The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The mining of software repositories has provided significant advances in a multitude of software engineering fields, including defect prediction. Several studies show that the performance of a software engineering technology (e.g., prediction model) differs across different project repositories. Thus, it is important that the project selection is replicable. The aim of this paper is to present STRESS,...
Commit comments increasingly receive attention as an important complementary component in code change comprehension. To address the comment scarcity issue, a variety of automatic approaches for commit comment generation have been intensively proposed. However, most of these approaches mechanically outline a superficial level summary of the changed software entities, the change intent behind the code...
For a non-Gaussian process, a kernel principal component analysis that is applied to handle a Gaussian process is used to calculate a whitening matrix using the conventional kernel independent component analysis (KICA). Some errors exist as the orthogonal matrix is calculated by negentropy, which is an approximate method. In this paper, a kernel-independence-criterion-based independent component analysis...
Based on the development and application of on-board subsystem test bench for current CTCS-3 system, this paper focuses on the approach of automatically generation of test sequence, takes the existing test sequences of ETCS-2 (European Train Control system level 2) as the train set existing relatively mature test sequence as the training set, to execute association rule mining. The whole data mining...
To diagnose the specific reasons that lead to deterioration of controller performance and improve the diagnostic accuracy, a performance diagnosis method based on eigenvector subspace K-mean clustering is proposed. Firstly, the number of standard deterioration performance subspace with different degrees of deterioration information is increased on the basis of the eigenvector subspace distance diagnosis...
Each commit in repositories of version control systems should include code changes for only a single task. However, in real repositories, there are many commits for multiple tasks and tasks split into multiple commits. We call the latter split commits. In this research, we firstly investigate how many and what kinds of split commits are included in repositories. Then, we classify the found split commits...
Deep cone thickener control problem is a key point of Tailings paste fill (TSF). This paper presents a new method to extract inherent and practical parameters of the thickener, and determine control strategy based on thickening process data mining. Bypassing difficulty in deep cone thickener modeling, the proposed method could obtain practical control rules, also has good adaptability to different...
Goal: Classification of information technologies to support decision-making in the engineering and control systems. Method: systematic analysis of the types and methods of transformation of the information, including registration, storage, processing and presentation of information. Result and conclusions: It was shown that a variety of technologies are used for the engineering and control from human-computer...
The approach to the solution of the technical diagnostics problem of a transport data transmission network (TDTN) is presented, which allows to work with different groups of diagnostic data depending on the requirements by the time the task is completed, which in turn will allow reducing the average time of realization of the network diagnosis process; takes into account the physical and logical structures...
There is an emerging requirement in all modern Command & Control, Surveillance Systems for focusing on the capability of ‘Data Analysis’, besides ‘Data Processing’. This means that the modern Command & Control Information Systems are required to be capable of understanding each piece of huge data they receive, interpreting them and extracting the meaningful information for processing and presentation...
With the change of time information related to geography and volunteered geography also changes. In this way extraction of spatial patterns from crowdsourced data has become most valuable for service suppliers. These patterns represent the spatial features of the co-related objects. The existing approaches used Dijkstras algorithm and Euclidean distance to find spatial patterns which can not compute...
Health plays an important role for human happiness and well being. Automatic disease prediction is important to overcome the issues of health seekers. Generally people use Google to search their queries and that search engine respond them with the answer but that answer is in scattered format. User not gets exact answer for his / her queries. So we are going to implement this paper. Here we propose...
From the day internet came into existence, the era of social networking sprouted. In the beginning, no one may have thought internet would be a host of numerous amazing services like the social networking. Today we can say that online applications and social networking websites have become a non separable part of one's life. Many people from diverse age groups spend hours daily on such websites. Despite...
The emerging technology of Software–Defined Networking (SDN) affords a platform and architecture which is dynamic, manageable, cost-effective, and adaptable, making it ideal for many applications that are high-bandwidth and dynamic in nature. As this technology grows and matures, there is a need for cybersecurity applications to be designed, developed and evaluated. In this paper, we propose a development...
Stories about service outages in cloud environments have been making the headlines recently. In many cases, the reliability of cloud infrastructure Application Programming Interfaces (APIs) were at fault. Hence, understanding the factors affecting the reliability of these APIs is important to improve the availability of cloud services. In this study, we mined bugs of 25 modules within the 5 most important...
The article addresses the problem of identifying subtle causal relations between sets of data defining a control system. The key pros and cons of using a fuzzy method are later examined. It explains the primary aspects of the fuzzy model for revealing implicit causality within a control system based on a combination of a fuzzy set approach and data mining techniques. The tool for carrying out evaluation...
It is the vital significance for the strong and smart grid that big data analytics technologies apply in the power system. The multi-source and heterogeneous data integration technology based on big data platform is one of the indispensable content. As there are the problems of data heterogeneity and data islands in the dispatching and control system, a multi-source and heterogeneous data integration...
Power grid dispatching has involved large amount of multi-source heterogeneous data with high complexity, therefore transforming power data into knowledge by data mining is the inevitable trend of intelligent dispatching development. Applying big data technology to power grid dispatching, the analysis model of multi-source heterogeneous data based on big data is built and a frequent itemset mining...
Collaboration in business processes and projects requires a division of responsibilities among the participants. Version control systems allow us to collect profiles of the participants that hint at participants' roles in the collaborative work. The goal of this paper is to automatically classify participants into the roles they fulfill in the collaboration. Two approaches are proposed and compared...
In-spite of the principle of good programming practice which stipulates that a commit should include only modifications belonging to one task, programmers submit tangled commits consisting of modifications related to two or several distinct tasks. Some researches show that between 11 and 39% of bug fix commits are tangled and at least 16.6% of all the commits are incorrectly associated to bug reports...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.