Background The redirected walking(RDW)method for multi-user collaboration requires maintaining the relative position between users in a virtual environment(VE)and physical environment(PE).A chasing game in a VE is a t...
详细信息
Background The redirected walking(RDW)method for multi-user collaboration requires maintaining the relative position between users in a virtual environment(VE)and physical environment(PE).A chasing game in a VE is a typical virtual reality game that entails multi-user *** a user approaches and interacts with a target user in the VE,the user is expected to approach and interact with the target user in the corresponding PE as *** methods of multi-user RDW mainly focus on obstacle avoidance,which does not account for the relative positional relationship between the users in both VE and *** To enhance the user experience and facilitate potential interaction,this paper presents a novel dynamic alignment algorithm for multi-user collaborative redirected walking(DA-RDW)in a shared PE where the target user and other users are *** algorithm adopts improved artificial potential fields,where the repulsive force is a function of the relative position and velocity of the user with respect to dynamic *** the best alignment,this algorithm sets the alignment-guidance force in several cases and then converts it into a constrained optimization problem to obtain the optimal ***,this algorithm introduces a potential interaction object selection strategy for a dynamically uncertain environment to speed up the subsequent *** balance obstacle avoidance and alignment,this algorithm uses the dynamic weightings of the virtual and physical distances between users and the target to determine the resultant force *** The efficacy of the proposed method was evaluated using a series of simulations and live-user *** experimental results demonstrate that our novel dynamic alignment method for multi-user collaborative redirected walking can reduce the distance error in both VE and PE to improve alignment with fewer collisions.
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increa...
详细信息
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security *** paper proposes a model for the industrial control *** includes a malware containment strategy that integrates intrusion detection,quarantine,and ***,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment *** addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction ***,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is *** otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control *** earlier the immunization of key nodes,the *** the time exceeds the threshold,immunizing key nodes is almost *** analysis provides a better way to contain the malware in the industrial control network.
A Multiscale-Motion Embedding Pseudo-3D (MME-P3D) gesture recognition algorithm has been proposed to tackle the issues of excessive parameters and high computational complexity encountered by existing gesture recognit...
详细信息
Road extraction from high-resolution remote sensing images can provide vital data support for applications in urban and rural planning, traffic control, and environmental protection. However, roads in many remote sens...
详细信息
Road extraction from high-resolution remote sensing images can provide vital data support for applications in urban and rural planning, traffic control, and environmental protection. However, roads in many remote sensing images are densely distributed with a very small proportion of road information against a complex background, significantly impacting the integrity and connectivity of the extracted road network structure. To address this issue, we propose a method named StripUnet for dense road extraction from remote sensing images. The designed Strip Attention Learning Module (SALM) enables the model to focus on strip-shaped roads;the designed Multi-Scale Feature Fusion Module (MSFF) is used for extracting global and contextual information from deep feature maps;the designed Strip Feature Enhancement Module (SFEM) enhances the strip features in feature maps transmitted through skip connections;and the designed Multi-Scale Snake Decoder (MSSD) utilizes dynamic snake convolution to aid the model in better reconstructing roads. The designed model is tested on the public datasets DeepGlobe and Massachusetts, achieving F1 scores of 83.75% and 80.65%, and IoUs of 73.04% and 67.96%, respectively. Compared to the latest state-of-the-art models, F1 scores improve by 1.07% and 1.11%, and IoUs increase by 1.28% and 1.07%, respectively. Experiments demonstrate that StripUnet is highly effective in dense road network extraction. IEEE
While reinforcement learning has shown promising abilities to solve continuous control tasks from visual inputs, it remains a challenge to learn robust representations from high-dimensional observations and generalize...
详细信息
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of *** guarantee the network's overall security,we present a network defense resour...
详细信息
The cloud platform has limited defense resources to fully protect the edge servers used to process crowd sensing data in Internet of *** guarantee the network's overall security,we present a network defense resource allocation with multi-armed bandits to maximize the network's overall ***,we propose the method for dynamic setting of node defense resource thresholds to obtain the defender(attacker)benefit function of edge servers(nodes)and ***,we design a defense resource sharing mechanism for neighboring nodes to obtain the defense capability of ***,we use the decomposability and Lipschitz conti-nuity of the defender's total expected utility to reduce the difference between the utility's discrete and continuous arms and analyze the difference ***,experimental results show that the method maximizes the defender's total expected utility and reduces the difference between the discrete and continuous arms of the utility.
The higher-order Kaup-Newell equation is examined by applying the Fokas unified method on the *** demonstrate that the solution can be expressed in relation to the resolution of the Riemann-Hilbert *** jump matrix for...
详细信息
The higher-order Kaup-Newell equation is examined by applying the Fokas unified method on the *** demonstrate that the solution can be expressed in relation to the resolution of the Riemann-Hilbert *** jump matrix for this problem is derived from the spectral matrix,which is calculated based on both the initial conditions and the boundary *** jump matrix is explicitly dependent and expressed through the spectral functions,which are derived from the initial and boundary information,*** spectral functions are interdependent and adhere to a so-called global relationship.
With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, i...
详细信息
With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD (LSTM-Transformer smart Ponzi schemes detection), which is a Ponzi scheme detection method that combines Long Short-Term Memory (LSTM) and Transformer considering the time-series transaction information of smart contracts as well as the global information. Based on the verified smart contract addresses, account features, and code features are extracted to construct a feature dataset, and the SMOTE-Tomek algorithm is used to deal with the imbalanced data classification problem. By comparing our method with the other four typical detection methods in the experiment, the LT-SPSD method shows significant performance improvement in precision, recall, and F1-score. The results of the experiment confirm the efficacy of the model, which has some application value in Ethereum Ponzi scheme smart contract detection.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
Heterogeneous Graph Neural Networks are an efficient and powerful tool for modeling graph structure data in recommendation systems. However, existing heterogeneous graph neural networks often fail to model the depende...
详细信息
暂无评论