With the continuous improvement of people’s living standards in recent years, home intelligence has become a trend. However, traditional locks are easier to pry open or forcibly open due to their structure, resulting...
详细信息
Deep learning (DL) techniques hold immense promise for revolutionizing medical diagnostics, including brain tumor detection. Detecting malignancies in the brain is fraught with challenges that carry critical implicati...
详细信息
Effective monitoring of the environment over a large area will require mobilization of a considerable amount of information. Otherwise, the use of traditional methods will prove to be costly and would take up so much ...
详细信息
This paper investigates a multiplayer reach-avoid differential game in 3-dimensional(3D)space,which involves multiple pursuers,multiple evaders,and a designated target *** evaders aim to reach the target region,while ...
详细信息
This paper investigates a multiplayer reach-avoid differential game in 3-dimensional(3D)space,which involves multiple pursuers,multiple evaders,and a designated target *** evaders aim to reach the target region,while the pursuers attempt to guard the target region by capturing the *** class of research holds significant practical ***,the complexity of the problem escalates substantially with the growing number of players,rendering its solution extremely *** this paper,the multiplayer game is divided into many subgames considering the cooperation among pursuers,reducing the computational burden,and obtaining numerically tractable strategies for ***,the Apollonius sphere,a fundamental geometric tool for analyzing the 3D differential game,is formulated,and its properties are *** on this,the optimal interception point for the pursuer to capture the evader is derived and the winning conditions for the pursuer and evader are ***,based on the Apollonius sphere,the optimal state feedback strategies of players are designed,and simultaneously,the optimal one-to-one pairings are ***,the Value function of the multiplayer reach-avoid differential game is explicitly given and is proved to satisfy Hamilton-Jacobi-Isaacs(HJI)***,the matching algorithm for the case with pursuers outnumbered evaders is provided through constructing a weighted bipartite graph,and the cooperative tactics for multiple pursuers are proposed,inspired by the Harris'Hawks intelligent cooperative hunting ***,numerical simulations are conducted to illustrate the effectiveness of the theoretical results for both cases where the number of adversary players is equal and unequal between the 2 groups.
It is expected that physical-layer security will finally thrive to provide an extra layer of defence for a variety of devices in next-generation 6G wireless communication. In this work, physical-layer security using n...
详细信息
An end-to-end unsupervised domain adaptation method for hyperspectral image (HSI) classification based on a graph dual adversarial network is proposed in this article. First, in order to extract the domain-invariant f...
详细信息
In view of the problem that the atmospheric turbulence phase screen generated by the traditional numerical simulation method has insufficient low frequency, this paper proposes a phase screen generation method based o...
详细信息
This paper offers a new approach for land cover detection using classification and regression tree (CART) algorithms for hyperspectral information. The underlying principle for the CART technique is to assemble a deci...
详细信息
The complexity and diversity of bug fixes require developers to understand bug fixes from multiple perspectives in addition to fine-grained code changes. The dependencies among files in a software system are an import...
详细信息
The complexity and diversity of bug fixes require developers to understand bug fixes from multiple perspectives in addition to fine-grained code changes. The dependencies among files in a software system are an important dimension to inform software quality. Recent studies have revealed that most bug-prone files are always architecturally connected with dependencies, and as one of the best practices in the industry,changes in dependencies should be avoided or carefully made during bug fixing. Hence, in this paper, we take the first attempt to understand bug fixes from the dependencies perspective, which can complement existing code change perspectives. Based on this new perspective, we conducted a systematic and comprehensive study on bug fixes collected from 157 Apache open source projects, involving 140456 bug reports and182621 bug fixes in total. Our study results show that a relatively high proportion of bug fixes(30%) introduce dependency-level changes when fixing the corresponding 33% bugs. The bugs, whose fixes introduce dependency-level changes, have a strong correlation with high priority, large fixing churn, long fixing time,frequent bug reopening, and bug inducing. More importantly, patched files with dependency-level changes in their fixes, consume much more maintenance costs compared with those without these changes. We further summarized three representative patch patterns to explain the reasons for the increasing costs. Our study unveils useful findings based on qualitative and quantitative analysis and also provides new insights that might benefit existing bug prediction techniques. We release a large set of benchmarks and also implement a prototype tool to automatically detect dependency-level changes from bug fixes, which can warn developers and remind them to design a better fix.
With the development of UAV technology, UAV sensor networks have been widely used to provide temporary network coverage of an area. At present, homogeneous UAV swarms are commonly used to perform regional coverage tas...
详细信息
暂无评论