Agile software development (ASD) enables project teams to coordinate their work. Many different ASD practices may contribute to effective coordination. This paper investigates the influence of three structural element...
详细信息
ISBN:
(数字)9798350377286
ISBN:
(纸本)9798350377293
Agile software development (ASD) enables project teams to coordinate their work. Many different ASD practices may contribute to effective coordination. This paper investigates the influence of three structural elements of agile project coordination, proximity, availability, and substitutability, on effective implicit coordination. Survey data from 340 agile practitioners worldwide was analysed using PLS-SEM. The results show that the structural elements of coordination each have a positive effect on the effective implicit coordination of agile software development projects. This paper guides practitioners on what agile practices contribute to improved coordination. This paper also validates the structural elements of an existing theoretical model of ASD coordination and shows that the model is generalisable to ASD contexts.
This paper addresses a major issue in planning the trajectories of under-actuated autonomous vehicles based on neurodynamic optimization.A receding-horizon vehicle trajectory planning task is formulated as a sequentia...
详细信息
This paper addresses a major issue in planning the trajectories of under-actuated autonomous vehicles based on neurodynamic optimization.A receding-horizon vehicle trajectory planning task is formulated as a sequential global optimization problem with weighted quadratic navigation functions and obstacle avoidance constraints based on given vehicle goal *** feasibility of the formulated optimization problem is guaranteed under derived *** optimization problem is sequentially solved via collaborative neurodynamic optimization in a neurodynamics-driven trajectory planning method/*** results with under-actuated unmanned wheeled vehicles and autonomous surface vehicles are elaborated to substantiate the efficacy of the neurodynamics-driven trajectory planning method.
Virtual Reality (VR) is an immersive technology that immerses users in a simulation of the actual world or completely alters it. This research aimed to fill the gaps in existing knowledge by investigating the effects ...
详细信息
ISBN:
(数字)9798350377286
ISBN:
(纸本)9798350377293
Virtual Reality (VR) is an immersive technology that immerses users in a simulation of the actual world or completely alters it. This research aimed to fill the gaps in existing knowledge by investigating the effects of stylized semi-open-world VR games on the sense of presence in players. Through the development of a stylized 3D virtual environment, the study examined the semi-open-world VR game design elements that significantly influence presence while also exploring the impact of various factors such as motion sickness, VR gaming experience, and gender on gaming satisfaction and the degree of presence experienced by participants in semi-open-world VR games. It was tested by 26 participants using the Presence Questionnaire (PQ 3.0) and the Game User Experience Satisfaction Scale (GUESS-18) survey. The findings revealed that usability/playability, player engrossment, and visual aesthetics significantly influence presence, with male participants without motion sickness and prior VR gaming experience reporting higher gaming satisfaction, while participants without VR gaming experience surprisingly reported a higher sense of presence. These insights served as valuable references for developers aiming to create more immersive and engaging virtual experiences.
AI models make mistakes when recognizing images—whether in-domain, out-of-domain, or adversarial. Predicting these errors is critical for improving system reliability, reducing costly mistakes, and enabling proactive...
详细信息
This paper examines the impact of feature selection on phishing website detection using machine learning techniques. We utilize the UCI Phishing Website dataset, which consists of 11,055 instances and 30 features with...
详细信息
ISBN:
(数字)9798331509934
ISBN:
(纸本)9798331509941
This paper examines the impact of feature selection on phishing website detection using machine learning techniques. We utilize the UCI Phishing Website dataset, which consists of 11,055 instances and 30 features with no missing values. Our results show that the random forest outperforms logistic regression, achieving an accuracy of 97.11%. By analyzing feature importance, we optimize the model by removing detrimental features, further improving accuracy to 97.74%. This study highlights the effectiveness of the random forest in phishing detection and underscores the importance of feature selection in enhancing model performance.
This paper investigates the efficacy of the Super Learner ensemble algorithm for robust anomaly detection in Internet of Things (IoT) network traffic. The recently released CIC IoT dataset 2023, which contains both no...
详细信息
Hypergraph Neural Networks (HGNNs) are increasingly utilized to analyze complex inter-entity relationships. Traditional HGNN systems, based on a hyperedge-centric dataflow model, independently process aggregation task...
详细信息
The purpose of class distribution estimation (also known as quantification) is to determine the values of the prior class probabilities in a test dataset without class label observations. A variety of methods to achie...
详细信息
Artificial Intelligence (AI) technology is advancing rapidly, driving innovation across various industries while also presenting significant security challenges. These challenges include protecting model ownership, en...
详细信息
ISBN:
(数字)9798350356502
ISBN:
(纸本)9798350356519
Artificial Intelligence (AI) technology is advancing rapidly, driving innovation across various industries while also presenting significant security challenges. These challenges include protecting model ownership, ensuring data privacy, and defending against malicious attacks. Blockchain technology, recognized for its decentralized, transparent, and tamper-proof nature, offers a promising solution to address these issues. This review article explores three key research questions: How can blockchain technology protect AI model ownership? In what ways does blockchain safeguard data privacy within AI systems? What other security-related concerns arise with blockchain-driven AI? Through exploring these questions, the article addresses discussions on ownership, data privacy, attacks, scalability, quantum threats, and ethical security challenges, Through a comprehensive analysis of the existing literature, this article identifies the benefits and limitations of combining blockchain with AI, highlights technical and practical challenges, and proposes directions for future research to enhance the security, effectiveness, and ethical governance of blockchain-integrated AI systems.
In this paper,we first give characterizations of weighted Besov spaces with variable exponents via Peetre’s maximal *** we obtain decomposition characterizations of these spaces by atom,molecule and *** an applicatio...
详细信息
In this paper,we first give characterizations of weighted Besov spaces with variable exponents via Peetre’s maximal *** we obtain decomposition characterizations of these spaces by atom,molecule and *** an application,we obtain the boundedness of the pseudo-differential operators on these spaces.
暂无评论