In this work, spectral and linear prediction residual characteristics of normal, mild, and moderate-severe hypernasal /i/ vowel are analyzed for finding their nature in these three levels of hypernasality severity. Th...
详细信息
AI and Machine Learning (ML) models are increasingly used as (critical) components in software systems, even safety-critical ones. This puts new demands on the degree to which we need to test them and requires new and...
详细信息
ISBN:
(数字)9798400705625
ISBN:
(纸本)9798350376012
AI and Machine Learning (ML) models are increasingly used as (critical) components in software systems, even safety-critical ones. This puts new demands on the degree to which we need to test them and requires new and expanded testing methods. Recent boundary-value identification methods have been developed and shown to automatically find boundary candidates for traditional, non-ML software: pairs of nearby inputs that result in (highly) differing outputs. These can be shown to developers and testers, who can judge if the boundary is where it is supposed to ***, we explore how this method can identify decision boundaries of ML classification models. The resulting ML Boundary Spanning Algorithm (ML-BSA) is a search-based method extending previous work in two main ways. We empirically evaluate ML-BSA on seven ML datasets and show that it better spans and thus better identifies the entire classification boundary(ies). The diversity objective helps spread out the boundary pairs more broadly and evenly. This, we argue, can help testers and developers better judge where a classification boundary actually is, compare to expectations, and then focus further testing, validation, and even further training and model refinement on parts of the boundary where behaviour is not ideal.
The increasing demand for software engineering education presents learning challenges in courses due to the diverse range of topics that require practical applications, such as programming or software design, all of w...
详细信息
ISBN:
(数字)9798400704987
ISBN:
(纸本)9798350352115
The increasing demand for software engineering education presents learning challenges in courses due to the diverse range of topics that require practical applications, such as programming or software design, all of which are supported by group work and interaction. Social Annotation (SA) is an approach to teaching that can enhance collaborative learning among students. In SA, both students and teachers utilize platforms like Feedback Fruits, Perusall, and Diigo to collaboratively annotate and discuss course materials. This approach encourages students to share their thoughts and answers with their peers, fostering a more interactive learning environment. We share our experience of implementing social annotation via Perusall as a preparatory tool for lectures in an introductory programming course aimed at undergraduate students in Software engineering. We report the impact of Perusall on the examination results of 112 students. Our results show that 81% of students engaged in meaningful social annotation successfully passed the course. Notably, the proportion of students passing the exam tends to rise as they complete more Perusall assignments. In contrast, only 56% of students who did not participate in Perusall discussions managed to pass the exam. We did not enforce mandatory Perusall participation in the course. Yet, the feedback from our course evaluation questionnaire reveals that most students ranked Perusall among their favorite components of the course and that their interest in the subject has increased.
This paper describes our approach to submissions made at Shared Task 2 at BLP Workshop - Sentiment Analysis of Bangla Social Media Posts(Hasan et al., 2023a;Islam et al., 2021;Hasan et al., 2023b). Sentiment Analysis ...
详细信息
Fiber optic sensors have been widely used in various biomedical applications due to their high sensitivity, reliability, and non-invasiveness. In this paper, we propose a novel approach to designing an optical sensor ...
Fiber optic sensors have been widely used in various biomedical applications due to their high sensitivity, reliability, and non-invasiveness. In this paper, we propose a novel approach to designing an optical sensor for detecting impurities in a mixture. The proposed sensor utilizes a flexible polymer layer and an optical fiber cable to detect variations in the power of the adulterated mixture. The polymer layer is made of PDMS, which swells or shrinks in response to the level of adulteration present in the mixture. As a result, the intensity of the output spectra changes, which can be used to detect impurities. The sensor's results will be compared with those obtained from the pure mixture to evaluate its accuracy. In conclusion, the proposed sensor has several advantages, such as low cost, easy to handle, ease of fabrication, and high sensitivity, making it a promising candidate for detecting impurities in various mixtures.
In the current era, data analysis has become an integral part of decision-making processes. Data is collected from various sources, such as cloud warehouses, for decision-making and subjected to different classificati...
In the current era, data analysis has become an integral part of decision-making processes. Data is collected from various sources, such as cloud warehouses, for decision-making and subjected to different classifications and data mining algorithms. One of the most crucial tasks in data mining is rare item set mining, which employs different association-based techniques and threshold values to uncover hidden data in the form of patterns. The research paper provides a comprehensive overview of the latest rare pattern mining techniques and their applications, which can be highly beneficial in achieving efficient and effective decision-making processes.
This paper presents a simple structure four-element multiple-input multiple-output (MIMO) antenna array for 5G smartwatch applications. Each antenna is a simple F-shaped microstrip line structure. The neutralization l...
This paper presents a simple structure four-element multiple-input multiple-output (MIMO) antenna array for 5G smartwatch applications. Each antenna is a simple F-shaped microstrip line structure. The neutralization line is loaded between two antennas to improve the isolation. The operating bandwidth of the single antenna covers the 5G new radio (NR) bands n77 and n78 with 6-dB impedance bandwidth. The isolation is higher than 10 dB. Furthermore, the proposed MIMO smartwatch antenna array is fabricated and measured.
In recent years, the breakdown of most human causes that hampers a large number of people is verbal abuse. The most noticeable fact is that most of the verbal abuse is made online by people behind the screen. While th...
In recent years, the breakdown of most human causes that hampers a large number of people is verbal abuse. The most noticeable fact is that most of the verbal abuse is made online by people behind the screen. While this problem has occurred with growing modern technologies, a modern solution is needed to solve the drawback. The growing rate of abusive comments and hate speech online is rapidly increasing on a large scale, and manual reports and corrections cannot help this critical situation. This proposed model introduces automation of the hate speech filtering process through deep learning. This work uses only Bengali datasets to find the real classification, as many Bengali and English mixed research works are available in this field. Using the intelligent automated classification of text comments in a limited resource-constrained language (example: Bengali) is critical for several reasons. This proposed system classifies 'Personal Offensive Text', 'Geographical Offensive Text', 'Religious Offensive text', 'Crime Offensive Text', 'Entertainment, Sports, Meme Tiktok, and others'. By combining two large datasets for this research and employing Bengali BERT, the best feasible outcome has been *** paper indicates the complete results of the combined two different datasets and classified into nine segments, while the proposed Bengali BERT models achieved the highest accuracy of 0.706 and a weighted f1 score of 0.705 in the identification and classification tasks.
The paper proposes to change the bit-dept. of the original data sequence as a preprocessing of the measuring data, which is carried out before the compression procedure. In this case the digit capacity conversion is p...
详细信息
Advancement in the environment of cloud computing has rapidly increases over the past years. In cloud computing protection of data utilizing centralized resources has arisen because of a growing number of businesses s...
Advancement in the environment of cloud computing has rapidly increases over the past years. In cloud computing protection of data utilizing centralized resources has arisen because of a growing number of businesses storing their data int the cloud helps them easily to access their data easily. The major issues faced by users nowadays, the safety and fetching of user cloud data is arisen rapidly. In this proposed algorithm, the user's data is encrypted using the advanced encryption standards algorithm, and the encrypted data is then performed with some xor operations in cypher block chaining mode using a secret key known only to the data owner to increase confidentiality and security level. If the user does not provide a secret key, the system can generate one on its own.
暂无评论