Person re-identification (re-ID) gains plenty of achievements as a retrieval problem in constrained camera networks. However, most of the researches are concentrated on visual appearance, they still suffer from the co...
详细信息
We design and present an integral-type Zhang neurodynamics (ITZN) model for handling temporally-varying nonlinear system of equations (TVNSE). To investigate the disturbances inhibition of the model, the general form ...
We design and present an integral-type Zhang neurodynamics (ITZN) model for handling temporally-varying nonlinear system of equations (TVNSE). To investigate the disturbances inhibition of the model, the general form of the disturbed ITZN model is presented, and it is instantiated by introducing the constant disturbance, bounded random disturbance, and linear-form temporally-varying disturbance, resulting in three corresponding disturbed ITZN variants. Finally, by means of Lyapunov theory and Laplace transformation, we theoretically prove the globally exponential convergence of the ITZN model and the effective disturbances inhibition of the three disturbed ITZN variants.
Smart contracts are susceptible to being exploited by attackers, especially when facing real-world vulnerabilities. To mitigate this risk, developers often rely on third-party audit services to identify potential vuln...
详细信息
Structural clustering is one of the most popular graph clustering methods, which has achieved great performance improvement by utilizing GPUs. Even though, the state-of-the-art GPU-based structural clustering algorith...
详细信息
With the development of intelligent vehicles, the research on road condition monitoring has attracted much attention in the vehicular ad hoc network (VANET). The combination of VANET, cloud computing, and fog computin...
详细信息
Image camouflage has been utilized to create clean-label poisoned images for implanting backdoor into a DL model. But there exists a crucial limitation that one attack/poisoned image can only fit a single input size o...
详细信息
Overdue risk detection of consumer loans is a critical issue faced by consumer finance companies. Unlike other types of loans, such as mortgage loans and guaranteed loans, consumer loans only regard personal credit as...
Overdue risk detection of consumer loans is a critical issue faced by consumer finance companies. Unlike other types of loans, such as mortgage loans and guaranteed loans, consumer loans only regard personal credit as collateral. As a high overdue rate will result in economic losses to financial companies, it is of great significance for lenders to accurately detect risky customers. However, the large volume of credit data and the variety of customer characteristics make the risk detection via manual expert analysis rather challenging. Additionally, previous loan risk detection approaches based on machine learning classification neglect the relations between different customers, and traditional graph neural networks lack the exploration of loan overdue patterns. In this paper, we construct a heterogeneous graph based on real credit data from a consumer finance company. We analyze the distribution of meta-paths and propose a meta-path-based graph neural network that combines both lower-order and higher-order features. Experimental results show that our model is able to detect more risky customers by exploring overdue patterns and can achieve the best effect in the loan overdue detection task.
The Internet of Things (IoT) has the capability to support the synchronous transmission of dynamically sensed environmental status information to base stations. To improve transmission timeliness, previous studies hav...
详细信息
ISBN:
(数字)9798350355895
ISBN:
(纸本)9798350355901
The Internet of Things (IoT) has the capability to support the synchronous transmission of dynamically sensed environmental status information to base stations. To improve transmission timeliness, previous studies have commonly utilized Age of Information (AoI) as a metric for network performance. However, AoI falls short in capturing status synchronicity, as synchronization requires knowledge of updates from both the transmitter and the receiver, which AoI cannot reflect due to its inability to track changes at the transmitter. In this work, we adopt the Age of Synchronization (AoS) as a metric to quantify the time elapsed since the freshest information at the receiver becomes desynchronized. Specifically, we develop a model for an IoT communication network to derive closed-form expressions for the average peak AoS (PAoS) and average AoS, considering discrete geometric and uniformly distributed packet arrivals. Ad-ditionally, the analysis has been carried out for both first-come-first-served (FCFS) and last-come-first-served with preemptive resume (LCFS-PR) service disciplines. Within these results, we prove that network's synchronization performance worsens with longer packet arrival intervals but improves with higher arrival rates. LCFS-PR strategy makes synchronization independent of packet arrival, solely influenced by service rate. Additionally, AoS consistently remains lower than AoI in the same system, with both tending to converge as packet arrival rate rises.
The minimum spanning tree problem with diameter constraint is an important problem for many applications such as network design and reliability. The diameter constraint makes it be different from the common minimum sp...
详细信息
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no...
详细信息
ISBN:
(数字)9798350378658
ISBN:
(纸本)9798350378665
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a novel non-contact concentration measurement method based on deep learning. With the dataset collected by preparing the paste with different concentrations and taking photographs from the paste surface, a convolutional neural network is trained to extract the features from images and predict the concentration. The experiments indicate that the measurement accuracy is close to 88.79 % for the manual stirring paste dataset and 91.42 % for the automatic stirring paste dataset, which are sufficient in industrial applications. As a substitution of traditional concentration measurement instruments, the proposed vision-based concentration measurement method is non-contact and its accuracy is sufficient in industrial applications.
暂无评论