App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their *** the analysis of these reviews is vital for efficient review *** traditional machine learning(M...
详细信息
App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their *** the analysis of these reviews is vital for efficient review *** traditional machine learning(ML)models rely on basic word-based feature extraction,deep learning(DL)methods,enhanced with advanced word embeddings,have shown superior *** research introduces a novel aspectbased sentiment analysis(ABSA)framework to classify app reviews based on key non-functional requirements,focusing on usability factors:effectiveness,efficiency,and *** propose a hybrid DL model,combining BERT(Bidirectional Encoder Representations from Transformers)with BiLSTM(Bidirectional Long Short-Term Memory)and CNN(Convolutional Neural Networks)layers,to enhance classification *** analysis against state-of-the-art models demonstrates that our BERT-BiLSTM-CNN model achieves exceptional performance,with precision,recall,F1-score,and accuracy of 96%,87%,91%,and 94%,*** contributions of this work include a refined ABSA-based relabeling framework,the development of a highperformance classifier,and the comprehensive relabeling of the Instagram App Reviews *** advancements provide valuable insights for software developers to enhance usability and drive user-centric application development.
In the realm of medical datasets, particularly when considering diabetes, the occurrence of data incompleteness is a prevalent issue. Unveiling valuable patterns through medical data analysis is crucial for early and ...
详细信息
Human activity recognition is a crucial domain in computerscience and artificial intelligence that involves the Detection, Classification, and Prediction of human activities using sensor data such as accelerometers, ...
详细信息
Code review is a critical process in software development, contributing to the overall quality of the product by identifying errors early. A key aspect of this process is the selection of appropriate reviewers to scru...
详细信息
Code review is a critical process in software development, contributing to the overall quality of the product by identifying errors early. A key aspect of this process is the selection of appropriate reviewers to scrutinize changes made to source code. However, in large-scale open-source projects, selecting the most suitable reviewers for a specific change can be a challenging task. To address this, we introduce the Code Context Based Reviewer Recommendation (CCB-RR), a model that leverages information from changesets to recommend the most suitable reviewers. The model takes into consideration the paths of modified files and the context derived from the changesets, including their titles and descriptions. Additionally, CCB-RR employs KeyBERT to extract the most relevant keywords and compare the semantic similarity across changesets. The model integrates the paths of modified files, keyword information, and the context of code changes to form a comprehensive picture of the changeset. We conducted extensive experiments on four open-source projects, demonstrating the effectiveness of CCB-RR. The model achieved a Top-1 accuracy of 60%, 55%, 51%, and 45% on the Android, OpenStack, QT, and LibreOffice projects respectively. For Mean Reciprocal Rank (MRR), CCB achieved 71%, 62%, 52%, and 68% on the same projects respectively, thereby highlighting its potential for practical application in code reviewer recommendation.
Wireless Sensor Networks(WSNs)are one of the best technologies of the 21st century and have seen tremendous growth over the past *** work has been put into its development in various aspects such as architectural atte...
详细信息
Wireless Sensor Networks(WSNs)are one of the best technologies of the 21st century and have seen tremendous growth over the past *** work has been put into its development in various aspects such as architectural attention,routing protocols,location exploration,time exploration,*** research aims to optimize routing protocols and address the challenges arising from conflicting objectives in WSN environments,such as balancing energy consumption,ensuring routing reliability,distributing network load,and selecting the shortest *** optimization techniques have shown success in achieving one or two objectives but struggle to achieve the right balance between multiple conflicting *** address this gap,this paper proposes an innovative approach that integrates Particle Swarm Optimization(PSO)with a fuzzy multi-objective *** proposed method uses fuzzy logic to effectively control multiple competing objectives to represent its major development beyond existing methods that only deal with one or two *** search efficiency is improved by particle swarm optimization(PSO)which overcomes the large computational requirements that serve as a major drawback of existing *** PSO algorithm is adapted for WSNs to optimize routing paths based on fuzzy multi-objective *** fuzzy logic framework uses predefined membership functions and rule-based reasoning to adjust routing *** adjustments influence PSO’s velocity updates,ensuring continuous adaptation under varying network *** proposed multi-objective PSO-fuzzy model is evaluated using NS-3 *** results show that the proposed model is capable of improving the network lifetime by 15.2%–22.4%,increasing the stabilization time by 18.7%–25.5%,and increasing the residual energy by 8.9%–16.2% compared to the state-of-the-art *** proposed model also achieves a 15%–24% reduction in load variance,demonstrating balanced routing and extended net
Artificial Intelligence (AI) is a transformative technology that can embed intelligence and human-like behavior into systems and devices. To develop smart, intelligent, and automated systems that address current needs...
详细信息
In this work, VoteDroid a novel fine-tuned deep learning models-based ensemble voting classifier has been proposed for detecting malicious behavior in Android applications. To this end, we proposed adopting the random...
详细信息
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results...
详细信息
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results to mislead the fusion center on channel availability decisions. By using traditional voting rule, the cooperative spectrum sensing performance deteriorates significantly due to incorrect local sensing results. Then, reliability weight strategy becomes the popular solution to avoid incorrect sensing results from BAs and unreliable cognitive radio users (CRUs). However, it is very difficult to detect the attackers since they also occasionally provide correct sensing results to the fusion center for concealing the attack objective. Based on existing techniques, the BAs and CRUs may be assigned with low reliability weights or distinguished from the data fusion account. However, it is very difficult to detect the attackers since they also occasionally provide correct sensing results to the fusion center for concealing the attack objective. Then, existing techniques still suffer from BAs and negative impact of unreliable CRUs. In this paper, we propose the adaptive cooperative quality weight algorithm for mitigating the Byzantine attack issue by distinguishing the BAs and CRUs from the data fusion account while selecting only useful CRUs since the number of members in the account is also the important factor for cooperative spectrum sensing. In our proposed algorithm, we adopt a stable preference ordering towards ideal solution (SPOTIS) for determining the reliability of SUs which shows low computational complexity as compared to other reliability weight-based techniques. To achieve high sensing performance, our global decision threshold is adapted according to the reliability of reliable users. From the simulation results, our proposed algorithm significantly improves global detection probability and total error probability compared to the traditional votin
Demand forecasting has emerged as a crucial element in supply chain management. It is essential to identify anomalous data and continuously improve the forecasting model with new data. However, existing literature fai...
详细信息
An image can convey a thousand words. This statement emphasizes the importance of illustrating ideas visually rather than writing them down. Although detailed image representation is typically instructive, there are s...
详细信息
暂无评论