the proceedings contain 9 papers. the topics discussed include: summary of iMLSE-18: the 1st International Workshop on Machine Learning Systems engineering;towards testing of deep learning systems;simplified influence...
the proceedings contain 9 papers. the topics discussed include: summary of iMLSE-18: the 1st International Workshop on Machine Learning Systems engineering;towards testing of deep learning systems;simplified influence evaluation of additional training on deep neural networks;guaranteeing deep neural network outputs in a feasible region;an assurance case approach for software code security;threat analysis using STRIDE with STAMP/STPA;restructuring attack trees to identify incorrect or missing relationships between nodes;and using a variety of patterns in a secure software development methodology.
Life cycle software development is concerned in the software development process (SDP), which inspects the software development region. Life cycle of software development (SDLC) is a technique that assures that the so...
详细信息
Integrating fragmented knowledge points in softwareengineering teaching can ensure the continuity of learners’ learning of softwareengineering courses. In order to improve the reliability of integration of fragment...
详细信息
Due to the differences in geographical environment and customer requirements, the protection function requirements for embedded relay protection devices are also very customized in different regions. based on extensiv...
详细信息
softwareengineering is shaped and used by boththe industry and academia, whose goals and contributions are different. Since there are some mismatches in perceptions of software practitioners about academics and acad...
详细信息
Coronary artery disease is a leading cause of death globally. In order to lower the mortality rate, early detection and accurate prediction of cardiac disease are necessary. It requires experience and deeper knowledge...
详细信息
Unmanned Aerial Vehicles (UAVs) are used in a wide range of applications. However, since they are vulnerable to cyberattacks security protocols for their data are used. Common existing approaches for data encryption/d...
详细信息
To ensure the efficient operation of solar unmanned aerial vehicle (UAV), the power system plays a crucial role. Achieving a stable power supply for solar UAV in extremely harsh environment needs maintaining the value...
详细信息
To improve cybersecurity, cloud-basedthreat intelligence sharing for collective defense is essential. Organizations must work together to effectively detect and respond to the variety of cyber dangers that exist in t...
详细信息
Advanced software in regenerative farming assists cultivators in managing crop information, such as cycle, reaping, and soil management. Sensors assess soil conditions. this information aids in developing a system tha...
详细信息
暂无评论