knowledge graph (KG) as auxiliary information can solve the cold-start and data sparsity problems of recommender systems. However, most existing KG-based recommendation methods focus on how to effectively encode items...
详细信息
The NPTEL (National Programme on Technology Enhanced Learning) program is an initiative to provide accessibility to the resources of well-structured courses that are developed in the reputed institutions of the countr...
详细信息
With the continuous enhancement of informatization in production safety, the need to strengthen the analysis capability of big data in production safety is increasingly growing. This is crucial for preventing major ac...
详细信息
With the rapid development of cloud computing technology, virtual machine scheduling has become an important means to ensure the performance, efficiency, and reliability of cloud services. In response to the shortcomi...
详细信息
The main objective of this paper is to demonstrate the complexity and perils of communication patterns between all parties involved throughout the software development life phases. Such communication takes place from ...
详细信息
The Android operating system is the world's largest smartphone platform. The platform carries with it significant risk due to the vast amounts of malware that target the platform. Newer methods involve the use of ...
详细信息
ISBN:
(纸本)9798350317107;9798350317114
The Android operating system is the world's largest smartphone platform. The platform carries with it significant risk due to the vast amounts of malware that target the platform. Newer methods involve the use of machine learning to detect malicious software in a more general manner, as opposed to conventional methods that rely on prior knowledge pertaining to a particular malware family. This study explores the use of a Convolutional Neural Network and various tree-based learning methods processing feature engineered from malware binaries. Overall model accuracy was found to be between 87% and 90%, and sufficient performance was obtained when collecting a certain amount of data above the threshold. It was also found that tuning some of the tree based model hyperparameters caused overfitting. Overall, the findings concluded that models that did not overfit performed comparably during both training and testing, representing consistent detection models.
Increasing the semantic understanding and contextual awareness of machine learning models is important for improving robustness and reducing susceptibility to data shifts. In this work, we leverage contextual awarenes...
详细信息
ISBN:
(数字)9781665490429
ISBN:
(纸本)9781665490429
Increasing the semantic understanding and contextual awareness of machine learning models is important for improving robustness and reducing susceptibility to data shifts. In this work, we leverage contextual awareness for the anomaly detection problem. Although graphed-based anomaly detection has been widely studied, context-dependent anomaly detection is an open problem and without much current research. We develop a general framework for converting a context-dependent anomaly detection problem to a link prediction problem, allowing well-established techniques from this domain to be applied. We implement a system based on our framework that utilizes knowledge graph embedding models and demonstrates the ability to detect outliers using context provided by a semantic knowledge base. We show that our method can detect context-dependent anomalies with a high degree of accuracy and show that current object detectors can detect enough classes to provide the needed context to show good performance within our example domain.
knowledge Graph Embedding (KGE) is attracting growing research interest because it offers great flexibility for the manipulation and application of knowledge Graphs (KGs). However, most existing works focus on static ...
详细信息
ISBN:
(纸本)9798350359329;9798350359312
knowledge Graph Embedding (KGE) is attracting growing research interest because it offers great flexibility for the manipulation and application of knowledge Graphs (KGs). However, most existing works focus on static KGE, while temporal KGE is still in its infancy. Recent temporal KGE methods attempt to obtain the long-term dependency of facts in consecutive timestamps by merging historical fact information. However, they ignore the different impacts of historical facts on the current facts due to the time decay effect and heterogeneity of historical facts. To bridge this gap, we formalize the concept of fact formation sequence to describe the evolution of an entity and propose the Modeling Time Decay Effect in Temporal knowledge Graphs via Multivariate Hawkes Process method (TimeDE). TimeDE uses the Hawkes process to model the time decay effect of historical facts. It also incorporates the attention mechanism based on the score function of static KGE methods to better capture the impacts of heterogeneous historical facts on the current facts. Extensive experiments on the five commonlyused benchmark datasets demonstrate that TimeDE achieves significant improvements in terms of both Mean Reciprocal Rank and Hits@K compared to state-of-the-art methods.
GitHub Copilot is an AI-powered code generation tool developed by OpenAI and GitHub that has gained significant attention from the softwareengineering community. Despite the significant attention received from the so...
详细信息
Currently, there are many researches trying to find the position of people inside the building or indoor positioning to apply in many different applications in the future. This research is an early stage, the idea is ...
详细信息
ISBN:
(数字)9781665486606
ISBN:
(纸本)9781665486606
Currently, there are many researches trying to find the position of people inside the building or indoor positioning to apply in many different applications in the future. This research is an early stage, the idea is to find the location of people inside the building through the Wi-Fi signal from the access point. This paper will present the location to install the appropriate access point device inside the building to further develop the indoor positioning system. A comparative analysis of the access point's design and operation was performed using a software Heat Map Planner called Ruckus Wireless ZonePlanner, a software license from Ruckus, designed specifically for Wi-Fi systems and using software Site Surveys to collect data to verify the accuracy of the information. Three software site surveys, Wi-Fi Analyzer, Net Spot, and inSSIDer Home, were used to find average data collection. Then compare with the software Heat Map Planner to see how much signal quality deviation and signal quality is measured when the signal is broadcast through the walls of the building's infrastructure: concrete, brick walls, glass walls with metal frames. Summarize the results of each signal quality analysis, the signal quality is between -29 and -68 but based on actual measurements using 3 different software, the signal quality is between -29 and -74, the least error is 9 and the maximum is -28.
暂无评论