With the popularity of short video platforms, the number of single-view videos has increased significantly. Existing NeRF-based methods can reconstruct dynamic scenes in a single-view setting, but slow rendering speed...
详细信息
Landslide hazard susceptibility evaluation takes on critical significance in early warning and disaster prevention and *** order to solve the problems of poor effectiveness of landslide data and complex calculation of...
详细信息
Landslide hazard susceptibility evaluation takes on critical significance in early warning and disaster prevention and *** order to solve the problems of poor effectiveness of landslide data and complex calculation of weights for multiple evaluation factors in the existing landslide susceptibility evaluation models,in this study,a method of landslide hazard susceptibility evaluation is proposed by combining SBAS-InSAR(Small Baseline Subsets-Interferometric Synthetic Aperture Radar)and SSA-BP(Sparrow Search Algorithm-Back Propagation)neural network *** SBAS-InSAR technology is adopted to identify potential landslide hazards in the study area,update the cataloging data of landslide hazards,and 11 evaluation factors are chosen for constructing the SSA-BP model for training and *** Reservoir area is selected as a case study for *** indicated by the results,the application of SBAS-InSAR technology,combined with both ascending and descending orbit data,effectively addresses the incomplete identification of landslide hazards caused by geometric distortion of single orbit SAR data(e.g.,shadow,overlay,and perspective contraction)in deep canyon areas,thereby enabling the acquisition of up-to-date landslide hazard ***,in comparison to the conventional BP(Back Propagation)algorithm,the accuracy of the model constructed by the SSA-BP algorithm exhibits a significant increase,with mean squared error and mean absolute error reduced by 0.0142 and 0.0607,***,during the process of susceptibility evaluation,the SSA-BP model effectively circumvents the issue of considerable manual interventions in calculating the weight of evaluation *** area under the curve of this model reaches 0.909,surpassing BP(0.835),random forest(0.792),and the information value method(0.699).The risk of landslide occurrence in the Baihetan Reservoir area is positively correlated with slope,surface temperature,and deformation ra
Certificate revocation management is one of the primary tasks of Public key Infrastructure (PKI), and it is crucial to the security of PKI. Existing blockchain-based certificate revocation schemes commonly suffer from...
详细信息
ISBN:
(数字)9798350368550
ISBN:
(纸本)9798350368567
Certificate revocation management is one of the primary tasks of Public key Infrastructure (PKI), and it is crucial to the security of PKI. Existing blockchain-based certificate revocation schemes commonly suffer from time-consuming certificate status verification processes, relatively large storage overhead on the blockchain, and an increasing false positive rate in certificate status as the number of revoked certificates grows. To address these issues, this paper proposes a certificate revocation scheme called CertRV based on blockchain, cuckoo filter, and chameleon hash. Specifically, to improve certificate query efficiency, we construct a "CertRevokedCF" filter to store revoked certificates, and apply the chameleon hash algorithm on the blockchain to modify certificate status information, significantly reducing storage costs while still providing accurate certificate status information even when the filter produces false positive results. Finally, we implement and evaluate CertRV using smart contracts on Hyperledger Fabric. Theoretical analysis and experimental results demonstrate that our scheme outperforms other alternatives in terms of security and performance.
Recognizing emotions in dialogues is vital for effective human-computer interaction, yet remains a challenging task in Natural Language Processing (NLP). Previous studies in Emotion Recognition in Conversation (ERC) h...
详细信息
In the cultivating new engineering talents of information discipline, people tend to adopt virtual simulation to simulate production line scenes of enterprises' intelligent manufacturing so as to solve the problem...
详细信息
With the rapid advancement of the Internet of Things (IoT), its applications are becoming increasingly essential in actual application. Specifically, the recent surge in electric vehicles has spurred significant advan...
详细信息
Triangular meshes provide an efficient representation of 3D shapes. Various applications such as 3D simulation suffer from degradation in geometric quality. This paper proposes a novel Multi-stream Structure-Enhanced ...
详细信息
ISBN:
(数字)9781665410205
ISBN:
(纸本)9781665410212
Triangular meshes provide an efficient representation of 3D shapes. Various applications such as 3D simulation suffer from degradation in geometric quality. This paper proposes a novel Multi-stream Structure-Enhanced Network (MSE-Net) based on graph convolutional networks. The network uses multi-scale features besides vertex position to guide face normal filtering, which can better preserve the geometric feature during the denoising process. In contrast to former methods that focus on filtering vertex coordinate and face normal apart, MSE-Net innovatively fuses more structure features like face area, inner product between face normal and vertex normals, and the interior angles of face to guide the face normal and vertex position updating, utilizing the inherent structural characteristic of Mesh. Our method achieves state-of-the-art performance on several publicly available datasets, demonstrating its effectiveness.
For hyperspectral sub-pixel target detection tasks, conventional mixing model (CMM) is one of the most intensively used models. Despite the flexibility of CMM in terms of mixing coefficient, it is sometimes inappropri...
详细信息
In the robot-assisted minimally invasive surgery,if a collision occurs,the robot system program could be damaged,and normal tissues could be *** avoid collisions during surgery,a 3-dimensional collision avoidance meth...
详细信息
In the robot-assisted minimally invasive surgery,if a collision occurs,the robot system program could be damaged,and normal tissues could be *** avoid collisions during surgery,a 3-dimensional collision avoidance method is proposed in this *** proposed method is predicated on the design of 3 strategic vectors:the collision-with-instrument-avoidance(CI)vector,the collision-with-tissues-avoidance(CT)vector,and the constrained-control(CC)*** CI vector demarcates 3 specific directions to forestall collision among the surgical *** CT vector,on the other hand,comprises 2 components tailored to prevent inadvertent contact between the robot-controlled instrument and nontarget ***,the CC vector is introduced to guide the endpoint of the robot-controlled instrument toward the desired position,ensuring precision in its movements,in alignment with the surgical *** results verify the proposed collision avoidance method for robot-assisted minimally invasive *** code and data are available at https://***/cynerelee/collision-avoidance.
The industrial Internet of Things (IIoT) is changing our way of life and work. As the number of mobile devices connected to IIoT increases, users will face many security challenges such as insecure communication envir...
详细信息
The industrial Internet of Things (IIoT) is changing our way of life and work. As the number of mobile devices connected to IIoT increases, users will face many security challenges such as insecure communication environments. The certificateless signature (CLS) scheme can ensure the integrity and validity of data and provide secure identity authentication for the IIoT, and several pairing-free CLS schemes have been proposed in recent years. However, we find they are vulnerable to the signature forgery attack of malicious key generation centers by safety analysis, which does not realize the security they have claimed. To solve this problem, we show an improved CLS scheme that achieves anonymity and formally proves its security under the hardness of the discrete logarithm problem in the random oracle. Comprehensive performance analysis and comparison show that our scheme has less communication and computation costs with higher security, and our construction is suitable for scenarios with limited resources. Finally, we apply this scheme to construct a mutual identity authentication protocol in the healthcare IIoT environment. 2014 IEEE.
暂无评论