Maintaining phosphoric slurry within the optimal temperature range is of great significance in improving the quality of the phosphoric acid product. Due to the lack of integral parts and the limited number of expert r...
详细信息
The detection and classification of malware pose significant challenges in cybersecurity due to the ever-evolving nature of malicious threats. In this study, we propose a novel approach for classifying malware using d...
详细信息
作者:
Lokesh, GudivadaBaseer, K.K.
Dept. of Computer Science and Engineering Tirupati India
Department of Data Science Tirupati India
Clouds are highly customizable infrastructures that offer a platform as a service and let customers subscribe on a pay-as-you-go basis to their requirements. The straightforward service-oriented cloud computing model ...
详细信息
Latent force models (LFMs) are hybrid models combining mechanistic principles with non-parametric components. In this article, we shall show how LFMs can be equivalently formulated and solved using the state variable ...
详细信息
Latent force models (LFMs) are hybrid models combining mechanistic principles with non-parametric components. In this article, we shall show how LFMs can be equivalently formulated and solved using the state variable approach. We shall also show how the Gaussian process prior used in LFMs can be equivalently formulated as a linear statespace model driven by a white noise process and how inference on the resulting model can be efficiently implemented using Kalman filter and smoother. Then we shall show how the recently proposed switching LFM can be reformulated using the state variable approach, and how we can construct a probabilistic model for the switches by formulating a similar switching LFM as a switching linear dynamic system (SLDS). We illustrate the performance of the proposed methodology in simulated scenarios and apply it to inferring the switching points in GPS data collected from car movement data in urban environment.
Molecular dynamics simulations of rearrangement of atoms around the grain boundaries are carried out. The purpose of this study is to estimate the stability of grain boundaries and to observe their motion based on the...
详细信息
Molecular dynamics simulations of rearrangement of atoms around the grain boundaries are carried out. The purpose of this study is to estimate the stability of grain boundaries and to observe their motion based on the atomistic considerations, so that the results are able to be applied for multi-scale scheme such as the phase field model. First, the grain-boundary energy is calculated as a function of misorientation angle, which revealed that several specific angles exhibit cusp-like low values, for both symmetric and non-symmetric grain boundaries. Secondly, changes in morphology of a square grain embedded in a bulk single crystal are simulated. Grains surrounded by specific grain boundaries having low energy are stable and do not incorporate rotation or migration, while unstable grains change their shape or orientation. A circular-grain model is also applied for the simulations, and similar tendency is obtained. Finally, a simulation at a high temperature for the model which consist of a grain stable at low temperature is carried out, which reveals that grain contraction occurs resulting in disappearance of the grain.
Food adulteration, the act of mixing foodstuffs with lower-quality foodstuffs or other food and non-food items, has become a global issue, particularly in developing countries like Ethiopia. This is a significant prob...
详细信息
Exploiting parallelism to train deep learning models requires GPUs to cooperate through collective communication primitives. While systems like DGX, equipped with proprietary interconnects, have been extensively studi...
详细信息
Too much stress is easy to do harm to the physical and psychological health of teenagers, because most teenagers neither have the ability to cope with the stress by themselves nor like seeking adults' help initiat...
详细信息
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally...
详细信息
The Generalized Feistel Structure (GFS) generally uses the sub-block-wise cyclic shift in the permutation layer, the layer between the two F function layers. For Type 2 GFS, at FSE 2010, Suzaki and Mine-matsu showed t...
详细信息
暂无评论