Domain requirements are fundamental for software reuse and are the product of domain analysis. This paper presents an ontology based approach to elicit and analyze domain requirements. An ontology definition is given ...
详细信息
This study discusses the development of a web application aimed at facilitating Sinhala document creation, with a specific emphasis on Sinhala voice-to-text conversion and the handling of Sinhala commands through voca...
详细信息
ISBN:
(纸本)9798350319200
This study discusses the development of a web application aimed at facilitating Sinhala document creation, with a specific emphasis on Sinhala voice-to-text conversion and the handling of Sinhala commands through vocal input. Leveraging machine learning techniques, including convolutional neural networks and Natural Language Processing, the application's core features were established. Extensive research was conducted to tailor the application's content to the needs of its primary users, ensuring maximum effectiveness. The user-friendly interfaces of the web application are designed for clarity, simplicity, and consistency. The primary objective of this research is to comprehensively analyze the implementation of Sinhala voice-to-text conversion and Sinhala command handling systems. These systems are primarily designed to benefit diverse users, including journalists, content writers, and differently abled individuals with verbal abilities, by enhancing the efficiency of creating Sinhala documents. Through a detailed exploration of the research methodology, this study offers insight into the development process of the web-based system. The outcomes of the linguistic model training, presented within the study, reveal achievements and advancements that address the limitations inherent in existing solutions. Key findings from this research demonstrate the successful functionality of the Sinhala voice-to-text converter and the efficacy of the Sinhala command handler. The voice-to-text conversion system achieved an impressive accuracy rate of over 80%, while the Sinhala command handler exhibited an accuracy of approximately 80%. Moreover, this research envisions potential applications that extend beyond document creation. The technology showcased in the web application holds promise for broader language-based applications, impacting education, accessibility, and communication across the native Sinhala-speaking community in Sri Lanka. In summary, this research showcases th
Teaching real-world softwareengineering (SE) skills requires innovative methods to facilitate students' learning technical as well as communication, teamwork, and analysis of ill-structured problems. In this pape...
详细信息
An Intrusion Detection System is now an inevitable part of any computer network. With the ever increasing number and diverse type of attacks, including new and previously unseen attacks, the effectiveness of an Intrus...
详细信息
A neuron with binary inputs and a binary output represents a Boolean function. Our goal is to extract this Boolean function into a tractable representation that will facilitate the explanation and formal verification ...
详细信息
As an advantageous technique and service,the blockchain has shown great development and application ***,its security has also met great challenges,and many security vulnerabilities and attack issues in blockchain-base...
详细信息
As an advantageous technique and service,the blockchain has shown great development and application ***,its security has also met great challenges,and many security vulnerabilities and attack issues in blockchain-based services have ***,security issues of blockchain have attracted extensive ***,there is still a lack of blockchain security research from a full-stack architecture perspective,as well as representative quantitative experimental reproduction and *** aim to provide a security architecture to solve security risks in blockchain services from a full-stack architecture ***,we propose a formal definition of the full-stack security architecture for blockchain-based services,and we also propose a formal expression of security issues and defense solutions from a full-stack security *** use ConCert to conduct a smart contract formal verification experiment by property-based *** security vulnerabilities of blockchain services in the Common Vulnerabilities and Exposures(CVE)and China Nation Vulnerability Database(CNVD)are selected and ***,three real contract-layer real attack events are reproduced by an experimental *** Alibaba's blockchain services and Identity Mixer in Hyperledger Fabric as a case study,the security problems and defense techniques are analyzed and *** last,the future research directions are proposed.
In the process of ferromagnetic thermoseeds mediated magnetic induction hyperthermia,the temperature distribution in the tumor region is a key factor to determine the therapy *** the preoperative treatment planning,di...
详细信息
In the process of ferromagnetic thermoseeds mediated magnetic induction hyperthermia,the temperature distribution in the tumor region is a key factor to determine the therapy *** the preoperative treatment planning,discrepancies of the treatment parameters may lead to the temperature distribution uncertainty within the target *** prediction of temperature distribution may induce the treatment failure;therefore,it would be significant to investigate the uncertainty of tissue temperature prediction caused by the disturbance of calculation *** this paper,3D temperature field and necrosis zone of tissues in ferromagnetic thermoseeds hyperthermia are simulated by the finite volume algorithm,and effects of parameter uncertainties on the temperature distribution are *** show that selecting appropriate magnetic field parameters for treatment is a priority to guarantee therapeutic *** properties and blood perfusion rate are the obvious disturbing terms for temperature distribution,while the metabolic heat of bio-tissues can often be ignored within *** investigation is of importance for guiding reasonable and optimal preoperative treatment planning.
No software is an island. It is executed by hardware and interacts with its environment. So-called software systems are complicated hierarchical systems. Competent engineers carefully engineer them. In contrast, compl...
详细信息
There have been several model based approaches used in the recent past for alleviating complexity in design, development and test case generation for real-time embedded software systems. However, deploying/executing t...
详细信息
ISBN:
(纸本)9782953050431
There have been several model based approaches used in the recent past for alleviating complexity in design, development and test case generation for real-time embedded software systems. However, deploying/executing these test cases in the embedded target without affecting the real-time behavior of the system still remains a challenging and unanswered question. To address this, we propose a novel architecture to perform an integrated model based testing for embedded systems. We introduce a holistic model based design, development and testing approach with the aid of a monitor and target debugger solution for real-time embedded systems. Our proposed approach eliminates the need for dynamic source code instrumentation inserted into the target to execute the software test routines. This will result in preserving the real-time behavior which is a boon especially for real-time critical and code size constrained embedded systems. We illustrate our proposed approach with a prototype and an example.
Depth-image-based rendering(DIBR) is widely used in 3 DTV, free-viewpoint video, and interactive 3 D graphics applications. Typically, synthetic images generated by DIBR-based systems incorporate various distortions, ...
详细信息
Depth-image-based rendering(DIBR) is widely used in 3 DTV, free-viewpoint video, and interactive 3 D graphics applications. Typically, synthetic images generated by DIBR-based systems incorporate various distortions, particularly geometric distortions induced by object dis-occlusion. Ensuring the quality of synthetic images is critical to maintaining adequate system service. However, traditional 2 D image quality metrics are ineffective for evaluating synthetic images as they are not sensitive to geometric distortion. In this paper, we propose a novel no-reference image quality assessment method for synthetic images based on convolutional neural networks, introducing local image saliency as prediction weights. Due to the lack of existing training data, we construct a new DIBR synthetic image dataset as part of our contribution. Experiments were conducted on both the public benchmark IRCCyN/IVC DIBR image dataset and our own dataset. Results demonstrate that our proposed metric outperforms traditional 2 D image quality metrics and state-of-the-art DIBR-related metrics.
暂无评论