Multimodal fusion has become an important research technique in neuroscience that completes downstream tasks by extracting complementary information from multiple modalities. Existing multimodal research on brain netw...
Multimodal fusion has become an important research technique in neuroscience that completes downstream tasks by extracting complementary information from multiple modalities. Existing multimodal research on brain networks mainly focuses on two modalities, structural connectivity (SC) and functional connectivity (FC). Recently, extensive literature has shown that the relationship between SC and FC is complex and not a simple one-to-one mapping. The coupling of structure and function at the regional level is heterogeneous. However, all previous studies have neglected the modal regional heterogeneity between SC and FC and fused their representations via "simple patterns", which are inefficient ways of multimodal fusion and affect the overall performance of the model. In this paper, to alleviate the issue of regional heterogeneity of multimodal brain networks, we propose a novel Regional Heterogeneous multimodal Brain networks Fusion Strategy (RH-BrainFS). Briefly, we introduce a brain subgraph networks module to extract regional characteristics of brain networks, and further use a new transformer-based fusion bottleneck module to alleviate the issue of regional heterogeneity between SC and FC. To the best of our knowledge, this is the first paper to explicitly state the issue of structural-functional modal regional heterogeneity and to propose a solution. Extensive experiments demonstrate that the proposed method outperforms several state-of-the-art methods in a variety of neuroscience tasks. The codes are available at https://***/Yedaxia1/RH-BrainFS.
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for grid computing systems..
Translation efforts from natural language to code generation have achieved great success with large pre-trained language models. However, selecting the correct code output for the problem posed by the generated set of...
详细信息
ISBN:
(数字)9798350376548
ISBN:
(纸本)9798350376555
Translation efforts from natural language to code generation have achieved great success with large pre-trained language models. However, selecting the correct code output for the problem posed by the generated set of candidate codes is still challenging. In this paper, we address this problem by proposing an outcome-based quality-aware reordering method for code selection. This method scores each code by whether the set of candidate codes passes the test cases or not as a reference to select the top k best code outputs. In addition, this method depends on the quality and number of test cases. However, it is impractical to manually create a large number of test cases for each problem, so this paper adopts an automated approach that utilizes the current model to generate test cases for each problem. The experimental results show that the approach proposed in this paper obtains a significant improvement in the pass@k benchmark for each model, and the correctness and quality of test cases generated automatically using the model are discussed experimentally. Summarizing the experimental results and discussions, the result-based quality-aware reordering method proposed in this paper achieves a significant improvement in solving the problem of selecting the correct output from natural language to code generation, effectively improves the accuracy of evaluation by automating the generation of test cases, and provides an effective solution to improving the correctness of code generation.
Imitation learning (IL) is a framework that learns to imitate expert behavior from demonstrations. Recently, IL shows promising results on high dimensional and control tasks. However, IL typically suffers from sample ...
详细信息
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leak...
详细信息
ISBN:
(纸本)9781424476718
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leakage-resilient IB-HPS based on a simple assumption and also prove its security by the variant of dual system encryption. Then, based on our IB-HPS scheme, we construct directly an efficient leakage-resilient identity-based encryption(IBE) scheme in the model.
The concept of using node-based sampling for the treatment of packet capture mechanism based on Libpcap of network-based detecting Peer-to-Peer botnet process was tested, and its effect on the time window of feature e...
详细信息
Target detection of aerial images has become a frontier subject of concern in the image processing field. Using existing method to detect and classify large-scale building objects in aerial images, the accuracy is sti...
详细信息
A robust optical flow-based visual odometry method using a single onboard camera is proposed in this paper. To improve the quality of the noisy optical flows, a correction method across multiple frames is developed. F...
详细信息
A robust optical flow-based visual odometry method using a single onboard camera is proposed in this paper. To improve the quality of the noisy optical flows, a correction method across multiple frames is developed. Furthermore, the optical flows in the plane at infinity are detected and removed as these optical flows have very low signal to noise ratio for robot translation estimation. Finally, a RANSAC approach for robot ego-motion estimation is proposed. Physical experiments are carried out and the results show that the proposed method is able to estimate the camera trajectory robustly with reasonable accuracy.
Reliable broadcasting for a network can be obtained by using completely independent spanning trees(CISTs). Locally twisted cubes are popular networks which have been studied widely in the literature. In this paper, we...
详细信息
ISBN:
(纸本)9781467393010
Reliable broadcasting for a network can be obtained by using completely independent spanning trees(CISTs). Locally twisted cubes are popular networks which have been studied widely in the literature. In this paper, we study the problem of using CISTs to establish reliable broadcasting in locally twisted cubes. We first propose an algorithm, named LTQCIST, to construct two CISTs in locally twisted cubes, then exemplify the construction procedures to construct CISTs. Finally, we prove the correctness of Algorithm LTQCIST and simulate CISTs with JUNG.
With the deeply research on intrusion detection techniques and the widely use of intrusion detection products, the study of evaluation techniques of intrusion detection systems became important. In the paper, relative...
详细信息
ISBN:
(纸本)7900719229
With the deeply research on intrusion detection techniques and the widely use of intrusion detection products, the study of evaluation techniques of intrusion detection systems became important. In the paper, relative works of the evaluation of intrusion detection systems was introduced. The primary aspects of intrusion detection systems in an evaluation were discussed. An evaluation system for intrusion detection systems was proposed. In the system, a supervisor module controls the whole system. The supervisor module schedules the traffic control module and the attack emulation module. The data in the evaluation environment are recorded and input to the evaluation module. The functions such as emulation of network traffic and host usage, emulation of attacks and evaluation report generation are implemented.
暂无评论