Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 391 - 420 of 6717

Full-Text Articles in Physical Sciences and Mathematics

A Study Of Various Data Sizes Using Machine Learning, Sochaeta Koeum May 2023

A Study Of Various Data Sizes Using Machine Learning, Sochaeta Koeum

Electronic Theses, Projects, and Dissertations

Social media is a great domain for news consumption; however, it is referred to as a double-edged sword. While it is user-friendly and low-cost, social media is the reason why fake news can spread rapidly, which is detrimental to society, businesses, and many consumers. Therefore, fake news detection is an emerging field. However, some challenges have restricted other researchers from developing a universal machine learning model that is fast, efficient, and reliable to stop the proliferation because of the lack of resources available, such as large-sized datasets. The goal of this culminating experience project is to explore how varying datasets …


Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton May 2023

Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton

Computer Science and Computer Engineering Undergraduate Honors Theses

Undergraduate research has proven to be highly beneficial to students, yet there are many students who do not know how to get involved or who are too timid to approach professors to inquire about potential research opportunities. Our hypothesis is that a cross-platform application has the potential to bridge the gap and help more students get involved in undergraduate research by providing them information about open positions and the faculty or staff members who are mentoring the projects. The key focus of this thesis is to develop an application that provides details about participating faculty or staff including their research …


Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis May 2023

Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis

Master's Theses

This study aspires to find a new screening approach to trace DNA recovery techniques to yield a higher quantity of trace DNA from larger items of evidence. It takes the path of visualizing trace DNA on items of evidence with potential DNA so analysts can swab a more localized area rather than attempting to recover trace DNA through the general swabbing technique currently used for trace DNA recovery. The first and second parts consisted of observing trace DNA interaction with Diamond Dye on porous and non-porous surfaces.

The third part involved applying the Diamond Dye solution by spraying it onto …


Graph Neural Point Process For Temporal Interaction Prediction, Wenwen Xia, Yuchen Li, Shengdong Li May 2023

Graph Neural Point Process For Temporal Interaction Prediction, Wenwen Xia, Yuchen Li, Shengdong Li

Research Collection School Of Computing and Information Systems

Temporal graphs are ubiquitous data structures in many scenarios, including social networks, user-item interaction networks, etc. In this paper, we focus on predicting the exact time of the next interaction, given a node pair on a temporal graph. This novel problem can support interesting applications, such as time-sensitive items recommendation, congestion prediction on road networks, and many others. We present Graph Neural Point Process (GNPP) to tackle this problem. GNPP relies on the graph neural message passing and the temporal point process framework. Most previous graph neural models only utilize the chronological order of observed events and ignore exact timestamps. …


Lessons Learned From The Hospital To Home Community Care Program In Singapore And The Supporting Ai Multiple Readmissions Prediction Model, John Abisheganaden, Kheng Hock Lee, Lian Leng Low, Eugene Shum, Han Leong Goh, Christine Gia Lee Ang, Adny An Ta Wee, Steven M. Miller May 2023

Lessons Learned From The Hospital To Home Community Care Program In Singapore And The Supporting Ai Multiple Readmissions Prediction Model, John Abisheganaden, Kheng Hock Lee, Lian Leng Low, Eugene Shum, Han Leong Goh, Christine Gia Lee Ang, Adny An Ta Wee, Steven M. Miller

Research Collection School Of Computing and Information Systems

In a prior practice and policy article published in Healthcare Science, we introduced the deployed application of an artificial intelligence (AI) model to predict longer-term inpatient readmissions to guide community care interventions for patients with complex conditions in the context of Singapore's Hospital to Home (H2H) program that has been operating since 2017. In this follow on practice and policy article, we further elaborate on Singapore's H2H program and care model, and its supporting AI model for multiple readmission prediction, in the following ways: (1) by providing updates on the AI and supporting information systems, (2) by reporting on customer …


Compositional Prompt Tuning With Motion Cues For Open-Vocabulary Video Relation Detection, Kaifeng Gao, Long Chen, Hanwang Zhang, Jun Xiao, Qianru Sun May 2023

Compositional Prompt Tuning With Motion Cues For Open-Vocabulary Video Relation Detection, Kaifeng Gao, Long Chen, Hanwang Zhang, Jun Xiao, Qianru Sun

Research Collection School Of Computing and Information Systems

Prompt tuning with large-scale pretrained vision-language models empowers open-vocabulary prediction trained on limited base categories, e.g., object classification and detection. In this paper, we propose compositional prompt tuning with motion cues: an extended prompt tuning paradigm for compositional predictions of video data. In particular, we present Relation Prompt (RePro) for Open-vocabulary Video Visual Relation Detection (Open-VidVRD), where conventional prompt tuning is easily biased to certain subject-object combinations and motion patterns. To this end, RePro addresses the two technical challenges of Open-VidVRD: 1) the prompt tokens should respect the two different semantic roles of subject and object, and 2) the tuning …


Reinforced Adaptation Network For Partial Domain Adaptation, Keyu Wu, Min Wu, Zhenghua Chen, Ruibing Jin, Wei Cui, Zhiguang Cao, Xiaoli Li May 2023

Reinforced Adaptation Network For Partial Domain Adaptation, Keyu Wu, Min Wu, Zhenghua Chen, Ruibing Jin, Wei Cui, Zhiguang Cao, Xiaoli Li

Research Collection School Of Computing and Information Systems

Domain adaptation enables generalized learning in new environments by transferring knowledge from label-rich source domains to label-scarce target domains. As a more realistic extension, partial domain adaptation (PDA) relaxes the assumption of fully shared label space, and instead deals with the scenario where the target label space is a subset of the source label space. In this paper, we propose a Reinforced Adaptation Network (RAN) to address the challenging PDA problem. Specifically, a deep reinforcement learning model is proposed to learn source data selection policies. Meanwhile, a domain adaptation model is presented to simultaneously determine rewards and learn domain-invariant feature …


Multi-Lingual Multi-Partite Product Title Matching, Huan Lin Tay, Wei Jie Tay, Hady Wirawan Lauw May 2023

Multi-Lingual Multi-Partite Product Title Matching, Huan Lin Tay, Wei Jie Tay, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

In a globalized marketplace, one could access products or services from almost anywhere. However, resolving which product in one language corresponds to another product in a different language remains an under-explored problem. We explore this from two perspectives. First, given two products of different languages, how to assess their similarity that could signal a potential match. Second, given products from various languages, how to arrive at a multi-partite clustering that respects cardinality constraints efficiently. We describe algorithms for each perspective and integrate them into a promising solution validated on real-world datasets.


Chronos: Time-Aware Zero-Shot Identification Of Libraries From Vulnerability Reports, Yunbo Lyu, Thanh Le Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo May 2023

Chronos: Time-Aware Zero-Shot Identification Of Libraries From Vulnerability Reports, Yunbo Lyu, Thanh Le Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo

Research Collection School Of Computing and Information Systems

Tools that alert developers about library vulnerabilities depend on accurate, up-to-date vulnerability databases which are maintained by security researchers. These databases record the libraries related to each vulnerability. However, the vulnerability reports may not explicitly list every library and human analysis is required to determine all the relevant libraries. Human analysis may be slow and expensive, which motivates the need for automated approaches. Researchers and practitioners have proposed to automatically identify libraries from vulnerability reports using extreme multi-label learning (XML). While state-of-the-art XML techniques showed promising performance, their experimental settings do not practically fit what happens in reality. Previous studies …


Generation-Based Code Review Automation: How Far Are We?, Xin Zhou, Kisub Kim, Bowen Xu, Donggyun Han, Junda He, David Lo May 2023

Generation-Based Code Review Automation: How Far Are We?, Xin Zhou, Kisub Kim, Bowen Xu, Donggyun Han, Junda He, David Lo

Research Collection School Of Computing and Information Systems

Code review is an effective software quality assurance activity; however, it is labor-intensive and time-consuming. Thus, a number of generation-based automatic code review (ACR) approaches have been proposed recently, which leverage deep learning techniques to automate various activities in the code review process (e.g., code revision generation and review comment generation).We find the previous works carry three main limitations. First, the ACR approaches have been shown to be beneficial in each work, but those methods are not comprehensively compared with each other to show their superiority over their peer ACR approaches. Second, general-purpose pre-trained models such as CodeT5 are proven …


What Do Users Ask In Open-Source Ai Repositories? An Empirical Study Of Github Issues, Zhou Yang, Chenyu Wang, Jieke Shi, Thong Hoang, Pavneet Singh Kochhar, Qinghua Lu, Zhenchang Xing, David Lo May 2023

What Do Users Ask In Open-Source Ai Repositories? An Empirical Study Of Github Issues, Zhou Yang, Chenyu Wang, Jieke Shi, Thong Hoang, Pavneet Singh Kochhar, Qinghua Lu, Zhenchang Xing, David Lo

Research Collection School Of Computing and Information Systems

Artificial Intelligence (AI) systems, which benefit from the availability of large-scale datasets and increasing computational power, have become effective solutions to various critical tasks, such as natural language understanding, speech recognition, and image processing. The advancement of these AI systems is inseparable from open-source software (OSS). Specifically, many benchmarks, implementations, and frameworks for constructing AI systems are made open source and accessible to the public, allowing researchers and practitioners to reproduce the reported results and broaden the application of AI systems. The development of AI systems follows a data-driven paradigm and is sensitive to hyperparameter settings and data separation. Developers …


Resale Hdb Price Prediction Considering Covid-19 Through Sentiment Analysis, Srinaath Anbu Durai, Zhaoxia Wang May 2023

Resale Hdb Price Prediction Considering Covid-19 Through Sentiment Analysis, Srinaath Anbu Durai, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

Twitter sentiment has been used as a predictor to predict price values or trends in both the stock market and housing market. The pioneering works in this stream of research drew upon works in behavioural economics to show that sentiment or emotions impact economic decisions. Latest works in this stream focus on the algorithm used as opposed to the data used. A literature review of works in this stream through the lens of data used shows that there is a paucity of work that considers the impact of sentiments caused due to an external factor on either the stock or …


Colefunda: Explainable Silent Vulnerability Fix Identification, Jiayuan Zhou, Michael Pacheco, Jinfu Chen, Xing Hu, Xin Xia, David Lo, Ahmed E. Hassan May 2023

Colefunda: Explainable Silent Vulnerability Fix Identification, Jiayuan Zhou, Michael Pacheco, Jinfu Chen, Xing Hu, Xin Xia, David Lo, Ahmed E. Hassan

Research Collection School Of Computing and Information Systems

It is common practice for OSS users to leverage and monitor security advisories to discover newly disclosed OSS vulnerabilities and their corresponding patches for vulnerability remediation. It is common for vulnerability fixes to be publicly available one week earlier than their disclosure. This gap in time provides an opportunity for attackers to exploit the vulnerability. Hence, OSS users need to sense the fix as early as possible so that the vulnerability can be remediated before it is exploited. However, it is common for OSS to adopt a vulnerability disclosure policy which causes the majority of vulnerabilities to be fixed silently, …


Mando-Hgt: Heterogeneous Graph Transformers For Smart Contract Vulnerability Detection, Huu Hoang Nguyen, Nhat Minh Nguyen, Chunyao Xie, Zahra Ahmadi, Daniel Kudendo, Thanh-Nam Doan, Lingxiao Jiang May 2023

Mando-Hgt: Heterogeneous Graph Transformers For Smart Contract Vulnerability Detection, Huu Hoang Nguyen, Nhat Minh Nguyen, Chunyao Xie, Zahra Ahmadi, Daniel Kudendo, Thanh-Nam Doan, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Smart contracts in blockchains have been increasingly used for high-value business applications. It is essential to check smart contracts' reliability before and after deployment. Although various program analysis and deep learning techniques have been proposed to detect vulnerabilities in either Ethereum smart contract source code or bytecode, their detection accuracy and scalability are still limited. This paper presents a novel framework named MANDO-HGT for detecting smart contract vulnerabilities. Given Ethereum smart contracts, either in source code or bytecode form, and vulnerable or clean, MANDO-HGT custom-builds heterogeneous contract graphs (HCGs) to represent control-flow and/or function-call information of the code. It then …


Link Prediction On Latent Heterogeneous Graphs, Trung Kien Nguyen, Zemin Liu, Yuan Fang May 2023

Link Prediction On Latent Heterogeneous Graphs, Trung Kien Nguyen, Zemin Liu, Yuan Fang

Research Collection School Of Computing and Information Systems

On graph data, the multitude of node or edge types gives rise to heterogeneous information networks (HINs). To preserve the heterogeneous semantics on HINs, the rich node/edge types become a cornerstone of HIN representation learning. However, in real-world scenarios, type information is often noisy, missing or inaccessible. Assuming no type information is given, we define a so-called latent heterogeneous graph (LHG), which carries latent heterogeneous semantics as the node/edge types cannot be observed. In this paper, we study the challenging and unexplored problem of link prediction on an LHG. As existing approaches depend heavily on type-based information, they are suboptimal …


Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo May 2023

Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo

Research Collection School Of Computing and Information Systems

Machine learning (ML) has gained much attention and has been incorporated into our daily lives. While there are numerous publicly available ML projects on open source platforms such as GitHub, there have been limited attempts in filtering those projects to curate ML projects of high quality. The limited availability of such a high-quality dataset poses an obstacle to understanding ML projects. To help clear this obstacle, we present NICHE, a manually labelled dataset consisting of 572 ML projects. Based on the evidence of good software engineering practices, we label 441 of these projects as engineered and 131 as non-engineered. This …


Picaso: Enhancing Api Recommendations With Relevant Stack Overflow Posts, Ivana Clairine Irsan, Ting Zhang, Ferdian Thung, Kisub Kim, David Lo May 2023

Picaso: Enhancing Api Recommendations With Relevant Stack Overflow Posts, Ivana Clairine Irsan, Ting Zhang, Ferdian Thung, Kisub Kim, David Lo

Research Collection School Of Computing and Information Systems

While having options could be liberating, too many options could lead to the sub-optimal solution being chosen. This is not an exception in the software engineering domain. Nowadays, API has become imperative in making software developers' life easier. APIs help developers implement a function faster and more efficiently. However, given the large number of open-source libraries to choose from, choosing the right APIs is not a simple task. Previous studies on API recommendation leverage natural language (query) to identify which API would be suitable for the given task. However, these studies only consider one source of input, i.e., GitHub or …


Head And Neck Tumor Histopathological Image Representation With Pre- Trained Convolutional Neural Network And Vision Transformer, Ranny Rahaningrum Herdiantoputri, Daisuke Komura, Tohru Ikeda, Shumpei Ishikawa Apr 2023

Head And Neck Tumor Histopathological Image Representation With Pre- Trained Convolutional Neural Network And Vision Transformer, Ranny Rahaningrum Herdiantoputri, Daisuke Komura, Tohru Ikeda, Shumpei Ishikawa

Journal of Dentistry Indonesia

Image representation via machine learning is an approach to quantitatively represent histopathological images of head and neck tumors for future applications of artificial intelligence-assisted pathological diagnosis systems. Objective: This study compares image representations produced by a pre-trained convolutional neural network (VGG16) to those produced by a vision transformer (ViT-L/14) in terms of the classification performance of head and neck tumors. Methods: W hole-slide images of five oral t umor categories (n = 319 cases) were analyzed. Image patches were created from manually annotated regions at 4096, 2048, and 1024 pixels and rescaled to 256 pixels. Image representations were …


Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin Apr 2023

Arkavalley Liquor: Simplifying Restaurant Alcohol Orders, Isaiah A. Kitts, Dayton Drilling, Bradlee Treece, Cameron Lumpkin

ATU Research Symposium

The ArkaValley Liquor system is a web-based ordering platform designed to simplify the process of ordering alcohol for local restaurants. Currently, restaurants place orders by emailing the store, which makes it difficult to maintain a paper trail and track order details. With the ArkaValley Liquor system, the ordering process is automated, and all order details are saved in one central location. Each restaurant will have a login, ensuring only authorized individuals can place orders. The system will also provide a record of each restaurant's most recent order, making it easy to reorder if necessary. By using the ArkaValley Liquor system, …


Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe Apr 2023

Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe

ATU Research Symposium

Our work implements an inventory system and appointment system for the Premium Wireless phone company. It includes separate views for employees to manage inventory and view appointments for the day and the near future and allows customers to view all current inventory and set an appointment.


A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell Apr 2023

A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell

Cybersecurity Undergraduate Research Showcase

Data collection is a vital component in any organization in regards to keeping track of user activity, gaining statistics and improving the user experience, and user identification. While the underlying basis of data collection is understandable, the use of this data has to be closely regulated and documented. In many cases, the VCDPA (Virginia Consumer Data Protection Act) outlines the guidelines for data use, data controller responsibilities, and limitations however nonprofit organizations are exempt from compliance. Colleges and universities, although still held to some degree of limitation, range in permissiveness with what data they choose to collect and retain but …


Web Repository Of Southern’S Research Projects, Rebecca Zaldivar, Siegwart Mayr Apr 2023

Web Repository Of Southern’S Research Projects, Rebecca Zaldivar, Siegwart Mayr

Campus Research Day

A research repository was created so that Southern Adventist University has a central place for all past, current, and future research projects. This repository is a web application created with the use of the Yii framework that utilizes PHP and SQL. The repository has a user-friendly interface to let authorized users upload the information about their projects. Also, professors and students from different departments can see the list of projects per department.


Creating Characters In A Game Based Learning System, Jaehyun Park, Siegwart Mayr Apr 2023

Creating Characters In A Game Based Learning System, Jaehyun Park, Siegwart Mayr

Campus Research Day

Gamification is the idea of adding video game elements into a non-gaming context, such as for educational or business purposes. Game-based learning takes that idea one step further by not only adding elements of video games, but turning the whole process into a game-like structure.

The Center for Innovation and Research in Computing (CIRC) is currently developing a game-based learning system that can be used in place of a traditional classroom setting. The focus of this research work is on the relationship between users and characters within a course in the Character Module. The Character Module encompasses everything to do …


Generating University Course Catalogs Via A Php Based Module, Chileleko Chileya, Siegwart Mayr Apr 2023

Generating University Course Catalogs Via A Php Based Module, Chileleko Chileya, Siegwart Mayr

Campus Research Day

Catalogs are a requirement at any university. The current academic system at Southern Adventist University entails creating catalogs for the school by hand. The current model is very outdated and time consuming especially considering the database of all related school records available. The solution is a module using the PHP based framework called Yii to construct a module that will be integrated into the Southern Adventist University website that will automatically generate formatted catalogs through the frontend of the website. The previous module uses Kuali to store academic data as well as provide an API for third-party applications but was …


A Study Of A Collaborative Task Management Application Built On React Native Using The Basic Ux Framework, Andrei Modiga Apr 2023

A Study Of A Collaborative Task Management Application Built On React Native Using The Basic Ux Framework, Andrei Modiga

Campus Research Day

Many times it can be difficult to accomplish all this is proposed in a meeting. This project aimed to build a simple planner application using React Native that allows groups of people to collaborate and stay organized. The application was built using the BASIC Framework as a guide, and featured a collaboration feature that enabled users to share tasks, projects, and communicate with one another in order to stay coordinated and productive. The user interface was designed for easy use, allowing for quick and efficient task management within a group. The goal of the application was to provide a useful …


Visualizing Literary Narratives With A Graph-Centered Approach., Meg Ermer Apr 2023

Visualizing Literary Narratives With A Graph-Centered Approach., Meg Ermer

Campus Research Day

The art of storytelling is multifaceted and nonlinear, involving multiple characters, themes, and symbols while often jumping between the present and past. While media forms such as novels can encapsulate these complexities, it is often difficult to visualize a narrative in an easy-to-understand format. Our contribution is a graph-based system to let users organize and visualize those narratives. Events and characters are represented as nodes and their relationships are represented as edges. Neo4J is used as a database management system to store the graph and to run queries on it, and Streamlit and Pyvis are used to represent the database …


Cie Text Analysis: Narrative Of The Life Of Frederick Douglass, The Declaration Of Independence, And The Declaration Of Sentiments, Arianna Knipe Apr 2023

Cie Text Analysis: Narrative Of The Life Of Frederick Douglass, The Declaration Of Independence, And The Declaration Of Sentiments, Arianna Knipe

Mathematics and Computer Science Presentations

Our STAT-451 class has worked with analyzing the words from CIE texts and assigning them to a sentiment or feeling and comparing them with one another using RStudio. This project analyzes texts from three sources: The Narrative of the Life of Frederick Douglass, The Declaration of Independence and the Declaration of Sentiments.


Essays On Cybersecurity And Information Privacy, Moez Hamedani Farokhnia Apr 2023

Essays On Cybersecurity And Information Privacy, Moez Hamedani Farokhnia

USF Tampa Graduate Theses and Dissertations

This dissertation research focuses on two key aspects of cybersecurity research. Security safeguard allocation, and AI-powered tools for anomaly detection. The first dissertation essay (Chapter 1) proposes a novel framework for the allocation of security countermeasures in the presence of uncertainty using robust optimization technique. The second dissertation essay (Chapter 2) studies the impact of algorithmic bias on the practice of insider threat detection in Electronic Health Record Systems and proposes a mitigations strategy. The final dissertation essay (Chapter 3) investigates how the biases of anomaly detection algorithms, and the characteristics of ensemble methods relate to the ensembles’ accuracy and …


Morphologically-Aware Vocabulary Reduction Of Word Embeddings, Chong Cher Chia, Maksim Tkachenko, Hady Wirawan Lauw Apr 2023

Morphologically-Aware Vocabulary Reduction Of Word Embeddings, Chong Cher Chia, Maksim Tkachenko, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

We propose SubText, a compression mechanism via vocabulary reduction. The crux is to judiciously select a subset of word embeddings which support the reconstruction of the remaining word embeddings based on their form alone. The proposed algorithm considers the preservation of the original embeddings, as well as a word’s relationship to other words that are morphologically or semantically similar. Comprehensive evaluation of the compressed vocabulary reveals SubText’s efficacy on diverse tasks over traditional vocabulary reduction techniques, as validated on English, as well as a collection of inflected languages.


Dsdnet: Toward Single Image Deraining With Self-Paced Curricular Dual Stimulations, Yong Du, Junjie Deng, Yulong Zheng, Junyu Dong, Shengfeng He Apr 2023

Dsdnet: Toward Single Image Deraining With Self-Paced Curricular Dual Stimulations, Yong Du, Junjie Deng, Yulong Zheng, Junyu Dong, Shengfeng He

Research Collection School Of Computing and Information Systems

A crucial challenge regarding the single image deraining task is to completely remove rain streaks while still preserving explicit image details. Due to the inherent overlapping between rain streaks and background scenes, the texture details could be inevitably lost when clearing rain away from the degraded image, making the two purposes contradictory. Existing deep learning based approaches endeavor to resolve the two issues successively in a cascaded framework or to treat them as independent tasks in a parallel structure. However, none of the models explores a proper interaction between rain distributions and hidden feature responses, which intuitively would provide more …