Spiking neural networks (SNNs) have the potential to simulate sparse and spatio-temporal dynamics observed in biological neurons, making them promising for achieving energy-efficient artificial general intelligence. W...
详细信息
Rumors can have a negative impact on social life, and multimodal rumors, which combine text and images, are more misleading and spread more widely than text-only rumors. Therefore, detecting multimodal rumors is parti...
详细信息
In the process of nuclear waste disposal and nuclear facility decommissioning, the amount of low-and-intermediate level radioactive waste will increase significantly. If it is not handled properly, it will threaten th...
In the process of nuclear waste disposal and nuclear facility decommissioning, the amount of low-and-intermediate level radioactive waste will increase significantly. If it is not handled properly, it will threaten the development of the nuclear industry and human safety. Tomographic gamma scanning (TGS) technology is an effective method for non-destructive detection of low-and-intermediate level radioactive waste in sealed spaces, of which transmission imaging is an important part of TGS. The TGS transmission image reconstruction methods based on algebraic iterative algorithms and residual neural networks have made significant progress in improving image clarity and reconstruction speed, but they still face the problems of blurred details at the image edges, large noise bias, and poor objective evaluation indexes. Moreover, the quality of transmission image reconstruction directly impacts the reconstruction quality of subsequent emission images. Therefore, it becomes especially important to investigate a method that can preserve edge details, reduce noise, and improve reconstruction quality more effectively. In this paper, we propose an algorithmic model Swin-DCIR (Image Restoration Network with Swin Transformer and Dynamic Cross-Attention) for TGS transmission image reconstruction. The model introduces linear variable kernel convolution module and dynamic cross-attention network module in the shallow feature extraction module and deep feature extraction module, respectively. The introduced modules enhance the model's attention to global features and local details and improve the ability to capture details. In order to verify its significant advantages in TGS transmission image reconstruction, we conducted evaluation experiments on a homemade TGS transmission image dataset, and the experimental results show that the Swin-DCIR model has higher reconstruction accuracy, lower noise, and fewer parametric quantities in the dataset task, and the reconstructed image is vi
Visible light communication (VLC) has become a powerful and complementary technology to radio frequency (RF) communication thanks to its unrestricted bandwidth resources and high transmission rates. However, current V...
详细信息
Recommender systems aim to filter information effectively and recommend useful sources to match users' requirements. However, the exponential growth of information in recent social networks may cause low predictio...
详细信息
Human-machine interaction has sparked significant interest, leading to the rise of Channel State Information (CSI)-based gesture recognition systems. However, these systems often struggle with accuracy due to high noi...
详细信息
In this paper,we present a Hessian recovery based linear finite element method to simulate the molecular beam epitaxy growth model with slope *** the time discretization,we apply a first-order convex splitting method ...
详细信息
In this paper,we present a Hessian recovery based linear finite element method to simulate the molecular beam epitaxy growth model with slope *** the time discretization,we apply a first-order convex splitting method and secondorder Crank-Nicolson *** the space discretization,we utilize the Hessian recovery operator to approximate second-order derivatives of a C^(0)linear finite element function and hence the weak formulation of the fourth-order differential operator can be discretized in the linear finite element *** energy-decay property of our proposed fully discrete schemes is rigorously *** robustness and the optimal-order convergence of the proposed algorithm are numerically *** a large spatial domain for a long period,we simulate coarsening dynamics,where 1/3-power-law is observed.
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face in...
详细信息
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated *** article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic *** propose a novel cryptographic approach underpinned by theoretical frameworks and practical *** to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information *** method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key *** also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and *** gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various ***,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing ***,with integrity metrics at 9.35,the protocol’s resilience is further *** metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
暂无评论