Large-scale pretrained language models are the major driving force behind recent improvements in performance on the Winograd Schema Challenge, a widely employed test of commonsense reasoning ability. We show, however,...
详细信息
Our paper focuses on software architectures in web application environments, specifically their evolution in client interface development. We will focus on implementing client interfaces with Micro Frontends, which ar...
详细信息
ISBN:
(数字)9798350349153
ISBN:
(纸本)9798350349160
Our paper focuses on software architectures in web application environments, specifically their evolution in client interface development. We will focus on implementing client interfaces with Micro Frontends, which are based on the principle of microservices. We will explain how to implement this architecture and integrate multiple Micro Frontends into a single web application. Additionally, we will evaluate the efficiency and performance of Micro Frontends compared to monolithic client interfaces. Finally, we will compare the performances of the two architectures and propose an improvement to implementing Micro Frontends. Our improvement proposal will explain how Micro Frontends can be implemented to create more modular and reusable user interfaces using well-known methodologies and design patterns.
Smart speakers and voice-based virtual assistants are core building blocks of modern smart homes. For instance, they are used to retrieve information, interact with other devices, and command a variety of Internet of ...
详细信息
This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for anal...
This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for analyzing user activity in NGINX logs. The proposed method does not require a labeled dataset and is capable of efficiently identifying different user anomalies in large datasets with millions of daily requests. The results of the analysis provided a deeper understanding of user behavior when seeking updates through web requests and aided in interpreting the findings. Clustering the anomalies helped to produce typical clusters and further supported the interpretation of the results. This work provides valuable insights into user behavior in web server networks and highlights the importance of efficient anomaly detection techniques in large datasets. The findings have potential real-world applications in the field of cybersecurity, particularly in providing network security analysts with an automated and more objective approach to threat analysis. This study showcases the importance of automated methods for analyzing user activity in web server networks and provides a more objective and efficient approach to detecting user anomalies in large datasets. This approach contributes to the development of more effective and precise cybersecurity systems, ultimately improving the protection of network infrastructures from malicious attacks.
In this paper, we present the development of a remote access control laboratory at RMIT University which allows users to perform experiments on real hardware through the internet. The web based system consists of an i...
详细信息
ISBN:
(纸本)9781424466238
In this paper, we present the development of a remote access control laboratory at RMIT University which allows users to perform experiments on real hardware through the internet. The web based system consists of an internal server linked to an xPC Target real time machine which communicates with a DC Motor control module via relevant DAQ interfaces. In this set up, we attempt to replace the expensive setup of IP camera or video server by a realistic virtual reality model. This enhances the experiment's flexibility and reduces the cost of implementation while providing more interactive visualization and reality feeling of the real system to the users. In addition, the software also features with multiple login database system allowing students to observe or perform experiments under supervision remotely from the admin server.
Unmanned aerial vehicles (UAVs) have garnered significant attention from the research community during the last decade, due to their diverse capabilities and potential applications. One of the most critical functions ...
详细信息
Spatial modulation (SM) is a low-complexity multiple-input/multiple-output transmission technique that combines index modulation and quadrature amplitude modulation for wireless communications. In this work, we consid...
详细信息
Exponential growth in digital information outlets and the race to publish has made scientific misinformation more prevalent than ever. However, the task to fact-verify a given scientific claim is not straightforward e...
详细信息
An autoimmune disorder is a condition that occurs when the immune system mistakenly attacks and destroys healthy body parts. The epidemiology of these diseases is a matter of study and discussion, with many published ...
详细信息
暂无评论