In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in it...In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in its own right,boundaries necessarily arose between it and other disciplines,in a way that is now often detrimental to progress.Therefore,it is necessary to reinvigorate the relationship between computer science and other academic disciplines and celebrate exploration and creativity in research.To do this,the structures of the academic department have to act as supporting scaffolding rather than barriers.Some examples are given that show the efforts being made at the University of Cambridge to approach this problem.展开更多
Since its inaugural issue in 1986,the Journal of Computer Science and Technology(JCST)has been the premier English journal of China Computer Federation(CCF),serving international readers and authors by disseminating s...Since its inaugural issue in 1986,the Journal of Computer Science and Technology(JCST)has been the premier English journal of China Computer Federation(CCF),serving international readers and authors by disseminating scholarly and technical papers under a rigorous review process.展开更多
This study explores the feasibility of constructing an intelligent educational evaluation system based on the CIPP model and artificial intelligence technology in the context of new engineering disciplines.By integrat...This study explores the feasibility of constructing an intelligent educational evaluation system based on the CIPP model and artificial intelligence technology in the context of new engineering disciplines.By integrating the CIPP model with AI technology,a novel intelligent educational evaluation system was designed.Through experimental validation and case studies,the system demonstrated significant effectiveness in improving teaching quality,facilitating personalized student development,and optimizing educational resource allocation.Additionally,the study predicts potential changes this system could bring to the education industry and proposes relevant policy recommendations.Although the current research has limitations,with technological advancements in the future,this system is expected to provide stronger support for innovations in engineering education models.展开更多
Plant diseases are a major threat that can severely impact the production of agriculture and forestry.This can lead to the disruption of ecosystem functions and health.With its ability to capture continuous narrow-ban...Plant diseases are a major threat that can severely impact the production of agriculture and forestry.This can lead to the disruption of ecosystem functions and health.With its ability to capture continuous narrow-band spectra,hyperspectral technology has become a crucial tool to monitor crop diseases using remote sensing.However,existing continuous wavelet analysis(CWA)methods suffer from feature redundancy issues,while the continuous wavelet projection algorithm(CWPA),an optimization approach for feature selection,has not been fully validated to monitor plant diseases.This study utilized rice bacterial leaf blight(BLB)as an example by evaluating the performance of four wavelet basis functions-Gaussian2,Mexican hat,Meyer,andMorlet-within theCWAandCWPAframeworks.Additionally,the classification models were constructed using the k-nearest neighbors(KNN),randomforest(RF),and Naïve Bayes(NB)algorithms.The results showed the following:(1)Compared to traditional CWA,CWPA significantly reduced the number of required features.Under the CWPA framework,almost all the model combinations achieved maximum classification accuracy with only one feature.In contrast,the CWA framework required three to seven features.(2)Thechoice of wavelet basis functions markedly affected the performance of themodel.Of the four functions tested,the Meyer wavelet demonstrated the best overall performance in both the CWPA and CWA frameworks.(3)Under theCWPAframework,theMeyer-KNNandMeyer-NBcombinations achieved the highest overall accuracy of 93.75%using just one feature.In contrast,under the CWA framework,the CWA-RF combination achieved comparable accuracy(93.75%)but required six features.This study verified the technical advantages of CWPA for monitoring crop diseases,identified an optimal wavelet basis function selection scheme,and provided reliable technical support to precisely monitor BLB in rice(Oryza sativa).Moreover,the proposed methodological framework offers a scalable approach for the early diagnosis and assessment of plant stress,which can contribute to improved accuracy and timeliness when plant stress is monitored.展开更多
Rockfall kinematic characteristics exhibit significant randomness and are influenced by factors such as rock mass properties,slope morphology,impact angle,and slope materials.Accurately determining the key parameters ...Rockfall kinematic characteristics exhibit significant randomness and are influenced by factors such as rock mass properties,slope morphology,impact angle,and slope materials.Accurately determining the key parameters of rockfall movement is critical for understanding motion patterns and effectively preventing and controlling rockfall hazards.In this study,a monitoring system consisting of selfdeveloped inertial navigation equipment,high-speed cameras,and an unmanned aerial vehicle was used to conduct onsite motion tests involving four differently shaped rock specimens on three types of slopes(bedrock,detritus,and clast bedding).The selfdeveloped inertial navigation system integrated a highdynamic-range accelerometer(±400 g)and a shockresistant gyroscope(±4000°/s),capable of robustly collecting data during the test.The data collected from these tests were processed to extract key kinematic parameters such as velocity,trajectory,restitution coefficients,and friction coefficients.The test results demonstrated that the inertial navigation system accurately recorded the acceleration and angular velocity of the rocks during motion,with these measurements closely aligning with the field data.The normal and tangential restitution coefficients were found to be influenced primarily by the slope material and impact angle,with higher normal restitution coefficients observed for low-angle impacts.The normal restitution coefficients ranged from 0.35 to 0.86,whereas the tangential restitution coefficients ranged from 0.46 to 0.91,depending on the slope materials.Additionally,the sliding friction coefficient was calculated to be between 0.66 and 0.78,whereas the rolling friction coefficient for the slab-shaped specimen was determined to be 0.53.These findings provide valuable data for improving the accuracy of rockfall trajectory predictions and the design of protective structures.展开更多
With the rapid development of China’s economy,the demand for high-end talents in the field of engineering technology is becoming increasingly prominent.Engineering doctors,as an important force in this field,have a d...With the rapid development of China’s economy,the demand for high-end talents in the field of engineering technology is becoming increasingly prominent.Engineering doctors,as an important force in this field,have a direct impact on the progress of national technological innovation and the upgrading of industrial structure.Currently,there are still some issues in the university-enterprise collaboration for engineering doctor training in China,such as unclear cooperation mechanisms and responsibility divisions,insufficient corporate participation and enthusiasm,and imperfect evaluation and feedback mechanisms.This paper aims to explore the university-enterprise collaborative training path of engineering doctors from the perspective of deep integration,analyzing multiple dimensions including training objectives,curriculum design,practical sessions,mentor teams,and evaluation systems,in order to provide reference for the reform and practice of engineering doctor training in China.展开更多
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal...In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system.展开更多
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate...In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.展开更多
The accuracy and repeatability of computer aided cervical vertebra landmarking (CACVL) were investigated in cephalogram.120 adolescents (60 boys,60 girls) aged from 9.1 to 17.2 years old were randomly selected.Twenty-...The accuracy and repeatability of computer aided cervical vertebra landmarking (CACVL) were investigated in cephalogram.120 adolescents (60 boys,60 girls) aged from 9.1 to 17.2 years old were randomly selected.Twenty-seven landmarks from the second to fifth cervical vertebrae on the lat-eral cephalogram were identified.In this study,the system of CACVL was developed and used to iden-tify and calculate the landmarks by fast marching method and parabolic curve fitting.The accuracy and repeatability in CACVL group were compared with those in two manual landmarking groups [orthodon-tic experts (OE) group and orthodontic novices (ON) group].The results showed that,as for the accu-racy,there was no significant difference between CACVL group and OE group no matter in x-axis or y-axis (P>0.05),but there was significant difference between CACVL group and ON group,as well as OE group and ON group in both axes (P<0.05).As for the repeatability,CACVL group was more reli-able than OE group and ON group in both axes.It is concluded that CACVL has the same or higher ac-curacy,better repeatability and less workload than manual landmarking methods.It’s reliable for cervi-cal parameters identification on the lateral cephalogram and cervical vertebral maturation prediction in orthodontic practice and research.展开更多
This paper optimizes the buried channel charge-coupled device(BCCD) structure fabricated by complementary metal oxide semiconductor(CMOS) technology. The optimized BCCD has advantages of low noise, high integration an...This paper optimizes the buried channel charge-coupled device(BCCD) structure fabricated by complementary metal oxide semiconductor(CMOS) technology. The optimized BCCD has advantages of low noise, high integration and high image quality. The charge transfer process shows that interface traps, weak fringing fields and potential well between adjacent gates all cause the decrease of charge transfer efficiency(CTE). CTE and well capacity are simulated with different operating voltages and gap sizes. CTE can achieve 99.999% and the well capacity reaches up to 25 000 electrons for the gap size of 130 nm and the maximum operating voltage of 3 V.展开更多
The present study utilized motor imaginary-based brain-computer interface technology combined with rehabilitation training in 20 stroke patients. Results from the Berg Balance Scale and the Holden Walking Classificati...The present study utilized motor imaginary-based brain-computer interface technology combined with rehabilitation training in 20 stroke patients. Results from the Berg Balance Scale and the Holden Walking Classification were significantly greater at 4 weeks after treatment (P 〈 0.01), which suggested that motor imaginary-based brain-computer interface technology improved balance and walking in stroke patients.展开更多
The technology of remote transaction mirror image is a feasible, low-investment and well-effect disaster backup scheme in finance business system. The basic idea, construction, working principles and characteristic of...The technology of remote transaction mirror image is a feasible, low-investment and well-effect disaster backup scheme in finance business system. The basic idea, construction, working principles and characteristic of remote transaction mirror image are presented in this paper. We analyze and compare similarities and differences among this disaster backup scheme and others usually used. The technology of remote transaction mirror image have the advantages such as less requiring of software and hardware system platform, low-investment, being able to control and restore lost data, insuring the data consistency and integrity.展开更多
With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also...With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.展开更多
The chest radiograph has been one of the most frequently performed radiological investigation tools.In clinical medicine,the chest radiograph can provide technical basis and scientific instruction to recognize a serie...The chest radiograph has been one of the most frequently performed radiological investigation tools.In clinical medicine,the chest radiograph can provide technical basis and scientific instruction to recognize a series of thoracic diseases(such as Atelectasis,Nodule,and Pneumonia,etc.).Importantly,it is of paramount importance for clinical screening,diagnosis,treatment planning,and efficacy evaluation.However,it remains challenging for automated chest radiograph diagnosis and interpretation at the level of an experienced radiologist.In recent years,many studies on biomedical image processing have advanced rapidly with the development of artificial intelligence especially deep learning techniques and algorithms.How to build an efficient and accurate deep learning model for automatic chest radiograph processing is an important scientific problem that needs to be solved.展开更多
0 Introduction The surprising growth of the Internet, coupled with the rapid development of Web technique and more and more emergence of web information system and application, is bring great opportunities and big cha...0 Introduction The surprising growth of the Internet, coupled with the rapid development of Web technique and more and more emergence of web information system and application, is bring great opportunities and big challenges to us. Since the Web provides cross-platform universal access to resources for the massive user population, even greater demand is requested to manage data and services effectively.展开更多
This paper analyzes the requirement of professional computer talents in Chinese universities,and introduces the practice in innovative educational methods taken by Shandong University in an open and research environme...This paper analyzes the requirement of professional computer talents in Chinese universities,and introduces the practice in innovative educational methods taken by Shandong University in an open and research environment.In order to improve educational quality,we have carried out a serial of reforms,including "Four Experiences" aiming at diversifying study environments and fostering their adaptability and extending their vision.Students are encouraged to join "Research Assistant" program and participate in scientific projects to improve their ability in research and innovation.They also conduct "Engineering Practice" to learn latest modeling and programming skills.Compound talents characterized of solid foundation,high quality and strong practical ability are shaped through these initiatives.展开更多
The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence(AI)techniques(such as machine learning(ML)and deep learning(DL))to build more e...The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence(AI)techniques(such as machine learning(ML)and deep learning(DL))to build more efficient and reliable intrusion detection systems(IDSs).However,the advent of larger IDS datasets has negatively impacted the performance and computational complexity of AI-based IDSs.Many researchers used data preprocessing techniques such as feature selection and normalization to overcome such issues.While most of these researchers reported the success of these preprocessing techniques on a shallow level,very few studies have been performed on their effects on a wider scale.Furthermore,the performance of an IDS model is subject to not only the utilized preprocessing techniques but also the dataset and the ML/DL algorithm used,which most of the existing studies give little emphasis on.Thus,this study provides an in-depth analysis of feature selection and normalization effects on IDS models built using three IDS datasets:NSL-KDD,UNSW-NB15,and CSE–CIC–IDS2018,and various AI algorithms.A wrapper-based approach,which tends to give superior performance,and min-max normalization methods were used for feature selection and normalization,respectively.Numerous IDS models were implemented using the full and feature-selected copies of the datasets with and without normalization.The models were evaluated using popular evaluation metrics in IDS modeling,intra-and inter-model comparisons were performed between models and with state-of-the-art works.Random forest(RF)models performed better on NSL-KDD and UNSW-NB15 datasets with accuracies of 99.86%and 96.01%,respectively,whereas artificial neural network(ANN)achieved the best accuracy of 95.43%on the CSE–CIC–IDS2018 dataset.The RF models also achieved an excellent performance compared to recent works.The results show that normalization and feature selection positively affect IDS modeling.Furthermore,while feature selection benefits simpler algorithms(such as RF),normalization is more useful for complex algorithms like ANNs and deep neural networks(DNNs),and algorithms such as Naive Bayes are unsuitable for IDS modeling.The study also found that the UNSW-NB15 and CSE–CIC–IDS2018 datasets are more complex and more suitable for building and evaluating modern-day IDS than the NSL-KDD dataset.Our findings suggest that prioritizing robust algorithms like RF,alongside complex models such as ANN and DNN,can significantly enhance IDS performance.These insights provide valuable guidance for managers to develop more effective security measures by focusing on high detection rates and low false alert rates.展开更多
In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to in...In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to individually present their laptops for inspection. The paper introduced a method for laptop removal. By combining projection algorithms with the YOLOv7-Seg model, a laptop’s three views were generated through projection, and instance segmentation of these views was achieved using YOLOv7-Seg. The resulting 2D masks from instance segmentation at different angles were employed to reconstruct a 3D mask through angle restoration. Ultimately, the intersection of this 3D mask with the original 3D data enabled the successful extraction of the laptop’s 3D information. Experimental results demonstrated that the fusion of projection and instance segmentation facilitated the automatic removal of laptops from CT data. Moreover, higher instance segmentation model accuracy leads to more precise removal outcomes. By implementing the laptop removal functionality, the civil aviation security screening process becomes more efficient and convenient. Passengers will no longer be required to individually handle their laptops, effectively enhancing the efficiency and accuracy of security screening.展开更多
At the panel session of the 3rd Global Forum on the Development of Computer Science,attendees had an opportunity to deliberate recent issues affecting computer science departments as a result of the recent growth in t...At the panel session of the 3rd Global Forum on the Development of Computer Science,attendees had an opportunity to deliberate recent issues affecting computer science departments as a result of the recent growth in the field.6 heads of university computer science departments participated in the discussions,including the moderator,Professor Andrew Yao.The first issue was how universities are managing the growing number of applicants in addition to swelling class sizes.Several approaches were suggested,including increasing faculty hiring,implementing scalable teaching tools,and working closer with other departments through degree programs that integrate computer science with other fields.The second issue was about the position and role of computer science within broader science.Participants generally agreed that all fields are increasingly relying on computer science techniques,and that effectively disseminating these techniques to others is a key to unlocking broader scientific progress.展开更多
Embodied visual exploration is critical for building intelligent visual agents. This paper presents the neural exploration with feature-based visual odometry and tracking-failure-reduction policy(Ne OR), a framework f...Embodied visual exploration is critical for building intelligent visual agents. This paper presents the neural exploration with feature-based visual odometry and tracking-failure-reduction policy(Ne OR), a framework for embodied visual exploration that possesses the efficient exploration capabilities of deep reinforcement learning(DRL)-based exploration policies and leverages feature-based visual odometry(VO) for more accurate mapping and positioning results. An improved local policy is also proposed to reduce tracking failures of feature-based VO in weakly textured scenes through a refined multi-discrete action space, keyframe fusion, and an auxiliary task. The experimental results demonstrate that Ne OR has better mapping and positioning accuracy compared to other entirely learning-based exploration frameworks and improves the robustness of feature-based VO by significantly reducing tracking failures in weakly textured scenes.展开更多
文摘In the very beginning,the Computer Laboratory of the University of Cambridge was founded to provide computing service for different disciplines across the university.As computer science developed as a discipline in its own right,boundaries necessarily arose between it and other disciplines,in a way that is now often detrimental to progress.Therefore,it is necessary to reinvigorate the relationship between computer science and other academic disciplines and celebrate exploration and creativity in research.To do this,the structures of the academic department have to act as supporting scaffolding rather than barriers.Some examples are given that show the efforts being made at the University of Cambridge to approach this problem.
文摘Since its inaugural issue in 1986,the Journal of Computer Science and Technology(JCST)has been the premier English journal of China Computer Federation(CCF),serving international readers and authors by disseminating scholarly and technical papers under a rigorous review process.
基金Liaoning Provincial Social Science Planning Fund“Research on the Educational Intelligent Evaluation System Based on the CIPP Model and Artificial Intelligence under the Background of New Engineering”(L22BTJ005)。
文摘This study explores the feasibility of constructing an intelligent educational evaluation system based on the CIPP model and artificial intelligence technology in the context of new engineering disciplines.By integrating the CIPP model with AI technology,a novel intelligent educational evaluation system was designed.Through experimental validation and case studies,the system demonstrated significant effectiveness in improving teaching quality,facilitating personalized student development,and optimizing educational resource allocation.Additionally,the study predicts potential changes this system could bring to the education industry and proposes relevant policy recommendations.Although the current research has limitations,with technological advancements in the future,this system is expected to provide stronger support for innovations in engineering education models.
基金supported by the‘Pioneer’and‘Leading Goose’R&D Program of Zhejiang(Grant No.2023C02018)Zhejiang Provincial Natural Science Foundation of China(Grant No.LTGN23D010002)+2 种基金National Natural Science Foundation of China(Grant No.42371385)Funds of the Natural Science Foundation of Hangzhou(Grant No.2024SZRYBD010001)Nanxun Scholars Program of ZJWEU(Grant No.RC2022010755).
文摘Plant diseases are a major threat that can severely impact the production of agriculture and forestry.This can lead to the disruption of ecosystem functions and health.With its ability to capture continuous narrow-band spectra,hyperspectral technology has become a crucial tool to monitor crop diseases using remote sensing.However,existing continuous wavelet analysis(CWA)methods suffer from feature redundancy issues,while the continuous wavelet projection algorithm(CWPA),an optimization approach for feature selection,has not been fully validated to monitor plant diseases.This study utilized rice bacterial leaf blight(BLB)as an example by evaluating the performance of four wavelet basis functions-Gaussian2,Mexican hat,Meyer,andMorlet-within theCWAandCWPAframeworks.Additionally,the classification models were constructed using the k-nearest neighbors(KNN),randomforest(RF),and Naïve Bayes(NB)algorithms.The results showed the following:(1)Compared to traditional CWA,CWPA significantly reduced the number of required features.Under the CWPA framework,almost all the model combinations achieved maximum classification accuracy with only one feature.In contrast,the CWA framework required three to seven features.(2)Thechoice of wavelet basis functions markedly affected the performance of themodel.Of the four functions tested,the Meyer wavelet demonstrated the best overall performance in both the CWPA and CWA frameworks.(3)Under theCWPAframework,theMeyer-KNNandMeyer-NBcombinations achieved the highest overall accuracy of 93.75%using just one feature.In contrast,under the CWA framework,the CWA-RF combination achieved comparable accuracy(93.75%)but required six features.This study verified the technical advantages of CWPA for monitoring crop diseases,identified an optimal wavelet basis function selection scheme,and provided reliable technical support to precisely monitor BLB in rice(Oryza sativa).Moreover,the proposed methodological framework offers a scalable approach for the early diagnosis and assessment of plant stress,which can contribute to improved accuracy and timeliness when plant stress is monitored.
基金supported by Guizhou Provincial Basic Research Program(Natural Science,Grant No.QKHJC-ZK[2022]YB075)the National Natural Science Foundation of China(Grant No.42067046)+2 种基金the Guizhou Provincial Program on Commercialization of Scientific and Technological Achievements(N0.QKHCG-LH2024-ZD025)the Science and Technology Planning Project of Guiyang City(Grant No.ZKHT[2023]13-10)Undergraduate Training Program for Innovation and Entrepreneurship of Guizhou Province(Project No.S202110657053)。
文摘Rockfall kinematic characteristics exhibit significant randomness and are influenced by factors such as rock mass properties,slope morphology,impact angle,and slope materials.Accurately determining the key parameters of rockfall movement is critical for understanding motion patterns and effectively preventing and controlling rockfall hazards.In this study,a monitoring system consisting of selfdeveloped inertial navigation equipment,high-speed cameras,and an unmanned aerial vehicle was used to conduct onsite motion tests involving four differently shaped rock specimens on three types of slopes(bedrock,detritus,and clast bedding).The selfdeveloped inertial navigation system integrated a highdynamic-range accelerometer(±400 g)and a shockresistant gyroscope(±4000°/s),capable of robustly collecting data during the test.The data collected from these tests were processed to extract key kinematic parameters such as velocity,trajectory,restitution coefficients,and friction coefficients.The test results demonstrated that the inertial navigation system accurately recorded the acceleration and angular velocity of the rocks during motion,with these measurements closely aligning with the field data.The normal and tangential restitution coefficients were found to be influenced primarily by the slope material and impact angle,with higher normal restitution coefficients observed for low-angle impacts.The normal restitution coefficients ranged from 0.35 to 0.86,whereas the tangential restitution coefficients ranged from 0.46 to 0.91,depending on the slope materials.Additionally,the sliding friction coefficient was calculated to be between 0.66 and 0.78,whereas the rolling friction coefficient for the slab-shaped specimen was determined to be 0.53.These findings provide valuable data for improving the accuracy of rockfall trajectory predictions and the design of protective structures.
基金supported in part by the 2023 College Student Innovation and Entrepreneurship Training 430 Program Project of China(Grant No.202310699159)2024 Graduate Education Comprehensive Reform,Development and Innovation Project of Northwestern Polytechnical University(Grant No.KCJG202432)2023 Northwestern Polytechnical University Degree and Postgraduate Education Research Funding(Grant No.2023YMs014)。
文摘With the rapid development of China’s economy,the demand for high-end talents in the field of engineering technology is becoming increasingly prominent.Engineering doctors,as an important force in this field,have a direct impact on the progress of national technological innovation and the upgrading of industrial structure.Currently,there are still some issues in the university-enterprise collaboration for engineering doctor training in China,such as unclear cooperation mechanisms and responsibility divisions,insufficient corporate participation and enthusiasm,and imperfect evaluation and feedback mechanisms.This paper aims to explore the university-enterprise collaborative training path of engineering doctors from the perspective of deep integration,analyzing multiple dimensions including training objectives,curriculum design,practical sessions,mentor teams,and evaluation systems,in order to provide reference for the reform and practice of engineering doctor training in China.
基金supported by National Natural Science Foundation of China (62171390)Central Universities of Southwest Minzu University (ZYN2022032,2023NYXXS034)the State Scholarship Fund of the China Scholarship Council (NO.202008510081)。
文摘In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signals make the receiving ability of the signal receiver worse, the signal processing ability weaker,and the anti-interference ability of the communication system lower. Aiming at the above problems, to save communication resources and improve communication efficiency, and considering the irregularity of interference signals, the underdetermined blind separation technology can effectively deal with the problem of interference sensing and signal reconstruction in this scenario. In order to improve the stability of source signal separation and the security of information transmission, a greedy optimization algorithm can be executed. At the same time, to improve network information transmission efficiency and prevent algorithms from getting trapped in local optima, delete low-energy points during each iteration process. Ultimately, simulation experiments validate that the algorithm presented in this paper enhances both the transmission efficiency of the network transmission system and the security of the communication system, achieving the process of interference sensing and signal reconstruction in the LEO satellite communication system.
基金supported in part by the National Natural Science Foundation of China under Grant No.U2268204,62172061 and 61871422National Key R&D Program of China under Grant No.2020YFB1711800 and 2020YFB1707900+2 种基金the Science and Technology Project of Sichuan Province under Grant No.2023ZHCG0014,2023ZHCG0011,2022YFG0155,2022YFG0157,2021GFW019,2021YFG0152,2021YFG0025,2020YFG0322Central Universities of Southwest Minzu University under Grant No.ZYN2022032,2023NYXXS034the State Scholarship Fund of the China Scholarship Council under Grant No.202008510081。
文摘In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.
基金supported by grants from National Natural Sciences Foundation of China (No. 30801314)China Hubei Provincial Science and Technology Department (No.2008CBD088)
文摘The accuracy and repeatability of computer aided cervical vertebra landmarking (CACVL) were investigated in cephalogram.120 adolescents (60 boys,60 girls) aged from 9.1 to 17.2 years old were randomly selected.Twenty-seven landmarks from the second to fifth cervical vertebrae on the lat-eral cephalogram were identified.In this study,the system of CACVL was developed and used to iden-tify and calculate the landmarks by fast marching method and parabolic curve fitting.The accuracy and repeatability in CACVL group were compared with those in two manual landmarking groups [orthodon-tic experts (OE) group and orthodontic novices (ON) group].The results showed that,as for the accu-racy,there was no significant difference between CACVL group and OE group no matter in x-axis or y-axis (P>0.05),but there was significant difference between CACVL group and ON group,as well as OE group and ON group in both axes (P<0.05).As for the repeatability,CACVL group was more reli-able than OE group and ON group in both axes.It is concluded that CACVL has the same or higher ac-curacy,better repeatability and less workload than manual landmarking methods.It’s reliable for cervi-cal parameters identification on the lateral cephalogram and cervical vertebral maturation prediction in orthodontic practice and research.
基金supported by the National Natural Science Foundation of China(Nos.61306070,61404090 and 61674115)
文摘This paper optimizes the buried channel charge-coupled device(BCCD) structure fabricated by complementary metal oxide semiconductor(CMOS) technology. The optimized BCCD has advantages of low noise, high integration and high image quality. The charge transfer process shows that interface traps, weak fringing fields and potential well between adjacent gates all cause the decrease of charge transfer efficiency(CTE). CTE and well capacity are simulated with different operating voltages and gap sizes. CTE can achieve 99.999% and the well capacity reaches up to 25 000 electrons for the gap size of 130 nm and the maximum operating voltage of 3 V.
基金the National Natural Science Foundation of China,No.60970062the Shanghai Pujiang Program,No.09PJ1410200
文摘The present study utilized motor imaginary-based brain-computer interface technology combined with rehabilitation training in 20 stroke patients. Results from the Berg Balance Scale and the Holden Walking Classification were significantly greater at 4 weeks after treatment (P 〈 0.01), which suggested that motor imaginary-based brain-computer interface technology improved balance and walking in stroke patients.
基金This work was supported by"Shu Guang"project of Shanghai Municipal Education Commission and Shanghai Education Development Foundation (No.2002SG53) and was also supported by Science and Technology Foundation of Shanghai Higher Education (No.CL200222).
文摘The technology of remote transaction mirror image is a feasible, low-investment and well-effect disaster backup scheme in finance business system. The basic idea, construction, working principles and characteristic of remote transaction mirror image are presented in this paper. We analyze and compare similarities and differences among this disaster backup scheme and others usually used. The technology of remote transaction mirror image have the advantages such as less requiring of software and hardware system platform, low-investment, being able to control and restore lost data, insuring the data consistency and integrity.
基金supportedin part by Sub-project "Mobile Internet Architecture and Key Technology Research" of National Core Electronic Devices,High-end Generic Chips and Basic Software (CHBS) Project "Development Strategy and Planning ofMobile Internet System Hardware and Software Technology and Service" under Grant No.2012ZX01039003Sub-project "IPv6 Application and Demonstration of Mobile Internet inCampus Environment" of National Sci-Tech Major Special Item Project "IPv6 Applicationand Demonstration of Mobile Internet" under Grant No. 2012ZX03002015-003A New Network Architecture:Address Driven Network Architecture and Technology Research and Development under Grant No. CNGI-12-03-001
文摘With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively.
文摘The chest radiograph has been one of the most frequently performed radiological investigation tools.In clinical medicine,the chest radiograph can provide technical basis and scientific instruction to recognize a series of thoracic diseases(such as Atelectasis,Nodule,and Pneumonia,etc.).Importantly,it is of paramount importance for clinical screening,diagnosis,treatment planning,and efficacy evaluation.However,it remains challenging for automated chest radiograph diagnosis and interpretation at the level of an experienced radiologist.In recent years,many studies on biomedical image processing have advanced rapidly with the development of artificial intelligence especially deep learning techniques and algorithms.How to build an efficient and accurate deep learning model for automatic chest radiograph processing is an important scientific problem that needs to be solved.
文摘0 Introduction The surprising growth of the Internet, coupled with the rapid development of Web technique and more and more emergence of web information system and application, is bring great opportunities and big challenges to us. Since the Web provides cross-platform universal access to resources for the massive user population, even greater demand is requested to manage data and services effectively.
文摘This paper analyzes the requirement of professional computer talents in Chinese universities,and introduces the practice in innovative educational methods taken by Shandong University in an open and research environment.In order to improve educational quality,we have carried out a serial of reforms,including "Four Experiences" aiming at diversifying study environments and fostering their adaptability and extending their vision.Students are encouraged to join "Research Assistant" program and participate in scientific projects to improve their ability in research and innovation.They also conduct "Engineering Practice" to learn latest modeling and programming skills.Compound talents characterized of solid foundation,high quality and strong practical ability are shaped through these initiatives.
文摘The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence(AI)techniques(such as machine learning(ML)and deep learning(DL))to build more efficient and reliable intrusion detection systems(IDSs).However,the advent of larger IDS datasets has negatively impacted the performance and computational complexity of AI-based IDSs.Many researchers used data preprocessing techniques such as feature selection and normalization to overcome such issues.While most of these researchers reported the success of these preprocessing techniques on a shallow level,very few studies have been performed on their effects on a wider scale.Furthermore,the performance of an IDS model is subject to not only the utilized preprocessing techniques but also the dataset and the ML/DL algorithm used,which most of the existing studies give little emphasis on.Thus,this study provides an in-depth analysis of feature selection and normalization effects on IDS models built using three IDS datasets:NSL-KDD,UNSW-NB15,and CSE–CIC–IDS2018,and various AI algorithms.A wrapper-based approach,which tends to give superior performance,and min-max normalization methods were used for feature selection and normalization,respectively.Numerous IDS models were implemented using the full and feature-selected copies of the datasets with and without normalization.The models were evaluated using popular evaluation metrics in IDS modeling,intra-and inter-model comparisons were performed between models and with state-of-the-art works.Random forest(RF)models performed better on NSL-KDD and UNSW-NB15 datasets with accuracies of 99.86%and 96.01%,respectively,whereas artificial neural network(ANN)achieved the best accuracy of 95.43%on the CSE–CIC–IDS2018 dataset.The RF models also achieved an excellent performance compared to recent works.The results show that normalization and feature selection positively affect IDS modeling.Furthermore,while feature selection benefits simpler algorithms(such as RF),normalization is more useful for complex algorithms like ANNs and deep neural networks(DNNs),and algorithms such as Naive Bayes are unsuitable for IDS modeling.The study also found that the UNSW-NB15 and CSE–CIC–IDS2018 datasets are more complex and more suitable for building and evaluating modern-day IDS than the NSL-KDD dataset.Our findings suggest that prioritizing robust algorithms like RF,alongside complex models such as ANN and DNN,can significantly enhance IDS performance.These insights provide valuable guidance for managers to develop more effective security measures by focusing on high detection rates and low false alert rates.
文摘In civil aviation security screening, laptops, with their intricate structural composition, provide the potential for criminals to conceal dangerous items. Presently, the security process necessitates passengers to individually present their laptops for inspection. The paper introduced a method for laptop removal. By combining projection algorithms with the YOLOv7-Seg model, a laptop’s three views were generated through projection, and instance segmentation of these views was achieved using YOLOv7-Seg. The resulting 2D masks from instance segmentation at different angles were employed to reconstruct a 3D mask through angle restoration. Ultimately, the intersection of this 3D mask with the original 3D data enabled the successful extraction of the laptop’s 3D information. Experimental results demonstrated that the fusion of projection and instance segmentation facilitated the automatic removal of laptops from CT data. Moreover, higher instance segmentation model accuracy leads to more precise removal outcomes. By implementing the laptop removal functionality, the civil aviation security screening process becomes more efficient and convenient. Passengers will no longer be required to individually handle their laptops, effectively enhancing the efficiency and accuracy of security screening.
文摘At the panel session of the 3rd Global Forum on the Development of Computer Science,attendees had an opportunity to deliberate recent issues affecting computer science departments as a result of the recent growth in the field.6 heads of university computer science departments participated in the discussions,including the moderator,Professor Andrew Yao.The first issue was how universities are managing the growing number of applicants in addition to swelling class sizes.Several approaches were suggested,including increasing faculty hiring,implementing scalable teaching tools,and working closer with other departments through degree programs that integrate computer science with other fields.The second issue was about the position and role of computer science within broader science.Participants generally agreed that all fields are increasingly relying on computer science techniques,and that effectively disseminating these techniques to others is a key to unlocking broader scientific progress.
基金supported by the National Natural Science Foundation of China (No.62202137)the China Postdoctoral Science Foundation (No.2023M730599)the Zhejiang Provincial Natural Science Foundation of China (No.LMS25F020009)。
文摘Embodied visual exploration is critical for building intelligent visual agents. This paper presents the neural exploration with feature-based visual odometry and tracking-failure-reduction policy(Ne OR), a framework for embodied visual exploration that possesses the efficient exploration capabilities of deep reinforcement learning(DRL)-based exploration policies and leverages feature-based visual odometry(VO) for more accurate mapping and positioning results. An improved local policy is also proposed to reduce tracking failures of feature-based VO in weakly textured scenes through a refined multi-discrete action space, keyframe fusion, and an auxiliary task. The experimental results demonstrate that Ne OR has better mapping and positioning accuracy compared to other entirely learning-based exploration frameworks and improves the robustness of feature-based VO by significantly reducing tracking failures in weakly textured scenes.