Investigating sophisticated cellular and intercellular behaviors in animals is crucial to biological research, which calls for an intravital high-precision recording at ultrahigh spatiotemporal resolution. Light-field...
详细信息
This study, based on an example of an underground pumped storage power station, analyzed and processed displacement monitoring data around the main plant room using the existing displacement monitoring data from the e...
详细信息
Social media platforms have become potential sites for analyzing people's mental health trends since they provide real-time data on users' thoughts and feelings. Automated stress detection using machine learni...
详细信息
Cloud application security initiates with the analysis of security requirements in DevOps. This involves gathering, managing, and tracking requirements within integrated issue-tracking systems found in repositories li...
详细信息
ISBN:
(纸本)9798350339826
Cloud application security initiates with the analysis of security requirements in DevOps. This involves gathering, managing, and tracking requirements within integrated issue-tracking systems found in repositories like GitHub. DevOps offers advantages in cloud app development, such as accelerated deployment, improved collaboration, and enhanced reliability. In DevOps, while many security verification tools are automated, security requirements analysis often relies on manual procedures. User feedback plays a pivotal role in shaping cloud application requirements, and the industry actively seeks automation solutions to expedite development. Prior research has demonstrated the limited performance of conventional NLP models trained on established datasets, such as PROMISE, when employed in the context of GitHub Issues. Recent studies have explored the integration of deep learning, particularly leveraging modern large language models and transfer learning architectures, to address requirements engineering challenges. However, a significant issue persists - the transferability of these models. While these models excel when applied to datasets similar to those they were trained on, their performance often drastically falls when dealing with external domains. In our paper, we introduce an automated method for classifying requirements within issue trackers. This method utilizes a novel dataset comprising 12,000 security and non-security issues collected from open GitHub repositories. We employed a SmallBERT-based model for training and conducted a series of experiments. Our research reaffirms the challenge related to the transferability of NLP models. Simultaneously, our model yields highly promising results when applied to GitHub Issues, even in challenging scenarios involving issues from projects that were not part of the training dataset and structured requirements texts from the PROMISE dataset. In summary, our approach significantly contributes to enhancing DevOps prac
Dispersive readout of superconducting qubits is one of the most critical components of superconducting quantum computing systems. Traditional dispersive readout schemes typically employ digital signal processing techn...
详细信息
The Calculation Method is a complicated theoretical and strong practical subject, which is used to study and solve the problem of numerical approximate-calculation and is used to solve mathematical problems on the com...
详细信息
The arrival of the digital era has brought many challenges and changes to traditional teaching models, teaching methods, and teaching resources in higher education. Among them, the construction and application of digi...
详细信息
ISBN:
(纸本)9783031631290
The arrival of the digital era has brought many challenges and changes to traditional teaching models, teaching methods, and teaching resources in higher education. Among them, the construction and application of digital educational resources has also become an important trend in the future development of higher education. This article mainly introduces the construction and application of digital college English teaching resources based on data mining. In terms of the construction of teaching resources, this paper uses the method based on data mining technology to analyze and process a large number of student learning data and teacher teaching data within a certain period of time, mine the patterns and rules of student learning, and establish knowledge expressions, Knowledge graph and curriculum knowledge trees related to the curriculum;In terms of application, online teaching platforms are used to provide students with rich and diverse digital teaching resources, allowing them to achieve targeted learning through various social learning methods such as independent learning, autonomous dialogue, and group discussions. Practice has proven that digital college English teaching resources based on data mining can better serve the teaching practice of higher education. On the one hand, this teaching resource makes students’ learning more targeted and personalized, which is not only conducive to interaction between teachers and students, but also helps to improve students’ English learning efficiency;On the other hand, this teaching resource can provide data support and reference for teachers’ teaching practice, so as to better grasp students’ learning situation and teaching progress, and achieve optimization and improvement of the teaching process. In summary, the digital college English teaching resources proposed in this article based on data mining are a feasible and effective teaching model teaching. Based on this model, we can continuously optimize teaching content,
The intricate nature of brain tumors and their resemblance to normal brain tissues present significant challenges in effectively distinguishing and categorizing them through traditional medical image processing method...
详细信息
Among all the current mobile operating systems, Android has the most market share with more than three billion active users. As android is open-source, it possesses many challenges of malicious cyberattacks. Most of t...
详细信息
Object tracking is a critical task that finds its applications in various fields including surveillance and autonomous robots. However, most of the work on object tracking has been developed on images and video data. ...
详细信息
暂无评论