Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syntax,it is hard for the developers to write correctly due to lacking knowledge of the mathematical foundations of the first-order logic,which is approximately half accurate at the first stage of devel-opment.A deep neural network named DeepOCL is proposed,which takes the unre-stricted natural language as inputs and automatically outputs the best-scored OCL candidates without requiring a domain conceptual model that is compulsively required in existing rule-based generation *** demonstrate the validity of our proposed approach,ablation experiments were conducted on a new sentence-aligned dataset named *** experiments show that the proposed DeepOCL can achieve state of the art for OCL statement generation,scored 74.30 on BLEU,and greatly outperformed experienced developers by 35.19%.The proposed approach is the first deep learning approach to generate the OCL expression from the natural *** can be further developed as a CASE tool for the software industry.
Skeleton-based action recognition is a crucial task in computer vision, aiming to perform pattern recognition on a skeleton sequence to identify the actions represented by the skeleton's semantics. However, curren...
详细信息
Depth model-based behavior estimation of human skeletal points is widely used in the field of behavior recognition. In order to improve the accuracy of behavior recognition, the complexity and computation of the desig...
详细信息
Emotion classification has wide applications in education, robotics, virtual reality, etc. However, identifying subtle differences between fine-grained emotion categories remains challenging. Current methods typically...
详细信息
Medical image anomaly detection refers to machine learning techniques to analyze and identify lesions and abnormalities in them. However, in medical images, anomaly samples are usually sparse, which can lead to superv...
详细信息
To accurately predict traffic flow, it is necessary to take into account not only the volume of road traffic, but also external urban factors. Particularly, the correlations between urban air quality and traffic flow ...
详细信息
Computed Tomography (CT) is a high-precision medical imaging technique that utilizes X-rays and computer reconstruction to provide detailed three-dimensional images of human anatomy. It is used for clinical diagnosis ...
详细信息
This paper explores a way of deploying the classical algorithm named genetic algorithm(GA) with the memristor. The memristor is a type of circuit device with both characteristics of storage and computing, which provid...
详细信息
This paper explores a way of deploying the classical algorithm named genetic algorithm(GA) with the memristor. The memristor is a type of circuit device with both characteristics of storage and computing, which provides the similarity between electronic devices and biological components, such as neurons, and the structure of the memristor-based array is similar to that of chromosomes in genetics. Besides, it provides the similarity to the image gray-value matrix that can be applied to image restoration with GA. Thus, memristor-based GA is proposed and the experiment about image restoration using memristor-based GA is carried out in this paper. And parameters,such as the size of initial population and the number of iterations, are also set different values in the experiment,which demonstrates the feasibility of implementing GA with memristors.
With the popularity of speech and speaker recognition systems in recent years, voice interfaces are increasingly integrated into various Internet of Things (IoT) devices. However, studies have demonstrated that such s...
详细信息
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c...
详细信息
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current content-based retrieval schemes do not contain enough semantic information of the article and cannot fully reflect the semantic information of the *** this paper,we propose two secure and semantic retrieval schemes based on BERT(bidirectional encoder representations from transformers)named SSRB-1,*** training the documents with BERT,the keyword vector is generated to contain more semantic information of the documents,which improves the accuracy of retrieval and makes the retrieval result more consistent with the user’s ***,through testing on real data sets,it is shown that both of our solutions are feasible and effective.
暂无评论