This article deals with questions of organization online schoolchildren training using interactive posters as multidimensional didactic tools for a computerscience teacher. The concept of 'interactive posters'...
详细信息
Regarding delay-induced predator-prey models, much research has been done on delayed destabilization, but whether delays are stabilizing or destabilizing is a subtle issue. In this study, we investigate predator-prey ...
详细信息
Regarding delay-induced predator-prey models, much research has been done on delayed destabilization, but whether delays are stabilizing or destabilizing is a subtle issue. In this study, we investigate predator-prey dynamics affected by both delays and the Allee effect. We analyze the consequences of delays in different feedback mechanisms. The existence of a Hopf bifurcation is studied, and we calculate the value of the delay that leads to the Hopf bifurcation. Furthermore, applying the normal form theory and a center manifold theorem, we consider the direction and stability of the Hopf bifurcation. Finally, we present numerical experiments that validate our theoretical analysis. Interestingly, depending on the chosen delay mechanism, we find that delays are not necessarily destabilizing. The Allee effect generally increases the stability of the equilibrium, and when the Allee effect involves a delay term, the stabilization effect is more pronounced.
With the advancement of technology, data visualization has become one of the research hotspots. In big data analysis, data visualization is a very important means, and through visualization software, data related to s...
详细信息
In 2019,the novel coronavirus disease 2019(COVID-19)ravaged the *** of July 2021,there are about 192 million infected people worldwide and 4.1365 million *** present,the new coronavirus is still spreading and circulat...
详细信息
In 2019,the novel coronavirus disease 2019(COVID-19)ravaged the *** of July 2021,there are about 192 million infected people worldwide and 4.1365 million *** present,the new coronavirus is still spreading and circulating in many places around the world,especially since the emergence of Delta variant strains has increased the risk of the COVID-19 pandemic *** symptoms of COVID-19 are diverse,and most patients have mild symptoms,with fever,dry cough,and fatigue as the main manifestations,and about 15.7%to 32.0%of patients will develop severe *** are screened in hospitals or primary care clinics as the initial step in the therapy for *** transcription-polymerase chain reaction(PCR)tests are still the primary method for making the final diagnosis,in hospitals today,the election protocol is based on medical imaging because it is quick and easy to use,which enables doctors to diagnose illnesses and their effects more *** to this approach,individuals who are thought to have COVID-19 first undergo an X-ray session and then,if further information is required,a CT-scan *** methodology has led to a significant increase in the use of computed tomography scans(CT scans)and X-ray pictures in the clinic as substitute diagnostic methods for identifying *** provide a significant collection of various datasets and methods used to diagnose COVID-19,this paper provides a comparative study of various state-of-the-art *** impact of medical imaging techniques on COVID-19 is also discussed.
We present the Calculus of Temporal Influence, a simple logical calculus that allows reasoning about the behaviour of real-valued functions over time by making assertions that bound their values or the values of their...
详细信息
There has been an increase in attacks on mobile devices,such as smartphones and tablets,due to their growing *** malware is one of the most dangerous threats,causing both security breaches and financial *** malware is...
详细信息
There has been an increase in attacks on mobile devices,such as smartphones and tablets,due to their growing *** malware is one of the most dangerous threats,causing both security breaches and financial *** malware is likely to continue to evolve and proliferate to carry out a variety of cybercrimes on mobile *** malware specifically targets Android operating system as it has grown in *** rapid proliferation of Android malware apps poses a significant security risk to users,making static and manual analysis of malicious files ***,efficient identification and classification of Androidmalicious files is *** ConvolutionalNeuralNetwork(CNN)basedmethods have been proposed in this regard;however,there is still room for performance *** this work,we propose a transfer learning and stacking approach to efficiently detect the Android malware files by utilizing two wellknown machine learning models,ResNet-50 and Support Vector Machine(SVM).The proposed model is trained on the DREBIN dataset by transforming malicious APK files into grayscale *** model yields higher performance measures than state-of-the-art works on the DREBIN dataset,where the reported measures are accuracy,recall,precision,and F1 measures of 97.8%,95.8%,95.7%,and 95.7%,respectively.
The article deals with the approaches of the definition of the blended learning. There are presented the components, defining the future teachers training to the implementation of the blended learning of computer Scie...
The article deals with the approaches of the definition of the blended learning. There are presented the components, defining the future teachers training to the implementation of the blended learning of computerscience. The authors describe the experience of the training of the students in the pedagogical university to the implementation of the blended learning at school.
The article deals with the issues of the implementation of the e-learning programs in the communities of the schoolstudents. There is specified the concept of “online community”, there is considered the classificati...
The article deals with the issues of the implementation of the e-learning programs in the communities of the schoolstudents. There is specified the concept of “online community”, there is considered the classification of the online communities. The authors describe the theoretical approaches to the development of the online course of computer Studies in the context of the introduction of the Federal State Educational Standards and the digital transformation of education at the example of the online course “Training of schoolstudents to the Basic State Examination of computer Studies”, implemented in Volgograd State Socio-Pedagogical University.
Latent confounding bias and collider bias are two key challenges of causal inference in observational studies. Latent confounding bias occurs when failing to control the unmeasured covariates that are common causes of...
详细信息
Latent confounding bias and collider bias are two key challenges of causal inference in observational studies. Latent confounding bias occurs when failing to control the unmeasured covariates that are common causes of treatments and outcomes, which can be addressed by using the Instrumental Variable (IV) approach. Collider bias comes from non-random sample selection caused by both treatments and outcomes, which can be addressed by using a different type of instruments, i.e., shadow variables. However, in most scenarios, these two biases simultaneously exist in observational data, and the previous methods focusing on either one are inadequate. To the best of our knowledge, no approach has been developed for causal inference when both biases exist. In this paper, we propose a novel IV approach, Two-Stage Shadow Inclusion (2SSI), which can simultaneously address latent confounding bias and collider bias by utilizing the residual of the treatment as a shadow variable. Extensive experimental results on benchmark synthetic datasets and a real-world dataset show that 2SSI achieves noticeable performance improvement when both biases exist compared to existing methods. Copyright 2024 by the author(s)
The article deals with the issues of the organization of the project activities of computer Studies on the basis of the educational technopark. The authors describe the experience of the development of the online cour...
The article deals with the issues of the organization of the project activities of computer Studies on the basis of the educational technopark. The authors describe the experience of the development of the online course “The organization of the students project activities of computer Studies in the context of the educational technopark” with the technical assistance of the technopark in Volgograd State Socio-Pedagogical University.
暂无评论