Requirement validation is the most vital phase of Requirement engineering (RE) process which provides clear, complete and consistent requirements to software development team. Although several requirement validation a...
详细信息
The Introduction to engineering (ITE) and Industrial Seminar and Profession (ISP) courses conducted at the School of Chemical and Energy engineering, Universiti Teknologi Malaysia, are integrated courses, which implem...
The Introduction to engineering (ITE) and Industrial Seminar and Profession (ISP) courses conducted at the School of Chemical and Energy engineering, Universiti Teknologi Malaysia, are integrated courses, which implement the Cooperative Problem-based Learning (CPBL) methods in the same semester. based on these integrated courses, the main aim of this paper is to present results of a study that investigate the qualitative impact of spreadsheet hands-on seminar on the first-year students' digital skill. At the beginning of the semester, students given sustainability-based project to work on, which requires them to collect and to report the data in a series of presentations and written reports. In order to present those data, they need to use analysis tools such as a spreadsheet software. The students were introduced with some in-depth applications of the Microsoft Excel software through the seminar sessions in the ISP course. With the knowledge gained, they are expected to implement it in the CPBL project. Throughout the semester, the students are required to prepare reflection journals every 3 weeks to analyze, reflect and evaluate their learning process. In order to evaluate the students’ development of their digital skills, instructors will analyze the journals to identify common attributes that they have managed to gain. This analysis may also help the instructors to further improved the activities for the coming semester to further enhance the student digital skills.
software produced through an engineering process is often based on uncertain requirements for several reasons. Conversely, the success or failure of the project itself is usually measured based on business profitabili...
详细信息
This paper presents a project-based learning strategy for teaching hardware/software co-design in modern Computer engineering undergraduate courses. This kind of approach is considered by several recent pedagogical st...
详细信息
ISBN:
(数字)9781728167329
ISBN:
(纸本)9781728167336
This paper presents a project-based learning strategy for teaching hardware/software co-design in modern Computer engineering undergraduate courses. This kind of approach is considered by several recent pedagogical studies as the ideal strategy to support great learning achievements and to increase the proficiency of the students both in the design of digital systems and programming. The proposed strategy, targeting the first-year students, focuses on deepening the knowledge of combinatorial logic, sequential circuits, and state machines, alongside the hierarchical development of software, including for peripheral management.
In order to meet the problems caused by sparse data and computational efficiency, knowledge graph (KG) is adopted to represent the semantic information of entities and relations as dense and low-dimensional vectors. W...
详细信息
ISBN:
(数字)9781728192284
ISBN:
(纸本)9781728185361
In order to meet the problems caused by sparse data and computational efficiency, knowledge graph (KG) is adopted to represent the semantic information of entities and relations as dense and low-dimensional vectors. While conventional KG representation methods mainly focuse on static data. These methods fail to deal with data that evolves with time which may only be valid for a certain period of time. To accommodate this problem, a temporal KG embedding model based on tensor decomposition is proposed in this paper, which regards the fact set in the KG as a fourth-order tensor including head entities, relations, tail entities and time dimensions. This method can be further generalized to other static KG embedding based on tensor decomposition. With experiments on temporal datasets extracted from real-world KG, extensive experiment results show that our approach outperforms state-of-the-art methods of KG embedding.
Block lifting is an important process for the modern shipbuilding. Before the block is being lifted, the lifting points of the block should be determined. This paper proposes an intelligent design system of arranging ...
详细信息
ISBN:
(纸本)9780429298875;9780367278090
Block lifting is an important process for the modern shipbuilding. Before the block is being lifted, the lifting points of the block should be determined. This paper proposes an intelligent design system of arranging the lift points for the block of the ship. based on the imported information of the target block, the developed program could generate the arrangement of the lift points automatically. By conducting secondary development of the *** software, we coupled the finite element analysis into the developed program, which is used to compute the stress and deformation of the block under lifting condition. The developed program is tested with a case of lifting a side-bottom block of a container ship. The results show that the developed program is able to provide correct arrangement of the lift points and reasonable results of stress and deformation for the block in lifting condition.
Architecture-Driven Modernization claims that MDA (Model-Driven Architecture) concepts should be used for modernization projects in the process. One of the largest challenges when contemplating ADM (Architecture-Drive...
详细信息
ISBN:
(数字)9781665422314
ISBN:
(纸本)9781665446723
Architecture-Driven Modernization claims that MDA (Model-Driven Architecture) concepts should be used for modernization projects in the process. One of the largest challenges when contemplating ADM (Architecture-Driven Modernization) is the modernization of developed system in order to ensure interoperability between tools for maintenance, evolution, assessment and allow the success of modernization projects that preserving architecture quality. ADM supports reengineering by providing standard meta-models, such as knowledge Discovery Metamodel (KDM). Modernizing a large legacy or existing system is therefore a complex and expensive process that requires a thorough understanding of the system design architecture and its components. However, legacy systems have also experienced several modifications that lead them to deviate from their original designed architecture and lose its properties of quality. To facilitate the analysis of the system, the projection process proposed as part of our approach is based on facet cutting which allows determining the views having anomalies in order to facilitate quality control. The proposed approach in this paper is of great importance in the context of the modernization process, since it is committed to improving the KDM framework as methods used to assist in the detection of architecture violation.
Memory leaks are a major threat in modern software systems. They occur if objects are unintentionally kept alive longer than necessary and are often indicated by continuously growing data structures. While there are v...
详细信息
ISBN:
(纸本)9781450362399
Memory leaks are a major threat in modern software systems. They occur if objects are unintentionally kept alive longer than necessary and are often indicated by continuously growing data structures. While there are various state-of-the-art memory monitoring tools, most of them share two critical shortcomings: (1) They have no knowledge about the monitored application's data structures and (2) they support no or only rudimentary analysis of the application's data structures over time. This paper encompasses novel techniques to tackle both of these drawbacks. It presents a domain-specific language (DSL) that allows users to describe arbitrary data structures, as well as an algorithm to detect instances of these data structures in reconstructed heaps. In addition, we propose techniques and metrics to analyze and measure the evolution of data structure instances over time. This allows us to identify those instances that are most likely involved in a memory leak. These concepts have been integrated into AntTracks, a trace-based memory monitoring tool. We present our approach to detect memory leaks in several real-world applications, showing its applicability and feasibility.
In augmented reality, smart devices need to sense their own position in real physical space and complex scene structure to achieve good virtual reality interaction and three-dimensional registration. This paper propos...
详细信息
With the development of IOT and 5G technology, people’s demand for information acquisition is more inclined to accuracy, intelligence and timeliness. How to help designer obtain the real-time information of specific ...
详细信息
暂无评论