The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The semi-formal language UML has become a standard notation for describing analysis and design models of complex software systems. But it's difficult to be verified formally. In order to solve this problem, a method to translate the UML models to the Event-B models has been proposed. The specific research is on the translation of the use case diagram and sequence diagram in UML. In the use case diagram,...
In the stock market, return reversal happens when investors sell overbought stocks and buy oversold stocks, making the trends of the stocks' prices reverse. While existing studies mainly focused on developing theories to explain the cause of return reversal, we aim at predicting return reversal by proposing a two-stage method in this paper. In the first stage, we employ dynamical Bayesian factor graph...
Many software companies are introducing the CMMI and managing a Quality Management Office (QMO) to strengthen organizational capacity and improve organizational processes. But, some of them are usually unable to make effective operation of a QMO. This is because quality management processes has been defined based on the process requirements only without considering the correlation between the SPs...
With the widespread use of internet technology, the online behaviors become a more and more important part in human's daily lives. Knowing the time of user's next action in online activities is quite valuable for improving online services, which prompts us to wonder whether the time of user's next online activity is predictable? In this paper, we study the predictability of action time for human online...
The dynamic ultra-dense cellular network is a kind of networks with high system capacity and fast-changing resource management, and it is a potential solution for the 5G network. In view of small cell architecture, we put forward a wireless heterogeneous network design with the idea of soft defined networking (SDN). The heterogeneous network (HetNet) contains macro base stations, virtual nodes, a...
The fact that Singular Value Decomposition(SVD) algorithm can be used to reduce dimension and remove noise with good scalability and accuracy makes it been widely adopted in recommendation systems. However, the valuable association information between user-user, item-item are neglected in traditional SVD. Therefore, we proposed a new extended SVD algorithm, named USVD in this paper to improve the...
The rapid development and popularization of the Internet of Things (IoT) have brought great data exchanging and storage needs. Conventional cloud platforms can hardly satisfy with nonhomologous application scenarios in the IoT. In order to deal with the information isolation problems between nonhomologous devices, this paper proposes a Distributed and Embedded Cloud Storage (DECS) scheme. It defines...
Performance and fairness are two important factors for Hadoop cluster. Many previous studies either focus on the improvement of performance or fairness solely, and most of which are based on the first generation of hadoop(MRvl). However, few studies consider the tradeoff between the performance and the fairness on Hadoop YARN, the second generation of hadoop(MRv2). In this paper, we propose a new...
This paper proposes the methodology for improving the performance of the classification model, over several methods. The accuracy values obtained through experiments permit the evaluation of each method's performance. We propose a concept that brings Ensemble learning to model classification, in order to improve performance through majority voting, called M-Ensemble learning. The improved Ensemble...
Dynamic community detection has been an attractive topic due to its ability to reveal the evolutionary trends over time. However, existing dynamic community detection algorithms suffer from several disadvantages. Some make strong assumptions about the generation of communities, or require priori knowledge. In this paper, we propose a novel algorithm, dynamic Louvain method, to detect communities in...
In this paper, the problem of false traceroute links caused by load balancing is analysed and formulated. To solve this problem, the authors proposed a novel reliable assumption called the Last Link Assumption based on a fact that neglected by most researchers. The limitations of proposed assumption is analysed and presented. Then, the authors proposed an effective probing algorithm called the Last...
This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication...
Design by Contract (DbC) is a software engineering paradigm that aims to reduce the amount of source code in a computer program by avoiding redundant parameter checking. It is based on strict interface specifications, including the specification of responsibilities for checking. Although DbC potentially leads to better quality programs, it has to be supported by the programming language/environment...
Software testing is performed with the major intent of detecting errors and bugs in the software. It helps to analyze the stability, reliability and quality of the software which can be accomplished by suitable number of test data. In this paper, we propose an approach for automated test case generation process that aids in the generation of the test cases, using a control flow graph. We specifically...
This paper presents a restructuring approach to relocating web page composition from servers to browsers for Java web applications. The objective is to reduce redundant manipulation and transfer of code/data that are shared by web pages. The reduction is carried out through a restructuring algorithm, effectively keeping consistency between source and target applications from the perspective of the...
Sentiment classification is widely used in some areas, such as product reviews, movie reviews, and micro-blogging reviews. Sentiment classification method is mainly bag of words model, Naive Bayes and Support Vector Machine. In recent years, the machine learning method represented by support vector machine (SVM) is widely used in the field of sentiment classification. There are more and more experiments...
Recent studies have been concentrated on comparison of forwarding ability in multiple dimensions among different high-speed packet processing frameworks, such as PF_RING and DPDK on the whole where transmitting and receiving impact each other, without enough study on frameworks' ability for receiving or transmitting separately. Characteristics of multithreading is another hot spot as multi-core platforms...
User requirements for software development are getting more complicated and are changing all the time. Not only should the requirements engineering process be well-organized but requirements change management should also be effective, especially for complex systems. However, the software engineering methodology employed can also make requirements change difficult to manage. Object-oriented software...
The prediction of no-reflow phenomenon aroused much attention, because of its independent association with increased in-hospital mortality, malignant arrhythmias, and cardiac failure. Many studies on prediction of no-reflow were carried out focusing on only few predictors. As big data era has been coming, high-dimensional predictors are available for prediction. However, as a common problem, big data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.