期刊文献+
共找到173,179篇文章
< 1 2 250 >
每页显示 20 50 100
From Control to Empowerment:A Paradigm Shift in the Discourse of Educational Supervision
1
作者 Jinhua Zhou Kai Zhang 《Journal of Contemporary Educational Research》 2024年第9期176-180,共5页
As educational reforms intensify and societal emphasis shifts towards empowerment,the traditional discourse paradigm of management and control in educational supervision faces growing challenges.This paper explores th... As educational reforms intensify and societal emphasis shifts towards empowerment,the traditional discourse paradigm of management and control in educational supervision faces growing challenges.This paper explores the transformation of this discourse paradigm through the lens of empowerment,analyzing its distinct characteristics,potential pathways,and effective strategies.This paper begins by reviewing the concept of empowerment and examining the current research landscape surrounding the discourse paradigm in educational supervision.Subsequently,we conduct a comparative analysis of the“control”and“empowerment”paradigms,highlighting their essential differences.This analysis illuminates the key characteristics of an empowerment-oriented approach to educational supervision,particularly its emphasis on dialogue,collaboration,participation,and,crucially,empowerment itself.Ultimately,this research advocates for a shift in educational supervision towards an empowerment-oriented discourse system.This entails a multi-pronged approach:transforming ingrained beliefs,embracing renewed pedagogical concepts,fostering methodological innovation,and optimizing existing mechanisms and strategies within educational supervision.These changes are proposed to facilitate the more effective alignment of educational supervision with the pursuit of high-quality education. 展开更多
关键词 Educational supervision Paradigm shift CONTROL EMPOWERMENT
下载PDF
Study on Independent Supervision Function of Design Assurance System
2
作者 SUI Lijun MA Congyao WANG Jianyuan 《International Journal of Plant Engineering and Management》 2024年第3期185-192,共8页
The effective operation of a design assurance system cannot be achieved without the effective performance of the independent supervision function.As one of the core functions of the design assurance system,the purpose... The effective operation of a design assurance system cannot be achieved without the effective performance of the independent supervision function.As one of the core functions of the design assurance system,the purpose of the independent supervision function is to ensure that the system operates within the scope of procedures and manuals.At present,the function of independent supervision is a difficult and confusing issue for various original equipment manufacturers as well as suppliers,and there is an urgent requirement to put forward relevant requirements and form relevant methods.Based on the above mentioned objective,the basic requirements of the independent supervision function of design assurance system were studied,the problems and deficiencies in the organization,staffing,and methods existing in the current independent supervision function were analyzed,the improvement suggestions and measures for the performance of the independent supervision function from the aspects of the organization,staffing,procedures,and suppliers were put forward.The present work and conclusions provide guidance and direction for the effective operation of the design assurance system. 展开更多
关键词 design of assurance systems independent supervision functions system operation internal audits SUPPLIERS
下载PDF
Foodborne doping and supervision in sports 被引量:1
3
作者 Wei Chen Xiaoyu Cheng +1 位作者 Yingnan Ma Ning Chen 《Food Science and Human Wellness》 SCIE CSCD 2023年第6期1925-1936,共12页
Cases of foodborne doping are frequently reported in sports events and can cause severe consequences for athletes.The foodborne doping can be divided into natural endogenous and artifi cially added foods according to ... Cases of foodborne doping are frequently reported in sports events and can cause severe consequences for athletes.The foodborne doping can be divided into natural endogenous and artifi cially added foods according to the sources,including anabolic agents,stimulants,diuretics,β-blockers,β2 agonists and others.In order to control foodborne doping,chromatographic technique,immunoassay,nuclear magnetic resonance,biosensor technology,pyrolytic spectroscopy,comprehensive analysis and electrochemical analysis have usually used as analytical and inspection strategies.Meanwhile,the legislation of anti-doping,the improvement of testing standard and technology,and the prevention and control of food safety,as well as the improvement of risk perception of athletes are highly necessary for achieving the effective risk control and supervision of foodborne doping,which will be benefi cial for athletes,doctors and administrators to avoid the risks of foodborne doping test and reduce foodborne doping risks for the health of athletes. 展开更多
关键词 Foodborne doping Doping control ATHLETES ANTI-DOPING supervision
下载PDF
Research on the intelligent supervision and operation platform of railway real estate 被引量:2
4
作者 Xiangru Lv Hui Li Beisheng Liu 《High-Speed Railway》 2023年第2期147-152,共6页
Railway real estate is the fundamental element of railway transportation production and operation.Effective management and rational utilization of railway real estate is essential for railway asset operation.Based on ... Railway real estate is the fundamental element of railway transportation production and operation.Effective management and rational utilization of railway real estate is essential for railway asset operation.Based on the investigation of the requirements of railway real estate management and operation,combined with Beidou positioning,GIS(Geographic Information System),multi-source data fusion and other cutting-edge technologies,this paper puts forward the multi-dimensional dynamic statistical method of real estate information,the identification method of railway land occupation and the comprehensive evaluation method of real estate development and utilization potential,and build the railway real estate supervision and operation platform,design the function of the platform,so as to provide intelligent solutions for the railway real estate operation. 展开更多
关键词 RAILWAY Real estate supervision GIS Beidou positioning Multi-sourcedata fusion
下载PDF
Detecting While Accessing:A Semi-Supervised Learning-Based Approach for Malicious Traffic Detection in Internet of Things 被引量:1
5
作者 Yantian Luo Hancun Sun +3 位作者 Xu Chen Ning Ge Wei Feng Jianhua Lu 《China Communications》 SCIE CSCD 2023年第4期302-314,共13页
In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In thi... In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In this paper,we propose a semi-supervised learning-based approach to detect malicious traffic at the access side.It overcomes the resource-bottleneck problem of traditional malicious traffic defenders which are deployed at the victim side,and also is free of labeled traffic data in model training.Specifically,we design a coarse-grained behavior model of Io T devices by self-supervised learning with unlabeled traffic data.Then,we fine-tune this model to improve its accuracy in malicious traffic detection by adopting a transfer learning method using a small amount of labeled data.Experimental results show that our method can achieve the accuracy of 99.52%and the F1-score of 99.52%with only 1%of the labeled training data based on the CICDDoS2019 dataset.Moreover,our method outperforms the stateof-the-art supervised learning-based methods in terms of accuracy,precision,recall and F1-score with 1%of the training data. 展开更多
关键词 malicious traffic detection semi-supervised learning internet of Things(Io T) TRANSFORMER masked behavior model
下载PDF
Routine Supportive Supervision and Management of Medicines and Other Health Products and Technologies in Vihiga County, Kenya
6
作者 Mukanya Collins Mudogo Oluhano Jerusa +6 位作者 Sikuku Eric Mwanje Inonda Justus Anyiendah Mary Amadi Mercy Riungu James Sumbi Victor Ottichilo Wilber 《Pharmacology & Pharmacy》 CAS 2023年第2期43-57,共15页
Health Products and Technologies (HPTs) are pivotal for an efficient health system. Availability and accessibility to affordable health products are critical indicators towards achieving universal health coverage. Rou... Health Products and Technologies (HPTs) are pivotal for an efficient health system. Availability and accessibility to affordable health products are critical indicators towards achieving universal health coverage. Routine supportive supervision, performance monitoring, recognition of efforts and client feedback are vital activities toward health supply chain system strengthening. This is a descriptive paper that describes a model of integrated commodity supportive supervision, and mentorship and its impact on various outcomes of health commodity management. Data were abstracted from the standardized scored checklists used during integrated commodity supportive supervision and supply chain audit in public health facilities in Vihiga County. Scores for the period 2020 to 2022 were analyzed on the eight key areas of interest. The analysis was done using Statistical Package for Social Sciences (SPSS version 26). Results are interpreted at 95% Confidence interval. This paper also shares findings from both quantitative and qualitative data from client exit and facility managers’ interviews. Six complete rounds of supervisions, three clients and service providers’ interviews, and three annual award events have been conducted. We observed trends across six data collections points and compared the results at first point or baseline (January-June 2020) to the results at the last point or end line (April-June 2022). Findings show significant improvements on the eight parameters in terms of mean scores as follows: resolution of issues from previous visits by 35.06% (46.75% - 81.81%);storage of HPTs by 17.41% (68.72% - 86.13%);inventory management by 28.16% (42.67% - 70.83%);availability and use of commodity data management information systems (MIS) tools by 22.39% (74.40% - 96.79%);verification of commodity data by 25.61% (65.56% - 91.17%);availability of guidelines and job aids for commodity management by 46.28% (36.65% - 82.93%). There was an improvement on the mean score on accountability by 20.22% (58.58% - 83.51%). The composite (final) score improved by 28.33% (56.19% - 84.52%). There was progressive narrowing of the standard deviations on all the indicators across the study period. This demonstrates that there is standardization of practices and positive competition among all the public health facilities. There were significant improvements on all the eight indicators. Routine integrated commodity supportive supervision has proven to be an effective high impact intervention in improving management of health products and technologies in Vihiga County, Kenya. 展开更多
关键词 MEDICINES Health Products and Technologies Health Commodities Supportive supervision Staff Motivation Customer Feedback
下载PDF
Model-constrained and data-driven double-supervision acoustic impedance inversion
7
作者 Dong-Feng Zhao Na-Xia Yang +2 位作者 Jin-Liang Xiong Guo-Fa Li Shu-Wen Guo 《Petroleum Science》 SCIE EI CSCD 2023年第5期2809-2821,共13页
Seismic impedance inversion is an important technique for structure identification and reservoir prediction.Model-based and data-driven impedance inversion are the commonly used inversion methods.In practice,the geoph... Seismic impedance inversion is an important technique for structure identification and reservoir prediction.Model-based and data-driven impedance inversion are the commonly used inversion methods.In practice,the geophysical inversion problem is essentially an ill-posedness problem,which means that there are many solutions corresponding to the same seismic data.Therefore,regularization schemes,which can provide stable and unique inversion results to some extent,have been introduced into the objective function as constrain terms.Among them,given a low-frequency initial impedance model is the most commonly used regularization method,which can provide a smooth and stable solution.However,this model-based inversion method relies heavily on the initial model and the inversion result is band limited to the effective frequency bandwidth of seismic data,which cannot effectively improve the seismic vertical resolution and is difficult to be applied to complex structural regions.Therefore,we propose a data-driven approach for high-resolution impedance inversion based on the bidirectional long short-term memory recurrent neural network,which regards seismic data as time-series rather than image-like patches.Compared with the model-based inversion method,the data-driven approach provides higher resolution inversion results,which demonstrates the effectiveness of the data-driven method for recovering the high-frequency components.However,judging from the inversion results for characterization the spatial distribution of thin-layer sands,the accuracy of high-frequency components is difficult to guarantee.Therefore,we add the model constraint to the objective function to overcome the shortages of relying only on the data-driven schemes.First,constructing the supervisor1 based on the bidirectional long short-term memory recurrent neural network,which provides the predicted impedance with higher resolution.Then,convolution constraint as supervisor2 is introduced into the objective function to guarantee the reliability and accuracy of the inversion results,which makes the synthetic seismic data obtained from the inversion result consistent with the input data.Finally,we test the proposed scheme based on the synthetic and field seismic data.Compared to model-based and purely data-driven impedance inversion methods,the proposed approach provides more accurate and reliable inversion results while with higher vertical resolution and better spatial continuity.The inversion results accurately characterize the spatial distribution relationship of thin sands.The model tests demonstrate that the model-constrained and data-driven impedance inversion scheme can effectively improve the thin-layer structure characterization based on the seismic data.Moreover,tests on the oil field data indicate the practicality and adaptability of the proposed method. 展开更多
关键词 Acoustic impedance inversion Model constraints Double supervision BiLSTM neural network Reservoir structure characterization
下载PDF
Human-pose estimation based on weak supervision
8
作者 Xiaoyan HU Xizhao BAO +1 位作者 Guoli WEI Zhaoyu LI 《Virtual Reality & Intelligent Hardware》 EI 2023年第4期366-377,共12页
Background In computer vision,simultaneously estimating human pose,shape,and clothing is a practical issue in real life,but remains a challenging task owing to the variety of clothing,complexity of de-formation,shorta... Background In computer vision,simultaneously estimating human pose,shape,and clothing is a practical issue in real life,but remains a challenging task owing to the variety of clothing,complexity of de-formation,shortage of large-scale datasets,and difficulty in estimating clothing style.Methods We propose a multistage weakly supervised method that makes full use of data with less labeled information for learning to estimate human body shape,pose,and clothing deformation.In the first stage,the SMPL human-body model parameters were regressed using the multi-view 2D key points of the human body.Using multi-view information as weakly supervised information can avoid the deep ambiguity problem of a single view,obtain a more accurate human posture,and access supervisory information easily.In the second stage,clothing is represented by a PCA-based model that uses two-dimensional key points of clothing as supervised information to regress the parameters.In the third stage,we predefine an embedding graph for each type of clothing to describe the deformation.Then,the mask information of the clothing is used to further adjust the deformation of the clothing.To facilitate training,we constructed a multi-view synthetic dataset that included BCNet and SURREAL.Results The Experiments show that the accuracy of our method reaches the same level as that of SOTA methods using strong supervision information while only using weakly supervised information.Because this study uses only weakly supervised information,which is much easier to obtain,it has the advantage of utilizing existing data as training data.Experiments on the DeepFashion2 dataset show that our method can make full use of the existing weak supervision information for fine-tuning on a dataset with little supervision information,compared with the strong supervision information that cannot be trained or adjusted owing to the lack of exact annotation information.Conclusions Our weak supervision method can accurately estimate human body size,pose,and several common types of clothing and overcome the issues of the current shortage of clothing data. 展开更多
关键词 Human pose estimation Clothing estimation Weak supervision
下载PDF
Strategic interaction between institutional investors and supervision department:a theoretical analysis of low‑price collusion in SBIC
9
作者 Xin Li Zhuming Chen 《Financial Innovation》 2023年第1期1313-1348,共36页
We introduce evolutionary game method to analyze low-price collusion in inquiry market of Sci-Tech Innovation Board of China(SIBC)from the perspective of strategic interaction between large institutional investors(LII... We introduce evolutionary game method to analyze low-price collusion in inquiry market of Sci-Tech Innovation Board of China(SIBC)from the perspective of strategic interaction between large institutional investors(LIIs),small and medium-sized institutional investors(SMIIs),and supervision department(SD).The results show that supervision behaviors of SD,and quotation behaviors of institutional investors,are subject to supervision conditions.Under the condition that benefits of tough supervision are lower a lot than minimum benefits of light supervision(light supervision condition),SD will choose light supervision and institutional investors will turn to illegal quotation in response.Finally,a steady-state equilibrium with low-price collusion will form in SIBC’s inquiry market even with a large supervision penalty for illegal quotation.On the contrary,under the condition that benefits of tough supervision are higher a lot than maximum benefits of light supervision(tough supervision condition)and with a large penalty for illegal quotation,SD and institutional investors will choose tough supervision and legal quotation.Further numerical simulations under light supervision condition show that:(1)High-price culling rule will become a booster for low-price collusion and accelerate SMIIs’evolutionary process to imitative quotation.(2)Blindly increasing penalties for illegal quotation or reducing the culling rate is not an appropriate approach to solve the problem of low-price collusion since it cannot shift supervision condition from light into tough and make SD supervise toughly.(3)Institutional investors’choices of quotation strategies are more volatile and highly susceptible to supervision behaviors of SD when facing exogenous uncertainty.Therefore,the keys to solving the problem of low-price collusion are shifting supervision condition from light into tough through increasing incremental benefits of tough supervision,and providing institutional investors with a stable and predictable supervision policy.In conclusion,the creation of a fair inquiry market doesn’t only depend on restraint and punishment to institutional investors,but also requires the establishment of supervision mechanism those are compatible with market-based inquiry. 展开更多
关键词 Sci-Tech Innovation Board of China Low-price collusion supervision condition Tripartite evolutionary game
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
10
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model internet access rural China
下载PDF
A credibility-aware swarm-federated deep learning framework in internet of vehicles 被引量:1
11
作者 Zhe Wang Xinhang Li +2 位作者 Tianhao Wu Chen Xu Lin Zhang 《Digital Communications and Networks》 SCIE CSCD 2024年第1期150-157,共8页
Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead... Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations. 展开更多
关键词 Swarm learning Federated deep learning internet of vehicles PRIVACY EFFICIENCY
下载PDF
A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet 被引量:1
12
作者 Song Deng Yiming Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第6期3679-3697,共19页
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf... Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources. 展开更多
关键词 Energy internet Intrusion tolerance game theory racial competition adaptive intrusion response
下载PDF
Low-Cost Federated Broad Learning for Privacy-Preserved Knowledge Sharing in the RIS-Aided Internet of Vehicles 被引量:1
13
作者 Xiaoming Yuan Jiahui Chen +4 位作者 Ning Zhang Qiang(John)Ye Changle Li Chunsheng Zhu Xuemin Sherman Shen 《Engineering》 SCIE EI CAS CSCD 2024年第2期178-189,共12页
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency... High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV. 展开更多
关键词 Knowledge sharing internet of Vehicles Federated learning Broad learning Reconfigurable intelligent surfaces Resource allocation
下载PDF
On the Expansion and Realization of the Right to Environmental Information in Environmental Protection Supervision
14
作者 吴昂 HU Liang 《The Journal of Human Rights》 2023年第2期307-327,共21页
As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environment... As an innovation in the environmental governance system that breaks the traditional hierarchical structure,environmental protection supervision has not only played a significant role in protecting tangible environmental rights but also expanded the basic scope of the right to environmental information—part of procedural environmental rights.In the supervision of environmental protection,the objects of the right to environmental information and the subjects of the obligation to provide environmental information have been both expanded,with the focus shifting from government information to Party information and from administrative organs to Party organs.This vividly demonstrates the Communist Party of China’s concrete efforts to protect human rights in the field of the endeavor to build an ecological civilization.At present,the realization of the right to environmental information in environmental protection supervision still faces problems such as insufficient standards and norms,disordered practice and operation,and lack of liability guarantee.In this context,based on renewing relevant subjects’cognition of the right to know in environmental protection supervision,we should further improve and specify the rule for disclosing information about environmental protection supervision,rationally distribute the obligations for information disclosure in environmental protection supervision,and clarify the accountability rules for violating relevant requirements for information disclosure,so as to promote the overall development of the environmental protection supervision system while guaranteeing the realization of the right to environmental information. 展开更多
关键词 right to environmental information environmental protection supervision public participation information disclosure
下载PDF
Weakly Supervised Network with Scribble-Supervised and Edge-Mask for Road Extraction from High-Resolution Remote Sensing Images
15
作者 Supeng Yu Fen Huang Chengcheng Fan 《Computers, Materials & Continua》 SCIE EI 2024年第4期549-562,共14页
Significant advancements have been achieved in road surface extraction based on high-resolution remote sensingimage processing. Most current methods rely on fully supervised learning, which necessitates enormous human... Significant advancements have been achieved in road surface extraction based on high-resolution remote sensingimage processing. Most current methods rely on fully supervised learning, which necessitates enormous humaneffort to label the image. Within this field, other research endeavors utilize weakly supervised methods. Theseapproaches aim to reduce the expenses associated with annotation by leveraging sparsely annotated data, such asscribbles. This paper presents a novel technique called a weakly supervised network using scribble-supervised andedge-mask (WSSE-net). This network is a three-branch network architecture, whereby each branch is equippedwith a distinct decoder module dedicated to road extraction tasks. One of the branches is dedicated to generatingedge masks using edge detection algorithms and optimizing road edge details. The other two branches supervise themodel’s training by employing scribble labels and spreading scribble information throughout the image. To addressthe historical flaw that created pseudo-labels that are not updated with network training, we use mixup to blendprediction results dynamically and continually update new pseudo-labels to steer network training. Our solutiondemonstrates efficient operation by simultaneously considering both edge-mask aid and dynamic pseudo-labelsupport. The studies are conducted on three separate road datasets, which consist primarily of high-resolutionremote-sensing satellite photos and drone images. The experimental findings suggest that our methodologyperforms better than advanced scribble-supervised approaches and specific traditional fully supervised methods. 展开更多
关键词 Semantic segmentation road extraction weakly supervised learning scribble supervision remote sensing image
下载PDF
Analysis on Supervision of the Internet Finance: A Case Study of Yu Ebao
16
作者 Zhaoya GU 《Asian Agricultural Research》 2017年第9期16-21,共6页
By taking the hottest topic Internet financial product—Yu Ebao as an example,an in-depth analysis is made on its innovation and comparative advantages in this paper. Based on this,combing and sorting out the current ... By taking the hottest topic Internet financial product—Yu Ebao as an example,an in-depth analysis is made on its innovation and comparative advantages in this paper. Based on this,combing and sorting out the current related disputes regarding Yu Ebao supervision,putting forward views with evidence,clear requirement is made upon the attitudes towards supervision over Yu Ebao viewing from commercial banks and supervision aspects. 展开更多
关键词 internet finance supervision Yu Ebao Asset management
下载PDF
Local saliency consistency-based label inference for weakly supervised salient object detection using scribble annotations
17
作者 Shuo Zhao Peng Cui +1 位作者 Jing Shen Haibo Liu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期239-249,共11页
Recently,weak supervision has received growing attention in the field of salient object detection due to the convenience of labelling.However,there is a large performance gap between weakly supervised and fully superv... Recently,weak supervision has received growing attention in the field of salient object detection due to the convenience of labelling.However,there is a large performance gap between weakly supervised and fully supervised salient object detectors because the scribble annotation can only provide very limited foreground/background information.Therefore,an intuitive idea is to infer annotations that cover more complete object and background regions for training.To this end,a label inference strategy is proposed based on the assumption that pixels with similar colours and close positions should have consistent labels.Specifically,k-means clustering algorithm was first performed on both colours and coordinates of original annotations,and then assigned the same labels to points having similar colours with colour cluster centres and near coordinate cluster centres.Next,the same annotations for pixels with similar colours within each kernel neighbourhood was set further.Extensive experiments on six benchmarks demonstrate that our method can significantly improve the performance and achieve the state-of-the-art results. 展开更多
关键词 label inference salient object detection weak supervision
下载PDF
Relational Turkish Text Classification Using Distant Supervised Entities and Relations
18
作者 Halil Ibrahim Okur Kadir Tohma Ahmet Sertbas 《Computers, Materials & Continua》 SCIE EI 2024年第5期2209-2228,共20页
Text classification,by automatically categorizing texts,is one of the foundational elements of natural language processing applications.This study investigates how text classification performance can be improved throu... Text classification,by automatically categorizing texts,is one of the foundational elements of natural language processing applications.This study investigates how text classification performance can be improved through the integration of entity-relation information obtained from the Wikidata(Wikipedia database)database and BERTbased pre-trained Named Entity Recognition(NER)models.Focusing on a significant challenge in the field of natural language processing(NLP),the research evaluates the potential of using entity and relational information to extract deeper meaning from texts.The adopted methodology encompasses a comprehensive approach that includes text preprocessing,entity detection,and the integration of relational information.Experiments conducted on text datasets in both Turkish and English assess the performance of various classification algorithms,such as Support Vector Machine,Logistic Regression,Deep Neural Network,and Convolutional Neural Network.The results indicate that the integration of entity-relation information can significantly enhance algorithmperformance in text classification tasks and offer new perspectives for information extraction and semantic analysis in NLP applications.Contributions of this work include the utilization of distant supervised entity-relation information in Turkish text classification,the development of a Turkish relational text classification approach,and the creation of a relational database.By demonstrating potential performance improvements through the integration of distant supervised entity-relation information into Turkish text classification,this research aims to support the effectiveness of text-based artificial intelligence(AI)tools.Additionally,it makes significant contributions to the development ofmultilingual text classification systems by adding deeper meaning to text content,thereby providing a valuable addition to current NLP studies and setting an important reference point for future research. 展开更多
关键词 Text classification relation extraction NER distant supervision deep learning machine learning
下载PDF
Supervision of Public Opinion under the Background of Social Co-governance-Take the Changsheng Vaccine Incident as an Example
19
作者 Ma Xiaonan Tian Lijuan 《Asian Journal of Social Pharmacy》 2023年第3期198-205,共8页
Objective To provide reference for the news media to give play to the role of public opinion supervision in time based on the background of drug safety and social co-governance.Methods The method of case analysis was ... Objective To provide reference for the news media to give play to the role of public opinion supervision in time based on the background of drug safety and social co-governance.Methods The method of case analysis was used to make a retrospective study on the Changsheng vaccine incident in 2018.Then the role of mainstream media,pharmaceutical media,and self-media in the supervision of public opinion was investigated.Results and Conclusion Both mainstream and pharmaceutical media played an excellent role in supervising the Changchun Changsheng vaccine incident.However,the content published by some pharmaceutical media was hard to understand by ordinary people.Besides,the role of self-media in public opinion supervision was polarized.Some self-media closely kept pace with mainstream media in public opinion supervision.Other self-media unilaterally pursued the click rate,publishing false information to guide wrong public opinion.The news media should optimize the supervision efficiency of drug safety.On the one hand,pharmaceutical media should pay attention to the fact that readers may not understand the difficult terms because they are not professional.On the other hand,self-media practitioners should improve their professional quality so that they will not publish some fake news to mislead public opinion. 展开更多
关键词 social co-governance Changchun Changsheng vaccine incident news media public opinion supervision
下载PDF
ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things
20
作者 Yan Xiang Daofeng Li +2 位作者 Xinyi Meng Chengfeng Dong Guanglin Qin 《Computers, Materials & Continua》 SCIE EI 2024年第4期1005-1023,共19页
The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has... The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device hascaught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. Thishas resulted in a myriad of security challenges, including information leakage, malware propagation, and financialloss, among others. Consequently, developing an intrusion detection system to identify both active and potentialintrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practicalintrusion detection model that combines the strengths of ResNeSt, a variant of Residual Neural Network, andbidirectionalGated RecurrentUnitNetwork (biGRU).Our ResNeSt-biGRUframework diverges fromconventionalintrusion detection systems (IDS) by employing this dual-layeredmechanism that exploits the temporal continuityand spatial feature within network data streams, a methodological innovation that enhances detection accuracy.In conjunction with this, we introduce the PreIoT dataset, a compilation of prevalent IoT network behaviors, totrain and evaluate IDSmodels with a focus on identifying potential intrusion traffics. The effectiveness of proposedscheme is demonstrated through testing, wherein it achieved an average accuracy of 99.90% on theN-BaIoT datasetas well as on the PreIoT dataset and 94.45% on UNSW-NB15 dataset. The outcomes of this research reveal thepotential of ResNeSt-biGRU to bolster security measures, diminish intrusion-related vulnerabilities, and preservethe overall security of IoT ecosystems. 展开更多
关键词 internet of Things cyberattack intrusion detection internet security
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部