The resolution of ocean reanalysis datasets is generally low because of the limited resolution of their associated numerical ***-resolution ocean reanalysis datasets are therefore usually interpolated to provide an in...
详细信息
The resolution of ocean reanalysis datasets is generally low because of the limited resolution of their associated numerical ***-resolution ocean reanalysis datasets are therefore usually interpolated to provide an initial or boundary field for higher-resolution regional ocean ***,traditional interpolation methods(nearest neighbor interpolation,bilinear interpolation,and bicubic interpolation)lack physical constraints and can generate significant errors at land-sea boundaries and around *** this paper,a machine learning method is used to design an interpolation algorithm based on Gaussian process *** method uses a multiscale kernel function to process two-dimensional space meteorological ocean processes and introduces multiscale physical feature information(sea surface wind stress,sea surface heat flux,and ocean current velocity).This greatly improves the spatial resolution of ocean features and the interpolation *** eff ectiveness of the algorithm was validated through interpolation experiments relating to sea surface temperature(SST).The root mean square error(RMSE)of the interpolation algorithm was 38.9%,43.7%,and 62.4%lower than that of bilinear interpolation,bicubic interpolation,and nearest neighbor interpolation,*** interpolation accuracy was also significantly better in off shore area and around *** algorithm has an acceptable runtime cost and good temporal and spatial generalizability.
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the fe...
详细信息
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the feature space between natural and adversarial examples hinders the accuracy and robustness of the model in adversarial *** paper proposes a learnable distribution adversarial training method,aiming to construct the same distribution for training data utilizing the Gaussian mixture *** distribution centroid is built to classify samples and constrain the distribution of the sample *** natural and adversarial examples are pushed to the same distribution centroid to improve the accuracy and robustness of the *** proposed method generates adversarial examples to close the distribution gap between the natural and adversarial examples through an attack algorithm explicitly designed for adversarial *** algorithm gradually increases the accuracy and robustness of the model by scaling ***,the proposed method outputs the predicted labels and the distance between the sample and the distribution *** distribution characteristics of the samples can be utilized to detect adversarial cases that can potentially evade the model *** effectiveness of the proposed method is demonstrated through comprehensive experiments.
With the increasing demand for space situational awareness and space environment monitoring, space target discovery, tracking, identification and classification technologies have been developed accordingly. At present...
详细信息
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced ...
详细信息
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced to guarantee the confidentiality, integrity and unforgeability of transmitted messages. Nevertheless, the existing signcryption schemes fail to achieve a balance between security and efficiency. In this paper, we construct a Chinese remainder theorem (CRT) empowered certificateless aggregate signcryption scheme with key agreement (CASKA-CRT). As the vehicle joins and leaves dynamically, the proposed scheme can ensure the dynamic security via one modulo division operation. Besides, the certificateless aggregate signcryption and key agreement mechanisms are embedded. The former idea can both address the certificate management and key escrow problems, while the latter technology can create authentication as a premise of secure communication. Based on this construction, the hash-to-group operation and bilinear pairing are avoided, to realize a faster verification with the increased number of messages. Moreover, the security of proposed scheme is proved under the random oracle model. Finally, the performance analysis demonstrates the advantage of CASKA-CRT in terms of security and reliability over related works. IEEE
The Global Chinese Chemical engineering Symposium(GCCES)is a prestigious and world-wide platform for the communication and academic exchange of chemical science and *** special issue is a collection of the keynote lec...
详细信息
The Global Chinese Chemical engineering Symposium(GCCES)is a prestigious and world-wide platform for the communication and academic exchange of chemical science and *** special issue is a collection of the keynote lectures presented by the winners of Future Chemical engineering Scholars,the Global Award for Outstanding Young Female Chemical Engineers,and the International Award for Outstanding Young Chemical Engineers,selected by the International Scientific Committee of the GCCES.
The dynamic dashpot models are widely used in EDEM commercial ***,most dashpot models suffer from a serious numerical issue in calculating the granular chain because the denominator of damping force includes the initi...
详细信息
The dynamic dashpot models are widely used in EDEM commercial ***,most dashpot models suffer from a serious numerical issue in calculating the granular chain because the denominator of damping force includes the initial impact ***,the existing dynamic dashpot models extended from the original Hertz contact law overestimated the contact stiffness in the elastoplastic contact *** two reasons above result in most dynamic dashpot models confronting some issues in calculating the multiple collision of the granular ***,this investigation aims to propose a new composite dynamic dashpot model for the dynamic simulation of granular ***,the entire contact process is divided into three different phases:elastic,elastoplastic,and full plastic *** Hertz contact stiffness is still used in the elastic contact phase when the contact comes into the elastoplastic or full plastic *** contact stiffness in the dynamic dashpot model is replaced by linearizing the contact stiffness from the Ma‐Liu(ML)model in each time ***,the whole contact behavior is treated as a linear mass‐spring‐damper model,and the damping factor is obtained by solving the single‐degree‐freedom underdamped vibration *** new dynamic dashpot model is proposed by combining the contact stiffnesses in different contact phases and corresponding damping factors,which not only removes the initial im-pact velocity from the denominator of damping force but also updates the contact stiffness based on the constitutive relation of the contact body when the contact comes into the elastoplastic or full plastic ***,a granular chain is treated as numerical examples to check the reasonability and effectiveness of the new dynamic dashpot model by comparing it to the experimental *** simulation shows that the solitary waves obtained using the new dashpot model are more accurate than the dashpot model used in EDEM software.
Few-shot multi-label recognition (FS-MLR) presents a significant challenge due to the need to assign multiple labels to images with limited examples. Existing methods often struggle to balance the learning of novel cl...
详细信息
Direct numerical simulations of two-dimensional gravity currents with small and medium density variations are performed using different non-Boussinesq buoyancy approximations. Taking the full low-Machnumber approximat...
详细信息
Direct numerical simulations of two-dimensional gravity currents with small and medium density variations are performed using different non-Boussinesq buoyancy approximations. Taking the full low-Machnumber approximation as the reference, the accuracy of several buoyancy terms are examined. It is found that all considered buoyancy terms performed well in the cases with small density variation. In the cases with medium density variation, the classical gravitational Boussinesq’s buoyancy term showed the lack of accuracy, and a simple correction did not make any improvement. In contrast, the recently introduced second-order buoyancy term showed a significantly higher accuracy. The present results and our previous derivations indicate that simple algebraic buoyancy approximations extended from the Boussinesq’s gravitational buoyancy are unlikely to achieve an accuracy beyond first order. Instead, it seems necessary to solve at least one extra Poisson equation for buoyancy terms to capture the higher-order baroclinic effect. An approximate analysis is also provided to show the leading term of the non-Boussinesq effect corresponding to gravity.
Quantum software testing concentrates on testing quantum programs to discover quantum faults in the programs cost-effectively. Given the foundations in quantum mechanics, the way quantum computations are performed is ...
Quantum software testing concentrates on testing quantum programs to discover quantum faults in the programs cost-effectively. Given the foundations in quantum mechanics, the way quantum computations are performed is significantly different than classical computing. Therefore, quantum software testing also differs from classical software testing. There has been quite an interest in building quantum software testing techniques since 2019 in the softwareengineering (SE) community. Thus, we aim to introduce quantum software testing to the SE community. In particular, we will present the basic foundations of quantum computing and quantum programming as circuits, followed by the current state of the art on quantum software testing. Next, we will present some basic quantum software testing techniques and finally give the research directions that deserve attention from the SE community.
Aiming at improving low accuracy of existing person re-identification algorithms in dealing with low image resolution, different illumination, diverse poses, and viewing angles, this paper proposes a person re-id algo...
详细信息
暂无评论