined and thus may contain ambiguities. As these ambiguities may lead to defects, it is desirable to reduce them as many as possible. In order to reduce ambiguity in scenario-based software architecture analysis, this paper introduces a creative computing approach to scenario-based software requirements analysis. Our work expands this idea in three directions. Firstly, we extend an architecture description language(ADL)-based language – Breeze/ADL to model the software architecture. Secondly, we use a creative rule – combinational rule(CR) to combine the vector clock algorithm for reducing the ambiguities in modelling scenarios. Then, another creative rule – transformational rule(TR) is employed to help to transform our Breeze/ADL model to a popular model – unified modelling language(UML) model. We implement our approach as a plugin of Breeze, and illustrate a running example of modelling a poetry to music system in our case study.Our results show the proposed creative approach is able to reduce ambiguities of the software architecture in practice. 展开更多
关键词 Creative computing vector clock algorithm scenario-based analysis of software ARCHITECTURE sequence diagram Breeze/ ARCHITECTURE description language (ADL)
原文传递
Identifying Counterexamples Without Variability in Software Product Line Model Checking 被引量:2
16
作者 Ling Ding Hongyan Wan +1 位作者 Luokai Hu Yu Chen 《Computers, Materials & Continua》 SCIE EI 2023年第5期2655-2670,共16页
Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be v... Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be valid for some products but spurious for others.In this paper,we found that spurious products are primarily due to the failure states,which correspond to the spurious counterexamples.The violated products correspond to the real counterexamples.Hence,identifying counterexamples is a critical problem in detecting violated products.In our approach,we obtain the violated products through the genuine counterexamples,which have no failure state,to avoid the tedious computation of identifying spurious products dealt with by the existing algorithm.This can be executed in parallel to improve the efficiency further.Experimental results showthat our approach performswell,varying with the growth of the system scale.By analyzing counterexamples in the abstract model,we observed that spurious products occur in the failure state.The approach helps in identifying whether a counterexample is spurious or genuine.The approach also helps to check whether a failure state exists in the counterexample.The performance evaluation shows that the proposed approach helps significantly in improving the efficiency of abstraction-based SPL model checking. 展开更多
关键词 software product line model checking parallel algorithm
在线阅读 下载PDF
KAEA: A Novel Three-Stage Ensemble Model for Software Defect Prediction 被引量:2
17
作者 Nana Zhang Kun Zhu +1 位作者 Shi Ying Xu Wang 《Computers, Materials & Continua》 SCIE EI 2020年第7期471-499,共29页
Software defect prediction is a research hotspot in the field of software engineering.However,due to the limitations of current machine learning algorithms,we can’t achieve good effect for defect prediction by only u... Software defect prediction is a research hotspot in the field of software engineering.However,due to the limitations of current machine learning algorithms,we can’t achieve good effect for defect prediction by only using machine learning algorithms.In previous studies,some researchers used extreme learning machine(ELM)to conduct defect prediction.However,the initial weights and biases of the ELM are determined randomly,which reduces the prediction performance of ELM.Motivated by the idea of search based software engineering,we propose a novel software defect prediction model named KAEA based on kernel principal component analysis(KPCA),adaptive genetic algorithm,extreme learning machine and Adaboost algorithm,which has three main advantages:(1)KPCA can extract optimal representative features by leveraging a nonlinear mapping function;(2)We leverage adaptive genetic algorithm to optimize the initial weights and biases of ELM,so as to improve the generalization ability and prediction capacity of ELM;(3)We use the Adaboost algorithm to integrate multiple ELM basic predictors optimized by adaptive genetic algorithm into a strong predictor,which can further improve the effect of defect prediction.To effectively evaluate the performance of KAEA,we use eleven datasets from large open source projects,and compare the KAEA with four machine learning basic classifiers,ELM and its three variants.The experimental results show that KAEA is superior to these baseline models in most cases. 展开更多
关键词 software defect prediction KPCA adaptive genetic algorithm extreme learning machine ADABOOST
在线阅读 下载PDF
Multifractal analysis of the software evolution in software networks 被引量:1
18
作者 Meili Liu Xiaogang Qi Hao Pan 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第3期208-215,共8页
As the scale and complexity have been increased in software systems, developers place more emphases on software engineering and system designs. Software architecture is evolved with update of softwares, and it plays a... As the scale and complexity have been increased in software systems, developers place more emphases on software engineering and system designs. Software architecture is evolved with update of softwares, and it plays a fundamental role in determining quality of software systems. Multifractal characteristics of software networks can reflect software quality. In this paper, we construct a software network from the dependencies between object classes, and gain a deep understanding of software through network analysis. To be specific, multifractal analysis of the software network is performed based on a modified box-covering algorithm that yields fewer boxes. We verify that software with different functions and dependencies is multifractal. Further, different versions of the software are compared to discover the evolution of the software architecture. The results show that the singularity of class dependencies decreases as the software is updated. This trend leads to a more specific division of functions between software modules. One of the visible advantages of our work is that it allows the characterization of software structures at the code level. The methodology and results of this paper provide new insights into the evaluation and design of large-scale software systems. 展开更多
关键词 software MULTIFRACTAL box-covering algorithm
原文传递
Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller 被引量:1
19
作者 Mohammad Adnan Aladaileh Mohammed Anbar +2 位作者 Iznan H.Hasbullah Abdullah Ahmed Bahashwan Shadi Al-Sarawn 《Computers, Materials & Continua》 SCIE EI 2022年第10期1403-1416,共14页
The emergence of a new network architecture,known as Software Defined Networking(SDN),in the last two decades has overcome some drawbacks of traditional networks in terms of performance,scalability,reliability,securit... The emergence of a new network architecture,known as Software Defined Networking(SDN),in the last two decades has overcome some drawbacks of traditional networks in terms of performance,scalability,reliability,security,and network management.However,the SDN is vulnerable to security threats that target its controller,such as low-rate Distributed Denial of Service(DDoS)attacks,The low-rate DDoS attack is one of the most prevalent attacks that poses a severe threat to SDN network security because the controller is a vital architecture component.Therefore,there is an urgent need to propose a detection approach for this type of attack with a high detection rate and low false-positive rates.Thus,this paper proposes an approach to detect low-rate DDoS attacks on the SDN controller by adapting a dynamic threshold.The proposed approach has been evaluated using four simulation scenarios covering a combination of low-rate DDoS attacks against the SDN controller involving(i)a single host attack targeting a single victim;(ii)a single host attack targeting multiple victims;(iii)multiple hosts attack targeting a single victim;and(iv)multiple hosts attack targeting multiple victims.The proposed approach’s average detection rates are 96.65%,91.83%,96.17%,and 95.33%for the above scenarios,respectively;and its average false-positive rates are 3.33%,8.17%,3.83%,and 4.67%for similar scenarios,respectively.The comparison between the proposed approach and two existing approaches showed that it outperformed them in both categories. 展开更多
关键词 Attack detection CONTROLLER dynamic threshold entropy algorithm distributed denial of service software defined networking static threshold
在线阅读 下载PDF
A Survey on Software Cost Estimation Techniques 被引量:1
20
作者 Sai Mohan Reddy Chirra Hassan Reza 《Journal of Software Engineering and Applications》 2019年第6期226-248,共23页
The ability to accurately estimate the cost needed to complete a specific project has been a challenge over the past decades. For a successful software project, accurate prediction of the cost, time and effort is a ve... The ability to accurately estimate the cost needed to complete a specific project has been a challenge over the past decades. For a successful software project, accurate prediction of the cost, time and effort is a very much essential task. This paper presents a systematic review of different models used for software cost estimation which includes algorithmic methods, non-algorithmic methods and learning-oriented methods. The models considered in this review include both the traditional and the recent approaches for software cost estimation. The main objective of this paper is to provide an overview of software cost estimation models and summarize their strengths, weakness, accuracy, amount of data needed, and validation techniques used. Our findings show, in general, neural network based models outperforms other cost estimation techniques. However, no one technique fits every problem and we recommend practitioners to search for the model that best fit their needs. 展开更多
关键词 software COST ESTIMATION Classical SCE MODELS algorithmic MODELS Non-algorithmic MODELS LEARNING-ORIENTED COST ESTIMATION TECHNIQUES
暂未订购
上一页 1 2 107 下一页 到第
使用帮助 返回顶部