Cluster Computing-The Journal of Networks Software Tools and Applications最新文献

筛选
英文 中文
Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT 认知物联网中使用海量异构数据的分散知识发现
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-31 DOI: 10.1007/s10586-023-04154-z
Vidyapati Jha, Priyanka Tripathi
{"title":"Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT","authors":"Vidyapati Jha, Priyanka Tripathi","doi":"10.1007/s10586-023-04154-z","DOIUrl":"https://doi.org/10.1007/s10586-023-04154-z","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135872512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and user-specific data prefetching and parallel read algorithms for distributed file systems 分布式文件系统的应用程序和用户特定的数据预取和并行读取算法
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-28 DOI: 10.1007/s10586-023-04160-1
Anusha Nalajala, T. Ragunathan, Ranesh Naha, Sudheer Kumar Battula
{"title":"Application and user-specific data prefetching and parallel read algorithms for distributed file systems","authors":"Anusha Nalajala, T. Ragunathan, Ranesh Naha, Sudheer Kumar Battula","doi":"10.1007/s10586-023-04160-1","DOIUrl":"https://doi.org/10.1007/s10586-023-04160-1","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136158636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software defect prediction using a bidirectional LSTM network combined with oversampling techniques 结合过采样技术的双向LSTM网络软件缺陷预测
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-28 DOI: 10.1007/s10586-023-04170-z
Nasraldeen Alnor Adam Khleel, Károly Nehéz
{"title":"Software defect prediction using a bidirectional LSTM network combined with oversampling techniques","authors":"Nasraldeen Alnor Adam Khleel, Károly Nehéz","doi":"10.1007/s10586-023-04170-z","DOIUrl":"https://doi.org/10.1007/s10586-023-04170-z","url":null,"abstract":"Abstract Software defects are a critical issue in software development that can lead to system failures and cause significant financial losses. Predicting software defects is a vital aspect of ensuring software quality. This can significantly impact both saving time and reducing the overall cost of software testing. During the software defect prediction (SDP) process, automated tools attempt to predict defects in the source codes based on software metrics. Several SDP models have been proposed to identify and prevent defects before they occur. In recent years, recurrent neural network (RNN) techniques have gained attention for their ability to handle sequential data and learn complex patterns. Still, these techniques are not always suitable for predicting software defects due to the problem of imbalanced data. To deal with this problem, this study aims to combine a bidirectional long short-term memory (Bi-LSTM) network with oversampling techniques. To establish the effectiveness and efficiency of the proposed model, the experiments have been conducted on benchmark datasets obtained from the PROMISE repository. The experimental results have been compared and evaluated in terms of accuracy, precision, recall, f-measure, Matthew’s correlation coefficient (MCC), the area under the ROC curve (AUC), the area under the precision-recall curve (AUCPR) and mean square error (MSE). The average accuracy of the proposed model on the original and balanced datasets (using random oversampling and SMOTE) was 88%, 94%, And 92%, respectively. The results showed that the proposed Bi-LSTM on the balanced datasets (using random oversampling and SMOTE) improves the average accuracy by 6 and 4% compared to the original datasets. The average F-measure of the proposed model on the original and balanced datasets (using random oversampling and SMOTE) were 51%, 94%, And 92%, respectively. The results showed that the proposed Bi-LSTM on the balanced datasets (using random oversampling and SMOTE) improves the average F-measure by 43 and 41% compared to the original datasets. The experimental results demonstrated that combining the Bi-LSTM network with oversampling techniques positively affects defect prediction performance in datasets with imbalanced class distributions.","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136233185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Target positioning method based on B-spline level set and GC Yolo-v3 基于b样条水平集和GC - Yolo-v3的目标定位方法
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-24 DOI: 10.1007/s10586-023-04164-x
Lin Zhang, Lizhen Ji, Zongfang Ma
{"title":"Target positioning method based on B-spline level set and GC Yolo-v3","authors":"Lin Zhang, Lizhen Ji, Zongfang Ma","doi":"10.1007/s10586-023-04164-x","DOIUrl":"https://doi.org/10.1007/s10586-023-04164-x","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135266638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight PCB defect detection algorithm based on MSD-YOLO 基于MSD-YOLO的轻量化PCB缺陷检测算法
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-20 DOI: 10.1007/s10586-023-04156-x
Guoao Zhou, Lijuan Yu, Yixin Su, Bingrong Xu, Guoyuan Zhou
{"title":"Lightweight PCB defect detection algorithm based on MSD-YOLO","authors":"Guoao Zhou, Lijuan Yu, Yixin Su, Bingrong Xu, Guoyuan Zhou","doi":"10.1007/s10586-023-04156-x","DOIUrl":"https://doi.org/10.1007/s10586-023-04156-x","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135569372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network 一种基于混合机器学习模型的新型DDoS检测和缓解技术,并对SDN网络中的非法流量进行重定向
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-17 DOI: 10.1007/s10586-023-04152-1
Avtar Singh, Harpreet Kaur, Navjot Kaur
{"title":"A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network","authors":"Avtar Singh, Harpreet Kaur, Navjot Kaur","doi":"10.1007/s10586-023-04152-1","DOIUrl":"https://doi.org/10.1007/s10586-023-04152-1","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135992805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices 更正:非易失性存储设备的可扩展numa感知持久B+树
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-17 DOI: 10.1007/s10586-023-04176-7
Safdar Jamil, Abdul Salam, Awais Khan, Bernd Burgstaller, Sung-Soon Park, Youngjae Kim
{"title":"Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices","authors":"Safdar Jamil, Abdul Salam, Awais Khan, Bernd Burgstaller, Sung-Soon Park, Youngjae Kim","doi":"10.1007/s10586-023-04176-7","DOIUrl":"https://doi.org/10.1007/s10586-023-04176-7","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135994656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety IDS-XGbFS:采用xgboost的智能入侵检测系统,具有最新的VANET安全功能选择
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-14 DOI: 10.1007/s10586-023-04157-w
Sara Amaouche, None AzidineGuezzaz, Said Benkirane, None MouradeAzrour
{"title":"IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety","authors":"Sara Amaouche, None AzidineGuezzaz, Said Benkirane, None MouradeAzrour","doi":"10.1007/s10586-023-04157-w","DOIUrl":"https://doi.org/10.1007/s10586-023-04157-w","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135767334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large-scale response-aware online ANN search in dynamic datasets 动态数据集中大规模响应感知在线人工神经网络搜索
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-14 DOI: 10.1007/s10586-023-04159-8
Guilherme Andrade, Willian Barreiros, Leonardo Rocha, Renato Ferreira, George Teodoro
{"title":"Large-scale response-aware online ANN search in dynamic datasets","authors":"Guilherme Andrade, Willian Barreiros, Leonardo Rocha, Renato Ferreira, George Teodoro","doi":"10.1007/s10586-023-04159-8","DOIUrl":"https://doi.org/10.1007/s10586-023-04159-8","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135804169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency SEKad:用于区块链网络的可扩展协议,具有增强的广播效率
3区 计算机科学
Cluster Computing-The Journal of Networks Software Tools and Applications Pub Date : 2023-10-13 DOI: 10.1007/s10586-023-04158-9
Tao Shen, Qianqi Sun, Chi Zhang, Fenhua Bai
{"title":"SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency","authors":"Tao Shen, Qianqi Sun, Chi Zhang, Fenhua Bai","doi":"10.1007/s10586-023-04158-9","DOIUrl":"https://doi.org/10.1007/s10586-023-04158-9","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135854940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信