Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sci Rep ; 13(1): 18730, 2023 Oct 31.
Artigo em Inglês | MEDLINE | ID: mdl-37907496

RESUMO

Requirement elicitation stands as a pivotal activity within requirement engineering, gaining even greater significance in the context of global software development. Effective communication among stakeholders assumes paramount importance in this arena. Factors such as time zone disparities, cultural variations, and language differences exert a formidable impact on communication within the sphere of global software development. These dynamics inevitably impinge upon timely coordination, potentially compromising the software's quality. In response, researchers have proffered communication models tailored for requirement elicitation within the ambit of global software development. The purpose of this study is to conduct an in-depth critical review of existing communication models for demand elicitation in global software development. Through this comprehensive review, we aim to discern prevailing publication trends, provide an introductory overview, and illuminate the strengths and limitations inherent in the existing communication models. By identifying these limitations, we seek to advance a novel, low-cost communication approach designed primarily for demand elicitation in global software development. To culminate our endeavor, we will undertake a case study-based experiment, meticulously designed to assess the efficacy and practical utility of the proposed techniques.

2.
Sensors (Basel) ; 23(14)2023 Jul 21.
Artigo em Inglês | MEDLINE | ID: mdl-37514868

RESUMO

Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, up from 76% to 81% in Q2, according to Kaspersky's Q3 report. Direct and indirect approaches are also available for launching DDoS attacks. While in a DDoS attack, controlled traffic is transmitted indirectly through zombies to reflectors to compromise the target host, in a direct attack, controlled traffic is sent directly to zombies in order to assault the victim host. Reflectors are uncompromised systems that only send replies in response to a request. To mitigate such assaults, traffic shaping and pushback methods are utilised. The SYN Flood Attack Detection and Mitigation Technique (SFaDMT) is an adaptive heuristic-based method we employ to identify DDoS SYN flood assaults. This study suggested an effective strategy to identify and resist the SYN assault. A decision support mechanism served as the foundation for the suggested (SFaDMT) approach. The suggested model was simulated, analysed, and compared to the most recent method using the OMNET simulator. The outcome demonstrates how the suggested fix improved detection.

3.
Comput Intell Neurosci ; 2022: 4942637, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35898782

RESUMO

The main purpose of this study is to observe the importance of machine vision (MV) approach for the identification of five types of skin cancers, namely, actinic-keratosis, benign, solar-lentigo, malignant, and nevus. The 1000 (200 × 5) benchmark image datasets of skin cancers are collected from the International Skin Imaging Collaboration (ISIC). The acquired ISIC image datasets were transformed into texture feature dataset that was a combination of first-order histogram and gray level co-occurrence matrix (GLCM) features. For the skin cancer image, a total of 137,400 (229 × 3 x 200) texture features were acquired on three nonover-lapping regions of interest (ROIs). Principal component analysis (PCA) clustering approach was employed for reducing the dimension of feature dataset. Each image acquired twenty most discriminate features based on two different approaches of statistical features such as average correlation coefficient plus probability of error (ACC + POE) and Fisher (Fis). Furthermore, a correlation-based feature selection (CFS) approach was employed for feature reduction, and optimized 12 features were acquired. Furthermore, a classification algorithm naive bayes (NB), Bayes Net (BN), LMT Tree, and multilayer perception (MLP) using 10 K-fold cross-validation approach were employed on optimized feature datasets and the overall accuracy achieved by MLP is 97.1333%.


Assuntos
Nevo , Neoplasias Cutâneas , Algoritmos , Teorema de Bayes , Humanos , Neoplasias Cutâneas/diagnóstico por imagem
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...