This document summarizes a student project on analyzing software design defects using machine learning. The project will involve detecting various types of code smells in source code, preparing datasets of code classes, using machine learning algorithms to test for smells, and analyzing the causes and limiting criteria of detected smells. The expected outcomes are to identify the types of smells found, their causes, and limiting criteria. The document provides background on code smells and some examples. It outlines the research pathway and references literature on evaluating code smells and detection tools.
This presentation describes a course on Software Project Management developed by the author. The course combines the general project management standard PMBOK® with specific software engineering practices.
Link to paper: http://www.cs.technion.ac.il/~tomera/publications/Tomer_EDUCON_2014_V02.pdf
This presentation describes a course on Software Project Management developed by the author. The course combines the general project management standard PMBOK® with specific software engineering practices.
Link to paper: http://www.cs.technion.ac.il/~tomera/publications/Tomer_EDUCON_2014_V02.pdf
Why is Test Driven Development for Analytics or Data Projects so Hard?Phil Watt
Preview of research results for my Master's thesis on Test-Driven Development in Analytics. Prepared for my Term 4 assignment, oral thesis presentation
Where does a Software Tester fit in the Software Development Life Cycle? What are the responsibilities of a Software Tester? What are the competencies of a Software Tester?
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Why is Test Driven Development for Analytics or Data Projects so Hard?Phil Watt
Preview of research results for my Master's thesis on Test-Driven Development in Analytics. Prepared for my Term 4 assignment, oral thesis presentation
Where does a Software Tester fit in the Software Development Life Cycle? What are the responsibilities of a Software Tester? What are the competencies of a Software Tester?
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
1. Mentor:-
Ms. Aakanshi Gupta
AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY,
NEW DELHI- 110061
An institution of Ritnand Balved Education Foundation (RBEF)
Branch: Computer Science and Engineering (CSE)
Pre-Synopsis Presentation
Team Members:-
Kritika Phulli [01610402716]
Nidhi Kumari Chauhan [02110402716]
Deepanshu Sharma [35210402716]
Vishal Bhat [41910402716]
5. Design Issues
• Caused by Sub-optimal
design decisions which can
be identified in the source
code as code smells,
negatively impact the
software quality.
• Poor design decisions.
7. Bad Smells
The noticeable factors of code smell was
first designed by Fowler.
“Smell are symptoms of poor design or
implementation choices that causes long term
maintainability problem and mask bugs.”
Some of the bad smells are listed below :
Member Ignoring Method Slow Loop
Leaking Inner Class Unclosed
Closable.
8. Research
Pathway
DETECTION • Detection of different type of smell is
done initially.
ANALYSIS
• Preparation of dataset for
classes of the code.
ML
TESTING
• Using Machine Learning
Algorithms, Further
testing Would Be Done.
9. Expected
Outcome
• Type of smells
• Causes
• Limiting Criteria
Once Data is collected and Data sets are created,
We expect the outcomes emphasizing on :
10. References
• Thanis Paiva, Amanda Damasceno Eduardo Figueiredo and
Cláudio Sant’Anna, “On the evaluation of code smells and
detection tools”, Journal of Software Engineering Research
and Development 2017.
• A. Yamashita and L. Moonen, “Exploring the impact of inter-
smell relations on software maintainability: An empirical
study,” in Proceedings of the International Conference on
Software Engineering (ICSE). IEEE, 2018.