Eyes-free input is desirable for ubiquitous computing, since interacting with mobile and wearable devices often competes for visual attention with other devices and tasks. In this paper, we explore eyes-free typing on...
详细信息
Melanoma is the most harmful form of skin cancer and they emerge from melanocytes, a type of pigment-producing cells. Melanomas usually occur on the skin;they mostly form around the back for men, whereas the common pl...
详细信息
The software development process mostly depends on accurately identifying both essential and optional ***,user needs are typically expressed in free-form language,requiring significant time and human resources to tran...
详细信息
The software development process mostly depends on accurately identifying both essential and optional ***,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional *** address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human ***,existing techniques often struggle with complex instructions and large-scale *** our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer *** results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT *** datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse *** findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes. We show that their notion of quiescence as a necessary and sufficient con...
详细信息
Scene classification is a fundamental challenge in computer vision. Recognizing the complexity of this task is the aim of our study that addresses the need for accurate and robust scene classification by leveraging th...
详细信息
Scene classification is a fundamental challenge in computer vision. Recognizing the complexity of this task is the aim of our study that addresses the need for accurate and robust scene classification by leveraging the capabilities of two widely recognized databases. The motivation behind this research lies in enhancing the accuracy and efficiency of scene classification systems. Therefore, our primary goal is to explore and implement a comprehensive methodology that combines transfer learning and automated machine learning techniques to achieve superior classification results. Our approach commences with a meticulous data loading process, followed by preprocessing steps to ensure the optimal representation of information. We have conducted class distribution analysis to understand the dataset's nuances. Subsequently, we have employed two key models: MobileNetV2 for transfer learning and a custom convolutional neural network (CNN) model featuring batch normalization. This diverse methodology aims to capture intricate patterns within the data. An innovative step of our approach involves employing Tree-based Pipeline Optimization Tool (TPOT), an automated machine learning tool, for model selection and hyperparameter tuning. The results underscore the effectiveness of our methodology, achieving impressive classification accuracy across diverse scenes. This research contributes valuable insights into the integration of transfer learning and automated machine learning for robust and accurate scene recognition, offering a comprehensive approach to address the complexities of scene classification.
TCAM is widely used for rule tables in network switches. An efficient update scheme, which requires as few rule moves as possible, is often time-consuming to compute, while the fast computation likely yields a mediocr...
详细信息
In the present study, implementation and study of aircraft altitude estimation using un-calibrated onboard camera is obtained. A camera model has been implemented to simulate the test data. From the results, it was ob...
详细信息
Image and video forgery using cutting-edge deep learning techniques has become one of the major issues in the social networking era. Media manipulation in which one person's face is swapped out for another's o...
详细信息
Distributed denial of service (DDoS) attack is one of the prominent risk factors for the development of cloud service. It is a very hard task for novice cloud users to identify the real source of DDoS attack because t...
详细信息
暂无评论