5G technology is constrained by its higher frequency band and smaller coverage area, which leads to the need for operators to use technologies such as small cell base stations to increase the density of base station d...
详细信息
ISBN:
(纸本)9781665432078
5G technology is constrained by its higher frequency band and smaller coverage area, which leads to the need for operators to use technologies such as small cell base stations to increase the density of base station deployment to ensure signal coverage quality, which leads to more enormous construction costs. Therefore, it is urgent to find a safe and reliable solution that can use the existing public network to realize small cell base stations with automatic access. Based on this demand, we summarize various existing small cell base station automatic access technology solutions and their advantages and disadvantages while combing the characteristics of blockchain technology and its application solutions in similar scenarios. And then, we propose a new blockchain-based base station automatic access solution and implements the system in a practical scenario. In our solution, we innovatively introduce blockchain as an intermediate manager for small base stations and core networks, which solves traditional solutions requiring customized equipment while ensuring safety and reliability. It reduces costs and improves efficiency, but some problems are brought by the “decentralization” of blockchain waiting to be solved.
LiDAR-based place recognition is an essential and challenging task both in loop closure detection and global relocalization. We propose Deep Scan Context (DSC), a general and discriminative global descriptor that capt...
详细信息
Estimating geometric elements such as depth, camera motion, and optical flow from images is an important part of the robot's visual perception. We use a joint selfsupervised method to estimate the three geometric ...
详细信息
Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence...
详细信息
Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence has become a problem. For this condition, we should analyze unknown correspondence due to the influence of different *** this paper we obtain the relations of transitions based on event relations using branching processes, and build a behavioral matrix of relations. Based on the permutation of behavioral matrix, we express different correspondences, and define a new formula to compute the maximal consistency degree of two workflow nets. Additionally, this paper utilizes an example to show these definitions, computation as well as the advantages.
Internet finance fraud is an increasingly serious social and economic problem. Online payment services (OPSs) are the typical models of Internet finance, and the fraudulent transaction in OPSs is also a typical fraud ...
详细信息
Internet finance fraud is an increasingly serious social and economic problem. Online payment services (OPSs) are the typical models of Internet finance, and the fraudulent transaction in OPSs is also a typical fraud pattern. The method of identifying fraudulent transactions by constructing a fraud detection model based on machine learning has become a promising idea for online payment anti-fraud. In the process of constructing fraud detection models, the feature engineering is the most critical step. It is also one of the most time-consuming and specialized steps in the relevant area. In the study of feature engineering, the existing online payment fraud detection models are mainly carried out by experts in the form of manual construction based on business knowledge. However, there are many fraud scenarios in OPSs where the process of feature construction is so different. Artificial feature construction methods can no longer meet the increasing demand of anti-fraud. An important way to solve this problem is to automate feature engineering. In the field of Internet financial anti-fraud, the expressibility and interpretability of features play a pivotal role. It is helpful to understand the original source fields and their construction process of important features. This is useful for mining and analyzing the characteristics of fraud methods and follow-up improvement rules engines. These are of great significance for fraud detection models. Therefore, the interpretability of the model method is particularly important. Usually, the optimization of detection accuracy is carried out under the premise of ensuring interpretability. This paper proposed a lightweight, tree-structure, high efficiency and scalable automatic feature engineering method for fraud detection of online payment. The method is as follows: (1) The method has low requirements on the calculation conditions and little dependence on the dataset samples. To realize this advantage, it used the tree structur
Due to the mobility and frequent disconnections, the correctness of mobile interaction systems, such as mobile robot systems and mobile payment systems, are often difficult to analyze. This paper introduces three crit...
详细信息
Search result diversification ranking aims to generate rankings that comprehensively cover multiple subtopics, but existing methods often struggle to balance ranking diversity with relevance and face challenges in mod...
Search result diversification ranking aims to generate rankings that comprehensively cover multiple subtopics, but existing methods often struggle to balance ranking diversity with relevance and face challenges in modeling document interactions and dealing with limited high-quality training data. While GAN have proven highly successful in fields like computer vision, their application to search result diversification has been limited due to the discrete nature of ranking items and the complex interactions among documents. To address these challenges, we propose GSRDR-GAN, a novel approach that integrates multi-head self-attention with GAN. Our method consists of four key components designed to address the limitations of traditional approaches: the Selected Document State Retriever, the Subtopic Encoder with Multi-head Self-Attention, the Subtopic Decoder with Multi-head Self-Attention, and the Relevance Predictor. First, a self-attention-based feature extraction module is employed to enhance document representations, enabling the model to capture both global and local context effectively. Second, a GAN framework is introduced to improve generalization by generating diverse rankings, mitigating limited high-quality training data. Third, a carefully designed reward function optimizes the trade-off between ranking diversity and relevance, allowing the model to adaptively prioritize these competing objectives during training. Notably, the method improves the generator’s stability and the diversity of search results by reducing training variance, even without pre-trained models. Extensive experiments on the TREC Web Track dataset demonstrate that the proposed GSRDR-GAN method significantly enhances result diversity, achieving relative improvements of 1.7% in α -nDCG, 3.0% in ERR-IA, 3.3% in NRBP, and 0.9% in S-rec over strong baseline methods. Ablation studies and comparative analyses of different reward computation methods further validate the effectiveness of the propo
Mobile computingsystems, service-based systems and some other systems with mobile interacting components have recently received much attention. However, because of their characteristics such as mobility and disconnec...
详细信息
Obstacle avoiding is one of the most complex tasks for autonomous driving systems, which was also ignored by many cutting-edge end-to-end learning-based methods. The difficulties stem from the integrated process of de...
详细信息
ISBN:
(纸本)9781450372213
Obstacle avoiding is one of the most complex tasks for autonomous driving systems, which was also ignored by many cutting-edge end-to-end learning-based methods. The difficulties stem from the integrated process of detection and interpretation of environment and obstacles and generation of proper behaviors. We make the use of CARLA, a simulator for autonomous driving research, and collect massive human drivers' reactions to obstacles on road subjecting to given driving commands, i.e. follow, go straight, turn left and turn right for about 6 hours. A behavior-Cloning neural network architecture is proposed with the modified loss that enlarge the effects of errors for steer, which indicates the benefit to high an accuracy. We found the data augmentation of the image is crucial to the training of the proposed network. And a reasonable limit allows avoiding unexpected stop. The experiments demonstrate 3 obstacle avoidance cases: for the same type as the training dataset, other automobile and two-wheeled vehicles. Finally, the CARLA benchmark is also tested.
暂无评论