In introductory programming and other problem-solving activities, students can create many variants of a solution. For teachers, content developers, or applications in student modeling, it is useful to find structure ...
详细信息
ISBN:
(数字)9783030782924
ISBN:
(纸本)9783030782924;9783030782917
In introductory programming and other problem-solving activities, students can create many variants of a solution. For teachers, content developers, or applications in student modeling, it is useful to find structure in the set of all submitted solutions. We propose a generic, modular algorithm for the construction of interpretable clustering of students' solutions in problem-solving activities. We describe a specific realization of the algorithm for introductory Python programming and report results of the evaluation on a diverse set of problems.
This research work introduces a new system that utilizes Generative Pretrained Transformer (GPT) Large Language Models (LLMs) to enable language-based control for Unmanned Aerial Vehicles (UAVs). The system enables no...
详细信息
ISBN:
(数字)9798331542726
ISBN:
(纸本)9798331542733
This research work introduces a new system that utilizes Generative Pretrained Transformer (GPT) Large Language Models (LLMs) to enable language-based control for Unmanned Aerial Vehicles (UAVs). The system enables nonexpert users to easily control UAVs using natural language. It integrates GPT-4o-mini model with the widely used open-source ArduPilot Software. The developed system supports both audio and written inputs and accommodates multiple languages. The LLM reasons about the request and generates the required functionality. OpenAI's API (Application programming Interface) and Function Calling are used to implement the task.
The proceedings contain 11 papers. The topics discussed include: work-in-progress: accuracy-area efficient online fault detection for robust neural network software-embedded microcontrollers;work-in-progress: boot seq...
ISBN:
(纸本)9781665472982
The proceedings contain 11 papers. The topics discussed include: work-in-progress: accuracy-area efficient online fault detection for robust neural network software-embedded microcontrollers;work-in-progress: boot sequence integrity verification with power analysis;work-in-progress: hot-patching technique for imprecise computing by saving resource;work in progress: dynamic offloading of soft real-time tasks in SDN-based fog computing environment;work-in-progress: a resource-aware optimization model for real-time systems analysis and design;work-in-progress: towards a theory of robust quantitative semantics for signal temporal logic;work-in-progress: accelerated matrix factorization by approximate computing for recommendation system;industry-track: challenges in rebooting autonomy with deep learned perception;and industry-track: system-level logical execution time for automotive software development.
While manual robot programming has been effective for many applications, fixed coding poses several challenges. Robot programming requested sophisticated and dynamic behaviours while increasing the complexity of the r...
详细信息
ISBN:
(数字)9798331527471
ISBN:
(纸本)9798331527488
While manual robot programming has been effective for many applications, fixed coding poses several challenges. Robot programming requested sophisticated and dynamic behaviours while increasing the complexity of the robot's tasks. Generative artificial intelligence models have revolutionised robot behaviour generation in dynamic environments to complete different tasks. This paper explores different approaches to robot behaviour generation evaluating their effectiveness, challenges, and potential implications for real-world robotic scenarios. An enhanced diffusion policy is proposed to mitigate anomalous behaviours in the original model. The results demonstrate the importance of training dataset quality and model adaptation to specific working environments in achieving successful robotic behaviours. The Resilient Diffusion solved unusual behaviour problems, improved the resilience capability of diffusion policy, and achieved a higher success rate.
We use differential evolution algorithm to jointly optimize the parameters of forward error correction and probabilistic shaping in coherent optical communication systems. 56-GBaud simulation shows a net data rate gai...
详细信息
ISBN:
(数字)9798350367652
ISBN:
(纸本)9798350367669
We use differential evolution algorithm to jointly optimize the parameters of forward error correction and probabilistic shaping in coherent optical communication systems. 56-GBaud simulation shows a net data rate gain of 36 Gbit/s.
The study's purpose is examining whether the factors influencing the Credibility among the Millennial. The study is used in both primary & secondary data. The secondary data obtained from the earlier publicati...
详细信息
ISBN:
(纸本)9781665419956
The study's purpose is examining whether the factors influencing the Credibility among the Millennial. The study is used in both primary & secondary data. The secondary data obtained from the earlier publications in research papers, magazines, articles, and textbooks related to eWoM Credibility. The Primary data accumulated from the Millennial who is aware of the eWoM Credibility. Data collected with proper development of a structured survey from a sample of 1000 Millennials in Chennai city. The Millennials were chosen randomly throughout Chennai city and different Sectors. Out of 1000 responses, 217 responses are not adequately filled by the millennial. Therefore these responses rejected, and the rest 783 responses used for the final study. The regression model results explain a significant influence of factors towards the eWoM Credibility among the Millennial. Whereas, the model overall its predictors extremely strong to give details the variability related to eWoM credibility. Overall, the factors, namely Quality, Polarity, logic & Articulation, Sources, and Prior Knowledge, and Expertise, significantly influence eWoM Credibility among Millennials.
Recently, computing education research has foregrounded the need to design activities to promote computational empowerment by engaging learners creatively in the development of technology, fostering critical reflectio...
详细信息
This paper proposes a service chain provisioning model considering traffic changing effects of virtualized network functions (VNFs) while determining the VNF visit order of each request, routes of requests, and VNF pl...
详细信息
ISBN:
(纸本)9781665440059
This paper proposes a service chain provisioning model considering traffic changing effects of virtualized network functions (VNFs) while determining the VNF visit order of each request, routes of requests, and VNF placement. The service chain provisioning problem is formulated as an integer linear programming (ILP) problem. Three methods of limiting the number of VNF visit order patterns considered in the ILP problem are introduced in order to shorten the computation time. These methods select visit order patterns so as to suppress the sum of the traffic amount reserved by each request on its route. Numerical results show that the consumption of network and computation resources becomes more efficient by considering traffic amount changed by VNFs than the case assuming the traffic amount of each request to be constant end-to-end. The results also show that the computation time can be shortened in our examined scenarios while we obtain the objective value larger by at most 0.4% than the optimal value by limiting the number of visit order patterns.
Probabilistic spin logic (PSL) is a recently proposed computational paradigm targeting a specific class of problems. Earlier works show the better performance of PSL compared to digital computation in terms of speed a...
详细信息
Probabilistic spin logic (PSL) is a recently proposed computational paradigm targeting a specific class of problems. Earlier works show the better performance of PSL compared to digital computation in terms of speed and energy efficiency for a few optimization problems such as traveling salesman problem (TSP), max-cut problem, etc. PSL is implemented using probabilistic bits or pbits that fluctuate randomly between two metastable states. One of the popular methods of realizing a pbit is a 3T-1MTJ implementation, with a low barrier magnet (LBM) acting as the free layer of the magnetic tunnel junction (MTJ). In this paper, we perform extensive simulations to examine the suitability of LBMs for 3T-1MTJ pbit implementation. We have analyzed the impact of various material parameters on the attributes of a pbit. Further, we propose a method of selecting material parameters for an LBM-based pbit implementation that improves flips per second (fps), a crucial system-level figure of merit (FOM), without sacrificing the ideal sigmoid-type output response.
Probabilistic programming systems allow developers to model random phenomena and perform reasoning about the model efficiently. As the number of probabilistic programming systems is growing significantly and are used ...
详细信息
Probabilistic programming systems allow developers to model random phenomena and perform reasoning about the model efficiently. As the number of probabilistic programming systems is growing significantly and are used more and more widely, the reliability of such systems is becoming very important. It is crucial to analyze real bugs of existing similar systems in order to develop efficient bug detection tools for probabilistic programming systems. This paper conducts an empirical study investigating bugs and their features on PyMC3, a real probabilistic programming system. Among 271 closed bugs, we identified 20 bugs that are unique to probabilistic programming languages and extracted eight bug patterns from these bugs. The result showed that many of the bugs were caused by types. We also propose some possible methods for automatically detecting these bug patterns. It is expected that this will contribute to the development of bug detection tools by capturing the characteristics of bugs in actual probabilistic programs in the future.
暂无评论