In this article we consider the filtering problem associated to partially observed diffusions, with observations following a marked point process. In the model, the data form a point process with observation times tha...
详细信息
In this article we consider Bayesian parameter inference for a type of partially observed stochastic Volterra equation (SVE). SVEs are found in many areas such as physics and mathematical finance. In the latter field ...
详细信息
Recently, Wang et al. proposed a computationally transferable authenticated key agreement protocol for smart healthcare by adopting the certificateless public-key cryptography. They claimed that their protocol could e...
Recently, Wang et al. proposed a computationally transferable authenticated key agreement protocol for smart healthcare by adopting the certificateless public-key cryptography. They claimed that their protocol could ensure privacy, resist various attacks, and possess superior properties. After analyzing their protocol, we find that it suffers from some flaws. Firstly, user privacy is not ensured as claimed. Secondly, some statements are inaccurate or missing. Thirdly, it cannot resist DoS attack. In this paper, the details of how these flaws threaten Wang et al.’s protocol are shown.
It has been shown that the intelligibility of noisy speech can be improved by speech enhancement (SE) algorithms. However, monaural SE has not been established as an effective frontend for automatic speech recognition...
详细信息
The task of image anomaly detection (IAD) aims to identify deviations from normality in image data. These anomalies are patterns that deviate significantly from what the IAD model has learned from the data during trai...
详细信息
This paper describes the implementation and evaluation of an RC polyphase filter (RCPF) and circuitry for measuring its frequency characteristics. The integrated circuit is fabricated on a 0.6 µm CMOS process and...
详细信息
This study introduces a novel diagnostic method for schizophrenia using causal discovery and node embedding techniques on resting-state fMRI data. Data from 148 subjects (27 schizophrenia patients, 121 healthy control...
详细信息
ISBN:
(数字)9798331532543
ISBN:
(纸本)9798331532550
This study introduces a novel diagnostic method for schizophrenia using causal discovery and node embedding techniques on resting-state fMRI data. Data from 148 subjects (27 schizophrenia patients, 121 healthy controls) were analyzed across 116 brain regions, applying several causal discovery techniques to assess directional connectivity and uncover schizophrenia-related patterns. By combining advanced causal discovery with node embedding techniques and a rigorous data-balancing pipeline, our method improves sensitivity to subtle network variations critical for schizophrenia diagnosis. Our approach addresses key challenges in the literature: the difficulty of extracting effective neurobiological markers from noisy and complex fMRI data, the limited interpretability of connectivity networks, and the imbalance in datasets that often skews classification performance. Experimental results demonstrate the pipeline's effectiveness in overcoming imbalanced data challenges and extracting features from noisy and complex data, with Regression Dynamic Causal Modeling (RDCM) achieving the highest classification metrics, including 90.06% accuracy and 89.09% sensitivity. This method identified 15 brain regions with strong diagnostic potential, offering improved sensitivity and specificity for schizophrenia diagnosis Compared to contemporary domain techniques.
Anomaly detection aims to identify data or behav-iors that are different from the usual patterns. In traditional anomaly detection settings, edge devices collect the data and send it to a centralized server for model ...
Anomaly detection aims to identify data or behav-iors that are different from the usual patterns. In traditional anomaly detection settings, edge devices collect the data and send it to a centralized server for model training, which faces two critical issues: (1) it risks data exposure during transmission; (2) it demands a large amount of network bandwidth for data transfer. To tackle these problems, we propose a Visual Federated Learning algorithm (VFLA) for anomalous behavior identification in the multi-UAVs system. To the best of our knowledge, we are the first to merge federated learning with video-based anomaly detection. VFLA consists of two phases: The initial phase is training a pseudo-label generator. UAVs collect a dataset and manually annotate it. This labeled data is then used to train the pseudo-label generator on the server, which is subsequently distributed back to the UAVs. The second phase is the federated learning-based anomaly detection model training. UAVs leverage the pseudo-label generator to automatically annotate the collected video footage. These annotated videos are fed into an anomaly detection network for training. Once the local training is completed, UAVs upload their local models to a server for federated aggregation. The global model is then redistributed to the UAVs for additional training rounds, until reach the target accuracy. Finally, we simulate the federated learning anomaly detection algorithm on the Shanghai-tech dataset, it demonstrates an average accuracy boost of 5.6% compared to baselines.
Investment is a lifetime work. Investing in stocks is a popular measure. However, investing in stocks is not easy, and losing money is not uncommon. We investigate if there is a systematic way to find buyable stocks a...
详细信息
Many knowledge-sharing activities take place in educational institutions, both formally and informally. If this activity is organized with good knowledge management, then this will support a faster knowledge sharing p...
详细信息
暂无评论