886,913 research outputs found

    Computer Aided Verification

    Get PDF
    This open access two-volume set LNCS 13371 and 13372 constitutes the refereed proceedings of the 34rd International Conference on Computer Aided Verification, CAV 2022, which was held in Haifa, Israel, in August 2022. The 40 full papers presented together with 9 tool papers and 2 case studies were carefully reviewed and selected from 209 submissions. The papers were organized in the following topical sections: Part I: Invited papers; formal methods for probabilistic programs; formal methods for neural networks; software Verification and model checking; hyperproperties and security; formal methods for hardware, cyber-physical, and hybrid systems. Part II: Probabilistic techniques; automata and logic; deductive verification and decision procedures; machine learning; synthesis and concurrency. This is an open access book

    Computer Aided Verification

    Get PDF
    This open access two-volume set LNCS 13371 and 13372 constitutes the refereed proceedings of the 34rd International Conference on Computer Aided Verification, CAV 2022, which was held in Haifa, Israel, in August 2022. The 40 full papers presented together with 9 tool papers and 2 case studies were carefully reviewed and selected from 209 submissions. The papers were organized in the following topical sections: Part I: Invited papers; formal methods for probabilistic programs; formal methods for neural networks; software Verification and model checking; hyperproperties and security; formal methods for hardware, cyber-physical, and hybrid systems. Part II: Probabilistic techniques; automata and logic; deductive verification and decision procedures; machine learning; synthesis and concurrency. This is an open access book

    The VEX-93 environment as a hybrid tool for developing knowledge systems with different problem solving techniques

    Get PDF
    The paper describes VEX-93 as a hybrid environment for developing knowledge-based and problem solver systems. It integrates methods and techniques from artificial intelligence, image and signal processing and data analysis, which can be mixed. Two hierarchical levels of reasoning contains an intelligent toolbox with one upper strategic inference engine and four lower ones containing specific reasoning models: truth-functional (rule-based), probabilistic (causal networks), fuzzy (rule-based) and case-based (frames). There are image/signal processing-analysis capabilities in the form of programming languages with more than one hundred primitive functions. User-made programs are embeddable within knowledge basis, allowing the combination of perception and reasoning. The data analyzer toolbox contains a collection of numerical classification, pattern recognition and ordination methods, with neural network tools and a data base query language at inference engines's disposal. VEX-93 is an open system able to communicate with external computer programs relevant to a particular application. Metaknowledge can be used for elaborate conclusions, and man-machine interaction includes, besides windows and graphical interfaces, acceptance of voice commands and production of speech output. The system was conceived for real-world applications in general domains, but an example of a concrete medical diagnostic support system at present under completion as a cuban-spanish project is mentioned. Present version of VEX-93 is a huge system composed by about one and half millions of lines of C code and runs in microcomputers under Windows 3.1.Postprint (published version

    Supplementing Textbooks with Computer-Based Resources in the Primary EFL-Classroom

    No full text
    Contents\ud Acknowledgments\ud List of figures and tables\ud List of terms and abbreviations\ud 1. Introduction\ud 1.1 Writing conventions\ud 2. Background information\ud 3. Statistics related to the primary EFL classroom\ud 3.1 Pupils’ computer use at home\ud 3.2 Pupils’ internet use at home\ud 3.3 Teachers’ computer use at school\ud 3.4 Pupils’ computer use at school\ud 3.5 Teachers’ internet use at school\ud 3.6 Pupils’ internet use at school\ud 3.7 Implications for supplementing textbooks\ud 3.7.1 Computer and internet infrastructure\ud 3.7.2 Teachers’ IT skills\ud 3.7.3 Teachers’ methodological skills\ud 3.7.4 Summary\ud 4. Choosing and using educational software\ud 4.1 Why use computers in the EFL classroom?\ud 4.2 What computers are not\ud 4.3 What computers are\ud 4.4 Types of software: correct vs. create\ud 5. Choosing a computer-based task\ud 5.1 Task support offered by open-ended software\ud 5.1.1 Self-directed learning and differentiation\ud 5.1.2 User-friendliness\ud 5.1.3 Cooperation and job allocation\ud 5.2 Task constraints imposed by computer hardware\ud 5.2.1 Computer equipment\ud 5.2.2 Location and time\ud 6. The case for using multimedia applications\ud 6.1 What is multimedia?\ud 6.2 Learning software vs. multimedia authoring programs (MAP): consumption vs. production\ud 6.2.1 Presentation of content\ud 6.2.2 Access to content\ud 6.3 Usability\ud 6.3.1 Usability vs. Utility\ud 6.3.2 Finding a high-usability program\ud 6.4 Summary\ud 7. The task: producing a talking book\ud 8. Multimedia authoring programs for publishing talking books\ud 8.1 Microsoft Office PowerPoint\ud 8.1.1 Other uses to PowerPoint\ud 8.2 Windows Movie Maker\ud 8.3 Microsoft Photo Story 3 for Windows\ud 8.4 Producing a talking book with Photo Story\ud 8.4.1 Preliminary considerations\ud 8.4.2 Staging\ud 8.4.3 Storyboard\ud 8.4.4 Work at the computer\ud 8.5 Other proprietary multimedia authoring programs\ud 9. The case for free software\ud 9.1 Quality of free software\ud 9.2 Security of free software\ud 9.3 Service for free software\ud 9.4 Finding the right software\ud 9.5 Scratch\ud 10. Conclusions\ud 10.1 The case against web-based activities\ud 10.2 Dealing with the limited number of computers at schools\ud 10.3 From textbooks to notebooks\ud 10.4 From procuring to leasing\ud References\ud Appendix 1: Interview questions\ud Appendix 2: Resource C

    Air Curtains of Open Refrigerated Display Cases Revisited: A New Technique for Infiltration Rate Measurements

    Get PDF
    Air curtains are created in open refrigerated vertical display cases for creating an invisible barrier between the cold air inside and the warm air outside the case. A systematic approach is developed to minimize the entrainment and infiltration of warm air into the case by optimizing the performance of an air curtain through adjusting pertinent flow parameters and case geometry. A modular display case was manufactured for the parametric studies. In this modular display case the geometry and flow parameters were changed and the infiltration rate was measured using a new technique, tracer gas method, which could be performed noticeably faster than the conventional methods. This apparatus is referred to as the proof-of-concept air curtain (POCAC). A matrix of all possible permutations was constructed with the infiltration rate being the outcome of this matrix. This matrix was populated by actual experimental measurements as well as using validated Computational Fluid Dynamics (CFD) computer programs as a tool to acquire better resolution of the input and output datasets. All the problem variables are referred to as the input vector of all parameters that can be altered, and the output is the infiltration rate. An artificial neural network (ANN) program was used to provide the linkage between the input vector (problem variables) and the problem outcome (infiltration). This program can also be used by industry as a tool to estimate the infiltration rate for all existing open vertical display cases

    NETWORK SECURITY MONITORING WITH INTRUSION DETECTION SYSTEM

    Get PDF
    Computer network security is an issue that needs attention, along with the valuable and confidential information that passes through the network. The increasing use of networked computer systems has also led to an increase in cybercrimes worldwide, including Indonesia. The types of attacks carried out vary and go through several phases. Among the initial phases of the attack is the port scanning process. The process uses specific programs, such as Nmap (Network Mapper), to check on the target/victim side which ports are open and can be exploited for further attacks. IDS (Intrusion Detection System) is here to anticipate external attacks; IDS is used to detect suspicious activity in the system or network. This study aims to create a computer network security system that is lightweight, based on open-source, easy to set up, and can be analyzed by administrators by using Maltrail. Maltrail itself is a monitoring service used to detect dangerous traffic/traffic in a computer network, by utilizing a blacklist containing a list of dangerous or suspicious elements/sources. This study describes the stages of Maltrail installation and how Maltrail can detect the suspicious network, in this case, the port scanning business using Nmap. As a result, Maltrail can be relied on to log and notify network administrators of illegal system entry attempts/intrusions when there is a port scanning process from outside. Thus, it is hoped that with the existence of IDS, handling of an attack can be carried out earlier and prevent fatal consequences

    Automatic checking of the usage of the C++ move semantics

    Get PDF
    The C++ programming language is a favorable choice when implementing high performance applications, like real-time and embedded programming, large telecommunication systems, financial simulations, as well as a wide range of other speed sensitive programs. While C++ has all the facilities to handle the computer hardware without compromises, the copy based value semantics of assignment is a common source of performance degradation. New language features, like the move semantics were introduced recently to serve an instrument to avoid unnecessary copies. Unfortunately, correct usage of move semantics is not trivial, and unintentional expensive copies of C++ objects - like copying containers instead of using move semantics - may determine the main (worst-case) time characteristics of the programs. In this paper we introduce a new approach of investigating performance bottlenecks for C++ programs, which operates at language source level and targets the move semantics of the C++ programming language. We detect copies occurring in operations marked as move operations, i.e. intended not containing expensive copy actions. Move operations are marked with generalized attributes - a new language feature introduced to C++11 standard. We implemented a tool prototype to detect such copy/move semantic errors in C++ programs. Our prototype is using the open source LLVM/Clang parser infrastructure, therefore highly portable

    Peningkatan Keterampilan Remaja Dengan Pelatihan Perbaikan PC Untuk Siswa SMKN2 Banjarmasin

    Get PDF
    Computers have been widely used in the community, because computers can ease human work. To operate it, you need special knowledge about computers to be able to run it properly. Although computers make human work easier, computers can also be damaged or error. Only some people can repair computers like computer technicians. Therefore, on this occasion we had the opportunity to provide training on how to assemble computers and repair them. With expertise in assembling and repairing computers, the community can also open up jobs that would certainly have a positive impact on the surrounding community. Computer users / Personal Computers (PC) have been found in various circles, one of them is SMKN2 students. But many computer uses (PC) do not know how to repair a computer in case of damage, not to mention a few technicians or computer experts who can be easily found. Because of this, damage to the computer will be a difficult problem to deal with. Although there are very few technicians that we can find, repairing or servicing computers requires quite expensive costs. On this occasion, we intend to hold community service in the form of PC technician training (Personal Computer) for SMA/SMK students who aim to provide understanding and skills in making repairs, assembling, and upgrading PCs with community service programs in the form of this training. Besides this training is not limited to the provision of theory, but combined with practice so that not only knowledge is given, but the skills and creativity that are honed in this training. Outcomes of this training are skills training services and publications in national service journals

    Maximizing NVivo Utilities to Analyze Open-Ended Responses

    Get PDF
    Open-ended responses are widely used to explore and understand participants’ experiences and perspectives in a variety of fields. As one of the most powerful computer-assisted qualitative data analysis software, NVivo allows researchers to analyze open-ended responses to survey and/or interview questions, as well as other text data like reflective writing, image, and videos. The purpose of this paper is to describe and demonstrate how the NVivo word frequency, text search, and matrix coding features can be used to analyze qualitative data from a longitudinal evaluation project. The authors show how the matrix coding feature maximizes NVivo utilities in an analysis of open-ended responses and highlights differences across and within participants’ groups. The authors explain this approach by presenting a step by step overview: data cleaning and case coding; data import; word frequency analysis; text coding and reference extracting; and matrix coding and inductive analysis. Using this approach, the Clinical Translational Science Institute (CTSI) evaluation team acquired deeper insight into the participants’ experiences and perspectives about CTSI programs and received insights that may lead to improvement. From a methodological perspective, this approach capitalizes on NVivo’s features to mine qualitative data. The methodology described in this paper is applicable to other educational or program evaluations. Also, it is appropriate for analyzing large samples or longitudinal qualitative data in marketing and management
    • 

    corecore