Suggested Topics within your search.
Suggested Topics within your search.
-
1021
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
1022
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
1023
A Novel Feature Extraction Method for Nonintrusive Appliance Load Monitoring
Published 2013-01-01“…This system captures the signals from the aggregate consumption, extracts the features from these signals and classifies the extracted features in order to identify the switched-on appliances. …”
Get full text
Article -
1024
Food Security of Kuzbass Region Population in 1905-1907: Local Features
Published 2017-11-01Get full text
Article -
1025
Bearing Fault Diagnosis based on Feature Visualization and Depth Adaptive Network
Published 2022-07-01“…Aiming at the problem that feature extraction in bearing fault diagnosis needs to rely heavily on manual experience and expert knowledge,a bearing fault diagnosis method based on Gramian angle field(GAF) transformation and adaptive depth network is proposed. …”
Get full text
Article -
1026
Speaker verification method based on cross-domain attentive feature fusion
Published 2023-08-01“…Aiming at the problem that the lack of structure information among speech signal sample in the front-end acoustic features of speaker verification system, a speaker verification method based on cross-domain attentive feature fusion was proposed.Firstly, a feature extraction method based on the graph signal processing (GSP) was proposed to extract the structural information of speech signals, each sample point in a speech signal frame was regarded as a graph node to construct the speech graph signal and the graph frequency information of the speech signal was extracted through the graph Fourier transform and filter banks.Then, an attentive feature fusion network with the residual neural network and the squeeze-and- excitation block was proposed to fuse the features in the traditional time-frequency domain and those in the graph frequency domain to promote the speaker verification system performance.Finally, the experiment was carried out on the VoxCeleb, SITW, and CN-Celeb datasets.The experimental results show that the proposed method performs better than the baseline ECAPA-TDNN model in terms of equal error rate (EER) and minimum detection cost function (min-DCF).…”
Get full text
Article -
1027
Speaker verification method based on cross-domain attentive feature fusion
Published 2023-08-01“…Aiming at the problem that the lack of structure information among speech signal sample in the front-end acoustic features of speaker verification system, a speaker verification method based on cross-domain attentive feature fusion was proposed.Firstly, a feature extraction method based on the graph signal processing (GSP) was proposed to extract the structural information of speech signals, each sample point in a speech signal frame was regarded as a graph node to construct the speech graph signal and the graph frequency information of the speech signal was extracted through the graph Fourier transform and filter banks.Then, an attentive feature fusion network with the residual neural network and the squeeze-and- excitation block was proposed to fuse the features in the traditional time-frequency domain and those in the graph frequency domain to promote the speaker verification system performance.Finally, the experiment was carried out on the VoxCeleb, SITW, and CN-Celeb datasets.The experimental results show that the proposed method performs better than the baseline ECAPA-TDNN model in terms of equal error rate (EER) and minimum detection cost function (min-DCF).…”
Get full text
Article -
1028
CHILDREN TRANSPORTATION BY BUSES IN INTERCITY TRANSFERS TAKING INTO ACCOUNT AGE FEATURES
Published 2019-07-01“…The paper is devoted to the problem of organized children transfers by road transport (buses) in intercity connection. …”
Get full text
Article -
1029
Enhancing Robustness in Feature Importance Methods with NAFIC and CESHAP for Improved Interpretability
Published 2025-12-01“…To address this problem, we introduce the Complexity and Interaction Enhanced SHAP (CESHAP), a novel feature importance method that incorporates model complexity and feature interactions. …”
Get full text
Article -
1030
The Impact of Feature Extraction in Random Forest Classifier for Fake News Detection
Published 2024-12-01“…The influence of fake news has become a pressing social problem, shaping public opinion in important events such as elections. …”
Get full text
Article -
1031
Features of civic consciousness of university students at the present stage of educational development
Published 2024-09-01“…Aim. To study the features of civic consciousness among modern university students.Material and methods. …”
Get full text
Article -
1032
Real-time Semantic Segmentation Method Based on Improved Feature Fusion
Published 2023-12-01“… Aiming at the problem that both location information and semantic information need to be considered in real-time semantic segmentation tasks, we proposed a real-time semantic segmentation method based on improved feature fusion. …”
Get full text
Article -
1033
A text classification model for dynamic fusion of global and local features
Published 2024-08-01“…From the analysis of the ablation experiment, the dynamic fusion enhancement module fully makes the global temporal features and local semantic features of the text fused together, effectively solving the problem of insufficient use of global and local information in the text classification model.…”
Get full text
Article -
1034
Theoretical model of effective elastic moduli of composites considering the inclusion features
Published 2025-05-01“…Quantifying the effect of composition on the two-phase composite’s mechanical properties is crucial for the life prediction and durability design of the whole structure. Features of inclusions, especially shape and size, affect the two-phase composites’ effective elastic moduli significantly. …”
Get full text
Article -
1035
Structural-Semantic Features of Parenthetical Constructions (by Material of Modern English Fiction)
Published 2019-09-01Get full text
Article -
1036
Explorative Binary Gray Wolf Optimizer with Quadratic Interpolation for Feature Selection
Published 2024-10-01“…This paper proposes a novel binary Gray Wolf Optimization algorithm to address the feature selection problem in classification tasks. …”
Get full text
Article -
1037
Texture Analysis and Classification using Local Binary Patterns and Statistical Features
Published 2024-09-01Get full text
Article -
1038
Acoustic fault diagnosis of traction motor bearing based on fusion feature
Published 2023-03-01“…Aiming at the problem that a small number of features cannot fully characterize the bearing fault when applying machine learning to acoustic fault diagnosis, this paper proposes to superimpose and fuse the Gramian angular field (GAF) and wavelet time-frequency figure to form a six channel fusion feature map to effectively characterize the bearing fault. …”
Get full text
Article -
1039
Two-branch Shape Complement Network for Feature Missing Splicing Mode
Published 2023-10-01“…By decoding the global features , the target skeleton point cloud is obtained , and the global features of the point cloud are guaranteed. …”
Get full text
Article -
1040
Unified Depth-Guided Feature Fusion and Reranking for Hierarchical Place Recognition
Published 2025-06-01“…Prevailing VPR methods predominantly employ RGB-based features for query image retrieval and correspondence establishment. …”
Get full text
Article