This paper introduces an advanced road damage detection algorithm that effectively addresses the shortcomings of existing models, including limited detection performance and large parameter sizes, by utilizing the YOL...
详细信息
It is actually a classification that the anomalistic detection on traffic of network belongs to. The imbalance of data about network traffic, leading to the disability of anomaly model on learning the characteristics ...
详细信息
Diabetes retinopathy (DR) is one of the complications of diabetes. Early diagnosis of retinopathy is helpful to avoid vision loss or blindness. The difficulty of this task lies in the significant differences in the si...
详细信息
Superior to ferromagnetic (FM) valleytronics, antiferromagnetic (AFM) counterparts exhibit ultradense and ultrafast potential due to their intrinsic advantages of zero stray field, terahertz dynamics, and compensated ...
详细信息
Superior to ferromagnetic (FM) valleytronics, antiferromagnetic (AFM) counterparts exhibit ultradense and ultrafast potential due to their intrinsic advantages of zero stray field, terahertz dynamics, and compensated moments of antiferromagnets. However, the physics of spontaneous valley polarization is mainly rooted in FM hexagonal lattices and is rarely used to explore the simultaneous spin and valley polarizations in AFM materials. Here, we propose a general stacking method to achieve valley polarization in AFM bilayer systems. The hexagonal ferrovalley material is used as the basic building unit, and then the space-inversion centrosymmetric bilayer system with interlayer AFM ordering is constructed by horizontal mirror and twofold rotational operations, which can exhibit spontaneous valley polarization. In this construction process, the rarely explored layer-locked hidden valley polarization, hidden Berry curvature, and layer Hall effect are involved, and an out-of-plane electric field can be used to detect hidden valley polarization and to realize layer-locked anomalous valley Hall effect. We use three examples to illustrate our proposal. First, the Janus GdBrI is used to illustrate concepts and effects involved in our design process. Second, the RuBr2 is used to demonstrate other phenomena, including valley polarization transition and near-ideal quantum spin Hall insulators. Finally, we use our design principles to understand the valley polarization of experimentally synthesized MnSe from a new perspective. Our works establish a robust general scheme to achieve valley polarization in AFM bilayer systems, thereby opening up new avenues for AFM valleytronics.
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f...
详细信息
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security.
Broad learning system (BLS) is renowned for its excellent generalization and high efficiency in data classification. However, when confronted with class imbalance problems, BLS treats all samples as equally important,...
详细信息
It is suggested to use deep convolutional generative adversarial networks and convolutional neural networks to diagnose faults in small samples of bearings. The CWRU bearing dataset is pre-processed with data and used...
详细信息
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti...
详细信息
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both entity and relation embedding to make predictions, ignoring the semantic correlations among different entities and relations within the same timestamp. This can lead to random and nonsensical predictions when unseen entities or relations occur. Furthermore, many existing models exhibit limitations in handling highly correlated historical facts with extensive temporal depth. They often either overlook such facts or overly accentuate the relationships between recurring past occurrences and their current counterparts. Due to the dynamic nature of TKG, effectively capturing the evolving semantics between different timestamps can be *** address these shortcomings, we propose the recurrent semantic evidenceaware graph neural network(RE-SEGNN), a novel graph neural network that can learn the semantics of entities and relations simultaneously. For the former challenge, our model can predict a possible answer to missing quadruples based on semantics when facing unseen entities or relations. For the latter problem, based on an obvious established force, both the recency and frequency of semantic history tend to confer a higher reference value for the current. We use the Hawkes process to compute the semantic trend, which allows the semantics of recent facts to gain more attention than those of distant facts. Experimental results show that RE-SEGNN outperforms all SOTA models in entity prediction on 6 widely used datasets, and 5 datasets in relation prediction. Furthermore, the case study shows how our model can deal with unseen entities and relations.
This study presents a general optimal trajectory planning(GOTP)framework for autonomous vehicles(AVs)that can effectively avoid obstacles and guide AVs to complete driving tasks safely and ***,we employ the fifth-orde...
详细信息
This study presents a general optimal trajectory planning(GOTP)framework for autonomous vehicles(AVs)that can effectively avoid obstacles and guide AVs to complete driving tasks safely and ***,we employ the fifth-order Bezier curve to generate and smooth the reference path along the road *** coordinates are then transformed to achieve the curvature continuity of the generated *** the road constraints and vehicle dynamics,limited polynomial candidate trajectories are generated and smoothed in a curvilinear coordinate ***,in selecting the optimal trajectory,we develop a unified and auto-tune objective function based on the principle of least action by employing AVs to simulate drivers’behavior and summarizing their manipulation characteristics of“seeking benefits and avoiding losses.”Finally,by integrating the idea of receding-horizon optimization,the proposed framework is achieved by considering dynamic multi-performance objectives and selecting trajectories that satisfy feasibility,optimality,and *** simulations and experiments are performed,and the results demonstrate the framework’s feasibility and effectiveness,which avoids both dynamic and static obstacles and applies to various scenarios with multi-source interactive traffic ***,we prove that the proposed method can guarantee real-time planning and safety requirements compared to drivers’manipulation.
The Logical Range is introduced into the joint flight test because it can call cross-area test resources and improve the utilization rate of test resources. However, the Logical Range also has the problems of low reus...
详细信息
暂无评论