Results 81 to 90 of about 100,345 (312)

Abstract Syntax Tree Model for Minimizing False Negative in Semantic Evaluation of Python Fill-in-the-Blank

open access: yesJournal of Applied Informatics and Computing
This study develops and evaluates an automated assessment model using Abstract Syntax Trees (AST) with a view to overcoming the limitations of string-matching techniques in the assessment of Fill-in-the-Blank (FIB) programming answers. Traditional string-
Usman Nurhasan   +2 more
doaj   +1 more source

Automatic Grading for Complex Multifile Programs

open access: yesComplexity, 2020
This paper presents an automatic grading method DGRADER, which handles complex multifile programs. Both the dynamic and the static grading support multifile program analysis. So, it can be an advantage to handle complex programming problem which requires
Tiantian Wang   +3 more
doaj   +1 more source

Applying computer vision to accelerate monitoring and analysis of bird incubation behaviors: a case study using common eider nest camera footage

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
Visualization of the pipeline is divided into two primary segments: automated (i.e., the user adapts the code directly to build a custom computer vision model) and human‐in‐the‐loop (i.e., the user manually evaluates the output of the model). In step 1, raw imagery data are selected for training and testing datasets; ideally, these datasets are ...
Lindsay Veazey   +3 more
wiley   +1 more source

The Epistemic Generativity of Using a Model of a Big Idea

open access: yesScience Education, EarlyView.
ABSTRACT Science instruction should involve learners in generating and warranting ideas, what we call epistemic generation. In modeling instruction, epistemic generation should be achieved by coordinating a model structure with the experienced world in reciprocal directions denoted as developing models and using models. In the former, a model structure
Jonathan T. Shemwell, Daniel K. Capps
wiley   +1 more source

An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla   +3 more
wiley   +1 more source

A Systems Engineering Methodology for System of Autonomous Systems: Architecture and Integration

open access: yesSystems Engineering, EarlyView.
ABSTRACT Artificial intelligence and machine learning (AI/ML) rapidly transform systems by providing autonomous capabilities. This new class of systems can become a constituent system in a system of systems (SoS) to evolve it into a system of autonomous systems (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley   +1 more source

Fronting in Old Catalan: Asymmetries between Narration and Reported Speech1

open access: yesTransactions of the Philological Society, Volume 123, Issue 1, Page 1-28, March 2025.
Abstract This article explores the distribution, syntax, and information structure of XVS clauses in the narrative text and the reported speech of a thirteenth‐century Old Catalan chronicle, the Llibre dels Fets. It is shown that XVS occurs mainly within reported speech and in embedded clauses.
Afra Pujol i Campeny
wiley   +1 more source

Loanwords and Linguistic Phylogenetics: *pelek̑u‐ ‘axe’ and *(H)a(i̯)g̑‐ ‘goat’1

open access: yesTransactions of the Philological Society, Volume 123, Issue 1, Page 116-136, March 2025.
Abstract This paper assesses the role of borrowings in two different approaches to linguistic phylogenetics: Traditional qualitative analyses of lexemes, and quantitative computational analysis of cognacy. It problematises the assumption that loanwords can be excluded altogether from datasets of lexical cognacy.
Simon Poulsen
wiley   +1 more source

Research on monitoring method during the construction of safety-critical software

open access: yesXibei Gongye Daxue Xuebao
The C language is widely used in aerospace and other critical areas due to its flexibility and high efficiency. However, C programs have safety risks, such as unrestricted pointer operations and lack of boundary checks for arrays and strings, which can ...
WANG Ben   +3 more
doaj   +1 more source

Malware classification through Abstract Syntax Trees and L-moments

open access: hybridComputers & Security
Anthony J. Rose   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy