{"title":"Comparative Study and Application of Classification Algorithms for Unbalanced Thyroid Eye Disease Datasets","authors":"天凤 张","doi":"10.12677/sea.2023.123049","DOIUrl":"https://doi.org/10.12677/sea.2023.123049","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90995315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context Attention Network for Scene Text Recognition","authors":"田荣 董","doi":"10.12677/sea.2023.122035","DOIUrl":"https://doi.org/10.12677/sea.2023.122035","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"86 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80002081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks","authors":"Robb Shawe, Ian R. McAndrew","doi":"10.4236/jsea.2023.1610027","DOIUrl":"https://doi.org/10.4236/jsea.2023.1610027","url":null,"abstract":"The United States of America faces an increasing number of threats to its critical infrastructure due to cyber-attacks. With the constant advancement of technology and the interconnectedness of various systems, the vulnerabilities in the nation’s infrastructure have become more pronounced. Cyber-attacks on critical infrastructure, such as power grids, transportation networks, and financial systems, pose a significant risk to national security and public safety. These attacks can disrupt essential services, cause economic losses, and potentially have severe consequences for the well-being of individuals and communities. The rise of cyber-terrorism is also a concern. Cyber-terrorists can exploit vulnerabilities in cyberspace to compromise infrastructure systems, causing chaos and panic among the population. The potential for destructive attacks on critical infrastructure is a pressing issue requiring constant attention and proactive measures.","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135261239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FSC-YOLOv5s Model Integrating FMix and Attention Stacking States","authors":"俪馨 张","doi":"10.12677/sea.2023.124063","DOIUrl":"https://doi.org/10.12677/sea.2023.124063","url":null,"abstract":"In terms of target detection, the FSC-YOLOv5s algorithm is designed to address the weaknesses and limitations of the YOLOv5s algorithm in handling small data sets. When data acquisition is limited, the use of data augmentation can expand the number of feature points without increasing the original data volume, bringing a positive gain effect to the detection effect, which is the most optimal choice for lightweight networks. First, a mixed-sample data enhancement method FMix is introduced to enhance the data volume during data preprocessing, which can reduce the impact of small data sets on the detection accuracy. Second, the network structure of the YOLOv5s algorithm is improved by adding a SimAM parameter-free attention layer that can unify the weights when obtaining the network output content. The attention of the model to the key features of the data can be enhanced without adding an additional number of parameters. At the same time, the CBAM attention layer is added to the backbone network part to further enhance the in-depth learning of limited data features by automatically extracting important features and suppressing minor features through learning. Improving the screening ability of important features through the attention mechanism can effectively improve the integrity of detection targets. Then, it is combined with SGD, Adam, and Adamw optimization algorithms, respectively, to select optimizers that can improve the computational efficiency and adaptability of FSC-YOLOv5s selectively. Finally, the experiments showed that FSC-YOLOv5s improved the mAP50-95 by 30.3% and 5.1% on both data-sets, respectively, verifying the effectiveness of the FSC-YOLOv5s algorithm.","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"2013 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87729489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BAG: Text Classification Based on Attention Mechanism Combining BERT and GCN","authors":"想 李","doi":"10.12677/sea.2023.122023","DOIUrl":"https://doi.org/10.12677/sea.2023.122023","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82626471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Rapid Formaldehyde Detection System Based on STM32","authors":"志 彭","doi":"10.12677/sea.2023.121003","DOIUrl":"https://doi.org/10.12677/sea.2023.121003","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83438674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lane Detection Method Based on ResNet-ViT and Attention Mechanism","authors":"飞 何","doi":"10.12677/sea.2023.123038","DOIUrl":"https://doi.org/10.12677/sea.2023.123038","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"1999 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90439490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Cryptanalysis Method Based on Differential Distribution Table","authors":"昊 罗","doi":"10.12677/sea.2023.121005","DOIUrl":"https://doi.org/10.12677/sea.2023.121005","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88485665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Illuminance Image Enhancement Algorithm of Retinex-Net Network Based on Residual Module","authors":"雪苹 高","doi":"10.12677/sea.2023.121016","DOIUrl":"https://doi.org/10.12677/sea.2023.121016","url":null,"abstract":"","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90885416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Technology Research of Automotive Fixture Management System Based on CATIA Secondary Development","authors":"域宁 樊","doi":"10.12677/sea.2023.124061","DOIUrl":"https://doi.org/10.12677/sea.2023.124061","url":null,"abstract":"Welding is a key process in automobile production, the development of automobile welding fix-樊域宁,仲梁维","PeriodicalId":73949,"journal":{"name":"Journal of software engineering and applications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80262201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}