Early and accurate lung cancer detection is crucial for improved patient outcomes. This research proposes a hybrid framework combining traditional image processing techniques and machine learning for enhanced lung can...
详细信息
Accurate and swift prediction of surrounding vehicle trajectories is essential for autonomous driving. Currently, numerous methods have achieved excellent accuracy in trajectory prediction but they often overlook the ...
详细信息
Existing unsupervised domain adaption approaches for cross-user Wearable Human Activity Recognition (WHAR) typically assume that users utilize the uni-modal sensor deployment configuration and cannot transfer across d...
详细信息
The world has witnessed tremendous increase in the use of social media platforms in the last decade. Posting and updating on such platforms have become a way for people to express their opinions, experiences, feelings...
详细信息
Spiking neural networks (SNNs) have the potential to simulate sparse and spatio-temporal dynamics observed in biological neurons, making them promising for achieving energy-efficient artificial general intelligence. W...
详细信息
Complex segregation occurs in a binary particle system with differing particle sizes and densities,particularly when the larger particles are heavier(S–D system,i.e.,size minus density system).Predicting the segregat...
详细信息
Complex segregation occurs in a binary particle system with differing particle sizes and densities,particularly when the larger particles are heavier(S–D system,i.e.,size minus density system).Predicting the segregation pattern driven by multiple mechanisms simultaneously is often *** study explores the segregation mechanisms in a quasi-2D circular drum containing a S–D system,realizing a transition between the S-core and Core-and-band patterns by adjusting the drum rotation *** the transition of the segregation pattern,only the S-core pattern chiefly driven by the percolation mechanism is initially *** the rotation speed increases,the buoyancy mechanism and particle diffusion gradually strengthen,jointly driving the formation of the Core-and-band pattern.A dimensionless strength ratio,λ=H/h,where H and h respectively represent the diffusion and buoyancy strengths at length scales,is introduced to elucidate this *** Core-and-band pattern emerges whenλreached 1.4.
Remote Photoplethysmography (rPPG) is a technique for remotely measuring physiological signals such as (HR). Compared to traditional contact-based measurements, HR estimation based on video recording of human face off...
详细信息
The rise of social media platforms on the internet has made combating hate speech and other abusive content more challenging. In this work, we investigate the effectiveness of deep learning techniques for abusive cont...
详细信息
As the Internet and information technology advance, safeguarding user personal data is critical. Traditional registration and key storage methods pose security risks like data breaches and centralized vulnerabilities....
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
暂无评论