Multilabel learning is an emergent topic that addresses the challenge of associating multiple labels with a single instance simultaneously. Multilabel datasets often exhibit high dimensionality with noisy, irrelevant,...
详细信息
The pivotal role of white-box testing with respect to software quality assurance, necessitates dissemination of education materials related to white-box testing in the course curriculum. In this poster, we describe ou...
详细信息
Underwater target detection is extensively applied in domains such as underwater search and rescue,environmental monitoring,and marine resource *** is crucial in enabling autonomous underwater robot operations and pro...
详细信息
Underwater target detection is extensively applied in domains such as underwater search and rescue,environmental monitoring,and marine resource *** is crucial in enabling autonomous underwater robot operations and promoting ocean ***,low imaging quality,harsh underwater environments,and obscured objects considerably increase the difficulty of detecting underwater targets,making it difficult for current detection methods to achieve optimal *** order to enhance underwater object perception and improve target detection precision,we propose a lightweight underwater target detection method using You Only Look Once(YOLO)v8 with multi-scale cross-channel attention(MSCCA),named *** the proposed multiscale cross-channel attention module,multi-scale attention(MSA)augments the variety of attentional perception by extracting information from innately diverse sensory *** cross-channel strategy utilizes RepVGGbased channel shuffling(RCS)and one-shot aggregation(OSA)to rearrange feature map channels according to specific *** aggregates all features only once in the final feature mapping,resulting in the extraction of more comprehensive and valuable feature *** experimental results show that the proposed YOLOv8-UOD achieves a mAP50 of 95.67%and FLOPs of 23.8 G on the Underwater Robot Picking Contest 2017(URPC2017)dataset,outperforming other methods in terms of detection precision and computational cost-efficiency.
In the charity sector, fundraising and transparency have long been key issues. Charity NFT (Non-Fungible Token) auctions, an emerging charity fundraising model integrating blockchain and NFT concepts, bring opportunit...
详细信息
Internet of Things(IoT)is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet ***,some of the nodes in IoT are mobile and dynamic in *** maintaining the link...
详细信息
Internet of Things(IoT)is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet ***,some of the nodes in IoT are mobile and dynamic in *** maintaining the link among the nodes,efficient bandwidth of the links among the mobile nodes with increased life time is a big challenge in IoT as it integrates mobile nodes with static nodes for data *** such networks,many routing-problems arise due to difficulties in energy and bandwidth based quality of *** to the mobility and finite nature of the nodes,transmission links between intermediary nodes may fail frequently,thus affecting the routing-performance of the network and the accessibility of the *** existing protocols do not focus on the transmission links and energy,bandwidth and link stability of the nodes,but node links are significant factors for enhancing the quality of the *** stability helps us to define whether the node is within or out of a coverage *** paper proposed an Optimal Energy and bandwidth based Link Stability Routing(OEBLS)algorithm,to improve the link stable route with minimized error rate and *** this paper,the optimal route from the source to the sink is determined based on the energy and bandwidth,link stability *** the existing routes,the sink node will choose the optimal route which is having less link stability *** stable link is determined by evaluating link stability value using distance and ***-energy of the node is estimated using the current energy and the consumed *** energy is estimated using transmitted power and the received *** bandwidth in the link is estimated using the idle time and channel capacity with the consideration of probability of collision.
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Labe...
详细信息
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Label-Constrained Reachability(LCR)query inwhich constraint includes a set of labels besides vertex *** researches proposed several methods for answering some LCR queries which require appearance of some labels specified in constraints in the *** that constraint may be a label set,query constraint may be ordered labels,namely OLCR(Ordered-Label-Constrained Reachability)queries which retrieve paths matching a sequence of ***,no solutions are available for ***,we propose DHL,a novel bloom filter based indexing technique for answering OLCR *** can be used to check reachability between vertex *** the answers are not no,then constrained DFS is ***,we employ DHL followed by performing constrained DFS to answer OLCR *** show that DHL has a bounded false positive rate,and it's powerful in saving indexing time and *** experiments on 10 real-life graphs and 12 synthetic graphs demonstrate that DHL achieves about 4.8-22.5 times smaller index space and 4.6-114 times less index construction time than two state-of-art techniques for LCR queries,while achieving comparable query response *** results also show that our algorithm can answer OLCR queries effectively.
We present a faithful geometric picture for genuine tripartite entanglement of discrete, continuous, and hybrid quantum systems. We first find that the triangle relation Ei|jkα≤Ej|ikα+Ek|ijα holds for all subaddit...
详细信息
We present a faithful geometric picture for genuine tripartite entanglement of discrete, continuous, and hybrid quantum systems. We first find that the triangle relation Ei|jkα≤Ej|ikα+Ek|ijα holds for all subadditive bipartite entanglement measure E, all permutations under parties i,j,k, all α∈[0,1], and all pure tripartite states. Then, we rigorously prove that the nonobtuse triangle area, enclosed by side Eα with 0<α≤1/2, is a measure for genuine tripartite entanglement. Finally, it is significantly strengthened for qubits that given a set of subadditive and nonsubadditive measures, some state is always found to violate the triangle relation for any α>1, and the triangle area is not a measure for any α>1/2. Our results pave the way to study discrete and continuous multipartite entanglement within a unified framework.
Scene Graph Generation (SGG) is a task to identify relationships between subjects and objects in images. However, the task is significantly hindered by the long-tail distribution of relational labels, which often bias...
详细信息
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network *** protect IoMT devices and networks in healt...
详细信息
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network *** protect IoMT devices and networks in healthcare and medical settings,our proposed model serves as a powerful tool for monitoring IoMT *** study presents a robust methodology for intrusion detection in Internet of Medical Things(IoMT)environments,integrating data augmentation,feature selection,and ensemble learning to effectively handle IoMT data *** rigorous preprocessing,including feature extraction,correlation removal,and Recursive Feature Elimi-nation(RFE),selected features are standardized and reshaped for deep learning *** using the BAT algorithm enhances dataset *** deep learning models,Transformer-based neural networks,self-attention Deep Convolutional Neural Networks(DCNNs),and Long Short-Term Memory(LSTM)networks,are trained to capture diverse data *** predictions form a meta-feature set for a subsequent meta-learner,which combines model *** classifiers validate meta-learner features for broad algorithm *** comprehensive method demonstrates high accuracy and robustness in IoMT intrusion *** were conducted using two datasets:the publicly available WUSTL-EHMS-2020 dataset,which contains two distinct categories,and the CICIoMT2024 dataset,encompassing sixteen *** results showcase the method’s exceptional performance,achieving optimal scores of 100%on the WUSTL-EHMS-2020 dataset and 99%on the CICIoMT2024.
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and...
详细信息
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and technology, new changes have taken place in both thinking space and cyberspace. To this end, this paper divides the current integration and development of thinking space and cyberspace into three stages, namely Internet of brain(IoB), Internet of thought(IoTh), and Internet of thinking(IoTk). At each stage, the contents and technologies to achieve convergence and connection of spaces are discussed. Besides, the Internet of creation(IoC) is proposed to represent the future development of thinking space and cyberspace. Finally, a series of open issues are raised, and they will become thorny factors in the development of the Io C stage.
暂无评论