A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimization of software project evaluation system
2020
Sir Syed Research Journal of Engineering & Technology
An improved particle swarm optimization algorithm is introduced to solve the problem of determining the connection weight coefficient of the evaluation model accurately and efficiently. ...
A new network topology design method is proposed, and a software project performance evaluation model based on fuzzy neural network is established. ...
of asset allocation optimization. ...
doi:10.33317/ssurj.146
fatcat:4mnnc3lvmjeadfkj3fwmoxex7q
Ant Colony Optimization Approach to Portfolio Optimization
2011
Social Science Research Network
The purpose of this paper is to apply ACO approach to the portfolio optimization mean-variance model. ...
The test data set is the monthly prices since 2008/20/3 up to 2011/20/03 from Tehran stock exchange. Reliability of proposed algorithm is evaluated. ...
Acknowledgements The authors are grateful for scientific support from Dr. Maghsud solimanpur.
References ...
doi:10.2139/ssrn.1917297
fatcat:vgh47jque5bcbc4fpwivy4s7nq
Optimal Robust Estimator-Correlator for Spectrum Sensing in Cognitive Radio
English
2015
International Journal of Innovative Research in Computer and Communication Engineering
English
Use of spectrum, which requires four main tasks-Spectrum Sensing, Spectrum Analysis ,Spectrum Allocation and Spectrum management . In this paper, we used spectrum sensing for primary user detection. ...
This novel scheme has been further compared with other existing methods, the proposed technique is planned to simulate using NS2 software and MATLAB software. ...
This paper provides reliability of the method, sensing time taken by a SU to detect a PU, security provided by the technique, reduce complexity of the technique. ...
doi:10.15680/ijircce.2015.0306043
fatcat:6uaccsx46nakbbgvtw34mbvhyq
Guest Editorial Software Defined Internet of Vehicles
2021
IEEE transactions on intelligent transportation systems (Print)
These large amounts of vehicle information can be analyzed and processed through computer technology to calculate the optimal route for different vehicles, and report road conditions in time and schedule ...
SDN can provide a feasible, cost-effective way to manage IoV and ensure network security. What's more, it can furthest improve the application programs and analyze performance. ...
The numerical experimental results are extracted from software defined-Internet of Vehicle (SD-IoV) platform which shows high stability and reliability of the proposed SSLO under different test scenarios ...
doi:10.1109/tits.2021.3080875
fatcat:tvd6ubmtmfe73mta3iorxzncju
Research protocol: A randomized controlled trial of functional family therapy: An Early Intervention Foundation (EIF) partnership between Croydon Council and Queen's University Belfast
2015
International Journal of Educational Research
Data handling, storage and security, will be ensured to meet acceptable ethical standards. ...
It must be stressed that all participation is voluntary and all young people, parents and professionals may withdraw from the study at anytime and for any reason. ...
In addition there will be a requirement to establish and test secure methods of data transfer using encryption software. ...
doi:10.1016/j.ijer.2015.01.001
fatcat:ba3sv5hjnvbaviuvnjw56rdcxa
Portfolio Size in Stochastic Portfolio Networks Using Digital Portfolio Theory
2013
Journal of Mathematical Finance
This paper discusses the long horizon nature of DPT and adds zero-one (0-1) variables to control portfolio size. We find optimal size constrained allocations from a universe of US sector indexes. ...
The feasible size of optimal portfolios depends on risk. Large optimal portfolios are infeasible for low risk investors. ...
We test the DPT model with zero-one constraints and find it effective in identifying size constrained optimal asset allocations. ...
doi:10.4236/jmf.2013.32028
fatcat:aiyh4ndkwrh4xlmj6hg2otorke
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
The topics on physical-layer security designs are then summarized from resource allocation, beamforming/precoding, and antenna/node selection and cooperation. ...
The survey begins with typical wiretap channel models to cover common scenarios and systems. ...
The Global Optimization with Security, Reliability, and Throughput To achieve the optimal network performance and user experience in a wireless network, the security, reliability, and throughput should ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Distributed cat modeling based agile framework for software development
2019
Sadhana (Bangalore)
Software development is a challenging process that requires in-depth understanding and an effective model such that the developed software inherits good quality and reliability, and attains customer satisfaction ...
In this paper, the catastrophic and distributed computing models are integrated into the software development process. ...
The distributed computing model enhances the robustness and reliability of the overall system, reaching near-optimal or optimal control. ...
doi:10.1007/s12046-019-1150-9
fatcat:owumj22c3bcfnfylmrlzi4sg5i
Distributed Cat Modeling Based Agile Framework for Software Development
2020
International journal of engineering education
Software development is a hectic process that requires keen understanding and effective model such that the developed software inherits good quality, reliability, and achieves customer satisfaction towards ...
In this paper, the catastrophic and distributed computing models are integrated into the software development step. ...
Moreover, the software development team suffers a lot in deciding the optimal and effective test suites that ensure the effective testing of the software. ...
doi:10.14710/ijee.2.1.20-32
fatcat:di22wmlydnf4bnvxmdytiawclu
IT & C Projects Duration Assessment Based on Audit and Software Reengineering
2009
Informatică economică
Optimal allocation of resources has proved to be the main element contributing to an increase in efficiency. ...
Our main focus is reducing software development project duration. Due to the fast changing economy, the need for efficiency and productivity is greater than ever. ...
We found out there is a correlation coefficient of 0.79 between the number of methods and the number of code lines for the project sample under analysis, which indicates that the increase in the number ...
doaj:4a33ae0042a54755a585b5a14d8bdbc8
fatcat:ocvpmtkb2zc4tb6vcbvdzii5xm
Guest Editorial: Special Issue on Communications and Data Analytics in the Smart Grid
2020
IEEE Journal on Selected Areas in Communications
It uses two-way communications, digital technologies, advanced sensing and computing infrastructure, and software abilities to provide improved monitoring, protection and optimization of all the grids' ...
Given the wide choice of communication and network technologies, intensive research efforts are needed to compare options and optimize solutions for Smart Grids. ...
Fuzzy theory to compute the link-layer trust to find secured and reliable link. ...
pmid:33029039
pmcid:PMC7537467
fatcat:vgblruonejb65ewidldzjracnq
An Investigation of Time-Cost-Risk Trade-Off in the Installation of X-Ray Machine Using Response Surface Methodology
2014
Nigerian Journal of Technology
The The The The conflicting conflicting conflicting conflicting obje obje obje objectives of time, cost and ctives of time, cost and ctives of time, cost and ctives of time, cost and improvement in one ...
The software. The software. The software. The model model model model was was was was applied to applied to applied to applied to the the the 1. 1. 1. ...
The resources to be allocated therefore for each corresponding activity in increasing order are: S/N VARIANCE-COVARIANCE MATRIX
PROBABILITY
FOR TCTP
PROBABILITY
FOR TRTP
PROBABILITY
FOR CRTP
PROBABILITY ...
doi:10.4314/njt.v33i4.8
fatcat:i2wce4ubjndzhbkca5cgnvxu6m
Current Trends and Issues Legacy Application of the Serverless Architecture
2018
International Journal of Computing and Network Technology
The problem associated with this research is that the organization often spends huge chunks of dollars only for server provisioning, and another chunk for its security and management. ...
model and a simple structure. ...
The result is calculated in software SPSS for validity and reliability for all variables (dependent and independent). ...
doi:10.12785/ijcnt/060304
fatcat:5xfw33kfljdoljhvvswtgkazta
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
[article]
2010
arXiv
pre-print
State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. ...
The framework is used to conduct realistic experiments on a state-of-the-art SCADA EMS software for a power network example with 14 substations, 27 buses, and 40 branches. ...
Moustafa Chenine and Mr. Nicholas Honeth for their helpful technical support. ...
arXiv:1011.1828v1
fatcat:xa6bspijdbaapep3s6pfxhsfma
The effect of humic acid and water super absorbent polymer application on sesame in an ecological cropping system: a new employment of structural equation modeling in agriculture
2019
Chemical and Biological Technologies in Agriculture
Foliar application of HA (6 kg ha −1 ) and control (not applying HA) were allocated to the strip plots. ...
Applying of SAP (80 kg ha −1 ) into the soil and control (no applying SAP) were allocated to the subplots. ...
Acknowledgements Financial support of Deputy for Research and Technology, Ferdowsi University of Mashhad (Grant no. 40190/2016, Grant no. 37473/2015) and Center of Excellence for Special Crops (CESC) facilities ...
doi:10.1186/s40538-018-0131-2
fatcat:7wzj3j56o5dwvpzlheivibn5qu
« Previous
Showing results 1 — 15 out of 8,341 results