Int. J. Perform. Eng.最新文献

筛选
英文 中文
Simulation for Target Detection in Polarimetric Scenes 偏振场景中目标检测的仿真
Int. J. Perform. Eng. Pub Date : 2020-08-30 DOI: 10.23940/ijpe.20.08.p18.13101320
Junhua Yue, Yan Li
{"title":"Simulation for Target Detection in Polarimetric Scenes","authors":"Junhua Yue, Yan Li","doi":"10.23940/ijpe.20.08.p18.13101320","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p18.13101320","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114313000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incremental Data Mining-based Software Failure Detection 基于增量数据挖掘的软件故障检测
Int. J. Perform. Eng. Pub Date : 2020-08-30 DOI: 10.23940/ijpe.20.08.p15.12791288
Pan Liu, Wulan Huang
{"title":"Incremental Data Mining-based Software Failure Detection","authors":"Pan Liu, Wulan Huang","doi":"10.23940/ijpe.20.08.p15.12791288","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p15.12791288","url":null,"abstract":"It has been proved by practice that mining weblogs to detect software errors is an effective software testing method. This paper presents a software failure detection method based on the incremental mining weblog strategy and gives data mining steps for the implementation of this method. A case is studied for the proposed test method. In this case, we use Splunk, a data analysis tool, to analyze some weblogs that record some linked information of mobile applications for android. The result of the data analysis shows that the proposed method can effectively detect the software failure problem in the download process of mobile applications. Therefore, the proposed method can be used for software reliability assessment.","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124703837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA 基于SA-SOA优化的BP神经网络网络安全态势预测算法
Int. J. Perform. Eng. Pub Date : 2020-08-30 DOI: 10.23940/ijpe.20.08.p4.11711182
Ran Zhang, Min Liu, Yifeng Yin, Qikun Zhang, Zengyu Cai
{"title":"Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA","authors":"Ran Zhang, Min Liu, Yifeng Yin, Qikun Zhang, Zengyu Cai","doi":"10.23940/ijpe.20.08.p4.11711182","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p4.11711182","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115661890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Estimation of Motion Blurred Direction for Video Monitor Image 视频监控图像运动模糊方向的估计
Int. J. Perform. Eng. Pub Date : 2020-08-30 DOI: 10.23940/ijpe.20.08.p12.12541261
Bei-yi Wang, Xiaohong Zhang, Haibin Wu, Wang Qi, Hu Lijuan
{"title":"Estimation of Motion Blurred Direction for Video Monitor Image","authors":"Bei-yi Wang, Xiaohong Zhang, Haibin Wu, Wang Qi, Hu Lijuan","doi":"10.23940/ijpe.20.08.p12.12541261","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p12.12541261","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperspectral Data Analysis based on Integrated Deep Learning 基于集成深度学习的高光谱数据分析
Int. J. Perform. Eng. Pub Date : 2020-08-30 DOI: 10.23940/ijpe.20.08.p9.12251234
Zhifeng Zhang, Xiao Cui, Pu Li, Jintao Jiang, Xiaohui Ji
{"title":"Hyperspectral Data Analysis based on Integrated Deep Learning","authors":"Zhifeng Zhang, Xiao Cui, Pu Li, Jintao Jiang, Xiaohui Ji","doi":"10.23940/ijpe.20.08.p9.12251234","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p9.12251234","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133866338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual Tracking based on Moving Monocular Camera 基于运动单目摄像机的视觉跟踪
Int. J. Perform. Eng. Pub Date : 2020-08-30 DOI: 10.23940/ijpe.20.08.p8.12151224
Kan Xiu, He Jia, X. Zhenghao
{"title":"Visual Tracking based on Moving Monocular Camera","authors":"Kan Xiu, He Jia, X. Zhenghao","doi":"10.23940/ijpe.20.08.p8.12151224","DOIUrl":"https://doi.org/10.23940/ijpe.20.08.p8.12151224","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Evaluation Method of Network Security Situation using Data Fusion Theory 基于数据融合理论的网络安全态势评估方法
Int. J. Perform. Eng. Pub Date : 2020-07-30 DOI: 10.23940/ijpe.20.07.p7.10461057
Zhongwei Zhao, Yong Peng, Jianhua Huang, Tingting Zhou, Huan Wang
{"title":"An Evaluation Method of Network Security Situation using Data Fusion Theory","authors":"Zhongwei Zhao, Yong Peng, Jianhua Huang, Tingting Zhou, Huan Wang","doi":"10.23940/ijpe.20.07.p7.10461057","DOIUrl":"https://doi.org/10.23940/ijpe.20.07.p7.10461057","url":null,"abstract":"","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123629816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Differential Privacy Spatial Decomposition via Flattening Kd-Tree 基于平坦化Kd-Tree的差分隐私空间分解
Int. J. Perform. Eng. Pub Date : 2020-07-30 DOI: 10.23940/ijpe.20.07.p8.10581066
Guoqiang Gong, Cedric Lessoy, Chuan Lu, Ke Lv
{"title":"Differential Privacy Spatial Decomposition via Flattening Kd-Tree","authors":"Guoqiang Gong, Cedric Lessoy, Chuan Lu, Ke Lv","doi":"10.23940/ijpe.20.07.p8.10581066","DOIUrl":"https://doi.org/10.23940/ijpe.20.07.p8.10581066","url":null,"abstract":"The key problem of using differential privacy is controlling sensitivity. Almost all papers focus on processing sensitivity, but the efficiency of the algorithm is also very important. Therefore, this paper hopes to improve efficiency as much as possible under the premise of ensuring utility. In this paper, decomposition and reconstruction via flattening kd-tree (DRF) is proposed based on differential privacy, which applies a flattening kd-tree to process the adjacency matrix. Firstly, by adjusting the vertex labeling, the set of labeling form dense areas and sparse areas as much as possible in the adjacency matrix. The adjacency matrix is then decomposed by flattening kd-tree, and each sub-region is anonymously operated using differential privacy. Finally, each subregion is reconstructed to obtain a complete anonymous graph. At the end of the article, experiments are conducted over real-world datasets. According to the results, DRF has a significant improvement in efficiency, the time complexity of DRF is O(|V|), and DRF has a good performance in degree distribution, degree centrality and cutting query.","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cross-Domain Relationship Prediction by Efficient Block Matrix Completion for Social Media Applications 基于高效块矩阵补全的社交媒体应用跨域关系预测
Int. J. Perform. Eng. Pub Date : 2020-07-30 DOI: 10.23940/ijpe.20.07.p11.10871094
Lizhi Xiao, Zheng Zhang, Peng Sun
{"title":"Cross-Domain Relationship Prediction by Efficient Block Matrix Completion for Social Media Applications","authors":"Lizhi Xiao, Zheng Zhang, Peng Sun","doi":"10.23940/ijpe.20.07.p11.10871094","DOIUrl":"https://doi.org/10.23940/ijpe.20.07.p11.10871094","url":null,"abstract":"The online social media has experienced vigorous evolution. Diversified needs of information acquisition and retrieval on social media platforms have been evoked by massive users. While all sorts of application demands meet with explosive data growth, the development of effective methodologies has become emergent. By taking full advantage of rich context, we propose a heterogeneous object relation matrix completion approach (EBMC) which jointly complements the relationship between the heterogeneous data objects. Specifically, we detect the Place-of-Interest (POI) with mean shift algorithm on the GPS information of the social image collection. Then, a batch matrix completion and learning method is developed by optimizing a unified objective function to learn the POI-specific user-image, image-tag and user-tag relationships. Finally, we decompose the whole learning problem into a set of POI-specific subtasks, which corresponding to the relation data blocks separated by the POI structure. Through experiments on tasks of image annotation and user retrieval based on image similarity of real-world social media datasets, we found that our proposed method achieved good performance.","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133244853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study on the Impact of Code Contributor on Code Smell 代码贡献者对代码气味影响的实证研究
Int. J. Perform. Eng. Pub Date : 2020-07-30 DOI: 10.23940/ijpe.20.07.p9.10671077
Junpeng Jiang, Can Zhu, Xiaofang Zhang
{"title":"An Empirical Study on the Impact of Code Contributor on Code Smell","authors":"Junpeng Jiang, Can Zhu, Xiaofang Zhang","doi":"10.23940/ijpe.20.07.p9.10671077","DOIUrl":"https://doi.org/10.23940/ijpe.20.07.p9.10671077","url":null,"abstract":"Code smells refer to poor designs that are considered to have negative impacts on the readability and maintainability during software evolution. Much research has been conducted to study the effects and correlations between them. However, software is a product of human intelligence, and the fundamental cause of code smell is developers. As a result, the research on the impact of code contributors on code smell appears vital in particular. In this paper, on 8 popular Java projects with 994 versions, we investigate the impact on code smells from the novel perspective of code contributors on five features. The empirical study indicated that the greater number of contributors involved, the more likely it is to introduce code smell. Having more mature contributors, who participate in more versions, can avoid the introduction of code smell. These findings are helpful for developers to optimize team structure and improve the quality of products.","PeriodicalId":262007,"journal":{"name":"Int. J. Perform. Eng.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信