In this paper,deep learning technology was utilited to solve the railway track recognition in intrusion detection *** railway track recognition can be viewed as semantic segmentation task which extends image processin...
详细信息
In this paper,deep learning technology was utilited to solve the railway track recognition in intrusion detection *** railway track recognition can be viewed as semantic segmentation task which extends image processing to pixel level *** encoder-decoder architecture DeepLabv3+model was applied in this work due to its good performance in semantic segmentation *** images of the railway track collected from the video surveillance of the train cab were used as experiment dataset in this work,the following improvements were made to the *** first aspect deals with over-fitting problem due to the limited amount of training *** augmentation and transfer learning are applied consequently to rich the diversity of data and enhance model robustness during the training ***,different gradient descent methods are compared to obtain the optimal optimizer for training model *** third problem relates to data sample imbalance,cross entropy(CE)loss is replaced by focal loss(FL)to address the issue of serious imbalance between positive and negative *** of the improved DeepLabv3+model with above solutions is demonstrated by experiment results with different system parameters.
Mechanically exfoliated two-dimensional ferromagnetic materials(2 D FMs) possess long-range ferromagnetic order and topologically nontrivial skyrmions in few layers. However, because of the dimensionality effect, such...
详细信息
Mechanically exfoliated two-dimensional ferromagnetic materials(2 D FMs) possess long-range ferromagnetic order and topologically nontrivial skyrmions in few layers. However, because of the dimensionality effect, such few-layer systems usually exhibit much lower Curie temperature(TC) compared to their bulk counterparts. It is therefore of great interest to explore effective approaches to enhance their TC, particularly in wafer-scale for practical applications. Here, we report an interfacial proximity-induced high-TC2 D FM FeGe Te(FGT) via A-type antiferromagnetic material Cr Sb(CS) which strongly couples to FGT. A superlattice structure of(FGT/CS)n, where n stands for the period of FGT/CS heterostructure, has been successfully produced with sharp interfaces by molecular-beam epitaxy on 2-inch wafers. By performing elemental specific X-ray magnetic circular dichroism(XMCD) measurements, we have unequivocally discovered that TCof 4-layer FeGeTecan be significantly enhanced from 140 K to230 K because of the interfacial ferromagnetic coupling. Meanwhile, an inverse proximity effect occurs in the FGT/CS interface, driving the interfacial antiferromagnetic Cr Sb into a ferrimagnetic state as evidenced by double-switching behavior in hysteresis loops and the XMCD spectra. Density functional theory calculations show that the Fe-Te/Cr-Sb interface is strongly FM coupled and doping of the spin-polarized electrons by the interfacial Cr layer gives rise to the TCenhancement of the FeGeTefilms, in accordance with our XMCD measurements. Strikingly, by introducing rich Fe in a 4-layer FGT/CS superlattice, TCcan be further enhanced to near room temperature. Our results provide a feasible approach for enhancing the magnetic order of few-layer 2 D FMs in wafer-scale and render opportunities for realizing realistic ultra-thin spintronic devices.
The coherent superposition of position states in a quantum walk (QW) can be precisely engineered towards the desired distributions to meet the need of quantum information applications. The coherent distribution can ma...
详细信息
We report the position-inhomogeneous quantum walk (IQW) can be utilized to produce the maximal high dimensional entanglement while maintaining the quadratic speedup spread of the wave-function. Our calculations show t...
详细信息
Twitter user geolocation is applied into various applications, such as local messages recommendation and event location recognition. Existing methods do not usually utilize the potential positional correlation between...
详细信息
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorith...
详细信息
ISBN:
(数字)9781728165219
ISBN:
(纸本)9781728165226
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorithm with diversity and complexity as scheduling indicators can not only fail to meet the characteristic requirements of mimic's endogenous security for defense, but also cannot analyze the unknown vulnerabilities and measure the continuous differences in time of mimic Executive Entity. In this paper, from the Angle of attack surface is put forward based on mimicry attack the mimic Executive Entity scheduling algorithm, its resources to measure analysis method and mimic security has intrinsic consistency, avoids the random algorithm to vulnerability and modeling using known vulnerabilities targeted, on time at the same time can ensure the diversity of the Executive body, to mimic the attack surface web server scheduling system in continuous time is less, and able to form a continuous differences. Experiments show that the minimum symbiotic resource scheduling algorithm based on time continuity is more secure than the random scheduling algorithm.
With the development of deep learning, many approaches based on neural networks are proposed for code clone. In this paper, we propose a novel source code detection model At-biLSTM based on a bidirectional LSTM networ...
详细信息
Computer virus detection technology is an important basic security technology in the information age. The current detection technology has a high success rate for the detection of known viruses and known virus infecti...
详细信息
ISBN:
(数字)9781728165790
ISBN:
(纸本)9781728165806
Computer virus detection technology is an important basic security technology in the information age. The current detection technology has a high success rate for the detection of known viruses and known virus infection technologies, but the development of detection technology often lags behind the development of computer virus infection technology. Under Windows system, there are many kinds of file viruses, which change rapidly, and pose a continuous security threat to users. The research of new file virus infection technology can provide help for the development of virus detection technology. In this paper, a new virus infection technology based on dynamic binary analysis is proposed to execute file virus infection. Using the new virus infection technology, the infected executable file can be detected in the experimental environment. At the same time, this paper discusses the detection method of new virus infection technology. We hope to provide help for the development of virus detection technology from the perspective of virus design.
Twitter user geolocation is applied into various applications, such as local messages recommendation and event location recognition. Existing methods do not usually utilize the potential positional correlation between...
详细信息
ISBN:
(纸本)9781450376570
Twitter user geolocation is applied into various applications, such as local messages recommendation and event location recognition. Existing methods do not usually utilize the potential positional correlation between heterogeneous information, resulting in low user geolocation accuracy. Therefore, this paper proposes a user geolocation method based on heterogeneous network and label propagation. First, a heterogeneous network is built based on heterogeneous information mined from user tweets. Then, by analyzing the factors that impact the efficiency and accuracy of label propagation, redundant nodes and edges in the initialized heterogeneous network are removed. Finally, the locations of unlabeled users are geolocated through label propagation in the simplified heterogeneous network. Experiments on the publicly available Twitter benchmark dataset show that proposed method accurately locate 57% of users within 161 km of their locations, a significant improvement over several existing methods.
The Internet of Things plays an increasingly important role in various fields. However, there are many devices in the Internet of Things that are unbalanced in terms of computing and storage capacity, which should be ...
详细信息
暂无评论