We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the c...
详细信息
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the coupling strength via a unidirectional waveguide(IWG)can induce chaotic *** underlying reason for this phenomenon is that adjusting the phase and coupling strength via the phase shifter and IWG bring the system close to an exceptional point(EP),where field localization dynamically enhances the optomechanical nonlinearity,leading to the generation of chaotic *** addition,due to the sensitivity of chaos to phase in the vicinity of the EP,we propose a theoretical scheme to measure the optical phase perturbations using *** work may offer an alternative approach to chaos generation with current experimental technology and provide theoretical guidance for optical signal processing and chaotic secure communication.
Steel, being a widely utilized material in industrial production, holds a pivotal role in ensuring product safety and longevity. Hence, the exploration and implementation of steel surface defect detection technology c...
详细信息
The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic,highlighting the growing importance of network *** Detection Systems(IDS)are essential for safeguardin...
详细信息
The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic,highlighting the growing importance of network *** Detection Systems(IDS)are essential for safeguarding network *** address the low accuracy of existing intrusion detection models in identifying network attacks,this paper proposes an intrusion detection method based on the fusion of Spatial Attention mechanism and Residual Neural Network(SA-ResNet).Utilizing residual connections can effectively capture local features in the data;by introducing a spatial attention mechanism,the global dependency relationships of intrusion features can be extracted,enhancing the intrusion recognition model’s focus on the global features of intrusions,and effectively improving the accuracy of intrusion *** proposed model in this paper was experimentally verified on theNSL-KDD *** experimental results showthat the intrusion recognition accuracy of the intrusion detection method based on SA-ResNet has reached 99.86%,and its overall accuracy is 0.41% higher than that of traditional Convolutional Neural Network(CNN)models.
This research study analyzes six key factors in the education and teaching of IoT embedded direction: training objectives (which direction to teach), curriculum system (what to teach), teaching organization (how to te...
详细信息
This paper proposes a method for expanding the metadata of three-dimensional point cloud data using Large Language Models (LLMs). Currently, point cloud data plays a crucial role in various fields such as autonomous d...
详细信息
ISBN:
(纸本)9791188428137
This paper proposes a method for expanding the metadata of three-dimensional point cloud data using Large Language Models (LLMs). Currently, point cloud data plays a crucial role in various fields such as autonomous driving and medical image reconstruction, necessitating the expansion of metadata for efficient processing. Traditionally, metadata construction has relied on manual input, which is prone to errors. In this study, we propose a method that utilizes LLMs, particularly the Llama 3.1 model, to extract the center points of each class in the point cloud data and expand the metadata by adding these center points to the annotation files. By using center points, computational costs are reduced, and the performance of segmentation and detection models based on this data is improved. Copyright 2025 Global IT Research Institute (GIRI). All rights reserved.
This study discusses using Japanese candlestick (JC) patterns to predict future price movements in financial markets. The history of candlestick trading dates back to the 17th century and involves the analysis of patt...
详细信息
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based...
详细信息
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based intrusion detection systems can capture complex network behaviours,their“black-box”nature often limits trust and actionable insight for security *** study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules,thereby enhancing the detection of Distributed Denial of Service(DDoS)*** proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules-to extract decision criteria from a fully trained *** methodology was validated on two benchmark datasets,CICIDS2017 and *** rules were evaluated against conventional Security Information and Event Management Systems rules with metrics such as precision,recall,accuracy,balanced accuracy,and Matthews Correlation *** results demonstrate that xAI-derived rules consistently outperform traditional static ***,the most refined xAI-generated rule achieved near-perfect performance with significantly improved detection of DDoS traffic while maintaining high accuracy in classifying benign traffic across both datasets.
Depth model-based behavior estimation of human skeletal points is widely used in the field of behavior recognition. In order to improve the accuracy of behavior recognition, the complexity and computation of the desig...
详细信息
The purpose of this survey is to provide a comprehensive overview of recent advancements in text line segmentation and baseline detection techniques within the analysis of historical document images. Text line extract...
详细信息
Data augmentation plays a crucial role in enhancing the robustness and performance of machine learning models across various domains. In this study, we introduce a novel mixed-sample data augmentation method called Ra...
详细信息
暂无评论