Ground penetrating radar (GPR) images are often affected by Gaussian noise, which reduces their clarity. While traditional filtering methods can mitigate noise to some extent, they often struggle to preserve image det...
详细信息
Some effective word embeddings have been proposed by researchers and acted in NER (Named Entity Recognition) tasks, but these embeddings often suffer from under-utilization, resulting in poorly characterized word vect...
详细信息
information freshness is a key factor for Internet-of-Things(IoT)to make appropriate decisions and *** paper proposes an analytical framework for evaluating the timeliness performance of the IoT system based on Unmann...
详细信息
information freshness is a key factor for Internet-of-Things(IoT)to make appropriate decisions and *** paper proposes an analytical framework for evaluating the timeliness performance of the IoT system based on Unmanned Aerial Vehicle(UAV)lossy *** performance analysis consists of the outage probability analysis and the Age-of-information(AoI)analysis with *** begin with,we solve a lossy coding problem formulated from the UAV communication system,and derive a closed-form expression of the outage probability based on Shannon's lossy source-channel separation ***,we characterize the Peak AoI(PAoI)for the considered system,and further minimize the PAoI by deriving the optimal rate for generating ***,we analyze the system performance through theoretical calculations and *** results indicate that the optimal server utilization ratio is always no larger than *** practical applications,we can utilize the proposed analytical framework to determine the system parameters which guarantee the timeliness performance of UAV lossy communications.
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi...
详细信息
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the *** recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the *** paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its ***,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers.
Recently, the vision transformer (ViT) model of deep learning has achieved surprising performance in the field of computer vision and has been widely used in IoT edge devices. However, the training of ViT models requi...
详细信息
Based on the parametric resonance magnetometer(PRM)theory,this paper establishes an experimen-tal system of *** experimental results are consistent with the theoretical predictions.A PRM has been developed with sensit...
详细信息
Based on the parametric resonance magnetometer(PRM)theory,this paper establishes an experimen-tal system of *** experimental results are consistent with the theoretical predictions.A PRM has been developed with sensitivity of 0.5 pT/Hz^(1/2),which can detect the magnitude of residual magnetic field;furthermore,a proportion-integration-differentiation(PID)closed-loop magnetic compensation system of the residual magnetic field also has been *** with open-loop compensation,the PID closed-loop compensation reduces the average value of the residual magnetic field in the z-axis direction from 0.0244nT to-0.0023nT,and the mean-square error from 0.2083 nT to 0.0691 *** the same way,the average value of the residual magnetic field in the y-axis direction is reduced from 0.0816nT to-0.0042nT,and the mean-square error from 0.1316nT to 0.0461 *** magnitude of residual magnetic fields in both directions is decreased to the order of picotesla(pT).In addition,based on the signal waveforms of the magnetometer,a method of verifying the effect of magnetic compensation is proposed.
Reactive power sharing cannot be achieved using many existing microgrid(MG)control methods,but the convergence speed of these methods is *** solve these problems,a finite-time distributed control approach is proposed ...
详细信息
Reactive power sharing cannot be achieved using many existing microgrid(MG)control methods,but the convergence speed of these methods is *** solve these problems,a finite-time distributed control approach is proposed in this paper,which is based on the hierarchical control *** hierarchical control structure consists of a dual loop control,a droop control used as a primary control and a secondary ***,the secondary controller is modeled,and the MG system composed of distributed generators(DGs)is considered as a multi-agent *** secondary controller consists of a frequency regulator,voltage regulator and power ***,the adaptive virtual impedance module is established,using the output of the reactive power regulator as its ***,a dual loop controller is combined with a primary controller and secondary controller to generate a pulse width modulation(PWM)signal to control the power and voltage of the *** order to reduce the fluctuation of the MG,a damping module is introduced when the structure of the system ***,the stability of the proposed control strategy is proved by the related theorems.A simulation system is established in the Matlab environment,and the simulation results show that the proposed method is effective.
Tree barrier plays a vital role in transmission lines, and its existence directly affects the stable supply of electricity. Therefore, it is necessary to measure and inspect the tree barrier. For this purpose, this pa...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and targets while ignoring relational types information. Considering the positive or negative effects of DTIs will facilitate the study on comprehensive mechanisms of multiple drugs on a common target, in this work, we model DTIs on signed heterogeneous networks, through categorizing interaction patterns of DTIs and additionally extracting interactions within drug pairs and target protein pairs. We propose signed heterogeneous graph neural networks(SHGNNs), further put forward an end-to-end framework for signed DTIs prediction, called SHGNN-DTI,which not only adapts to signed bipartite networks, but also could naturally incorporate auxiliary information from drug-drug interactions(DDIs) and protein-protein interactions(PPIs). For the framework, we solve the message passing and aggregation problem on signed DTI networks, and consider different training modes on the whole networks consisting of DTIs, DDIs and PPIs. Experiments are conducted on two datasets extracted from Drug Bank and related databases, under different settings of initial inputs, embedding dimensions and training modes. The prediction results show excellent performance in terms of metric indicators, and the feasibility is further verified by the case study with two drugs on breast cancer.
With the rapid development of the Internet, Chinese addresses are widely present online. However, their complexity and diversity make traditional methods challenging for accurate identification. To address this issue,...
详细信息
暂无评论