Accessing information because of language barriers has grown more crucial as globalization accelerates. The field of study called machine transliteration transforms words from one language to another while preserving ...
详细信息
Accessing information because of language barriers has grown more crucial as globalization accelerates. The field of study called machine transliteration transforms words from one language to another while preserving their phonetic properties. With the rise of the Internet and the rapid expansion of online data, Information Retrieval (IR) has become a more significant field. Foreign terms are increasingly being incorporated into languages due to the development of new technologies and the flood of information available online. This generally indudes changing the adopted word's orthographical form as well as its original pronunciation to match the phonological norms of the target language. Transliteration describes this phonetic “translation” of a foreign language. Machine translation and cross-language information retrieval both benefit from transliteration. Ambiguity, variability, and out-of-vocabulary (OOV) words are a few of the crucial challenges that transliteration systems must deal with. This paper represents the transliteration models of the last decade used for transliteration-related research carried out by researchers.
Inheritance, a fundamental aspect of object-oriented design, has been leveraged to enhance code reuse and facilitate efficient software development. However, alongside its benefits, inheritance can introduce tight cou...
详细信息
ISBN:
(数字)9798400702174
ISBN:
(纸本)9798350382143
Inheritance, a fundamental aspect of object-oriented design, has been leveraged to enhance code reuse and facilitate efficient software development. However, alongside its benefits, inheritance can introduce tight coupling and complex relationships between classes, posing challenges for software maintenance. Although there are many studies on inheritance in source code, there is limited study on using inheritance in test code. In this paper, we take the first step by studying inheritance in test code, with a focus on redundant test executions caused by inherited test cases. We empirically study the prevalence of test inheritance and its characteristics. We also propose a hybrid approach that combines static and dynamic analysis to identify and locate inheritance-induced redundant test cases. Our findings reveal that (1) inheritance is widely utilized in the test code, (2) inheritance-induced redundant test executions are prevalent, accounting for 13% of all execution test cases, (3) bypassing these redundancies can help reduce 14% of the test execution time, and finally, (4) our study highlights the need for careful refactoring decisions to minimize redundant test cases and identifies the need for further research on test code quality.
Wildlife ReID involves utilizing visual technology to identify specific individuals of wild animals in different scenarios, holding significant importance for wildlife conservation, ecological research, and environmen...
详细信息
With the advancement of artificial intelligence technology, intelligent applications have permeated all aspects of human life, including automatic driving, intelligent security, and face recognition. Convolutional neu...
详细信息
ISBN:
(数字)9798350387384
ISBN:
(纸本)9798350387391
With the advancement of artificial intelligence technology, intelligent applications have permeated all aspects of human life, including automatic driving, intelligent security, and face recognition. Convolutional neural networks (CNNs) are essential models for AI, but their complexity increases with more available data. The complex models are unsuitable for edge devices like wearables and smartphones due to high memory and computational requirements. In this paper, the compact model is achieved by pruning some redundant output channels. To effectively measure the validity of the output channels, this paper proposes a channel pruning algorithm based on gradient integration, which combines the gradient of the channel with the model output and the channel’s values. This pruning could destroy model accuracy, so knowledge distillation is introduced during fine-tuning to leverage the original model’s reasoning ability. Experiments show that our approach improves accuracy by 0.51% while reducing parameters by 30.1% and FLOPs by 26% in the VGG16 model.
Antiferromagnetic materials (AFMs), which have zero-stray field and the THz-range magnetic resonance frequency, are promising candidates for the next-generation magnetic memory technology. Here, we report an electrica...
详细信息
A coalition of IoT devices, such as the smart houses, smart health care system, the smart device and many more, can share resources through communication lines. The Internet is integrated with the physical world over ...
详细信息
In recent years, the use of CCTV footage for proactive crime prevention has surged, particularly in public places like airports, train stations, and malls. However, the efficacy of these surveillance systems becomes q...
In recent years, the use of CCTV footage for proactive crime prevention has surged, particularly in public places like airports, train stations, and malls. However, the efficacy of these surveillance systems becomes questionable for their substantial reliance on human resources which may lead to erroneous or delayed responses. This research takes a comprehensive approach for violence detection which was previously limited to binary classification, by categorizing violence into four distinct classes: abuse, arson, assault, and fight. It employs transfer learning combined with computer vision techniques for violence detection and classification in video footages. The study compares the performance of four pre-trained neural networks, namely DenseNet121, VGG16, MobileNet, and Xception. The dataset created for this research is compiled from three datasets available on Kaggle. The results reveal that the Xception model performed comparatively better achieving the highest AUC score of 98.39%, while the VGG16 model attained the lowest AUC score of 96%. In addition to the AUC score, precision, recall, and fl-score are employed as performance metrics. Transfer learning with convolutional neural networks (CNN) significantly reduced computational requirements and time. Automating the detection and categorization of violent behavior through the employed approach has the potential to reduce the risk of fatalities and injuries in public areas. It also improves the speed and accuracy of threat detection, enabling swift preventive actions by authorities.
While Terraform has gained popularity to implement the practice of infrastructure as code (IaC), there is a lack of characterization of static analysis for Terraform manifests. Such lack of characterization hinders pr...
While Terraform has gained popularity to implement the practice of infrastructure as code (IaC), there is a lack of characterization of static analysis for Terraform manifests. Such lack of characterization hinders practitioners to assess how to use static analysis for their Terraform development process, as it happened for Company A, an organization who uses Terraform to create automated software deployment pipelines. In this experience report, we have investigated 491 static analysis alerts that occur for 10 open source and one proprietary Terraform repositories. From our analysis we observe: (i) 10 categories of static analysis alerts to appear for Terraform manifests, of which five are related to security, (ii) Terraform resources with dependencies to have more static analysis alerts than that of resources with no dependencies, and (iii) practitioner perceptions to vary from one alert category to another while deciding on taking actions for reported alerts. We conclude our paper by providing a list of lessons for practitioners and toolsmiths on how to improve static analysis for Terraform manifests.
Distributed learning is commonly applied for the high demands of computation resources while training models with large-scale data. However, existing solutions revealed that it may lead to information leakage of priva...
详细信息
This research proposes an IoT based technique for predicting rainfall forecast in coastal regions using a deep reinforcement learning model. The proposed technique utilizes Long Short-Term Memory (LSTM) networks to ca...
详细信息
暂无评论