Submit Search
Upload
A survey of controlled experiments in software engineering
•
2 likes
•
1,353 views
JULIO GONZALEZ SANZ
Follow
Report
Share
Report
Share
1 of 21
Download now
Download to read offline
Recommended
Evaluation and Assessment in Software Engineering is the name of our conference. We discuss and advance evaluation and assessment methods, such as experiments, case studies, data mining studies, and systematic literature reviews. But what are the study objects? What do we evaluate and assess? Empirical software engineering evolved partly as a reaction towards “novelty” being the primary quality criterion for research. By focusing on the evaluation and assessment, we tried to take a more comprehensive perspective on what advances software engineering. However, the pendulum has swung towards the other end, and the design of solutions have been overshadowed by the evaluation part. The design science paradigm may bring the balance back. To advance software engineering, we as a community try to understand current practices, their strength and weaknesses. We also propose new tools, practices etc. to make software engineering more efficient, predictable or effective. Implicitly or explicitly, we apply a cycle of problem understanding, solution design, and evaluation. This is at the core of the design science paradigm. Further, expressing the design knowledge as actionable guidelines in the form of technological rules, aims both at communicating research outcomes to practitioners and at functioning as a theoretical basis for subsequent research. In this talk, I define my conceptualization of design science, present examples of software engineering research, through the lens of design science, and outline how we as empirical software engineering researchers and practitioners may advance the field within the design science paradigm.
EASE 2019 keynote
EASE 2019 keynote
Per Runeson
20 54-1-pb
20 54-1-pb
Editor IJARCET
The software defect factors are used to measure the quality of the software. The software effort estimation is used to measure the effort required for the software development process. The defect factor makes an impact on the software development effort. Software development and cost factors are also decided with reference to the defect and effort factors. The software defects are predicted with reference to the module information. Module link information are used in the effort estimation process. Data mining techniques are used in the software analysis process. Clustering techniques are used in the property grouping process. Rule mining methods are used to learn rules from clustered data values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect prediction and effort estimation process. The system uses the module information for the defect prediction and effort estimation process. The proposed system is designed to improve the defect prediction and effort estimation process. The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels. The defect prediction and effort estimation accuracy is also improved by the system. The system is developed using the Java language and Oracle relation database environment.
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
Programming with GUTs
Programming with GUTs
catherinewall
Knowledge discovery, knowledge engineering
Introduction to knowledge discovery
Introduction to knowledge discovery
School of Tourism and Hospitality Management Sant Ignasi, Ramon Llull University
Researchers in software engineering must communicate with industry practitioners, both engineers and managers. Communication may be about collaboration buy-in, problem identification, empirical data collection, solution design, evaluation, and reporting. In order to gain mutual benefit of the collaboration, ensuring relevant research and improved industry practice, researchers and practitioners must be good at communicating. The basis for a researcher to be good at industry-academia communication is firstly to be “bi-lingual”. Understanding and being able to translate between these “languages” is essential. Secondly, it is also about being “bi-cultural”.Understanding the incentives in industry and academia respectively, is a basis for being able to find balances between e.g. rigor and relevance in the research. Time frames is another aspect that is different in the two cultures. Thirdly, the choice of communication channels is key to reach the intended audience.A wide range of channels exist, from face to face meetings, via tweets and blogs, to academic journal papers and theses; each having its own audience and purposes. The keynote speech will explore the challenges of industry-academia communication, based on two decades of collaboration experiences, both successes and failures. It aims to support primarily the academic side of the communication to help achieving industry impact through rigorous and relevant empirical software engineering research.
Industry-Academia Communication In Empirical Software Engineering
Industry-Academia Communication In Empirical Software Engineering
Per Runeson
Lopez
Lopez
anesah
PM2 ARTICALS
PM2 ARTICALS
ra na
Recommended
Evaluation and Assessment in Software Engineering is the name of our conference. We discuss and advance evaluation and assessment methods, such as experiments, case studies, data mining studies, and systematic literature reviews. But what are the study objects? What do we evaluate and assess? Empirical software engineering evolved partly as a reaction towards “novelty” being the primary quality criterion for research. By focusing on the evaluation and assessment, we tried to take a more comprehensive perspective on what advances software engineering. However, the pendulum has swung towards the other end, and the design of solutions have been overshadowed by the evaluation part. The design science paradigm may bring the balance back. To advance software engineering, we as a community try to understand current practices, their strength and weaknesses. We also propose new tools, practices etc. to make software engineering more efficient, predictable or effective. Implicitly or explicitly, we apply a cycle of problem understanding, solution design, and evaluation. This is at the core of the design science paradigm. Further, expressing the design knowledge as actionable guidelines in the form of technological rules, aims both at communicating research outcomes to practitioners and at functioning as a theoretical basis for subsequent research. In this talk, I define my conceptualization of design science, present examples of software engineering research, through the lens of design science, and outline how we as empirical software engineering researchers and practitioners may advance the field within the design science paradigm.
EASE 2019 keynote
EASE 2019 keynote
Per Runeson
20 54-1-pb
20 54-1-pb
Editor IJARCET
The software defect factors are used to measure the quality of the software. The software effort estimation is used to measure the effort required for the software development process. The defect factor makes an impact on the software development effort. Software development and cost factors are also decided with reference to the defect and effort factors. The software defects are predicted with reference to the module information. Module link information are used in the effort estimation process. Data mining techniques are used in the software analysis process. Clustering techniques are used in the property grouping process. Rule mining methods are used to learn rules from clustered data values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect prediction and effort estimation process. The system uses the module information for the defect prediction and effort estimation process. The proposed system is designed to improve the defect prediction and effort estimation process. The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels. The defect prediction and effort estimation accuracy is also improved by the system. The system is developed using the Java language and Oracle relation database environment.
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
Programming with GUTs
Programming with GUTs
catherinewall
Knowledge discovery, knowledge engineering
Introduction to knowledge discovery
Introduction to knowledge discovery
School of Tourism and Hospitality Management Sant Ignasi, Ramon Llull University
Researchers in software engineering must communicate with industry practitioners, both engineers and managers. Communication may be about collaboration buy-in, problem identification, empirical data collection, solution design, evaluation, and reporting. In order to gain mutual benefit of the collaboration, ensuring relevant research and improved industry practice, researchers and practitioners must be good at communicating. The basis for a researcher to be good at industry-academia communication is firstly to be “bi-lingual”. Understanding and being able to translate between these “languages” is essential. Secondly, it is also about being “bi-cultural”.Understanding the incentives in industry and academia respectively, is a basis for being able to find balances between e.g. rigor and relevance in the research. Time frames is another aspect that is different in the two cultures. Thirdly, the choice of communication channels is key to reach the intended audience.A wide range of channels exist, from face to face meetings, via tweets and blogs, to academic journal papers and theses; each having its own audience and purposes. The keynote speech will explore the challenges of industry-academia communication, based on two decades of collaboration experiences, both successes and failures. It aims to support primarily the academic side of the communication to help achieving industry impact through rigorous and relevant empirical software engineering research.
Industry-Academia Communication In Empirical Software Engineering
Industry-Academia Communication In Empirical Software Engineering
Per Runeson
Lopez
Lopez
anesah
PM2 ARTICALS
PM2 ARTICALS
ra na
Defects in modules of software systems is a major problem in software development. There are a variety of data mining techniques used to predict software defects such as regression, association rules, clustering, and classification. This paper is concerned with classification based software defect prediction. This paper investigates the effectiveness of using a radial basis function neural network and a probabilistic neural network on prediction accuracy and defect prediction. The conclusions to be drawn from this work is that the neural networks used in here provide an acceptable level of accuracy but a poor defect prediction ability. Probabilistic neural networks perform consistently better with respect to the two performance measures used across all datasets. It may be advisable to use a range of software defect prediction models to complement each other rather than relying on a single technique.
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Editor IJCATR
KTN ran a collaborators' workshop on 26 September 2019 in London to explain more about the Digital Security by Design Challenge announced by the government. The Digital Security by Design challenge has been recently announced by the Department for Business, Energy & Industrial Strategy (BEIS). This challenge, amounting to £70 million of government funding over 5 years, was delivered by UK Research and Innovation (UKRI) through the Industrial Strategy Challenge Fund (ISCF). This Collaborators' Workshop provides an opportunity to hear more details of the challenge and forthcoming competitions. A Scoping Workshop for this challenge was held on 30th May: http://ow.ly/oz6230pHlGl Find out more about the Defence and Security Interest Group at https://ktn-uk.co.uk/interests/defence-security Join the Defence and Security Interest Group at https://www.linkedin.com/groups/8584397 or Follow KTN_UK Defence group on Twitter https://twitter.com/KTNUK_Defence
Digital Security by Design: Formal Verification with Broad-Spectrum ANSI-C Re...
Digital Security by Design: Formal Verification with Broad-Spectrum ANSI-C Re...
KTN
Maturing software engineering knowledge through classifications
Maturing software engineering knowledge through classifications
immortalchhetri
Mathematical models and applicable technologies to forecast, analyze and optimize quality and risks for complex systems
Kost for china-2011
Kost for china-2011
Mathmodels Net
GiacomettiResume
GiacomettiResume
Paolo Giacometti
https://irjet.net/archives/V7/i3/IRJET-V7I3507.pdf
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET Journal
The Dynamic Software Product Line (DSPL) is becoming the system with high vulnerability and high confidentiality in which the adaptive security is a challenging task and critical for it to operate. Adaptive security is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. This paper presents a literature review of security adaptation approaches for DSPL, and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve. This work will be done following the Systematic Review approach. Our results concluded that the research field of security approaches for DSPL is still poor of methods and metrics for evaluating and comparing different techniques. The comparison reveals that the existing adaptive security approaches widely cover the information gathering. However, comparative approaches do not describe how to decide on a method for performing adaptive security DSPL or how to provide knowledge input for adapting security. Therefore, these areas of research are promising.
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
IJCSES Journal
Thesis on Model-In-The-Loop for Embedded System Testing.
Zander diss
Zander diss
Justyna Zander
Knowledge based systems have been developed to solve many problems. Their main characteristic consists on the use of a knowledge representation of a specific domain to solve problems in such a way that it emulates the reasoning of a human specialist. As conventional systems, knowledge based systems are not free of failures. This justifies the need for validation and verification for this class of systems. Due to the lack of techniques which can guarantee their quality and reliability, this paper proposes a process to support validation of specific knowledge bases. In order to validate the knowledge base, restriction rules are used. These rules are elicit and represented as If Then Not rules and executed using a backward chaining reasoning process. As the result of this process test cases are created and submitted to the knowledge base in order to prove whether there are inconsistencies in the domain representation. Two main advantages can be highlighted here: the use of restriction rules which are considered as meta-knowledge (these rules improve the knowledge representation power of the system) and a process that can generate useful test cases (test cases are usually difficult and expensive to be created).
Verification and validation of knowledge bases using test cases generated by ...
Verification and validation of knowledge bases using test cases generated by ...
Waqas Tariq
3 IGARSS2011_Pasolli_Final.pptx
3 IGARSS2011_Pasolli_Final.pptx
grssieee
German-Russian Conference „Life IT – IT meets Environmental and Sustainable Energy Technologies“ 15.-16.5.2009 University of Hagen
Kostogryzov 10.12.2009
Kostogryzov 10.12.2009
Mathmodels Net
PhD Lesson
LAS - System Biology Lesson
LAS - System Biology Lesson
LASircc
Testing has been an essential part of software development life cycle. Automatic test case and test data generation has attracted many researchers in the recent past. Test suite generation is the concept given importance which considers multiple objectives in mind and ensures core coverage. The test cases thus generated can have dependencies such as open dependencies and closed dependencies. When there are dependencies, it is obvious that the order of execution of test cases can have impact on the percentage of flaws detected in the software under test. Therefore test case prioritization is another important research area that complements automatic test suite generation in objects oriented systems. Prior researches on test case prioritization focused on dependency structures. However, in this paper, we automate the extraction of dependency structures. We proposed a methodology that takes care of automatic test suite generation and test case prioritization for effective testing of object oriented software. We built a tool to demonstrate the proof of concept. The empirical study with 20 case studies revealed that the proposed tool and underlying methods can have significant impact on the software industry and associated clientele.
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
CSCJournals
The main issues of the Intrusion Detection Systems (IDS) are in the sensitivity of these systems toward the errors, the inconsistent and inequitable ways in which the evaluation processes of these systems were often performed. Most of the previous efforts concerned with improving the overall accuracy of these models via increasing the detection rate and decreasing the false alarm which is an important issue. Machine Learning (ML) algorithms can classify all or most of the records of the minor classes to one of the main classes with negligible impact on performance. The riskiness of the threats caused by the small classes and the shortcoming of the previous efforts were used to address this issue, in addition to the need for improving the performance of the IDSs were the motivations for this work. In this paper, stratified sampling method and different cost-function schemes were consolidated with Extreme Learning Machine (ELM) method with Kernels, Activation Functions to build competitive ID solutions that improved the performance of these systems and reduced the occurrence of the accuracy paradox problem. The main experiments were performed using the UNB ISCX2012 dataset. The experimental results of the UNB ISCX2012 dataset showed that ELM models with polynomial function outperform other models in overall accuracy, recall, and F-score. Also, it competed with traditional model in Normal, DoS and SSH classes.
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
IJCNCJournal
The history of Artificial Intelligence and Machine Learning dates back to 1950’s. In recent years, there has been an increase in popularity for applications that implement AI and ML technology. As with traditional development, software testing is a critical component of an efficient AI/ML application. However, the approach to development methodology used in AI/ML varies significantly from traditional development. Owing to these variations, numerous software testing challenges occur. This paper aims to recognize and to explain some of the biggest challenges that software testers face in dealing with AI/ML applications. For future research, this study has key implications. Each of the challenges outlined in this paper is ideal for further investigation and has great potential to shed light on the way to more productive software testing strategies and methodologies that can be applied to AI/ML applications.
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
ijaia
Describes the integrated use of several common analytical informatics tools / platforms in the lab and the VM space to maximize access. It also describes a variety of customized additions including links to proprietary databases, barcode utilization, adding value to analytical data, and one stop shopping for data analysis / reporting. The impact is that the same FTEs can produce >3 fold more results!
Informatics Plenary Hayward Etal May2012
Informatics Plenary Hayward Etal May2012
Mark Hayward
27th August 2014. My presentation at SEAA 2014 (http://esd.scienze.univr.it/dsd-seaa-2014) about our a study on model-driven engineering approaches for engineering Wireless Sensor Networks (WSNs). Accompanying paper: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6928805 Abstract: Model-Driven Engineering (MDE) can be considered as the right tool to reduce the complexity of Wireless Sensor Network (WSN) development through its principles of abstraction, separation of concerns, reuse and automation. In this paper we present the results of a systematic mapping study we performed for providing an organized view of existing MDE approaches for designing WSNs. A total number of 780 studies were analysed; among them, we selected 16 papers as primary studies relevant for review. We setup a comparison framework for these studies, and classified them based on a set of common parameters. The main objective of our research is to give an overview about the state-of-the-art of MDE approaches dedicated to WSN design, and finally, discuss emerging challenges that have to be considered in future MDE approaches for engineering WSNs.
A Study on MDE Approaches for Engineering Wireless Sensor Networks
A Study on MDE Approaches for Engineering Wireless Sensor Networks
Ivano Malavolta
IEEE Projects 2012 software engineering Chennai, IEEE Projects 2012 software engineering Trichy, IEEE Projects 2012 software engineering Pondicherry, IEEE Projects 2012 software engineering Karaikal, IEEE Projects 2012 software engineering Vellore, IEEE Projects 2012 software engineering Tiruvannamalai, IEEE Projects 2012 software engineering Villupuram, IEEE Projects 2012 software engineering Kanchipuram
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
SBGC
AS_industrialNew
AS_industrialNew
Alena Simalatsar
A description of the requirements and the assessment and marking for the Software Engineering Large Practical.
Software Engineering Large Practical coursework
Software Engineering Large Practical coursework
Stephen Gilmore
Artificial Intelligent - Intelligence agent Agents and environments Rationality Intelligence Agent PEAS (Performance measure, Environment, Actuators, Sensors) Environment types Agent types
Intelligence Agent - Artificial Intelligent (AI)
Intelligence Agent - Artificial Intelligent (AI)
mufassirin
software engineering notes for cse/it fifth semester
software engineering notes for cse/it fifth semester
rajesh199155
More Related Content
What's hot
Defects in modules of software systems is a major problem in software development. There are a variety of data mining techniques used to predict software defects such as regression, association rules, clustering, and classification. This paper is concerned with classification based software defect prediction. This paper investigates the effectiveness of using a radial basis function neural network and a probabilistic neural network on prediction accuracy and defect prediction. The conclusions to be drawn from this work is that the neural networks used in here provide an acceptable level of accuracy but a poor defect prediction ability. Probabilistic neural networks perform consistently better with respect to the two performance measures used across all datasets. It may be advisable to use a range of software defect prediction models to complement each other rather than relying on a single technique.
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Editor IJCATR
KTN ran a collaborators' workshop on 26 September 2019 in London to explain more about the Digital Security by Design Challenge announced by the government. The Digital Security by Design challenge has been recently announced by the Department for Business, Energy & Industrial Strategy (BEIS). This challenge, amounting to £70 million of government funding over 5 years, was delivered by UK Research and Innovation (UKRI) through the Industrial Strategy Challenge Fund (ISCF). This Collaborators' Workshop provides an opportunity to hear more details of the challenge and forthcoming competitions. A Scoping Workshop for this challenge was held on 30th May: http://ow.ly/oz6230pHlGl Find out more about the Defence and Security Interest Group at https://ktn-uk.co.uk/interests/defence-security Join the Defence and Security Interest Group at https://www.linkedin.com/groups/8584397 or Follow KTN_UK Defence group on Twitter https://twitter.com/KTNUK_Defence
Digital Security by Design: Formal Verification with Broad-Spectrum ANSI-C Re...
Digital Security by Design: Formal Verification with Broad-Spectrum ANSI-C Re...
KTN
Maturing software engineering knowledge through classifications
Maturing software engineering knowledge through classifications
immortalchhetri
Mathematical models and applicable technologies to forecast, analyze and optimize quality and risks for complex systems
Kost for china-2011
Kost for china-2011
Mathmodels Net
GiacomettiResume
GiacomettiResume
Paolo Giacometti
https://irjet.net/archives/V7/i3/IRJET-V7I3507.pdf
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET Journal
The Dynamic Software Product Line (DSPL) is becoming the system with high vulnerability and high confidentiality in which the adaptive security is a challenging task and critical for it to operate. Adaptive security is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. This paper presents a literature review of security adaptation approaches for DSPL, and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve. This work will be done following the Systematic Review approach. Our results concluded that the research field of security approaches for DSPL is still poor of methods and metrics for evaluating and comparing different techniques. The comparison reveals that the existing adaptive security approaches widely cover the information gathering. However, comparative approaches do not describe how to decide on a method for performing adaptive security DSPL or how to provide knowledge input for adapting security. Therefore, these areas of research are promising.
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
IJCSES Journal
Thesis on Model-In-The-Loop for Embedded System Testing.
Zander diss
Zander diss
Justyna Zander
Knowledge based systems have been developed to solve many problems. Their main characteristic consists on the use of a knowledge representation of a specific domain to solve problems in such a way that it emulates the reasoning of a human specialist. As conventional systems, knowledge based systems are not free of failures. This justifies the need for validation and verification for this class of systems. Due to the lack of techniques which can guarantee their quality and reliability, this paper proposes a process to support validation of specific knowledge bases. In order to validate the knowledge base, restriction rules are used. These rules are elicit and represented as If Then Not rules and executed using a backward chaining reasoning process. As the result of this process test cases are created and submitted to the knowledge base in order to prove whether there are inconsistencies in the domain representation. Two main advantages can be highlighted here: the use of restriction rules which are considered as meta-knowledge (these rules improve the knowledge representation power of the system) and a process that can generate useful test cases (test cases are usually difficult and expensive to be created).
Verification and validation of knowledge bases using test cases generated by ...
Verification and validation of knowledge bases using test cases generated by ...
Waqas Tariq
3 IGARSS2011_Pasolli_Final.pptx
3 IGARSS2011_Pasolli_Final.pptx
grssieee
German-Russian Conference „Life IT – IT meets Environmental and Sustainable Energy Technologies“ 15.-16.5.2009 University of Hagen
Kostogryzov 10.12.2009
Kostogryzov 10.12.2009
Mathmodels Net
PhD Lesson
LAS - System Biology Lesson
LAS - System Biology Lesson
LASircc
Testing has been an essential part of software development life cycle. Automatic test case and test data generation has attracted many researchers in the recent past. Test suite generation is the concept given importance which considers multiple objectives in mind and ensures core coverage. The test cases thus generated can have dependencies such as open dependencies and closed dependencies. When there are dependencies, it is obvious that the order of execution of test cases can have impact on the percentage of flaws detected in the software under test. Therefore test case prioritization is another important research area that complements automatic test suite generation in objects oriented systems. Prior researches on test case prioritization focused on dependency structures. However, in this paper, we automate the extraction of dependency structures. We proposed a methodology that takes care of automatic test suite generation and test case prioritization for effective testing of object oriented software. We built a tool to demonstrate the proof of concept. The empirical study with 20 case studies revealed that the proposed tool and underlying methods can have significant impact on the software industry and associated clientele.
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
CSCJournals
The main issues of the Intrusion Detection Systems (IDS) are in the sensitivity of these systems toward the errors, the inconsistent and inequitable ways in which the evaluation processes of these systems were often performed. Most of the previous efforts concerned with improving the overall accuracy of these models via increasing the detection rate and decreasing the false alarm which is an important issue. Machine Learning (ML) algorithms can classify all or most of the records of the minor classes to one of the main classes with negligible impact on performance. The riskiness of the threats caused by the small classes and the shortcoming of the previous efforts were used to address this issue, in addition to the need for improving the performance of the IDSs were the motivations for this work. In this paper, stratified sampling method and different cost-function schemes were consolidated with Extreme Learning Machine (ELM) method with Kernels, Activation Functions to build competitive ID solutions that improved the performance of these systems and reduced the occurrence of the accuracy paradox problem. The main experiments were performed using the UNB ISCX2012 dataset. The experimental results of the UNB ISCX2012 dataset showed that ELM models with polynomial function outperform other models in overall accuracy, recall, and F-score. Also, it competed with traditional model in Normal, DoS and SSH classes.
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
IJCNCJournal
The history of Artificial Intelligence and Machine Learning dates back to 1950’s. In recent years, there has been an increase in popularity for applications that implement AI and ML technology. As with traditional development, software testing is a critical component of an efficient AI/ML application. However, the approach to development methodology used in AI/ML varies significantly from traditional development. Owing to these variations, numerous software testing challenges occur. This paper aims to recognize and to explain some of the biggest challenges that software testers face in dealing with AI/ML applications. For future research, this study has key implications. Each of the challenges outlined in this paper is ideal for further investigation and has great potential to shed light on the way to more productive software testing strategies and methodologies that can be applied to AI/ML applications.
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
ijaia
Describes the integrated use of several common analytical informatics tools / platforms in the lab and the VM space to maximize access. It also describes a variety of customized additions including links to proprietary databases, barcode utilization, adding value to analytical data, and one stop shopping for data analysis / reporting. The impact is that the same FTEs can produce >3 fold more results!
Informatics Plenary Hayward Etal May2012
Informatics Plenary Hayward Etal May2012
Mark Hayward
27th August 2014. My presentation at SEAA 2014 (http://esd.scienze.univr.it/dsd-seaa-2014) about our a study on model-driven engineering approaches for engineering Wireless Sensor Networks (WSNs). Accompanying paper: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6928805 Abstract: Model-Driven Engineering (MDE) can be considered as the right tool to reduce the complexity of Wireless Sensor Network (WSN) development through its principles of abstraction, separation of concerns, reuse and automation. In this paper we present the results of a systematic mapping study we performed for providing an organized view of existing MDE approaches for designing WSNs. A total number of 780 studies were analysed; among them, we selected 16 papers as primary studies relevant for review. We setup a comparison framework for these studies, and classified them based on a set of common parameters. The main objective of our research is to give an overview about the state-of-the-art of MDE approaches dedicated to WSN design, and finally, discuss emerging challenges that have to be considered in future MDE approaches for engineering WSNs.
A Study on MDE Approaches for Engineering Wireless Sensor Networks
A Study on MDE Approaches for Engineering Wireless Sensor Networks
Ivano Malavolta
IEEE Projects 2012 software engineering Chennai, IEEE Projects 2012 software engineering Trichy, IEEE Projects 2012 software engineering Pondicherry, IEEE Projects 2012 software engineering Karaikal, IEEE Projects 2012 software engineering Vellore, IEEE Projects 2012 software engineering Tiruvannamalai, IEEE Projects 2012 software engineering Villupuram, IEEE Projects 2012 software engineering Kanchipuram
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
SBGC
AS_industrialNew
AS_industrialNew
Alena Simalatsar
What's hot
(19)
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Digital Security by Design: Formal Verification with Broad-Spectrum ANSI-C Re...
Digital Security by Design: Formal Verification with Broad-Spectrum ANSI-C Re...
Maturing software engineering knowledge through classifications
Maturing software engineering knowledge through classifications
Kost for china-2011
Kost for china-2011
GiacomettiResume
GiacomettiResume
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
Zander diss
Zander diss
Verification and validation of knowledge bases using test cases generated by ...
Verification and validation of knowledge bases using test cases generated by ...
3 IGARSS2011_Pasolli_Final.pptx
3 IGARSS2011_Pasolli_Final.pptx
Kostogryzov 10.12.2009
Kostogryzov 10.12.2009
LAS - System Biology Lesson
LAS - System Biology Lesson
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
Comprehensive Testing Tool for Automatic Test Suite Generation, Prioritizatio...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
Informatics Plenary Hayward Etal May2012
Informatics Plenary Hayward Etal May2012
A Study on MDE Approaches for Engineering Wireless Sensor Networks
A Study on MDE Approaches for Engineering Wireless Sensor Networks
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
AS_industrialNew
AS_industrialNew
Viewers also liked
A description of the requirements and the assessment and marking for the Software Engineering Large Practical.
Software Engineering Large Practical coursework
Software Engineering Large Practical coursework
Stephen Gilmore
Artificial Intelligent - Intelligence agent Agents and environments Rationality Intelligence Agent PEAS (Performance measure, Environment, Actuators, Sensors) Environment types Agent types
Intelligence Agent - Artificial Intelligent (AI)
Intelligence Agent - Artificial Intelligent (AI)
mufassirin
software engineering notes for cse/it fifth semester
software engineering notes for cse/it fifth semester
rajesh199155
Lecture1 AI1 Introduction to artificial intelligence
Lecture1 AI1 Introduction to artificial intelligence
Albert Orriols-Puig
This Presentation will give you an overview about Artificial Intelligence : definition, advantages , disadvantages , benefits , applications . We hope it to be useful .
Artificial Intelligence
Artificial Intelligence
u053675
This Lab Manual for Software Engineering Is strictly according to 7th Sem BPUT syllabus. And this one is specially designed for BEC students.
Software Engineering Lab Manual
Software Engineering Lab Manual
Neelamani Samal
The importance of software since there is were the motivation for software engineering lies and then and introduction to software engineering mentioning the concept and stages of development and working in teams
Introduction To Software Engineering
Introduction To Software Engineering
Leyla Bonilla
Viewers also liked
(7)
Software Engineering Large Practical coursework
Software Engineering Large Practical coursework
Intelligence Agent - Artificial Intelligent (AI)
Intelligence Agent - Artificial Intelligent (AI)
software engineering notes for cse/it fifth semester
software engineering notes for cse/it fifth semester
Lecture1 AI1 Introduction to artificial intelligence
Lecture1 AI1 Introduction to artificial intelligence
Artificial Intelligence
Artificial Intelligence
Software Engineering Lab Manual
Software Engineering Lab Manual
Introduction To Software Engineering
Introduction To Software Engineering
Similar to A survey of controlled experiments in software engineering
Wouldn't be great to have a single metric to measure the software architecture understandability for an Object-Oriented System.
Thesis Proposal Presentation
Thesis Proposal Presentation
Turki Alshammary (CBAP, PMI-PBA, PMP)
Technical report jada
Technical report jada
University of Bari (Italy)
Ijetcas14 438
Ijetcas14 438
Iasir Journals
My research proposal for my masters degree research project.
Carol Harstad Research Proposal
Carol Harstad Research Proposal
Carol Harstad
Software testing industry related
Software tetsing paper related to industry
Software tetsing paper related to industry
JavedKhan524377
A guide for research students to perform empirical research in software engineering.
Empirical research methods for software engineering
Empirical research methods for software engineering
sarfraznawaz
From previous year researches, it is concluded that testing is playing a vital role in the development of the software product. As, software testing is a single approach to assure the quality of the software so most of the development efforts are put on the software testing. But software testing is an expensive process and consumes a lot of time. So, testing should be start as early as possible in the development to control the money and time problems. Even, testing should be performed at every step in the software development life cycle (SDLC) which is a structured approach used in the development of the software product. Software testing is a tradeoff between budget, time and quality. Now a day, testing becomes a very important activity in terms of exposure, security, performance and usability. Hence, software testing faces a collection of challenges.
Importance of Testing in SDLC
Importance of Testing in SDLC
IJEACS
White paper loren k schwappach
White paper loren k schwappach
Loren Schwappach
The term “Ontology” derives from its usage in philosophy where it is defined as the study of “being” or “existence”- all kinds of entities, abstracts and concretes that make up the world.
Software engineering ontology and software testing
Software engineering ontology and software testing
Khushbu Patel
Software Engineering Ontology and Software Testing
Software Engineering Ontology and Software Testing