Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle *** and propagation processes are illustrated for pentadisperse and triadisperse particle systems,*** these proce...
详细信息
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle *** and propagation processes are illustrated for pentadisperse and triadisperse particle systems,*** these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse *** examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse *** also consider the distribution characteristics of the average coordination number and average velocity for the moving *** results support that the polydisperse particle systems are more stable in the T2 stage.
With the popularity of online learning in educational settings, knowledge tracing(KT) plays an increasingly significant role. The task of KT is to help students learn more effectively by predicting their next mastery ...
详细信息
With the popularity of online learning in educational settings, knowledge tracing(KT) plays an increasingly significant role. The task of KT is to help students learn more effectively by predicting their next mastery of knowledge based on their historical exercise sequences. Nowadays, many related works have emerged in this field, such as Bayesian knowledge tracing and deep knowledge tracing methods. Despite the progress that has been made in KT, existing techniques still have the following limitations: 1) Previous studies address KT by only exploring the observational sparsity data distribution, and the counterfactual data distribution has been largely ignored. 2) Current works designed for KT only consider either the entity relationships between questions and concepts, or the relations between two concepts, and none of them investigates the relations among students, questions, and concepts, simultaneously, leading to inaccurate student modeling. To address the above limitations,we propose a graph counterfactual augmentation method for knowledge tracing. Concretely, to consider the multiple relationships among different entities, we first uniform students, questions, and concepts in graphs, and then leverage a heterogeneous graph convolutional network to conduct representation *** model the counterfactual world, we conduct counterfactual transformations on students’ learning graphs by changing the corresponding treatments and then exploit the counterfactual outcomes in a contrastive learning framework. We conduct extensive experiments on three real-world datasets, and the experimental results demonstrate the superiority of our proposed Graph CA method compared with several state-of-the-art baselines.
Thanks to the rapid development of naked-eye 3D and wireless communication technology,3D video related applications on mobile devices have attracted a lot of ***,the time-varying characteristics of the wireless channe...
详细信息
Thanks to the rapid development of naked-eye 3D and wireless communication technology,3D video related applications on mobile devices have attracted a lot of ***,the time-varying characteristics of the wireless channel is very challenging for conventional source-channel coding based transmission ***,the high complexity of source-channel coding based transmission scheme is undesired for low power mobile *** advanced transmission scheme named Softcast was proposed to achieve efficient transmission performance for 2D image/***,it cannot be directly applied to wireless 3D video transmission with high *** paper proposes a more efficient soft transmission scheme for 3D video with a graceful quality adaptation within a wide range of channel Signal-to-Noise Ratio(SNR).The proposed method first extends the linear transform to 4 dimensions with additional view dimension to eliminate the view redundancy,and then metadata optimization and chunk interleaving are designed to further improve the transmission ***,a synthesis distortion based chunk discard strategy is developed to improve the overall 3D video quality under the condition of limited *** experimental results demonstrate that the proposed method significantly improves the 3D video transmission performance over the wireless channel for low power and low complexity scenarios.
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ...
详细信息
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving sophistication of cyber *** paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack *** approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in *** demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant ***,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time *** for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current *** innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.
Pedestrian re-identification technology enables accurate identification of individuals and is widely used in modern intelligent video surveillance systems to aid law enforcement, including criminal apprehension and lo...
详细信息
In Currently, research in the field of infrared road object detection is primarily focused on enhancing model performance and robustness to address the challenges posed by complex real-world driving scenarios. In resp...
详细信息
Person Re-Identification falls within the scope of computer vision, acting a technique to ascertain the presence of a specified pedestrian within a video or image library. The related research is of great significance...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
MXene is a promising energy storage material for miniaturized microbatteries and microsupercapacitors(MSCs).Despite its superior electrochemical performance,only a few studies have reported MXene-based ultrahigh-rate(...
详细信息
MXene is a promising energy storage material for miniaturized microbatteries and microsupercapacitors(MSCs).Despite its superior electrochemical performance,only a few studies have reported MXene-based ultrahigh-rate(>1000 mV s^(−1))on-paper MSCs,mainly due to the reduced electrical conductance of MXene films deposited on ***,ultrahigh-rate metal-free on-paper MSCs based on heterogeneous MXene/poly(3,4-ethylenedioxythiophene)-poly(styrenesulfonate)(PEDOT:PSS)-stack electrodes are fabricated through the combination of direct ink writing and femtosecond laser *** a footprint area of only 20 mm^(2),the on-paper MSCs exhibit excellent high-rate capacitive behavior with an areal capacitance of 5.7 mF cm^(−2)and long cycle life(>95%capacitance retention after 10,000 cycles)at a high scan rate of 1000 mV s^(−1),outperforming most of the present on-paper ***,the heterogeneous MXene/PEDOT:PSS electrodes can interconnect individual MSCs into metal-free on-paper MSC arrays,which can also be simultaneously charged/discharged at 1000 mV s^(−1),showing scalable capacitive *** heterogeneous MXene/PEDOT:PSS stacks are a promising electrode structure for on-paper MSCs to serve as ultrafast miniaturized energy storage components for emerging paper electronics.
Chatbots use artificial intelligence (AI) and natural language processing (NLP) algorithms to construct a clever system. By copying human connections in the most helpful way possi-ble, chatbots emulate individuals and...
详细信息
暂无评论