The proceedings contain 16 papers. The topics discussed include: combining function points software estimation model with ADISSA methodology for systems analysis and design;modeling an industrial software process usin...
ISBN:
(纸本)0818675365
The proceedings contain 16 papers. The topics discussed include: combining function points software estimation model with ADISSA methodology for systems analysis and design;modeling an industrial software process using a commercially available tool;creating transient hypertextual access structures for c programs;automatic jazz accompaniment computation: open advice-based approach;computer science apprenticeship;a system for document reuse;tool and method reciprocity: a case study in requirements management;testing concurrent programs: a formal evaluation of coverage criteria;and integrating groupware activities into workflow management systems.
In this paper, we examine the cybersecurity vulnerability assessment method of medical software. Medical software processes patient sensitive data and is linked to various medical devices and systems in real time. Due...
详细信息
ISBN:
(数字)9798331510756
ISBN:
(纸本)9798331510763
In this paper, we examine the cybersecurity vulnerability assessment method of medical software. Medical software processes patient sensitive data and is linked to various medical devices and systems in real time. Due to these characteristics, medical software is highly likely to be exposed to various cybersecurity threats such as ransomware, data leakage, and medical device hacking. Based on the international standard IEC TS 60601-4-5, we propose threat modeling, vulnerability scanning, and penetration testing as a methodology for assessing the security vulnerabilities of medical software. Through this, we can identify security vulnerabilities in advance and prepare measures to respond quickly. We can prevent security threats and improve the safety of medical software through response strategies such as security patches and updates, network separation, data encryption, and security education. In conclusion, strengthening the security of medical software is essential to maintain patient safety and the reliability of the medical system, and systematic security assessment and continuous response are required.
Neural enhancement through super-resolution (SR) deep neural networks (DNNs) opens up new possibilities for ultra-high-definition (UHD) live streaming. Yet, the heavy SR DNN inference overhead leads to severe deployme...
详细信息
Passive automata learning is a method for inferring automaton models from a given collection of observations of system behavior (traces). It has been applied to reactive systems with probabilistic behavior. In particu...
详细信息
Micro-grid power systems that utilize renewable energy sources, such as solar PV and wind turbines, are a viable solution for providing electricity to remote areas that are not connected to national grids. By combinin...
详细信息
This study explores the core technology behind many contemporary virtual singers, specifically AI singing technology, from the perspective of the Xiaoice framework. The paper compares AI singing with human singing in ...
详细信息
ISBN:
(数字)9798350389579
ISBN:
(纸本)9798350389586
This study explores the core technology behind many contemporary virtual singers, specifically AI singing technology, from the perspective of the Xiaoice framework. The paper compares AI singing with human singing in terms of resonance, breathing, head-chest voice transition, and articulation. Using Praat software, the study analyzes pitch, timbre, and transitions between vowels and consonants. The results reveal significant differences between AI and human singing in terms of pitch processing and articulation, which in turn affect the emotional expression and performance of songs. While certain features of AI singing are difficult for the human ear to distinguish, other features are easily identifiable. The study concludes that AI singing technology needs further refinement to surpass the expressive capabilities of the human voice. Additionally, the paper discusses the future prospects of AI singing technology, emphasizing that AI with singing capabilities, unlike AI that merely provides knowledge storage, is less likely to become obsolete and has considerable potential for development.
Recent advancements in quantum computing have highlighted the necessity for specialized software to effectively address the unique challenges of quantum systems. The integration of quantum computing with IoT ecosystem...
详细信息
ISBN:
(数字)9798331533366
ISBN:
(纸本)9798331533373
Recent advancements in quantum computing have highlighted the necessity for specialized software to effectively address the unique challenges of quantum systems. The integration of quantum computing with IoT ecosystems, forming the Quantum Internet of Things (QIoT), offers transformative potential across security, efficiency, and computational scalability. This paper presents a review of QIoT architectures, focusing on their core dimensions, including security, blockchain integration, quantum-assisted machine learning, and quality attributes. By synthesizing findings and proposing a structured taxonomy, we address gaps and explore pathways for future research and innovation. The paper aims to serve as a roadmap for researchers and practitioners navigating the complexities of QIoT systems.
This paper aims to delve into the development of EduGym, an educational microlearning game specifically designed for mobile platforms. The discussion highlights the implementation and integration of Open Educational R...
详细信息
ISBN:
(数字)9798331513320
ISBN:
(纸本)9798331513337
This paper aims to delve into the development of EduGym, an educational microlearning game specifically designed for mobile platforms. The discussion highlights the implementation and integration of Open Educational Resources (OER) and examines their significant impact on the development process. The project strategically used OER as the primary content source to ensure seamless future content expansion without requiring changes to the core application. This approach also empowers other developers to repurpose and adapt the content for various educational applications. Furthermore, the paper addresses key challenges encountered during the development process from a softwareengineering standpoint, including maintaining flexibility, ensuring scalability, and managing resource allocation. The study outlines the overall architecture of EduGym, detailing the development workflow and the ways in which OER integration influenced both development and resource management. The aim is to offer valuable insights and practical guidance for developers and educators who are exploring similar methodologies, informed by the lessons learned and experiences gained through the creation of EduGym.
This article describes a new suite of simulation plugins for the Gazebo 3D simulator to facilitate realistic simulation of time-varying 3D wind fields and gusts. The plugins integrate with ROS and Pixhawk PX4 software...
详细信息
ISBN:
(数字)9798331513283
ISBN:
(纸本)9798331513290
This article describes a new suite of simulation plugins for the Gazebo 3D simulator to facilitate realistic simulation of time-varying 3D wind fields and gusts. The plugins integrate with ROS and Pixhawk PX4 software-In-The-Loop (SITL) firmware to aid in the development of robust UAS control systems. Our approach features two main components: (1) real-time plugins for simulating environmental and sensed versions of complex, spatially varying wind velocity fields, using a Fourier-based compression of large CFD datasets, and (2) real-time plugins for modeling environmental and sensed versions of short-duration windblasts. By building on opensource Gazebo and ROS software, the developed framework provides high-accuracy physics simulation with support for multiple vehicles, fostering improved flight controller design and testing in cluttered or challenging atmospheric conditions.
Variable-bitrate video streaming is ubiquitous in video surveillance and CCTV, enabling high-quality video streaming while conserving network bandwidth. However, as the name suggests, variable-bitrate IP cameras can g...
详细信息
暂无评论