X-ray security inspection for detecting prohibited items is widely used to maintain social order and ensure the safety of people’s lives and property. Due to the large number of parameters and high computational comp...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in softwareengineering,and iTrust Electronic Health Care System.
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
Hypernym detection and discovery are fundamental tasks in natural language *** former task aims to identify all possible hypernyms of a given hyponym term,whereas the latter attempts to determine whether the given two...
详细信息
Hypernym detection and discovery are fundamental tasks in natural language *** former task aims to identify all possible hypernyms of a given hyponym term,whereas the latter attempts to determine whether the given two terms hold a hypernymy relation or *** research on hypernym detection and discovery tasks projects a term into various semantic spaces with single mapping *** their success,these methods may not be adequate in capturing complex semantic relevance between hyponym/hypernymy pairs in two ***,they may fall short in modeling the hierarchical structure in the hypernymy relations,which may help them learn better term ***,the polysemy phenomenon that hypernyms may express distinct senses is *** this paper,we propose a Multi-Projection Recurrent model(MPR)to simultaneously capture the hierarchical relationships between terms and deal with diverse senses caused by the polysemy ***,we build a multi-projection mapping block to deal with the polysemy phenomenon,which learns various word senses by multiple ***,we adopt a hierarchy-aware recurrent block with the recurrent operation followed by a multi-hop aggregation module to capture the hierarchical structure of hypernym *** on 11 benchmark datasets in various task settings illustrate that our multi-projection recurrent model outperforms the *** experimental analysis and case study demonstrate that our multi-projection module and the recurrent structure are effective for hypernym detection and discovery tasks.
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural languag...
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural language processing tasks,but also captured widespread attention from the public due to their great potential in a variety of real-world applications (***,search engines,writing assistants,etc.)through providing general-purpose intelligent services.A few of the LLMs are becoming foundation models,an analogy to infrastructure,that empower hundreds of downstream applications.
The distribution of data has a significant impact on the results of *** the distribution of one class is insignificant compared to the distribution of another class,data imbalance *** will result in rising outlier val...
详细信息
The distribution of data has a significant impact on the results of *** the distribution of one class is insignificant compared to the distribution of another class,data imbalance *** will result in rising outlier values and ***,the speed and performance of classification could be greatly *** the above problems,this paper starts with the motivation and mathematical representing of classification,puts forward a new classification method based on the relationship between different classification *** with the vector characteristics of the actual problem and the choice of matrix characteristics,we firstly analyze the orderly regression to introduce slack variables to solve the constraint problem of the lone *** we introduce the fuzzy factors to solve the problem of the gap between the isolated points on the basis of the support vector *** introduce the cost control to solve the problem of sample ***,based on the bi-boundary support vector machine,a twostep weight setting twin classifier is *** can help to identify multitasks with feature-selected patterns without the need for additional optimizers,which solves the problem of large-scale classification that can’t deal effectively with the very low category distribution gap.
This study introduces CLIP-Flow,a novel network for generating images from a given image or *** effectively utilize the rich semantics contained in both modalities,we designed a semantics-guided methodology for image-...
详细信息
This study introduces CLIP-Flow,a novel network for generating images from a given image or *** effectively utilize the rich semantics contained in both modalities,we designed a semantics-guided methodology for image-and text-to-image *** particular,we adopted Contrastive Language-Image Pretraining(CLIP)as an encoder to extract semantics and StyleGAN as a decoder to generate images from such ***,to bridge the embedding space of CLIP and latent space of StyleGAN,real NVP is employed and modified with activation normalization and invertible *** the images and text in CLIP share the same representation space,text prompts can be fed directly into CLIP-Flow to achieve text-to-image *** conducted extensive experiments on several datasets to validate the effectiveness of the proposed image-to-image synthesis *** addition,we tested on the public dataset Multi-Modal CelebA-HQ,for text-to-image *** validated that our approach can generate high-quality text-matching images,and is comparable with state-of-the-art methods,both qualitatively and quantitatively.
Anomaly detection of sensor data is crucial to ensure the stability and effectiveness of IoT system. The task requires high accuracy and low latency, which makes distributed anomaly detection gradually become a resear...
详细信息
Demand response has recently become an essential means for businesses to reduce production costs in industrial ***,the current industrial chain structure has also become increasingly complex,forming new characteristic...
详细信息
Demand response has recently become an essential means for businesses to reduce production costs in industrial ***,the current industrial chain structure has also become increasingly complex,forming new characteristics of multiplex networked industrial *** in real-time electricity prices in demand response propagate through the coupling and cascading relationships within and among these network layers,resulting in negative impacts on the overall energy management ***,existing demand response methods based on reinforcement learning typically focus only on individual agents without considering the influence of dynamic factors on intra and inter-network *** paper proposes a Layered Temporal Spatial Graph Attention(LTSGA)reinforcement learning algorithm suitable for demand response in multiplex networked industrial chains to address this *** algorithm first uses Long Short-Term Memory(LSTM)to learn the dynamic temporal characteristics of electricity prices for ***,LTSGA incorporates a layered spatial graph attention model to evaluate the impact of dynamic factors on the complex multiplex networked industrial chain *** demonstrate that the proposed LTSGA approach effectively characterizes the influence of dynamic factors on intra-and inter-network relationships within the multiplex industrial chain,enhancing convergence speed and algorithm performance compared with existing state-of-the-art algorithms.
The current urban intelligent transportation is in a rapid development stage, and coherence control of vehicle formations has important implications in urban intelligent transportation research. This article focuses o...
详细信息
暂无评论