Collaborative filtering algorithm is commonly used in recommendation systems. Based on the traditional collaborative filtering algorithm, this paper proposes an improvement scheme. When calculating similarity, an impr...
详细信息
software engineer is one of the highest in-demand manpower jobs in the world. As the prolonged COVID19 pandemic crisis, more and more people throughout the world became unemployed. there arises an incoming demand for ...
详细信息
ISBN:
(数字)9781665485104
ISBN:
(纸本)9781665485104
software engineer is one of the highest in-demand manpower jobs in the world. As the prolonged COVID19 pandemic crisis, more and more people throughout the world became unemployed. there arises an incoming demand for reskilling and career shifting to software engineer. Online learning through MOOCs is, therefore, a viable and practical solution. However, reskilling to be a software engineer requires specific platform support that is able to develop both technical and non-technical skills, including management, communication, and teamwork, that traditional MOOCs cannot fulfill the challenges. this research aims to augment the traditional MOOCs withthe additional use of personalization, collaboration, and gamification theory in the name of "CareerVio MOOCs Platform". the distinct supports and services provided by the platform comprise team composition, team recomposition, team learning, and team assessments. CareerVio enables learners to master the necessary skills required in software engineer career, enhances the interaction between learners, and allows them to take what they have learned off the page and put it into practice.
Effective and efficient testing of complex component-based software systems is difficult. Unit test cases that test isolated components are focused and efficient but ineffective in detecting integration faults. Integr...
详细信息
the rapidly evolving digital landscape has triggered a surge in cybersecurity threats, particularly social engineering techniques which demand innovative and accessible countermeasures to combat them in an accessible ...
详细信息
ISBN:
(纸本)9781914587962;9781914587979
the rapidly evolving digital landscape has triggered a surge in cybersecurity threats, particularly social engineering techniques which demand innovative and accessible countermeasures to combat them in an accessible and real-time format. We present "Cybersafe," a mobile application designed to empower users to identify and combat common social engineering exploits effectively. the transformative concept behind this initiative aims to reshape traditional cybersecurity training by introducing a gamified, user-friendly platform suitable for all age groups. Cybersafe's application's functionality revolves around interactive quizzes that assess users' ability to identify threats. the findings from the research serve as a valuable resource for cybersecurity trainers, application developers, and organizations striving for a secure digital environment.
In response to the problem that military-related rumor detection is neglected in online rumour detection, which affects the online ecology and also brings challenges to the image of the army and the psychology of offi...
详细信息
Due to the ongoing digital transformation, businesses are exposed to work with a dynamic business environment. Traditional 1-to-1 relationships between manufacturers and end customers are transformed into a network of...
详细信息
ISBN:
(纸本)9783031251818;9783031251825
Due to the ongoing digital transformation, businesses are exposed to work with a dynamic business environment. Traditional 1-to-1 relationships between manufacturers and end customers are transformed into a network of relationships between manufacturers, end customers, software developers, suppliers, and third parties. the network of partners evolves into an ecosystem. Using a smart product-service system as the central anchor of value creation for an ecosystem enables hybrid value creation for producers and consumers simultaneously. In this paper we develop a knowledge-based model of smart product-service systems in their corresponding ecosystems, that assists designers and developers in decision making during the product development process.
the proceedings contain 51 papers. the topics discussed include: leveraging Bayesian multinomial models for effective targeted cyber-deception strategies;navigating innovation within a contractor’s business model: a ...
ISBN:
(纸本)9798350365917
the proceedings contain 51 papers. the topics discussed include: leveraging Bayesian multinomial models for effective targeted cyber-deception strategies;navigating innovation within a contractor’s business model: a system dynamics approach;an algebraic approach to systems and missions;mapping cyber-attacks on the Internet of Medical things: a taxonomic review;a new predictive maintenance approach: novel integration of GMM-LSTM for prediction of latent state and failure location of rotating machinery;an experimental study in generating electricity using earth battery system for street lightings;system-of-systems resilient recovery time estimation via heterogeneous capacity distribution;current landscape of system of systems engineering;and lightweight multi-system multivariate interconnection and divergence discovery.
software plagiarism is the reuse of software code without proper attribution and in violation of software licensing agreements or copyright laws. Withthe popularity of open-source software and the rapid emergence of ...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
software plagiarism is the reuse of software code without proper attribution and in violation of software licensing agreements or copyright laws. Withthe popularity of open-source software and the rapid emergence of AI Large Language Models such as ChatGPT and Google Bard, the concerns of plagiarized AI-generated code have been rising. Code attribution has been used to aid in the detection of software plagiarism cases. In this paper, we investigate the authorship of AI-generated code. We analyze the feasibility of code attribution approaches to verify authorship of source code generated by AI-based tools and investigate scenarios when plagiarized AI code can be identified. We perform an attribution analysis of an AI-generated source code on a large sample of programs written by software developers and generated by ChatGPT and Google Bard tools. We believe our work offers valuable insights for both academia and the software development community while contributing to the research in the authorship style of the fast-growing AI conversational models, ChatGPT and Bard.
As part of a large Information and Communication Technology for Development (ICT4D) programme, we conducted a number of research projects to empower fisherfolk in Bangladesh. Due to their low socio-economic status, lo...
详细信息
ISBN:
(纸本)9798350322613
As part of a large Information and Communication Technology for Development (ICT4D) programme, we conducted a number of research projects to empower fisherfolk in Bangladesh. Due to their low socio-economic status, low level of digital as well as general literacy and many other similar factors, fisherfolk are very diverse as end users of software. It was important to understand their characteristics before designing any software for them. We started with exploratory research in reviewing literature and hearing from experts who closely work with fisherfolk. Based on the identification of some of the challenges, we designed a prototype software for tacit knowledge transfer among captains of boats. We conducted number of focus groups withthe captains of the boats and adopted a co-creation process where the functionality and usability of the prototype software were decided by the end users themselves. From our experience of working withthis diverse group of end users we propose specific recommendations for future software development for end users with a low socio-economic background.
Research demonstrates that we continue to be deficient in creating inclusive and equitable software, with a lack of empathy among software developers attributed to this issue, even if unintentional. Although increasin...
详细信息
ISBN:
(纸本)9798400704987
Research demonstrates that we continue to be deficient in creating inclusive and equitable software, with a lack of empathy among software developers attributed to this issue, even if unintentional. Although increasing empathy has been shown to be part of the solution, unfortunately there is a lack of data that can be analyzed that shows how empathy-building and accessibility awareness interventions can be utilized in computing education, along with a shortage of free, public, and easily adoptable educational material regarding empathy and the creation of accessible software. through large in-person studies that involve real-world participants, we are able to contribute to the knowledge regarding the potential benefits that can be used to improve computing education by implementing empathy-building strategies in the curriculum. Two forms of accessibility awareness exercises are utilized to display the effectiveness of empathy-based learning and teach the importance of accessibility in computing, including experiential and expression-based interventions. In these interventions, we expect to find an increase in awareness and empathy in participants, as well as an increase in participant interest in the topic of software inclusivity and accessibility by placing the participant in a situation they may encounter in the real world. We additionally present a web-hosted, easily adoptable experiential and expression-based educational lab to support the inclusion of inclusive development and/or empathy-focused topics into a variety of curricula formats. Complete materials are available on the project website: https://***
暂无评论