The visual modeling method enables flexible interactions with rich graphical depictions of data and supports the exploration of the complexities of epidemiological ***,most epidemiology visualizations do not support t...
详细信息
The visual modeling method enables flexible interactions with rich graphical depictions of data and supports the exploration of the complexities of epidemiological ***,most epidemiology visualizations do not support the combined analysis of objective factors that might influence the transmission situation,resulting in a lack of quantitative and qualitative *** address this issue,we developed a portrait-based visual modeling method called+*** method considers the spatiotemporal features of virus transmission patterns and multidimensional features of objective risk factors in communities,enabling portrait-based exploration and comparison in epidemiological *** applied+msRNAer to aggregate COVID-19-related datasets in New South Wales,Australia,combining COVID-19 case number trends,geo-information,intervention events,and expert-supervised risk factors extracted from local government area-based *** perfected the+msRNAer workflow with collaborative views and evaluated its feasibility,effectiveness,and usefulness through one user study and three subject-driven case *** feedback from experts indicates that+msRNAer provides a general understanding for analyzing comprehension that not only compares relationships between cases in time-varying and risk factors through portraits but also supports navigation in fundamental geographical,timeline,and other factor *** adopting interactions,experts discovered functional and practical implications for potential patterns of long-standing community factors regarding the vulnerability faced by the *** confirmed that+msRNAer is expected to deliver visual modeling benefits with spatiotemporal and multidimensional features in other epidemiological analysis scenarios.
In order to solve the problem that image information is not effectively utilized because of unclear traffic video images and random jitter between image sequences, this paper has studied how to achieve stability of tr...
详细信息
As an effective way to securely transfer secret images,secret image sharing(SIS)has been a noteworthy area of *** in a SIS scheme,a secret image is shared via shadows and could be reconstructed by having the required ...
详细信息
As an effective way to securely transfer secret images,secret image sharing(SIS)has been a noteworthy area of *** in a SIS scheme,a secret image is shared via shadows and could be reconstructed by having the required number of them.A major downside of this method is its noise-like shadows,which draw the malicious users'*** order to overcome this problem,SIS schemes with meaningful shadows are introduced in which the shadows are first hidden in innocent-looking cover images and then *** most of these schemes,the cover image cannot be recovered without distortion,which makes them useless in case of utilising critical cover images such as military or medical ***,embedding the secret data in Least significant bits of the cover image,in many of these schemes,makes them very fragile to steganlysis.A reversible IWT-based SIS scheme using Rook polynomial and Hamming code with authentication is *** order to make the scheme robust to steganalysis,the shadow image is embedded in coefficients of Integer wavelet transform of the cover *** Rook polynomial makes the scheme more secure and moreover makes authentication very easy and with no need to share private key to ***,utilising Hamming code lets us embed data with much less required modifications on the cover image which results in high-quality stego images.
Facial expression recognition is a challenging task when neural network is applied to pattern recognition. Most of the current recognition research is based on single source facial data, which generally has the disadv...
详细信息
In order to solve the shortcomings of the existing safety helmet detection algorithms in construction sites, tunnels, coal mines and other construction scenarios, it is difficult to detect occluded targets and small t...
详细信息
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has bee...
详细信息
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has been known about the underlying relationships and how they reflect(or affect) user behaviors. To fill this gap, we characterize the app recommendation relationships in the i OS app store from the perspective of the complex network. We collect a dataset containing over 1.3 million apps and 50 million app recommendations. This dataset enables us to construct a complex network that captures app recommendation relationships. Through this, we explore the recommendation relationships between mobile apps and how these relationships reflect or affect user behavior patterns. The insights gained from our research can be valuable for understanding typical user behaviors and identifying potential policy-violating apps.
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw...
详细信息
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user *** caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user *** this paper,we aim to survey the edge caching techniques from a comprehensive and systematic *** first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching *** then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,*** particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service ***,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.
Quick Access Recorder(QAR),an important device for storing data from various flight parameters,contains a large amount of valuable data and comprehensively records the real state of the airline ***,the recorded data h...
详细信息
Quick Access Recorder(QAR),an important device for storing data from various flight parameters,contains a large amount of valuable data and comprehensively records the real state of the airline ***,the recorded data have certain missing values due to factors,such as weather and equipment *** missing values seriously affect the analysis of QAR data by aeronautical engineers,such as airline flight scenario reproduction and airline flight safety status ***,imputing missing values in the QAR data,which can further guarantee the flight safety of airlines,is *** data also have multivariate,multiprocess,and temporal ***,we innovatively propose the imputation models A-AEGAN("A"denotes attention mechanism,"AE"denotes autoencoder,and"GAN"denotes generative adversarial network)and SA-AEGAN("SA"denotes self-attentive mechanism)for missing values of QAR data,which can be effectively applied to QAR ***,we apply an innovative generative adversarial network to impute missing values from QAR *** improved gated recurrent unit is then introduced as the neural unit of GAN,which can successfully capture the temporal relationships in QAR *** addition,we modify the basic structure of GAN by using an autoencoder as the generator and a recurrent neural network as the *** missing values in the QAR data are imputed by using the adversarial relationship between generator and *** introduce an attention mechanism in the autoencoder to further improve the capability of the proposed model to capture the features of QAR *** mechanisms can maintain the correlation among QAR data and improve the capability of the model to impute missing ***,we improve the proposed model by integrating a self-attention mechanism to further capture the relationship between different parameters within the QAR *** results on real datasets demonstrate that the model can rea
The coronavirus disease 2019(COVID-19)has severely disrupted both human life and the health care *** diagnosis and treatment have become increasingly important;however,the distribution and size of lesions vary widely ...
详细信息
The coronavirus disease 2019(COVID-19)has severely disrupted both human life and the health care *** diagnosis and treatment have become increasingly important;however,the distribution and size of lesions vary widely among individuals,making it challenging to accurately diagnose the *** study proposed a deep-learning disease diagnosismodel based onweakly supervised learning and clustering visualization(W_CVNet)that fused classification with ***,the data were *** optimizable weakly supervised segmentation preprocessing method(O-WSSPM)was used to remove redundant data and solve the category imbalance ***,a deep-learning fusion method was used for feature extraction and classification recognition.A dual asymmetric complementary bilinear feature extraction method(D-CBM)was used to fully extract complementary features,which solved the problem of insufficient feature extraction by a single deep learning ***,an unsupervised learning method based on Fuzzy C-Means(FCM)clustering was used to segment and visualize COVID-19 lesions enabling physicians to accurately assess lesion distribution and disease *** this study,5-fold cross-validation methods were used,and the results showed that the network had an average classification accuracy of 85.8%,outperforming six recent advanced classification models.W_CVNet can effectively help physicians with automated aid in diagnosis to determine if the disease is present and,in the case of COVID-19 patients,to further predict the area of the lesion.
Edge computing (EC) has emerged as an important technology to support the low-delay request of massive devices nowadays. Task offloading is an essential part in EC because it can influence the use of network resources...
详细信息
暂无评论