In skull base surgery, robotic arms can perform endoscope-assisted procedures instead of human surgeons. However, when operating in confined spaces, avoiding collisions between the endoscope and surgical instruments p...
详细信息
Collective Motion (CM) is a basic phenomenon observed in nature, such as in birds, insects, and schooling fish. In swarm robotics, virtual links among the swarm members generate attractive and repulsive forces to atta...
详细信息
Optical Coherence Tomography (OCT) is a non-invasive, high-resolution imaging technology that has recently been used in fingerprint acquisition. The captured external and internal fingerprints are robust to spoofing a...
详细信息
Understanding queries in information retrieval (IR) is crucial. Tasks like query classification or clustering exist but may lack precision. Detailed goal descriptions, like human annotations, are vital for improving q...
详细信息
In this study, we collected over 20,000 colonoscopy images and annotated four classes of objects exhibiting irregular shapes and edges, including polyps, foam, residue, and ileocecal valves. We validated the effective...
详细信息
The threat posed by botnets to cyber security has become increasingly severe, as these malicious networks spread various types of bot programs to control a large number of hosts and form a one-to-many network of contr...
详细信息
ISBN:
(纸本)9789819751006;9789819751013
The threat posed by botnets to cyber security has become increasingly severe, as these malicious networks spread various types of bot programs to control a large number of hosts and form a one-to-many network of controllable devices. To build the Command and Control (C&C) channel infrastructure, traditional botnets require a third-party server to act as a staging point between the attacker and controlled devices, but the failure of this infrastructure can cause the entire network to be paralyzed. Frequent purchase of servers, domain names and other network resources will not only increase the cost of consumption, but also lead to a significant increase in the risk of identity exposure (e.g., the purchase of these network resources require real-name authentication). In this paper, we propose a multi-channel communication model that is cost free by utilizing Cloud notes software as the C&C channel. The feasibility of the model is evaluated in our experiments, and the results indicate that the robustness and anti-traceability of our approach are guaranteed.
Often, students' 'prior ideas' and 'alternative conceptions' about natural phenomena do not align with established scientific models in science education. In the field of astronomy, some of these i...
详细信息
ISBN:
(纸本)9783031604577;9783031604584
Often, students' 'prior ideas' and 'alternative conceptions' about natural phenomena do not align with established scientific models in science education. In the field of astronomy, some of these ideas and conceptions are ingrained from an early age and persist over the years even after receiving formal instruction, highlighting the urgent need to design resources and activities to enhance scientific literacy. In this regard, Extended Reality (XR) emerges as an easily accessible technology with broad applications for astronomy education, making it a useful tool with the potential to address this issue. From this perspective, this study aims to present the design and preliminary evaluation of eight Augmented Reality (AR) educational resources focused on addressing reported alternative conceptions during the learning and teaching of astronomy. Through a methodology based on Educational Design Research, we developed and preliminarily evaluated these astronomy AR resources through simple activities with primary and secondary school students. The evaluation results contributed to improving the software, providing students with access to rigorous scientific content focused on overcoming alternative conceptions in astronomy and tailored to their needs.
With the rise of social media, misinformation has significant negative effects on the decision-making of individuals, organizations and communities within society. Identifying and mitigating the spread of fake in...
详细信息
Interpolation kernel machines belong to the class of interpolating classifiers that interpolate all the training data and thus have zero training error. Recent research shows that they do generalize well and have comp...
详细信息
This paper presents the concept of business unit to model business processes. A business unit’s main strength is that it represents resources like personnel and time that business processes consume at run-time. Due t...
详细信息
暂无评论