Visual representation holds significant significance in the healthcare industry. Healthcare professionals previously utilized medical imagery to accurately diagnose diseases and offer food to patients. Healthcare prof...
详细信息
Multi-task scheduling of heterogeneous big data network information is proposed to improve the optimal configuration and application ability of network big data resources. A multi-task scheduling method of heterogeneo...
详细信息
The travel industry is undergoing profound changes with the continuous development of information technology. One such emerging technology is cloud computing, which boasts powerful computing power, massive storage spa...
详细信息
The proposed system aims to enhance student transportation security through real-time face detection and recognition. Leveraging the MTCNN framework for accurate face detection and the FaceNet model for reliable face ...
详细信息
According to estimates, by mid-2030, there will be 8.6 billion people on the planet. The human population has been growing exponentially. There will be a rise in food production and consumption due to the massive popu...
详细信息
With the widespread adoption of Android and its applications, obfuscated malware poses significant challenges to the platform's security. Addressing these challenges requires automated, lightweight, and scalable m...
详细信息
With the emergence of large-scale language models (LLM), the powerful capabilities of LLM in natural language processing have attracted attention. Based on programming language LLM (Programming Language Model, PLM), w...
详细信息
ISBN:
(纸本)9798350371000;9798350370997
With the emergence of large-scale language models (LLM), the powerful capabilities of LLM in natural language processing have attracted attention. Based on programming language LLM (Programming Language Model, PLM), we use prompt templates to explore its potential in the field of automatic vulnerability repair, and combine it with a special workflow to improve its efficiency in automatic vulnerability repair tasks. Specifically, we design four prompt templates for handling vulnerable code, and design an iterative reasoning method to improve the efficiency of vulnerability fixing. We selected multiple typical LLMs for evaluation on multiple data sets. The results show that reasonable prompt templates can effectively improve the efficiency of automatic vulnerability repair, which is significantly improved compared with neural machine translation technology. In addition, we also discussed previous bug fixing related work and our work, and pointed out some of our shortcomings and directions for future improvements.
In this work, we present a method to enhance image contrast using a fuzzy logic-based transformation function. Our goal is to develop an image-specific transformation by tuning the fuzzy system. We employ Hill Climbin...
详细信息
With the rapid development of social economy and science and technology, data sharing and analysis technology is one of the contents widely used in the Internet field. Collecting and distributing terminal data and min...
详细信息
Based on the SEEV model, the nuclear power plant monitoring and display interface is optimized and ***, we summarize the key contents and existing problems of the interface, then introduce the salience and effort fact...
详细信息
暂无评论