作者:
Mazhr, AhmedMougy, Amr El
Computer Engineering Department Cairo Egypt
Department of Computer Science and Engineering Cairo Egypt
This paper investigates the integration of monocular thermal imaging cameras into autonomous vehicles to address challenges faced by conventional sensors in adverse conditions. This study explores the performance of t...
详细信息
The rapid advancement of digital media technologies has given rise to DeepFake videos, synthetic content generated using deep learning algorithms that can convincingly mimic real individuals' appearances and actio...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Design patterns offer reusable solutions for common software issues,enhancing *** advent of generative large language models(LLMs)marks progress in software development,but their efficacy in applying design patterns i...
详细信息
Design patterns offer reusable solutions for common software issues,enhancing *** advent of generative large language models(LLMs)marks progress in software development,but their efficacy in applying design patterns is not fully *** recent introduction of generative large language models(LLMs)like ChatGPT and CoPilot has demonstrated significant promise in software *** assist with a variety of tasks including code generation,modeling,bug fixing,and testing,leading to enhanced efficiency and *** initial uses of these LLMs have had a positive effect on software development,their potential influence on the application of design patterns remains *** study introduces a method to quantify LLMs’ability to implement design patterns,using Role-Based Metamodeling Language(RBML)for a rigorous specification of the pattern’s problem,solution,and transformation *** method evaluates the pattern applicability of a software application using the pattern’s problem *** deemed applicable,the application is input to the LLM for pattern *** resulting application is assessed for conformance to the pattern’s solution specification and for completeness against the pattern’s transformation *** the method with ChatGPT 4 across three applications reveals ChatGPT’s high proficiency,achieving averages of 98%in conformance and 87%in completeness,thereby demonstrating the effectiveness of the *** RBML,this study confirms that LLMs,specifically ChatGPT 4,have great potential in effective and efficient application of design patterns with high conformance and *** opens avenues for further integrating LLMs into complex software engineering processes.
—Neural networks (NNs) have been driving machine learning progress in recent years, but their larger models present challenges in resource-limited environments. Weight pruning reduces the computational demand, often ...
详细信息
—Neural networks (NNs) have been driving machine learning progress in recent years, but their larger models present challenges in resource-limited environments. Weight pruning reduces the computational demand, often with performance degradation and long training procedures. This work introduces distilled gradual pruning with pruned fine-tuning (DG2PF), a comprehensive algorithm that iteratively prunes pretrained NNs using knowledge distillation. We employ a magnitude-based unstructured pruning function that selectively removes a specified proportion of unimportant weights from the network. This function also leads to an efficient compression of the model size while minimizing classification accuracy loss. Additionally, we introduce a simulated pruning strategy with the same effects of weight recovery but while maintaining stable convergence. Furthermore, we propose a multistep self-knowledge distillation strategy to effectively transfer the knowledge of the full, unpruned network to the pruned counterpart. We validate the performance of our algorithm through extensive experimentation on diverse benchmark datasets, including CIFAR-10 and ImageNet, as well as a set of model architectures. The results highlight how our algorithm prunes and optimizes pretrained NNs without substantially degrading their classification accuracy while delivering significantly faster and more compact models. Impact Statement—In recent times, NNs have demonstrated remarkable outcomes in various tasks. Some of the most advanced possess billions of trainable parameters, making their training and inference both energy intensive and costly. As a result, the focus on pruning is growing in response to the escalating demand for NNs. However, most current pruning techniques involve training a model from scratch or with a lengthy training process leading to a significant increase in carbon footprint, and some experience a notable drop in performance. In this article, we introduce DG2PF. This unstruct
Cloud storage is crucial for managing large datasets, but dependence on a single cloud space raises security concerns. Conversely, Distributed Ledger Technology (DLT) provides a secure cloud-based storage system opera...
详细信息
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the isolation of end-user data and resources into tenants to ensure da...
详细信息
This paper presents a concise methodology for the detection of partially reduplicated Multi-Word Expressions (MWEs) in Bengali texts. The entire process of identifying such reduplicated forms is carried out in two dis...
详细信息
We consider the online convex optimization (OCO) problem with quadratic and linear switching cost when at time t only gradient information for functions fτ, τ 16(Lµ+5) for the quadratic switching cost, and also...
详细信息
We consider the online convex optimization (OCO) problem with quadratic and linear switching cost when at time t only gradient information for functions fτ, τ 16(Lµ+5) for the quadratic switching cost, and also show the bound to be order-wise tight in terms of L, µ. In addition, we show that the competitive ratio of any online algorithm is at least max{Ω(L), Ω(pLµ )} when the switching cost is quadratic. For the linear switching cost, the competitive ratio of the OMGD algorithm is shown to depend on both the path length and the squared path length of the problem instance, in addition to L, µ, and is shown to be order-wise, the best competitive ratio any online algorithm can achieve. Copyright is held by author/owner(s).
The emergence of 5G networks has enabled the deployment of a two-tier edge and vehicular-fog network. It comprises Multi-access Edge Computing (MEC) and Vehicular-Fogs (VFs), strategically positioned closer to Interne...
详细信息
暂无评论