the development of cyber-physical systems is heavily relying on model-driven approaches. After deployment, these models can be utilised in a Digital Twin setting, acting as virtual replicas of the physical components ...
详细信息
ISBN:
(纸本)9798350311921
the development of cyber-physical systems is heavily relying on model-driven approaches. After deployment, these models can be utilised in a Digital Twin setting, acting as virtual replicas of the physical components and reflecting the behaviour of the running system in real-time. Complex systems often consist of numerous models interacting with each other and individual models may need to be updated after deployment. this means that new models need to be integrated and swapped during runtime without interrupting the running system. In this paper, we propose an approach for model-based Digital Twins to replace individual models without stopping or halting the operation of a cyber-physical system. Furthermore, our approach allows to replace not only individual models, but also update the overall structure of the interaction of models in the Digital Twin setting. the use of the proposed mechanism is illustrated through two case-studies with an agricultural robot prototype.
Producing accurate software models is crucial in model-driven softwareengineering (MDE). However, modeling complex systems is an error-prone task that requires deep application domain knowledge. In the past decade, s...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
Producing accurate software models is crucial in model-driven softwareengineering (MDE). However, modeling complex systems is an error-prone task that requires deep application domain knowledge. In the past decade, several automated techniques have been proposed to support academic and industrial practitioners by providing relevant modeling operations. Nevertheless, those techniques require a huge amount of training data that cannot be available due to several factors, e.g., privacy issues. the advent of large language models (LLMs) can support the generation of synthetic data although state-of-the-art approaches are not yet supporting the generation of modeling operations. To fill the gap, we propose a conceptual framework that combines modeling event logs, intelligent modeling assistants, and the generation of modeling operations using LLMs. In particular, the architecture comprises modeling components that help the designer specify the system, record its operation within a graphical modeling environment, and automatically recommend relevant operations. In addition, we generate a completely new dataset of modeling events by telling on the most prominent LLMs currently available. As a proof of concept, we instantiate the proposed framework using a set of existing modeling tools employed in industrial use cases within different European projects. To assess the proposed methodology, we first evaluate the capability of the examined LLMs to generate realistic modeling operations by relying on well-founded distance metrics. then, we evaluate the recommended operations by considering real-world industrial modeling artifacts. Our findings demonstrate that LLMs can generate modeling events even though the overall accuracy is higher when considering human-based operations. In this respect, we see generative AI tools as an alternative when the modeling operations are not available to train traditional IMAs specifically conceived to support industrial practitioners.
Motivation theory (PMT) and organizational effort to develop a comprehensive model for understanding impact of antecedents and mediating factors on security behavior. PMT has been used extensively in health research, ...
详细信息
Motivation theory (PMT) and organizational effort to develop a comprehensive model for understanding impact of antecedents and mediating factors on security behavior. PMT has been used extensively in health research, but its application in the field of information security is limited. the study found that threat and coping factors are reliable predictors of employees' motivational behavior towards security. In addition, employee awareness and organizational effort also positively influence threat and coping appraisal processes, leading to cybersecurity behavior. Several practical implications were identified, such as the effectiveness of government organizations in motivating security behavior compared to other businesses. this study provides insights into the complex interplay of factors that shape employees' security behavior and can inform organizations' efforts to promote secure behaviors. (c) 2023 the Authors. Published by Elsevier B.V.
the availability of Large Language Models (LLMs) which can generate code, has made it possible to create tools that improve developer productivity. Integrated development environments or IDEs which developers use to w...
详细信息
ISBN:
(数字)9798400712487
ISBN:
(纸本)9798400712487
the availability of Large Language Models (LLMs) which can generate code, has made it possible to create tools that improve developer productivity. Integrated development environments or IDEs which developers use to write software are often used as an interface to interact with LLMs. Although many such tools have been released, almost all of them focus on general-purpose programming languages. Domain-specific languages, such as those crucial for Information Technology (IT) automation, have not received much attention. Ansible is one such YAML-based IT automation-specific language. Ansible Lightspeed is an LLM-based service designed explicitly to generate Ansible YAML, given natural language prompt. In this paper, we present the design and implementation of the Ansible Lightspeed service. We then evaluate its utility to developers using diverse indicators, including extended utilization, analysis of user edited suggestions, as well as user sentiments analysis. the evaluation is based on data collected for 10,696 real users including 3,910 returning users. the code for Ansible Lightspeed service and the analysis framework is made available for others to use. To our knowledge, our study is the first to involve thousands of users of code assistants for domain-specific languages. We are also the first code completion tool to present N-Day user retention figures, which is 13.66% on Day 30. We propose an improved version of user acceptance rate, called Strong Acceptance rate, where a suggestion is considered accepted only if less than 50% of it is edited and these edits do not change critical parts of the suggestion. By focusing on Ansible, Lightspeed is able to achieve a strong acceptance rate of 49.08% for multi-line Ansible task suggestions. With our findings we provide insights into the effectiveness of small, dedicated models in a domain-specific context. We hope this work serves as a reference for softwareengineering and machine learning researchers exploring code c
To minimize the risk of Hydro-Power Plant failure, it’s crucial to detect and precisely repair the damaged components. In this paper, we propose a knowledge graph-based fault diagnosis method for Hydro-Power Plants. ...
详细信息
Under traditional recommendation frameworks based on a central server, recommender systems provide rec-ommendations for different users by training a global model for all users on the cloud. However, this method canno...
详细信息
Heating, ventilating, and air conditioner (HV AC) systems are crucial for the comfort of occupants in many industrial, commercial, residential and institutional buildings. there are many reasone to monitor the status ...
详细信息
this paper explores the integration of Multi-Agent Systems (MAS) and Large Language Models (LLMs) for auto-matic code generation, addressing the limitations of traditional manual coding. By conducting a comprehensive ...
详细信息
the proceedings contain 20 papers. the topics discussed include: visualization of the distribution of newly infected persons with COVID-19 in the prefecture;smart hub based on brain computer interface by low cost devi...
ISBN:
(纸本)9781728182490
the proceedings contain 20 papers. the topics discussed include: visualization of the distribution of newly infected persons with COVID-19 in the prefecture;smart hub based on brain computer interface by low cost devices;valuation of pitcher’s skill using two-dimensional kernel density in baseball;solar based automatic watering system on buoyancies using IoT;a framework of knowledge management in classroom action research on cloud computing for pre-service teachers;analysis of learners’ participative behavior from active learning management by process mining technique;analysis of warehouse operations using process mining techniques: a case study of scientific laboratory equipment and facilities;and integration of cloud computing with Internet of things for network management and performance monitoring.
Robot Learning from Demonstration (RLfD) is a research field that focuses on how robots can learn new tasks by observing human performances. Existing RLfD approaches mainly enable robots to repeat the demonstrated tas...
详细信息
ISBN:
(数字)9781665490429
ISBN:
(纸本)9781665490429
Robot Learning from Demonstration (RLfD) is a research field that focuses on how robots can learn new tasks by observing human performances. Existing RLfD approaches mainly enable robots to repeat the demonstrated tasks by mimicking human activities, which usually requires efficient demonstrations for human experts. this paper proposes a new Function Object-Oriented Network (FOON) based approach to make robots learn and optimize assembly tasks from non-expert demonstrations. It first proposes an assembly FOON construction approach with automatic subgraph creation and merging algorithms to extract information from multiple non-expert demonstrations. It then proposes an assembly task tree retrieving approach with a robot execution optimization process to make the robot learn and generate the best possible task execution plan from the constructed FOON. the proposed approaches are validated through experiments with a dual-arm YuMi robot and the experimental results illustrate the effectiveness and advantages of the proposed approach.
暂无评论