Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (233)
  • Open Access

    ARTICLE

    A Risk Poker Based Testing Model for Scrum

    Siti Noor Hasanah Ghazali1, Siti Salwah Salim1,*, Irum Inayat2, Siti Hafizah Ab Hamid1

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 169-185, 2018, DOI:10.32604/csse.2018.33.169

    Abstract In agile software development, project estimation often depends on group discussion and expert opinions. Literature claims that group discussion in risk analysis helps to identify some of the crucial issues that might affect development, testing, and implementation. However, risk prioritization often relies on individual expert judgment. Therefore, Risk Poker, a lightweight risk-based testing methodology in which risk analysis is performed through group discussion that outperforms the individual analyst’s estimation is introduced in agile methods. Keeping in view aforementioned benefits Risk Poker can offer, unfortunately, no study has been conducted to empirically prove its ability to improve the testing process to… More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 149-155, 2018, DOI:10.32604/csse.2018.33.149

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated… More >

  • Open Access

    ARTICLE

    Research on Data Extraction and Analysis of Software Defect in IoT Communication Software

    Wenbin Bi1, Fang Yu2, Ning Cao3, Wei Huo3, Guangsheng Cao4, *, Xiuli Han5, Lili Sun6, Russell Higgs7

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1837-1854, 2020, DOI:10.32604/cmc.2020.010420

    Abstract Software defect feature selection has problems of feature space dimensionality reduction and large search space. This research proposes a defect prediction feature selection framework based on improved shuffled frog leaping algorithm (ISFLA).Using the two-level structure of the framework and the improved hybrid leapfrog algorithm's own advantages, the feature values are sorted, and some features with high correlation are selected to avoid other heuristic algorithms in the defect prediction that are easy to produce local The case where the convergence rate of the optimal or parameter optimization process is relatively slow. The framework improves generalization of predictions of unknown data samples… More >

  • Open Access

    ARTICLE

    Software Defect Prediction Based on Non-Linear Manifold Learning and Hybrid Deep Learning Techniques

    Kun Zhu1, Nana Zhang1, Qing Zhang2, Shi Ying1, *, Xu Wang3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1467-1486, 2020, DOI:10.32604/cmc.2020.011415

    Abstract Software defect prediction plays a very important role in software quality assurance, which aims to inspect as many potentially defect-prone software modules as possible. However, the performance of the prediction model is susceptible to high dimensionality of the dataset that contains irrelevant and redundant features. In addition, software metrics for software defect prediction are almost entirely traditional features compared to the deep semantic feature representation from deep learning techniques. To address these two issues, we propose the following two solutions in this paper: (1) We leverage a novel non-linear manifold learning method - SOINN Landmark Isomap (SLIsomap) to extract the… More >

  • Open Access

    ARTICLE

    Hybrid Architecture for Autonomous Load Balancing in Distributed Systems Based on Smooth Fuzzy Function

    Moazam Ali, Susmit Bagchi*

    Intelligent Automation & Soft Computing, Vol.24, No.4, 2018, DOI:10.31209/2018.100000043

    Abstract Due to the rapid advancements and developments in wide area networks and powerful computational resources, the load balancing mechanisms in distributed systems have gained pervasive applications covering wired as well as mobile distributed systems. In large-scale distributed systems, sharing of distributed resources is required for enhancing overall resource utilization. This paper presents a comprehensive study and detailed comparative analysis of different load balancing algorithms employing fuzzy logic and mobile agents. We have proposed a hybrid architecture for integrated load balancing and monitoring in distributed computing systems employing fuzzy logic and autonomous mobile agents. Furthermore, we have proposed a smooth and… More >

  • Open Access

    ARTICLE

    Software Defect Prediction Based on Stacked Contractive Autoencoder and Multi-Objective Optimization

    Nana Zhang1, Kun Zhu1, Shi Ying1, *, Xu Wang2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 279-308, 2020, DOI:10.32604/cmc.2020.011001

    Abstract Software defect prediction plays an important role in software quality assurance. However, the performance of the prediction model is susceptible to the irrelevant and redundant features. In addition, previous studies mostly regard software defect prediction as a single objective optimization problem, and multi-objective software defect prediction has not been thoroughly investigated. For the above two reasons, we propose the following solutions in this paper: (1) we leverage an advanced deep neural network—Stacked Contractive AutoEncoder (SCAE) to extract the robust deep semantic features from the original defect features, which has stronger discrimination capacity for different classes (defective or non-defective). (2) we… More >

  • Open Access

    ARTICLE

    Software-Defined Space-Air-Ground Integrated Network Architecture with the Multi-Layer Satellite Backbone Network

    Chao Guo1, Cheng Gong2, Juan Guo3, Zhanzhen Wei1, *, Yanyan Han1, Sher Zaman Khan4

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 527-540, 2020, DOI:10.32604/cmc.2020.09788

    Abstract Under the background of the rapid development of ground mobile communication, the advantages of high coverage, survivability, and flexibility of satellite communication provide air support to the construction of space information network. According to the requirements of the future space information communication, a software-defined Space-Air-Ground Integrated network architecture was proposed. It consisted of layered structure satellite backbone network, deep space communication network, the stratosphere communication network and the ground network. The SpaceAir-Ground Integrated network was supported by the satellite backbone network. It provided data relay for the missions such as deep space exploration and controlled the deep-space spacecraft when needed.… More >

  • Open Access

    ARTICLE

    KAEA: A Novel Three-Stage Ensemble Model for Software Defect Prediction

    Nana Zhang1, Kun Zhu1, Shi Ying1, *, Xu Wang2

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 471-499, 2020, DOI:10.32604/cmc.2020.010117

    Abstract Software defect prediction is a research hotspot in the field of software engineering. However, due to the limitations of current machine learning algorithms, we can’t achieve good effect for defect prediction by only using machine learning algorithms. In previous studies, some researchers used extreme learning machine (ELM) to conduct defect prediction. However, the initial weights and biases of the ELM are determined randomly, which reduces the prediction performance of ELM. Motivated by the idea of search based software engineering, we propose a novel software defect prediction model named KAEA based on kernel principal component analysis (KPCA), adaptive genetic algorithm, extreme… More >

  • Open Access

    ARTICLE

    Within-Project and Cross-Project Software Defect Prediction Based on Improved Transfer Naive Bayes Algorithm

    Kun Zhu1, Nana Zhang1, Shi Ying1, *, Xu Wang2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 891-910, 2020, DOI:10.32604/cmc.2020.08096

    Abstract With the continuous expansion of software scale, software update and maintenance have become more and more important. However, frequent software code updates will make the software more likely to introduce new defects. So how to predict the defects quickly and accurately on the software change has become an important problem for software developers. Current defect prediction methods often cannot reflect the feature information of the defect comprehensively, and the detection effect is not ideal enough. Therefore, we propose a novel defect prediction model named ITNB (Improved Transfer Naive Bayes) based on improved transfer Naive Bayesian algorithm in this paper, which… More >

  • Open Access

    ARTICLE

    Expanding Hot Code Path for Data Cleaning on Software Graph

    Guang Sun1, 2, *, Xiaoping Fan1, Wangdong Jiang1, Hangjun Zhou1, Fenghua Li1, Rong Yang1

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 743-753, 2020, DOI:10.32604/cmc.2020.05564

    Abstract Graph analysis can be done at scale by using Spark GraphX which loading data into memory and running graph analysis in parallel. In this way, we should take data out of graph databases and put it into memory. Considering the limitation of memory size, the premise of accelerating graph analytical process reduces the graph data to a suitable size without too much loss of similarity to the original graph. This paper presents our method of data cleaning on the software graph. We use SEQUITUR data compression algorithm to find out hot code path and store it as a whole paths… More >

Displaying 211-220 on page 22 of 233. Per Page