The proceedings contain 190 papers. The topics discussed include: construction of network security situation assessment model based on improved ant colony algorithm;optimization of softwareengineering supervision bas...
ISBN:
(纸本)9798350329124
The proceedings contain 190 papers. The topics discussed include: construction of network security situation assessment model based on improved ant colony algorithm;optimization of softwareengineering supervision based on machinelearning algorithm;control system of multi-function grid-connected inverter for distributed power grid based on intelligent optimization algorithm;intelligent dispatching model of power system based on improved genetic algorithm;a mathematical model of sound pressure attenuation for optimizing distribution of orchestra instruments;digital analysis of automotive equipment based on-machinelearning;design of intelligent management platform for electric valve by calculation information;analysis on Halo characteristics and thermal effect of AC transmission line;construction of intelligent mining visualization centralized control system based on neural network and genetic algorithm;and research on automatic start-up and debugging method of electrical engineering equipment based on Apriori algorithm.
A keylogger attack is a type of cyberattack that involves the use of a software program to record keystrokes on a target device. Attacks of this kind can be used to steal sensitive data, including credit card numbers ...
详细信息
Water is necessary for human consumption. To ensure that water is safe, a monitoring system for water quality is required. One part of the system is to be able to predict the water quality class. Using data collected ...
详细信息
With the emergence of machinelearning, there has been a surge in leveraging its capabilities for problem-solving across various domains. In the code clone realm, the identification of type-4 or semantic clones has em...
详细信息
ISBN:
(纸本)9798350327830
With the emergence of machinelearning, there has been a surge in leveraging its capabilities for problem-solving across various domains. In the code clone realm, the identification of type-4 or semantic clones has emerged as a crucial yet challenging task. Researchers aim to utilize machinelearning to tackle this challenge, often relying on the BigCloneBench dataset. However, it's worth noting that BigCloneBench, originally not designed for semantic clone detection, presents several limitations that hinder its suitability as a comprehensive training dataset for this specific purpose. Furthermore, CLCDSA dataset suffers from a lack of reusable examples aligning with real-world software systems, rendering it inadequate for cross-language clone detection approaches. In this work, we present a comprehensive semantic clone and cross-language clone benchmark, GPTCloneBench (1) by exploiting SemanticCloneBench and OpenAI's GPT-3 model. In particular, using code fragments from SemanticCloneBench as sample inputs along with appropriate prompt engineering for GPT-3 model, we generate semantic and cross-language clones for these specific fragments and then conduct a combination of extensive manual analysis, tool-assisted filtering, functionality testing and automated validation in building the benchmark. From 79,928 clone pairs of GPT-3 output, we created a benchmark with 37,149 true semantic clone pairs, 19,288 false semantic pairs(Type-1/Type-2), and 20,770 cross-language clones across four languages (Java, C, C#, and Python). Our benchmark is 15-fold larger than SemanticCloneBench, has more functional code examples for software systems and programming language support than CLCDSA, and overcomes BigCloneBench's qualities, quantification, and language variety limitations. GPTCloneBench can be found here(1).
The proceedings contain 137 papers. The topics discussed include: sexual harassment detection using machinelearning and deep learning techniques for Bangla text;optimization strategies for micro-grid energy managemen...
ISBN:
(纸本)9798350345360
The proceedings contain 137 papers. The topics discussed include: sexual harassment detection using machinelearning and deep learning techniques for Bangla text;optimization strategies for micro-grid energy management and scheduling systems by sine cosine algorithm;efficient hardware and software co-design for EEG signal classification based on extreme learningmachine;measurement and modeling of GaAs based nano-pHEMT: small signal to large signal analysis;Alzheimer’s disease classification from 2D MRI brain scans using convolutional neural networks;faulty classes prediction in object-oriented programming using composed Dagging technique;interpretable multi labeled Bengali toxic comments classification using deep learning;protein structure prediction in structural genomics without alignment using support vector machine with fuzzy logic;and impact of transmission line capacity expansion on electricity operation cost and selling price.
Formal specifications are widely used in software testing approaches, while writing such specifications is a time-consuming job. Recently, a number of methods have been proposed to mine specifications from execution t...
详细信息
ISBN:
(纸本)9798350329964
Formal specifications are widely used in software testing approaches, while writing such specifications is a time-consuming job. Recently, a number of methods have been proposed to mine specifications from execution traces, typically in the form of linear temporal logic (LTL). However, existing works have the following disadvantages: (1) ignoring the negative impact of imperfect traces, which come from partial profiling, missing context information, or buggy programs;(2) relying on templates, resulting in limited expressiveness;(3) requesting negative traces, which are usually unavailable in practice. In this paper, we propose PURLTL, which is able to mine arbitrary LTL specifications from imperfect traces. To alleviate the search space explosion and the wrong search bias, we propose a neural-based method to search LTL formulae, which, intuitively, simulates LTL path checking through differentiable parameter operations. To solve the problem of lacking negative traces, we transform the problem into learning from positive and unlabeled samples, by means of data augmentation and applying positive and unlabeled learning to the training process. Experiments show that our approach surpasses the previous start-of-the-art (SOTA) approach by a large margin. Besides, the results suggest that our approach is not only robust with imperfect traces, but also does not rely on formula templates.
Context: software traceability (ST) refers to capturing associations in various artifacts. A growing interest has been in applying machinelearning (ML) techniques to ST. Objective: The purpose of this work is to pres...
详细信息
Recent advancements in linked devices and industrial automation have created a large demand for network resources. The amount of traffic created by these technologies is so great that traditional networks are becoming...
详细信息
The primary cause of death and disability worldwide is stroke. Accurate prediction models and identification of stroke risk factors can aid in early intervention and preventive measures. In this study, an approach bas...
详细信息
The quick advancement of technology in internet communication and social media platforms eased several problems during the COVID-19 outbreak. It was, however, used to spread untruths and misinformation regarding the i...
详细信息
暂无评论