Safety testing is a key method to ensure software quality. But the quality of the test depends on the level of the test engineers. The method of generating safety test cases based on state diagrams often perform poorl...
详细信息
Modern computer vision and AI algorithms have become highly effective in analyzing high-dimensional image and video content for various tasks. Recently, some have exploited the power of computer vision to develop chea...
详细信息
ISBN:
(数字)9798350387254
ISBN:
(纸本)9798350387261
Modern computer vision and AI algorithms have become highly effective in analyzing high-dimensional image and video content for various tasks. Recently, some have exploited the power of computer vision to develop cheating tools for video games, which pose a serious threat to the gaming community and the game industry. Using human pose estimation algorithms, these cheating tools can assist players by automatically targeting and shooting with very high precision and accuracy. Compared to classic cheating methods, these tools are generally much more undetectable as they can mimic real “competent” players. To counter this threat, we propose a machine learning-based approach that leverages the concept of adversarial attacks to generate perturbations that fool such human pose estimation algorithms, preventing cheaters from gaining unfair advantages. In this work, we first implement the video game cheating systems and then we propose and implement our solution. In the end, we use the cheating system to evaluate the efficiency of our proposed algorithms in defending against such cheating tools. Experimental results show that our algorithm can effectively deceive advanced human pose estimation algorithms by adding invisible perturbations to the characters in the video game, maintaining a fair and healthy gaming environment.
With extensive research and development in blockchain technology, the concern about scalability, security, and decentralization is still evident. Blockchain trilemma describes that it is realistically impossible to si...
详细信息
ISBN:
(数字)9798350351637
ISBN:
(纸本)9798350351644
With extensive research and development in blockchain technology, the concern about scalability, security, and decentralization is still evident. Blockchain trilemma describes that it is realistically impossible to simultaneously achieve a high level of decentralization, security, and scalability. However, new developments in the sector of blockchain are making progress in simultaneous achievement of these three aspects. Layer 1 blockchain is the base level of blockchain network architecture. It includes blockchain networks like Bitcoin, Ethereum, etc. However, the Layer 1 blockchain network faces scalability issues. Layer 2 blockchain is a network built on top of Layer 1 blockchain to help eliminate scalability issues. This paper presents a comparative analysis of Layer 1 and Layer 2 blockchain networks and different approaches to solving the blockchain trilemma in Layer 1 and Layer 2 blockchain networks. From the study, we found that Layer 2 blockchain networks are easier and faster to implement.
With the advent of various mobile IoT devices, a large amount of e-health record (EHR) data has been generated. This data has great potential to improve medical research. However, there are many challenges regarding t...
详细信息
Inpainting images becomes crucial, especially when dealing with the challenging LOKI zooplankton dataset. This research presents a novel framework for image inpainting, designed to optimize results through a systemati...
详细信息
The disruptive technology provided by large-scale pre-trained language models (LLMs) such as ChatGPT or GPT-4 has received significant attention in several application domains, often with an emphasis on high-level opp...
ISBN:
(纸本)9798350369663
The disruptive technology provided by large-scale pre-trained language models (LLMs) such as ChatGPT or GPT-4 has received significant attention in several application domains, often with an emphasis on high-level opportunities and concerns. This paper is the first examination regarding the use of LLMs for scientific simulations. We focus on four modeling and simulation tasks, each time assessing the expected benefits and limitations of LLMs while providing practical guidance for modelers regarding the steps involved. The first task is devoted to explaining the structure of a conceptual model to promote the engagement of participants in the modeling process. The second task focuses on summarizing simulation outputs, so that model users can identify a preferred scenario. The third task seeks to broaden accessibility to simulation platforms by conveying the insights of simulation visualizations via text. Finally, the last task evokes the possibility of explaining simulation errors and providing guidance to resolve them.
With the development of fine-grained multimodal sentiment analysis tasks, target-oriented multimodal sentiment (TMSC) analysis has received more attention, which aims to classify the sentiment of target with the help ...
详细信息
Graph Neural Networks (GNNs) are widely employed to derive meaningful node representations from graphs. Despite their success, deep GNNs frequently grapple with the oversmoothing issue, where node representations beco...
详细信息
The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of *** general,the mass–spring system is applied to real...
详细信息
The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of *** general,the mass–spring system is applied to real-time cloth simulation with three types of ***,hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness ***,to obtain stable behavior,constraint enforcement is used instead of maintenance of the force of each *** force computation involves a large sparse linear solving *** to the large computation,we implement a cloth simulation using adaptive constraint activation and deactivation techniques that involve the mass-spring system and constraint enforcement method to prevent excessive elongation of *** the same time,when the length of the spring is stretched or compressed over a defined threshold,adaptive constraint activation and deactivation method deactivates the spring and generate the implicit *** method that uses a serial process of the Central Processing Unit(CPU)to solve the system in every frame cannot handle the complex structure of cloth model in *** simulation utilizes the Graphic Processing Unit(GPU)parallel processing with compute shader in OpenGL Shading Language(GLSL)to solve the system *** this paper,we design and implement parallel method for cloth simulation,and experiment on the performance and behavior comparison of the mass-spring system,constraint enforcement,and adaptive constraint activation and deactivation techniques the using GPU-based parallel method.
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val...
详细信息
暂无评论