Nowadays, Businesses are mutating to social media platforms and websites as a new source of information and knowledge to get competitive advantages. Hence, the term NoSQL databases known as Internet era databases reve...
Nowadays, Businesses are mutating to social media platforms and websites as a new source of information and knowledge to get competitive advantages. Hence, the term NoSQL databases known as Internet era databases revealed as a solution because of raising urgency in the demand for scalability and performance. This paper presents an overview study for the evolution of databases, different forms of NoSQL databases in addition to their features, advantages and disadvantages. This paper also seeks to cover the shortage of focusing on the quality attributes based methodologies to NoSQL databases that have been largely overlooked in the previous studies and creates a brief comparison that illustrates this issue.
The article proposes models of the structural reliability of a multipath routing network with the possibility of its reconfiguration when switching path segments. The models are focused on optimizing the placement of ...
详细信息
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp...
详细信息
ISBN:
(数字)9798331515683
ISBN:
(纸本)9798331515690
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its importance lies in its ability to enable seamless data exchange and interaction across a wide range of applications, from personal gadgets to complex industrial systems. Despite its widespread adoption, Bluetooth is not immune to critical security vulnerabilities. Issues like Bluetooth Low Energy (BLE) vulnerabilities and denial-of-service (DoS) attacks can overwhelm devices with excessive traffic, while BLE Forced Connection can lead to unauthorized access, and eavesdropping exposes sensitive data being exchanged. We have discussed these vulnerabilities in detail, examining their mechanisms, potential impacts, and various implementation aspects. Additionally, we have added demonstrations to illustrate how these attacks can be executed and the potential consequences. To prevent these threats, we explored essential measures, including regular firmware updates, secure pairing protocols, and careful management of Bluetooth settings. Adopting best practices like disabling Bluetooth when not in use and monitoring connected devices can further enhance security, ensuring the reliable and safe operation of the vast and growing ecosystem of Bluetooth-enabled devices.
In silico prediction of self-interacting proteins(SIPs)has become an important part of *** is an urgent need to develop effective and reliable prediction methods to overcome the disadvantage of high cost and labor int...
详细信息
In silico prediction of self-interacting proteins(SIPs)has become an important part of *** is an urgent need to develop effective and reliable prediction methods to overcome the disadvantage of high cost and labor intensive in traditional biological wet-lab *** goal of our survey is to sum up a comprehensive overview of the recent literature with the computational SIPs prediction,to provide important references for actual work in the *** this review,we first describe the data required for the task of DTIs ***,some interesting feature extraction methods and computational models are presented on this topic in a timely ***,an empirical comparison is performed to demonstrate the prediction performance of some classifiers under different feature extraction and encoding ***,we conclude and highlight potential methods for further enhancement of SIPs prediction performance as well as related research directions.
The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch p...
详细信息
The advanced digital revolution has shifted conventional teaching and learning into digital education. In consistency with digital education, Augmented Reality (AR) applications started to shine in the education indus...
详细信息
Automated program repair (APR) has been gaining ground recently. However, a significant challenge that still remains is patch overfitting, in which APR-generated patches plausibly pass the validation test suite but fa...
详细信息
Automated program repair (APR) has been gaining ground recently. However, a significant challenge that still remains is patch overfitting, in which APR-generated patches plausibly pass the validation test suite but fail to generalize. A common practice to assess the correctness of APR-generated patches is to judge whether they are equivalent to ground-truth, i.e., developer-written patches, by either generating additional test cases or employing human manual inspections. The former often requires the generation of at least one test witnessing the behavioral differences between the APR-patched and developer-patched programs. Searching for the witnessing test, however, can be difficult as the search space can be enormous. Meanwhile, the latter is prone to human biases and requires repetitive and expensive manual effort. In this paper, we propose a novel technique, namely INVALIDATOR, to automatically assess the correctness of APR-generated patches via semantic and syntactic reasoning. INVALIDATOR reasons about program semantic via program invariants while it also captures program syntax via language semantic learned from large code corpus using the pre-trained language model. Given a buggy program and the developer-patched program, INVALIDATOR infers likely invariants on both programs. Then, INVALIDATOR determines that a APR-generated patch overfits if: (1) it violates correct specifications or (2) maintains errors behaviors of the original buggy program. In case our approach fails to determine an overfitting patch based on invariants, INVALIDATOR utilizes a trained model from labeled patches to assess patch correctness based on program syntax. The benefit of INVALIDATOR is three-fold. First, INVALIDATOR is able to leverage both semantic and syntactic reasoning to enhance its discriminant capability. Second, INVALIDATOR does not require new test cases to be generated but instead only relies on the current test suite and uses invariant inference to generalize the behav
One main challenge in imbalanced graph classification is to learn expressive representations of the graphs in underrepresented (minority) classes. Existing generic imbalanced learning methods, such as oversampling and...
详细信息
ISBN:
(数字)9798350359312
ISBN:
(纸本)9798350359329
One main challenge in imbalanced graph classification is to learn expressive representations of the graphs in underrepresented (minority) classes. Existing generic imbalanced learning methods, such as oversampling and imbalanced learning loss functions, can be adopted for enabling graph representation learning models to cope with this challenge. However, these methods often directly operate on the graph representations, ignoring rich discriminative information within the graphs and their interactions. To tackle this issue, we introduce a novel multi-scale oversampling graph neural network (MOSGNN) that learns expressive minority graph representations based on intra- and inter-graph semantics resulting from oversampled graphs at multiple scales - subgraph, graph, and pairwise graphs. It achieves this by jointly optimizing subgraph-level, graph-level, and pairwise-graph learning tasks to learn the discriminative information embedded within and between the minority graphs. Extensive experiments on 16 imbalanced graph datasets show that MOSGNN i) significantly outperforms five state-of-the-art models, and ii) offers a generic framework, in which different advanced imbalanced learning loss functions can be easily plugged in and obtain significantly improved classification performance.
Road safety is of prime importance as road accidents are among the biggest causes of deaths in the country. Road Accidents are majorly due to violators and lawbreakers of road safety rules like not wearing helmets, tr...
详细信息
The importance of prerequisites for education has recently become a promising research *** work proposes a statistical model for measuring dependencies in learning resources between knowledge *** are expected to prese...
详细信息
The importance of prerequisites for education has recently become a promising research *** work proposes a statistical model for measuring dependencies in learning resources between knowledge *** are expected to present knowledge units in a semantically well-organized manner to facilitate students’understanding of the *** proposed model reveals how inner concepts of a knowledge unit are dependent on each other and on concepts not in the knowledge *** help understand the complexity of the inner concepts themselves,WordNet is included as an external knowledge base in *** goal is to develop a model that will enable instructors to evaluate whether or not a learning regime has hidden relationships which might hinder students’ability to understand the *** evaluation,employing three textbooks,shows that the proposed model succeeds in discovering hidden relationships among knowledge units in learning resources and in exposing the knowledge gaps in some knowledge units.
暂无评论