This paper introduces MyFood, a software platform that utilizes semantic technologies and artificial intelligence to represent knowledge in the food domain and to provide smart services to its users. The platform leve...
详细信息
The proceedings contain 29 papers. The special focus in this conference is on Data Science and Network engineering. The topics include: Explainable AI Insights into a Time Series Weather Prediction Model Using Stacked...
ISBN:
(纸本)9789819783359
The proceedings contain 29 papers. The special focus in this conference is on Data Science and Network engineering. The topics include: Explainable AI Insights into a Time Series Weather Prediction Model Using Stacked LSTM;patient-Specific and Patient-Independent Seizure Prediction Using Ensemble Learning Technique;an Intuitive and Modular Framework for Enhanced Human-Machine Synergy;Wavelet-Transformed K-NN Pipeline for EEG-based Eye Blink Classification with Time Wrapping;enabling Cursor Control Through Eye Movement Using Hidden Markov Model;Comparative Study: Word2Vec Versus TF-IDF in software Defect Predictions;an Improved Deep Learning Framework based on Multi-Scale Convolutional Architecture for Road Crack Detection;knowledge Graph Relation Learning Using GAN-BERT;sightAssist: A Multi-facility Machine Learning Approach for Empowering the Visually Impaired;Predicting COVID-19 Cases in India Using ARIMA, Prophet, LSTM and Data Analysis Using Power BI;Classification of Muti-Labeled Retinal Diseases in Retinal Fundus Images Using CNN Model ResNet18;LSTM-based Portfolio Optimization with Gerber Covariance Estimator for Increased Robustness;handwritten Character Recognition from Small Grayscale Images Using Pre-trained Models;Forecasting Heart Disease Using Deep BI-DI Neural Networks;emo-Tune: Harnessing Emotion-based Music for Patient Wellness;Making Data Secure in Detecting ADHD with Supervised Learning;an Analysis of Automatic Question Generation Research Progress and Challenges;a Federated Learning Approach Towards a Privacy-Preserving Technique for Brain Tumor Classification;low Cost Emergency Communication System for Disaster Affected Areas;a Slot-Integrated based Partial Ground and Tapered Patch Antenna for Satellite Communications;a Review on Wireless Power Transfer Systems;application of Big Data to Traffic Generated in Mechanisms Containment on Optical Burst Switching Distributed Networks;a Real-Time Arm-Worn Sensor-based Human Fall Alert Notification Mode
Agile project management is an established approach in software development and over time has also been adapted to different fields of work. While there are proven advantages for an agile development process, not all ...
详细信息
An educational storytelling concept is presented, inspired by the archetypal story pattern common in ancient myths as well as modern day adventures. software development is a complex profession demanding constant lear...
详细信息
ISBN:
(纸本)9789897585623
An educational storytelling concept is presented, inspired by the archetypal story pattern common in ancient myths as well as modern day adventures. software development is a complex profession demanding constant learning and improvement in a field changing almost daily. Apart from learning new technologies and writing computer code, much of a developer's time is spent on problem-solving and debugging - that is, detecting and correcting errors and bugs that cause a system to break or behave unexpectedly. The average developer regularly goes through a series of transformative steps to overcome intricate problems that often appear obscure and enigmatic at the beginning. The return with special knowledge to share with others is the final reward earned on the Developer's Journey. Under the premise that a good story can change our perception and offset the biases of our interpretation of reality, a didactic method has been designed for sharing and interpreting experiences in a cooperative learning environment. In the context of cloud computing education, its effects on problem-solving, motivation and perception are evaluated. We analyze transformative learning opportunities in connection with narratives and discuss its potentials and limitations in community-based learning.
A quantum compiler is required to run a quantum circuit on a quantum computer, similar to how classical compilers are required to run programs on classical computers. Spin qubits are a promising candidate for scalable...
详细信息
ISBN:
(纸本)9798331541378
A quantum compiler is required to run a quantum circuit on a quantum computer, similar to how classical compilers are required to run programs on classical computers. Spin qubits are a promising candidate for scalable quantum computers. General-purpose quantum compilers can be used for spin qubit devices, however they do not consider additional constraints imposed due to Double-Quantum-Dot (DQD) readout. For DQD readout, when a qubit in an algorithm is measured, the compiler must remap and re-route it to be adjacent to a special-purpose readout qubit, which is preserved in a known state. Moreover, this should be done in a way that minimizes overhead and maximizes the fidelity, in particular, due to noise in the readout process. This work formulates readout constraints to extend SMT (Satisfiability Modulo Theory)-based layout synthesis techniques proposed in ill to spin qubit architectures. We define a metric, readout depth, to quantify the overheads incurred. Preliminary results, obtained from benchmarking GHZ and variational quantum eigensolver circuits on architectures with grid topologies, highlight the algorithmic tradeoffs that arise. We expect ongoing work on scaling up the methods to a larger set of algorithms will help inform the decisions of spin qubit hardware designers.
Cultivating the ability to solve complex and contradictory problems is one of the important goals of engineering education. This paper introduces extenics into the training of cultivating college students' problem...
详细信息
Digital power grid is based on traditional power grid, through advanced communication, calculation, control and other technical means. Data asset management is an important concept of modern new enterprise management,...
详细信息
Orthogonal defect classification (ODC) is a multi-dimensional measurement system with both qualitative and quantitative characteristics. And it is currently widely used in the software industry. However, its high leve...
详细信息
ISBN:
(纸本)9791188428090
Orthogonal defect classification (ODC) is a multi-dimensional measurement system with both qualitative and quantitative characteristics. And it is currently widely used in the software industry. However, its high level of abstraction leads to limited semantic information. Therefore, it seems to have a limited role in the process of softwareengineering of software-intensive systems (SISs). To solve this problem, this paper first analyzes software error lifetime from the perspective of knowledge-basedsoftwareengineering and proposes an error generation model. Then, the paper proposes the concepts of software error pattern (SEP) and software requirements error pattern (SREP) based on the ODC. Then, according to an error generation mechanism, four types of software-hardware integrated error pattern (SHIEP) in the requirement stage, which is a sub-category of SREP, and corresponding ontology representation are given, focusing on "scenario", "error manifestation" and "solution". Finally, this paper takes a certain type of airborne radar software system as an example, uses protege to edit the SHIEPs and instances, and further introduces the application of software FMEA based on the above work. The results show that the prior information based on the SHIEPs is helpful to discover potential failures and failure modes that may adversely affect the function or performance of SISs. Therefore, the proposed SHIEP is of great significance for improving the quality of software development and verification.
In this paper, we propose an innovative deep learning-based model designed to detect potential security vulnerabilities in source code. The model is pretrained on the open-source PyPI code repository and a specially c...
详细信息
ISBN:
(纸本)9798350388732;9798350388725
In this paper, we propose an innovative deep learning-based model designed to detect potential security vulnerabilities in source code. The model is pretrained on the open-source PyPI code repository and a specially curated malicious code dataset, allowing it to deeply learn the syntactic structure and semantic information of the code, thus building a deep knowledge representation. We further refine this knowledge representation through fine-tuning to form a classifier focused on malicious code detection. Evaluation results on an open-source malicious code dataset indicate that our model's performance not only surpasses traditional machine learning methods, recurrent neural networks (RNNs), and convolutional neural networks (CNNs), but also outperforms popular open-source security tools and significantly exceeds advanced detection models designed for other programming languages. Despite our model's smaller scale, limited by the amount of data and model parameters, it demonstrates exceptional performance on the test dataset, far exceeding traditional machine learning techniques. This achievement highlights the strong potential of our model in the analysis of source code security and provides new directions and possibilities for future research in this field.
Model Predictive Control (MPC) has the potential to control HVAC systems more efficiently than traditional controllers, as proven by numerous studies. Various simulation tools/platforms are available to test advanced ...
详细信息
暂无评论