It is very difficult to analyze and mine massive and high-dimensional data. Although the current hardware conditions have greatly improved, they still cannot meet the needs of large-scale, high-dimensional data. In me...
详细信息
The principle of multiplicity is introduced for the components of the investment planning process. Some algorithms are given that ensure the process of investment planning at the regional level: the formation of integ...
详细信息
Large-Scale Group Decision-Making, propelled by the advent of Large Language Models and the imperative for assertiveness in decision-making processes, emerges as a pivotal area of research. This paper navigates throug...
详细信息
The article deals with the issues of the implementation of the e-learning programs in the communities of the schoolstudents. There is specified the concept of “online community”, there is considered the classificati...
The article deals with the issues of the implementation of the e-learning programs in the communities of the schoolstudents. There is specified the concept of “online community”, there is considered the classification of the online communities. The authors describe the theoretical approaches to the development of the online course of computer Studies in the context of the introduction of the Federal State Educational Standards and the digital transformation of education at the example of the online course “Training of schoolstudents to the Basic State Examination of computer Studies”, implemented in Volgograd State Socio-Pedagogical University.
The article deals with the approaches of the definition of the blended learning. There are presented the components, defining the future teachers training to the implementation of the blended learning of computer Scie...
The article deals with the approaches of the definition of the blended learning. There are presented the components, defining the future teachers training to the implementation of the blended learning of computerscience. The authors describe the experience of the training of the students in the pedagogical university to the implementation of the blended learning at school.
The article deals with the issues of the organization of the project activities of computer Studies on the basis of the educational technopark. The authors describe the experience of the development of the online cour...
The article deals with the issues of the organization of the project activities of computer Studies on the basis of the educational technopark. The authors describe the experience of the development of the online course “The organization of the students project activities of computer Studies in the context of the educational technopark” with the technical assistance of the technopark in Volgograd State Socio-Pedagogical University.
The present paper introduces a mathematical model for the cross-talking between microRNA and Protein. Studying the qualitative properties of the proposed model, we infer that the microRNA is an inhibitor for the Prote...
详细信息
One of the significant challenges in treatment effect estimation is collider bias, a specific form of sample selection bias induced by the common causes of both the treatment and outcome. Identifying treatment effects...
详细信息
One of the significant challenges in treatment effect estimation is collider bias, a specific form of sample selection bias induced by the common causes of both the treatment and outcome. Identifying treatment effects under collider bias requires well-defined shadow variables in observational data, which are assumed to be related to the outcome and independent of the sample selection mechanism, conditional on the other observed variables. However, finding a valid shadow variable is not an easy task in real-world scenarios and requires domain-specific knowledge from experts. Therefore, in this paper, we propose a novel method that can automatically learn shadow-variable representations from observational data without prior knowledge. To ensure the learned representations satisfy the assumptions of the shadow variable, we introduce a tester to perform hypothesis testing in the representation learning process. We iteratively generate representations and test whether they satisfy the shadow-variable assumptions until they pass the test. With the help of the learned shadow-variable representations, we propose a novel treatment effect estimator to address collider bias. Experiments show that the proposed methods outperform existing treatment effect estimation methods under collider bias and prove their potential application value. Copyright 2024 by the author(s)
This paper presents ControlVideo for text-driven video editing — generating a video that aligns with a given text while preserving the structure of the source video. Building on a pre-trained text-to-image diffusion ...
详细信息
This paper presents ControlVideo for text-driven video editing — generating a video that aligns with a given text while preserving the structure of the source video. Building on a pre-trained text-to-image diffusion model, ControlVideo enhances the fidelity and temporal consistency by incorporating additional conditions(such as edge maps), and fine-tuning the key-frame and temporal attention on the source video-text pair via an in-depth exploration of the design space. Extensive experimental results demonstrate that ControlVideo outperforms various competitive baselines by delivering videos that exhibit high fidelity w.r.t. the source content, and temporal consistency, all while aligning with the text. By incorporating low-rank adaptation layers into the model before training, ControlVideo is further empowered to generate videos that align seamlessly with reference images. More importantly, ControlVideo can be readily extended to the more challenging task of long video editing(e.g., with hundreds of frames), where maintaining long-range temporal consistency is crucial. To achieve this, we propose to construct a fused ControlVideo by applying basic ControlVideo to overlapping short video segments and key frame videos and then merging them by pre-defined weight functions. Empirical results validate its capability to create videos across 140 frames, which is approximately 5.83 to 17.5 times more than what previous studies achieved. The code is available at https://***/thu-ml/controlvideo.
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn...
详细信息
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol.
暂无评论