作者:
Zhong, WenjieSun, TaoZhou, Jian-TaoWang, ZhuoweiSong, XiaoyuInner Mongolia University
College of Computer Science the Engineering Research Center of Ecological Big Data Ministry of Education the Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software the Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot010000 China Guangdong University of Technology
School of Computer Science and Technology Guangzhou510006 China Portland State University
Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syntax,it is hard for the developers to write correctly due to lacking knowledge of the mathematical foundations of the first-order logic,which is approximately half accurate at the first stage of devel-opment.A deep neural network named DeepOCL is proposed,which takes the unre-stricted natural language as inputs and automatically outputs the best-scored OCL candidates without requiring a domain conceptual model that is compulsively required in existing rule-based generation *** demonstrate the validity of our proposed approach,ablation experiments were conducted on a new sentence-aligned dataset named *** experiments show that the proposed DeepOCL can achieve state of the art for OCL statement generation,scored 74.30 on BLEU,and greatly outperformed experienced developers by 35.19%.The proposed approach is the first deep learning approach to generate the OCL expression from the natural *** can be further developed as a CASE tool for the software industry.
Human life relies heavily on emotions, as they influence our decision-making, social connections, and daily conduct. Current research has primarily focused on predicting emotions from social media data, neglecting to ...
详细信息
With the rising prominence of gold as a lucrative investment avenue in Iran, this research delves into predicting the future price of 18-carat gold. In pursuit of this objective, a comprehensive comparison is conducte...
详细信息
We present the first learning-augmented data structure for implementing dictionaries with optimal consistency and *** data structure, named RobustSL, is a skip list augmented by predictions of access frequencies of el...
详细信息
We present the first learning-augmented data structure for implementing dictionaries with optimal consistency and *** data structure, named RobustSL, is a skip list augmented by predictions of access frequencies of elements in a data *** proper predictions, RobustSL has optimal consistency (achieves static optimality).At the same time, it maintains a logarithmic running time for each operation, ensuring optimal robustness, even if predictions are generated ***, RobustSL has all the advantages of the recent learning-augmented data structures of Lin, Luo, and Woodruff (ICML 2022) and Cao et al.(arXiv 2023), while providing robustness guarantees that are absent in the previous *** experiments show that RobustSL outperforms alternative data structures using both synthetic and real datasets. Copyright 2024 by the author(s)
The UAV systems that are fitted with current technology have helped in boosting the crisis management activities such as disaster relief operations, search and rescues, and policing. This paper integrates the developm...
详细信息
As the Internet of Things(IoT)endures to develop,a huge count of data has been *** IoT platform is rather sensitive to security challenges as individual data can be leaked,or sensor data could be used to cause *** typ...
详细信息
As the Internet of Things(IoT)endures to develop,a huge count of data has been *** IoT platform is rather sensitive to security challenges as individual data can be leaked,or sensor data could be used to cause *** typical intrusion detection system(IDS)studies can be frequently designed for working well on databases,it can be unknown if they intend to work well in altering network *** learning(ML)techniques are depicted to have a higher capacity at assisting mitigate an attack on IoT device and another edge system with reasonable *** article introduces a new Bird Swarm Algorithm with Wavelet Neural Network for Intrusion Detection(BSAWNN-ID)in the IoT *** main intention of the BSAWNN-ID algorithm lies in detecting and classifying intrusions in the IoT *** BSAWNN-ID technique primarily designs a feature subset selection using the coyote optimization algorithm(FSS-COA)to attain ***,to detect intrusions,the WNN model is *** last,theWNNparameters are optimally modified by the use of *** experiment is performed to depict the better performance of the BSAWNNID *** resultant values indicated the better performance of the BSAWNN-ID technique over other models,with an accuracy of 99.64%on the UNSW-NB15 dataset.
We establish a framework for signal processing on product spaces of simplicial and cellular complexes. For simplicity, we focus on the product of two complexes representing time and space, although our results general...
Lung cancer requires accurate risk assessment and early detection due to its high prevalence and fatality rate. The simultaneous analysis of clinical symptoms and etiological factors using Machine Learning revolutioni...
详细信息
Because of their high torque, high power density, and appropriate speed range, brushless DC (BLDC) motors are the top choice for lightweight electric vehicles. The application's goal is to use a Hall position sens...
详细信息
暂无评论