The research results of the Love wave propagation in the semi-space contact area and in a thin layer are presented. The dependences, which allow analyzing the effect of various conditions on the Love wave dispersion, ...
详细信息
Context: When developing software, it is vitally important to keep the level of technical debt down since it is well established from several studies that technical debt can, e.g., lower the development productivity, ...
详细信息
Context: When developing software, it is vitally important to keep the level of technical debt down since it is well established from several studies that technical debt can, e.g., lower the development productivity, decrease the developers' morale, and compromise the overall quality of the software. However, even if researchers and practitioners working in today's software development industry are quite familiar with the concept of technical debt and its related negative consequences, there has been no empirical research focusing specifically on how software managers actively communicate and manage the need to keep the level of technical debt as low as possible. Objective: This study aims to understand how software companies give incentives to manage Technical Debt. This is done by exploring how companies encourage and reward practitioners for actively keeping the level of technical debt down and whether the companies use any forcing or penalizing initiatives when managing technical debt. Method: In a first step, this paper reports the results of both an online survey provided quantitative data from 258 participants and interviews with 32 software practitioners. In a second step, this study set out to specifically provide a detailed assessment of additional and in-depth analysis of Technical Debt management strategies based on an encouraging mindset and attitude from both managers and technical roles to understand how, when and by whom such strategy is adopted in practice. Results: Our findings show that having a Technical Debt management strategy (specially based on encouragement) can significantly impact the amount of Technical Debt in the software. Conclusion: The result indicates that there is considerable unfulfilled potential to influence how software practitioners can further limit and reduce Technical Debt by adopting a strategy based explicitly on an encouraging mindset from managers where they also specifically dedicate time and resources for Technical De
The principles of solving the multicriteria problem of retail marketing for the rational choice of the location of trade enterprises (alternatives) based on the classical method of analysis of Saaty hierarchies, using...
详细信息
This paper describes a new approach on optimization of constraint satisfaction problems (CSPs) by means of substituting sub-CSPs with locally consistent regular membership constraints. The purpose of this approach is ...
详细信息
Since the last few decades, the prey-predator system delivers attractive mathematical models to analyse the dynamics of prey-predator interaction. Due to the lack of precise information about the natural parameters, a...
详细信息
Evaluating student performance is important for universities and institutions in the current student education landscape because it helps them create models that work better for students. The automation of various fea...
详细信息
ISBN:
(数字)9798350366846
ISBN:
(纸本)9798350366853
Evaluating student performance is important for universities and institutions in the current student education landscape because it helps them create models that work better for students. The automation of various features related to fundamental student traits and behaviours that manage massive amounts of data efficiently processes these. To handle student records that included information about students' behaviour and how it related to their academic performance, the companies employed models of classification with mining concepts. Additionally, the quality of result classification can be substantially improved by using learning analytics and Educational Data Mining (EDM). The educational establishments are making an effort to lower the low student performance. To address this issue, numerous methods for assessing student performance have been devised, allowing the relevant faculties to intervene and enhance the final product. Three classes—Low Performance Student, Average Student, and Smart Student—were created using the K-Mean Clustering methodology for classifying student records. Features including grade point, number of deficits, student attendance, medium of education, and board of education are taken into account when classifying the data. In this case, the WEKA tool is also utilized for implementing the model and outcome assessments.
In recent years, with the continuous growth of social and economic level, people's living standard has also been constantly improved. Under this background, contemporary people highly respect a good living environ...
In recent years, with the continuous growth of social and economic level, people's living standard has also been constantly improved. Under this background, contemporary people highly respect a good living environment, and the importance of building interior decoration engineering has been fully reflected. As one of the important design contents of interior decoration, the use level and effect of color will directly affect the overall visual effect of interior decoration and the comfort of interior space. Through the rational collocation of colors, the artistic characteristics of interior decoration can be displayed, which can also show the important role of color in interior decoration. In modern interior decoration, the use of colors is gradually enriched, and the use of multiple colors leads to the problem of actual color matching. Image segmentation, which is the premise of image recognition and tracking, divides an image into regions with different characteristics and extracts interesting objects. This technology has been widely used in military affairs, medicine, intelligent transportation, pedestrian detection, product inspection, sports, remote sensing, machine vision and other fields. Therefore, good color matching is very important in the actual interior decoration practice.
Here a real life optimal control problem under fuzzy time period using variational principle is formulated and Solved. The unit production cost is a function of production rate and also dependent on raw material cost,...
详细信息
The nonlinear adaptation algorithm is considered as applied to stabilization of the center of mass of a moving object subject to nonrandom noise in the control variable. An unknown disturbance is a bounded and continu...
详细信息
作者:
Mucahit SoyluResul DasInonu University
Department of Organized Industrial Zone Vocational School Computer Programming Malatya Turkiye Firat University
Faculty of Technology Department of Software Engineering 23119 Elazig Turkiye
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the...
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the UNSW-NB15 dataset to generate dynamic and meaningful graphs. In the data cleaning phase, missing and erroneous data were removed, unnecessary columns were discarded, and the data was transformed into a format suitable for modeling. Then, the data was converted into homogeneous graphs, and heterogeneous structures were created for analysis using the GAT model. GAT prioritizes relationships between nodes in the graph with an attention mechanism, effectively detecting attack patterns. The analyzed data was then converted into interactive graphs using tools like SigmaJS, with attacks between the same nodes grouped to reduce graph complexity. Users can explore these dynamic graphs in detail, examine attack types, and track events over time. This approach significantly benefits cybersecurity professionals, allowing them to better understand, track, and develop defense strategies against cyberattacks.
暂无评论