In this paper, we propose hardware acceleration to improve a performance of scripting programming languages for embedded developments. Scripting programming languages enable more efficient software developments and sc...
详细信息
Prenatal depression,which can affect pregnant women’s physical and psychological health and cause postpartum depression,is increasing ***,it is essential to detect prenatal depression early and conduct an attribution...
详细信息
Prenatal depression,which can affect pregnant women’s physical and psychological health and cause postpartum depression,is increasing ***,it is essential to detect prenatal depression early and conduct an attribution *** studies have used questionnaires to screen for prenatal depression,but the existing methods lack *** diagnose the early signs of prenatal depression and identify the key factors that may lead to prenatal depression from questionnaires,we present the semantically enhanced option embedding(SEOE)model to represent questionnaire *** can quantitatively determine the relationship and patterns between options and *** first quantifies options and resorts them,gathering options with little difference,since Word2Vec is highly dependent on *** resort task is transformed into an optimization problem involving the traveling salesman ***,all questionnaire samples are used to train the options’vector using ***,an LSTM and GRU fused model incorporating the cycle learning rate is constructed to detect whether a pregnant woman is suffering from *** verify the model,we compare it with other deep learning and traditional machine learning *** experiment results show that our proposed model can accurately identify pregnant women with depression and reach an F1 score of *** most relevant factors of depression found by SEOE are also verified in the *** addition,our model is of low computational complexity and strong generalization,which can be widely applied to other questionnaire analyses of psychiatric disorders.
Earthquake damage prediction is vital to ensure occupants of buildings are not injured and substantial financial losses can be avoided. Algorithms based on machine learning are prevalent in this field. This study cond...
详细信息
Surveillance systems are vital for detecting and preventing crime, especially in urban environments where real-time monitoring is crucial. This research proposes an advanced surveillance system that combines proposed ...
详细信息
The underlying vertical components represented by vehicleto-everything networks will largely accelerate the advance of the 6th generation wireless communications [1]. In this context, a plethora of Internet-of-Vehicle...
The underlying vertical components represented by vehicleto-everything networks will largely accelerate the advance of the 6th generation wireless communications [1]. In this context, a plethora of Internet-of-Vehicles(IoV) applications have increasingly permeated our daily lives with the development of advocated intelligent connected vehicles [2].
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
Optical data storage(ODS)is a low-cost and high-durability counterpart of traditional electronic or mag-netic *** a means of enhancing ODS capacity,the multiple recording layer(MRL)method is more promising than other ...
详细信息
Optical data storage(ODS)is a low-cost and high-durability counterpart of traditional electronic or mag-netic *** a means of enhancing ODS capacity,the multiple recording layer(MRL)method is more promising than other approaches such as reducing the recording volume and multiplexing ***,the architecture of current MRLs is identical to that of recording data into physical layers with rigid space,which leads to either severe interlayer crosstalk or finite recording layers constrained by the short working distances of the ***,we propose the concept of hybrid-layer ODS,which can record optical information into a physical layer and multiple virtual layers by using high-orthogonality random *** the virtual layer,32 images are experimentally reconstructed through holog-raphy,where their holographic phases are encoded into 16 printed images and complementary images in the physical layer,yielding a capacity of 2.5 Tbit cm^(-3).A higher capacity is achievable with more virtual layers,suggesting hybrid-layer ODS as a possible candidate for next-generation ODS.
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion ...
详细信息
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion by filtering redundant features, thus alleviating the dimensional disaster problem and achieving efficient identification of malware families for proper classification. Malware authors use obfuscation technology to generate a large number of malware variants, which imposes a heavy analysis burden on security researchers and consumes a lot of resources in both time and space. To this end, we propose the MalFSM framework. Through the feature selection method, we reduce the 735 opcode features contained in the Kaggle dataset to 16, and then fuse on metadata features(count of file lines and file size)for a total of 18 features, and find that the machine learning classification is efficient and high accuracy. We analyzed the correlation between the opcode features of malicious samples and interpreted the selected features. Our comprehensive experiments show that the highest classification accuracy of MalFSM can reach up to 98.6% and the classification time is only 7.76 s on the Kaggle malware dataset of Microsoft.
Social networks have become essential platforms for information exchange and free expression. However, their open nature also facilitates the spread of harmful content, such as hate speech, cyberbullying, and offensiv...
详细信息
The upsurge in urbanization is depleting natural resources due to the wide usage of aggregates in construction, posing a menace to further progress. If the contemporary state persists, it becomes a threat for further ...
详细信息
暂无评论