The agriculture industry's production and food quality have been impacted by plant leaf diseases in recent years. Hence, it is vital to have a system that can automatically identify and diagnose diseases at an ini...
详细信息
Classifying requirements in data-intensive systems based on their interactions can assist the requirements engineering process in becoming more systematic and transparent, resulting in higher requirement compliance an...
详细信息
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research *** paper proposes a data forwarding algorithm based on Multidimensional Social Relatio...
详细信息
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research *** paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this *** proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among *** new metrics are defined:the intensity of node social relationships,node activity,and community *** the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node *** a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between *** proposed algorithm was compared to three existing routing algorithms in simulation *** indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context.
Recently, single-image SVBRDF capture is formulated as a regression problem, which uses a network to infer four SVBRDF maps from a flash-lit image. However, the accuracy is still not satisfactory since previous approa...
详细信息
Recently, single-image SVBRDF capture is formulated as a regression problem, which uses a network to infer four SVBRDF maps from a flash-lit image. However, the accuracy is still not satisfactory since previous approaches usually adopt endto-end inference strategies. To mitigate the challenge, we propose “auxiliary renderings” as the intermediate regression targets, through which we divide the original end-to-end regression task into several easier sub-tasks, thus achieving better inference accuracy. Our contributions are threefold. First, we design three (or two pairs of) auxiliary renderings and summarize the motivations behind the designs. By our design, the auxiliary images are bumpiness-flattened or highlight-removed, containing disentangled visual cues about the final SVBRDF maps and can be easily transformed to the final maps. Second, to help estimate the auxiliary targets from the input image, we propose two mask images including a bumpiness mask and a highlight mask. Our method thus first infers mask images, then with the help of the mask images infers auxiliary renderings, and finally transforms the auxiliary images to SVBRDF maps. Third, we propose backbone UNets to infer mask images, and gated deformable UNets for estimating auxiliary targets. Thanks to the well designed networks and intermediate images, our method outputs better SVBRDF maps than previous approaches, validated by the extensive comparisonal and ablation experiments. IEEE
The detection of road defects is crucial for ensuring vehicular safety and facilitating the prompt repair of roadway imperfections. Existing YOLOv8-based models face the following issues: extraction capabilities and i...
详细信息
This paper presents a novel two-stage progressive search approach with unsupervised feature learning and Q-learning (TSLL) to enhance surrogate-assisted evolutionary optimization for medium-scale expensive problems. T...
详细信息
Entity matching is a crucial aspect of data management systems, requiring the identification of real-world entities from diverse expressions. Despite the human ability to recognize equivalences among entities, machine...
详细信息
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelatedd...
详细信息
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelateddata in the face-to-face physical teaching environment is usually sparsity,and the sample size is *** makes building models to predict students’performance accurately in such an environment even *** paper proposes a Two-WayNeuralNetwork(TWNN)model based on the bidirectional recurrentneural network and graph neural network to predict students’next semester’s course performance using only theirprevious course *** experiments on a real dataset show that our model performs better thanthe baselines in many indicators.
MXenes obtained significant attention in the field of energy storage devices due to their characteristic layered structure,modifiable surface functional groups,large electrochemically active surface,and regulable inte...
详细信息
MXenes obtained significant attention in the field of energy storage devices due to their characteristic layered structure,modifiable surface functional groups,large electrochemically active surface,and regulable interlayer ***,the self-restacking and sluggish ions diffusion kinetics performance of MXenes during the alkali metal ions insertion/extraction process severely impedes their cycle stability and rate *** paper proposes an aniline molecule welding strategy for welding p-phenylenediamine(PPDA) into the interlayers of Ti2C through a dehydration condensation *** welded PPDA molecules can contribute pillar effect to the layered structure of *** pillar effect effectively maintains the structural stability during the sodium ions insertion/extraction process and effectively expands the interlayer spacing of Ti2C from 1.16 to 1.38 nm,thereby enhancing ions diffusion kinetics performance and improving the long-term cycle *** Ti2C-PPDA demonstrates outstanding Na+storage capability,exhibiting a specific capacity of 100.2 mAh·g-1at a current density of 0.1 A·g-1over 960 cycles and delivering a remarkable rate capability 81.2 mAh·g-1at a current density of 5 A·*** study demonstrates that expanding interlayer spacing is a promising strategy to enhance the Na+storage capacity and improve long-term cycling stability,which provides significant guidance for the design of two-dimensional Na+storage materials with high-rate capability and cycle stability.
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion ...
详细信息
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion by filtering redundant features, thus alleviating the dimensional disaster problem and achieving efficient identification of malware families for proper classification. Malware authors use obfuscation technology to generate a large number of malware variants, which imposes a heavy analysis burden on security researchers and consumes a lot of resources in both time and space. To this end, we propose the MalFSM framework. Through the feature selection method, we reduce the 735 opcode features contained in the Kaggle dataset to 16, and then fuse on metadata features(count of file lines and file size)for a total of 18 features, and find that the machine learning classification is efficient and high accuracy. We analyzed the correlation between the opcode features of malicious samples and interpreted the selected features. Our comprehensive experiments show that the highest classification accuracy of MalFSM can reach up to 98.6% and the classification time is only 7.76 s on the Kaggle malware dataset of Microsoft.
暂无评论