Medical Visual Language Pretraining (MVLP) utilizes textual reports for weak supervision to improve the learning of medical visual representations, showing promise in various medical image analysis tasks. While previo...
详细信息
Assembly sequence planning (ASP) is the most important process in the product lifecycle. This paper aims to propose a parallel assembly sequence planning method based on sparrow search algorithm (SSA) to improve the a...
详细信息
In this paper, a color image encryption scheme based on 4D hyperchaos system and RSA algorithm is proposed. Firstly, RSA algorithm is used to generate the initial value of 4D hyperchaotic system, and the key stream is...
详细信息
Large-scale graphs usually exhibit global sparsity with local cohesiveness,and mining the representative cohesive subgraphs is a fundamental problem in graph *** k-truss is one of the most commonly studied cohesive su...
详细信息
Large-scale graphs usually exhibit global sparsity with local cohesiveness,and mining the representative cohesive subgraphs is a fundamental problem in graph *** k-truss is one of the most commonly studied cohesive subgraphs,in which each edge is formed in at least k 2 triangles.A critical issue in mining a k-truss lies in the computation of the trussness of each edge,which is the maximum value of k that an edge can be in a *** works mostly focus on truss computation in static graphs by sequential ***,the graphs are constantly changing dynamically in the real *** study distributed truss computation in dynamic graphs in this *** particular,we compute the trussness of edges based on the local nature of the k-truss in a synchronized node-centric distributed *** decomposing the trussness of edges by relying only on local topological information is possible with the proposed distributed decomposition ***,the distributed maintenance algorithm only needs to update a small amount of dynamic information to complete the *** experiments have been conducted to show the scalability and efficiency of the proposed algorithm.
The flying foxes optimization(FFO)algorithm,as a newly introduced metaheuristic algorithm,is inspired by the survival tactics of flying foxes in heat wave *** preferentially selects the best-performing *** tendency wi...
详细信息
The flying foxes optimization(FFO)algorithm,as a newly introduced metaheuristic algorithm,is inspired by the survival tactics of flying foxes in heat wave *** preferentially selects the best-performing *** tendency will cause the newly generated solution to remain closely tied to the candidate optimal in the search *** address this issue,the paper introduces an opposition-based learning-based search mechanism for FFO algorithm(IFFO).Firstly,this paper introduces niching techniques to improve the survival list method,which not only focuses on the adaptability of individuals but also considers the population’s crowding degree to enhance the global search ***,an initialization strategy of opposition-based learning is used to perturb the initial population and elevate its ***,to verify the superiority of the improved search mechanism,IFFO,FFO and the cutting-edge metaheuristic algorithms are compared and analyzed using a set of test *** results prove that compared with other algorithms,IFFO is characterized by its rapid convergence,precise results and robust stability.
Data augmentation plays an important role in training deep neural model by expanding the size and diversity of the ***,data augmentation mainly involved some simple transformations of ***,in order to increase the dive...
详细信息
Data augmentation plays an important role in training deep neural model by expanding the size and diversity of the ***,data augmentation mainly involved some simple transformations of ***,in order to increase the diversity and complexity of data,more advanced methods appeared and evolved to sophisticated generative ***,these methods required a mass of computation of training or *** this paper,a novel training-free method that utilises the Pre-Trained Segment Anything Model(SAM)model as a data augmentation tool(PTSAM-DA)is proposed to generate the augmented annotations for *** the need for training,it obtains prompt boxes from the original annotations and then feeds the boxes to the pre-trained SAM to generate diverse and improved *** this way,annotations are augmented more ingenious than simple manipulations without incurring huge computation for training a data augmentation *** comparative experiments on three datasets are conducted,including an in-house dataset,ADE20K and *** this in-house dataset,namely Agricultural Plot Segmentation Dataset,maximum improvements of 3.77%and 8.92%are gained in two mainstream metrics,mIoU and mAcc,***,large vision models like SAM are proven to be promising not only in image segmentation but also in data augmentation.
Robotic Process Automation (RPA) uses software to mimic human actions in performing repetitive, time-consuming tasks, enabling organizations to strategically reallocate their workforce towards more value-driven activi...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Multiple Myeloma (MM) is a common malignant tumor in hematological diseases, and its incidence increases year by year. The membrane protein CD138 interacts with the proliferation and evolution of cancer cells during t...
详细信息
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob...
详细信息
暂无评论