Rapid electronic device development requires more complicated and densely packed PCB designs. These systems need properly placed and connected electrical components for best performance and reliability. Complexity and...
详细信息
With the development of big data technology, the theoretical methods of knowledge construction on defense technology information field urgently needs to be optimized and improved. This paper analyzes in detail the sit...
详细信息
In the era of data-driven decision-making, the ability to securely and reliably exchange analytical data among organizations (collaborative business intelligence) is becoming increasingly important. This paper envisio...
详细信息
ISBN:
(纸本)9783031609992;9783031610004
In the era of data-driven decision-making, the ability to securely and reliably exchange analytical data among organizations (collaborative business intelligence) is becoming increasingly important. This paper envisions a novel framework for trustworthy data exchange, leveraging Zero-knowledge Proofs (ZK-Proofs) to maintain data privacy and integrity, and the blockchain for reliable auditing. Our framework emphasizes enhancing business intelligence capabilities through non-operational analytics, particularly in the generation of aggregated insights for strategic decision-making among different organizations, without exposing the underlying raw data, thus preserving data sovereignty. We introduce a methodology to perform operations on data cubes using ZK-Proofs, allowing for the generation of more aggregated data cubes from initial raw data hypercubes. The framework exploits the data-Fact Model to identify the available transformation paths on raw data.
Collaboration between edge devices has increased the scale of machine learning (ML), which can be attributed to increased access to large volumes of data. Nevertheless, traditional ML models face significant hurdles i...
详细信息
Context. Modern software systems increasingly commonly contain one or multiple machine learning (ML) components. Current development practices are generally on a trial-and-error basis, posing a significant risk of int...
详细信息
ISBN:
(纸本)9798400706226
Context. Modern software systems increasingly commonly contain one or multiple machine learning (ML) components. Current development practices are generally on a trial-and-error basis, posing a significant risk of introducing bugs. One type of bug is the "conceptual design bug," referring to a misunderstanding between the properties of input data and prerequisites imposed by ML algorithms (e.g., using unscaled data in a scale-sensitive algorithm). These bugs are challenging to test at design time, causing problems at runtime through crashes, noticeably poor model performance, or not at all, threatening the system's robustness and transparency. Objective. In this work, I propose the line of research I intend to pursue during my PhD, addressing conceptual design bugs in complex ML software from a prevention-oriented perspective. I intend to build open-source tooling for ML engineers that can be used to detect conceptual design bugs, enabling them to make quality assurances about their system design's robustness. Approach. We need to understand conceptual bugs beyond the status quo, identifying their types, prevalence, impacts, and structural elements in the code. We operationalize this knowledge into a tool that detects them at design time, allowing ML engineers to resolve them before running their code and wasting resources. We anticipate this tool will leverage contract-based validation applied to partial ML software models. Evaluation. We plan to evaluate the built tool two-fold using professional (industrial) ML software. First, we will study its effectiveness regarding bug detection at design time, identifying whether it fulfills its functional objective. Second, we will study its usability, identifying whether ML engineers benefit when tools like this are introduced into their ML engineering workflow.
This paper introduces a pioneering approach to enhancing access control in IoT systems by combining blockchain technology and inner product encryption. By leveraging the immutability and transparency of blockchain and...
详细信息
Continuous manufacturing of pharmaceutical tablets integrates multiple unit operations such as twin screw granulation and fluidized bed drying to transform powder into final dosage form such as tablets. However, compl...
详细信息
ISBN:
(纸本)9783031581120;9783031581137
Continuous manufacturing of pharmaceutical tablets integrates multiple unit operations such as twin screw granulation and fluidized bed drying to transform powder into final dosage form such as tablets. However, complex process interactions can lead to variability in critical quality attributes including moisture content of the produced granules. This study presents an innovative multi-stage modelling framework to predict granule moisture content based on the twin screw granulator and the fluidized bed dryer process parameters. Machine learning techniques, including gradient boosting regression, and support vector regression were utilised to enhance predictive performance in ensemble method. Using data from a pilot-scale integrated continuous line, the stacking ensemble model achieved excellent accuracy with (R-2) of 91% for moisture content prediction. The Machine learning modelling framework demonstrates strong potential for advancing process knowledge, and optimization in continuous manufacturing of pharmaceutical tablets based on wet granultion.
Industrial areas have increasingly developed their own knowledge Graph (KG) for organizing and leveraging vast amounts of data. One major challenge in constructing KG is the heavy reliance on available resources, rest...
详细信息
The necessity for recommendation systems spans across various domains, not least in the realm of dining and exploring new locales. Restaurants, in particular, benefit from such systems to both attract customers and of...
详细信息
In today’s data-driven world, recommender systems are essential for filtering information to deliver personalized content, with collaborative filtering (CF) being a popular technique for predicting user preferences b...
详细信息
暂无评论