Broadening participation sends mixed messages to minoritized students. Promises of economic security, democratized technopolitics, and creative expression are interwoven with the discourses of international economic c...
详细信息
ISBN:
(纸本)9798400706264
Broadening participation sends mixed messages to minoritized students. Promises of economic security, democratized technopolitics, and creative expression are interwoven with the discourses of international economic competitiveness, militarism, and cyberlibertarian entrepreneurship. This perspective paper reads the queer of color theory of Jose Esteban Munoz through the project of broadening participation. Disidentification describes tactical misrecognition by minoritarian subjects, especially by assimilating the dominant cultural images. Instead of arguing for specific kinds of representation, this paper describes paradoxical experiences of minoritization-navigating "who" is a computer scientist-and how they can take us far beyond the expectations of dominant representations.
Among numerical libraries capable of computing gradient descent optimization, JAX stands out by offering more features, accelerated by an intermediate representation known as Jaxpr language. However, editing the Jaxpr...
详细信息
ISBN:
(纸本)9783031779404;9783031779411
Among numerical libraries capable of computing gradient descent optimization, JAX stands out by offering more features, accelerated by an intermediate representation known as Jaxpr language. However, editing the Jaxpr code is not directly possible. This article introduces JaxDecompiler, a tool that transforms any JAX function into an editable Python code, especially useful for editing the JAX function generated by the gradient function. JaxDecompiler simplifies the processes of reverse engineering, understanding, customizing, and interoperability of software developed by JAX. We highlight its capabilities, emphasize its practical applications especially in deep learning and more generally gradient-informed software, and demonstrate that the decompiled code speed performance is similar to the original.
Hybrid agile is one of the recent softwareengineering process model used by a softwareengineering team in a software development project. A hybrid agile model is used by softwareengineering team to meet the require...
详细信息
A digital twin is a virtual representation of a physical entity, serving as a pivotal convergence technology that facilitates the diagnosis, optimization, prediction, and problem-solving of the corresponding physical ...
详细信息
ISBN:
(纸本)9783031751097;9783031751103
A digital twin is a virtual representation of a physical entity, serving as a pivotal convergence technology that facilitates the diagnosis, optimization, prediction, and problem-solving of the corresponding physical entity. It is widely applicable across diverse sectors, including automobiles, manufacturing, logistics, and smart cities. The automotive industry, in particular, is actively integrating digital twin throughout the entire product lifecycle from research and development, production, sales, and services to enhance the overall customer experience. This paper presents insights into software practices and experiences related to the implementation of smart mobility digital twin. Drawing from lessons learned in digital twin projects, we outline guidelines for effective application. It is expected to gradually improve transportation convenience and utility value for customers through a comprehensive analysis that integrates the digital twin of the vehicle with those of the surrounding environment, including traffic patterns and human behavior, in conjunction with spatio-temporal information.
The proceedings contain 37 papers. The special focus in this conference is on Applied Cognitive Computing. The topics include: Assessing Information Influence for Node Attribute Prediction;in-Vehicle Sensing Plat...
ISBN:
(纸本)9783031856273
The proceedings contain 37 papers. The special focus in this conference is on Applied Cognitive Computing. The topics include: Assessing Information Influence for Node Attribute Prediction;in-Vehicle Sensing Platform for the Inference of Older Drivers’ Mild Cognitive Condition;infusing Human Feedback into Intermediate Prompting Steps of Large Language Models;experimental Analysis of Contemporary Trends, Performance, and Limitations in Graph Embeddings: A Concise Review;a Secure Self-Adaptive System in Applications of Cognitive Computing;revisiting the Nexus Between Handwriting and Personality: Graphology;from Static Graph Attention Generation to Dynamic Graph Attention Coefficient;An Integrated Approach for AI-Assisted Survey Systems Using Deterministic and Nondeterministic Models;a Voxel-Representation-Based Data Generator of Adversarial Objects for Robotic Manipulators;an Analysis of Different Information Granularity Distribution Protocols to Improve Consistency in Intuitionistic Reciprocal Preference Relations;enhancing Differential Evolution for Neural Network Optimization Through Boundary Individual Consideration;predictive Modeling of Shading Effects on Photovoltaic Panels Using Regression Analysis;enhancing Cultural Algorithm Guided Policy Gradients with Parameter-Based Exploration Through Topographic Knowledge and Adaptive Weighting;Enhancing Clinical Documentation Through NLP-Driven Disease Categorization and Visualization: A Case Study Utilizing the Llama2 AI Model;automatic Modulation Recognition: A Hybrid Approach Using Deep Learning and K-Means Clustering;An ISR Asset Planning Application;causal Discovery with Interactive Human Inputs;implementation of a Lightweight Gradient Descent Trained Expert System Algorithm;Leveraging JSBSim and Gymnasium: A Reinforcement Learning Approach for Air Combat Simulation;orthogonal Activation Functions in Neural Networks: Utilizing Chebyshev, Legendre, and Hermite Polynomials;XAI-Based Assessment of software Vulnerabil
software development projects sourced from external organizations can serve as an excellent platform to help build student competencies because they often provide an environment where students can practice applying th...
详细信息
ISBN:
(纸本)9798400706004
software development projects sourced from external organizations can serve as an excellent platform to help build student competencies because they often provide an environment where students can practice applying their knowledge and skills in an authentic context. However, there are many challenges and risks that can jeopardize the successful execution of such projects. In this report, we discuss some of the lessons learned about the pain points encountered by computing faculty with over a decade of experience running a softwareengineering studio where teams of undergraduate students work on long-term projects sourced from external partners. Our experience is based on working with a mix of project partners with a major emphasis on non-profit and community organizations and non-technical project partners. We focus on a strategy to carefully screen prospective projects to reveal possible challenges in order to avoid or minimize risks that could impact student learning outcomes.
Teaching software testing in computerscience education faces challenges due to its abstract nature and students’ focus on approaches using paradigms based on rationalism. Exploratory testing, which uses a paradigm b...
详细信息
This study explores Agile software Development (ASD) methodologies' effectiveness in achieving quality software products. It investigates the underexplored application of ChatGPT as a Quality Attribute Extractor i...
详细信息
This paper presents BC-SBOM, a novel blockchainbased system designed to enhance the management of software Bills of Materials (SBOMs). By leveraging blockchain technology, BC-SBOM ensures secure storage and sharing of...
详细信息
ISBN:
(纸本)9791188428137
This paper presents BC-SBOM, a novel blockchainbased system designed to enhance the management of software Bills of Materials (SBOMs). By leveraging blockchain technology, BC-SBOM ensures secure storage and sharing of SBOMs, while providing a comprehensive global view of dependencies among software components. The system also supports rapid propagation of alerts for newly discovered vulnerabilities, thereby increasing responsiveness to potential threats. Offering superior reliability, transparency, and availability compared to traditional SBOM tools, BC-SBOM aims to significantly improve the management of complex software systems and contribute to the advancement of software security practices. Copyright 2025 Global IT Research Institute (GIRI). All rights reserved.
As technology continues to evolve, new ways of threat began to follow its route. Attackers continuously grow in creativity to obtain access to integral information, inflict damage to property, and other malicious acts...
详细信息
ISBN:
(纸本)9798331539894;9798331539887
As technology continues to evolve, new ways of threat began to follow its route. Attackers continuously grow in creativity to obtain access to integral information, inflict damage to property, and other malicious acts. Antivirus software is a key component to the prevention of malicious software from compromising your system. With many antivirus software on the market, both free and paid and with 61% of antivirus users make use of free antivirus software (*** Team, 2023), the study selected Windows Defender, Avast, McAfee, and Malwarebytes as the main antivirus software that will be evaluated based on the users' behavioral intention of using and accepting these systems. The conducted research paper aims to gather users' acceptability to the different antivirus software utilizing the Unified Theory of Acceptance and Use of Technology (UTAUT) Model by Venkatesh et al. (2003). These factors include Performance Expectancy (PE), Social Influence (SI), Facilitating Conditions (FC), Effort Expectancy (EE), and Public Trust (PT) alongside other variables such as age, experience, and voluntariness of use. For the data gathering, the researchers will survey a total of 120 users, with at least 30 users each for Windows Defender, Avast, McAfee, and Malwarebytes. Along throughout the study, the researchers will also conduct a simple test simulation of basic threat detection and create a checklist to determine whether the antiviruses that were selected were legitimate or not. The study aims to provide valuable insights into user preferences and perceptions, contributing to enhanced cybersecurity measures and improved antivirus software development in the future.
暂无评论