-
881
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
882
A seed-epidermis-feature-recognition-based lightweight peanut seed selection method for embedded systems
Published 2025-08-01“…The transfer learning method was used to use four pre-trained models, EfficientNet_b0, EfficientNetv2-b0, MobileNet_v2_35_224, and NasNet_Mobile, as feature extraction layers, the input layer was added before the feature extraction layer, and the dropout and dense layers were added after the feature extraction layer to construct a classifier. …”
Get full text
Article -
883
Modern architectures convolutional neural networks in human activity recognition
Published 2022-06-01“…Convolutional networks indeed derive more relevant and complex features with every additional layer. …”
Get full text
Article -
884
Analysis of Cardiac Arrhythmias Based on ResNet-ICBAM-2DCNN Dual-Channel Feature Fusion
Published 2025-01-01“…Subsequently, in the primary channel, region of interest features are emphasized using a ResNet-ICBAM network model for feature extraction. …”
Get full text
Article -
885
A Lightweight Network with Domain Adaptation for Motor Imagery Recognition
Published 2024-12-01“…This paper proposes an innovative method that combines a lightweight convolutional neural network (CNN) with domain adaptation. A lightweight feature extraction module is designed to extract key features from both the source and target domains, effectively reducing the model’s parameters and improving the real-time performance and computational efficiency. …”
Get full text
Article -
886
SECNN: Squeeze-and-Excitation Convolutional Neural Network for Sentence Classification
Published 2025-01-01“…Convolutional Neural Networks (CNNs) have gained prominence in this domain due to their capacity to extract n-gram features through parallel convolutional filters, effectively capturing local lexical correlations. …”
Get full text
Article -
887
A novel hybrid convolutional and transformer network for lymphoma classification
Published 2025-07-01“…A Feature Fusion and Enhancement Module (FFEM) is introduced to dynamically integrate features from both pathways. …”
Get full text
Article -
888
Advancing student outcome predictions through generative adversarial networks
Published 2024-12-01“…The ‘Math dataset’ has 395 observations and 33 features, whereas the ‘Exam dataset’ has 1000 observations and 8 features. …”
Get full text
Article -
889
Interaction based on method for spam detection in online social networks
Published 2015-07-01“…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
Get full text
Article -
890
Automated essay scoring with SBERT embeddings and LSTM-Attention networks
Published 2025-02-01“…Automated essay scoring (AES) is essential in the field of educational technology, providing rapid and accurate evaluations of student writing. This study presents an innovative AES method that integrates Sentence-BERT (SBERT) with Long Short-Term Memory (LSTM) networks and attention mechanisms to improve the scoring process. …”
Get full text
Article -
891
Prediction of Banks Efficiency Using Feature Selection Method: Comparison between Selected Machine Learning Models
Published 2022-01-01“…Subsequently, 4 prediction models (i.e., SVM, CHAID, linear regression, and a neural network) were developed to choose the best fit. The performance metrics have also been evaluated. …”
Get full text
Article -
892
Improving deep convolutional neural networks with mixed maxout units
Published 2017-07-01“…The maxout units have the problem of not delivering non-max features, resulting in the insufficient of pooling operation over a subspace that is composed of several linear feature mappings,when they are applied in deep convolutional neural networks.The mixed maxout (mixout) units were proposed to deal with this constrain.Firstly,the exponential probability of the feature mappings getting from different linear transformations was computed.Then,the averaging of a subspace of different feature mappings by the exponential probability was computed.Finally,the output was randomly sampled from the max feature and the mean value by the Bernoulli distribution,leading to the better utilizing of model averaging ability of dropout.The simple models and network in network models was built to evaluate the performance of mixout units.The results show that mixout units based models have better performance.…”
Get full text
Article -
893
Enhancing ECG disease detection accuracy through deep learning models and P-QRS-T waveform features.
Published 2025-01-01“…The R-peaks of the clean signal were used to detect the subsequent morphological features, i.e., P-QRS-T intervals and amplitudes. The feature set was balanced using the Synthetic Minority Oversampling Technique for Nominal and Continuous (SMOTE-NC) and fed into Convolutional Neural Network (CNN) and Deep Neural Network (DNN) with 5-fold cross-validation. …”
Get full text
Article -
894
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01“…Aiming at the problem of image privacy leakage and computing efficiency in edge environment,a lightweight and secure region proposal network (SecRPN) was proposed.A series of secure computing protocols were designed based on the additive secret sharing scheme.Two non-collusive edge servers cooperate to perform calculation modules such as secure feature processing,secure anchor transformation,secure bounding-box correction,and secure non-maximum suppression.Theoretical analysis guarantees the correctness and security of SecRPN.The actual performance evaluation shows that SecRPN is outstanding in the computational cost and communication overhead compared with the existing works.…”
Get full text
Article -
895
An Energy-Efficient Broadcast MAC Protocol for Hybrid Vehicular Networks
Published 2013-03-01“…Then, we show our protocol's performance evaluation using ns-2.…”
Get full text
Article -
896
Hybrid Macroprogramming Wireless Networks of Embedded Systems with Declarative Naming
Published 2012-09-01“…DRN provides programming simplicity, expressiveness, tunability, on-the-fly reprogrammability, and in-network data aggregation for energy savings. None of existing macroprogramming paradigms supports all of the mentioned features. …”
Get full text
Article -
897
Bipolar disorder at mixed states and major depressive disorder with mixed features differ in peripheral biochemical parameters
Published 2025-04-01“…Network analysis and Principal Component Analysis (PCA) was also performed to investigate the relationships among these parameters. …”
Get full text
Article -
898
A novel early stage drip irrigation system cost estimation model based on management and environmental variables
Published 2025-02-01“…The two LCA and FOA algorithms produced the best estimation, according to the evaluation criteria results. Their RMSE for all features was 0.0020 and 0.0018, respectively, and their R2 was 0.94 and 0.94. …”
Get full text
Article -
899
Hyperspectral target detection based on graph sampling and aggregation network.
Published 2025-01-01“…Upon reconstructing the image, the target data is extracted using residuals, and target detection is accomplished by minimizing the constraint energy. The model was evaluated on seven hyperspectral image datasets, and the experimental results demonstrated that the proposed graph sampling aggregation network model could proficiently detect targets with an average detection accuracy exceeding 99 . 8%, outperforming other comparative models. …”
Get full text
Article -
900
Websites and social networks of communes in Slovakia: development and current state
Published 2021-09-01“…One of the main features of today’s information society is the availability of data of various kinds provided by various companies and organisations. …”
Get full text
Article