Estimation of univariate regression function by a neural network with one hidden layer is considered, where the weight vector is determined by applying gradient descent to a regularized empirical L2 risk. Here the num...
详细信息
This study predicts software reusability at the class level using machine learning and a dataset of 65 Java applications. The reuse rates were calculated using cohesion, coupling, complexity, inheritance, documentatio...
详细信息
ISBN:
(数字)9798331540760
ISBN:
(纸本)9798331540777
This study predicts software reusability at the class level using machine learning and a dataset of 65 Java applications. The reuse rates were calculated using cohesion, coupling, complexity, inheritance, documentation, and size metrics. The data was segmented by project size (all, small, medium, and big). Several classifiers were tested once the labels were changed to multi-class labels (low: 0, moderate: 1, high: 2). On large projects, the voting model was 93% accurate. The results demonstrate how well machine learning predicts software reusability and provide recommendations for increasing software quality measures.
software crowdsourcing(SW CS)is an evolving software development paradigm,in which crowds of people are asked to solve various problems through an open call(with the encouragement of prizes for the top solutions).Beca...
详细信息
software crowdsourcing(SW CS)is an evolving software development paradigm,in which crowds of people are asked to solve various problems through an open call(with the encouragement of prizes for the top solutions).Because of its dynamic nature,SW CS has been progressively accepted and adopted in the software ***,issues pertinent to the understanding of requirements among crowds of people and requirements engineers are yet to be clarified and *** the requirements are not clear to the development team,it has a significant effect on the quality of the software *** study aims to identify the potential challenges faced by requirements engineers when conducting the SW–CS based requirements engineering(RE)***,solutions to overcome these challenges are also *** data analysis is performed on the interview data collected from software industry ***,20 SW–CS based RE challenges and their subsequent proposed solutions are devised,which are further grouped under seven *** study is beneficial for academicians,researchers and practitioners by providing detailed SW–CS based RE challenges and subsequent solutions that could eventually guide them to understand and effectively implement RE in SW CS.
Spatio-temporal video grounding (or STVG) task aims at locating a spatio-temporal tube for a specific instance given a text query. Despite advancements, current methods easily suffer the distractors or heavy object ap...
详细信息
ISBN:
(数字)9798350353006
ISBN:
(纸本)9798350353013
Spatio-temporal video grounding (or STVG) task aims at locating a spatio-temporal tube for a specific instance given a text query. Despite advancements, current methods easily suffer the distractors or heavy object appearance variations in videos due to insufficient object information from the text, leading to degradation. Addressing this, we propose a novel framework, context-guided STVG (CG-STVG), which mines discriminative instance context for object in videos and applies it as a supplementary guidance for target localization. The key of CG-STVG lies in two specially designed modules, including instance context generation (ICG), which focuses on discovering visual context information (in both appearance and motion) of the instance, and instance context refinement (ICR), which aims to improve the instance context from ICG by eliminating irrelevant or even harmful information from the context. During grounding, ICG, together with ICR, are deployed at each decoding stage of a transformer architecture for instance context learning. Particularly, instance context learned from one decoding stage is fed to the next stage, and leveraged as a guidance containing rich and discriminative object feature to enhance the target-awareness in decoding feature, which conversely benefits generating better new instance context to improve localization finally. Compared to existing methods, CG-STVG enjoys object information in text query and guidance from mined instance visual context for more accurate target localization. In experiments on HCSTVG-v1/-v2 and VidSTG, CG-STVG sets new state-of-the-arts in m_tIoU and m_vIoU on all of them, showing efficacy. Code is released at https://***/HengLan/CGSTVG.
Learning behavior in legged robots presents a significant challenge due to its inherent instability and complex constraints. Recent research has proposed the use of a large language model (LLM) to generate reward func...
详细信息
Deep neural networks have achieved unprecedented success on diverse vision tasks. However, they are vulnerable to adversarial noise that is imperceptible to humans. This phenomenon negatively affects their deployment ...
详细信息
This study was conducted to enable prompt classification of malware,which was becoming increasingly *** do this,we analyzed the important features of malware and the relative importance of selected features according ...
详细信息
This study was conducted to enable prompt classification of malware,which was becoming increasingly *** do this,we analyzed the important features of malware and the relative importance of selected features according to a learning model to assess how those important features were ***,the analysis features were extracted using Cuckoo Sandbox,an open-source malware analysis tool,then the features were divided into five categories using the extracted *** 804 extracted features were reduced by 70%after selecting only the most suitable ones for malware classification using a learning model-based feature selection method called the recursive feature ***,these important features were *** level of contribution from each one was assessed by the Random Forest classifier *** results showed that System call features were mostly *** the end,it was possible to accurately identify the malware type using only 36 to 76 features for each of the four types of malware with the most analysis samples *** were the Trojan,Adware,Downloader,and Backdoor malware.
The dynamics of political conflict and cooperation require powerful computerized tools capable of effectively tracking security threats and cooperation around the world. This study compares the performance of domain-s...
详细信息
A wireless federated learning system is investigated by allowing a server and workers to exchange uncoded information via orthogonal wireless channels. Since the workers frequently upload local gradients to the server...
详细信息
Federated learning (FL) is a distributed machine learning approach that protects user data privacy by training models locally on clients and aggregating them on a parameter server. While effective at preserving privac...
详细信息
暂无评论