Cognitive science is a rich field of study that can provide useful information to the developers of Artificial Intelligence (AI) systems. this study investigates the relationship between AI and cognitive science. this...
详细信息
In computer Science education, the ever-changing nature of professional environments demands that students be actively prepared for future challenges. Project-based learning (PBL) has become increasingly significant, ...
详细信息
ISBN:
(纸本)9798400709173
In computer Science education, the ever-changing nature of professional environments demands that students be actively prepared for future challenges. Project-based learning (PBL) has become increasingly significant, enhancing students' abilities to manage and execute projects effectively, and has attracted considerable attention in academic research. Importantly, there is a growing advocacy from the industry for PBL's incorporation into the academic syllabus. Agile management practices have become essential withthe software industry particularly susceptible to rapid environmental and demand changes. Integrating agile methodologies into software design education has encouraged students to embrace complex problem-solving approaches. Educators are increasingly blending agile methodologies with PBL in software development courses to foster a level of flexibility that aligns withthe shifting patterns of the workforce. Comprehensive software development education now requires students to immerse themselves in agile philosophies, necessitating introductory training and consistent, structured mentorship. Platforms like Github have become instrumental for task organization, while automated tools support unbiased grading practices. this study leverages data from Github to evaluate individual contributions, covering task organization and management skills. Such an approach seeks to improve the caliber of computer Science education and better equip students for the dynamic nature of future work environments.
the introduction of Industrial Artificial Intelligence led us to adopt a variety of innovative technologies that add value to the product's life cycle. One such breakthrough is computer vision-based quality inspec...
详细信息
the software product line development goal is whole domain rather than a single software system, withthe results that effectively improved the software system development productivity and quality, shortened developme...
详细信息
Image forgery is the alteration of a digital image to hide some of the important and useful information. Copy-move forgery (CMF) is one of the most difficult to detect because the copied part of the image has the same...
Image forgery is the alteration of a digital image to hide some of the important and useful information. Copy-move forgery (CMF) is one of the most difficult to detect because the copied part of the image has the same characteristics as the original image. Most of the existing datasets only highlight additional attacks in the copied part. Since there are no categories of duplication elements in the datasets, this research analyzed three categories of duplication elements in CMF which are animals, food and non-living things using DEFACTO and CoMo3Dataset. the analysis is performed on PatchMatch-based detection method and the results show that the method able to maintain at least 83% for all duplication elements in both DEFACTO and CoMo3Dataset. Furthermore, the method is able to detect a minimum 92% score for the food category in both datasets.
software requirements gathering from users, customers, and stakeholders is the very first and critical step in software development. Requirements are volatile due to change in needs, processes and technology. this mak...
详细信息
A new type of exponential reaching law is proposed to address the problems of large overshoot and weak anti-interference ability of traditional exponential reaching law sliding mode control in permanent magnet synchro...
详细信息
Federated learning(FL) enables multiple partici-pants to build a common, robust machine learning model without sharing data, which is a key technique to address data privacy, security, access rights, and access to het...
详细信息
Withthe dramatic increase in the number of software security problems, a growing body of research in how to integrate security within software development is notable. Many security approaches have appeared to solve s...
详细信息
the increase in size and complexity of power system networks with a large number of interconnections has exposed the system to various contingencies, which lead to system instability. therefore, it is necessary for a ...
详细信息
暂无评论