ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2018, Volume 2

دانلود کتاب محاسبات پیشرفته و مهندسی هوشمند: مجموعه مقالات ICACIE 2018، جلد 2

Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2018, Volume 2

مشخصات کتاب

Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2018, Volume 2

ویرایش: 1 
نویسندگان: , , ,   
سری: Advances in Intelligent Systems and Computing (1089) 
ISBN (شابک) : 9811514828, 9789811514821 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 584 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 23 مگابایت 

قیمت کتاب (تومان) : 51,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2018, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب محاسبات پیشرفته و مهندسی هوشمند: مجموعه مقالات ICACIE 2018، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب محاسبات پیشرفته و مهندسی هوشمند: مجموعه مقالات ICACIE 2018، جلد 2



این کتاب مقالات تحقیقاتی با کیفیت بالا ارائه شده در سومین کنفرانس بین المللی محاسبات پیشرفته و مهندسی هوشمند (ICACIE 2018) را گردآوری می کند. این شامل بخش هایی است که پیشرفت های فنی و آخرین تحقیقات در زمینه های محاسبات و مهندسی هوشمند را توصیف می کند. این مجموعه برای دانشجویان فارغ التحصیل و محققانی که در رشته‌های علوم و مهندسی کامپیوتر کار می‌کنند، در نظر گرفته شده است، چرا که آنها فناوری‌های سخت‌افزاری و فناوری‌های ارتباطی آینده را پوشش می‌دهند.


توضیحاتی درمورد کتاب به خارجی

This book gathers high-quality research papers presented at the 3rd International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2018). It includes sections describing technical advances and the latest research in the fields of computing and intelligent engineering. Intended for graduate students and researchers working in the disciplines of computer science and engineering, the proceedings will also appeal to researchers in the field of electronics, as they cover hardware technologies and future communication technologies.



فهرست مطالب

Preface
About This Book
Contents
About the Editors
Advanced Electronics Applications-I
Design and Analysis of Slotted Microstrip Patch Antenna Using DGS for S Band
	1 Introduction
	2 Proposed Antenna Design
	3 Results and Discussion
	4 Conclusion
	References
Current Control of a CHB Multilevel Inverter Using PR and Adaptive Fuzzy PI Controller: A Comparison
	1 Introduction
	2 Multilevel Inverter
		2.1 Modeling of Inverter
	3 Control Technique
	4 Proportional Resonant (PR) Controller
	5 Adaptive Fuzzy PI Controller
	6 Result
	7 Result Analysis
	8 Conclusion
	References
Pyramid Entropy Source for True Random Number Generator on FPGA
	1 Introduction
	2 Proposed Methodology
		2.1 Harvesting Mechanism
		2.2 Post-Processing
	3 Results and Discussion
		3.1 Entropy Analysis
		3.2 NIST SP 800-22 Battery of Test
		3.3 Restart Experiment
		3.4 Resource Utilization
		3.5 Throughput Analysis
	4 Conclusion
	References
A Multi-objective Approach to Study the Effects of Ball Race Conformity on Optimum Design of Rolling Element Bearing Using Metaheuristics
	1 Introduction
	2 Bearing Macro-geometry
		2.1 Objective Function
		2.2 Bearing Life Prediction
		2.3 Life Ratio of Bearing
		2.4 Life Factor of Bearing
		2.5 Series System Reliability
		2.6 Life Factors and L10m Life of Bearing
		2.7 Synthesis of Multi-objective Function
		2.8 Synthesis of Design Variables
	3 Optimization Algorithm (PSO)
	4 Constraint Handling
	5 Outcomes and Analysis
	6 Conclusions
	References
Design and Analysis of Higher-Order Sigma Delta Modulator
	1 Introduction
	2 Quantization
	3 Order of the Modulator
	4 Higher-Order NTF
	5 Conclusion
	References
A New Variant of MTF-TRANS List Accessing Hybrid Algorithm
	1 Introduction
		1.1 List Accessing Cost Model
		1.2 List Accessing Algorithm
		1.3 Related Work
		1.4 Our Contribution
	2 Analysis of Existing Algorithms
		2.1 Analysis of MTF Algorithm
		2.2 Analysis of TRANS Algorithm
	3 Our Approach
		3.1 Hybrid Algorithm
		3.2 Illustration of Hybrid Algorithm
	4 Experimental Analysis
		4.1 Experimental Result
	5 Conclusion
	References
Design and Implementation of a Factorial Circuit for Binary Numbers: An AVM-Based VLSI Computing Approach
	1 Introduction
	2 The Urdhva-Tiryagbhyam Sutra: Factorial of Binary Numbers
	3 The Factorial Circuit
	4 Execution Environment
	5 Result Analysis
	6 Conclusion
	References
Current Perspectives and Advancements of Perovskite Photovoltaic Cells
	1 Introduction
	2 Perovskite Solar Cells
		2.1 Architecture
	3 Conclusion
	References
Advanced Electronics Applications-II
J1939 Functionality Development in Diagnostic Event Manager Module Based on AUTOSAR 4.2.1
	1 Introduction
	2 J1939 Functionalities in Diagnostic Event Manager Module
	3 Design
	4 Configuration
	5 Results
	6 Conclusion
	References
Design and Investigation of Compact Microstrip Patch Array Antennas for Narrowband Applications
	1 Introduction
	2 Structure of Antenna
		2.1 Antenna A
		2.2 Antenna B
		2.3 Antenna C
	3 Comparative Result Analysis
	4 Conclusion
	References
Multi-verse Optimizer for Dynamic Stability Analysis Using STATCOM and Power System Stabilizer
	1 Introduction
	2 Significance Role of STATCOM and PSS
	3 Basic Concept of Multi-verse Optimizer
	4 Proposed Flowchart-Based MVO Solving Optimal Power Flow
	5 Results and Discussions
	6 Conclusion
	References
Performance Analysis of a Coordinated PID- and UPFC-Based Stabilizer for Stability Improvement
	1 Introduction
	2 Problem Identification
		2.1 PID Controller
		2.2 Error Minimization Technique
		2.3 Unified Power Flow Controller
		2.4 Single Generator Connected with Infinite Bus System
		2.5 Two-Generator Six-Bus System
	3 Methodology
		3.1 Genetic Algorithm
		3.2 Ant Colony Optimization
	4 Results
		4.1 Results for SMIB
		4.2 Results for Two-Machine System
	5 Conclusion
	References
Design of Low Power Reduced Complexity Wallace Tree Multiplier Using Positive Feedback Adiabatic Logic
	1 Introduction
	2 Designs and Implementation of Wallace Tree Multiplier
		2.1 Carry-Save Adder
		2.2 Wallace Tree Multiplier
		2.3 Reduced Complexity Wallace Tree Multiplier
	3 Adiabatic Logic
	4 Results and Discussions
	5 Conclusions and Future Scope
	References
Low-Power 8-Bit Adiabatic Barrel Shifter for DSP Applications
	1 Introduction
	2 Design and Implementation
		2.1 PFAL Multiplexer
		2.2 Barrel Shifter
	3 Results and Discussion
	4 Conclusions
	References
High-Speed Loop Unrolled Grain Architecture in Reconfigurable Hardware
	1 Introduction
	2 Related Work
	3 Grain Hardware
	4 Grain Hardware Core
	5 Grain Acceleration
	6 Processor to Grain Core Communication
		6.1 FSL Bus
	7 FSL Interface Design
	8 Result and Implementation
	9 Conclusion
	References
Cloud Computing, IoT, and Bigdata
Automated Red Lesion Detection:  An Overview
	1 Introduction
		1.1 Motivation
		1.2 Background
	2 General Red Lesion Detection Procedure
	3 Microaneurysm Detection
		3.1 Mathematical Morphology
		3.2 Filtering
		3.3 Pixel Classification
		3.4 Miscellaneous Approaches
	4 Hemorrhage Detection
		4.1 Morphological Processing
		4.2 Filters
		4.3 Miscellaneous Approaches
	5 Retinal Image Databases
	6 Performance Measures
	7 Comparison of Red Lesion Detection Algorithms
	8 Conclusions and Future Research Directions
	References
Enhanced Performance of Android Application Using RecyclerView
	1 Introduction
	2 Related Works
	3 Proposed Methodology
		3.1 Application Model
		3.2 Application Overview
	4 RecyclerView Reusing Algorithm
		4.1 System Implementation
	5 Comparison Between RecyclerView and ListView
		5.1 RecyclerView
		5.2 ListView
		5.3 ListView Architecture
	6 Results and Performance Analysis
		6.1 Memory Usage
		6.2 CPU Usage
	7 Conclusion and Future Work
	References
Personalized Web Search
	1 Introduction
		1.1 Literature Survey
		1.2 Motivation
	2 Problem Definition
	3 Design
		3.1 User Interface
		3.2 Servlets
		3.3 Database
		3.4 Steps in the Design Process
		3.5 Result Analysis
	4 Conclusion
	5 Future Work
	References
Cooperative Game Theory-Based Request Distribution Model in Federated Cloud Environment
	1 Introduction
	2 Request Distribution Model
		2.1 Federated Cloud
		2.2 Problem Statement
		2.3 Proposed Model
		2.4 Evaluation Parameter
	3 Analysis and Discussion
	4 Conclusion and Future Directions
	References
A Monarch Butterfly Optimization Approach to Dynamic Task Scheduling
	1 Introduction
	2 Problem Definition
	3 Proposed Methodology
		3.1 Monarch Butterfly Optimization (MBO)
		3.2 Population Initialization
		3.3 Shifting Operator
		3.4 Adjusting Operator
		3.5 Scheduling Using Genetic Algorithm
	4 Result and Analysis
	5 Conclusion
	References
Automation of Traffic Violation Detection and Penalization
	1 Introduction
	2 Literature Survey
		2.1 Automatic Traffic Violation
		2.2 Object Detection
		2.3 Vehicle Speed Calculation
		2.4 Text Extraction and Recognition
	3 Proposed Work
		3.1 System Architecture
		3.2 Traffic Violation Detection Algorithm
		3.3 Object Detection Algorithm
		3.4 Text Localization and Analysis Algorithm
	4 Implementation Details and Result
		4.1 Helmet Detection
		4.2 Text Localization
		4.3 Text Recognition
	5 Conclusion and Future Work
	References
Secure Big Data Deduplication with Dynamic Ownership Management in Cloud Computing
	1 Introduction
	2 Related Work
		2.1 Deduplication Over Encrypted Big Data
		2.2 Data Ownership Verification
	3 Problem Statement
		3.1 System Model
		3.2 Preliminaries
		3.3 Definitions
		3.4 Design Goals
	4 Construction of Proposed Scheme
		4.1 System Setup
		4.2 Data Upload
		4.3 Data Deduplication
		4.4 Dynamic Ownership Verification
		4.5 Data Retrieval
	5 Security Analysis
		5.1 Correctness
		5.2 Data Privacy
		5.3 Data Deduplication
		5.4 User Authorization
	6 Performance Analyses
		6.1 Signature Generation
		6.2 Signature Verification
		6.3 Encryption
		6.4 Decryption
	7 Conclusion
	References
Characterization of Range for Smart Home Sensors Using Tsallis\' Entropy Framework
	1 Introduction
	2 Problem Statement
	3 Proposed Model
	4 Parameter Estimation
	5 Results and Discussion
	6 Conclusion and Future Work
	References
Call Data Analytics Using Big Data
	1 Introduction
	2 Related Work
	3 Big Data Analytics (BDA)
	4 Call Data Analytics
		4.1 Conversion of Call Data and Data Storage
		4.2 Analysis of Call Data
		4.3 Reports on Customer’s Experience
	5 Implementation
	6 Conclusion
	References
Lightweight, Scalable and Secure Middleware for Service-Centric Context-Aware Applications
	1 Introduction
	2 Related Work
	3 The Proposed Data Transfer Model
		3.1 System Architecture
		3.2 Raspberry Pi
		3.3 Node.js
		3.4 Rule Engine Module
		3.5 Security Strategy for Data Transfer Using Bcrypt
		3.6 JavaScript Object Notation (JSON)
		3.7 Listener Module
		3.8 Filter Module
		3.9 Query Agent
		3.10 Push Function
		3.11 Server-Sent Events (SSE)
	4 Results and Discussion
		4.1 Simulation Environment
		4.2 CPU Utilization Graph
		4.3 Memory Utilization Graph
		4.4 Encryption + SSE
	5 Conclusion
	References
Security Issues in IoT and their Countermeasures in Smart City Applications
	1 Introduction
	2 IoT Applications in Smart City
	3 Security Issues with IoT Applications in Smart City
		3.1 IoT Attackers in Smart City Applications
		3.2 Security Issues with IoT Devices
		3.3 Security Issues in IoT Infrastructure
		3.4 Security Issues in IoT Architectural Layer
	4 Security Requirements for Cloud Platforms
	5 Threat Types and Their Countermeasures in Smart City
		5.1 Services and Secure Solution in Smart Cities
		5.2 Attacks in Different Layers of IoT with Their Countermeasures
	6 Conclusion
	References
An Efficient Approach for Running Multimedia Applications Using Mobile Cloud Computing
	1 Introduction
		1.1 Motivation
		1.2 Contribution
	2 Related Work
	3 System Architecture
	4 Conclusion
	References
A Comparative Study of Task Scheduling Algorithm in Cloud Computing
	1 Introduction
		1.1 Motivation
		1.2 Contribution
	2 Immediate Mode Heuristics
	3 Batch Mode Heuristics
	4 Experimental Setup
	5 Analysis of Different Heuristics
	6 Conclusions
	References
Offer Based Auction Mechanism for Virtual Machine Allocation in Cloud Environment
	1 Introduction
	2 Related Work
	3 Proposed Auction Mechanism for VM Allocation
		3.1 Traditional VM Allocation Policy
		3.2 Auction-Based VM Allocation Policy
		3.3 Combinatorial Auction VM Allocation Policy
		3.4 CA-LP VM Allocation Policy
		3.5 Modified CA-GREEDY VM Allocation Policy
	4 Simulation Results and Discussion
	5 Conclusion
	References
IoT-Based Cardiac Arrest Prediction Through Heart Variability Analysis
	1 Introduction
		1.1 Heart Rate Variability
		1.2 Arrhythmias
		1.3 Cardiac Arrest
		1.4 Machine Learning
	2 Proposed Method
		2.1 Proposed System
		2.2 Datasets
		2.3 Features
		2.4 Labels
		2.5 Accuracy
		2.6 Experimental Protocol
	3 Results and Discussion
		3.1 Accuracy of Random Forest Versus SVM
		3.2 Precision, Recall, and F-Score Evaluation
	4 Conclusion
	References
Advanced Computer Networks
Application of Group Mobility Model for Ad Hoc Network
	1 Introduction
	2 Reference Point Group Mobility Model
		2.1 Advantage RPGM Model
		2.2 Disadvantage of RPGM Model
		2.3 Applications of RPGM Model
	3 Reference Region Group Mobility Model
		3.1 Advantage of RRGM Model
		3.2 Application of RRGM Model
	4 Structured Group Mobility Model
		4.1 Advantage of SGM Model
		4.2 Disadvantage of SGM Model
		4.3 Applications of SGM Model
	5 Virtual Track-Based Group Mobility Model
		5.1 Advantage of VTGM
		5.2 Application of VTGM Model
	6 Discussion Analysis
	7 Conclusion and Future Work
	References
A PSO-Based Approach for Improvement in AODV Routing for Ad Hoc Networks
	1 Introduction
	2 Overview
		2.1 Introduction of AODV Protocol
		2.2 Particle Swarm Optimization
		2.3 QoS
	3 Proposed Methodology
	4 Simulation Parameters
	5 Results
	6 Conclusion
	References
Health Monitoring Planning for On-Board Ships Through Flying Ad Hoc Network
	1 Introduction
		1.1 Flying Ad Hoc Network
		1.2 Wireless Body Area Network
	2 Literature Survey
	3 Proposed System Frameworks
	4 Case Study
	5 Application Scenario for Monitoring On-Board Ships with WSN and FANETs
	6 Conclusion
	References
Performance Evaluation of MAC Protocols with Static and Dynamic Duty Cycle in WSNs
	1 Introduction
	2 Related Work
	3 Problem Statement and D2CMAC Protocol
	4 Simulation and Results Analysis
		4.1 Simulation Environment and Topology Setting
		4.2 Parameter Configuration
		4.3 Analysis of Experimental Results
	5 Conclusion
	References
Bandwidth Enhancement of Microstrip Array in Wireless Communication with Optimized Geometry
	1 Introduction
	2 Antenna Array Design
	3 Optimization Using GA
	4 Result and Discussion
	5 Conclusion
	References
QoS Optimization of Wireless Sensor Network for Large Foodgrain Warehouse Monitoring Using NS-2
	1 Introduction
	2 Related Work
	3 WSN Infrastructure for Foodgrain Warehouse
	4 Simulation Scenario
		4.1 Performance Metrics
		4.2 Basic Simulation Experiments
		4.3 Study of Energy Consumption
	5 Network Scenario for Foodgrain Warehouse Monitoring
	6 Conclusion
	References
Monitoring and Analysis of Power Quality Issues in Distribution Network—A Case Study
	1 Introduction
	2 Power Quality Improvement
		2.1 Control Methods of DVR
	3 Monitoring and Analysis of Power Quality Parameters: A Case Study
		3.1 Results
		3.2 Distortion Index Calculations
	4 Conclusions
	References
Vulnerability Analysis of Real-Time Operating Systems for Wireless Sensor Networks
	1 Introduction
	2 Literature Review
		2.1 Security Threats in Connected Cars
		2.2 RTOS Security
	3 Design and Implementation
		3.1 The OSEK/VDX Architecture
		3.2 Implementation
	4 Results and Analysis
		4.1 The Base Application
		4.2 Buffer Overflow
		4.3 Stack Overflow
		4.4 The Timer Storm Attack
		4.5 The Interrupt Storm Attack
	5 Conclusion and Future Scope
	References
Performance Evaluation  of Delay-Tolerant Routing  Protocols on Bangladesh Map
	1 Introduction
	2 Brief Discussion of DTN Routing Protocols
		2.1 Epidemic
		2.2 Prophet
		2.3 MaxProp
		2.4 SNW
		2.5 SNF
	3 Simulation Tool and Environmental Setting
		3.1 OpenJump and WKT Format
		3.2 ONE Simulator
		3.3 Simulation Environment Setting
	4 Result and Discussion
		4.1 Evaluation on Delivery Probability
		4.2 Evaluation on Average Delay
		4.3 Evaluation on Overhead Ratio
		4.4 Analysis on Number of Contacts for Varying Message Copies
		4.5 Analysis on Number of Contacts for Varying Mobile Nodes
	5 Conclusion
	References
Upgraded Proportional Integral (UPI): An Active Queue Management Technique for Enhancing MANET’s Performance
	1 Introduction
	2 Related Work
		2.1 Overall Inference and Motivation
	3 Proposed Algorithm
	4 Simulation and Performance Analysis
		4.1 Simulation Parameter
	5 Conclusion
	References
An Efficient Selection Procedure with an Enhanced Load-Balancing Scheme for GridSim
	1 Introduction
	2 GridSim
		2.1 Grid Topology
		2.2 Related Work
	3 The Proposed Scheme: Load Balancing on Enhanced GridSim with Deadline Control
	4 Simulated Results
		4.1 Parameters
		4.2 Performance Evaluation
	5 Conclusion
	References
Advanced Algorithms 	and Software Engineering
Designing a BYOD Supported Formative Learning Interface and Analysis  of Classroom Interaction
	1 Introduction
		1.1 Audience Response Systems
		1.2 Attention and Usage Monitoring
		1.3 Learning Assistance
	2 Implementation Plan
	3 Advantages and Disadvantages
		3.1 Familiarity with Devices
		3.2 Student\'s Affinity to the Device Will Be Utilized Devices
		3.3 Current Technology Helps Assimilating Content Easier
		3.4 Distraction from Other Application in the Device
		3.5 Security Concerns
	4 Conclusion
	References
Factors Affecting Sprint Effort Estimation
	1 Introduction
	2 Agile Effort Estimation
	3 Sprint Effort Estimation
	4 Discussion
	5 Future Works
	6 Conclusion
	References
Mauritius as a Smart Tourism Destination: Technology for Enhancing Tourism Experience
	1 Introduction
	2 Background and Context of Study—The Mauritian Tourism Sector
		2.1 Mauritius as ICT Hub
	3 Literature Review
		3.1 Smart Tourism Concept
		3.2 Smart Tourism versus E-Tourism
		3.3 ICT Tools for Destination Management
		3.4 Technology and Tourists Buying Behaviour
		3.5 The Mega Trends in Mauritian Hospitality
		3.6 Tourism Destination, Competitiveness and Technological Advancement
		3.7 Challenges of Smart Tourism for SIDS
		3.8 Research Method
	4 Analysis and Findings
		4.1 Government Involvement and Smart Tourism
		4.2 ICT Readiness and Tourism Competitiveness Index
		4.3 Analysing Some Smart Tourism Metrics
		4.4 Development of Smart Apps for the Tourism Industry
		4.5 Smart Living in Tourism: Case Study of Azuri Mauritius
		4.6 Policy Implications
		4.7 Recommendations for Tourism Sector
	5 Conclusion
	References
A Review of Machine Learning Techniques for Software Quality Prediction
	1 Introduction
	2 Machine Learning Approaches to Software Quality Prediction
		2.1 Evolutionary Computing Technique-Based Approaches
		2.2 Artificial Neural Network (ANN)-Based Approaches
		2.3 Bayesian Network (BN) for Software Quality Prediction
		2.4 Fuzzy Logic-Based Prediction Models
		2.5 Decision Tree (DT) Approach for Quality Prediction Model
		2.6 Support Vector Machine (SVM)-Based Prediction Models
		2.7 Case-Based Reasoning for Quality Prediction Model
	3 Conclusion and Future Work
	References
Investigating Determinants of Profitability of Commercial Firms: Rough Set Analysis
	1 Introduction
	2 Preliminaries
		2.1 Rough Sets
		2.2 Artificial Neural Network
	3 Methodology
	4 Results
		4.1 First Reduct: α γ ζ η β
		4.2 Second Reduct: α γ ζ η ε
		4.3 Third Reduct: α γ ζ η δ
	5 Comparison with Linear Regression
		5.1 Predictive Models Obtained Using the Reducts
	6 Conclusions and Discussion
	References
A Survey of Knowledge Capture and Knowledge Sharing Techniques in Agile Software Companies
	1 Introduction
	2 Knowledge Capture and Sharing in Agile Software Companies
	3 Research Aims and Methodology
	4 Findings
		4.1 Agile Methodologies Adopted by the Companies
		4.2 Methods of Sharing Knowledge in Agile Teams
		4.3 Agile Features Supported by Existing Systems
		4.4 Capturing and Sharing of Information During Standup Meetings
		4.5 Clarity of the Information Shared by the Team Members on the Existing System
		4.6 Effort and Time Required for Information Retrieval
		4.7 Importance of Knowledge Sharing Across an Organization
		4.8 Storage of Lessons Learnt from Previous Projects in Organizations
		4.9 Challenges of Knowledge Sharing in Agile Distributed Projects
	5 Recommendations and Future Works
	6 Conclusion
	References
hBOSOS: An Ensemble of Butterfly Optimization Algorithm and Symbiosis Organisms Search for Global Optimization
	1 Introduction
	2 Related Work
	3 Butterfly Optimization Algorithm
	4 Symbiosis Organisms Search
		4.1 Initialization
		4.2 Mutualism Phase
		4.3 Commensalism Phase
		4.4 Parasitism Phase
	5 Proposed Methodology
	6 Experimental Setup
		6.1 Classical Benchmark Functions
	7 Results and Discussion
		7.1 Comparison of hBOSOS with BOA, SOS, DE, PSO, JAYA
		7.2 Comparison with Other State-of-the-Art Metaheuristic Algorithms
		7.3 Statistical Rank Test
	8 Conclusion
	References
PSO-Based Test Case Generation: A Fitness Function Based on Value Combined Branch Distance
	1 Introduction
	2 Background
		2.1 Path Coverage
		2.2 Fitness Function
		2.3 Particle Swarm Optimization (PSO)
	3 The Proposed Approach
	4 Experimental Result and Analysis
	5 Conclusion
	References




نظرات کاربران