{"title":"Improve Performance of Fine-tuning Language Models with Prompting","authors":"Noémi Ligeti-Nagy, Zijian Győző Yang","doi":"10.36244/icj.2023.5.10","DOIUrl":"https://doi.org/10.36244/icj.2023.5.10","url":null,"abstract":"This paper explores the effectiveness of prompt programming in the fine-tuning process of a Hungarian language model. The study builds on the prior success of prompt engineering in natural language processing tasks and employs the prompting method to enhance the fine-tuning performance of a huBERT model on several benchmark datasets of HuLU. The experimentation involves testing 45 prompt combinations for the HuCoPA dataset and 15 prompt variations for the HuRTE and HuWNLI datasets. The findings reveal that the addition of an instructional text consistently produces the best results across all winning cases, and that the [CLS] token produces the best results in the separator token experiments. The most significant enhancement was observed in the HuWNLI dataset, with an increase in accuracy from 65% to 85%. These results demon- strate that the addition of instruct text is crucial and sufficient in enabling the language model to effectively interpret and solve the Winograd Schemata problem. These results showcase the potential of prompt programming in enhancing the performance of language models in fine-tuning tasks, and highlight the importance of incorporating task-specific instructions to improve model interpretability and accuracy.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76860755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning-Based Refactoring with Formally Verified Training Data","authors":"Balázs Szalontai, Péter Bereczky, Dániel Horpácsi","doi":"10.36244/icj.2023.5.1","DOIUrl":"https://doi.org/10.36244/icj.2023.5.1","url":null,"abstract":"Refactoring source code has always been an active area of research. Since the uprising of various deep learning methods, there have been several attempts to perform source code transformation with the use of neural networks. More specifically, Encoder-Decoder architectures have been used to transform code similarly to a Neural Machine Translation task. In this paper, we present a deep learning-based method to refactor source code, which we have prototyped for Erlang. Our method has two major components: a localizer and a refactoring component. That is, we first localize the snippet to be refactored using a recurrent network, then we generate an alternative with a Sequence-to- Sequence architecture. Our method could be used as an extension for already existing AST-based approaches for refactoring since it is capable of transforming syntactically incomplete code. We train our models on automatically generated data sets, based on formally verified refactoring definitions and by using attribute grammar-based sampling.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77931825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Neural Network Tools in Process Mining","authors":"László Kovács, Erika Baksáné Varga, Péter Mileff","doi":"10.36244/icj.2023.5.3","DOIUrl":"https://doi.org/10.36244/icj.2023.5.3","url":null,"abstract":"Dominant current technologies in process mining use schema induction approaches based on graph and au- tomaton methods. The paper investigates the application of neural network approaches in schema induction focusing on three alternative architectures: MLP, CNN and LSTM networks. The proposed neural network models can be used to discover XOR, loop and parallel execution templates. In the case of loop detection, the performed test analyses show the dominance of CNN approach where the string is represented with a two- dimensional similarity matrix. The usability of the proposed approach is demonstrated with test examples.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89295033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Primer on Software Defined Radios","authors":"D. Popescu, R. Vida","doi":"10.36244/icj.2022.3.3","DOIUrl":"https://doi.org/10.36244/icj.2022.3.3","url":null,"abstract":"The commercial success of cellular phone systems during the late 1980s and early 1990 years heralded the wireless revolution that became apparent at the turn of the 21st century and has led the modern society to a highly interconnected world where ubiquitous connectivity and mobility are enabled by powerful wireless terminals. Software defined radio (SDR) technology has played a major role in accelerating the pace at which wireless capabilities have advanced, in particular over the past 15 years, and SDRs are now at the core of modern wireless communication systems. In this paper we give an overview of SDRs that includes a discussion of drivers and technologies that have contributed to their continuous advancement, and presents the theory needed to understand the architecture and operation of current SDRs. We also review the choices for SDR platforms and the programming options that are currently available for SDR research, development, and teaching, and present case studies illustrating SDR use. Our hope is that the paper will be useful as a reference to wireless researchers and developers working in the industry or in academic settings on further advancing and refining the capabilities of wireless systems.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72665991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exact Outage Analysis for Non-regenerative Secure Cooperation Against Double-tap Eavesdropping","authors":"Kotha Venugopalachary, Deepak Mishra, R. Saini","doi":"10.36244/icj.2022.4.6","DOIUrl":"https://doi.org/10.36244/icj.2022.4.6","url":null,"abstract":"This paper presents the secrecy performance analysis of an amplify-and-forward relay-assisted cooperative communication system in the presence of a passive external eavesdropper. In contrast to existing works that assume high signal-to-noise ratio (SNR) approximations, we have investigated exact and secrecy outage probabilities. Furthermore, we consider a more challenging scenario where the source may not be reachable to the intended user directly. But the eavesdropper can tap both the source link and the relay link. First of all, the outage probability is analyzed at the intended user as well as the eavesdropper. Next, defining the secrecy rate for the amplify-and-forward (AF) relaying system, the expression of the secrecy outage probability (SOP) and the secrecy intercept probability (SIP) have been derived, respectively. Noticing the complexity involved in the integration of SOP and SIP expressions, the closed-form expressions have been derived for asymptotic cases. Finally, the exact and asymptotic analysis has been verified by performing Monte-Carlo simulations. It is observed that the relay position should be closer to the source compared to the eavesdropper to achieve improved SOP.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80159100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LoRa Positioning in Verification of Location Data’s Credibility","authors":"Anna Strzoda, Rafał Marjasz, K. Grochla","doi":"10.36244/icj.2022.4.8","DOIUrl":"https://doi.org/10.36244/icj.2022.4.8","url":null,"abstract":"The LoRa is a novel radio communication technology providing low power and a high range of data transmission. The LoRa transmission may be used for a low-cost localization to estimate the network nodes’ location. Some recent research showed that the location could be found with reasonable accuracy, with median error as low as tens of meters. Still, such results are achieved in a controlled environment with low interferences. We first evaluate the LoRa localization using an extensive data set of a telemetric network of a few thousand devices. We show that although the direct positioning based on trilateration provides limited accuracy, the measurement of LoRa transmission may be successfully used to evaluate the credibility of location information. The information about which gateways received the data and the RSSI measurements allow us to verify if the potential coordinates of a location are accurate. We propose a metric for location verification and estimate its credibility on a sample of measurements from the LoRa telemetry network.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87538153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Time Series Representation Approach for Dimensionality Reduction","authors":"Mohammad Bawaneh, V. Simon","doi":"10.36244/icj.2022.2.5","DOIUrl":"https://doi.org/10.36244/icj.2022.2.5","url":null,"abstract":"With the growth of streaming data from many domains such as transportation, finance, weather, etc, there has been a surge in interest in time series data mining. With this growth and massive amounts of time series data, time series representation has become essential for reducing dimensionality to overcome the available memory constraints. Moreover, time series data mining processes include similarity search and learning of historical data tasks. These tasks require high computation time, which can be reduced by reducing the data dimensionality. This paper proposes a novel time series representation called Adaptive Simulated Annealing Representation (ASAR). ASAR considers the time series representation as an optimization problem with the objective of preserving the time series shape and reducing the dimensionality. ASAR looks for the instances in the raw time series that can represent the local trends and neglect the rest. The Simulated Annealing optimization algorithm is adapted in this paper to fulfill the objective mentioned above. We compare ASAR to three well-known representation approaches from the literature. The experimental results have shown that ASAR achieved the highest reduction in the dimensions. Moreover, it has been shown that using the ASAR representation, the data mining process is accelerated the most. The ASAR has also been tested in terms of preserving the shape and the information of the time series by performing One Nearest Neighbor (1-NN) classification and K-means clustering, which assures its ability to preserve them by outperforming the competing approaches in the K-means task and achieving close accuracy in the 1-NN classification task.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88509688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Review and Study on Various Vertical Handover Management Technologies in 5G Heterogeneous Network","authors":"K. Kiran, D. Rao","doi":"10.36244/icj.2022.2.3","DOIUrl":"https://doi.org/10.36244/icj.2022.2.3","url":null,"abstract":"In recent mobile networks, due to the huge number of subscribers, the traffic may occur rapidly; therefore, it is complex to guarantee the accurate operation of the network. On the other hand, the Fifth generation (5G) network plays a vital role in the handover mechanism. Handover management is a prominent issue in 5G heterogeneous networks. Therefore, the Handover approach relocates the connection between the user equipment and the consequent terminal from one network to another. Furthermore, the handover approaches manage each active connection for the user equipment. This survey offers an extensive analysis of 50 research papers based on existing handover approaches in the 5G heterogeneous network. Finally, existing methods considering conventional vertical handover management strategies are elaborated to improve devising effective vertical handover management strategies. Moreover, the possible future research directions in attaining efficient vertical handover management in a 5G heterogeneous network are elaborated.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79933360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Implementing a Software Tester for Benchmarking MAP-T Devices","authors":"Ahmed Al-hamadani, G. Lencse","doi":"10.36244/icj.2022.3.6","DOIUrl":"https://doi.org/10.36244/icj.2022.3.6","url":null,"abstract":"Several IPv6 transition technologies have been designed and developed over the past few years to accelerate the full adoption of the IPv6 address pool. To make things more organized, the Benchmarking Working Group of IETF has standardized a comprehensive benchmarking methodology for these technologies in its RFC 8219. The Mapping of Address and Port using Translation (MAP-T) is one of the most important transition technologies that belong to the double translation category in RFC 8219. This paper aims at presenting our progress towards implementing the world’s first RFC 8219 compliant Tester for the MAP-T devices, more specifically, the MAP-T Customer Edge (CE) and the MAP-T Border Relay (BR). As part of the work of this paper, we presented a typical design for the Tester, followed by a discussion about the operational requirements, the scope of measurements, and some design considerations. Then, we installed a testbed for one of the MAP-T implementations, called Jool, and showed the results of the testbed. And finally, we ended up with a brief description of the MAP-T test program and its configuration parameters in case of testing the BR device.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85273532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Saving Bit-flips through Smart Overwrites in NVRAM","authors":"A. Kulandai, Thomas Schwarz","doi":"10.36244/icj.2022.4.5","DOIUrl":"https://doi.org/10.36244/icj.2022.4.5","url":null,"abstract":"New generations of non-volatile random access memories will combine the best features of memory (access times, byte addressability) with the best features of storage (non-volatility, low costs per byte). Some, like PCM, have a limited endurance. All will only consume energy when accessed, but writes will use much more energy than reads. These characteristics put a cost on flipping bits in memory. Bit-flip aware data structures lower the number of bits flipped by not resetting fields to zero to indicate a deleted record but by using bit-maps. If given a choice of where to over-write data, they will select the location which results in a lower number of bit-flips. We calculate the expected bit-flip savings of this strategy and derive a rule to determine the number of the possible candidate locations.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89934344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}