Modeling from the perspectives of softwareengineering and systems engineering have co-evolved over the last two decades as orthogonal approaches. Given the central role of software in modern cyber-physical systems an...
详细信息
ISBN:
(纸本)9798350358810;9798350358803
Modeling from the perspectives of softwareengineering and systems engineering have co-evolved over the last two decades as orthogonal approaches. Given the central role of software in modern cyber-physical systems and the increasing adoption of digital engineering practices in complex systems design, there is now significant opportunity for collaborative design among system users, software developers, and systems engineers. Model-based systems engineering (MBSE) and systems modeling languages can support seamless cross-domain connectivity for design, simulation, and analysis of emerging technologies such as Augmented Reality (AR). This paper presents a co-design process for extending the capability of an existing AR application referred to as a No-Code AR Systems (NCARS) framework. NCARS enables content developed by multi-domain authors to be deployed on AR devices through a software layer that bridges the content to the game engine that drives the AR system. Utilizing a software dependency diagram of the AR Annotation function, an existing MBSE model of the AR system is extended to include the structure and behavior of relevant software components. This allows a modular design of the system to address needs in integrating new requirements into the existing application. New user requirements for tracking items in motion in the user's physical environment with virtual annotations in the augmented space are collaboratively designed and visualized through use case, block definition, internal block, and sequence diagrams. They capture the required structure and behavior of the proposed to-be system.
Municipal buildings are major energy consumers in urban areas, contributing significantly to greenhouse gas emissions and climate change. Understanding and predicting their energy consumption patterns is crucial for i...
详细信息
Phishing attacks pose serious challenges to users, commercial institutions and governments alike including identity theft, companies and government secrets. The weakest link in any computer security system is the peop...
详细信息
ISBN:
(纸本)9798350326970
Phishing attacks pose serious challenges to users, commercial institutions and governments alike including identity theft, companies and government secrets. The weakest link in any computer security system is the people and the success of phishing attacks is substantially based on manipulating human emotions. Therefore, we cannot solely rely on humans to detect phishing attacks as phishing attacks are becoming more and more sophisticated and can bypass filters set by anti-phishing techniques. More effective and automatic phishing detection mechanisms are required and many detectors have been proposed. However, the high number of phishing emails and attacks urges additional efforts. In this study, the effectiveness of word embedding in classifying phishing emails is investigated. Pre-trained transformer model BERT (Bidirectional Encoder Representations from Transformers) is fine-tuned to execute the task of classifying emails into phishing and non-phishing. The results show that transformer technology is accurate enough to improve phishing emails detection and can complement existing classifiers.
The proceedings contain 11 papers. The special focus in this conference is on Formal Aspects of Component software. The topics include: Embedding Formal Verification in Model-Driven softwareengineering with ...
ISBN:
(纸本)9783031521829
The proceedings contain 11 papers. The special focus in this conference is on Formal Aspects of Component software. The topics include: Embedding Formal Verification in Model-Driven softwareengineering with Slco: An Overview;overview on Constrained Multiparty Synchronisation in Team Automata;symbolic Path-Guided Test Cases for Models with Data and Time;A Mechanized Semantics for Component-Based Systems in the HAMR AADL Runtime;formal Aspects of Component software: An Overview on Concepts and Relations of Different Theories;Challenges Engaging Formal CBSE in Industrial Applications;Formal Model engineering of Distributed CPSs Using AADL: From Behavioral AADL Models to Multirate Hybrid Synchronous AADL;from Reversible Computation to Checkpoint-Based Rollback Recovery for Message-Passing Concurrent Programs.
In the past, the majority of the data produced at the point of care was unstructured and included paper prescriptions, handwritten notes from nurses and doctors, hospital admission and discharge records, and pictures ...
详细信息
The software industry is characterized by an environment of uncertainty, high volatility, and constant change. This context has shaped the industry, its components, and actors, generating methodologies capable of meet...
详细信息
Anomaly detection in video surveillance systems is an eminently vital field due to the widespread utility of the method, ranging from public security to monetary safety. Numerous architectures can be used for detectio...
详细信息
The evolution of softwareengineering practices has heightened the emphasis on quality assurance, particularly in defect prediction and testing methodologies. Traditional approaches often fall short in addressing the ...
详细信息
According to the requirements of UN/WP.29 R156, the management system and vehicle technology requirements for vehicle manufacturers to use RX software identification number are put forward. In order to meet the compli...
详细信息
According to data from the US Bureau of Labor Statistics, the number of job postings for software engineers has steadily increased over the past few years and is expected to grow by 22% from 2019 to 2029. This paper p...
详细信息
ISBN:
(纸本)9798350326970
According to data from the US Bureau of Labor Statistics, the number of job postings for software engineers has steadily increased over the past few years and is expected to grow by 22% from 2019 to 2029. This paper presents the pedagogical experience within the new Immersive softwareengineering (ISE) program concerning mathematical foundations and data analytics topics. These topics were designed to cover essential mathematical concepts such as calculus, linear algebra, probability, and statistics and their integration within data analytic tools and techniques such as time-series forecasting, data cleaning, data visualization, and introduction to pattern recognition. In addition, hands-on projects and real-world applications were incorporated throughout the course to provide students with practical experience in these areas. We reflect on the first delivery of the ISE course, which provided students with a new innovative blended learning environment, and how it will be further developed towards Open Educational Resources (OER) components and refined to respond to the rapidly evolving needs of the softwareengineering industry.
暂无评论