With the advancement of technology, companies are increasingly dependent on technology teams to stay competitive. However, members of these teams often work in stressful and unhealthy environments, which can undermine...With the advancement of technology, companies are increasingly dependent on technology teams to stay competitive. However, members of these teams often work in stressful and unhealthy environments, which can undermine their productivity and well-being. The humanization of the culture of technology teams is an approach that aims to create healthier and more productive work environments for team members, promoting balance between personal and professional life. Despite the importance of a healthy and productive work environment, many companies do not invest in strategies to humanize the culture of their technology teams. This can lead to high levels of stress, staff turnover and low productivity. The objective of this project is to identify effective strategies to humanize the culture of technology teams and create healthier and more productive work environments in digital companies. For this, factors such as management styles, psychological safety, human-centered development, individual beliefs and time and energy management will be analyzed. The project’s methodology will include a literature review on the subject and qualitative data analysis will be performed using a content analysis approach. This project will contribute to the advancement of knowledge about the humanization of the culture of technology teams in digital companies. The results can be applied to companies that want to create healthier and more productive work environments for their team members.展开更多
This study was proposed to explore the impact of human activities on the environment in Mhondongori. In this community, there are natural resources that include minerals, natural forest, wetlands, rivers and beautiful...This study was proposed to explore the impact of human activities on the environment in Mhondongori. In this community, there are natural resources that include minerals, natural forest, wetlands, rivers and beautiful mountains. However, over the past two decades, the environmental quality of the community has deteriorated demonstrating irresponsible use of natural resources by humans. Indeed, if such poor natural resource management continues at the current rate, this would ultimately lead to extinction. Qualitative research design and convenience sampling methods were used. The study involved six participants who provided the data. An interview guide and observation techniques were used to collect data. Using content analysis data was classified into themes and a scorecard was used to determine the human activities on the environment and their impact. The results revealed that in Mhondongori, human activities that affected the environment were mining, veld fire, cutting down trees, overgrazing, excessive communal hunting and fishing, littering, water and air pollution. The impacts were the degradation of land, permanent scars on the landscape, deforestation, destruction of wildlife habitats, disappearance of wetlands, destruction of trees, grass, seed bank and seedlings, pollution of streets, bushes and rivers, disruption of migration and hibernation of animals. To conserve the environment, it was recommended that community leadership must develop appropriate environmental management strategies to mitigate these unfavourable impacts and that the state must empower Mhondongori leadership through reasonable legislative and other measures that would prevent environmental degradation.展开更多
The issue of unoccupied or abandoned homesteads(courtyards)in China emerges given the increasing aging population,rapid urbanization and massive rural-urban migration.From the aspect of rural vitalization,land-use pla...The issue of unoccupied or abandoned homesteads(courtyards)in China emerges given the increasing aging population,rapid urbanization and massive rural-urban migration.From the aspect of rural vitalization,land-use planning,and policy making,determining the number of unoccupied courtyards is important.Field and questionnaire-based surveys were currently the main approaches,but these traditional methods were often expensive and laborious.A new workflow is explored using deep learning and machine learning algorithms on unmanned aerial vehicle(UAV)images.Initially,features of the built environment were extracted using deep learning to evaluate the courtyard management,including extracting complete or collapsed farmhouses by Alexnet,detecting solar water heaters by YOLOv5s,calculating green looking ratio(GLR)by FCN.Their precisions exceeded 98%.Then,seven machine learning algorithms(Adaboost,binomial logistic regression,neural network,random forest,support vector machine,decision trees,and XGBoost algorithms)were applied to identify the rural courtyards’utilization status.The Adaboost algorithm showed the best performance with the comprehensive consideration of most metrics(Accuracy:0.933,Precision:0.932,Recall:0.984,F1-score:0.957).Results showed that identifying the courtyards’utilization statuses based on the courtyard built environment is feasible.It is transferable and cost-effective for large-scale village surveys,and may contribute to the intensive and sustainable approach to rural land use.展开更多
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus...In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity.展开更多
In this paper,we propose an efficient fall detection system in enclosed environments based on single Gaussian model using the maximum likelihood method.Online video clips are used to extract the features from two came...In this paper,we propose an efficient fall detection system in enclosed environments based on single Gaussian model using the maximum likelihood method.Online video clips are used to extract the features from two cameras.After the model is constructed,a threshold is set,and the probability for an incoming sample under the single Gaussian model is compared with that threshold to make a decision.Experimental results show that if a proper threshold is set,a good recognition rate for fall activities can be achieved.展开更多
Currently,the number of functions to improve user convenience in smartphone applications is increasing.In addition,more mobile applications are being loaded into mobile operating system memory for faster launches,thus...Currently,the number of functions to improve user convenience in smartphone applications is increasing.In addition,more mobile applications are being loaded into mobile operating system memory for faster launches,thus increasing the memory requirements for smartphones.The memory used by applications in mobile operating systems is managed using software;allocated memory is freed up by either considering the usage state of the application or terminating the least recently used(LRU)application.As LRU-based memory management schemes do not consider the application launch frequency in a low memory situation,currently used mobile operating systems can lead to the termination of a frequently executed application,thereby increasing its relaunch time.This study proposes a memory management system that can efficiently utilize the main memory space by analyzing the application usage information.The proposed system reduces the application launch time by leaving the most frequently used or likely to be run applications in the main memory for as long as possible.The performance evaluation conducted utilizing actual smartphone usage records showed that the proposed memory management system increases the number of times the applications resume from the main memory compared with the conventional memory management system,and that the average application execution time is reduced by approximately 17%.展开更多
Cybersecurity increasingly relies on machine learning(ML)models to respond to and detect attacks.However,the rapidly changing data environment makes model life-cycle management after deployment essential.Real-time det...Cybersecurity increasingly relies on machine learning(ML)models to respond to and detect attacks.However,the rapidly changing data environment makes model life-cycle management after deployment essential.Real-time detection of drift signals from various threats is fundamental for effectively managing deployed models.However,detecting drift in unsupervised environments can be challenging.This study introduces a novel approach leveraging Shapley additive explanations(SHAP),a widely recognized explainability technique in ML,to address drift detection in unsupervised settings.The proposed method incorporates a range of plots and statistical techniques to enhance drift detection reliability and introduces a drift suspicion metric that considers the explanatory aspects absent in the current approaches.To validate the effectiveness of the proposed approach in a real-world scenario,we applied it to an environment designed to detect domain generation algorithms(DGAs).The dataset was obtained from various types of DGAs provided by NetLab.Based on this dataset composition,we sought to validate the proposed SHAP-based approach through drift scenarios that occur when a previously deployed model detects new data types in an environment that detects real-world DGAs.The results revealed that more than 90%of the drift data exceeded the threshold,demonstrating the high reliability of the approach to detect drift in an unsupervised environment.The proposed method distinguishes itself fromexisting approaches by employing explainable artificial intelligence(XAI)-based detection,which is not limited by model or system environment constraints.In conclusion,this paper proposes a novel approach to detect drift in unsupervised ML settings for cybersecurity.The proposed method employs SHAP-based XAI and a drift suspicion metric to improve drift detection reliability.It is versatile and suitable for various realtime data analysis contexts beyond DGA detection environments.This study significantly contributes to theMLcommunity by addressing the critical issue of managing ML models in real-world cybersecurity settings.Our approach is distinguishable from existing techniques by employing XAI-based detection,which is not limited by model or system environment constraints.As a result,our method can be applied in critical domains that require adaptation to continuous changes,such as cybersecurity.Through extensive validation across diverse settings beyond DGA detection environments,the proposed method will emerge as a versatile drift detection technique suitable for a wide range of real-time data analysis contexts.It is also anticipated to emerge as a new approach to protect essential systems and infrastructures from attacks.展开更多
随着城市的进步和不断发展,智能驾驶车辆逐渐代替路段中的部分人工驾驶车辆,但在未来较长时间内人工驾驶车辆并不会被完全取代,此时出现网联车与人工驾驶车辆的混驾环境,即目前以及未来时间内我们面临的驾驶环境。网联车与人工驾驶车辆...随着城市的进步和不断发展,智能驾驶车辆逐渐代替路段中的部分人工驾驶车辆,但在未来较长时间内人工驾驶车辆并不会被完全取代,此时出现网联车与人工驾驶车辆的混驾环境,即目前以及未来时间内我们面临的驾驶环境。网联车与人工驾驶车辆驾驶行为在路段内相互干扰,造成混合车流行驶效率低下。为减弱2种车辆间的相互作用,提出一种分离混驾环境下网联车和人工驾驶车辆的分阶段动态车道引导算法(dynamic lane guidance algorithm for separating CAVs and HDVs in mixed traffic environment,SCHME)。通过该算法分离在交叉口上游路段的混合流车辆集合,调整智能驾驶车辆的行驶路线并进行实时动态更新,在满足运动学约束收敛的条件下,人工驾驶车辆根据网联车的动态路线进行相应调整,实现在每辆车广义安全损失成本最小的情况下提高路段内混驾环境下车辆运行效率。通过MATLAB模拟车辆在进入交叉口前的车辆运行状态,结果表明,SCHME算法可在广义安全损失成本最小的情况下提高路段内平均车辆通行效率(17.29%),同时当车辆优化数组越大,车辆集合距离交叉口越远时,智能驾驶车辆渗透率越低,每辆车的道路广义安全损失成本越低。展开更多
文摘With the advancement of technology, companies are increasingly dependent on technology teams to stay competitive. However, members of these teams often work in stressful and unhealthy environments, which can undermine their productivity and well-being. The humanization of the culture of technology teams is an approach that aims to create healthier and more productive work environments for team members, promoting balance between personal and professional life. Despite the importance of a healthy and productive work environment, many companies do not invest in strategies to humanize the culture of their technology teams. This can lead to high levels of stress, staff turnover and low productivity. The objective of this project is to identify effective strategies to humanize the culture of technology teams and create healthier and more productive work environments in digital companies. For this, factors such as management styles, psychological safety, human-centered development, individual beliefs and time and energy management will be analyzed. The project’s methodology will include a literature review on the subject and qualitative data analysis will be performed using a content analysis approach. This project will contribute to the advancement of knowledge about the humanization of the culture of technology teams in digital companies. The results can be applied to companies that want to create healthier and more productive work environments for their team members.
文摘This study was proposed to explore the impact of human activities on the environment in Mhondongori. In this community, there are natural resources that include minerals, natural forest, wetlands, rivers and beautiful mountains. However, over the past two decades, the environmental quality of the community has deteriorated demonstrating irresponsible use of natural resources by humans. Indeed, if such poor natural resource management continues at the current rate, this would ultimately lead to extinction. Qualitative research design and convenience sampling methods were used. The study involved six participants who provided the data. An interview guide and observation techniques were used to collect data. Using content analysis data was classified into themes and a scorecard was used to determine the human activities on the environment and their impact. The results revealed that in Mhondongori, human activities that affected the environment were mining, veld fire, cutting down trees, overgrazing, excessive communal hunting and fishing, littering, water and air pollution. The impacts were the degradation of land, permanent scars on the landscape, deforestation, destruction of wildlife habitats, disappearance of wetlands, destruction of trees, grass, seed bank and seedlings, pollution of streets, bushes and rivers, disruption of migration and hibernation of animals. To conserve the environment, it was recommended that community leadership must develop appropriate environmental management strategies to mitigate these unfavourable impacts and that the state must empower Mhondongori leadership through reasonable legislative and other measures that would prevent environmental degradation.
基金the project“National Key Research and Development Program of China,No.2018YFD1100803”.
文摘The issue of unoccupied or abandoned homesteads(courtyards)in China emerges given the increasing aging population,rapid urbanization and massive rural-urban migration.From the aspect of rural vitalization,land-use planning,and policy making,determining the number of unoccupied courtyards is important.Field and questionnaire-based surveys were currently the main approaches,but these traditional methods were often expensive and laborious.A new workflow is explored using deep learning and machine learning algorithms on unmanned aerial vehicle(UAV)images.Initially,features of the built environment were extracted using deep learning to evaluate the courtyard management,including extracting complete or collapsed farmhouses by Alexnet,detecting solar water heaters by YOLOv5s,calculating green looking ratio(GLR)by FCN.Their precisions exceeded 98%.Then,seven machine learning algorithms(Adaboost,binomial logistic regression,neural network,random forest,support vector machine,decision trees,and XGBoost algorithms)were applied to identify the rural courtyards’utilization status.The Adaboost algorithm showed the best performance with the comprehensive consideration of most metrics(Accuracy:0.933,Precision:0.932,Recall:0.984,F1-score:0.957).Results showed that identifying the courtyards’utilization statuses based on the courtyard built environment is feasible.It is transferable and cost-effective for large-scale village surveys,and may contribute to the intensive and sustainable approach to rural land use.
文摘In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity.
文摘In this paper,we propose an efficient fall detection system in enclosed environments based on single Gaussian model using the maximum likelihood method.Online video clips are used to extract the features from two cameras.After the model is constructed,a threshold is set,and the probability for an incoming sample under the single Gaussian model is compared with that threshold to make a decision.Experimental results show that if a proper threshold is set,a good recognition rate for fall activities can be achieved.
基金This work was supported by the National Research Foundation of Korea(NRF)Grant funded by the Korea Government(MSIT)under Grant 2020R1A2C1005265.
文摘Currently,the number of functions to improve user convenience in smartphone applications is increasing.In addition,more mobile applications are being loaded into mobile operating system memory for faster launches,thus increasing the memory requirements for smartphones.The memory used by applications in mobile operating systems is managed using software;allocated memory is freed up by either considering the usage state of the application or terminating the least recently used(LRU)application.As LRU-based memory management schemes do not consider the application launch frequency in a low memory situation,currently used mobile operating systems can lead to the termination of a frequently executed application,thereby increasing its relaunch time.This study proposes a memory management system that can efficiently utilize the main memory space by analyzing the application usage information.The proposed system reduces the application launch time by leaving the most frequently used or likely to be run applications in the main memory for as long as possible.The performance evaluation conducted utilizing actual smartphone usage records showed that the proposed memory management system increases the number of times the applications resume from the main memory compared with the conventional memory management system,and that the average application execution time is reduced by approximately 17%.
基金supported by the Institute of Information and Communications Technology Planning and Evaluation(IITP)grant funded by the Korean government(MSIT)(No.2022-0-00089,Development of clustering and analysis technology to identify cyber attack groups based on life cycle)the Institute of Civil Military Technology Cooperation funded by the Defense Acquisition Program Administration and Ministry of Trade,Industry and Energy of Korean government under Grant No.21-CM-EC-07.
文摘Cybersecurity increasingly relies on machine learning(ML)models to respond to and detect attacks.However,the rapidly changing data environment makes model life-cycle management after deployment essential.Real-time detection of drift signals from various threats is fundamental for effectively managing deployed models.However,detecting drift in unsupervised environments can be challenging.This study introduces a novel approach leveraging Shapley additive explanations(SHAP),a widely recognized explainability technique in ML,to address drift detection in unsupervised settings.The proposed method incorporates a range of plots and statistical techniques to enhance drift detection reliability and introduces a drift suspicion metric that considers the explanatory aspects absent in the current approaches.To validate the effectiveness of the proposed approach in a real-world scenario,we applied it to an environment designed to detect domain generation algorithms(DGAs).The dataset was obtained from various types of DGAs provided by NetLab.Based on this dataset composition,we sought to validate the proposed SHAP-based approach through drift scenarios that occur when a previously deployed model detects new data types in an environment that detects real-world DGAs.The results revealed that more than 90%of the drift data exceeded the threshold,demonstrating the high reliability of the approach to detect drift in an unsupervised environment.The proposed method distinguishes itself fromexisting approaches by employing explainable artificial intelligence(XAI)-based detection,which is not limited by model or system environment constraints.In conclusion,this paper proposes a novel approach to detect drift in unsupervised ML settings for cybersecurity.The proposed method employs SHAP-based XAI and a drift suspicion metric to improve drift detection reliability.It is versatile and suitable for various realtime data analysis contexts beyond DGA detection environments.This study significantly contributes to theMLcommunity by addressing the critical issue of managing ML models in real-world cybersecurity settings.Our approach is distinguishable from existing techniques by employing XAI-based detection,which is not limited by model or system environment constraints.As a result,our method can be applied in critical domains that require adaptation to continuous changes,such as cybersecurity.Through extensive validation across diverse settings beyond DGA detection environments,the proposed method will emerge as a versatile drift detection technique suitable for a wide range of real-time data analysis contexts.It is also anticipated to emerge as a new approach to protect essential systems and infrastructures from attacks.
文摘随着城市的进步和不断发展,智能驾驶车辆逐渐代替路段中的部分人工驾驶车辆,但在未来较长时间内人工驾驶车辆并不会被完全取代,此时出现网联车与人工驾驶车辆的混驾环境,即目前以及未来时间内我们面临的驾驶环境。网联车与人工驾驶车辆驾驶行为在路段内相互干扰,造成混合车流行驶效率低下。为减弱2种车辆间的相互作用,提出一种分离混驾环境下网联车和人工驾驶车辆的分阶段动态车道引导算法(dynamic lane guidance algorithm for separating CAVs and HDVs in mixed traffic environment,SCHME)。通过该算法分离在交叉口上游路段的混合流车辆集合,调整智能驾驶车辆的行驶路线并进行实时动态更新,在满足运动学约束收敛的条件下,人工驾驶车辆根据网联车的动态路线进行相应调整,实现在每辆车广义安全损失成本最小的情况下提高路段内混驾环境下车辆运行效率。通过MATLAB模拟车辆在进入交叉口前的车辆运行状态,结果表明,SCHME算法可在广义安全损失成本最小的情况下提高路段内平均车辆通行效率(17.29%),同时当车辆优化数组越大,车辆集合距离交叉口越远时,智能驾驶车辆渗透率越低,每辆车的道路广义安全损失成本越低。