The traditional kidney stone detection model has low accuracy and slow processing speed. In order to solve the above problems, we designed a new kidney stone detection model based on the original Yolov8, which we call...
详细信息
Motivated by some well-known conjugate gradient methods, in this paper, we propose a new hybrid conjugate gradient method for unconstrained optimization. Without any dependence on line search, the new method generates...
详细信息
Association in-between features has been demonstrated to improve the representation ability of data. However, the original association data reconstruction method may face two issues: the dimension of reconstructed dat...
详细信息
Association in-between features has been demonstrated to improve the representation ability of data. However, the original association data reconstruction method may face two issues: the dimension of reconstructed data is undoubtedly higher than that of original data, and adopted association measure method does not well balance effectiveness and efficiency. To address above two issues, this paper proposes a novel association-based representation improvement method, named as AssoRep. AssoRep first obtains the association between features via distance correlation method that has some advantages than Pearson’s correlation coefficient. Then an improved matrix is formed via stacking the association value of any two features. Next, an improved feature representation is obtained by aggregating the original feature with the enhancement matrix. Finally, the improved feature representation is mapped to a low-dimensional space via principal component analysis. The effectiveness of AssoRep is validated on 120 datasets and the fruits further prefect our previous work on the association data reconstruction.
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of service(DDoS) attack, which aims to drain the resources of SDN switches and controllers,is one of the most common. Once the switch or controller is damaged, the network services can be *** defense schemes against DDoS attacks have been proposed from the perspective of attack detection;however, such defense schemes are known to suffer from a time consuming and unpromising accuracy, which could result in an unavailable network service before specific countermeasures are taken. To address this issue through a systematic investigation, we propose an elaborate resource-management mechanism against DDoS attacks in an SDN. Specifically, by considering the SDN topology, we leverage the M/M/c queuing model to measure the resistance of an SDN to DDoS attacks. Network administrators can therefore invest a reasonable number of resources into SDN switches and SDN controllers to defend against DDoS attacks while guaranteeing the quality of service(QoS). Comprehensive analyses and empirical data-based experiments demonstrate the effectiveness of the proposed approach.
In this paper, we mainly study the structure of bi-Jordan n-derivations in triangular rings under conditions of maximal quotient rings and faithful bimodules, respectively. It is shown that every bi-Jordan n-derivatio...
详细信息
In this paper, we mainly study the structure of bi-Jordan n-derivations in triangular rings under conditions of maximal quotient rings and faithful bimodules, respectively. It is shown that every bi-Jordan n-derivation can be decomposed into the sum of an inner biderivation and an extremal biderivation in two different conditions. As by-products, the structures of bi-Jordan n-derivation over upper triangular matrix rings and nest algebras are characterized, respectively,and generalize the known results.
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i...
详细信息
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features if applied to other models due to their good ***,adversarial examples often exhibit overfitting,as they are tailored to exploit the particular architecture and feature representation of source ***,when attempting black-box transfer attacks on different target models,their effectiveness is *** solve this problem,this study proposes an approach based on a Regularized Constrained Feature Layer(RCFL).The proposed method first uses regularization constraints to attenuate the initial examples of low-frequency *** are then added to a pre-specified layer of the source model using the back-propagation technique,in order to modify the original adversarial ***,a regularized loss function is used to enhance the black-box transferability between different target *** proposed method is finally tested on the ImageNet,CIFAR-100,and Stanford Car datasets with various target models,The obtained results demonstrate that it achieves a significantly higher transfer-based adversarial attack success rate compared with baseline techniques.
Question Generation(QG)is the task of generating questions according to the given *** of the existing methods are based on Recurrent Neural Networks(RNNs)for generating questions with passage-level input for providing...
详细信息
Question Generation(QG)is the task of generating questions according to the given *** of the existing methods are based on Recurrent Neural Networks(RNNs)for generating questions with passage-level input for providing more details,which seriously suffer from such problems as gradient vanishing and ineffective information *** fact,reasonably extracting useful information from a given context is more in line with our actual needs during questioning especially in the education *** that end,in this paper,we propose a novel Hierarchical Answer-Aware and Context-Aware Network(HACAN)to construct a high-quality passage representation and judge the balance between the sentences and the whole ***,a Hierarchical Passage Encoder(HPE)is proposed to construct an answer-aware and context-aware passage representation,with a strategy of utilizing multi-hop ***,we draw inspiration from the actual human questioning process and design a Hierarchical Passage-aware Decoder(HPD)which determines when to utilize the passage *** conduct extensive experiments on the SQuAD dataset,where the results verify the effectivenesss of our model in comparison with several baselines.
The industrial sector is the primary source of carbon emissions in *** pursuit of meeting its carbon reduction targets,China aims to promote resource consumption sustainability,reduce energy consumption,and achieve ca...
详细信息
The industrial sector is the primary source of carbon emissions in *** pursuit of meeting its carbon reduction targets,China aims to promote resource consumption sustainability,reduce energy consumption,and achieve carbon neutrality within its processing *** effective strategy to promote energy savings and carbon reduction throughout the life cycle of materials is by applying life cycle engineering *** strategy aims to attain an optimal solution for material performance,resource consumption,and environmental *** this study,five types of technologies were considered:raw material replacement,process reengineering,fuel replacement,energy recycling and reutilization,and material recycling and *** meaning,methodology,and development status of life cycle engineering technology abroad and domestically are discussed in detail.A multidimensional analysis of ecological design was conducted from the perspectives of resource and energy consumption,carbon emissions,product performance,and recycling of secondary resources in a manufacturing *** coupled with an integrated method to analyze carbon emissions in the entire life cycle of a material process industry was applied to the nonferrous industry,as an *** results provide effective ideas and solutions for achieving low or zero carbon emission production in the Chinese industry as recycled aluminum and primary aluminum based on advanced technologies had reduced resource consumption and emissions as compared to primary aluminum production.
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause signi...
详细信息
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause significant performance degradation for containerized applications and enhanced resource ***,current studies have almost not discussed the isolation problems of page cache which is a key resource for *** leverage memory cgroup to control page cache ***,existing policy introduces two major problems in a container-based ***,containers can utilize more memory than limited by their cgroup,effectively breaking memory ***,the Os kernel has to evict page cache to make space for newly-arrived memory requests,slowing down containerized *** paper performs an empirical study of these problems and demonstrates the performance impacts on containerized *** we propose pCache(precise control of page cache)to address the problems by dividing page cache into private and shared and controlling both kinds of page cache separately and *** do so,pCache leverages two new technologies:fair account(f-account)and evict on demand(EoD).F-account splits the shared page cache charging based on per-container share to prevent containers from using memory for free,enhancing memory *** EoD reduces unnecessary page cache evictions to avoid the performance *** evaluation results demonstrate that our system can effectively enhance memory isolation for containers and achieve substantial performance improvement over the original page cache management policy.
Beamforming design plays a crucial role in multi-antenna systems, with numerous methods proposed to optimize key performance metrics such as spectral efficiency and power consumption. However, these methods often face...
详细信息
暂无评论