Widespread and mature practice of model-driven engineering is leading to a growing number of modeling artifacts and challenges in their management. Model clone detection (MCD) is an important approach for managing and...
详细信息
Widespread and mature practice of model-driven engineering is leading to a growing number of modeling artifacts and challenges in their management. Model clone detection (MCD) is an important approach for managing and maintaining modeling artifacts. While its counterpart in traditional source code development, code clone detection, is enjoying popularity and more than two decades of development, MCD is still in its infancy in terms of research and tooling. We aim to develop a portal for model clone detection, MoCoP, as a central hub to mitigate adoption barriers and foster MCD research. In this short paper, we present our vision for MoCoP and its features and goals. We discuss MoCoP's key components that we plan on realizing in the short term including public tooling, curated data sets, and a body of MCD knowledge. Our longer term goals include a dedicated service-oriented infrastructure, contests, and forums. We believe MoCoP will strengthen MCD research, tooling, and the community, which in turn will lead to better quality, maintenance, and scalability for model-driven engineering practices.
As the computing power of modern hardware is increasing strongly, pre-trained deep learning models (e.g., BERT, GPT-3) learned on large-scale datasets have shown their effectiveness over conventional methods. The big ...
详细信息
Once a subject is diagnosed with cancer, a patient goes through a series of diagnosis and tests, referred to as after cancer treatment. Due to the nature of the treatment and side effects on regular lifestyles, mainta...
详细信息
The objective of this research is to shed light on the applicability of the Non-Functional Requirements (NFR) Approach to the concept of control chains for the combined analysis of safety and security of SCADA systems...
详细信息
Complex networks represented as node adjacency matrices constrains the application of machine learning and parallel algorithms. To address this limitation, network embedding (i.e., graph representation) has been inten...
详细信息
ISBN:
(纸本)9781728148977
Complex networks represented as node adjacency matrices constrains the application of machine learning and parallel algorithms. To address this limitation, network embedding (i.e., graph representation) has been intensively studied to learn a fixed-length vector for each node in an embedding space, where the node properties in the original graph are preserved. Existing methods mainly focus on learning embedding vectors to preserve nodes proximity, i.e., nodes next to each other in the graph space should also be closed in the embedding space, but do not enforce algebraic statistical properties to be shared between the embedding space and graph space. In this work, we propose a lightweight model, entitled Network2Vec, to learn network embedding on the base of semantic distance mapping between the graph space and embedding space. The model builds a bridge between the two spaces leveraging the property of group homomorphism. Experiments on different learning tasks, including node classification, link prediction, and community visualization, demonstrate the effectiveness and efficiency of the new embedding method, which improves the state-of-the-art model by 19% in node classification and 7% in link prediction tasks at most. In addition, our method is significantly faster, consuming only a fraction of the time used by some famous methods.
In this paper, we propose a new steganalytic method that uses dual convolutional neural network (CNN) of which each has different inputs. To construct the dual CNN structure, two pairs of the preprocessing filters and...
In this paper, we propose a new steganalytic method that uses dual convolutional neural network (CNN) of which each has different inputs. To construct the dual CNN structure, two pairs of the preprocessing filters and the convolutional layers were brought from the conventional CNN-based steganalytic methods and the outputs of the dual CNN were concatenated and fed together into a following affine layer. Given an input image, a stego image is created by embedding some additional data into the input image using one of steganographic methods and a difference image is computed between the input and stego images. Then, the input and difference images are fed into each CNN, respectively. This indicates that the proposed method extracts /learns additional features from the difference image using the additional CNN. Experimental results demonstrated that the proposed dual CNN with additional input can identify whether the S-UNIWARD steganography was applied to the input image with an accuracy of 80.43%, and can improve the accuracy by approximately 5% when compared with the conventional CNN-based steganalytic method.
A new method, called Bayesian inference-based template matching (BIBTM) method, is proposed in this article, which is designed to detect and classify neural spikes from real neural signals. Through this spike detectio...
详细信息
Information revolution and technology growth have made a considerable contribution to restraining the cost expansion and empowering the customer. They disrupted most business models in different industries. The custom...
详细信息
Information revolution and technology growth have made a considerable contribution to restraining the cost expansion and empowering the customer. They disrupted most business models in different industries. The customer-centric business model has pervaded the different sectors. Smart healthcare has made an enormous shift in patient life and raised their expectation of healthcare services quality. Healthcare insurance is an essential business in the healthcare sector; patients expect a new business model to meet their needs and enhance their wellness. This paper presents a smart healthcare architecture based on the recent development of information and communications technology. Then develops a disruptive healthcare insurance business model that adapts to this architecture. The paper presents a use case to show in part the application of this business model.
Power gating is a common approach for reducing circuit static power consumption. In FPGAs, resources that dominate static power consumption lie in the routing network. Researchers have proposed several heuristics for ...
Power gating is a common approach for reducing circuit static power consumption. In FPGAs, resources that dominate static power consumption lie in the routing network. Researchers have proposed several heuristics for clustering multiplexers in routing network into power-gating regions. In this paper, we propose a fundamentally different approach based on K-means clustering, an algorithm commonly used in machine learning. Experimental results on Titan benchmarks and Stratix-IV FPGA architecture show that our proposed clustering algorithms outperform the state of the art. For example, for 32 power-gating regions in FPGA routing switch matrices, we achieve (on average) almost 1.4× higher savings (37.48% vs. 26.94%) in the static power consumption of the FPGA routing resources at lower area overhead than the most efficient heuristic published so far.
Warehouse operations need high labor force and physical space. Currently, companies with huge warehouses are investing on autonomous robots to save time and energy, and to prevent human-based errors. One of the most i...
Warehouse operations need high labor force and physical space. Currently, companies with huge warehouses are investing on autonomous robots to save time and energy, and to prevent human-based errors. One of the most important challenges in a smart warehouse with multiple moving robots is path planning because of its dynamics. This paper provides a complete and error-free solution to the path-planning problem, and describes its performance in various warehouse scenarios with different number of robots and different design considerations.
暂无评论