Software design patterns are well-known solutions for solving commonly occurring problems in software design. Detecting design patterns used in the code can help to understand the structure and behavior of the software, evaluate the quality of the software, and trace important design decisions. To develop and maintain a software system, we need sufficient knowledge of design decisions and software implementation processes. However, the acquisition of knowledge related to design patterns used in complex software systems is a challenging, time-consuming, and costly task. Therefore, using a suitable method to detect the design patterns used in the code reduces software development and maintenance costs. In this paper, we proposed a new method based on conceptual signatures to improve the accuracy of design pattern detection. So we used the conceptual signatures based on the purpose of patterns to detect the patterns’ instances that conform to the standard structure of patterns, and cover more instances of patterns’ variants and implementation versions of the patterns and improve the accuracy of pattern detection. The proposed method is a specific process in two main phases. In the first phase, the conceptual signature and detection formula for each pattern is determined manually. Then in the second phase, each pattern in the code is detected in a semi-automatic process using the conceptual signature and pattern detection formula. To implement the proposed method, we focused on GoF design patterns and their variants. We evaluated the accuracy of our proposed method on five open-source projects, namely, Junit v3.7, JHotDraw v5.1, QuickUML 2001, JRefactory v2.6.24, and MapperXML v1.9.7. Also, we performed our experiments on a set of source codes containing the instances of GoF design patterns’ variants for a comprehensive and fair evaluation. The evaluation results indicate that the proposed method has improved the accuracy of design pattern detection in the code.
This study deals with the neuro-fuzzy (NF) modelling of a real industrial winding process in which the acquired NF model can be exploited to improve control performance and achieve a robust fault-tolerant system. A new simulator model is proposed for a winding process using non-linear identification based on a recurrent local linear neuro-fuzzy (RLLNF) network trained by local linear model tree (LOLIMOT), which is an incremental tree-based learning algorithm. The proposed NF models are compared with other known intelligent identifiers, namely multilayer perceptron (MLP) and radial basis function (RBF). Comparison of our proposed non-linear models and associated models obtained through the least square error (LSE) technique (the optimal modelling method for linear systems) confirms that the winding process is a non-linear system. Experimental results show the effectiveness of our proposed NF modelling approach. 相似文献
The open quantum systems consisting of coupled and uncoupled asymmetric oscillators are considered with an initial quantum-dot trapped-ion coherent state. The quantum correlations between spatial modes of this trapped ion are examined to find their dependence on the temperature, asymmetric parameter, dissipation coefficient and the magnetic field. It is observed that the discord of the initial state is an increasing function of the asymmetric parameter and the magnetic field. Moreover, in the case of two uncoupled modes, entanglement and discord are decreasing functions of temperature and the dissipation coefficient. However, as the temperature and dissipation coefficient increase, the discord fades out faster. In the case of two coupled modes, as the temperature and dissipation coefficient increase, the sudden death of the entanglement and fade out of the discord happen sooner; moreover, as the magnetic field increases, the entanglement sudden death and the discord fade out time occur sooner. Also, with the increase in the asymmetric parameter, the entanglement sudden death is postponed. In addition, in the asymmetric system, appreciable discord can be created in the temperature range 0–10 K, while appreciable entanglement can be created in the temperature range 0–5 mK. Finally, it is observed that non-monotonic evolution of quantum correlations is due to coupling of modes. 相似文献
We address the problem of resource allocation for bag-of-tasks (BoT) workflows in a federation of clouds and formulate it as an integer linear programming problem. The proposed model minimizes financial cost including fees for running VMs and fees for data transfer, and fulfills deadline and resource constraints in the clouds. We also formulate the problem of BoT scheduling in the hybrid clouds, and compare the financial cost in the federation of clouds with that in the hybrid clouds. Moreover, this paper discusses sensitivity analysis to investigate stability in the related allocation problem. Numerical results show that the resource allocation in the federation is considerably preferred to that in the hybrid clouds in terms of stability and cost-saving. In this paper, we also propose an approach named GRASP-FC for obtaining an approximate optimal solution of BoT scheduling in the federation. GRASP-FC is an extension of greedy randomized adaptive search procedure (GRASP), and it can be of great interest from the computational points of view.
Technical trading rules can be generated from historical data for decision making in stock markets. Genetic programming (GP) as an artificial intelligence technique is a valuable method to automatically generate such technical trading rules. In this paper, GP has been applied for generating risk-adjusted trading rules on individual stocks. Among many risk measures in the literature, conditional Sharpe ratio has been selected for this study because it uses conditional value at risk (CVaR) as an optimal coherent risk measure. In our proposed GP model, binary trading rules have been also extended to more realistic rules which are called trinary rules using three signals of buy, sell and no trade. Additionally we have included transaction costs, dividend and splits in our GP model for calculating more accurate returns in the generated rules. Our proposed model has been applied for 10 Iranian companies listed in Tehran Stock Exchange (TSE). The numerical results showed that our extended GP model could generate profitable trading rules in comparison with buy and hold strategy especially in the case of risk adjusted basis. 相似文献
In this paper, a fuzzy expert system based on adaptive neuro‐fuzzy inference system (ANFIS) is introduced to assess the mortality after coronary bypass surgery. In preprocessing phase, the attributes were reduced using a univariant analysis in order to make the classifier system more effective. Prognostic factors with a p‐value of less than 0.05 in chi‐square or t‐student analysis were given to inputs ANFIS classifier. The correct diagnosis performance of the proposed fuzzy system was calculated in 824 samples. To demonstrate the usefulness of the proposed system, the study compared the performance of fuzzy system based on ANFIS method through the binary logistic regression with the same attributes. The experimental results showed that the fuzzy model (accuracy: 96.4%; sensitivity: 66.6%; specificity: 97.2%; and area under receiver operating characteristic curve: 0.82) consistently outperformed the logistic regression (accuracy: 89.4%; sensitivity: 47.6%; specificity: 89.4%; and area under receiver operating characteristic curve: 0.62). The obtained classification accuracy of fuzzy expert system was very promising with regard to the traditional statistical methods to predict mortality after coronary bypass surgery such as binary logistic regression model. 相似文献
Rapid and accurate estimation of Ground Cover (GC) at regional and global scales for agricultural management application is only possible by using remote sensing (RS). In this study, two Vegetation Indices (VIs) including the Perpendicular Vegetation Index (PVI) and Normalized Difference Vegetation Index (NDVI) were used for estimating GC. Since the parameters of the bare soil line have an important role in calculating GC based on PVI, this line was extracted based on the red-NIRmin (minimum near infrared) method with different intervals (0.0001, 0.0005, and 0.0010). In addition to traditional statistics such as Root Mean Square Error (RMSE), the sensitivity analysis (S) was also used to sharpen the accuracy of the models' estimations. The results indicated that the PVI-based method, in contrast to the NDVI-based approach, had a better performance in estimating GC of wheat. The highest correlation between the observed GC and the estimated GC based on PVI method was achieved in interval length of 0.0005 (R2 = 0.91) with RMSE equal to 8.82. This regression line (GCEST = -3.47 + 0.96 GCOBS) was not significantly different from the 1:1 line. As expected, the best estimation was achieved when the sensitivity of estimated GC based on PVI (length of the interval: 0.0005) was almost constant and low compared to the other models. 相似文献
We construct two optimal Newton–Secant like iterative methods for solving nonlinear equations. The proposed classes have convergence order four and eight and cost only three and four function evaluations per iteration, respectively. These methods support the Kung and Traub conjecture and possess a high computational efficiency. The new methods are illustrated by numerical experiments and a comparison with some existing optimal methods. We conclude with an investigation of the basins of attraction of the solutions in the complex plane. 相似文献
Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is copy-move digital image forgery, which involves copying one part of the image onto another area of the same image. Various methods have been proposed to detect copy-move forgery that uses different types of transformations. The goal of this paper is to determine which copy-move forgery detection methods are best for different image attributes such as JPEG compression, scaling, rotation. The advantages and drawbacks of each method are also highlighted. Thus, the current state-of-the-art image forgery detection techniques are discussed along with their advantages and drawbacks. 相似文献