In order to be more effectively resist differential power analysis attacks, the improved fixed value masking algorithm is proposed for resource-constrained smart card based on fixed value masking and random masking. F...
详细信息
This paper describes the findings of a small-scale case study concerning the collaborative aspects of student working practices. It is a pilot investigation into the strategies that are employed by students when attem...
详细信息
This paper describes the findings of a small-scale case study concerning the collaborative aspects of student working practices. It is a pilot investigation into the strategies that are employed by students when attempting Object Oriented programming exercises outside the formal classroom setting. Some of the collaborative practices are simple cases of copying, but others, despite falling within the definition of plagiarism, are a beneficial, and possibly useful, means of enhancing the learning process. Although this study only focuses upon a small group of students in one UK University, the practices highlighted are unlikely to be confined to this one setting.
Because of the communication schemes and communication protocols in the industrial control systems (Industrial Control System, ICS) rarely consider security at the beginning of the design, and with the rapid developme...
详细信息
In recent years, many face spoofing detection methods based on video frame or video sequence have been proposed to counteract the security threats of face recognition system. Although the video sequence based detectio...
详细信息
One effective way to introduce a dose of humanity, acknowledge the needs and struggles of CS1 students, and appeal to a broader range of learning styles is to present a computerscience topic in an entertaining manner...
详细信息
One effective way to introduce a dose of humanity, acknowledge the needs and struggles of CS1 students, and appeal to a broader range of learning styles is to present a computerscience topic in an entertaining manner, e.g., with some form of artistic performance. In this paper, I describe three songs for CS1 that are designed to help students surmount three of the most difficult hurdles of that course. Empirical and anecdotal results demonstrate that the songs help students learn, and help them enjoy learning. These songs are a case study in entertainment;all instructors can find some way to entertain their class, and recordings of the songs themselves are available on the web for any instructor or student.
Architectural distortion (AD) is one of the most important potentially ominous signs of breast cancer. As a 3D imaging, digital breast tomosynthesis (DBT) is an accurate tool to detect AD. We developed a deep learning...
详细信息
ISBN:
(纸本)9781510633964
Architectural distortion (AD) is one of the most important potentially ominous signs of breast cancer. As a 3D imaging, digital breast tomosynthesis (DBT) is an accurate tool to detect AD. We developed a deep learning approach for AD detection guided by mammary gland spatial pattern (MGSP) in DBT. The approach consists of two stages: 2D detection and 3D aggregation. In 2D detection, prior MGSP information is obtained first. It includes 1) magnitude image and orientation field map produced from Gabor filters and 2) mammary gland convergence map. Second, Faster-RCNN detection network is employed. Region proposal network extracts features and determines locations of AD candidates and the soft classifier is used for reducing false positives. In 3D aggregation, a region fusion strategy is designed to fuse 2D candidates into 3D candidates. For evaluation, 265 DBT volumes (138 with ADs and 127 without any lesion) were collected from 68 patients. Free response receiver operating characteristic curve was obtained and the mean true positive fraction (MTPF) was used as the figure-of-merit of model performance. Compared with a baseline model based on convergence measure, the six-fold cross validation results showed that our proposed approach achieved MTPF of 0.50 +/- 0.04, while the baseline achieved 0.37 +/- 0.03. The improvement of our approach was statistically significant (p << 0.001).
Blockchain is the emerging technological field for the current era due to its advantages such as distributed computing, transparency, cryptography enabled secure communication and message as well as source integrity. ...
详细信息
In 1997, surveys of a group of introductory programming students, in a class with a predominance of repeat students (i.e., students who had previously failed the subject), provided an opportunity to establish a profil...
详细信息
In 1997, surveys of a group of introductory programming students, in a class with a predominance of repeat students (i.e., students who had previously failed the subject), provided an opportunity to establish a profile of the weakest students. These students were the `alienated' ones who had not wanted to do this course in the first place, had little motivation to learn programming, and were characterized by poor class attendance and low work output. In 1998 a new learning environment, tailored to these students' special needs, was implemented to encourage them to achieve success. Improvement was observed in many aspects of the learning behaviour of these students.
Task scheduling, a key part of increasing resource utilization and enhancing system performance, is a never outdated problem especially in cloud platforms and Cyber-Physical System (CPS). Based on the Value Density al...
详细信息
Problem-Based Learning (PBL) has been an effective technique in developing self-directed learning and problem-solving skills in students - especially in the medical school environment. This paper looks at some prelimi...
详细信息
Problem-Based Learning (PBL) has been an effective technique in developing self-directed learning and problem-solving skills in students - especially in the medical school environment. This paper looks at some preliminary results of an ethnographic study of students in a software development environment trying to use PBL. Our findings indicate that students need explicit training in group dynamics, students tend to rely excessively on existing knowledge, and they focus almost solely on product-related issues versus process-related ones. We then present some suggested improvements and future planned research.
暂无评论