A novel approach for the next software release using a binary artificial algae algorithm

2020 ◽  
pp. 1-15
Author(s):  
Poria Pirozmand ◽  
Ali Ebrahimnejad ◽  
Hamidreza Alrezaamiri ◽  
Homayun Motameni

In software incremental development methodology, the product develops in several releases. In each release, one set of the requirements is suggested for development. The development team must select a subset of the proposed requirements for development in the next release such that by consideration the limitation of the problem provides the highest satisfaction to the customers and the lowest cost to the company. This problem is known as the next release problem. In complex projects where the number of requirements is high, development teams cannot choose an optimized subset of the requirements by traditional methods, so an intelligent algorithm is required to help in the decision-making process. The main contributions of this study are fivefold: (1) The customer satisfaction and the cost of every requirement are determined by use of fuzzy numbers because of the possible changing of the customers’ priorities during the product development period; (2) An improved approximate approach is suggested for summing fuzzy numbers of different kinds, (3) A new metaheuristic algorithm namely the Binary Artificial Algae Algorithm is used for choosing an optimized subset of requirements, (4) Experiments performed on two fuzzy datasets confirm that the resulted subsets from the suggested algorithm are free of human mistake and can be a great guidance to development teams in making decisions.

Author(s):  
Rimsha Umer ◽  
Muhammad Touqeer ◽  
Abdullah Hisam Omar ◽  
Ali Ahmadian ◽  
Soheil Salahshour ◽  
...  

AbstractThe Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is considered among the most frequently used techniques to deal with multi-criteria group decision-making (MCGDM) conflicts. In this article, we have presented an extended TOPSIS technique in the framework of interval type-2 trapezoidal Pythagorean fuzzy numbers (IT2TrPFN). We first projected a novel approach to evaluate the distance between them using ordered weighted averaging operator and $$(\alpha ,\beta )$$ ( α , β ) -cut. Subsequently, we widen the concept of TOPSIS method formed on the distance method with IT2TrPFNs and applied it on MCGDM dilemma by considering the attitudes and perspectives of the decision-makers. Lastly, an application of solar tracking system and numerous contrasts with the other existing techniques are presented to express the practicality and feasibility of our projected approach.


Complexity ◽  
2019 ◽  
Vol 2019 ◽  
pp. 1-20
Author(s):  
Paulo A. M. Barbosa ◽  
Plácido R. Pinheiro ◽  
Francisca R. V. Silveira ◽  
Marum Simão Filho

During the software development process, the decision maker (DM) must master many variables inherent in this process. Software releases represent the order in which a set of requirements is implemented and delivered to the customer. Structuring and enumerating a set of releases with prioritized requirements represents a challenging task because the requirements contain their characteristics, such as technical precedence, the cost required for implementation, the importance that one or more customers add to the requirement, among other factors. To facilitate this work of selection and prioritization of releases, the decision maker may adopt some support tools. One field of study already known to solve this type of problem is the Search-Based Software Engineering (SBSE) that uses metaheuristics as a means to find reasonable solutions taking into account a set of well-defined objectives and constraints. In this paper, we seek to increase the possibilities of solving the Next Release Problem using the methods available in Verbal Decision Analysis (VDA). We generate a problem and submit it so that the VDA and SBSE methods try to resolve it. To validate this research, we compared the results obtained through VDA and compared with the SBSE results. We present and discuss the results in the respective sections.


Author(s):  
Denghong Xiao ◽  
Tian He ◽  
Xiandong Liu ◽  
Yingchun Shan

A novel approach of locating damage in welded joints is proposed based on acoustic emission (AE) beamforming, which is particularly applicable to complex plate-like structures. First, five AE sensors used to obtain AE signals generated from damage are distributed on the surface of the structure in a uniform line array. Then the beamforming method is adopted to detect the weld joints in the area of interest rather than all the points of the whole structure, and to determine the location and obtain information of AE sources. In order to study the ability of the proposed method more comprehensively, a rectangular steel tube with welded joints is taken for the pencil-lead-broken test. The localization results indicate that the proposed localization approach can effectively localize the failure welded joints. This improvement greatly reduces the cost of computation and also improves the efficiency of localization work compared with the traditional beamforming.


2021 ◽  
Vol 1 (1) ◽  
pp. 32-50
Author(s):  
Nan Wang ◽  
Sid Chi-Kin Chau ◽  
Yue Zhou

Energy storage provides an effective way of shifting temporal energy demands and supplies, which enables significant cost reduction under time-of-use energy pricing plans. Despite its promising benefits, the cost of present energy storage remains expensive, presenting a major obstacle to practical deployment. A more viable solution to improve the cost-effectiveness is by sharing energy storage, such as community sharing, cloud energy storage and peer-to-peer sharing. However, revealing private energy demand data to an external energy storage operator may compromise user privacy, and is susceptible to data misuses and breaches. In this paper, we explore a novel approach to support energy storage sharing with privacy protection, based on privacy-preserving blockchain and secure multi-party computation. We present an integrated solution to enable privacy-preserving energy storage sharing, such that energy storage service scheduling and cost-sharing can be attained without the knowledge of individual users' demands. It also supports auditing and verification by the grid operator via blockchain. Furthermore, our privacy-preserving solution can safeguard against a majority of dishonest users, who may collude in cheating, without requiring a trusted third-party. We implemented our solution as a smart contract on real-world Ethereum blockchain platform, and provided empirical evaluation in this paper 1 .


2019 ◽  
Vol 22 (64) ◽  
pp. 63-84
Author(s):  
JanapatyI Naga Muneiah ◽  
Ch D V SubbaRao

Enterprises often classify their customers based on the degree of profitability in decreasing order like C1, C2, ..., Cn. Generally, customers representing class Cn are zero profitable since they migrate to the competitor. They are called as attritors (or churners) and are the prime reason for the huge losses of the enterprises. Nevertheless, customers of other intermediary classes are reluctant and offer an insignificant amount of profits in different degrees and lead to uncertainty. Various data mining models like decision trees, etc., which are built using the customers’ profiles, are limited to classifying the customers as attritors or non-attritors only and not providing profitable actionable knowledge. In this paper, we present an efficient algorithm for the automatic extraction of profit-maximizing knowledge for business applications with multi-class customers by postprocessing the probability estimation decision tree (PET). When the PET predicts a customer as belonging  to any of the lesser profitable classes, then, our algorithm suggests the cost-sensitive actions to change her/him to a maximum possible higher profitable status. In the proposed novel approach, the PET is represented in the compressed form as a Bit patterns matrix and the postprocessing task is performed on the bit patterns by applying the bitwise AND operations. The computational performance of the proposed method is strong due to the employment of effective data structures. Substantial experiments conducted on UCI datasets, real Mobile phone service data and other benchmark datasets demonstrate that the proposed method remarkably outperforms the state-of-the-art methods.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 8010
Author(s):  
Ismail Butun ◽  
Yusuf Tuncel ◽  
Kasim Oztoprak

This paper investigates and proposes a solution for Protocol Independent Switch Architecture (PISA) to process application layer data, enabling the inspection of application content. PISA is a novel approach in networking where the switch does not run any embedded binary code but rather an interpreted code written in a domain-specific language. The main motivation behind this approach is that telecommunication operators do not want to be locked in by a vendor for any type of networking equipment, develop their own networking code in a hardware environment that is not governed by a single equipment manufacturer. This approach also eases the modeling of equipment in a simulation environment as all of the components of a hardware switch run the same compatible code in a software modeled switch. The novel techniques in this paper exploit the main functions of a programmable switch and combine the streaming data processor to create the desired effect from a telecommunication operator perspective to lower the costs and govern the network in a comprehensive manner. The results indicate that the proposed solution using PISA switches enables application visibility in an outstanding performance. This ability helps the operators to remove a fundamental gap between flexibility and scalability by making the best use of limited compute resources in application identification and the response to them. The experimental study indicates that, without any optimization, the proposed solution increases the performance of application identification systems 5.5 to 47.0 times. This study promises that DPI, NGFW (Next-Generation Firewall), and such application layer systems which have quite high costs per unit traffic volume and could not scale to a Tbps level, can be combined with PISA to overcome the cost and scalability issues.


Author(s):  
Madhukar R. Mahishi ◽  
M. S. Sadrameli ◽  
Sanjay Vijayaraghavan ◽  
D. Y. Goswami

Hydrogen yield of conventional biomass gasification is limited by chemical equilibrium constraints. A novel technique that has the potential to enhance the hydrogen yield by integrating the gasification and absorption reactions has been suggested. The method involves gasification of biomass in presence of a CO2 sorbent. Ethanol was used as the model biomass compound and CaO was the representative sorbent. Equilibrium modeling was used to determine the product gas composition and hydrogen yield. The analysis was done using ASPEN PLUS software (version 12.1) and the Gibbs energy minimization approach was followed. The effects of temperature, pressure, steam/ethanol ratio, and CaO/ethanol ratio on product yield were investigated. Three case studies were conducted to understand the effect of sorbent addition on the hydrogen yield. Thermodynamic studies showed that the use of sorbents has the potential to enhance the equilibrium hydrogen yield of conventional gasification by ∼19% and reduce the equilibrium CO2 content of product gas by 50.2%. It was also found that the thermodynamic efficiency of sorbent-enhanced gasification (72.1%) was higher than conventional gasification (62.9%). Sorbent-enhanced gasification is a promising technology with a potential to improve the yield and lower the cost of hydrogen production.


Author(s):  
Shawn D. Sarbacker ◽  
Kosuke Ishii

Abstract This paper presents a novel framework for evaluating risk in innovative product design and development, and a product development methodology for risk identification and management. We define “risk” as the exposure to the chance of an unsuccessful product development outcome due to ambiguity and uncertainty. We examine uncertainties in the company’s ability to identify, design, develop, manufacture, and market products that customers desire resulting in an acceptable return for the company. Based on a basic model of innovative product development, our framework identifies three dimensions of risk in product development: Envisioning Risk, Design Risk, and Execution Risk. The risk framework points out the criticality of the engineering design activity and of the interdependencies between all facets of the organization in executing innovative product development. This paper also presents a qualitative methodology, based on the risk framework, that may be used by development teams for identification of risk and eliciting risk management solutions.


2022 ◽  
Vol 11 (1) ◽  
pp. 0-0

In this study, a fuzzy cooperative continuous static game (PQFCCSG) with n players having fuzzy parameters in all of the cost functions and the right- hand-side of constraints is characterized. Their fuzzy parameters are represented by piecewise quadratic fuzzy numbers. The α-pareto optimal solution concept is specified. In addition, the stability sets of the first and second kind without differentiability are conceptualized and established. An illustrated numerical example is discussed for proper understanding and interpretation of the proposed concept.


Author(s):  
Muhammad Wasim Bhatti ◽  
Ali Ahsan

Global software development, an emerging software development methodology within a technology-enabled environment has recently received increased attention from scholars and practitioners. Despite the fact that the lack of effective communication is a major challenge of globally distributed teams, communication research related to the scale development is still very limited in existing literature. Considering the communication challenges and increasing need to measure the effectiveness of communication, this research is focused to develop a scale for “Effective Communication” for globally distributed software development teams. Systematic literature review is performed to identify the best practices of effective communication for the development of “Effective Communication” scale. A questionnaire survey consisting of 29 items is administered in globally distributed software development teams. Confirmatory factor analysis and statistical results depicted that the four-factor model (e.g. stakeholders' involvement, acculturation, usage of appropriate tools and technology, and information availability) is more parsimonious and an optimal model fit.


Sign in / Sign up

Export Citation Format

Share Document