Predictive Machine Learning techniques provide mechanisms for the computing machines to analyze and understand the knowledge inherently embedded in the given dataset. This unique technique can be effectively used in u...
详细信息
The knee j oint is loaded differently during daily activities. Recovery and ability to practice different activities after total knee replacement (TKR) surgery still trouble most patients. Additively manufactured poro...
详细信息
In the automotive industry, according to ISO 26262, comprehensive testing is conducted to ensure software systems quality over various phases of the V-model. However, at the system integration and testing phase, a sig...
详细信息
In general, educational support with Large Language Models (LLMs) faces challenges in knowledge organization, expertise integration, and contextual adaptation. So, we present EduMAS, a novel multi-agent framework that...
详细信息
The proceedings contain 27 papers. The special focus in this conference is on Model and Data engineering. The topics include: Social Recommendation Using Deep Auto-encoder and Confidence Aware Sentiment Analysis;deep ...
ISBN:
(纸本)9783031493324
The proceedings contain 27 papers. The special focus in this conference is on Model and Data engineering. The topics include: Social Recommendation Using Deep Auto-encoder and Confidence Aware Sentiment Analysis;deep Learning based on TensorFlow and Keras for Predictive Monitoring of Business Process Execution Delays;OntoFD: A Generic Social Media Fake News Ontology;Finding a Second Wind: Speeding Up Graph Traversal Queries in RDBMSs Using Column-Oriented Processing;ontology Matching Using Multi-head Attention Graph Isomorphism Network;Investigating the Perceived Usability of Entity-Relationship Quality Frameworks for NoSQL Databases;fuzzy HealthIoT Ontology for Comorbidity Treatment;advancing Brain Tumor Segmentation via Attention-based 3D U-Net Architecture and Digital Image Processing;breast Cancer Detection based DenseNet with Attention Model in Mammogram Images;a Formal Metamodel for software Architectures with Composite Components;AI-LMS: AI-based Long-Term Monitoring System for Patients in Pandemics: COVID-19 Case Study;cardiovascular Anomaly Detection Using Deep Learning Techniques;real-Time Mitigation of Trust-Related Attacks in Social IoT;hybrid Data-Driven and knowledge-based Predictive Maintenance Framework in the Context of Industry 4.0;Enhancing Semantic Image Synthesis: A GAN-based Approach with Multi-Feature Adaptive Denormalization Layer;towards an Effective Attribute-based Access Control Model for Neo4j;GRU-based Forecasting Model for Energy Production and Consumption: Leveraging Random Forest Feature Importance;localizing Non-functional Code Bugs in User Interfaces Using Deep Learning Techniques;a Floating-Point Numbers Theory for Event-B;Model-based Testing Approach for EIP-1559 Ethereum Smart Contracts;execution Planning for Aggregated Search in the Web of Data: A Free-Metadata Approach;Discovering Relationships Between Heterogeneous Declarative Mappings for RDF knowledge Graph;Exploring Synthetic Noise Algorithms for Real-World Similar Data Gen
OSS-based learning refers to using open source software (OSS) and their sociotechnical practices in the pedagogical context. Several educators reported its benefits and barriers within different contexts, goals, and a...
详细信息
Identifying security patches via code commits to allow early warnings and timely fixes for Open Source software (OSS) has received increasing attention. However, the existing detection methods can only identify the pr...
详细信息
ISBN:
(纸本)9781665457019
Identifying security patches via code commits to allow early warnings and timely fixes for Open Source software (OSS) has received increasing attention. However, the existing detection methods can only identify the presence of a patch (i.e., a binary classification) but fail to pinpoint the vulnerability type. In this work, we take the first step to categorize the security patches into fine-grained vulnerability types. Specifically, we use the Common Weakness Enumeration (CWE) as the label and perform fine-grained classification using categories at the third level of the CWE tree. We first formulate the task as a Hierarchical Multi-label Classification (HMC) problem, i.e., inferring a path (a sequence of CWE nodes) from the root of the CWE tree to the node at the target depth. We then propose an approach named TREEVUL with a hierarchical and chained architecture, which manages to utilize the structure information of the CWE tree as prior knowledge of the classification task. We further propose a tree structure aware and beam search based inference algorithm for retrieving the optimal path with the highest merged probability. We collect a large security patch dataset from NVD, consisting of 6,541 commits from 1,560 GitHub OSS repositories. Experimental results show that TREEVUL significantly outperforms the best performing baselines, with improvements of 5.9%, 25.0%, and 7.7% in terms of weighted F1-score, macro F1-score, and MCC, respectively. We further conduct a user study and a case study to verify the practical value of TREEVUL in enriching the binary patch detection results and improving the data quality of NVD, respectively.
In recent decades, companies and other organizations have been increasingly focusing on agile software development methods, and Scrum has been increasingly introduced into software development projects. However, teams...
详细信息
ISBN:
(纸本)9781665455374
In recent decades, companies and other organizations have been increasingly focusing on agile software development methods, and Scrum has been increasingly introduced into software development projects. However, teams in the early stages of Scrum adoption tend to focus on adhering to development processes and practices, often neglecting the four essential values declared in the Agile Manifesto. This paper proposes a field of retrospective called Agile Manifesto Farm (AMF) as a method to promote awareness of the four values and to progressively formalize and establish the knowledge obtained through the activities of each sprint. As a case study, the proposed method is applied in a project-based learning class.
Modern medicine is studied based on standardized figures obtained through Medical and scientific methods with one equality of all humans. The disease's measurement, analysis, and treatment are quantified through t...
详细信息
ISBN:
(纸本)9798350361513;9798350372304
Modern medicine is studied based on standardized figures obtained through Medical and scientific methods with one equality of all humans. The disease's measurement, analysis, and treatment are quantified through this. Traditional Korean medicine, on the other hand, aims to maintain a healthy human life by solving the fundamental problem of disease based on each different one of all humans. However, traditional Korean medicine may not fit in modern times due to its long accumulation of prior knowledge-based records. We are working in a softwareengineering lab. Because there are no medical doctors, we focus on the number of values of human bioelectricity. We propose a method of identifying the human constitution with how to apply bioelectricity pattern signals based on traditional Korean medical theory. Through the proposed method, it will expect to care for health conditions. With this visualization, we may possibly identify the abnormal area of the human body with internal organs, such as liver, heart, lung spleen, kidney. After recovering health, we may also recognize to become the normal condition of him/her.
Deep neural networks (DNNs) have been widely used in safety-critical fields such as autonomous driving and medical diagnosis. However, DNNs are easily disturbed to make wrong decisions, which may lead to loss of life ...
详细信息
暂无评论