作者:
Vanamadi, RaviKar, Asutosh
Department of Electronics and Communication Engineering Chennai600127 India
this paper analysed the convex combination of adaptive filtering algorithms for single microphone and speaker hearing aid systems to cancel the acoustic feedback signal. the traditional hearing aid system is considere...
详细信息
A Bidirectional Long Short-Term Memory Conditional Random Feld based on a combination of word segmentation task and named entity recognition task is proposed to address the problem of named entity recognition in struc...
详细信息
ISBN:
(纸本)9789819755004;9789819755011
A Bidirectional Long Short-Term Memory Conditional Random Feld based on a combination of word segmentation task and named entity recognition task is proposed to address the problem of named entity recognition in structured electronic medical records. this model enriches the feature set of named entity recognition tasks by incorporating shared LSTM to capture word boundary information in word segmentation tasks, thereby achieving the effect of improving named entities. the experimental data collection consists of a discharge summary of 500 coronary heart disease patients and 2000 cardiovascular disease patients provided by a tertiary hospital in Guangdong Province. Comparedwith other models in electronic medical record entity recognition tasks, the multi-task learning model based on Bi-LSTM-CRF achieved an F-measure value of 0.927. the experiment shows that the multi-task electronic medical record entity recognition model based on Bi-LSTM-CRF can effectively learn information from multiple related tasks, which well meets the practical needs of clinical practice.
this paper presents a method for extracting and interpreting information from diverse, unstructured dental literature using advanced AI techniques. By integrating information extraction, ontologies, and knowledge grap...
详细信息
the importance of software quality assurance is often overlooked in startups, leading to consequences that deem the product and subsequently the startup to fail in the long run. this paper looks into the current softw...
详细信息
ISBN:
(纸本)9781728176772
the importance of software quality assurance is often overlooked in startups, leading to consequences that deem the product and subsequently the startup to fail in the long run. this paper looks into the current software quality related scenarios present in startups and tries to pinpoint issues which eventually cause their downfall. By acquiring their insight, we hypothesized an adoptable guideline to mitigate the issues faced in the startups and implement a quality framework for any software-based startup organization.
software quality assurance is a crucial process that ensures software products meet specified requirements and quality standards. Achieving an exhaustive test coverage is essential for quality assurance, particularly ...
详细信息
the snake type robot is a robot imitating a snake of an organism. Since it has an elongated shape and can perform various motions, it is expected to play an active role in searching disaster sites where rubble is scat...
详细信息
Microservice architectures emphasize keeping components small, to foster autonomy, low coupling and independent evolution. In this large-scale empirical study we measure the size of Web API specifications mined from o...
详细信息
ISBN:
(纸本)9781665494939
Microservice architectures emphasize keeping components small, to foster autonomy, low coupling and independent evolution. In this large-scale empirical study we measure the size of Web API specifications mined from open source repositories. these APIs are modeled using the OpenAPI Specification (OAS), which, in addition to documenting the offered operations, also contain schemas definitions for the data exchanged withthe API request and response message payloads. this study has as a goal to build empirical knowledge about: (1) How big and diverse are real-world web APIs both in terms of their operations and data, (2) How different API structures use and reuse schema definitions. By mining public software repositories on Github, we gathered 42,194 valid OAS specifications published between 2014-2021. these specifications include descriptions of Web APIs of well-known services providers such as Google, VMware (Avi Networks), Twilio, Amazon. After measuring the size of API structures and their data model schemas, we found that most APIs are rather small. Also there is a medium correlation between the size of the APIs' functional structures and their data models. API developers do reuse schema definitions within the same API model.
the flow of ions near the ground level is an aspect that must be considered in the HVDC transmission line. In this work, we present the use of ion diffusion in the simulation of the 2D ion flow field for reduced and f...
详细信息
Introducing softwareengineering students to data science provides an opportunity to reinforce foundational topics while also introducing students to emerging technologies. this paper discusses the experience of devel...
详细信息
DevOps (development and operations) is a set of collaborative practices that automate continuous delivery of new software versions with an aim to reduce the development life cycle and produce quality software products...
详细信息
ISBN:
(纸本)9798400717017
DevOps (development and operations) is a set of collaborative practices that automate continuous delivery of new software versions with an aim to reduce the development life cycle and produce quality software products. Security is an important attribute of quality software. software is secure if it does not allow the confidentiality, integrity, and availability of its data, code, or service to be compromised. In order to take full advantage of DevOps, security needs to play an integral part in the development life cycle of a software. the DevSecOps (development, security, and operations) refers to the integrating security practices within the DevOps process. DevSecOps promotes the shifting security to the early stages of a project. Traditionally, security testing is done towards the end of the software lifecycle. However, fixing issues later in the process is more costly than making sure defects do not happen in the beginning. DevSecOps goes beyond automation, continuous integration, testing and delivery processes, since it also encompasses people. In fact, DevSecOps promotes the collaboration between the development, operations, and security teams. When security comes into DevOps routines, people play an even more relevant role involving the collaboration between those teams and security team. In any organization policies, standards, procedures and code of conducts are designed for people to follow. People are executers of policies. the human factor is one of the major forces behind effectiveness, or failure of a security system. Traditionally, the organizations focus on protecting their infrastructure, from security threats and they ignore human behavior that may result in malicious activities during software development process. Human aspect is considered as one of the major reasons of security vulnerability is due to malicious human behavior, who are involved in DevSecOps process;human may make mistakes due to lack of security perceptions, skills, and knowledge.
暂无评论