Salient object detection (SOD) is a key preprocessing step in various computervision tasks, aiming to replicate the human visual system to identify the most significant objects or regions in images or videos. However...
详细信息
Currently, TPACK, as a teacher guidance framework, has received widespread attention from scholars both domestically and internationally. In order to elucidate the current status, focal points, and evolutionary patter...
详细信息
ISBN:
(纸本)9798400711732
Currently, TPACK, as a teacher guidance framework, has received widespread attention from scholars both domestically and internationally. In order to elucidate the current status, focal points, and evolutionary patterns of worldwide TPACK research, the present study utilized CiteSpace visualization analysis software and HistCite software for examining the authors, institutions, countries/regions, keywords, citation clustering, and citation emergence involved in TPACK research. Findings reveal that starting from 2009, there has been a steady increase in the annual publication volume of TPACK research, with close cooperation between research institutions and countries, but weak communication among researchers. Research hotspots include pediatric content knowledge, framework, packaging, and education; Multi angle measurement of TPACK, diversified definition of "situational" factors, emphasizing teacher teaching beliefs and teacher TPACK development may become a future development trend.
Blockchain has been envisioned as an anonymous cryptocurrency framework and can be applied in various applications such as e-payment, share economics, and distributed ledger. Although an account is anonymous, privacy ...
详细信息
ISBN:
(数字)9798350381993
ISBN:
(纸本)9798350382006
Blockchain has been envisioned as an anonymous cryptocurrency framework and can be applied in various applications such as e-payment, share economics, and distributed ledger. Although an account is anonymous, privacy in terms of consumption behaviors still imposes leakage risks. For example, an adversary may infer the consumption capability related to an account further by analyzing the history of consumption records. It is thus of critical importance to design a solution to preserve the anonymity of both transaction amount and transaction peer’s identity, which is changeable because the amount must be still authenticated in anonymity. In this paper, we propose a scheme by using Pedersen commitment to anonymize the transaction amount, and together using ring signature to conceal the transaction peer’s identity while maintaining authentication. Especially, we further improve the security of anonymous authentication enabled by ring signature by introducing accountability, which can defend against double-spending attacks by penalization and empower auditability. The extensive performance and security analysis justify the applicability of the proposed scheme.
Medical image segmentation is crucial for identifying and measuring lesions and tumors, but acquiring high-quality annotated images is costly and challenging. To address this issue, we propose the Edge Harmony Attenti...
详细信息
Domain adaptation is crucial to adapt a learned model to new scenarios, such as domain shifts or changing data distributions. Current approaches usually require a large amount of labeled or unlabeled data from the shi...
详细信息
In this paper, we address the unexplored question of temporal sentence localization in human motions (TSLM), aiming to locate a target moment from a 3D human motion that semantically corresponds to a text query. Consi...
详细信息
Information technology education contributes to the development of national education. Understanding the research status of information technology education at home and abroad is helpful to the implementation of educa...
详细信息
Accurate parasitic capacitance extraction becomes increasingly essential in advanced technology nodes. 2.5D ex-traction requires more effort to maintain accuracy comparable to the 3D solver. In this work, two experime...
详细信息
ISBN:
(数字)9798350352030
ISBN:
(纸本)9798350352047
Accurate parasitic capacitance extraction becomes increasingly essential in advanced technology nodes. 2.5D ex-traction requires more effort to maintain accuracy comparable to the 3D solver. In this work, two experiments reveal that error deviation in the 2.5D method enlarges as wire width shrinks and length increases. A novel Gauss law-based point cloud is proposed to model the 3D capacitance problem. With the proposed data representation, a transformer-based neural network architecture, called PCT-Cap, is designed for 3D pattern matching. PCT-Cap exhibits much better performance than the ResNet-based capacitance models. Extensive experiments on 28nm technology demonstrate that PCT-Cap can accurately predict over 95.41 % of total capacitance with an error margin of less than 5 %. Additionally, PCT-Cap achieves 95.90 % accuracy in predicting coupling capacitance within a margin of error of less than 10%. PCT-Cap achieves at least a 55 × speeding up compared with the commercial extraction tool while consuming negligible memory.
The rich spatio-temporal information is crucial to capture the complicated target appearance variations in visual tracking. However, most top-performing tracking algorithms rely on many hand-crafted components for spa...
详细信息
Although deep neural networks enable impressive visual perception performance for autonomous driving, their robustness to varying weather conditions still requires attention. When adapting these models for changed env...
详细信息
暂无评论