期刊文献+
共找到1,255篇文章
< 1 2 63 >
每页显示 20 50 100
Structural and functional connectivity of the whole brain and subnetworks in individuals with mild traumatic brain injury:predictors of patient prognosis
1
作者 Sihong Huang Jungong Han +4 位作者 Hairong Zheng Mengjun Li Chuxin Huang Xiaoyan Kui Jun Liu 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第7期1553-1558,共6页
Patients with mild traumatic brain injury have a diverse clinical presentation,and the underlying pathophysiology remains poorly understood.Magnetic resonance imaging is a non-invasive technique that has been widely u... Patients with mild traumatic brain injury have a diverse clinical presentation,and the underlying pathophysiology remains poorly understood.Magnetic resonance imaging is a non-invasive technique that has been widely utilized to investigate neuro biological markers after mild traumatic brain injury.This approach has emerged as a promising tool for investigating the pathogenesis of mild traumatic brain injury.G raph theory is a quantitative method of analyzing complex networks that has been widely used to study changes in brain structure and function.However,most previous mild traumatic brain injury studies using graph theory have focused on specific populations,with limited exploration of simultaneous abnormalities in structural and functional connectivity.Given that mild traumatic brain injury is the most common type of traumatic brain injury encounte red in clinical practice,further investigation of the patient characteristics and evolution of structural and functional connectivity is critical.In the present study,we explored whether abnormal structural and functional connectivity in the acute phase could serve as indicators of longitudinal changes in imaging data and cognitive function in patients with mild traumatic brain injury.In this longitudinal study,we enrolled 46 patients with mild traumatic brain injury who were assessed within 2 wee ks of injury,as well as 36 healthy controls.Resting-state functional magnetic resonance imaging and diffusion-weighted imaging data were acquired for graph theoretical network analysis.In the acute phase,patients with mild traumatic brain injury demonstrated reduced structural connectivity in the dorsal attention network.More than 3 months of followup data revealed signs of recovery in structural and functional connectivity,as well as cognitive function,in 22 out of the 46 patients.Furthermore,better cognitive function was associated with more efficient networks.Finally,our data indicated that small-worldness in the acute stage could serve as a predictor of longitudinal changes in connectivity in patients with mild traumatic brain injury.These findings highlight the importance of integrating structural and functional connectivity in unde rstanding the occurrence and evolution of mild traumatic brain injury.Additionally,exploratory analysis based on subnetworks could serve a predictive function in the prognosis of patients with mild traumatic brain injury. 展开更多
关键词 cognitive function CROSS-SECTION FOLLOW-UP functional connectivity graph theory longitudinal study mild traumatic brain injury prediction small-worldness structural connectivity subnetworks whole brain network
下载PDF
Prediction of Bandwidth of Metamaterial Antenna Using Pearson Kernel-Based Techniques
2
作者 Sherly Alphonse S.Abinaya Sourabh Paul 《Computers, Materials & Continua》 SCIE EI 2024年第3期3449-3467,共19页
The use of metamaterial enhances the performance of a specific class of antennas known as metamaterial antennas.The radiation cost and quality factor of the antenna are influenced by the size of the antenna.Metamateri... The use of metamaterial enhances the performance of a specific class of antennas known as metamaterial antennas.The radiation cost and quality factor of the antenna are influenced by the size of the antenna.Metamaterial antennas allow for the circumvention of the bandwidth restriction for small antennas.Antenna parameters have recently been predicted using machine learning algorithms in existing literature.Machine learning can take the place of the manual process of experimenting to find the ideal simulated antenna parameters.The accuracy of the prediction will be primarily dependent on the model that is used.In this paper,a novel method for forecasting the bandwidth of the metamaterial antenna is proposed,based on using the Pearson Kernel as a standard kernel.Along with these new approaches,this paper suggests a unique hypersphere-based normalization to normalize the values of the dataset attributes and a dimensionality reduction method based on the Pearson kernel to reduce the dimension.A novel algorithm for optimizing the parameters of Convolutional Neural Network(CNN)based on improved Bat Algorithm-based Optimization with Pearson Mutation(BAO-PM)is also presented in this work.The prediction results of the proposed work are better when compared to the existing models in the literature. 展开更多
关键词 ANTENNA pearson optimization BANDWIDTH METAMATERIAL
下载PDF
Home-based Detection and Prediction of Diabetic Foot Ulcers at Early Stage Using Sensor Technology and Supervised Learning
3
作者 Kamasamudram Bhavya Sai Rishi Raghu +2 位作者 Sai Surya Varshith Nukala Jayashree Jayaraman Vijayashree Jayaraman 《Journal of Harbin Institute of Technology(New Series)》 CAS 2024年第1期26-37,共12页
For years,foot ulcers linked with diabetes mellitus and neuropathy have significantly impacted diabetic patients’ health-related quality of life(HRQoL). Diabetes foot ulcers impact15% of all diabetic patients at some... For years,foot ulcers linked with diabetes mellitus and neuropathy have significantly impacted diabetic patients’ health-related quality of life(HRQoL). Diabetes foot ulcers impact15% of all diabetic patients at some point in their lives. The facilities and resources used for DFU detection and treatment are only available at hospitals and clinics,which results in the unavailability of feasible and timely detection at an early stage. This necessitates the development of an at-home DFU detection system that enables timely predictions and seamless communication with users,thereby preventing amputations due to neglect and severity. This paper proposes a feasible system consisting of three major modules:an IoT device that works to sense foot nodes to send vibrations onto a foot sole,a machine learning model based on supervised learning which predicts the level of severity of the DFU using four different classification techniques including XGBoost,K-SVM,Random Forest,and Decision tree,and a mobile application that acts as an interface between the sensors and the patient. Based on the severity levels,necessary steps for prevention,treatment,and medications are recommended via the application. 展开更多
关键词 diabetic foot ulcer podiatry diabetes mellitus healthcare footcare internet of things machine learning human⁃computer interaction
下载PDF
Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model
4
作者 周新卫 蒋东华 +4 位作者 Jean De Dieu Nkapkop Musheer Ahmad Jules Tagne Fossi Nestor Tsafack 吴建华 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期418-433,共16页
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop... Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance. 展开更多
关键词 cellular neural network MEMRISTOR hardware circuit compressive sensing privacy data protection
原文传递
A Random Fusion of Mix 3D and Polar Mix to Improve Semantic Segmentation Performance in 3D Lidar Point Cloud
5
作者 Bo Liu Li Feng Yufeng Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期845-862,共18页
This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network models.These point clouds,which represent spatial information throu... This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network models.These point clouds,which represent spatial information through a collection of 3D coordinates,have found wide-ranging applications.Data augmentation has emerged as a potent solution to the challenges posed by limited labeled data and the need to enhance model generalization capabilities.Much of the existing research is devoted to crafting novel data augmentation methods specifically for 3D lidar point clouds.However,there has been a lack of focus on making the most of the numerous existing augmentation techniques.Addressing this deficiency,this research investigates the possibility of combining two fundamental data augmentation strategies.The paper introduces PolarMix andMix3D,two commonly employed augmentation techniques,and presents a new approach,named RandomFusion.Instead of using a fixed or predetermined combination of augmentation methods,RandomFusion randomly chooses one method from a pool of options for each instance or sample.This innovative data augmentation technique randomly augments each point in the point cloud with either PolarMix or Mix3D.The crux of this strategy is the random choice between PolarMix and Mix3Dfor the augmentation of each point within the point cloud data set.The results of the experiments conducted validate the efficacy of the RandomFusion strategy in enhancing the performance of neural network models for 3D lidar point cloud semantic segmentation tasks.This is achieved without compromising computational efficiency.By examining the potential of merging different augmentation techniques,the research contributes significantly to a more comprehensive understanding of how to utilize existing augmentation methods for 3D lidar point clouds.RandomFusion data augmentation technique offers a simple yet effective method to leverage the diversity of augmentation techniques and boost the robustness of models.The insights gained from this research can pave the way for future work aimed at developing more advanced and efficient data augmentation strategies for 3D lidar point cloud analysis. 展开更多
关键词 3D lidar point cloud data augmentation RandomFusion semantic segmentation
下载PDF
Exploring Deep Learning Methods for Computer Vision Applications across Multiple Sectors:Challenges and Future Trends
6
作者 Narayanan Ganesh Rajendran Shankar +3 位作者 Miroslav Mahdal Janakiraman SenthilMurugan Jasgurpreet Singh Chohan Kanak Kalita 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期103-141,共39页
Computer vision(CV)was developed for computers and other systems to act or make recommendations based on visual inputs,such as digital photos,movies,and other media.Deep learning(DL)methods are more successful than ot... Computer vision(CV)was developed for computers and other systems to act or make recommendations based on visual inputs,such as digital photos,movies,and other media.Deep learning(DL)methods are more successful than other traditional machine learning(ML)methods inCV.DL techniques can produce state-of-the-art results for difficult CV problems like picture categorization,object detection,and face recognition.In this review,a structured discussion on the history,methods,and applications of DL methods to CV problems is presented.The sector-wise presentation of applications in this papermay be particularly useful for researchers in niche fields who have limited or introductory knowledge of DL methods and CV.This review will provide readers with context and examples of how these techniques can be applied to specific areas.A curated list of popular datasets and a brief description of them are also included for the benefit of readers. 展开更多
关键词 Neural network machine vision classification object detection deep learning
下载PDF
Recognition of mortar pumpability via computer vision and deep learning
7
作者 Hao-Zhe Feng Hong-Yang Yu +2 位作者 Wen-Yong Wang Wen-Xuan Wang Ming-Qian Du 《Journal of Electronic Science and Technology》 EI CAS CSCD 2023年第3期73-81,共9页
The mortar pumpability is essential in the construction industry,which requires much labor to estimate manually and always causes material waste.This paper proposes an effective method by combining a 3-dimensional con... The mortar pumpability is essential in the construction industry,which requires much labor to estimate manually and always causes material waste.This paper proposes an effective method by combining a 3-dimensional convolutional neural network(3D CNN)with a 2-dimensional convolutional long short-term memory network(ConvLSTM2D)to automatically classify the mortar pumpability.Experiment results show that the proposed model has an accuracy rate of 100%with a fast convergence speed,based on the dataset organized by collecting the corresponding mortar image sequences.This work demonstrates the feasibility of using computer vision and deep learning for mortar pumpability classification. 展开更多
关键词 Classification Computer vision Deep learning PUMPABILITY 2-dimensional convolutional long short-term memory network (ConvLSTM2D) 3-dimensional convolutional neural network(3D CNN)
下载PDF
Spatial and temporal analysis of urban heat island effect over Tiruchirappalli city using geospatial techniques 被引量:2
8
作者 Ajay Badugu K.S.Arunab +1 位作者 Aneesh Mathew P.Sarwesh 《Geodesy and Geodynamics》 EI CSCD 2023年第3期275-291,共17页
Alterations made to the natural ground surface and the anthropogenic activity elevate the surface and air temperature in the urban areas compared with the surrounding rural areas,known as urban heat island effect.Ther... Alterations made to the natural ground surface and the anthropogenic activity elevate the surface and air temperature in the urban areas compared with the surrounding rural areas,known as urban heat island effect.Thermal remote sensors measure the radiation emitted by ground objects,which can be used to estimate the land surface temperature and are beneficial for studying urban heat island effects.The present study investigates the spatial and temporal variations in the effects of urban heat island over Tiruchirappalli city in India during the summer and winter seasons.The study also identifies hot spots and cold spots within the study area.In this study,a significant land surface temperature difference was observed between the urban and rural areas,predominantly at night,indicating the presence of urban heat island at night.These diurnal land surface temperature fluctuations are also detected seasonally,with a relatively higher temperature intensity during the summer.The trend line analysis shows that the mean land surface temperature of the study area is increasing at a rate of 0.166 K/decade with p less than 0.01.By using the spatial autocorrelation method with the urban heat island index as the key parameter,hot spots with a 99 percent confidence level and a 95 percent confidence level were found within the urban area.A hot spot with 95 and 90 percent confidence level was identified outside the urban area.This spike in temperature for a particular region in the rural area is due to industry and the associated built-up area.The study also identified cold spots with a 90 percent confidence level within the rural area.However,cold spots with a 95 and 99 percent confidence level were not identified within the study area. 展开更多
关键词 URBANIZATION Land surface temperature Urban heat island effect Hot spots Remote sensing
原文传递
ISHD:Intelligent Standing Human Detection of Video Surveillance for the Smart Examination Environment 被引量:1
9
作者 Wu Song Yayuan Tang +1 位作者 Wenxue Tan Sheng Ren 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期509-526,共18页
In the environment of smart examination rooms, it is important to quickly and accurately detect abnormal behavior(human standing) for the construction of a smart campus. Based on deep learning, we propose an intellige... In the environment of smart examination rooms, it is important to quickly and accurately detect abnormal behavior(human standing) for the construction of a smart campus. Based on deep learning, we propose an intelligentstanding human detection (ISHD) method based on an improved single shot multibox detector to detect thetarget of standing human posture in the scene frame of exam room video surveillance at a specific examinationstage. ISHD combines the MobileNet network in a single shot multibox detector network, improves the posturefeature extractor of a standing person, merges prior knowledge, and introduces transfer learning in the trainingstrategy, which greatly reduces the computation amount, improves the detection accuracy, and reduces the trainingdifficulty. The experiment proves that the model proposed in this paper has a better detection ability for the smalland medium-sized standing human body posture in video test scenes on the EMV-2 dataset. 展开更多
关键词 Deep learning object detection video surveillance of exam room smart examination environment
下载PDF
Deep Learning Based Face Detection and Identification of Criminal Suspects
10
作者 S.Sandhya A.Balasundaram Ayesha Shaik 《Computers, Materials & Continua》 SCIE EI 2023年第2期2331-2343,共13页
Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past decade.One of the most tedious tasks is to track a suspect once a crime is co... Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past decade.One of the most tedious tasks is to track a suspect once a crime is committed.As most of the crimes are committed by individuals who have a history of felonies,it is essential for a monitoring system that does not just detect the person’s face who has committed the crime,but also their identity.Hence,a smart criminal detection and identification system that makes use of the OpenCV Deep Neural Network(DNN)model which employs a Single Shot Multibox Detector for detection of face and an auto-encoder model in which the encoder part is used for matching the captured facial images with the criminals has been proposed.After detection and extraction of the face in the image by face cropping,the captured face is then compared with the images in the CriminalDatabase.The comparison is performed by calculating the similarity value between each pair of images that are obtained by using the Cosine Similarity metric.After plotting the values in a graph to find the threshold value,we conclude that the confidence rate of the encoder model is 0.75 and above. 展开更多
关键词 Deep learning OPENCV deep neural network single shot multi-box detector auto-encoder cosine similarity
下载PDF
Exploiting Data Science for Measuring the Performance of Technology Stocks
11
作者 Tahir Sher Abdul Rehman +1 位作者 Dongsun Kim Imran Ihsan 《Computers, Materials & Continua》 SCIE EI 2023年第9期2979-2995,共17页
The rise or fall of the stock markets directly affects investors’interest and loyalty.Therefore,it is necessary to measure the performance of stocks in the market in advance to prevent our assets from suffering signi... The rise or fall of the stock markets directly affects investors’interest and loyalty.Therefore,it is necessary to measure the performance of stocks in the market in advance to prevent our assets from suffering significant losses.In our proposed study,six supervised machine learning(ML)strategies and deep learning(DL)models with long short-term memory(LSTM)of data science was deployed for thorough analysis and measurement of the performance of the technology stocks.Under discussion are Apple Inc.(AAPL),Microsoft Corporation(MSFT),Broadcom Inc.,Taiwan Semiconductor Manufacturing Company Limited(TSM),NVIDIA Corporation(NVDA),and Avigilon Corporation(AVGO).The datasets were taken from the Yahoo Finance API from 06-05-2005 to 06-05-2022(seventeen years)with 4280 samples.As already noted,multiple studies have been performed to resolve this problem using linear regression,support vectormachines,deep long short-termmemory(LSTM),and many other models.In this research,the Hidden Markov Model(HMM)outperformed other employed machine learning ensembles,tree-based models,the ARIMA(Auto Regressive IntegratedMoving Average)model,and long short-term memory with a robust mean accuracy score of 99.98.Other statistical analyses and measurements for machine learning ensemble algorithms,the Long Short-TermModel,and ARIMA were also carried out for further investigation of the performance of advanced models for forecasting time series data.Thus,the proposed research found the best model to be HMM,and LSTM was the second-best model that performed well in all aspects.A developedmodel will be highly recommended and helpful for early measurement of technology stock performance for investment or withdrawal based on the future stock rise or fall for creating smart environments. 展开更多
关键词 Machine learning data science smart environments stocks movement deep learning stock marketing
下载PDF
A Systematic Review on the Internet of Medical Things:Techniques,Open Issues,and Future Directions
12
作者 Apurva Sonavane Aditya Khamparia Deepak Gupta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1525-1550,共26页
IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices... IoT usage in healthcare is one of the fastest growing domains all over the world which applies to every age group.Internet of Medical Things(IoMT)bridges the gap between the medical and IoT field where medical devices communicate with each other through a wireless communication network.Advancement in IoMT makes human lives easy and better.This paper provides a comprehensive detailed literature survey to investigate different IoMT-driven applications,methodologies,and techniques to ensure the sustainability of IoMT-driven systems.The limitations of existing IoMTframeworks are also analyzed concerning their applicability in real-time driven systems or applications.In addition to this,various issues(gaps),challenges,and needs in the context of such systems are highlighted.The purpose of this paper is to interpret a rigorous review concept related to IoMT and present significant contributions in the field across the research fraternity.Lastly,this paper discusses the opportunities and prospects of IoMT and discusses various open research problems. 展开更多
关键词 Internet ofMedical Things(IoMT) healthcare systems SENSORS PREPROCESSING RFID remote monitoring devices networks
下载PDF
A measurable refinement method of design and verification for micro-kernel operating systems in communication network
13
作者 Zhenjiang Qian Rui Xia +2 位作者 Gaofei Sun Xiaoshuang Xing Kaijian Xia 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1070-1079,共10页
A secure operating system in the communication network can provide the stable working environment,which ensures that the user information is not stolen.The micro-kernel operating system in the communication network re... A secure operating system in the communication network can provide the stable working environment,which ensures that the user information is not stolen.The micro-kernel operating system in the communication network retains the core functions in the kernel,and unnecessary tasks are implemented by calling external processes.Due to the small amount of code,the micro-kernel architecture has high reliability and scalability.Taking the microkernel operating system in the communication network prototype VSOS as an example,we employ the objdump tool to disassemble the system source code and get the assembly layer code.On this basis,we apply the Isabelle/HOL,a formal verification tool,to model the system prototype.By referring to the mathematical model of finite automata and taking the process scheduling module as an example,the security verification based on the assembly language layer is developed.Based on the Hoare logic theory,each assembly statement of the module is verified in turn.The verification results show that the scheduling module of VSOS has good functional security,and also show the feasibility of the refinement framework. 展开更多
关键词 Assembly-level verification Finite automaton Hoare logic Isabelle/HOL Micro-kernel OS
下载PDF
Ensemble Deep Learning Framework for Situational Aspects-Based Annotation and Classification of International Student’s Tweets during COVID-19
14
作者 Shabir Hussain Muhammad Ayoub +4 位作者 Yang Yu Junaid Abdul Wahid Akmal Khan Dietmar P.F.Moller Hou Weiyan 《Computers, Materials & Continua》 SCIE EI 2023年第6期5355-5377,共23页
As the COVID-19 pandemic swept the globe,social media plat-forms became an essential source of information and communication for many.International students,particularly,turned to Twitter to express their struggles an... As the COVID-19 pandemic swept the globe,social media plat-forms became an essential source of information and communication for many.International students,particularly,turned to Twitter to express their struggles and hardships during this difficult time.To better understand the sentiments and experiences of these international students,we developed the Situational Aspect-Based Annotation and Classification(SABAC)text mining framework.This framework uses a three-layer approach,combining baseline Deep Learning(DL)models with Machine Learning(ML)models as meta-classifiers to accurately predict the sentiments and aspects expressed in tweets from our collected Student-COVID-19 dataset.Using the pro-posed aspect2class annotation algorithm,we labeled bulk unlabeled tweets according to their contained aspect terms.However,we also recognized the challenges of reducing data’s high dimensionality and sparsity to improve performance and annotation on unlabeled datasets.To address this issue,we proposed the Volatile Stopwords Filtering(VSF)technique to reduce sparsity and enhance classifier performance.The resulting Student-COVID Twitter dataset achieved a sophisticated accuracy of 93.21%when using the random forest as a meta-classifier.Through testing on three benchmark datasets,we found that the SABAC ensemble framework performed exceptionally well.Our findings showed that international students during the pandemic faced various issues,including stress,uncertainty,health concerns,financial stress,and difficulties with online classes and returning to school.By analyzing and summarizing these annotated tweets,decision-makers can better understand and address the real-time problems international students face during the ongoing pandemic. 展开更多
关键词 COVID-19 pandemic situational awareness ensemble learning aspect-based text classification deep learning models international students topic modeling
下载PDF
Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS
15
作者 Alaknanda S.Patil G.Sundari Arun Kumar Sivaraman 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1707-1721,共15页
The intact data transmission to the authentic user is becoming crucial at every moment in the current era.Steganography;is a technique for concealing the hidden message in any cover media such as image,video;and audio... The intact data transmission to the authentic user is becoming crucial at every moment in the current era.Steganography;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase the protection of data.The resilience and imperceptibility are improved by choosing an appropriate embedding position.This paper gives a novel system to immerse the secret information in different videos with different methods.An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image.A hidden message is first included in the audio from the multimedia file;using LSB Technique.The Stego-video is created in the second stage by merging the authorized user’s face into the frame of the video;by using PVD technology.Stego-audio is linked again with the stego-video in the third stage.The incorporated perspective techniques(LSB-SS and PVD-SS algorithms)with more significant data immersing capacity,good robustness and imperceptibility are proposed in this research work.The spread spectrum approach is used to increase the complexity of secret data recognition.Two different video files are tested with different voice files with the results such as PSNR,SSIM,RMSE and MSE as 52.3,0.9963,0.0024 and 0.0000059,respectively. 展开更多
关键词 Audio steganography data hiding information security pixel value differencing
下载PDF
Teaching Reform Based on the Competency Model for Software Engineering-related Courses
16
作者 Xue Han Buqing Cao +2 位作者 Jianyong Yu Miao Liao Wei Liang 《计算机教育》 2023年第12期158-166,共9页
This paper explores the reform and practice of software engineering-related courses based on the competency model of the Computing Curricula,and proposes some measures of teaching reform and talent cultivation in soft... This paper explores the reform and practice of software engineering-related courses based on the competency model of the Computing Curricula,and proposes some measures of teaching reform and talent cultivation in software engineering.The teaching reform emphasizes student-centered education,and focuses on the cultivation and enhancement of students’knowledge,skills,and dispositions.Based on the three elements of the competency model,specific measures of teaching reform are proposed for some professional courses in software engineering,to strengthen course relevance,improve knowledge systems,reform practical modes with a focus on skill development,and cultivate good dispositions through student-centered education.The teaching reform’s attempts and practice are conducted in some courses such as Advanced Web Technologies,Software Engineering,and Intelligent Terminal Systems and Application Development.Through the analysis and comparison of the implementation effects,significant improvements are observed in teaching effectiveness,students’mastery of knowledge and skills are noticeably improved,and the expected goals of the teaching reform are achieved. 展开更多
关键词 Competency model Software engineering Reform practice Computing Curricula
下载PDF
Temporal and Spatial Variation Characteristics of Snow Cover Area in the Pamirs from 2010 to 2020
17
作者 Bihu Wang Liangjun Zhao Yuansong Li 《Open Journal of Applied Sciences》 CAS 2023年第1期109-119,共11页
Scientific and comprehensive monitoring of snow cover changes in the Pamirs is of great significance to the prevention of snow disasters around the Pamirs and the full utilization of water resources. Utilize the 2010-... Scientific and comprehensive monitoring of snow cover changes in the Pamirs is of great significance to the prevention of snow disasters around the Pamirs and the full utilization of water resources. Utilize the 2010-2020 snow cover product MOD10A2, Synthesis by maximum, The temporal and spatial variation characteristics of snow cover area in the Pamirs in the past 11 years have been obtained. Research indicates: In terms of interannual changes, the snow cover area of the Pamir Plateau from 2010 to 2020 generally showed a slight decrease trend. The average snow cover area in 2012 was the largest, reaching 54.167% of the total area. In 2014, the average snow cover area was the smallest, accounting for only 44.863% of the total area. In terms of annual changes, there are obvious changes with the change of seasons. The largest snow area is in March, and the smallest snow area is in August. In the past 11 years, the average snow cover area in spring and summer showed a slow decreasing trend, and there was almost no change in autumn and winter. In terms of space, the snow cover area of the Pamirs is significantly affected by altitude, and the high snow cover areas are mainly distributed in the Karakoram Mountains and other areas with an altitude greater than 5000 meters. 展开更多
关键词 PAMIRS Snow Cover Area MOD10A2 Space-Time Change
下载PDF
Design of Li River Water Quality Dynamic Monitoring System Based on Raspberry Pi and TinyML
18
作者 Xinyi Tang 《Journal of Computer and Communications》 2023年第8期121-133,共13页
In order to solve the problem of scientific monitoring of water quality, a trophic monitoring system for Li River water quality is developed to improve the decision-making of related environmental management departmen... In order to solve the problem of scientific monitoring of water quality, a trophic monitoring system for Li River water quality is developed to improve the decision-making of related environmental management departments. The system is based on embedded computing, deep learning and Internet of Things technology, combined with software and hardware design, to automatically obtain real-time water quality parameters with Raspberry Pi equipped with sensors and positioning modules. A camera is employed to capture the screen, and yolo-tiny image recognition is implemented in the Raspberry Pi. Lastly, the cloud storage is used for interaction to realize real-time monitoring of water quality, real-time positioning of the boat, real-time return of image recognition and visualization. The system is proven efficient and intelligent in facilitating water quality protection. 展开更多
关键词 Raspberry Pi Sensors YOLO-Tiny Model Cloud Development
下载PDF
Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment
19
作者 Mohan Nagamunthala Ramakrishnan Manjula 《Journal of Computer and Communications》 2023年第10期135-149,共15页
In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of t... In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method. 展开更多
关键词 Cloud Computing Image Encryption
下载PDF
Japanese Sign Language Recognition by Combining Joint Skeleton-Based Handcrafted and Pixel-Based Deep Learning Features with Machine Learning Classification
20
作者 Jungpil Shin Md.Al Mehedi Hasan +2 位作者 Abu Saleh Musa Miah Kota Suzuki Koki Hirooka 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期2605-2625,共21页
Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing communities.In Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japane... Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing communities.In Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japanese Sign Language(JSL)for communication.However,existing JSL recognition systems have faced significant performance limitations due to inherent complexities.In response to these challenges,we present a novel JSL recognition system that employs a strategic fusion approach,combining joint skeleton-based handcrafted features and pixel-based deep learning features.Our system incorporates two distinct streams:the first stream extracts crucial handcrafted features,emphasizing the capture of hand and body movements within JSL gestures.Simultaneously,a deep learning-based transfer learning stream captures hierarchical representations of JSL gestures in the second stream.Then,we concatenated the critical information of the first stream and the hierarchy of the second stream features to produce the multiple levels of the fusion features,aiming to create a comprehensive representation of the JSL gestures.After reducing the dimensionality of the feature,a feature selection approach and a kernel-based support vector machine(SVM)were used for the classification.To assess the effectiveness of our approach,we conducted extensive experiments on our Lab JSL dataset and a publicly available Arabic sign language(ArSL)dataset.Our results unequivocally demonstrate that our fusion approach significantly enhances JSL recognition accuracy and robustness compared to individual feature sets or traditional recognition methods. 展开更多
关键词 Japanese Sign Language(JSL) hand gesture recognition geometric feature distance feature angle feature GoogleNet
下载PDF
上一页 1 2 63 下一页 到第
使用帮助 返回顶部