Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features

    Qazi Mazhar ul Haq1, Fahim Arif2,3, Khursheed Aurangzeb4, Noor ul Ain3, Javed Ali Khan5, Saddaf Rubab6, Muhammad Shahid Anwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4379-4397, 2024, DOI:10.32604/cmc.2024.047172

    Abstract Software project outcomes heavily depend on natural language requirements, often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements. Researchers are exploring machine learning to predict software bugs, but a more precise and general approach is needed. Accurate bug prediction is crucial for software evolution and user training, prompting an investigation into deep and ensemble learning methods. However, these studies are not generalized and efficient when extended to other datasets. Therefore, this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification problems. The methods involved feature selection, which is used to… More >

  • Open Access

    PROCEEDINGS

    A Process Simulation Model of Oil and Gas Gathering System for Digital Requirements

    Jie Chen1, Wei Wang1,*, Wenyuan Sun1, Yuming He1, Shunchen Miu1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.25, No.4, pp. 1-1, 2023, DOI:10.32604/icces.2022.08801

    Abstract Characteristic parameters of oil and gas gathering system (OGGS), such as the liquid holdup, flow rate and pressure of wells, fluctuate dynamically during the production cycle. Furthermore, with the call for energy transition and digitalization, it is critical to grasp the operation status of OGGS in real time. A generalized process simulation model for multi-phase gathering system was established by coupling several models (mass balance, pressure balance, hydraulic and thermal model of a single pipe, power and thermal equipment model, etc.). Because the hydraulic equation of the pipe contains nonlinear terms, the hydraulic model of pipe was linearized, and the… More >

  • Open Access

    ARTICLE

    Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

    Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Alwan Ahmed Abdulrahman Alwan, Shankar Karuppayah*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3375-3398, 2023, DOI:10.32604/cmc.2023.036587

    Abstract The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet). The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer (P2P) networks. The P2P botnets leverage the privileges of the decentralized nature of P2P networks. Consequently, the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures. Some P2P botnets are smarter to be stealthy in their Command-and-Control mechanisms (C2) and elude the standard discovery mechanisms. Therefore, the other side of this cyberwar is the monitor. The P2P botnet monitoring is an exacting mission… More >

  • Open Access

    ARTICLE

    Empirical Analysis of Software Success Rate Forecasting During Requirement Engineering Processes

    Muhammad Hasnain1, Imran Ghani2, Seung Ryul Jeong3,*, Muhammad Fermi Pasha4, Sardar Usman5, Anjum Abbas6

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 783-799, 2023, DOI:10.32604/cmc.2023.030162

    Abstract Forecasting on success or failure of software has become an interesting and, in fact, an essential task in the software development industry. In order to explore the latest data on successes and failures, this research focused on certain questions such as is early phase of the software development life cycle better than later phases in predicting software success and avoiding high rework? What human factors contribute to success or failure of a software? What software practices are used by the industry practitioners to achieve high quality of software in their day-to-day work? In order to conduct this empirical analysis a… More >

  • Open Access

    ARTICLE

    Detecting and Repairing Data-Flow Errors in WFD-net Systems

    Fang Zhao1, Dongming Xiang2,*, Guanjun Liu1, Changjun Jiang1, Honghao Zhu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1337-1363, 2022, DOI:10.32604/cmes.2022.018872

    Abstract Workflow system has become a standard solution for managing a complex business process. How to guarantee its correctness is a key requirement. Many methods only focus on the control-flow verification, while they neglect the modeling and checking of data-flows. Although some studies are presented to repair the data-flow errors, they do not consider the effect of delete operations or weak circulation relations on the repairing results. What's more, repairing some data-flow errors may bring in new errors. In order to solve these problems, we use workflow net with data (WFD-net) systems to model and analyze a workflow system. Based on… More >

  • Open Access

    ARTICLE

    Requirements Engineering: Conflict Detection Automation Using Machine Learning

    Hatim Elhassan1, Mohammed Abaker1, Abdelzahir Abdelmaboud2, Mohammed Burhanur Rehman1,*

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 259-273, 2022, DOI:10.32604/iasc.2022.023750

    Abstract The research community has well recognized the importance of requirement elicitation. Recent research has shown the continuous decreasing success rate of IS projects in the last five years due to the complexity of the requirement conflict refinement process. Requirement conflict is at the heart of requirement elicitation. It is also considered the prime reason for deciding the success or failure of the intended Information System (IS) project. This paper introduces the requirements conflict detection automation model based on the Mean shift clustering unsupervised machine learning model. It utilizes the advantages of Artificial Intelligence in detecting and classifying the requirement conflicts… More >

  • Open Access

    ARTICLE

    Graphical Transformation of OWL Ontologies to Event-B Formal Models

    Eman H. Alkhammash*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3733-3750, 2022, DOI:10.32604/cmc.2022.015987

    Abstract Formal methods use mathematical models to develop systems. Ontologies are formal specifications that provide reusable domain knowledge representations. Ontologies have been successfully used in several data-driven applications, including data analysis. However, the creation of formal models from informal requirements demands skill and effort. Ambiguity, inconsistency, imprecision, and incompleteness are major problems in informal requirements. To solve these problems, it is necessary to have methods and approaches for supporting the mapping of requirements to formal specifications. The purpose of this paper is to present an approach that addresses this challenge by using the Web Ontology Language (OWL) to construct Event-B formal… More >

  • Open Access

    ARTICLE

    Intelligent Identification and Resolution of Software Requirement Conflicts: Assessment and Evaluation

    Maysoon Aldekhail1, Marwah Almasri2,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 469-489, 2022, DOI:10.32604/csse.2022.018269

    Abstract Considerable research has demonstrated how effective requirements engineering is critical for the success of software projects. Requirements engineering has been established and recognized as one of the most important aspects of software engineering as of late. It is noteworthy to mention that requirement consistency is a critical factor in project success, and conflicts in requirements lead to waste of cost, time, and effort. A considerable number of research studies have shown the risks and problems caused by working with requirements that are in conflict with other requirements. These risks include running overtime or over budget, which may lead to project… More >

  • Open Access

    ARTICLE

    Effective Hybrid Content-Based Collaborative Filtering Approach for Requirements Engineering

    Qusai Y. Shambour*, Abdelrahman H. Hussein, Qasem M. Kharma, Mosleh M. Abualhaj

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 113-125, 2022, DOI:10.32604/csse.2022.017221

    Abstract Requirements engineering (RE) is among the most valuable and critical processes in software development. The quality of this process significantly affects the success of a software project. An important step in RE is requirements elicitation, which involves collecting project-related requirements from different sources. Repositories of reusable requirements are typically important sources of an increasing number of reusable software requirements. However, the process of searching such repositories to collect valuable project-related requirements is time-consuming and difficult to perform accurately. Recommender systems have been widely recognized as an effective solution to such problem. Accordingly, this study proposes an effective hybrid content-based collaborative… More >

  • Open Access

    ARTICLE

    Towards a Dynamic Virtual IoT Network Based on User Requirements

    Faisal Mehmood1, Shabir Ahmad2,3, Israr Ullah1, Faisal Jamil1, DoHyeun Kim1,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2231-2244, 2021, DOI:10.32604/cmc.2021.017528

    Abstract The data being generated by the Internet of Things needs to be stored, monitored, and analyzed for maximum IoT resource utilization. Software Defined Networking has been extensively utilized to address issues such as heterogeneity and scalability. However, for small-scale IoT application, sometimes it is considered an inefficient approach. This paper proposes an alternate lightweight mechanism to the design and implementation of a dynamic virtual network based on user requirements. The key idea is to provide users a virtual interface that enables them to reconfigure the communication flow between the sensors and actuators at runtime. The throughput of the communication flow… More >

Displaying 1-10 on page 1 of 22. Per Page