Big data have the characteristics of enormous volume,high velocity,diversity,value-sparsity,and uncertainty,which lead the knowledge learning from them full of *** the emergence of crowdsourcing,versatile information ...
详细信息
Big data have the characteristics of enormous volume,high velocity,diversity,value-sparsity,and uncertainty,which lead the knowledge learning from them full of *** the emergence of crowdsourcing,versatile information can be obtained on-demand so that the wisdom of crowds is easily involved to facilitate the knowledge learning *** the past thirteen years,researchers in the AI community made great efforts to remove the obstacles in the field of learning from *** concentrated survey paper comprehensively reviews the technical progress in crowdsourcing learning from a systematic perspective that includes three dimensions of data,models,and learning *** addition to reviewing existing important work,the paper places a particular emphasis on providing some promising blueprints on each dimension as well as discussing the lessons learned from our past research work,which will light up the way for new researchers and encourage them to pursue new contributions.
Optimal power allocation is pivotal for enhancing network capacity and performance in wireless networks. To tackle the challenges posed by the high computational complexity of traditional algorithms and the limited in...
详细信息
Hyperspectral image classification stands as a pivotal task within the field of remote sensing,yet achieving highprecision classification remains a significant *** response to this challenge,a Spectral Convolutional N...
详细信息
Hyperspectral image classification stands as a pivotal task within the field of remote sensing,yet achieving highprecision classification remains a significant *** response to this challenge,a Spectral Convolutional Neural Network model based on Adaptive Fick’s Law Algorithm(AFLA-SCNN)is *** Adaptive Fick’s Law Algorithm(AFLA)constitutes a novel metaheuristic algorithm introduced herein,encompassing three new strategies:Adaptive weight factor,Gaussian mutation,and probability update *** adaptive weight factor,the algorithmcan adjust theweights according to the change in the number of iterations to improve the performance of the *** helps the algorithm avoid falling into local optimal solutions and improves the searchability of the *** probability update strategy helps to improve the exploitability and adaptability of the *** the AFLA-SCNN model,AFLA is employed to optimize two hyperparameters in the SCNN model,namely,“numEpochs”and“miniBatchSize”,to attain their optimal ***’s performance is initially validated across 28 functions in 10D,30D,and 50D for CEC2013 and 29 functions in 10D,30D,and 50D for *** results indicate AFLA’s marked performance superiority over nine other prominent optimization ***,the AFLA-SCNN model was compared with the Spectral Convolutional Neural Network model based on Fick’s Law Algorithm(FLA-SCNN),Spectral Convolutional Neural Network model based on Harris Hawks Optimization(HHO-SCNN),Spectral Convolutional Neural Network model based onDifferential Evolution(DE-SCNN),SpectralConvolutionalNeuralNetwork(SCNN)model,and SupportVector Machines(SVM)model using the Indian Pines dataset and Paviauniversity *** experimental results show that the AFLA-SCNN model outperforms other models in terms of Accuracy,Precision,Recall,and F1-score on Indian Pines and Pavia *** them,the Accuracy of the AFLA-SCNN model on India
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) ...
详细信息
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) fully discrete scheme with unconditional energy stability. Spatially the FEM is adopted, using a triangular mesh discretization strategy that can be adapted to complex regions. Temporally, the EIEQ approach is considered, which not only linearizes the nonlinear potential but also gives a new variable that we combine with the nonlocal splitting method to achieve the fully decoupled computation. The strategy can successfully transform the Allen-Cahn system into some completely independent algebraic equations and linear elliptic equations with constant coefficients, we only need to solve these simple equations at each time step. Moreover, we conducted some numerical experiments to demonstrate the effectiveness of the strategy.
As the basis of machine vision,the biomimetic image sensing devices are the eyes of artificial *** recent years,with the development of two-dimensional(2D)materials,many new optoelectronic devices are developed for th...
详细信息
As the basis of machine vision,the biomimetic image sensing devices are the eyes of artificial *** recent years,with the development of two-dimensional(2D)materials,many new optoelectronic devices are developed for their outstanding ***,there are still little sensing arrays based on 2D materials with high imaging quality,due to the poor uniformity of pixels caused by material defects and fabrication ***,we propose a 2D MoS_(2)sensing array based on artificial neural network(ANN)*** equipping the MoS_(2)sensing array with a“brain”(ANN),the imaging quality can be effectively *** the test,the relative standard deviation(RSD)between pixels decreased from about 34.3%to 6.2%and 5.49%after adjustment by the back propagation(BP)and Elman neural networks,*** peak signal to noise ratio(PSNR)and structural similarity(SSIM)of the image are improved by about 2.5 times,which realizes the re-recognition of the distorted *** provides a feasible approach for the application of 2D sensing array by integrating ANN to achieve high quality imaging.
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most...
详细信息
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most circumstances,binary-level code similarity analysis(BCSA)has been paid much attention *** recent years,many BCSA studies incorporating Al techniques focus on deriving semantic information from binary functions with code representations such as assembly code,intermediate representations,and control flow graphs to measure the ***,due to the impacts of different compilers,architectures,and obfuscations,binaries compiled from the same source code may vary considerably,which becomes the major obstacle for these works to obtain robust *** this paper,we propose a solution,named UPPC(Unleashing the Power of Pseudo-code),which leverages the pseudo-code of binary function as input,to address the binary code similarity analysis challenge,since pseudocode has higher abstraction and is platform-independent compared to binary *** selectively inlines the functions to capture the full function semantics across different compiler optimization levels and uses a deep pyramidal convolutional neural network to obtain the semantic embedding of the *** evaluated UPPC on a data set containing vulnerabilities and a data set including different architectures(X86,ARM),different optimization options(O0-O3),different compilers(GCC,Clang),and four obfuscation *** experimental results show that the accuracy of UPPC in function search is 33.2%higher than that of existing methods.
In this paper,a reasoning enhancement method based on RGCN(Relational Graph Convolutional Network)is proposed to improve the detection capability of UAV(Unmanned Aerial Vehicle)on fast-moving military targets in urban...
详细信息
In this paper,a reasoning enhancement method based on RGCN(Relational Graph Convolutional Network)is proposed to improve the detection capability of UAV(Unmanned Aerial Vehicle)on fast-moving military targets in urban battlefield *** combining military images with the publicly available VisDrone2019 dataset,a new dataset called VisMilitary was built and multiple YOLO(You Only Look Once)models were tested on *** to the low confidence problem caused by fuzzy targets,the performance of traditional YOLO models on real battlefield images decreases ***,we propose an improved RGCN inference model,which improves the performance of the model in complex environments by optimizing the data processing and graph network *** results show that the proposed method achieves an improvement of 0.4%to 1.7%on mAP@0.50,which proves the effectiveness of the model in military target *** research of this paper provides a new technical path for UAV target detection in urban battlefield,and provides important enlightenment for the application of deep learning in military field.
This paper proposes a cyber security strategy for cyber-physical systems(CPS)based on Q-learning under unequal cost to obtain a more efficient and low-cost cyber security defense strategy with misclassification *** sy...
详细信息
This paper proposes a cyber security strategy for cyber-physical systems(CPS)based on Q-learning under unequal cost to obtain a more efficient and low-cost cyber security defense strategy with misclassification *** system loss caused by strategy selection errors in the cyber security of CPS is often considered ***,sometimes the cost associated with different errors in strategy selection may not always be the same due to the severity of the consequences of ***,unequal costs referring to the fact that different strategy selection errors may result in different levels of system losses can significantly affect the overall performance of the strategy selection *** introducing a weight parameter that adjusts the unequal cost associated with different types of misclassification errors,a modified Q-learning algorithm is proposed to develop a defense strategy that minimizes system loss in CPS with misclassification interference,and the objective of the algorithm is shifted towards minimizing the overall ***,simulations are conducted to compare the proposed approach with the standard Q-learning based cyber security strategy method,which assumes equal costs for all types of misclassification *** results demonstrate the effectiveness and feasibility of the proposed research.
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to e...
详细信息
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to exploit storage infrastructure,improve content delivery efficiency,and enhance user ***,due to the limited capacity of edge servers,it remains a significant challenge to meet the changing,time-varying,and customized needs for highly diversified content of ***,techniques for caching content at the edge are becoming popular for addressing the above *** is capable of filling the communication gap between the users and content providers while relieving pressure on remote cloud ***,existing static caching strategies are still inefficient in handling the dynamics of the time-varying popularity of content and meeting users’demands for highly diversified entity *** address this challenge,we introduce a novel method for content caching over MEC,i.e.,*** synthesizes a content popularity prediction model,which takes users’stay time and their request traces as inputs,and a deep reinforcement learning model for yielding dynamic caching *** results demonstrate that PRIME,when tested upon the MovieLens 1M dataset for user request patterns and the Shanghai Telecom dataset for user mobility,outperforms its peers in terms of cache hit rates,transmission latency,and system cost.
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
暂无评论