This paper studies the formation of final opinions for the Friedkin-Johnsen (FJ) model with a community of partially stubborn agents. The underlying network of the FJ model is symmetric and generated from a random gra...
详细信息
This study investigates whether high-resolution brain-functional connectivity, which is measured by using Electroencephalography (EEG) combined with Hilbert Huang Transform (HHT) can be useful in Alzheimer Disease Dia...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix suc...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix such *** propose an automated program repair method based on controlled text generation ***,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability ***,we perform static syntax analysis to expedite the patch verification *** effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ...
详细信息
A change in neuronal-action potential can generate a magnetically induced current during the release and propagation of intracellular *** better characterize the electromagnetic-induction effect,this paper presents an...
详细信息
A change in neuronal-action potential can generate a magnetically induced current during the release and propagation of intracellular *** better characterize the electromagnetic-induction effect,this paper presents an improved discrete Rulkov(ID-Rulkov)neuron model by coupling a discrete model of a memristor with sine memductance into a discrete Rulkov neuron *** ID-Rulkov neuron model possesses infinite invariant points,and its memristor-induced stability effect is evaluated by detecting the routes of period-doubling and Neimark-Sacker *** investigated the memristor-induced dynamic effects on the neuron model using bifurcation plots and firing ***,we theoretically expounded the memristor initial-boosting mechanism of infinite coexisting *** results show that the ID-Rulkov neuron model can realize diverse neuron firing patterns and produce hyperchaotic attractors that are nondestructively boosted by the initial value of the memristor,indicating that the introduced memristor greatly benefits the original neuron *** hyperchaotic attractors initially boosted by the memristor were verified by hardware experiments based on a hardware *** addition,pseudorandom number generators are designed using the ID-Rulkov neuron model,and their high randomness is demonstrated based onstrict test results.
computer vision(CV)was developed for computers and other systems to act or make recommendations based on visual inputs,such as digital photos,movies,and other *** learning(DL)methods are more successful than other tra...
详细信息
computer vision(CV)was developed for computers and other systems to act or make recommendations based on visual inputs,such as digital photos,movies,and other *** learning(DL)methods are more successful than other traditional machine learning(ML)methods *** techniques can produce state-of-the-art results for difficult CV problems like picture categorization,object detection,and face *** this review,a structured discussion on the history,methods,and applications of DL methods to CV problems is *** sector-wise presentation of applications in this papermay be particularly useful for researchers in niche fields who have limited or introductory knowledge of DL methods and *** review will provide readers with context and examples of how these techniques can be applied to specific areas.A curated list of popular datasets and a brief description of them are also included for the benefit of readers.
We present a faithful geometric picture for genuine tripartite entanglement of discrete, continuous, and hybrid quantum systems. We first find that the triangle relation Ei|jkα≤Ej|ikα+Ek|ijα holds for all subaddit...
详细信息
We present a faithful geometric picture for genuine tripartite entanglement of discrete, continuous, and hybrid quantum systems. We first find that the triangle relation Ei|jkα≤Ej|ikα+Ek|ijα holds for all subadditive bipartite entanglement measure E, all permutations under parties i,j,k, all α∈[0,1], and all pure tripartite states. Then, we rigorously prove that the nonobtuse triangle area, enclosed by side Eα with 0<α≤1/2, is a measure for genuine tripartite entanglement. Finally, it is significantly strengthened for qubits that given a set of subadditive and nonsubadditive measures, some state is always found to violate the triangle relation for any α>1, and the triangle area is not a measure for any α>1/2. Our results pave the way to study discrete and continuous multipartite entanglement within a unified framework.
Flame detection algorithms are crucial for real-time fire monitoring using surveillance cameras. Current flame detection algorithms perform excellently on color cameras;however, many night vision cameras can only capt...
详细信息
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi...
详细信息
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the *** recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the *** paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its ***,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers.
Skin segmentation participates significantly in various biomedical applications,such as skin cancer identification and skin lesion *** paper presents a novel framework for segmenting the *** framework contains two mai...
详细信息
Skin segmentation participates significantly in various biomedical applications,such as skin cancer identification and skin lesion *** paper presents a novel framework for segmenting the *** framework contains two main stages:The first stage is for removing different types of noises from the dermoscopic images,such as hair,speckle,and impulse noise,and the second stage is for segmentation of the dermoscopic images using an attention residual U-shaped Network(U-Net).The framework uses variational Autoencoders(VAEs)for removing the hair noises,the Generative Adversarial Denoising Network(DGAN-Net),the Denoising U-shaped U-Net(D-U-NET),and Batch Renormalization U-Net(Br-U-NET)for remov-ing the speckle noise,and the Laplacian Vector Median Filter(MLVMF)for removing the impulse *** the second main stage,the residual attention u-net was used for *** framework achieves(35.11,31.26,27.01,and 26.16),(36.34,33.23,31.32,and 28.65),and(36.33,32.21,28.54,and 27.11)for removing hair,speckle,and impulse noise,respectively,based on Peak Signal Noise Ratio(PSNR)at the level of(0.1,0.25,0.5,and 0.75)of *** framework also achieves an accuracy of nearly 94.26 in the dice score in the process of segmentation before removing noise and 95.22 after removing different types of *** experiments have shown the efficiency of the used model in removing noise according to the structural similarity index measure(SSIM)and PSNR and in the segmentation process as well.
暂无评论