Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol...
详细信息
Most of the existing work about fairness verification was carried out by checking the fairness based on state, action, or process respectively. It is hard to resolve the fairness issue for complex software systems, es...
详细信息
Most of the existing work about fairness verification was carried out by checking the fairness based on state, action, or process respectively. It is hard to resolve the fairness issue for complex software systems, especially in life-critical systems and safety-critical systems. In this paper, we verify the fairness based on both state and action, which is realized mainly by introducing an extended Kripke structure and four kinds of fairness (weak global/local fairness and strong global/local fairness). The experimental results show the superiority of our method by the savings in memory (2.08%) and time consumption (26.45%).
In this paper, we propose a contact-free wheat moisture monitoring system, termed Wi-Wheat+, to address the several limitations of the existing grain moisture detection technologies, such as time-consuming process, ex...
详细信息
Refactoring plays a critical role in enhancing the quality of software systems, enabling them to accommodate growing user bases, feature sets, and performance demands. Software reusability is an essential aspect of so...
详细信息
ISBN:
(数字)9798350354133
ISBN:
(纸本)9798350354140
Refactoring plays a critical role in enhancing the quality of software systems, enabling them to accommodate growing user bases, feature sets, and performance demands. Software reusability is an essential aspect of software quality. It is crucial in modern software development as it offers several benefits, including increased productivity, improved code quality, and cost-effectiveness. However, there is a lack of studies investigating how specific refactoring techniques affect reusability. Therefore, this study aims to explore the effects of code refactoring on software reusability. This study was conducted in four stages: selecting refactoring techniques, selecting a large dataset, selecting software metrics to measure the reusability, and applying the refactoring techniques. The five most common refactoring techniques (Extract Interface, Encapsulate Field, Extract Class, Inline Class, and Inline Method) used in practices were selected and applied in the jEdit dataset. The refactoring techniques were carried out 338 times through five experiments in the jEdit dataset. The finding reveals that Extract Interface, Encapsulate Field, and Extract Class significantly improve the code reusability while Inline Class and Inline Method impair it. Developers and software architects can use this knowledge to make well-informed judgments about refactoring techniques and develop more robust and reusable software systems.
Knowledge tracing has been widely used in online learning systems to guide the students' future learning. However, most existing KT models primarily focus on extracting abundant information from the question sets ...
详细信息
Existing person re-identification methods have achieved remarkable advances in appearance-based identity association across homogeneous cameras, such as ground-ground matching. However, as a more practical scenario, a...
详细信息
Federated Graph Learning (FGL) has garnered widespread attention by enabling collaborative training on multiple clients for semi-supervised classification tasks. However, most existing FGL studies do not well consider...
详细信息
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR...
详细信息
To address the privacy risks associated with intelligent voice assistants, this paper proposes a non-interactive, end-to-end keyword spotting scheme in the encrypted domain. The scheme introduces an innovative complex...
详细信息
ISBN:
(数字)9798350355413
ISBN:
(纸本)9798350355420
To address the privacy risks associated with intelligent voice assistants, this paper proposes a non-interactive, end-to-end keyword spotting scheme in the encrypted domain. The scheme introduces an innovative complex-valued residual neural network (CR-NN) and leverages low-degree polynomial approximations to enable encrypted computation of complex activation functions. By supporting single instruction multiple data (SIMD) operations, the scheme significantly enhances computational efficiency while reducing ciphertext size. Experimental results demonstrate that the proposed method outperforms existing approaches across multiple performance metrics, balancing efficient keyword spotting with robust privacy protection and offering new insights for the application of deep learning in the encrypted domain.
In recent years, Variational AutoEncoder (VAE) based methods have made many important achievements in the field of collaborative filtering recommendation system. VAE is a kind of Bayesian model which combines latent v...
详细信息
暂无评论