Recently, Rumor Spreading over Online Social Media is found as one of the serious issue, which causes severe damage to society, organization and individuals. To control the rumor spread, rumor detection is found as on...
详细信息
Preserving formal style in neural machine translation (NMT) is essential, yet often overlooked as an optimization objective of the training processes. This oversight can lead to translations that, though accurate, lac...
详细信息
Preserving formal style in neural machine translation (NMT) is essential, yet often overlooked as an optimization objective of the training processes. This oversight can lead to translations that, though accurate, lack formality. In this paper, we propose how to improve NMT formality with large language models (LLMs), which combines the style transfer and evaluation capabilities of an LLM and the high-quality translation generation ability of NMT models to improve NMT formality. The proposed method (namely INMTF) encompasses two approaches. The first involves a revision approach using an LLM to revise the NMT-generated translation, ensuring a formal translation style. The second approach employs an LLM as a reward model for scoring translation formality, and then uses reinforcement learning algorithms to fine-tune the NMT model to maximize the reward score, thereby enhancing the formality of the generated translations. Considering the substantial parameter size of LLMs, we also explore methods to reduce the computational cost of INMTF. Experimental results demonstrate that INMTF significantly outperforms baselines in terms of translation formality and translation quality, with an improvement of +9.19 style accuracy points in the German-to-English task and +2.16 COMET score in the Russian-to-English task. Furthermore, our work demonstrates the potential of integrating LLMs within NMT frameworks to bridge the gap between NMT outputs and the formality required in various real-world translation scenarios.
INTRODUCTION: Cloud computing, a still emerging technology, allows customers to pay for services based on usage. It provides internet-based services, whilst virtualization optimizes a PC’s available resources. OBJECT...
详细信息
Background & Need: The early detection of thoracic diseases and COVID-19 (coronavirus disease) significantly limits propagation and increases therapeutic outcomes. This article focuses on swiftly distinguishi...
详细信息
Background & Need: The early detection of thoracic diseases and COVID-19 (coronavirus disease) significantly limits propagation and increases therapeutic outcomes. This article focuses on swiftly distinguishing COVID-19 patients with 10 chronic thoracic illnesses from healthy examples. The death rates of COVID-19-confirmed patients are rising due to chronic thoracic illnesses. Method: To identify thoracic illnesses (Consolidation, Tuberculosis, Edema, Fibrosis, Hernia, Mass, Nodule, Plural-thickening, Pneumonia, Healthy) from X-ray images with COVID-19, we provide an ensemble-feature-fusion (FFT) deep learning (DL) model. 14,400 chest X-ray images (CXRI) of COVID-19 and other thoracic illnesses were obtained from five public sources and applied UNet-based data augmentation. High-quality images were intended to be provided under the CXR standard. To provide model parameters and feature extractors, four deep convolutional neural networks (CNNs) with a proprietary CapsNet as the backbone were employed. To generate the ensemble-fusion classifiers, we suggested five additional USweA (Unified Stacking weighted Averaging)-based comparative ensemble models as an alternative to depending solely on the findings of the single base model. Additionally, USweA enhanced the models' performance and reduced the base error-rate. USweA models were knowledgeable of the principles of multiple DL evaluations on distinct labels. Results: The results demonstrated that the feature-fusion strategy performed better than the standalone DL models in terms of overall classification effectiveness. According to study results, Thoracic-Net significantly improves COVID-19 context recognition for thoracic infections. It achieves superior results to existing CNNs, with a 99.75% accuracy, 97.89% precision, 98.69% recall, 98.27% F1-score, shallow 28 CXR zero-one loss, 99.27% ROC-AUC-score, 1.45% error rate, 0.9838 MCC, (0.98001, 0.99076) 95% CI, and 5.708 s to test individual CXR. This suggested USweA m
Handwritten documents generated in our day-to-day office work, class room and other sectors of society carry vital information. Automatic processing of these documents is a pipeline of many challenging steps. The very...
详细信息
Device-to-Device (D2D) relaying helps improve the coverage range and throughput of the millimeter Wave (mmWave) networks. This work focuses on improving the uplink throughput in a single-cell mmWave-based Internet-of-...
详细信息
The concern of brain stroke increases rapidly in young age groups daily. The leading causes of death from stroke globally will rise to 6.7 million yearly if untreated and undetected by early estimates by WHO in a rece...
详细信息
The surrounding environmental and climatic conditions have a significant impact on the utilisation of ecosystem services for recreational purposes. Climate change poses a threat to future natural leisure opportunities...
详细信息
In the growing information retrieval (IR) world, selecting suitable keywords and generating queries is important for effective retrieval. Modern database applications need a sophisticated interface for automatically u...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based Data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
暂无评论