This study aims to revolutionize software defect prediction by leveraging deep learning (DL) techniques, specifically focusing on Convolutional Neural Networks (CNN) and Stack Sparse Autoencoders (SSAE). The research ...
详细信息
Can artists be recognized from the way they render certain materials, such as fabric, skin, or hair? In this paper, we study this problem with a focus on recognizing works by Rembrandt, Van Dyck, and other Dutch and F...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syntax,it is hard for the developers to write correctly due to lacking knowledge of the mathematical foundations of the first-order logic,which is approximately half accurate at the first stage of devel-opment.A deep neural network named DeepOCL is proposed,which takes the unre-stricted natural language as inputs and automatically outputs the best-scored OCL candidates without requiring a domain conceptual model that is compulsively required in existing rule-based generation *** demonstrate the validity of our proposed approach,ablation experiments were conducted on a new sentence-aligned dataset named *** experiments show that the proposed DeepOCL can achieve state of the art for OCL statement generation,scored 74.30 on BLEU,and greatly outperformed experienced developers by 35.19%.The proposed approach is the first deep learning approach to generate the OCL expression from the natural *** can be further developed as a CASE tool for the software industry.
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be ri...
详细信息
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be rigorously *** to scan testing provides high test coverage,it is applied to the testing of cryptographic integrated ***,while providing good controllability and observability,it also provides attackers with a backdoor to steal *** the text,a novel protection scheme is put forward to resist scan-based attacks,in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuseantifuse structures in a non-linear shift register(NLSR),then determine the scan input code according to the configuration of the fuse-antifuse structures and the styles of connection between the NLSR cells and the scan *** the key is right,the chip can be tested normally;otherwise,the data in the scan chain cannot be propagated normally,it is also impossible for illegal users to derive the desired scan *** proposed technique not only enhances the security of cryptographic chips,but also incurs acceptable overhead.
Depression is a crippling affliction and affects millions of individuals around the *** general,the physicians screen patients for mental health disorders on a regular basis and treat patients in collaboration with ps...
详细信息
Depression is a crippling affliction and affects millions of individuals around the *** general,the physicians screen patients for mental health disorders on a regular basis and treat patients in collaboration with psychologists and other mental health experts,which results in lower costs and improved patient ***,this strategy can necessitate a lot of buy-in from a large number of people,as well as additional training and logistical ***,utilizing the machine learning algorithms,patients with depression based on information generally present in a medical file were analyzed and *** methodology of this proposed study is divided into six parts:Proposed Research Architecture(PRA),Data Pre-processing Approach(DPA),Research Hypothesis Testing(RHT),Concentrated Algorithm Pipeline(CAP),Loss Optimization Stratagem(LOS),and Model Deployment Architecture(MDA).The Null Hypothesis and Alternative Hypothesis are applied to test the *** addition,Ensemble Learning Approach(ELA)and Frequent Model Retraining(FMR)have been utilized for optimizing the loss ***,the Features Importance Interpretation is also delineated in this *** forecasts could help individuals connect with expert mental health specialists more quickly and *** to the findings,71%of people with depression and 80%of those who do not have depression can be appropriately *** study obtained 91%and 92%accuracy through the Random Forest(RF)and Extra Tree *** after applying the Receiver operating characteristic(ROC)curve,79%accuracy was found on top of RF,81%found on Extra Tree,and 82%recorded for the eXtreme Gradient Boosting(XGBoost)***,several factors are identified in terms of predicting depression through statistical data *** the additional effort is needed to develop a more accurate model,this model can be adjustable in the healthcare sector for diagnosing depression.
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf...
详细信息
In computer vision, accurately identifying pedestrians is a crucial difficulty, especially in applications where safety is of the highest priority, such autonomous driving and urban planning. Deep learning has made pr...
详细信息
software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estima...
详细信息
software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset,which comprises data from 93 unique software projects with 24 *** applying multiple machine learning algorithms alongside three feature selection methods,this study aims to reduce data redundancy and enhance model *** findings reveal that the principal component analysis(PCA)-based feature selection technique achieved the highest performance,underscoring the importance of optimal feature selection in improving software cost estimation *** is demonstrated that our proposed method outperforms the existing method while achieving the highest precision,accuracy,and recall rates.
The introduction of the next generations' mobile communications, 5 G -Advance and 6G (5G-A/6G), promises boosting data throughput to new dimensions, achieving submillisecond latency, and providing wider coverage. ...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com...
详细信息
ISBN:
(纸本)9798350351507
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into computerscience education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computerscience programs, (2) construct level-appropriate examples that could be included midway into one's undergraduate studies, (3) demonstrate how to address successive 'failuresy' through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding TLA+ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in TLA+ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudinal analysis within our own institution and
暂无评论