76,017 Hits in 6.8 sec

Component-Based Software System using Computational Intelligence Technique for Reliability Prediction

Shivani Yadav
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Component-based software systems along with soft computing techniques should be used for having more reliable software.  ...  The focus of this paper is on the software product's quality; metrics and we thoroughly review the literature of existing computational intelligence/soft computing techniques and analyze the findings according  ...  This proposed technique will help in generating software reliability prediction models for component-based software using computational intelligence methodologies.  ... 
doi:10.30534/ijatcse/2020/184932020 fatcat:v54qc3twv5hzfnypvatr7urkyq

A Holistic Review of Soft Computing Techniques

Philip O. Omolaye
2017 Applied and Computational Mathematics  
formulated to give an idea on how these computing techniques are applied to create intelligent agents to solve a variety of problems.  ...  Due to notable technological convergence that brought about exponential growth in computer world, Soft Computing (SC) has played a vital role with automation capability features to new levels of complex  ...  AI techniques are known to be applied to solve complex and ill-defined problems in which soft computing, computational intelligence and granular computing form some of the major offshoot.  ... 
doi:10.11648/j.acm.20170602.15 fatcat:pfmgraicunfijho23usu3pfn3a

A Review on Parameter Estimation Techniques of Software Reliability Growth Models

Karambir Bidhan, Adima Awasthi
2014 International Journal of Computer Applications Technology and Research  
Various software reliability growth models have been proposed to predict the reliability of a software. These models help vendors to predict the behaviour of the software before shipment.  ...  The reliability is predicted by estimating the parameters of the software reliability growth models.  ...  Okumoto [10] reviewed four analytical software reliability models which are used for estimating and monitoring software reliability.  ... 
doi:10.7753/ijcatr0304.1014 fatcat:jzp6djtkanbb7hya2r4gjzgqiq

Software Project Management Using Machine Learning Technique—A Review

Mohammed Najah Mahdi, Mohd Hazli Mohamed Zabil, Abdul Rahim Ahmad, Roslan Ismail, Yunus Yusoff, Lim Kok Cheng, Muhammad Sufyian Bin Mohd Azmi, Hayder Natiq, Hushalini Happala Naidu
2021 Applied Sciences  
This paper presents a wide-ranging comprehensive review of papers on the application of Machine Learning in software project management.  ...  fault prediction based on accuracy.  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable.  ... 
doi:10.3390/app11115183 fatcat:e7cfhrwyunfeld7cpngu4uifl4

Load-shedding techniques for microgrids: A comprehensive review

Diana Rwegasira, Imed Ben Dhaou, Aron Kondoro, Amleset Kelati, Nerey Mvungi, Hannu Tenhunen
2019 International Journal of Smart Grid and Clean Energy  
Recently, the use of agentbased distributed control has seen to have a significant impact on the grid and microgrid controls.  ...  The load-shedding technique is among the features used to balance the power consumption in the power system upon less power production.  ...  :Load-Shedding techniques for microgrids: A Comprehensive Review  ... 
doi:10.12720/sgce.8.3.341-353 fatcat:exdmxo3vkjhnjjue3t24qr2dhq

Artificial Neural Networks Based Optimization Techniques: A Review

Maher G. M. Abdolrasol, S. M. Suhail Hussain, Taha Selim Ustun, Mahidur R. Sarker, Mahammad A. Hannan, Ramizi Mohamed, Jamal Abd Ali, Saad Mekhilef, Abdalrhman Milad
2021 Electronics  
In the last few years, intensive research has been done to enhance artificial intelligence (AI) using optimization techniques.  ...  The entire set of such techniques is classified as algorithms based on a population where the initial population is randomly created.  ...  ANN [121] neighborhood fuzzy PSO To enhance forecasting of software reliability Forecasting of software reliability Critic NN [122] PSO Solve the Hamilton-Jacobi-Bellman equation more efficiently.  ... 
doi:10.3390/electronics10212689 fatcat:oupnikhxdbhedfz5yeatmtj4xa

Reinforcement Learning and Modeling Techniques: A Review

H. R. Abdulqadir, A. M. Abdulazeez
2021 Zenodo  
Q-learning (QL), by learning a conservative Q function that allows a policy to be below the predicted value of the Q function, is introduced by us, which aims to circumvent these restrictions.  ...  We present an attack mechanism that uses the portability of competing tests to execute policy incentives and to prove their usefulness and consequences by means of a pilot study of a play learning scenario  ...  We allow other researchers to further explore this field, review deep-RL algorithms in-depth, and test new algorithms, including strategies for the combined use of CPU/GPU computing resources.  ... 
doi:10.5281/zenodo.4542638 fatcat:znj6mk274vfp3npqwm3mkm6rd4

Computational optimization techniques applied to microgrids planning: A review

Carlos Gamarra, Josep M. Guerrero
2015 Renewable & Sustainable Energy Reviews  
In this context, technical literature about optimization techniques applied to microgrid planning have been reviewed and the guidelines for innovative planning methodologies focused on economic feasibility  ...  Finally, some trending techniques and new microgrid planning approaches are pointed out.  ...  The Economic Dispatch Problem is usually solved by mathematical computing techniques and specific computer software.  ... 
doi:10.1016/j.rser.2015.04.025 fatcat:5pjq6au47rbrxlp66c6gzsjypa


Syed Mohsin Saif
2017 International Journal of Advanced Research in Computer Science  
This paper is an effort to explore various effort estimation techniques for web development, their challenges and measures to predict accurate efforts.  ...  accurately, efficiency and reliability.  ...  Moayed, et. al. 2007 , conducted a study to review exiting effort estimation techniques used to predict efforts for web application development.  ... 
doi:10.26483/ijarcs.v8i9.4889 fatcat:caq3b66hgjh6bkkcog42emb7lu

A Review on Software Defect Prediction Techniques Using Product Metrics

Jayanthi R, Lilly Florence, Arti Arya
2017 International Journal of Database Theory and Application  
This paper visits various software metrics and suggested procedures through which software defect prediction is enhanced and also summarizes those techniques.  ...  Fault prediction in software plays a vital role in enhancing the software excellence as well as it helps in software testing to decrease the price and time.  ...  A good software defect prediction model is always useful for every software system.  ... 
doi:10.14257/ijdta.2017.10.1.15 fatcat:l7rc676myjad7oias6hpix6qea

Sentiment Analysis Based on Movie Reviews using Various Classification Techniques : A Review

Karishma Kaushik, Mahesh Parmar
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Since the perceptions of humans improve the effectiveness of products & since a movie'ssuccess or failure depending on its review, costs are rising, and a good sentiment analysis model needs to be developed  ...  Machine learning methods use ML algorithms to carry out sentiment analysis as a standard classification problem using syntactic and language characteristics.  ...  The reliability of different sentiment analysis techniques and methods was used to evaluate their performance.  ... 
doi:10.32628/cseit217329 fatcat:lirfbmzznng6bjqj44uqasmmqa

A Review on Optical Character Recognition Techniques

Hiral Modi, M. C.
2017 International Journal of Computer Applications  
At present scenario, there is growing demand for the software system to recognize characters in a computer system when information is scanned through paper documents.  ...  This paper presents detailed review in the field of Optical Character Recognition.  ...  In this paper [21] , a computer vision and character recognition algorithm for a license plate recognition (LPR) is presented to be used as a core for intelligent infrastructure like electronic payment  ... 
doi:10.5120/ijca2017913061 fatcat:dnhnbiv4nzhrpcobkvrkijooiy

A Review on Optimal Generation Techniques used in Microgrids

Pissa Sandhya Rani, K. S. V. Phani Kumar
2015 International Journal of Engineering Research and  
the equipment, reliability, power quality, voltage profile etc MG, which is a cluster of distributed generation sources, storages and loads that cooperate together in order to improve the power supply  ...  reliability, power quality and overall power system stability.  ...  MG in a near-optimal manner using artificial intelligence concepts [28] .  ... 
doi:10.17577/ijertv4is090743 fatcat:u62mo6hxubbw3je26xpdfmug5e

A Review on Risk Assessment Using Risk Prediction Technique in Campus Network

Norkhushaini Awang
2020 International Journal of Advanced Trends in Computer Science and Engineering  
In order to security operation center understand their environment, risk prediction technique helped them to create a holistic understanding of the networks, systems, services and applications they are  ...  In this research paper, we discussed past related research in doing a risk prediction in conducting a risk assessment activity at the campus network.  ...  Past research not much cover on cybersecurity threats in campus network and aiming a risk prediction technique in getting a reliable risk assessment result.  ... 
doi:10.30534/ijatcse/2020/3891.32020 fatcat:fmid3dyy3nh7dlp3b3c6xqn7ry

A Review of Deep Learning Security and Privacy Defensive Techniques

Muhammad Imran Tariq, Nisar Ahmed Memon, Shakeel Ahmed, Shahzadi Tayyaba, Muhammad Tahir Mushtaq, Natash Ali Mian, Muhammad Imran, Muhammad W. Ashraf
2020 Mobile Information Systems  
In our daily life, we used many applications that use Deep Learning models to make decisions based on predictions, and if Deep Learning models became the cause of misprediction due to internal/external  ...  Therefore, it is necessary to call the attention of the industry in respect of security threats and related countermeasures techniques for Deep Learning, which motivated the authors to perform a comprehensive  ...  Here, we review recent attempts to secure Artificial Intelligence and Private Data of Artificial Intelligence.  ... 
doi:10.1155/2020/6535834 fatcat:37wc35bqcnavdd2u4622sxmiom
« Previous Showing results 1 — 15 out of 76,017 results