To estimate the measure of proximity and distance in various tasks (clustering, classification, etc.), one of the most common ways to represent information about objects is a binary indications vector. At the same tim...
详细信息
The paper evaluates the influence of wire thickness and insulation material on its heating temperature during operation. The temperature and time characteristics of wire exploitation under conditions of different load...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into computer science education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computer science programs, (2) construct level-appropriate examples that could be included midway into one’s undergraduate studies, (3) demonstrate how to address successive "failures" through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding TLA+ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in TLA+ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudinal analysis within our own institution and
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, developed at the Australian Cyber Security Center's (ACCS) Cyber Range Laboratory, contains data on normal network operations and synthetic intrusions. Data pre-processing was performed, including class balancing using the SMOTEENN method and selection of informative features using the Recursive Feature Elimination method. The possibility of using the stacking meta-algorithm to detect intrusions into computer networks has been investigated. A new algorithm for generating packets of raw data is proposed, which generates two sets of training data: one for training basic models, the other for a meta-model. A study of the effectiveness of using Random Forest, ANN, K Nearest Neighbor methods and Support Vector Machine and Random Forest as a decision-making meta-model was conducted. The use of the stacking meta-algorithm with the proposed algorithm for forming packets of output data, as well as basic models and a meta-model, led to a significant improvement in the quality of the model. It was found that, on average, recall and f1 score increased by 55.6% and 37.4%, respectively, compared to raw data and other models.
Industrial Internet of NanoThings (IIoNT) traffic model proposed. The model is based on the developed algorithm for Dynamic Data Composition Control. The application of the algorithm made it possible to reduce the tot...
详细信息
In general, failure data is obtained in the automotive industry during the warranty period. If these contain the expression of a service life characteristic for each failure, statements can be made about the reliabili...
详细信息
Chronic back pain can present a serious health concern, with symptoms that can significantly affect an individual's well-being, mobility, and overall quality of life over an extended period. While chronic back pai...
详细信息
The theory of intuitionistic fuzzy sets (IFSs) plays an essential role to deal with uncertainty and ambiguity. However, the IFSs deal only with anticipation, not periodicity. But, complex IFSs (CIFS) can handle both u...
详细信息
CONTEXT: Versioning allows users to efficiently create and evolve artifacts, not only but especially in the domain of model-driven engineering. Due to collaboration tools, the place and time where users jointly work a...
CONTEXT: Versioning allows users to efficiently create and evolve artifacts, not only but especially in the domain of model-driven engineering. Due to collaboration tools, the place and time where users jointly work at their artifacts do not play an important role anymore. Objective: We systematically elaborated a classification framework for collaboration and versioning tools. The intention is threefold: First, it should be possible to classify existing approaches. Second, deriving from user goals requirements to be met, and capabilities to be supported by a new tool. Third, given a set of capabilities, highlight which user goals can be achieved. Method: According to Kang and Lee, we systematically elaborated a problem space and a solution space and created mappings between both spaces and their sub-spaces. To demonstrate the applicability, we classified existing VCS like git, Google Docs, and several MDE-specific approaches. Results: The created feature diagram covers 238 features and contains about 87 constraints. Conclusion: The developed framework supports researchers and developers in classifying their tools, revealing new opportunities to improve their tools, and guiding the development of new tools.
Road accidents have been known to be one of the leading death causes around the world for a long time. Thus, cars and all kinds of road vehicles form a huge source of danger, and they relate to multiple high risks. Th...
Road accidents have been known to be one of the leading death causes around the world for a long time. Thus, cars and all kinds of road vehicles form a huge source of danger, and they relate to multiple high risks. There are many factors that can contribute to road traffic accidents such as the health condition of the driver if a medical emergency event happened while driving, drowsiness, or mind-wandering. The proposed system can monitor the behavior of the driver while driving as well as his/her health status. Moreover, it analyzes the monitored data, alerts the driver in a timely manner, and assists him/her in adjusting the driving behavior. Different dangerous and risky situations which can be faced during driving can be captured and avoided by using such a system which leads at the end to increase road traffic safety and reduce vehicle collisions. Notifications are developed in cases of drowsiness, loss of focus, or other concerns that may emerge while driving. However, when the driver's ability to operate the vehicle safely is hampered by a health concern, the implemented system is only able at this stage to alarm the driver itself and the surrounding cars as a first level of alarms.
暂无评论