1 Introduction Graphical User Interface(GUI)widgets classification entails classifying widgets into their appropriate domain-specific types(e.g.,CheckBox and EditText)[1,2].The widgets classification is essential as i...
详细信息
1 Introduction Graphical User Interface(GUI)widgets classification entails classifying widgets into their appropriate domain-specific types(e.g.,CheckBox and EditText)[1,2].The widgets classification is essential as it supports several software engineering tasks,such as GUI design and testing[1,3].The ability to obtain better widget classification performance has become one of the keys to the success of these *** in recent years have proposed many techniques for improving widget classification performance[1,2,4].For example,Moran et al.[1]proposed a deep learning technique to classify GUI widgets into their domain-specific *** authors used the deep learning algorithm,a Convolutional Neural Network(CNN)architecture,to classify the GUI *** et al.[2]proposed combining text-based and non-text-based models to improve the overall performance of GUI widget detection while classifying the widgets with the ResNet50 model.
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in *** addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive *** this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass *** paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based ***,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts.
Vision-based depression estimation is an emerging yet impactful task, whose challenge lies in predicting the severity of depression from facial videos lasting at least several minutes. Existing methods primarily focus...
详细信息
JPEG reversible data hiding (RDH) refers to covert communication technology to accurately extract secret data while also perfectly recovering the original JPEG image. With the development of cloud services, a large nu...
详细信息
Traffic conflict techniques rely heavily on the proper identification of conflict extremes,which directly affects the prediction performance of extreme value *** sampling techniques,namely,block maxima and peak over t...
详细信息
Traffic conflict techniques rely heavily on the proper identification of conflict extremes,which directly affects the prediction performance of extreme value *** sampling techniques,namely,block maxima and peak over threshold,form the core of these *** studies have demonstrated the inefficacy of extreme value models based on these sampling approaches,as their crash estimates are too imprecise,hindering their widespread practical ***,anomaly detection techniques for sampling conflict extremes have been used,but their application has been limited to estimating crash frequency without considering the crash severity *** address this research gap,this study proposes a hybrid model of machine learning and extreme value theory within a bivariate framework of traffic conflict measures to estimate crash frequency by severity *** particular,modified time-to-collision(MTTC)and expected post-collision change in velocity(Delta-V orΔV)have been proposed in the hybrid modeling framework to estimate rear-end crash frequency by severity ***-end conflicts were identified through artificial intelligence-based video analytics for three four-legged signalized intersections in Brisbane,Australia,using four days of ***-stationary bivariate hybrid generalized extreme value models with different anomaly detection/sampling techniques(isolation forest and minimum covariance determinant)were *** non-stationarity of traffic conflict extremes was handled by parameterizing model parameters,including location,scale,and both location and scale parameters *** results indicate that the bivariate hybrid models can estimate severe and non-severe crashes when compared with historical crash records,thereby demonstrating the viability of the proposed approach.A comparative analysis of two anomaly techniques reveals that the isolation forest model marginally outperforms the minimum covariance determinant ***,the modeling f
Resource management, security, and privacy stand as fundamental pillars for the reliable and secure operation of efficient semantic communications (SC) system. By addressing these aspects, SC system can pave the way f...
详细信息
In this paper, a compact and highly isolated ultra-wideband (UWB) four-port multiple-input-multiple-output (MIMO) antenna design is proposed, employing coplanar waveguide (CPW) feeding technology. The antenna system i...
详细信息
Existing few-shot medical image segmentation (FSMIS) models fail to address a practical issue in medical imaging: the domain shift caused by different imaging techniques, which limits the applicability to current FSMI...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
Spatial-temporal graph modeling is challenging due to the diverse node interactions across spatial and temporal dimensions. Recent studies typically adopt Graph Neural Networks (GNNs) to perform node-level aggregation...
详细信息
暂无评论