In order to study the problems of unreasonable airflow distribution and serious dust pollution in a heading surface,an experimental platform for forced ventilation and dust removal was built based on the similar *** t...
详细信息
In order to study the problems of unreasonable airflow distribution and serious dust pollution in a heading surface,an experimental platform for forced ventilation and dust removal was built based on the similar *** the similar experiment and numerical simulation,the distribution of airflow field in the roadway and the spatial and temporal evolution of dust pollution under the conditions of forced ventilation were *** airflow field in the roadway can be divided into three zones:jet zone,vortex zone and reflux *** dust concentration gradually decreases from the head to the rear of the *** the forced ventilation conditions,there is a unilateral accumulation of dust,with higher dust concentrations away from the *** position of the equipment has an interception effect on the *** maximum error between the test value and the simulation result is 12.9%,which verifies the accuracy of the experimental *** research results can provide theoretical guidance for the application of dust removal technology in coal mine.
In this paper, an ultra-wideband (UWB) multiple-input multiple-output (MIMO) antenna covering the n77, n78, n79, and 6 GHz bands is proposed for 5G applications, which achieves the full coverage of the 5G NR (New Radi...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
Background: Lung cancer (LC) is a type of malignant neoplasm that originates in the bronchial mucosa or glands. As a clinically common nodule, solitary pulmonary nodules (SPNs) have a significantly higher probability ...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote *** has several advantages,including increas...
详细信息
Task offloading is an important concept for edge computing and the Internet of Things(IoT)because computationintensive tasksmust beoffloaded tomore resource-powerful remote *** has several advantages,including increased battery life,lower latency,and better application performance.A task offloading method determines whether sections of the full application should be run locally or offloaded for execution *** offloading choice problem is influenced by several factors,including application properties,network conditions,hardware features,and mobility,influencing the offloading system’s operational *** study provides a thorough examination of current task offloading and resource allocation in edge computing,covering offloading strategies,algorithms,and factors that influence *** offloading and partial offloading strategies are the two types of offloading *** algorithms for task offloading and resource allocation are then categorized into two parts:machine learning algorithms and non-machine learning *** examine and elaborate on algorithms like Supervised Learning,Unsupervised Learning,and Reinforcement Learning(RL)under machine *** the non-machine learning algorithm,we elaborate on algorithms like non(convex)optimization,Lyapunov optimization,Game theory,Heuristic Algorithm,Dynamic Voltage Scaling,Gibbs Sampling,and Generalized Benders Decomposition(GBD).Finally,we highlight and discuss some research challenges and issues in edge computing.
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embe...
详细信息
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embeddings for users and items or employ compact embeddings to enhance reusability and reduce memory usage. However, these approaches consider only the coarse-grained aspects of embeddings, overlooking subtle semantic nuances. This limitation results in an adversarial degradation of meta-embedding performance, impeding the system's ability to capture intricate relationships between users and items, leading to suboptimal recommendations. To address this, we propose a novel approach to efficiently learn meta-embeddings with varying grained and apply fine-grained meta-embeddings to strengthen the representation of their coarse-grained counterparts. Specifically, we introduce a recommender system based on a graph neural network, where each user and item is represented as a node. These nodes are directly connected to coarse-grained virtual nodes and indirectly linked to fine-grained virtual nodes, facilitating learning of multi-grained semantics. Fine-grained semantics are captured through sparse meta-embeddings, which dynamically balance embedding uniqueness and memory constraints. To ensure their sparseness, we rely on initialization methods such as sparse principal component analysis combined with a soft thresholding activation function. Moreover, we propose a weight-bridging update strategy that aligns coarse-grained meta-embedding with several fine-grained meta-embeddings based on the underlying semantic properties of users and items. Comprehensive experiments demonstrate that our method outperforms existing baselines. The code of our proposal is available at https://***/htyjers/C2F-MetaEmbed.
An empirical formula of nuclearβ-decay half-lives is proposed by including the transition-strength *** inclusion of the transition-strength contribution can reduce nuclearβ-decay half-lives by about an order of magn...
详细信息
An empirical formula of nuclearβ-decay half-lives is proposed by including the transition-strength *** inclusion of the transition-strength contribution can reduce nuclearβ-decay half-lives by about an order of magnitude,and its effect gradually increases toward the neutron-rich or heavy nuclear *** nuclearβ-decay half-lives less than 1 s,the empirical formula can describe the experimental data within approximately2 times,which is more accurate than the sophisticated microscopic *** transition-strength contribution can also be effectively considered by refitting the parameters of other empirical formulas without the transition-strength term although they will still significantly deviate from the new empirical formula in light or heavy neutron-rich nuclear *** indicates that the inclusion of the transition-strength contribution in the empirical formula is crucial for the global description of nuclearβ-decay *** extrapolation ability of the new empirical formula was verified by the newly measuredβ-decay half-lives.
Missing values pose a formidable obstacle in multivariate time series analysis. Existing imputation methods rely on entangled representations that struggle to simultaneously capture multiple orthogonal time-series pat...
详细信息
Lunar base construction is a crucial component of the lunar exploration program,and considering the dynamic characteristics of lunar soil is important for moon ***,investigating the dynamic properties of lunar soil by...
详细信息
Lunar base construction is a crucial component of the lunar exploration program,and considering the dynamic characteristics of lunar soil is important for moon ***,investigating the dynamic properties of lunar soil by establishing a constitutive relationship is critical for providing a theoretical basis for its damage *** this paper,a split Hopkinson pressure bar(SHPB)device was used to perform three sets of impact tests under different pressures on a lunar soil simulant geopolymer(LSSG)with sodium silicate(Na_(2)SiO_(3))contents of 1%,3%,5%and 7%.The dynamic stressestrain curves,failure modes,and energy variation rules of LSSG under different pressures were *** equation was modified based on the ZWT viscoelastic constitutive model and was combined with the damage *** damage element obeys the Weibull distribution and the constitutive equation that can describe the mechanical properties of LSSG under dynamic loading was *** results demonstrate that the dynamic compressive strength of LSSG has a marked strain-rate strengthening ***_(2)SiO_(3) has both strengthening and deterioration effects on the dynamic compressive strength of *** Na_(2)SiO_(3) grows,the dynamic compressive strength of LSSG first increases and then *** a fixed air pressure,5%Na_(2)SiO_(3) had the largest dynamic compressive strength,the largest incident energy,the smallest absorbed energy,and the lightest *** ZWT equation was modified according to the stress response properties of LSSG and the range of the SHPB strain rate to obtain the constitutive equation of the LSSG,and the model’s correctness was confirmed.
暂无评论