Graph Neural Network (GNN)-based recommendation systems have become very popular in recent years. Their popularity stems from the fact that nodes can access higher-order neighbor information and there are well-designe...
详细信息
The proceedings contain 18 papers. The special focus in this conference is on Advanced Information systemsengineering. The topics include: Incorporating Behavioral Recommendations Mined from Event Logs into ...
ISBN:
(纸本)9783031610561
The proceedings contain 18 papers. The special focus in this conference is on Advanced Information systemsengineering. The topics include: Incorporating Behavioral Recommendations Mined from Event Logs into AI Planning;trustworthy Collaborative Business Intelligence Using Zero-knowledge Proofs and Blockchains;Towards Intelligent systems to Improve IEC 62559 Use Cases and Smart Grid Architecture Models Quality;pricing4SaaS: Towards a Pricing Model to Drive the Operation of SaaS;Validity at the Forefront: Investigating Threats in Green AI Research;requirement-Based Methodological Steps to Identify Ontologies for Reuse;Toward Ontology-Guided IFRS Standard-Setting;towards an Explorable Conceptual Map of Large Language Models;proReco: A Process Discovery Recommender System;recPro: A User-Centric Recommendation Tool for Business Process Execution;predictive Maintenance in a Fleet Management System: The Navarchos Case;CDMiA: Revealing Impacts of data Migrations on Schemas in Multi-model systems;MApp-KG: Mobile App knowledge Graph for Document-Based Feature knowledge Generation;CAKE: Sharing Slices of Confidential data on Blockchain;PADI-web for Plant Health Surveillance;PROMISE: A Framework for Model-Driven Stateful Prompt Orchestration.
In engineering, the design of a product relies heavily on a design specification;a co-creation of customer and engineer which captures the requirements. Subjectivity is intrinsic to this process. Whilst engineers typi...
详细信息
Additive manufacturing is an innovative production approach aimed at creating products that traditional techniques cannot produce with the desired quality and requirements. Throughout the additive manufacturing proces...
详细信息
Nowadays, with the rapid development of mobile Internet and smartphones, credit card fraud has become more and more serious, causing significant credit and financial damage to cardholders and economics. Many previous ...
详细信息
The massive resources of intelligent instruments provide data support for cross enterprise regional network collaborative manufacturing. However, the discrete distribution of data, a large amount of redundancy, and we...
详细信息
In order to improve efficiency and reduce costs, large organizations are building key systems, such as enterprise resource planning (ERP), manufacturing execution system, human resource management (HRM) and customer r...
详细信息
The technical realization of temperature control system plays a key role in the development of industrial automation. This paper designs a temperature control system with the heating furnace model as the controlled ob...
详细信息
The conversion department is in desperate need of increasing production while reducing input resources. The conversion department is a recently formed department inside company XYZ in South Africa, and it is currently...
详细信息
ISBN:
(纸本)9783031744815;9783031744822
The conversion department is in desperate need of increasing production while reducing input resources. The conversion department is a recently formed department inside company XYZ in South Africa, and it is currently moving from the introduction phase to the growth phase of its life cycle. The current productivity in the Converting department is a significant obstacle that impedes the growth of the South African-based factory and is unsuitable for long-term operations. Lead times that are a fraction of the takt time, staff and equipment utilization ranging from 40% to 70%, no standardised work, and the absence of standard operating procedures all have a detrimental impact on productivity and need the adoption of industrial engineering approaches. As a result, the study will use industrial engineering techniques such aswork-study, and ECRS (remove, combine, reorganize, simplify) to analyze the reasons that contribute to overall low productivity and strategies to improve it. To answer research questions, researchers used a pragmatic research philosophy to examine data based on these components. The researcher also conducted a literature review to validate current knowledge of manufacturing department productivity. The study's goal is to boost overall productivity and help the department navigate the growth-to-maturity phase of its life cycle.
In this paper, we tackle the challenge of generating synthetic log files using generative adversarial networks to support smart-troubleshooting experimentation. Log files are critical for implementing monitoring syste...
详细信息
ISBN:
(纸本)9798350380279;9798350380262
In this paper, we tackle the challenge of generating synthetic log files using generative adversarial networks to support smart-troubleshooting experimentation. Log files are critical for implementing monitoring systems for smart-troubleshooting, as they capture valuable information about the activities and events occurring within the monitored system. Analyzing these logs is crucial for effective smart-troubleshooting, enhancing the overall efficiency, reliability, and security of smart manufacturing processes. However, accessing public log data is difficult due to privacy concerns and the need to protect sensitive information. Moreover, for the purpose of effective troubleshooting, it is essential to have datasets that include fault, error, and failure logs as well as standard logs. In recent years, synthetic log files have emerged as a promising solution to augment limited real-world datasets and facilitate the development and evaluation of anomaly detection techniques. Building on this concept of synthetic data, we have developed a specific log generation technique and dataset tailored for testing smart-troubleshooting techniques in heterogeneous connected systems environments, such as industrial cyber-physical systems and the internet of things. First, we propose a methodology that generates synthetic log files based on generative adversarial networks. Later, we instantiate this methodology using different Generative Adversarial Network implementations and present a validation and a comprehensive comparative analysis of their performance. Eventually, we provide a robust dataset for anomaly detection and threat analysis in cyberspace security. Based on the results of our comparison, CTGAN has shown superior performance in generating high-quality synthetic log files.
暂无评论