Research on neuromorphic computing is driven by the vision that we can emulate brain-like computing capability, learning capability, and energy-efficiency in novel hardware. Unfortunately, this vision has so far been ...
详细信息
Research on neuromorphic computing is driven by the vision that we can emulate brain-like computing capability, learning capability, and energy-efficiency in novel hardware. Unfortunately, this vision has so far been pursued in a half-hearted manner. Most current neuromorphic hardware (NMHW) employs brain-like spiking neurons instead of standard artificial neurons.
This study examines the impact of variations in side-blowing airflow velocity on plasma generation,combustion wave propagation mechanisms,and surface damage in fused silica induced by a combined millisecond-nanosecond...
详细信息
This study examines the impact of variations in side-blowing airflow velocity on plasma generation,combustion wave propagation mechanisms,and surface damage in fused silica induced by a combined millisecond-nanosecond pulsed *** airflow rate and pulse delay are the main experimental *** evolution of plasma motion was recorded using ultrafast time-resolved optical *** experimental results demonstrate that the expansion velocities of the plasma and combustion wave are influenced differently by the sideblowing airflow at different airflow rates(0.2 Ma,0.4 Ma,and 0.6 Ma).As the flow rate of the sideblow air stream increases,the initial expansion velocities of the plasma and combustion wave gradually decrease,and the side-blow air stream increasingly suppresses the *** is important to note that the target vapor is always formed and ionized into plasma during the combined pulse laser ***,the side-blown airflow alone cannot completely clear the *** on the delay conditions,the pressure of the side-blowing airflow,the influence of inverse Bremsstrahlung radiation absorption and target surface absorption mechanisms can lead to a phenomenon known as the double combustion waves when using a nanosecond pulse *** simulation and experimental results are consistent,indicating the potential for further exploration of fused silica targets in the laser field.
Prenatal depression,which can affect pregnant women’s physical and psychological health and cause postpartum depression,is increasing ***,it is essential to detect prenatal depression early and conduct an attribution...
详细信息
Prenatal depression,which can affect pregnant women’s physical and psychological health and cause postpartum depression,is increasing ***,it is essential to detect prenatal depression early and conduct an attribution *** studies have used questionnaires to screen for prenatal depression,but the existing methods lack *** diagnose the early signs of prenatal depression and identify the key factors that may lead to prenatal depression from questionnaires,we present the semantically enhanced option embedding(SEOE)model to represent questionnaire *** can quantitatively determine the relationship and patterns between options and *** first quantifies options and resorts them,gathering options with little difference,since Word2Vec is highly dependent on *** resort task is transformed into an optimization problem involving the traveling salesman ***,all questionnaire samples are used to train the options’vector using ***,an LSTM and GRU fused model incorporating the cycle learning rate is constructed to detect whether a pregnant woman is suffering from *** verify the model,we compare it with other deep learning and traditional machine learning *** experiment results show that our proposed model can accurately identify pregnant women with depression and reach an F1 score of *** most relevant factors of depression found by SEOE are also verified in the *** addition,our model is of low computational complexity and strong generalization,which can be widely applied to other questionnaire analyses of psychiatric disorders.
In the digital age, image aesthetic quality assessment is essential in computer vision. We enhance the efficiency of no-reference image aesthetic quality assessment using the No-reference Perceptual Quality Prediction...
详细信息
In response to the issues of prolonged execution time and susceptibility to local optima in traditional Particle Swarm Optimization (PSO) algorithms for robotic arm trajectory planning, this paper proposes a 3-5-3 pol...
详细信息
Recently,many researches have created adversarial samples to enrich the diversity of training data for improving the text classification performance via reducing the loss incurred in the neural network ***,existing st...
详细信息
Recently,many researches have created adversarial samples to enrich the diversity of training data for improving the text classification performance via reducing the loss incurred in the neural network ***,existing studies have focused solely on adding perturbations to the input,such as text sentences and embedded representations,resulting in adversarial samples that are very similar to the original *** adversarial samples can not significantly improve the diversity of training data,which restricts the potential for improved classification *** alleviate the problem,in this paper,we extend the diversity of generated adversarial samples based on the fact that adding different disturbances between different layers of neural network has different *** propose a novel neural network with perturbation strategy(PTNet),which generates adversarial samples by adding perturbation to the intrinsic representation of each hidden layer of the neural ***,we design two different perturbation ways to perturb each hidden layer:1)directly adding a certain threshold perturbation;2)adding the perturbation in the way of adversarial *** above settings,we can get more perturbed intrinsic representations of hidden layers and use them as new adversarial samples,thus improving the diversity of the augmented training *** validate the effectiveness of our approach on six text classification datasets and demonstrate that it improves the classification ability of the *** particular,the classification accuracy on the sentiment analysis task improved by an average of 1.79%and on question classification task improved by 3.2%compared to the BERT baseline,respectively.
We propose a method to remove virtual point light sources (VPLs) in the scene to reduce the time overhead of lighting calculation for shading points in non-visually sensitive areas. We quantify the degree of light sti...
详细信息
Modular robot manipulators (MRMs) based on harmonic drive (HD) transmissions perform various target tasks in unknown environments, and the main challenge is to overcome the uncertain noise and controller errors of sys...
详细信息
Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial fea...
详细信息
Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial feature, are inefficient regarding training time. When confronted with the concept drift problem, they suffer from a sharp drop in attack accuracy within a short period due to their reliance on extensive, outdated training data. To address the above problems, this paper proposes a parallel website fingerprinting attack (APWF) that incorporates an attention mechanism, which consists of an attack model and a fine-tuning method. Among them, the APWF model innovatively adopts a parallel structure, fusing temporal features related to both the front and back of the fingerprint sequence, along with spatial features captured through channel attention enhancement, to enhance the accuracy of the attack. Meanwhile, the APWF method introduces isomorphic migration learning and adjusts the model by freezing the optimal model weights and fine-tuning the parameters so that only a small number of the target, samples are needed to adapt to web page changes. A series of experiments show that the attack model can achieve 83% accuracy with the help of only 10 samples per category, which is a 30% improvement over the traditional attack model. Compared to comparative modeling, APWF improves accuracy while reducing time costs. After further fine-tuning the freezing model, the method in this paper can maintain the accuracy at 92.4% in the scenario of 56 days between the training data and the target data, which is only 4% less loss compared to the instant attack, significantly improving the robustness and accuracy of the model in coping with conceptual drift.
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum m...
详细信息
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more *** secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS *** paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement *** this protocol,the secret sender stores the secret information using Pauli *** obtain their shares by measuring the product state ***,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum *** addition,the particles held by participants in the protocol do not contain any secret *** participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own *** the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the *** analysis indicates that the protocol is not vulnerable to retransmission interception and collusion ***,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.
暂无评论