Many research efforts into video conferencing technology have focused on audio-only interactions. Text chat, on the other hand, has many uses and is often used in conjunction with the audio channel in multimedia confe...
详细信息
In the teaching of cloud computing and big data related majors in colleges and universities, in order to let learners master the relevant knowledge in addition to theoretical teaching, it is also very important to all...
详细信息
The increasing level of expertise in softwareengineering in Sri Lanka is a crucial moment for its Information Technology and Business Process Management (IT/BPM) industry. Nevertheless, the obstacle of migration, par...
详细信息
While the potential of AI in software development is undeniable, integrating advanced models like GPT-3.5 into its core processes like requirements engineering remains largely unexplored. This research investigates th...
详细信息
software reuse improves productivity and ensures that there is less time delivered to the market by enabling the proper usage of reusable code from the software repositories. The study provides the collaboration betwe...
详细信息
The utility of ubiquitous computing systems drives large-scale software development with millions of lines of code (LOC). As there are vast code sets, it also increases the possibility of coding errors since it is dif...
详细信息
ISBN:
(纸本)9798350326970
The utility of ubiquitous computing systems drives large-scale software development with millions of lines of code (LOC). As there are vast code sets, it also increases the possibility of coding errors since it is difficult for even highly trained software engineers to write flawless code. Such flawed software can lead to severe issues once deployed. McCabe and Halstead proposed feature extractors for source code to define software quality. Based on the static features proposed by McCabe and Halstead, we run a series of feature engineering techniques and different machine learning models to detect code defects and use explainable algorithms to assess the prediction quality. We report different processing pipeline combinations to detect defects and compare the approaches. We conclude the paper with comments on the nature of the dataset and establish a baseline for further research.
In recent years, the rise of electric vehicles (EVs) has brought Active Sound Design (ASD) to the forefront as a crucial methodology for enhancing both acoustic quality and the overall driving experience. To address t...
详细信息
Understanding a meme is a challenging task, due to the metaphorical information contained in the meme that requires intricate interpretation to grasp its intended meaning fully. In previous works, attempts have been m...
详细信息
The proceedings contain 60 papers. The topics discussed include: mobile payment authentication using QR code based on visual cryptography scheme;a classroom usage monitoring system with image detection for student att...
ISBN:
(纸本)9798350317503
The proceedings contain 60 papers. The topics discussed include: mobile payment authentication using QR code based on visual cryptography scheme;a classroom usage monitoring system with image detection for student attendance;tapping into the interactive online classroom: the use of multimedia in e-learning;disrupting higher education: a comparative study of synchronous lecturing and self-paced learning in higher education;course recommendation on online learning platforms using collaborative filtering and content-based filtering with implicit feedback;Delone-Mclean and technology acceptance model in investors use of automated order online trading;exploring COVID-19 vital signs using Bayesian network causal graph;stunting classification analysis for toddlers in Bojongsoang: a data-driven approach;analyzing the factors influencing the use of digital banking services among generation Z;and performance of traditional and dense vector information retrieval models in code search.
In recent decades, rapid advancements in AI, machine learning, and deep learning have yielded new methods and tools for manipulating multimedia. While this technology has primarily found applications in legitimate fie...
详细信息
暂无评论