首页 > 最新文献

Frontiers in Computer Science最新文献

英文 中文
A Support Vector Machine based approach for plagiarism detection in Python code submissions in undergraduate settings 基于支持向量机的本科生 Python 代码抄袭检测方法
IF 2.6 Q2 Computer Science Pub Date : 2024-06-13 DOI: 10.3389/fcomp.2024.1393723
Nandini Gandhi, Kaushik Gopalan, Prajish Prasad
Mechanisms for plagiarism detection play a crucial role in maintaining academic integrity, acting both to penalize wrongdoing while also serving as a preemptive deterrent for bad behavior. This manuscript proposes a customized plagiarism detection algorithm tailored to detect source code plagiarism in the Python programming language. Our approach combines textual and syntactic techniques, employing a support vector machine (SVM) to effectively combine various indicators of similarity and calculate the resulting similarity scores. The algorithm was trained and tested using a sample of code submissions of 4 coding problems each from 45 volunteers; 15 of these were original submissions while the other 30 were plagiarized samples. The submissions of two of the questions was used for training and the other two for testing-using the leave-p-out cross-validation strategy to avoid overfitting. We compare the performance of the proposed method with two widely used tools-MOSS and JPlag—and find that the proposed method results in a small but significant improvement in accuracy compared to JPlag, while significantly outperforming MOSS in flagging plagiarized samples.
剽窃检测机制在维护学术诚信方面发挥着至关重要的作用,既能惩罚不法行为,又能对不良行为起到先发制人的威慑作用。本手稿提出了一种定制的剽窃检测算法,专门用于检测 Python 编程语言中的源代码剽窃行为。我们的方法结合了文本和语法技术,采用支持向量机(SVM)有效地组合各种相似性指标,并计算由此产生的相似性分数。我们使用 45 名志愿者提交的各 4 个编码问题的代码样本对算法进行了训练和测试,其中 15 个是原创提交,另外 30 个是抄袭样本。其中两个问题的提交用于训练,另外两个问题的提交用于测试--使用 "留空 "交叉验证策略以避免过度拟合。我们将所提方法的性能与两种广泛使用的工具--MOSS 和 JPlag 进行了比较,发现与 JPlag 相比,所提方法在准确性上有微小但显著的提高,同时在标记抄袭样本方面明显优于 MOSS。
{"title":"A Support Vector Machine based approach for plagiarism detection in Python code submissions in undergraduate settings","authors":"Nandini Gandhi, Kaushik Gopalan, Prajish Prasad","doi":"10.3389/fcomp.2024.1393723","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1393723","url":null,"abstract":"Mechanisms for plagiarism detection play a crucial role in maintaining academic integrity, acting both to penalize wrongdoing while also serving as a preemptive deterrent for bad behavior. This manuscript proposes a customized plagiarism detection algorithm tailored to detect source code plagiarism in the Python programming language. Our approach combines textual and syntactic techniques, employing a support vector machine (SVM) to effectively combine various indicators of similarity and calculate the resulting similarity scores. The algorithm was trained and tested using a sample of code submissions of 4 coding problems each from 45 volunteers; 15 of these were original submissions while the other 30 were plagiarized samples. The submissions of two of the questions was used for training and the other two for testing-using the leave-p-out cross-validation strategy to avoid overfitting. We compare the performance of the proposed method with two widely used tools-MOSS and JPlag—and find that the proposed method results in a small but significant improvement in accuracy compared to JPlag, while significantly outperforming MOSS in flagging plagiarized samples.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141346952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Working with agile and crowd: human factors identified from the industry 与敏捷和人群合作:从行业中发现的人为因素
IF 2.6 Q2 Computer Science Pub Date : 2024-06-12 DOI: 10.3389/fcomp.2024.1400750
Shamaila Qayyum, Salma Imtiaz, Huma Hayat Khan, Ahmad Almadhor, Vincent Karovic
Crowdsourcing software development (CSSD) is an emerging technique in software development. It helps utilize the diversified skills of people from across the world. Similar to all emerging techniques, CSSD has its own benefits and challenges. Some unique challenges arise when CSSD is used with Agile methodology. This is because many characteristics of CSSD differ from Agile principles. CSSD is a distributed approach where workers are unknown to each other, whereas Agile advocates teamness and is mostly suitable for colocated teams. Many organizations are now combining crowdsourcing software development (CSSD) and Agile methodologies, yet there is limited understanding on the implications of this integration. It is crucial to emphasize the human factors at play when implementing Agile alongside CSSD. This involves considering how teams interact, communicate, and adapt within these frameworks. By recognizing these dynamics, organizations can better navigate the complexities of integrating CSSD and Agile, ultimately fostering more efficient and collaborative development processes.This study aimed to explore the human factors involved in the integration of CSSD with Agile, by identifying the challenges that practitioners face when they follow Agile with CSSD and the strategies they follow. The study contributes by providing an in-depth understanding of a new approach, CSSD, integrated with Agile. The study also explores the challenges faced by practitioners that are not already enlisted.These identified challenges are grouped into six different categories, which are trust-related challenges, coordination and communication challenges, organizational challenges, task-related challenges, project-related challenges, and some general challenges. Strategies for each of these categories of challenges are also identified. The list of challenges and strategies identified in this study can be helpful in further research on CSSD and Agile integration. The practitioners can also follow these strategies to reduce the impact of challenges they face while they perform CSSD along with Agile.
众包软件开发(CSSD)是一种新兴的软件开发技术。它有助于利用世界各地人们的各种技能。与所有新兴技术类似,众包软件开发也有其自身的优势和挑战。当 CSSD 与敏捷方法结合使用时,会出现一些独特的挑战。这是因为 CSSD 的许多特点与敏捷原则不同。CSSD 是一种分布式方法,员工之间互不相识,而敏捷方法提倡团队精神,主要适用于集中办公的团队。目前,许多组织都在将众包软件开发(CSSD)与敏捷方法结合起来,但对这种结合所产生的影响却了解有限。在结合 CSSD 实施敏捷方法时,强调人的因素至关重要。这就需要考虑团队如何在这些框架内进行互动、沟通和适应。通过认识这些动态因素,组织可以更好地驾驭 CSSD 与敏捷整合的复杂性,最终促进更高效、更协作的开发流程。本研究旨在通过识别实践者在遵循敏捷与 CSSD 时所面临的挑战以及他们所遵循的策略,探索 CSSD 与敏捷整合中涉及的人为因素。本研究有助于深入了解与敏捷相结合的 CSSD 这一新方法。本研究还探讨了实践者所面临的尚未列出的挑战。这些已确定的挑战分为六个不同的类别,分别是与信任相关的挑战、协调和沟通挑战、组织挑战、与任务相关的挑战、与项目相关的挑战以及一些一般性挑战。此外,还确定了应对每类挑战的战略。本研究中确定的挑战和策略清单有助于进一步研究 CSSD 和敏捷整合。实践者也可以根据这些策略来减少他们在进行 CSSD 和敏捷整合时所面临的挑战的影响。
{"title":"Working with agile and crowd: human factors identified from the industry","authors":"Shamaila Qayyum, Salma Imtiaz, Huma Hayat Khan, Ahmad Almadhor, Vincent Karovic","doi":"10.3389/fcomp.2024.1400750","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1400750","url":null,"abstract":"Crowdsourcing software development (CSSD) is an emerging technique in software development. It helps utilize the diversified skills of people from across the world. Similar to all emerging techniques, CSSD has its own benefits and challenges. Some unique challenges arise when CSSD is used with Agile methodology. This is because many characteristics of CSSD differ from Agile principles. CSSD is a distributed approach where workers are unknown to each other, whereas Agile advocates teamness and is mostly suitable for colocated teams. Many organizations are now combining crowdsourcing software development (CSSD) and Agile methodologies, yet there is limited understanding on the implications of this integration. It is crucial to emphasize the human factors at play when implementing Agile alongside CSSD. This involves considering how teams interact, communicate, and adapt within these frameworks. By recognizing these dynamics, organizations can better navigate the complexities of integrating CSSD and Agile, ultimately fostering more efficient and collaborative development processes.This study aimed to explore the human factors involved in the integration of CSSD with Agile, by identifying the challenges that practitioners face when they follow Agile with CSSD and the strategies they follow. The study contributes by providing an in-depth understanding of a new approach, CSSD, integrated with Agile. The study also explores the challenges faced by practitioners that are not already enlisted.These identified challenges are grouped into six different categories, which are trust-related challenges, coordination and communication challenges, organizational challenges, task-related challenges, project-related challenges, and some general challenges. Strategies for each of these categories of challenges are also identified. The list of challenges and strategies identified in this study can be helpful in further research on CSSD and Agile integration. The practitioners can also follow these strategies to reduce the impact of challenges they face while they perform CSSD along with Agile.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141355224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient, low-latency, and non-contact eye blink detection with capacitive sensing 通过电容式感应进行高能效、低延迟和非接触式眨眼检测
IF 2.6 Q2 Computer Science Pub Date : 2024-06-11 DOI: 10.3389/fcomp.2024.1394397
Mengxi Liu, Sizhen Bian, Zimin Zhao, Bo Zhou, P. Lukowicz
This work described a novel non-contact, wearable, real-time eye blink detection solution based on capacitive sensing technology. A custom-built prototype employing low-cost and low-power consumption capacitive sensors was integrated into standard glasses, with a copper tape electrode affixed to the frame. The blink of an eye induces a variation in capacitance between the electrode and the eyelid, thereby generating a distinctive capacitance-related signal. By analyzing this signal, eye blink activity can be accurately identified. The effectiveness and reliability of the proposed solution were evaluated through five distinct scenarios involving eight participants. Utilizing a user-dependent detection method with a customized predefined threshold value, an average precision of 92% and a recall of 94% were achieved. Furthermore, an efficient user-independent model based on the two-bit precision decision tree was further applied, yielding an average precision of 80% and an average recall of 81%. These results demonstrate the potential of the proposed technology for real-world applications requiring precise and unobtrusive eye blink detection.
这项工作描述了一种基于电容传感技术的新型非接触、可穿戴、实时眨眼检测解决方案。采用低成本、低功耗电容式传感器的定制原型被集成到标准眼镜中,镜框上贴有铜带电极。眼睛眨动会引起电极和眼睑之间电容的变化,从而产生与电容相关的独特信号。通过分析该信号,可准确识别眨眼活动。我们通过五种不同的场景对所提出解决方案的有效性和可靠性进行了评估,共有八名参与者参与。利用用户依赖检测方法和自定义的预定义阈值,平均精确度达到 92%,召回率达到 94%。此外,还进一步应用了基于两位精度决策树的高效用户独立模型,平均精度为 80%,平均召回率为 81%。这些结果表明,所提出的技术在需要精确、无干扰的眨眼检测的实际应用中具有很大的潜力。
{"title":"Energy-efficient, low-latency, and non-contact eye blink detection with capacitive sensing","authors":"Mengxi Liu, Sizhen Bian, Zimin Zhao, Bo Zhou, P. Lukowicz","doi":"10.3389/fcomp.2024.1394397","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1394397","url":null,"abstract":"This work described a novel non-contact, wearable, real-time eye blink detection solution based on capacitive sensing technology. A custom-built prototype employing low-cost and low-power consumption capacitive sensors was integrated into standard glasses, with a copper tape electrode affixed to the frame. The blink of an eye induces a variation in capacitance between the electrode and the eyelid, thereby generating a distinctive capacitance-related signal. By analyzing this signal, eye blink activity can be accurately identified. The effectiveness and reliability of the proposed solution were evaluated through five distinct scenarios involving eight participants. Utilizing a user-dependent detection method with a customized predefined threshold value, an average precision of 92% and a recall of 94% were achieved. Furthermore, an efficient user-independent model based on the two-bit precision decision tree was further applied, yielding an average precision of 80% and an average recall of 81%. These results demonstrate the potential of the proposed technology for real-world applications requiring precise and unobtrusive eye blink detection.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141357849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimenting with D-Wave quantum annealers on prime factorization problems 在素因数分解问题上试验 D-Wave 量子退火器
IF 2.6 Q2 Computer Science Pub Date : 2024-06-11 DOI: 10.3389/fcomp.2024.1335369
Jingwen Ding, Giuseppe Spallitta, Roberto Sebastiani
This paper builds on top of a paper we have published very recently, in which we have proposed a novel approach to prime factorization (PF) by quantum annealing, where 8, 219, 999 = 32, 749 × 251 was the highest prime product we were able to factorize—which, to the best of our knowledge is the largest number which was ever factorized by means of a quantum device. The series of annealing experiments which led us to these results, however, did not follow a straight-line path; rather, they involved a convoluted trial-and-error process, full of failed or partially-failed attempts and backtracks, which only in the end drove us to find the successful annealing strategies. In this paper, we delve into the reasoning behind our experimental decisions and provide an account of some of the attempts we have taken before conceiving the final strategies that allowed us to achieve the results. This involves also a bunch of ideas, techniques, and strategies we investigated which, although turned out to be inferior wrt. those we adopted in the end, may instead provide insights to a more-specialized audience of D-Wave users and practitioners. In particular, we show the following insights: (i) different initialization techniques affect performances, among which flux biases are effective when targeting locally-structured embeddings; (ii) chain strengths have a lower impact in locally-structured embeddings compared to problem relying on global embeddings; (iii) there is a trade-off between broken chain and excited CFAs, suggesting an incremental annealing offset remedy approach based on the modules instead of single qubits. Thus, by sharing the details of our experiences, we aim to provide insights into the evolving landscape of quantum annealing, and help people access and effectively use D-Wave quantum annealers.
在这篇论文中,8, 219, 999 = 32, 749 × 251 是我们能够因式分解的最高素数积--据我们所知,这是迄今为止通过量子设备因式分解的最大数字。然而,导致我们获得这些结果的一系列退火实验并不是沿着一条直线进行的;相反,它们涉及一个曲折的试错过程,充满了失败或部分失败的尝试和回溯,最终才促使我们找到了成功的退火策略。在本文中,我们将深入探讨实验决定背后的原因,并介绍我们在构思最终策略之前所做的一些尝试,这些尝试让我们取得了成果。这还涉及到我们研究过的一些想法、技术和策略,虽然这些想法、技术和策略最终都不如我们采用的那些,但却能为更专业的 D-Wave 用户和实践者提供启示。特别是,我们展示了以下见解:(i) 不同的初始化技术会影响性能,其中通量偏差在针对局部结构嵌入时是有效的;(ii) 与依赖全局嵌入的问题相比,链强度对局部结构嵌入的影响较小;(iii) 在断链和激发 CFA 之间存在权衡,建议采用基于模块而非单个量子比特的增量退火抵消补救方法。因此,通过分享我们的经验细节,我们旨在为量子退火的不断发展提供见解,并帮助人们获取和有效使用 D-Wave 量子退火器。
{"title":"Experimenting with D-Wave quantum annealers on prime factorization problems","authors":"Jingwen Ding, Giuseppe Spallitta, Roberto Sebastiani","doi":"10.3389/fcomp.2024.1335369","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1335369","url":null,"abstract":"This paper builds on top of a paper we have published very recently, in which we have proposed a novel approach to prime factorization (PF) by quantum annealing, where 8, 219, 999 = 32, 749 × 251 was the highest prime product we were able to factorize—which, to the best of our knowledge is the largest number which was ever factorized by means of a quantum device. The series of annealing experiments which led us to these results, however, did not follow a straight-line path; rather, they involved a convoluted trial-and-error process, full of failed or partially-failed attempts and backtracks, which only in the end drove us to find the successful annealing strategies. In this paper, we delve into the reasoning behind our experimental decisions and provide an account of some of the attempts we have taken before conceiving the final strategies that allowed us to achieve the results. This involves also a bunch of ideas, techniques, and strategies we investigated which, although turned out to be inferior wrt. those we adopted in the end, may instead provide insights to a more-specialized audience of D-Wave users and practitioners. In particular, we show the following insights: (i) different initialization techniques affect performances, among which flux biases are effective when targeting locally-structured embeddings; (ii) chain strengths have a lower impact in locally-structured embeddings compared to problem relying on global embeddings; (iii) there is a trade-off between broken chain and excited CFAs, suggesting an incremental annealing offset remedy approach based on the modules instead of single qubits. Thus, by sharing the details of our experiences, we aim to provide insights into the evolving landscape of quantum annealing, and help people access and effectively use D-Wave quantum annealers.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141360502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey 揭示入侵检测系统中的机器学习策略和注意事项:全面调查
IF 2.6 Q2 Computer Science Pub Date : 2024-06-10 DOI: 10.3389/fcomp.2024.1387354
Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, Bassem Ben Hamed, Faisal Albalwy, Abdulrahman Alqarafi, Amir Hussain
The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed to combat malicious network attacks. However, IDSs still struggle with accuracy, false alarms, and detecting new intrusions. Therefore, organizations are using Machine Learning (ML) and Deep Learning (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview of IDS, including its classes and methods, the detected attacks as well as the dataset, metrics, and performance indicators used. A thorough examination of recent publications on IDS-based solutions is conducted, evaluating their strengths and weaknesses, as well as a discussion of their potential implications, research challenges, and new trends. We believe that this comprehensive review paper covers the most recent advances and developments in ML and DL-based IDS, and also facilitates future research into the potential of emerging Artificial Intelligence (AI) to address the growing complexity of cybersecurity challenges.
通信和互联网技术的发展给网络安全带来了风险。因此,入侵检测系统(IDS)应运而生,以对抗恶意网络攻击。然而,IDS 在准确性、误报和检测新入侵方面仍存在问题。因此,企业开始在 IDS 中使用机器学习(ML)和深度学习(DL)算法,以便更准确地检测攻击。本文概述了 IDS,包括其类别和方法、检测到的攻击以及使用的数据集、度量和性能指标。本文对最近发表的基于 IDS 解决方案的文章进行了深入研究,评估了它们的优缺点,并讨论了它们的潜在影响、研究挑战和新趋势。我们相信,这篇全面的综述论文涵盖了基于 ML 和 DL 的 IDS 的最新进展和发展,也有助于未来对新兴人工智能(AI)潜力的研究,以应对日益复杂的网络安全挑战。
{"title":"Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive survey","authors":"Ali Hussein Ali, Maha Charfeddine, Boudour Ammar, Bassem Ben Hamed, Faisal Albalwy, Abdulrahman Alqarafi, Amir Hussain","doi":"10.3389/fcomp.2024.1387354","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1387354","url":null,"abstract":"The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed to combat malicious network attacks. However, IDSs still struggle with accuracy, false alarms, and detecting new intrusions. Therefore, organizations are using Machine Learning (ML) and Deep Learning (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview of IDS, including its classes and methods, the detected attacks as well as the dataset, metrics, and performance indicators used. A thorough examination of recent publications on IDS-based solutions is conducted, evaluating their strengths and weaknesses, as well as a discussion of their potential implications, research challenges, and new trends. We believe that this comprehensive review paper covers the most recent advances and developments in ML and DL-based IDS, and also facilitates future research into the potential of emerging Artificial Intelligence (AI) to address the growing complexity of cybersecurity challenges.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Markov model for the reliability analysis of hybrid microgrids 用于混合微电网可靠性分析的模糊马尔科夫模型
IF 2.6 Q2 Computer Science Pub Date : 2024-06-10 DOI: 10.3389/fcomp.2024.1406086
Kunjabihari Swain, Murthy Cherukuri, Indu Sekhar Samanta, Abhilash Pati, Jayant Giri, Amrutanshu Panigrahi, Hong Qin, Saurav Mallik
This research presents a process for analyzing a hybrid microgrid's dependability using a fuzzy Markov model. The research initiated an analysis of the various microgrid components, such as wind power systems, solar photovoltaic (PV) systems, and battery storage systems. The states that are induced by component failures are represented using a state-space model. The research continues by suggesting a hybrid microgrid reliability model that analyzes data using a Markov process. Problems arise when trying to estimate reliability metrics for the microgrid using data that is both restricted and imprecise. This is why the study takes uncertainties into account to make microgrid reliability estimations more realistic. The importance of microgrid components concerning their overall availability is evaluated using fuzzy sets and reliability assessments. The study uses numerical analysis and then carefully considers the outcomes. The overall availability of hybrid microgrids is 0.99999.
本研究提出了一种利用模糊马尔可夫模型分析混合微电网可靠性的方法。研究首先对风力发电系统、太阳能光伏(PV)系统和电池存储系统等各种微电网组件进行分析。使用状态空间模型表示组件故障引起的状态。研究还提出了一种混合微电网可靠性模型,该模型使用马尔可夫过程分析数据。在使用受限和不精确的数据估算微电网可靠性指标时会出现问题。因此,本研究考虑了不确定性因素,以使微电网可靠性估算更切合实际。研究使用模糊集和可靠性评估来评估微电网组件对其整体可用性的重要性。研究采用数值分析,然后仔细考虑结果。混合微电网的总体可用性为 0.99999。
{"title":"Fuzzy Markov model for the reliability analysis of hybrid microgrids","authors":"Kunjabihari Swain, Murthy Cherukuri, Indu Sekhar Samanta, Abhilash Pati, Jayant Giri, Amrutanshu Panigrahi, Hong Qin, Saurav Mallik","doi":"10.3389/fcomp.2024.1406086","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1406086","url":null,"abstract":"This research presents a process for analyzing a hybrid microgrid's dependability using a fuzzy Markov model. The research initiated an analysis of the various microgrid components, such as wind power systems, solar photovoltaic (PV) systems, and battery storage systems. The states that are induced by component failures are represented using a state-space model. The research continues by suggesting a hybrid microgrid reliability model that analyzes data using a Markov process. Problems arise when trying to estimate reliability metrics for the microgrid using data that is both restricted and imprecise. This is why the study takes uncertainties into account to make microgrid reliability estimations more realistic. The importance of microgrid components concerning their overall availability is evaluated using fuzzy sets and reliability assessments. The study uses numerical analysis and then carefully considers the outcomes. The overall availability of hybrid microgrids is 0.99999.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141361935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing offensive cyber operation planner‘s development: exploring tailored training paths and framework evolution 优化进攻型网络行动规划人员的发展:探索量身定制的培训路径和框架演变
IF 2.6 Q2 Computer Science Pub Date : 2024-06-07 DOI: 10.3389/fcomp.2024.1400360
Marko Arik, Ricardo Gregorio Lugo, Rain Ottis, Adrian Nicholas Venables
This study aims to investigate Offensive Cyber Operations (OCO) planner development, focusing on addressing the need for tailored training paths and the continuous evolution of frameworks. As the complexity of global challenges and security threats grows, OCO planners play a pivotal role in operationalising and executing operations effectively. The research utilized a qualitative case study approach, combining literature reviews and interviews with OCO military professionals, to explore OCO planners' competencies and training frameworks at the operational level. Interviews emphasize the need for comprehensive training, trust, and standardized training pathways in OCO planning, with real-time exposure being the most effective approach for practical planning. The literature review highlights key OCO training options, including Cyber Range Integration, cognitive architectures, and Persistent Cyber Training Environment platforms. It emphasizes educational initiatives, industry contributions, and practical experience in developing expertise in OCO. Discussions highlight the importance of Cyber Range Integration, educational initiatives, and practical experience in OCO. It emphasizes the need for a dual skill set and a structured training path for OCO planners. Real-time exposure through exercises and courses is the most effective approach to becoming a practical OCO planner.
本研究旨在调查进攻性网络行动(OCO)规划人员的发展情况,重点是满足对量身定制的培训路径和框架持续发展的需求。随着全球挑战和安全威胁的复杂性与日俱增,进攻性网络行动(OCO)规划人员在有效实施和执行行动方面发挥着举足轻重的作用。本研究采用定性案例研究方法,结合文献综述和对 OCO 军事专业人员的访谈,探讨 OCO 规划人员在行动层面的能力和培训框架。访谈强调,在 OCO 规划中需要全面的培训、信任和标准化的培训途径,而实时接触是实际规划中最有效的方法。文献综述强调了关键的 OCO 培训选项,包括网络范围集成、认知架构和持久网络培训环境平台。文献综述强调了在开发 OCO 专业知识方面的教育倡议、行业贡献和实践经验。讨论强调了网络范围集成、教育倡议和 OCO 实践经验的重要性。讨论强调了 OCO 规划人员对双重技能组合和结构化培训途径的需求。通过演习和课程进行实时接触是成为实用 OCO 规划人员的最有效方法。
{"title":"Optimizing offensive cyber operation planner‘s development: exploring tailored training paths and framework evolution","authors":"Marko Arik, Ricardo Gregorio Lugo, Rain Ottis, Adrian Nicholas Venables","doi":"10.3389/fcomp.2024.1400360","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1400360","url":null,"abstract":"This study aims to investigate Offensive Cyber Operations (OCO) planner development, focusing on addressing the need for tailored training paths and the continuous evolution of frameworks. As the complexity of global challenges and security threats grows, OCO planners play a pivotal role in operationalising and executing operations effectively. The research utilized a qualitative case study approach, combining literature reviews and interviews with OCO military professionals, to explore OCO planners' competencies and training frameworks at the operational level. Interviews emphasize the need for comprehensive training, trust, and standardized training pathways in OCO planning, with real-time exposure being the most effective approach for practical planning. The literature review highlights key OCO training options, including Cyber Range Integration, cognitive architectures, and Persistent Cyber Training Environment platforms. It emphasizes educational initiatives, industry contributions, and practical experience in developing expertise in OCO. Discussions highlight the importance of Cyber Range Integration, educational initiatives, and practical experience in OCO. It emphasizes the need for a dual skill set and a structured training path for OCO planners. Real-time exposure through exercises and courses is the most effective approach to becoming a practical OCO planner.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141374490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A methodological approach for data standardization and management of Open Data portals for scientific research groups: a case study on mobile and ubiquitous ecosystems 科研团体开放数据门户的数据标准化和管理方法论:移动和泛在生态系统案例研究
IF 2.6 Q2 Computer Science Pub Date : 2024-06-07 DOI: 10.3389/fcomp.2024.1420709
Vladimir Villarreal, L. Muñoz, Joseph González, Jesús Fontecha, C. Dobrescu, Mel Nielsen, Dimas Concepcion, Marco Rodríguez
In the scientific research domain, the Open Science movement stands as a fundamental pillar for advancing knowledge and innovation globally. This article presents the design and implementation of the GITCE Open Data Ecosystem (GITCE-ODE) Research Data Management System (RDMS), developed by the Research Group on Emerging Computational Technologies (GITCE) at the Technological University of Panama, as a platform for the long-term storage, publication, and dissemination of research products.The architecture of the GITCE-ODE RDMS encompasses the entire data engineering lifecycle, facilitating information processing stages such as extraction, transformation, loading (ETL), as well as the management and analysis of diverse datasets and metadata.Compliance with the FAIR principles ensures that published data and products are Findable, Accessible, Interoperable, and Reusable, promoting automation in the discovery and reuse of digital resources. Key considerations of the web portal include file format standardization, data categorization, treatment of semantic context, and organization of resources to ensure efficient management and administration of open research data.Through this platform, GITCE aims to foster collaboration, transparency, and accessibility in scientific research, contributing to the ongoing advancement of knowledge transfer and innovation.
在科学研究领域,开放科学运动是推动全球知识和创新的基本支柱。本文介绍了巴拿马科技大学新兴计算技术研究小组(GITCE)开发的 GITCE 开放数据生态系统(GITCE-ODE)研究数据管理系统(RDMS)的设计和实施情况,该系统是一个用于长期存储、发布和传播研究产品的平台。GITCE-ODE RDMS 的架构涵盖了整个数据工程生命周期,促进了信息处理阶段,如提取、转换、加载(ETL),以及对不同数据集和元数据的管理和分析。门户网站的主要考虑因素包括文件格式标准化、数据分类、语义上下文处理和资源组织,以确保开放研究数据的高效管理和行政。通过这一平台,GITCE 旨在促进科学研究的合作、透明度和可访问性,为不断推进知识转让和创新做出贡献。
{"title":"A methodological approach for data standardization and management of Open Data portals for scientific research groups: a case study on mobile and ubiquitous ecosystems","authors":"Vladimir Villarreal, L. Muñoz, Joseph González, Jesús Fontecha, C. Dobrescu, Mel Nielsen, Dimas Concepcion, Marco Rodríguez","doi":"10.3389/fcomp.2024.1420709","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1420709","url":null,"abstract":"In the scientific research domain, the Open Science movement stands as a fundamental pillar for advancing knowledge and innovation globally. This article presents the design and implementation of the GITCE Open Data Ecosystem (GITCE-ODE) Research Data Management System (RDMS), developed by the Research Group on Emerging Computational Technologies (GITCE) at the Technological University of Panama, as a platform for the long-term storage, publication, and dissemination of research products.The architecture of the GITCE-ODE RDMS encompasses the entire data engineering lifecycle, facilitating information processing stages such as extraction, transformation, loading (ETL), as well as the management and analysis of diverse datasets and metadata.Compliance with the FAIR principles ensures that published data and products are Findable, Accessible, Interoperable, and Reusable, promoting automation in the discovery and reuse of digital resources. Key considerations of the web portal include file format standardization, data categorization, treatment of semantic context, and organization of resources to ensure efficient management and administration of open research data.Through this platform, GITCE aims to foster collaboration, transparency, and accessibility in scientific research, contributing to the ongoing advancement of knowledge transfer and innovation.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141374563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking quantum annealing with maximum cardinality matching problems 量子退火与最大卡方匹配问题的基准测试
IF 2.6 Q2 Computer Science Pub Date : 2024-06-05 DOI: 10.3389/fcomp.2024.1286057
D. Vert, M. Willsch, Berat Yenilen, Renaud Sirdey, Stéphane Louise, K. Michielsen
We benchmark Quantum Annealing (QA) vs. Simulated Annealing (SA) with a focus on the impact of the embedding of problems onto the different topologies of the D-Wave quantum annealers. The series of problems we study are especially designed instances of the maximum cardinality matching problem that are easy to solve classically but difficult for SA and, as found experimentally, not easy for QA either. In addition to using several D-Wave processors, we simulate the QA process by numerically solving the time-dependent Schrödinger equation. We find that the embedded problems can be significantly more difficult than the unembedded problems, and some parameters, such as the chain strength, can be very impactful for finding the optimal solution. Thus, finding a good embedding and optimal parameter values can improve the results considerably. Interestingly, we find that although SA succeeds for the unembedded problems, the SA results obtained for the embedded version scale quite poorly in comparison with what we can achieve on the D-Wave quantum annealers.
我们对量子退火(QA)与模拟退火(SA)进行了基准测试,重点研究了将问题嵌入 D-Wave 量子退火器的不同拓扑结构所产生的影响。我们研究的一系列问题都是最大明细匹配问题的特别设计实例,这些问题在经典上很容易解决,但对 SA 来说却很困难,而且实验发现,对 QA 来说也不容易。除了使用多个 D-Wave 处理器外,我们还通过数值求解随时间变化的薛定谔方程来模拟 QA 过程。我们发现,嵌入式问题可能比非嵌入式问题困难得多,而且一些参数(如链强度)对找到最优解有很大影响。因此,找到一个好的嵌入和最佳参数值可以大大改善结果。有趣的是,我们发现尽管 SA 成功地解决了非嵌入式问题,但与我们在 D-Wave 量子退火器上所能取得的结果相比,嵌入式版本的 SA 结果却相当糟糕。
{"title":"Benchmarking quantum annealing with maximum cardinality matching problems","authors":"D. Vert, M. Willsch, Berat Yenilen, Renaud Sirdey, Stéphane Louise, K. Michielsen","doi":"10.3389/fcomp.2024.1286057","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1286057","url":null,"abstract":"We benchmark Quantum Annealing (QA) vs. Simulated Annealing (SA) with a focus on the impact of the embedding of problems onto the different topologies of the D-Wave quantum annealers. The series of problems we study are especially designed instances of the maximum cardinality matching problem that are easy to solve classically but difficult for SA and, as found experimentally, not easy for QA either. In addition to using several D-Wave processors, we simulate the QA process by numerically solving the time-dependent Schrödinger equation. We find that the embedded problems can be significantly more difficult than the unembedded problems, and some parameters, such as the chain strength, can be very impactful for finding the optimal solution. Thus, finding a good embedding and optimal parameter values can improve the results considerably. Interestingly, we find that although SA succeeds for the unembedded problems, the SA results obtained for the embedded version scale quite poorly in comparison with what we can achieve on the D-Wave quantum annealers.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and simulation of a new QCA-based low-power universal gate 基于 QCA 的新型低功耗万能门的设计与仿真
IF 2.6 Q2 Computer Science Pub Date : 2024-06-05 DOI: 10.3389/fcomp.2024.1373906
Hamidreza Sadrarhami, S. M. Zanjani, M. Dolatshahi, Behrang Barekatain
Quantum-dot Cellular Automata (QCA) is recognized in electronics for its low power consumption and high-density capabilities, emerging as a potential substitute for CMOS technology. GDI (Gate Diffusion Input) technology is featured as an innovative approach for enhancing power efficiency and spatial optimization in digital circuits. This study introduces an advanced four-input Improved Gate Diffusion Input (IGDI) design specifically for QCA technology as a universal gate. A key feature of the proposed 10-cell block is the absence of cross-wiring, which significantly enhances the circuit’s operational efficiency. Its universal cell nature allows for the carrying out of various logical gates by merely altering input values, without necessitating any structural redesign. The proposed design showcases notable advancements over prior models, including a reduced cell count by 17%, a 29% decrease in total energy usage, and a 44% reduction in average energy loss. This innovative IGDI design efficiently executes 21 combinational and various sequential functions. Simulations in 18 nm technology, accompanied by energy consumption analyses, demonstrate this design’s superior performance compared to existing models in key areas such as multiplexers, comparators, and memory circuits, alongside a significant reduction in cell count.
量子点蜂窝自动机(QCA)因其低功耗和高密度能力而在电子领域得到认可,并有可能成为 CMOS 技术的替代品。GDI(栅极扩散输入)技术是提高数字电路能效和空间优化的创新方法。本研究介绍了一种先进的四输入改进型栅极扩散输入(IGDI)设计,专门用于作为通用栅极的 QCA 技术。所提出的 10 单元模块的一个主要特点是没有交叉布线,从而大大提高了电路的运行效率。它的通用单元特性使得只需改变输入值就能执行各种逻辑门,而无需重新设计任何结构。与之前的模型相比,所提出的设计具有显著的进步,包括单元数量减少了 17%,总能耗降低了 29%,平均能量损耗减少了 44%。这种创新的 IGDI 设计可高效执行 21 种组合功能和各种顺序功能。在 18 纳米技术下进行的仿真以及能耗分析表明,与多路复用器、比较器和存储器电路等关键领域的现有模型相比,该设计性能优越,同时还显著减少了单元数。
{"title":"Design and simulation of a new QCA-based low-power universal gate","authors":"Hamidreza Sadrarhami, S. M. Zanjani, M. Dolatshahi, Behrang Barekatain","doi":"10.3389/fcomp.2024.1373906","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1373906","url":null,"abstract":"Quantum-dot Cellular Automata (QCA) is recognized in electronics for its low power consumption and high-density capabilities, emerging as a potential substitute for CMOS technology. GDI (Gate Diffusion Input) technology is featured as an innovative approach for enhancing power efficiency and spatial optimization in digital circuits. This study introduces an advanced four-input Improved Gate Diffusion Input (IGDI) design specifically for QCA technology as a universal gate. A key feature of the proposed 10-cell block is the absence of cross-wiring, which significantly enhances the circuit’s operational efficiency. Its universal cell nature allows for the carrying out of various logical gates by merely altering input values, without necessitating any structural redesign. The proposed design showcases notable advancements over prior models, including a reduced cell count by 17%, a 29% decrease in total energy usage, and a 44% reduction in average energy loss. This innovative IGDI design efficiently executes 21 combinational and various sequential functions. Simulations in 18 nm technology, accompanied by energy consumption analyses, demonstrate this design’s superior performance compared to existing models in key areas such as multiplexers, comparators, and memory circuits, alongside a significant reduction in cell count.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141384400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Frontiers in Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1