Although the current ERP (Enterprise Resource Planning) course has the latest information system software as in the industry that can be operated in class, and withthe refinement of PBL and teaching methods, students...
详细信息
ISBN:
(纸本)9783031519789;9783031519796
Although the current ERP (Enterprise Resource Planning) course has the latest information system software as in the industry that can be operated in class, and withthe refinement of PBL and teaching methods, students can learn from the perspective of system implementation, rather than the traditional system operation level. However, for most students, they are still more inclined to work data input, and cannot connect to process-oriented knowledge, or even processes analysis, causing students to fall into repetitive and monotonous system operations. therefore, this study intends to apply the digital online game competition in the ERP courses of the technical University students. To evaluate the "game-based teaching plan and course design strategy", a statistical comparative analysis is carried out on the impact of the ERP course plan. It is hoped that through such an instructional design integrating PBL and game-based learning, it can encourage students' spontaneous and interesting learning motivation and improve the effect of learning participation.
Currently, the majority of diagnoses in the field of mechanical faults are performed by experts or expert systems, which require domain experts to guide the completion while having subpar and limited portability. Cons...
详细信息
the integration of blockchain technology with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has addressed key challenges in distributed systems, such as mutual trust and collusion, while enhancing auditability...
详细信息
the genes present in the V(D)J segments are components for the generation of antibodies. the function of antibodies is to detect foreign agents that are harmful to the organism. the location of the V, D and J genes is...
详细信息
ISBN:
(纸本)9798350328837;9798350328844
the genes present in the V(D)J segments are components for the generation of antibodies. the function of antibodies is to detect foreign agents that are harmful to the organism. the location of the V, D and J genes is of great interest for the diagnosis of diseases and genomic disorders. the gene recognition or genome annotation process is of high complexity due to the integration of large volumes and diverse data sources. Genome annotation is the process of assigning information or labels to sections of the genome of a species. Advances have been made in the systematization of some steps of the annotation process, but activities that are performed manually by molecular biology specialists still prevail. Due to the diversity of rules that must be taken into account to determine the location of the V, D and J genes in the annotation process, a great amount of time and computational resources are consumed. In this work we propose the use of design science methodology for knowledge representation by means of conceptual modeling. the model represents the annotation process, the rules to determine its functionality and the parts that compose the V genes.
Data mining and knowledge discovery are essential aspects of extracting valuable insights from vast datasets. Neural topic models (NTMs) have emerged as a valuable unsupervised tool in this field. However, the predomi...
详细信息
Ensuring the reliability and user satisfaction of cloud services necessitates prompt anomaly detection followed by diagnosis. Existing techniques for anomaly detection focus solely on real-time detection, meaning that...
详细信息
ISBN:
(纸本)9798350329964
Ensuring the reliability and user satisfaction of cloud services necessitates prompt anomaly detection followed by diagnosis. Existing techniques for anomaly detection focus solely on real-time detection, meaning that anomaly alerts are issued as soon as anomalies occur. However, anomalies can propagate and escalate into failures, making faster-than-real-time anomaly detection highly desirable for expediting downstream analysis and intervention. this paper proposes Maat, the first work to address anomaly anticipation of performance metrics in cloud services. Maat adopts a novel two-stage paradigm for anomaly anticipation, consisting of metric forecasting and anomaly detection on forecasts. the metric forecasting stage employs a conditional denoising diffusion model to enable multi-step forecasting in an auto-regressive manner. the detection stage extracts anomaly-indicating features based on domain knowledge and applies isolation forest with incremental learning to detect upcoming anomalies. thus, our method can uncover anomalies that better conform to human expertise. Evaluation on three publicly available datasets demonstrates that Maat can anticipate anomalies faster than real-time comparatively or more effectively compared with state-of-the-art real-time anomaly detectors. We also present cases highlighting Maat's success in forecasting abnormal metrics and discovering anomalies.
Gamification is the incorporation of game elements into non-game settings. software designers increase user motivation by introducing adequately engaging elements, such as leaderboards and badges, into an existing sys...
详细信息
knowledge graph question answering is an important research direction for question answering tasks. In recent years, there has been an increasing amount of research on knowledge graph question answering, but temporal ...
详细信息
Long-term energy storage technologies are essential as energy demand grows globally. Due to the limited availability of Lithium, it is now necessary to look for alternatives to Lithium-ion (Li-ion) batteries. the pres...
详细信息
Logs, being run-time information automatically generated by software, record system events and activities withtheir timestamps. Before obtaining more insights into the run-time status of the software, a fundamental s...
详细信息
ISBN:
(纸本)9781665457019
Logs, being run-time information automatically generated by software, record system events and activities withtheir timestamps. Before obtaining more insights into the run-time status of the software, a fundamental step of log analysis, called log parsing, is employed to extract structured templates and parameters from the semi-structured raw log messages. However, current log parsers are all syntax-based and regard each message as a character string, ignoring the semantic information included in parameters and templates. thus, we propose the first semantic-based parser SemParser to unlock the critical bottleneck of mining semantics from log messages. It contains two steps, an end-to-end semantics miner and a joint parser. Specifically, the first step aims to identify explicit semantics inside a single log, and the second step is responsible for jointly inferring implicit semantics and computing structural outputs according to the contextual knowledge base of the logs. To analyze the effectiveness of our semantic parser, we first demonstrate that it can derive rich semantics from log messages collected from six widely-applied systems with an average F1 score of 0.985. then, we conduct two representative downstream tasks, showing that current downstream models improve their performance with appropriately extracted semantics by 1.2%-11.7% and 8.65% on two anomaly detection datasets and a failure identification dataset, respectively. We believe these findings provide insights into semantically understanding log messages for the log analysis community.
暂无评论