This paper focuses on improving learning and involvement in studies by employing game elements and considering online learning platforms to deliver statistics curriculum. According to the problem statement, the resear...
详细信息
With the advent of the Internet of Things, a world was born in which everything could be uniquely identified and monitored, tracked, and managed by computer programs. Items can self-configure using a predefined commun...
详细信息
Online learning to rank sequentially recommends a small list of items to users from a large candidate set and receives the users’ click feedback. In many real-world scenarios, users browse the recommended list in ord...
详细信息
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based...
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based goal-oriented requirements analysis method, non-functional requirements framework, etc. Based on the critical analysis of requirements elicitation methods, we found that single elicitation technique is not suitable to understand the need of the stakeholders. In real life applications, multiple elicitation techniques are required to elicit and select the requirements of an information system because each technique has its strength and limitations. Therefore, to address this issue, this paper presents a mathematical model for the selection of requirements elicitation techniques so that complete set of requirements along with its priority can be identified before the development of an information system. The institute examination system is considered to show the applicability of the proposed mathematical model.
This summary refers to the paper Enactment of adaptation in data stream processing with latency implications - A systematic literature review [QES19]. This paper is a journal paper published in Information and Softwar...
详细信息
Automated medical image classification is the key component in intelligent diagnosis systems. However, most medical image datasets contain plenty of samples of common diseases and just a handful of rare ones, leading ...
详细信息
In the evolving healthcare landscape, the Internet of Medical Things (IoMT) enables real-time data collection through connected devices. Concerns about data privacy in electronic health records are driving changes in ...
详细信息
ISBN:
(数字)9789532901351
ISBN:
(纸本)9798350390797
In the evolving healthcare landscape, the Internet of Medical Things (IoMT) enables real-time data collection through connected devices. Concerns about data privacy in electronic health records are driving changes in health assessment. Blended learning is emerging as a solution, allowing simulation training without sharing critical information centrally. The proposed techniques emphasize privacy and efficiency and use federated averaging to analyze edge computation. Smart healthcare addresses the benefits and challenges of integrating AI and edge tech. In this revolutionary approach, federated learning uses server-side federated averaging, combining local client model parameters while reducing edge computation latency and energy consumption The integration of AI and edge technologies not only increases efficiency but also provides forward-looking approaches for personalized and responsive healthcare. Experimental validation with the Covid-pneumonia dataset highlights the effectiveness of the integrated learning approach, confirming the important contribution to privacy protection and efficient machine learning applications in computing in healthcare of the policies established in countries.
In this paper, we propose a method for defending against audio adversarial examples that operates by applying audio style transfer learning. The proposed method has the effect of maintaining the classification result ...
详细信息
In this paper, we propose a method for defending against audio adversarial examples that operates by applying audio style transfer learning. The proposed method has the effect of maintaining the classification result produced by the target model and removing the adversarial noise by changing only the style while maintaining the content of the input audio sample. In an experimental evaluation using the Mozilla Common Voice dataset as the test data source and TensorFlow as the machine learning library, the proposed method improved the target model’s accuracy on the adversarial examples from 2.1% to 79.2% while maintaining its accuracy on the original samples at 81.4%. Author
Considering the potential benefits to lifespan and performance, zoned flash storage is expected to be incorporated into the next generation of consumer devices. However, due to the limited volatile cache and heterogen...
详细信息
Android applications are getting bigger with an increasing number of features. However, not all the features are needed by a specific user. The unnecessary features can increase the attack surface and cost additional ...
详细信息
ISBN:
(纸本)9798350329964
Android applications are getting bigger with an increasing number of features. However, not all the features are needed by a specific user. The unnecessary features can increase the attack surface and cost additional resources (e.g., storage and memory). Therefore, it is important to remove unnecessary features from Android applications. However, it is difficult for the end users to fully explore the apps to identify the unnecessary features, and there is no off-the-shelf tool available to assist users to debloat the apps by themselves. In this work, we propose AutoDebloater to debloat Android applications automatically for end users. AutoDebloater is a web application that can be accessed by end-users through a web browser. In particular, AutoDebloater can automatically explore an app and identify the transitions between activities. Then, AutoDebloater will present the Activity Transition Graph to users and ask them to select the activities they do not want to keep. Finally, AutoDebloater will remove the activities that are selected by users from the app. We conducted a user study on five Android apps downloaded from three categories (i.e., Finance, Tools, and Navigation) in Google Play and F-Droid. The results show that users are satisfied with AutoDebloater in terms of the stability of the debloated apps and the ability of AutoDebloater to identify features that are never noticed before. The tool is available at http://***. The code is available at https://***/jiakun-liu/autodebloater/ and the demonstration video can be found at https://***/Gmz0-p2n9D4.
暂无评论