Operating Systems (OS) is an important area of knowledge included in virtually all undergraduate computing curricula and in some engineering curricula as well. teaching and learning an OS undergraduate course have alw...
详细信息
Operating Systems (OS) is an important area of knowledge included in virtually all undergraduate computing curricula and in some engineering curricula as well. teaching and learning an OS undergraduate course have always been a challenge. Several different approaches have been used for OS teaching and learning. Nevertheless, it is not easy for a teacher to choose one of them. No guidelines are available on how to choose one of them to match the specific objectives of each OS course. The objective of this paper is to analyze the approaches that have been used to improve OS teaching and learning by applying a systematic map. In particular, we consider the following dimensions: learning objectives, assessment, empirical study, methodology, and mode (face-to-face, online, or blended). The systematic map devised in this paper is focused on the time span from 1995 to 2017 and considered six of the major publications on the Computer Science Education. We considered three journals (the Journal of engineering Education, the IEEE TRANSACTIONS ON EDUCATION, and the international Journal of engineering Education) and three conferences (the ACM Technical Symposium on Computer Science Education-SIGCSE, the conference on computing Education Research-ITiCSE, and the internationalconference on computing Education Research-Koli). A total of 55 papers were included in the study after performing a search based on the inclusion/exclusion criteria. Nine approaches to improve OS teaching and learning were identified and analyzed. Furthermore, the implications for OS instructors and for research in this field are discussed.
Businesses use customer segmentation as a strategic tool to divide their heterogeneous client base into discrete groups according to demands, behaviors, or common traits. An overview of consumer segmentation technique...
详细信息
This paper presents a framework for the online selection of autonomous navigation strategies in real-time for robots operating in crowded and dynamic environments. Traditional path-planning algorithms emphasize the co...
详细信息
ISBN:
(数字)9798331508180
ISBN:
(纸本)9798331508197
This paper presents a framework for the online selection of autonomous navigation strategies in real-time for robots operating in crowded and dynamic environments. Traditional path-planning algorithms emphasize the computation of collision-free trajectories but may not account for more complex safety considerations that arise specifically when navigating around humans or other dynamic entities. To address these challenges, we propose a framework that evaluates a set of navigation strategies trained with deep reinforcement learning and selects the optimal strategy based on various metrics including safety, motion efficiency, and adaptability to changing scenarios. On one hand, the navigation strategies are trained using a reward function that incorporates objective metrics such as obstacle clearance and distance to the goal. On the other hand, the online evaluation of the strategies leverages a variety of additional performance metrics such as personal space intrusion, smoothness of path, control stability, and overall efficiency of control commands. The framework dynamically switches strategies to optimize navigation performance while balancing safety with control and path optimality. Simulated results show that the online selection of strategies can accomplish safer and more efficient navigation. Experimental results in real-world demonstrate the benefits of our approach, showing improved adaptability and context-aware decision-making compared to single-strategy navigation.
Understanding the rhetorical roles of sentences within legal documents is crucial for various downstream tasks, including semantic search, summarization, and case law analysis. However, the complex structure of legal ...
详细信息
The proposed research aims to address the critical need for robust disease detection in tomato crops in the Middle East, given the essential role of tomatoes in the region's food security. Recognizing the signific...
详细信息
Organizational and individual resource sharing is gaining significant attention in collaborative networks, focusing on the functioning of groups over various tasks. However, sharing sensitive data, such as personal in...
详细信息
ISBN:
(数字)9798331542375
ISBN:
(纸本)9798331542382
Organizational and individual resource sharing is gaining significant attention in collaborative networks, focusing on the functioning of groups over various tasks. However, sharing sensitive data, such as personal information and intellectual property, makes security and privacy a big problem. This is work done in secure multi-party computation (SMPC), which is a very promising solution because, in SMPC, multiple parties can compute a certain function on their input data without revealing them to each other. Secure Multiparty Computation (SMPC) SMPC is a cryptographic technique that allows multiple parties to compute a function over their input data sets while keeping those inputs private. The promise of a new computing environment enabling everyone to calculate in the dark, so no one sees or even knows the data being processed exists, is achieved through sophisticated cryptographic algorithms and protocols that split the computation among partners without ever revealing the underlying data. In this abstract, we provide an overview of the state-of-the-art regarding SMPC for privacy preservation in collaborative networks. This paper highlights the challenges and opportunity areas in adopting Secure Multi-Party Computation within a collaborative networking ecosystem, along with the advantages of this methodology. It has also been SMPC, a great offer of real-world use to share information in health networks, financial transactions, and between organizations. In conclusion, this abstract highlights the significance of privacy preservation for collaborative networks and demonstrates that SMPC can be a potential candidate for realizing such a mechanism.
Securing sensitive visual data is essential in the digital age. Our research presents a sophisticated model of image encryption that combines RNA pixel conversion with an autoencoder. A convolutional ne...
详细信息
Respiratory illness is the primary factor behind fatality associated with cancer globally, and timely identification is imperative for preserving lives. However, analyzing CT scans can be a burdensome task for radiolo...
详细信息
Recently, functional magnetic resonance imaging (fMRI) has been extensively utilized to explore brain functional connectivity networks (FCNs) and leverage brain networks for predicting behavioral information. Graph Ne...
详细信息
ISBN:
(纸本)9798400712203
Recently, functional magnetic resonance imaging (fMRI) has been extensively utilized to explore brain functional connectivity networks (FCNs) and leverage brain networks for predicting behavioral information. Graph Neural Networks (GNNs) have garnered significant attention in FCN analysis, due to their established power for analyzing graph-structured data. However, there are two major problems impeding the research when utilizing GNNs: (1) the limited receptive field of GNNs which only aggregate relevant information from local neighbor nodes; (2) the over-smoothing problem that arises when employing deep GNNs. To address these issues, we propose an innovative model that integrate Transformer into GNNs to enhance the ability of GNNs to aggregate relevant but relatively distant nodes. In addition, GNNs can assist Transformer to capture local neighbor node information by leveraging the graph structure information. Therefore, in this new model combining Transformer and GNNs based on the characteristics of fMRI data, we have specially designed three layers: Transformer Layer, GNN Layer and Graph Readout Layer. Finally, the experimental results on the Human Connectome Project data demonstrated the superiority of our proposed model.
Education technology (edtech) is increasingly prevalent in classrooms, yet 85% of the technologies currently implemented are a bad fit for the school, or are poorly implemented. This is especially problematic for poor...
详细信息
暂无评论