The theoretical and experimental information on the establishment of diagnostic criteria for automatic digital thermal diagnostics of mechanical transmission components of transport and technological machines is summa...
详细信息
The theoretical and experimental information on the establishment of diagnostic criteria for automatic digital thermal diagnostics of mechanical transmission components of transport and technological machines is summarized. According to the results of laboratory tests of the diagnostic device, the optimal value of the time interval for measuring the temperature of the diagnosed component according to the criterion of type II errors, false triggering, is determined.
In software, an algorithm is a well-organized sequence of actions that provides the optimal way to complete a task. Algorithmic thinking is also essential to break-down a problem and conceptualize solutions in some st...
详细信息
In software, an algorithm is a well-organized sequence of actions that provides the optimal way to complete a task. Algorithmic thinking is also essential to break-down a problem and conceptualize solutions in some steps. The proper selection of an algorithm is pivotal to improve computational performance and software productivity as well as to programming learning. That is, determining a suitable algorithm from a given code is widely relevant in software engineering and programming education. However, both humans and machines find it difficult to identify algorithms from code without any meta-information. This study aims to propose a program code classification model that uses a convolutional neural network (CNN) to classify codes based on the algorithm. First, program codes are transformed into a sequence of structural features (SFs). Second, SFs are transformed into a one-hot binary matrix using several procedures. Third, different structures and hyperparameters of the CNN model are fine-tuned to identify the best model for the code classification task. To do so, 61,614 real-world program codes of different types of algorithms collected from an online judge system are used to train, validate, and evaluate the model. Finally, the experimental results show that the proposed model can identify algorithms and classify program codes with a high percentage of accuracy. The average precision, recall, and F-measure scores of the best CNN model are 95.65%, 95.85%, and 95.70%, respectively, indicating that it outperforms other baseline models.
PIVO (programmer's Interactive Excercise Environment) is an interactive online practicing tool for algorithmical thinking and programming developed at the Faculty of Electrical Engineering, University of Ljubljana...
详细信息
PIVO (programmer's Interactive Excercise Environment) is an interactive online practicing tool for algorithmical thinking and programming developed at the Faculty of Electrical Engineering, University of Ljubljana, Slovenia. It is used for independent study, excercising and examination in programming courses. Through the sistem, a student aquires a task, develops a solution in his/hers personal working environment and submits the source code to the server. The code is compiled, run and tested in real time. The submitted code can be incomplete and potentially harmful to the server. This paper proposes techniques for untrusted code sandboxing based on built-in Linux security mechanisms. Using the techiques, PIVO serves multiple users safely and fast. Among the students, the PIVO environment is well accepted, its impacts and positive study improvements are measurable already after only a few semesters of usage.
This paper describes technical implementation of a verified program code execution system. The functional purpose of the system is to investigate arbitrary executable files of an operating system in the absence of sou...
详细信息
This paper describes technical implementation of a verified program code execution system. The functional purpose of the system is to investigate arbitrary executable files of an operating system in the absence of source codes in order to control program code execution within specified functional requirements. The prerequisites for development of such a system are outlined and a user's operating procedure with two typical usage scenarios is described. General description of the architecture of the system and software used for its implementation, including the mechanism of interaction among system elements, is presented. A model example of implementing the system is considered. A flexible set of functional constraints based on a temporal attribute of process action is described. In conclusions, a brief comparison with the closest analogs is conducted.
In the era of the fourth technological revolution, the implementation of social relations depends on information technology and software systems. The program code that controls the operation of these systems begins to...
详细信息
ISBN:
(纸本)9783030937157;9783030937140
In the era of the fourth technological revolution, the implementation of social relations depends on information technology and software systems. The program code that controls the operation of these systems begins to play the role of a regulator of social relations, since it de facto sets the boundaries of capabilities and imposes requirements on user behavior. The paper opened a discussion about what conditions are important for the program code to receive scientific recognition as a source of law. Three features are proposed to be considered necessary conditions. First, the program code must have an impact on social relations. Secondly, he must establish special rules for the participants in these relations, which are absent in legal acts, moreover, these rules de facto receive the status of mandatory if the information system (computer program, other tool) is the only way to exercise certain rights and/or responsibilities of the subject. Finally, users and other actors should accept these rules as a given, and consider opposition to them as an undesirable exception. A separate and very important issue is the attitude of the state - it must at least recognize and support the rules laid down in the code as the natural order of things in the corresponding social relations (if the state takes on the role of guarantor of such rules, for example, obliging the subjects of the right to use certain software, then the program code de facto begins to play the role of a source of law).
The present paper is, first of all, oriented to the internal evaluation of the quality of a program code, based on the conception of evaluation of the software quality using both the series of international standards ...
详细信息
The present paper is, first of all, oriented to the internal evaluation of the quality of a program code, based on the conception of evaluation of the software quality using both the series of international standards ISO/IEC 9126 and Russian standards in the branch of the software quality as a system of quality criteria and a set of metrics applied to evaluating a program code. The paper has been supported by a grant of the Russian Foundation for Basic Researches (RFBR): project 12-08-01205-a.
Learning mathematical knowledge from life experiences and solving practical problems independently can help students understand the significance and necessity of math in the process of independent exploration, coopera...
详细信息
ISBN:
(纸本)9781450398015
Learning mathematical knowledge from life experiences and solving practical problems independently can help students understand the significance and necessity of math in the process of independent exploration, cooperation, and exchanges. Further, they can understand and grasp fundamental life mathematical knowledge, skills, mathematical ideas, and methods and obtain extensive experience in mathematical activities. This study designed a game system to learn life-oriented math with Visual studio and Canva. Through activity designs and teaching-aid instruments, the life-oriented math games enable learners to experience the true essence of math from games in virtual life and enrich the meaning of life in the mathematical application. The game system for learning life-oriented math allows teachers and students to interact, learn, and discuss, forming a picture of learning together by discussing mathematical problems in the context of life experience.
The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requ...
详细信息
ISBN:
(纸本)9781728199573
The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requirements have already fixed the importance of version redundancy to counter common cause failures in safety-related systems. The problem of hidden faults inherent in these systems is equally acute, undermining confidence in the fault tolerance of circuit solutions important for functional safety. We suggest that this problem be seen as a growth problem where the system rises to the level of diversification in modes of operation by dividing them into normal and emergency and checkability circuits, but components continue to be stamped at a lower level of replication. Then the solution to the problem is to raise the components to the level of the system by developing their version redundancy. We demonstrate this development for FPGA components with LUT-oriented architecture and offer a method to improve the FPGA-ready project by natural version redundancy of its program code. The method generates a set of program code versions and selects versions that improve the checkability of circuits with respect to constant faults and the trustworthiness of results, respectively, in normal and emergency mode to reduce a set of hidden faults. The method is illustrated by an iterative array multiplier implemented in an FPGA project. Versions are generated, evaluated, and selected using the program developed for this.
The article describes offenses within Massively Multiplayer Online Worlds (MM014). The use of criminal law in cases of crimes committed by the inhabitants of virtual worlds is also discussed. But what is considered a ...
详细信息
ISBN:
(纸本)9781728119151
The article describes offenses within Massively Multiplayer Online Worlds (MM014). The use of criminal law in cases of crimes committed by the inhabitants of virtual worlds is also discussed. But what is considered a crime if it is committed in a virtual world, and under what conditions can there be a real criminal liability? The author offer his answers to these questions. The aim of the article is to draw attention to gaps in law regulating of MMOW's participants conduct. The author also comes to the conclusions that virtual worlds need internal rules and regulations and suggest appropriate algorithm for gluing of virtual and real law in cases of online crimes.
The shift towards parallel processor architectures has made programming, performance prediction and code generation increasingly challenging. Abstract representations of program code (i.e. classifications) have been i...
详细信息
ISBN:
(纸本)9781479910090
The shift towards parallel processor architectures has made programming, performance prediction and code generation increasingly challenging. Abstract representations of program code (i.e. classifications) have been introduced to address this challenge. An example is 'algorithmic species', a memory access pattern classification of loop nests. It provides an architecture-agnostic structured view of program code, allowing programmers and compilers to take for example parallelisation decisions or perform memory hierarchy optimisations. The existing algorithmic species theory is based on the polyhedral model and is limited to static affine loop nests. In this work, we first present a revised theory of algorithmic species that overcomes this limitation. The theory consists of a 5-tuple characterisation of individual array references and their corresponding merging operation. Second, we present an extension of this theory named SPECIES+, providing a more detailed 6-tuple characterisation. With this, we are able to retain relevant access pattern information not captured by the original algorithmic species, such as column-major versus row-major matrix accesses. We implement both new theories into a tool, enabling automatic classification of program code.
暂无评论