Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-f...Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-form solu-tion due to the nonlinearity of HJI equation,and many iterative algorithms are proposed to solve the HJI equation.Simultane-ous policy updating algorithm(SPUA)is an effective algorithm for solving HJI equation,but it is an on-policy integral reinforce-ment learning(IRL).For online implementation of SPUA,the dis-turbance signals need to be adjustable,which is unrealistic.In this paper,an off-policy IRL algorithm based on SPUA is pro-posed without making use of any knowledge of the systems dynamics.Then,a neural-network based online adaptive critic implementation scheme of the off-policy IRL algorithm is pre-sented.Based on the online off-policy IRL method,a computa-tional intelligence interception guidance(CIIG)law is developed for intercepting high-maneuvering target.As a model-free method,intercepting targets can be achieved through measur-ing system data online.The effectiveness of the CIIG is verified through two missile and target engagement scenarios.展开更多
This paper explores the impact of industry-education integration on students’motivation in college English courses under the TPACK(Technological Pedagogical Content Knowledge)framework using a comprehensive approach ...This paper explores the impact of industry-education integration on students’motivation in college English courses under the TPACK(Technological Pedagogical Content Knowledge)framework using a comprehensive approach combining quantitative and qualitative methods.Quantitative data analysis indicates a significant positive correlation between the perception of industry-education integration and the level of student learning motivation.There is also a clear association between the perception scores of TPACK framework integration and learning motivation.Qualitative data analysis reveals students’positive experiences and recognition of the TPACK framework integration in practical application projects.The study concludes that industry-education integration and the TPACK framework play a crucial role in enhancing students’learning motivation.It suggests optimizing teaching practices through faculty training,designing practical application projects,and promoting student interaction.This comprehensive analysis provides substantial guidance for the future development of English courses.展开更多
With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The networ...With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The network security environment in the era of big data presents the characteristics of large amounts of data,high diversity,and high real-time requirements.Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats.This paper proposes a machine-learning security defense algorithm based on metadata association features.Emphasize control over unauthorized users through privacy,integrity,and availability.The user model is established and the mapping between the user model and the metadata of the data source is generated.By analyzing the user model and its corresponding mapping relationship,the query of the user model can be decomposed into the query of various heterogeneous data sources,and the integration of heterogeneous data sources based on the metadata association characteristics can be realized.Define and classify customer information,automatically identify and perceive sensitive data,build a behavior audit and analysis platform,analyze user behavior trajectories,and complete the construction of a machine learning customer information security defense system.The experimental results show that when the data volume is 5×103 bit,the data storage integrity of the proposed method is 92%.The data accuracy is 98%,and the success rate of data intrusion is only 2.6%.It can be concluded that the data storage method in this paper is safe,the data accuracy is always at a high level,and the data disaster recovery performance is good.This method can effectively resist data intrusion and has high air traffic control security.It can not only detect all viruses in user data storage,but also realize integrated virus processing,and further optimize the security defense effect of user big data.展开更多
Long-term time series forecasting stands as a crucial research domain within the realm of automated machine learning(AutoML).At present,forecasting,whether rooted in machine learning or statistical learning,typically ...Long-term time series forecasting stands as a crucial research domain within the realm of automated machine learning(AutoML).At present,forecasting,whether rooted in machine learning or statistical learning,typically relies on expert input and necessitates substantial manual involvement.This manual effort spans model development,feature engineering,hyper-parameter tuning,and the intricate construction of time series models.The complexity of these tasks renders complete automation unfeasible,as they inherently demand human intervention at multiple junctures.To surmount these challenges,this article proposes leveraging Long Short-Term Memory,which is the variant of Recurrent Neural Networks,harnessing memory cells and gating mechanisms to facilitate long-term time series prediction.However,forecasting accuracy by particular neural network and traditional models can degrade significantly,when addressing long-term time-series tasks.Therefore,our research demonstrates that this innovative approach outperforms the traditional Autoregressive Integrated Moving Average(ARIMA)method in forecasting long-term univariate time series.ARIMA is a high-quality and competitive model in time series prediction,and yet it requires significant preprocessing efforts.Using multiple accuracy metrics,we have evaluated both ARIMA and proposed method on the simulated time-series data and real data in both short and long term.Furthermore,our findings indicate its superiority over alternative network architectures,including Fully Connected Neural Networks,Convolutional Neural Networks,and Nonpooling Convolutional Neural Networks.Our AutoML approach enables non-professional to attain highly accurate and effective time series forecasting,and can be widely applied to various domains,particularly in business and finance.展开更多
In the face of the effective popularity of the Internet of Things(IoT),but the frequent occurrence of cybersecurity incidents,various cybersecurity protection means have been proposed and applied.Among them,Intrusion ...In the face of the effective popularity of the Internet of Things(IoT),but the frequent occurrence of cybersecurity incidents,various cybersecurity protection means have been proposed and applied.Among them,Intrusion Detection System(IDS)has been proven to be stable and efficient.However,traditional intrusion detection methods have shortcomings such as lowdetection accuracy and inability to effectively identifymalicious attacks.To address the above problems,this paper fully considers the superiority of deep learning models in processing highdimensional data,and reasonable data type conversion methods can extract deep features and detect classification using advanced computer vision techniques to improve classification accuracy.TheMarkov TransformField(MTF)method is used to convert 1Dnetwork traffic data into 2D images,and then the converted 2D images are filtered by UnsharpMasking to enhance the image details by sharpening;to further improve the accuracy of data classification and detection,unlike using the existing high-performance baseline image classification models,a soft-voting integrated model,which integrates three deep learning models,MobileNet,VGGNet and ResNet,to finally obtain an effective IoT intrusion detection architecture:the MUS model.Four types of experiments are conducted on the publicly available intrusion detection dataset CICIDS2018 and the IoT network traffic dataset N_BaIoT,and the results demonstrate that the accuracy of attack traffic detection is greatly improved,which is not only applicable to the IoT intrusion detection environment,but also to different types of attacks and different network environments,which confirms the effectiveness of the work done.展开更多
This study makes a significant progress in addressing the challenges of short-term slope displacement prediction in the Universal Landslide Monitoring Program,an unprecedented disaster mitigation program in China,wher...This study makes a significant progress in addressing the challenges of short-term slope displacement prediction in the Universal Landslide Monitoring Program,an unprecedented disaster mitigation program in China,where lots of newly established monitoring slopes lack sufficient historical deformation data,making it difficult to extract deformation patterns and provide effective predictions which plays a crucial role in the early warning and forecasting of landslide hazards.A slope displacement prediction method based on transfer learning is therefore proposed.Initially,the method transfers the deformation patterns learned from slopes with relatively rich deformation data by a pre-trained model based on a multi-slope integrated dataset to newly established monitoring slopes with limited or even no useful data,thus enabling rapid and efficient predictions for these slopes.Subsequently,as time goes on and monitoring data accumulates,fine-tuning of the pre-trained model for individual slopes can further improve prediction accuracy,enabling continuous optimization of prediction results.A case study indicates that,after being trained on a multi-slope integrated dataset,the TCN-Transformer model can efficiently serve as a pretrained model for displacement prediction at newly established monitoring slopes.The three-day average RMSE is significantly reduced by 34.6%compared to models trained only on individual slope data,and it also successfully predicts the majority of deformation peaks.The fine-tuned model based on accumulated data on the target newly established monitoring slope further reduced the three-day RMSE by 37.2%,demonstrating a considerable predictive accuracy.In conclusion,taking advantage of transfer learning,the proposed slope displacement prediction method effectively utilizes the available data,which enables the rapid deployment and continual refinement of displacement predictions on newly established monitoring slopes.展开更多
The patterns and trends in formal higher education are changing.As world economy is moving towards a knowledge based economy,the needs and requirements of formal higher education are also changing.Countries are curren...The patterns and trends in formal higher education are changing.As world economy is moving towards a knowledge based economy,the needs and requirements of formal higher education are also changing.Countries are currently reevaluating their options of formalizing their growing education sector by drafting new education policy that aims to meet the demands of this futuristic knowledge based and technology driven economy with involvement of Artificial Intelligence and Machine Learning(AIML).Factors addressing core competence of employability,holistic development and attainment of skills are the new mantras of evolving modern day’s economy.To be in sync with such demand,requirement,and challenges,the Indian government took a significant step in drafting a New Education Policy popularly known as‘NEP 2020’.This paper makes an attempt to analyze the significant characteristics and dimensions of this NEP 2020 by undertaking a survey among stakeholders mostly students to arrive at certain key findings such as inducing centric,employable,skillful,and holistic development of students attaining such higher education.It also points out some of the implementation issues which require lead time to be adjusted with the system.展开更多
To enhance the safety of road traffic operations,this paper proposed a model based on stacking integrated learning utilizing American road traffic accident statistics.Initially,the process involved data cleaning,trans...To enhance the safety of road traffic operations,this paper proposed a model based on stacking integrated learning utilizing American road traffic accident statistics.Initially,the process involved data cleaning,transformation,and normalization.Subsequently,various classification models were constructed,including logistic regression,k-nearest neighbors,gradient boosting,decision trees,AdaBoost,and extra trees models.Evaluation metrics such as accuracy,precision,recall,F1 score,and Hamming loss were employed.Upon analysis,the passive-aggressive classifier model exhibited superior comprehensive indices compared to other models.Based on the model’s output results,an in-depth examination of the factors influencing traffic accidents was conducted.Additionally,measures and suggestions aimed at reducing the incidence of severe traffic accidents were presented.These findings served as a valuable reference for mitigating the occurrence of traffic accidents.展开更多
Discovering new superconductors via traditional trial-and-error experimental approaches is apparently a time-consuming process,and the correlations between the critical temperature(Tc) and material features are still ...Discovering new superconductors via traditional trial-and-error experimental approaches is apparently a time-consuming process,and the correlations between the critical temperature(Tc) and material features are still obscure.The rise of machine learning(ML) technology provides new opportunities to speed up inefficient exploration processes,and could potentially uncover new hints on the unclear correlations.In this work,we utilize open-source materials data,ML models,and data mining methods to explore the correlation between the chemical features and Tcvalues of superconducting materials.To further improve the prediction accuracy,a new model is created by integrating three basic algorithms,showing an enhanced accuracy with the coefficient of determination(R2) score of 95.9 % and root mean square error(RMSE) of 6.3 K.The average marginal contributions of material features towards Tcvalues are estimated to determine the importance of various features during prediction processes.The results suggest that the range thermal conductivity plays a critical role in Tcprediction among all element features.Furthermore,the integrated ML model is utilized to screen out potential twenty superconducting materials with Tcvalues beyond 50.0 K.This study provides insights towards Tcprediction to accelerate the exploration of potential high-Tcsuperconductors.展开更多
Data protection in databases is critical for any organization,as unauthorized access or manipulation can have severe negative consequences.Intrusion detection systems are essential for keeping databases secure.Advance...Data protection in databases is critical for any organization,as unauthorized access or manipulation can have severe negative consequences.Intrusion detection systems are essential for keeping databases secure.Advancements in technology will lead to significant changes in the medical field,improving healthcare services through real-time information sharing.However,reliability and consistency still need to be solved.Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption.Dis-ruptions to data items can propagate throughout the database,making it crucial to reverse fraudulent transactions without delay,especially in the healthcare industry,where real-time data access is vital.This research presents a role-based access control architecture for an anomaly detection technique.Additionally,the Structured Query Language(SQL)queries are stored in a new data structure called Pentaplet.These pentaplets allow us to maintain the correlation between SQL statements within the same transaction by employing the transaction-log entry information,thereby increasing detection accuracy,particularly for individuals within the company exhibiting unusual behavior.To identify anomalous queries,this system employs a supervised machine learning technique called Support Vector Machine(SVM).According to experimental findings,the proposed model performed well in terms of detection accuracy,achieving 99.92%through SVM with One Hot Encoding and Principal Component Analysis(PCA).展开更多
With the rapid advancements in edge computing and artificial intelligence,federated learning(FL)has gained momentum as a promising approach to collaborative data utilization across organizations and devices,while ensu...With the rapid advancements in edge computing and artificial intelligence,federated learning(FL)has gained momentum as a promising approach to collaborative data utilization across organizations and devices,while ensuring data privacy and information security.In order to further harness the energy efficiency of wireless networks,an integrated sensing,communication and computation(ISCC)framework has been proposed,which is anticipated to be a key enabler in the era of 6G networks.Although the advantages of pushing intelligence to edge devices are multi-fold,some challenges arise when incorporating FL into wireless networks under the umbrella of ISCC.This paper provides a comprehensive survey of FL,with special emphasis on the design and optimization of ISCC.We commence by introducing the background and fundamentals of FL and the ISCC framework.Subsequently,the aforementioned challenges are highlighted and the state of the art in potential solutions is reviewed.Finally,design guidelines are provided for the incorporation of FL and ISCC.Overall,this paper aims to contribute to the understanding of FL in the context of wireless networks,with a focus on the ISCC framework,and provide insights into addressing the challenges and optimizing the design for the integration of FL into future 6G networks.展开更多
Bloody Mahjong is a kind of mahjong.It is very popular in China in recent years.It not only has the characteristics of mahjong's conventional state space,huge hidden information,complicated rules,and large randomn...Bloody Mahjong is a kind of mahjong.It is very popular in China in recent years.It not only has the characteristics of mahjong's conventional state space,huge hidden information,complicated rules,and large randomness of hand cards but also has special rules such as Change three,Hu must lack at least one suit,and Continue playing after Hu.These rules increase the difficulty of research.These special rules are used as the input of the deep learning DenseNet model.DenseNet is used to extract the Mahjong situation features.The learned features are used as the input of the classification algorithm XGBoost,and then the XGBoost algorithm is used to derive the card strategy.Experiments show that the fusion model of deep learning and XGBoost proposed in this paper has higher accuracy than the single model using only one of them in the case of highdimensional sparse features.In the case of fewer training rounds,accuracy of the model can still reach 83%.In the games against real people,it plays like human.展开更多
Based on the research on the project course theory of "integration of theory and practice" in higher vocational education and the analysis of practical teaching in colleges and universities at home and abroa...Based on the research on the project course theory of "integration of theory and practice" in higher vocational education and the analysis of practical teaching in colleges and universities at home and abroad, combined with literature research, case analysis, system theory and other research methods, the project-based teaching goal, model, content and means of "integration of doing, learning and teaching" in higher vocational education is explored, and the project-based teaching model of "Landscape Planning and Design" is discussed combined with the application of information-based teaching methods. So as to provide references for carrying out the project-based teaching in similar courses in higher vocational colleges and really achieve docking the actual post requirements with the course to provide the basis for achieving the purpose of cultivating skilled talents in higher vocational education.展开更多
This paper centers on the integrated learning of English and law in China.Firstly,it outlines the importance of English in the solution of the ever increasing legal disputes between China and the outside world,which i...This paper centers on the integrated learning of English and law in China.Firstly,it outlines the importance of English in the solution of the ever increasing legal disputes between China and the outside world,which inevitably involves an integrated learning of English and law.Secondly,it points out that the content of legal English reflects a combination of legal knowledge and English skills.Thirdly,it expounds on the difficulties that Chinese English majors are facing in the process of learning English and law simultaneously and furnishes some practical suggestions.展开更多
With the development of artificial intelligence(AI)and 5G technology,the integration of sensing,communication and computing in the Internet of Vehicles(Io V)is becoming a trend.However,the large amount of data transmi...With the development of artificial intelligence(AI)and 5G technology,the integration of sensing,communication and computing in the Internet of Vehicles(Io V)is becoming a trend.However,the large amount of data transmission and the computing requirements of intelligent tasks lead to the complex resource management problems.In view of the above challenges,this paper proposes a tasks-oriented joint resource allocation scheme(TOJRAS)in the scenario of Io V.First,this paper proposes a system model with sensing,communication,and computing integration for multiple intelligent tasks with different requirements in the Io V.Secondly,joint resource allocation problems for real-time tasks and delay-tolerant tasks in the Io V are constructed respectively,including communication,computing and caching resources.Thirdly,a distributed deep Q-network(DDQN)based algorithm is proposed to solve the optimization problems,and the convergence and complexity of the algorithm are discussed.Finally,the experimental results based on real data sets verify the performance advantages of the proposed resource allocation scheme,compared to the existing ones.The exploration efficiency of our proposed DDQN-based algorithm is improved by at least about 5%,and our proposed resource allocation scheme improves the m AP performance by about 0.15 under resource constraints.展开更多
Based on the two-dimensional (2D) system theory, an integrated predictive iterative learning control (2D-IPILC) strategy for batch processes is presented. First, the output response and the error transition model ...Based on the two-dimensional (2D) system theory, an integrated predictive iterative learning control (2D-IPILC) strategy for batch processes is presented. First, the output response and the error transition model predictions along the batch index can be calculated analytically due to the 2D Roesser model of the batch process. Then, an integrated framework of combining iterative learning control (ILC) and model predictive control (MPC) is formed reasonably. The output of feedforward ILC is estimated on the basis of the predefined process 2D model. By min- imizing a quadratic objective function, the feedback MPC is introduced to obtain better control performance for tracking problem of batch processes. Simulations on a typical batch reactor demonstrate that the satisfactory tracking performance as well as faster convergence speed can be achieved than traditional proportion type (P- t-we) ILC despite the model error and disturbances.展开更多
Attacks on fully integrated servers,apps,and communication networks via the Internet of Things(IoT)are growing exponentially.Sensitive devices’effectiveness harms end users,increases cyber threats and identity theft,...Attacks on fully integrated servers,apps,and communication networks via the Internet of Things(IoT)are growing exponentially.Sensitive devices’effectiveness harms end users,increases cyber threats and identity theft,raises costs,and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods.Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security.Following the 1,2,3,and 4G cellular networks,the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as the global advancement of cellular networks.Even to this day,experts are working on the evolution’s sixth generation(6G).It offers amazing capabilities for connecting everything,including gadgets and machines,with wavelengths ranging from 1 to 10 mm and frequencies ranging from 300 MHz to 3 GHz.It gives you the most recent information.Many countries have already established this technology within their border.Security is the most crucial aspect of using a 5G network.Because of the absence of study and network deployment,new technology first introduces new gaps for attackers and hackers.Internet Protocol(IP)attacks and intrusion will become more prevalent in this system.An efficient approach to detect intrusion in the 5G network using a Machine Learning algorithm will be provided in this research.This research will highlight the high accuracy rate by validating it for unidentified and suspicious circumstances in the 5G network,such as intruder hackers/attackers.After applying different machine learning algorithms,obtained the best result on Linear Regression Algorithm’s implementation on the dataset results in 92.12%on test data and 92.13%on train data with 92%precision.展开更多
The latest advancements in computer vision and deep learning(DL)techniques pave the way to design novel tools for the detection and monitoring of forestfires.In this view,this paper presents an intelligent wild forestfi...The latest advancements in computer vision and deep learning(DL)techniques pave the way to design novel tools for the detection and monitoring of forestfires.In this view,this paper presents an intelligent wild forestfire detec-tion and alarming system using deep learning(IWFFDA-DL)model.The pro-posed IWFFDA-DL technique aims to identify forestfires at earlier stages through integrated sensors.The proposed IWFFDA-DL system includes an Inte-grated sensor system(ISS)combining an array of sensors that acts as the major input source that helps to forecast thefire.Then,the attention based convolution neural network with bidirectional long short term memory(ACNN-BLSTM)model is applied to examine and identify the existence of danger.For hyperpara-meter tuning of the ACNN-BLSTM model,the bacterial foraging optimization(BFO)algorithm is employed and thereby enhances the detection performance.Finally,when thefire is detected,the Global System for Mobiles(GSM)modem transmits messages to the authorities to take required actions.An extensive set of simulations were performed and the results are investigated interms of several aspects.The obtained results highlight the betterment of the IWFFDA-DL techni-que interms of various measures.展开更多
Background: Ophthalmology is an important medical science subject, but it is given with insufficient attention in undergraduate medical education. Flipped classroom(FC) and problem-based learning(PBL) are well-known e...Background: Ophthalmology is an important medical science subject, but it is given with insufficient attention in undergraduate medical education. Flipped classroom(FC) and problem-based learning(PBL) are well-known education methods that can be integrated into ophthalmology education to improve students' competence level and promote active learning. Methods: We used a mixed teaching methodology that integrated a FC and PBL into a 1-week ophthalmology clerkship for 72 fourth-year medical students. The course includes two major sessions: FC session and PBL session, relying on clinical and real-patient cases. Written examinations were set up to assess students' academic performance and questionnaires were designed to evaluate their perceptions. Results: The post-course examination results were higher than the pre-course results, and many students gained ophthalmic knowledge and learning skills to varying levels. Comparison of pre-and post-course questionnaires indicated that interests in ophthalmology increased and more students expressed desires to be eye doctors. Most students were satisfied with the new method, while some suggested the process should be slower and the communication with their teacher needed to strengthen.Conclusions: FC and PBL are complementary methodologies. Utilizing the mixed teaching meth of FC and PBL was successful in enhancing academic performance, student satisfactions and promoting active learning.展开更多
During the drilling process,stick-slip vibration of the drill string is mainly caused by the nonlinear friction gen-erated by the contact between the drill bit and the rock.To eliminate the fatigue wear of downhole dr...During the drilling process,stick-slip vibration of the drill string is mainly caused by the nonlinear friction gen-erated by the contact between the drill bit and the rock.To eliminate the fatigue wear of downhole drilling tools caused by stick-slip vibrations,the Fractional-Order Proportional-Integral-Derivative(FOPID)controller is used to suppress stick-slip vibrations in the drill string.Although the FOPID controller can effectively suppress the drill string stick-slip vibration,its structure isflexible and parameter setting is complicated,so it needs to use the cor-responding machine learning algorithm for parameter optimization.Based on the principle of torsional vibration,a simplified model of multi-degree-of-freedom drill string is established and its block diagram is designed.The continuous nonlinear friction generated by cutting rock is described by the LuGre friction model.The adaptive learning strategy of genetic algorithm(GA),particle swarm optimization(PSO)and particle swarm optimization improved(IPSO)by arithmetic optimization(AOA)is used to optimize and adjust the controller parameters,and the drill string stick-slip vibration is suppressed to the greatest extent.The results show that:When slight drill string stick-slip vibration occurs,the FOPID controller optimized by machine learning algorithm has a good effect on suppressing drill string stick-slip vibration.However,the FOPID controller cannot get the drill string system which has fallen into serious stick-slip vibration(stuck pipe)out of trouble,and the machine learning algorithm is required to mark a large amount of data on adjacent Wells to train the model.Set a reasonable range of drilling parameters(weight on bit/drive torque)in advance to avoid severe stick-slip vibration(stuck pipe)in the drill string system.展开更多
文摘Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-form solu-tion due to the nonlinearity of HJI equation,and many iterative algorithms are proposed to solve the HJI equation.Simultane-ous policy updating algorithm(SPUA)is an effective algorithm for solving HJI equation,but it is an on-policy integral reinforce-ment learning(IRL).For online implementation of SPUA,the dis-turbance signals need to be adjustable,which is unrealistic.In this paper,an off-policy IRL algorithm based on SPUA is pro-posed without making use of any knowledge of the systems dynamics.Then,a neural-network based online adaptive critic implementation scheme of the off-policy IRL algorithm is pre-sented.Based on the online off-policy IRL method,a computa-tional intelligence interception guidance(CIIG)law is developed for intercepting high-maneuvering target.As a model-free method,intercepting targets can be achieved through measur-ing system data online.The effectiveness of the CIIG is verified through two missile and target engagement scenarios.
文摘This paper explores the impact of industry-education integration on students’motivation in college English courses under the TPACK(Technological Pedagogical Content Knowledge)framework using a comprehensive approach combining quantitative and qualitative methods.Quantitative data analysis indicates a significant positive correlation between the perception of industry-education integration and the level of student learning motivation.There is also a clear association between the perception scores of TPACK framework integration and learning motivation.Qualitative data analysis reveals students’positive experiences and recognition of the TPACK framework integration in practical application projects.The study concludes that industry-education integration and the TPACK framework play a crucial role in enhancing students’learning motivation.It suggests optimizing teaching practices through faculty training,designing practical application projects,and promoting student interaction.This comprehensive analysis provides substantial guidance for the future development of English courses.
基金This work was supported by the National Natural Science Foundation of China(U2133208,U20A20161).
文摘With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The network security environment in the era of big data presents the characteristics of large amounts of data,high diversity,and high real-time requirements.Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats.This paper proposes a machine-learning security defense algorithm based on metadata association features.Emphasize control over unauthorized users through privacy,integrity,and availability.The user model is established and the mapping between the user model and the metadata of the data source is generated.By analyzing the user model and its corresponding mapping relationship,the query of the user model can be decomposed into the query of various heterogeneous data sources,and the integration of heterogeneous data sources based on the metadata association characteristics can be realized.Define and classify customer information,automatically identify and perceive sensitive data,build a behavior audit and analysis platform,analyze user behavior trajectories,and complete the construction of a machine learning customer information security defense system.The experimental results show that when the data volume is 5×103 bit,the data storage integrity of the proposed method is 92%.The data accuracy is 98%,and the success rate of data intrusion is only 2.6%.It can be concluded that the data storage method in this paper is safe,the data accuracy is always at a high level,and the data disaster recovery performance is good.This method can effectively resist data intrusion and has high air traffic control security.It can not only detect all viruses in user data storage,but also realize integrated virus processing,and further optimize the security defense effect of user big data.
文摘Long-term time series forecasting stands as a crucial research domain within the realm of automated machine learning(AutoML).At present,forecasting,whether rooted in machine learning or statistical learning,typically relies on expert input and necessitates substantial manual involvement.This manual effort spans model development,feature engineering,hyper-parameter tuning,and the intricate construction of time series models.The complexity of these tasks renders complete automation unfeasible,as they inherently demand human intervention at multiple junctures.To surmount these challenges,this article proposes leveraging Long Short-Term Memory,which is the variant of Recurrent Neural Networks,harnessing memory cells and gating mechanisms to facilitate long-term time series prediction.However,forecasting accuracy by particular neural network and traditional models can degrade significantly,when addressing long-term time-series tasks.Therefore,our research demonstrates that this innovative approach outperforms the traditional Autoregressive Integrated Moving Average(ARIMA)method in forecasting long-term univariate time series.ARIMA is a high-quality and competitive model in time series prediction,and yet it requires significant preprocessing efforts.Using multiple accuracy metrics,we have evaluated both ARIMA and proposed method on the simulated time-series data and real data in both short and long term.Furthermore,our findings indicate its superiority over alternative network architectures,including Fully Connected Neural Networks,Convolutional Neural Networks,and Nonpooling Convolutional Neural Networks.Our AutoML approach enables non-professional to attain highly accurate and effective time series forecasting,and can be widely applied to various domains,particularly in business and finance.
基金support and help from the People’s Armed Police Force of China Engineering University,College of Information Engineering Subject Group,which funded this work under the All-Army Military Theory Research Project,Armed Police Force Military Theory Research Project(WJJY22JL0498).
文摘In the face of the effective popularity of the Internet of Things(IoT),but the frequent occurrence of cybersecurity incidents,various cybersecurity protection means have been proposed and applied.Among them,Intrusion Detection System(IDS)has been proven to be stable and efficient.However,traditional intrusion detection methods have shortcomings such as lowdetection accuracy and inability to effectively identifymalicious attacks.To address the above problems,this paper fully considers the superiority of deep learning models in processing highdimensional data,and reasonable data type conversion methods can extract deep features and detect classification using advanced computer vision techniques to improve classification accuracy.TheMarkov TransformField(MTF)method is used to convert 1Dnetwork traffic data into 2D images,and then the converted 2D images are filtered by UnsharpMasking to enhance the image details by sharpening;to further improve the accuracy of data classification and detection,unlike using the existing high-performance baseline image classification models,a soft-voting integrated model,which integrates three deep learning models,MobileNet,VGGNet and ResNet,to finally obtain an effective IoT intrusion detection architecture:the MUS model.Four types of experiments are conducted on the publicly available intrusion detection dataset CICIDS2018 and the IoT network traffic dataset N_BaIoT,and the results demonstrate that the accuracy of attack traffic detection is greatly improved,which is not only applicable to the IoT intrusion detection environment,but also to different types of attacks and different network environments,which confirms the effectiveness of the work done.
基金funded by the project of the China Geological Survey(DD20211364)the Science and Technology Talent Program of Ministry of Natural Resources of China(grant number 121106000000180039–2201)。
文摘This study makes a significant progress in addressing the challenges of short-term slope displacement prediction in the Universal Landslide Monitoring Program,an unprecedented disaster mitigation program in China,where lots of newly established monitoring slopes lack sufficient historical deformation data,making it difficult to extract deformation patterns and provide effective predictions which plays a crucial role in the early warning and forecasting of landslide hazards.A slope displacement prediction method based on transfer learning is therefore proposed.Initially,the method transfers the deformation patterns learned from slopes with relatively rich deformation data by a pre-trained model based on a multi-slope integrated dataset to newly established monitoring slopes with limited or even no useful data,thus enabling rapid and efficient predictions for these slopes.Subsequently,as time goes on and monitoring data accumulates,fine-tuning of the pre-trained model for individual slopes can further improve prediction accuracy,enabling continuous optimization of prediction results.A case study indicates that,after being trained on a multi-slope integrated dataset,the TCN-Transformer model can efficiently serve as a pretrained model for displacement prediction at newly established monitoring slopes.The three-day average RMSE is significantly reduced by 34.6%compared to models trained only on individual slope data,and it also successfully predicts the majority of deformation peaks.The fine-tuned model based on accumulated data on the target newly established monitoring slope further reduced the three-day RMSE by 37.2%,demonstrating a considerable predictive accuracy.In conclusion,taking advantage of transfer learning,the proposed slope displacement prediction method effectively utilizes the available data,which enables the rapid deployment and continual refinement of displacement predictions on newly established monitoring slopes.
文摘The patterns and trends in formal higher education are changing.As world economy is moving towards a knowledge based economy,the needs and requirements of formal higher education are also changing.Countries are currently reevaluating their options of formalizing their growing education sector by drafting new education policy that aims to meet the demands of this futuristic knowledge based and technology driven economy with involvement of Artificial Intelligence and Machine Learning(AIML).Factors addressing core competence of employability,holistic development and attainment of skills are the new mantras of evolving modern day’s economy.To be in sync with such demand,requirement,and challenges,the Indian government took a significant step in drafting a New Education Policy popularly known as‘NEP 2020’.This paper makes an attempt to analyze the significant characteristics and dimensions of this NEP 2020 by undertaking a survey among stakeholders mostly students to arrive at certain key findings such as inducing centric,employable,skillful,and holistic development of students attaining such higher education.It also points out some of the implementation issues which require lead time to be adjusted with the system.
文摘To enhance the safety of road traffic operations,this paper proposed a model based on stacking integrated learning utilizing American road traffic accident statistics.Initially,the process involved data cleaning,transformation,and normalization.Subsequently,various classification models were constructed,including logistic regression,k-nearest neighbors,gradient boosting,decision trees,AdaBoost,and extra trees models.Evaluation metrics such as accuracy,precision,recall,F1 score,and Hamming loss were employed.Upon analysis,the passive-aggressive classifier model exhibited superior comprehensive indices compared to other models.Based on the model’s output results,an in-depth examination of the factors influencing traffic accidents was conducted.Additionally,measures and suggestions aimed at reducing the incidence of severe traffic accidents were presented.These findings served as a valuable reference for mitigating the occurrence of traffic accidents.
基金financial supports from the Fund of Science and Technology on Reactor Fuel and Materials Laboratory(JCKYS2019201074)the Affiliated Hospital of Putian University,the Shenzhen Fundamental Research Program(JCYJ20220531095404009)+1 种基金the Shenzhen Knowledge Innovation Plan-Fundamental Research(Discipline Distribution)(JCYJ20180507184623297)the Major Science and Technology Infrastructure Project of Material Genome Big-science Facilities Platform supported by Municipal Development and Reform Commission of Shenzhen。
文摘Discovering new superconductors via traditional trial-and-error experimental approaches is apparently a time-consuming process,and the correlations between the critical temperature(Tc) and material features are still obscure.The rise of machine learning(ML) technology provides new opportunities to speed up inefficient exploration processes,and could potentially uncover new hints on the unclear correlations.In this work,we utilize open-source materials data,ML models,and data mining methods to explore the correlation between the chemical features and Tcvalues of superconducting materials.To further improve the prediction accuracy,a new model is created by integrating three basic algorithms,showing an enhanced accuracy with the coefficient of determination(R2) score of 95.9 % and root mean square error(RMSE) of 6.3 K.The average marginal contributions of material features towards Tcvalues are estimated to determine the importance of various features during prediction processes.The results suggest that the range thermal conductivity plays a critical role in Tcprediction among all element features.Furthermore,the integrated ML model is utilized to screen out potential twenty superconducting materials with Tcvalues beyond 50.0 K.This study provides insights towards Tcprediction to accelerate the exploration of potential high-Tcsuperconductors.
基金thankful to the Dean of Scientific Research at Najran University for funding this work under the Research Groups Funding Program,Grant Code(NU/RG/SERC/12/6).
文摘Data protection in databases is critical for any organization,as unauthorized access or manipulation can have severe negative consequences.Intrusion detection systems are essential for keeping databases secure.Advancements in technology will lead to significant changes in the medical field,improving healthcare services through real-time information sharing.However,reliability and consistency still need to be solved.Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption.Dis-ruptions to data items can propagate throughout the database,making it crucial to reverse fraudulent transactions without delay,especially in the healthcare industry,where real-time data access is vital.This research presents a role-based access control architecture for an anomaly detection technique.Additionally,the Structured Query Language(SQL)queries are stored in a new data structure called Pentaplet.These pentaplets allow us to maintain the correlation between SQL statements within the same transaction by employing the transaction-log entry information,thereby increasing detection accuracy,particularly for individuals within the company exhibiting unusual behavior.To identify anomalous queries,this system employs a supervised machine learning technique called Support Vector Machine(SVM).According to experimental findings,the proposed model performed well in terms of detection accuracy,achieving 99.92%through SVM with One Hot Encoding and Principal Component Analysis(PCA).
文摘With the rapid advancements in edge computing and artificial intelligence,federated learning(FL)has gained momentum as a promising approach to collaborative data utilization across organizations and devices,while ensuring data privacy and information security.In order to further harness the energy efficiency of wireless networks,an integrated sensing,communication and computation(ISCC)framework has been proposed,which is anticipated to be a key enabler in the era of 6G networks.Although the advantages of pushing intelligence to edge devices are multi-fold,some challenges arise when incorporating FL into wireless networks under the umbrella of ISCC.This paper provides a comprehensive survey of FL,with special emphasis on the design and optimization of ISCC.We commence by introducing the background and fundamentals of FL and the ISCC framework.Subsequently,the aforementioned challenges are highlighted and the state of the art in potential solutions is reviewed.Finally,design guidelines are provided for the incorporation of FL and ISCC.Overall,this paper aims to contribute to the understanding of FL in the context of wireless networks,with a focus on the ISCC framework,and provide insights into addressing the challenges and optimizing the design for the integration of FL into future 6G networks.
基金Promoting Research Level Program,Beijing Information Science and Technology University,Grant/Award Number:5211910927General Science and Technology Research program,Grant/Award Number:KM201911232002Graduated Education Program at Beijing Information Science and Technology University。
文摘Bloody Mahjong is a kind of mahjong.It is very popular in China in recent years.It not only has the characteristics of mahjong's conventional state space,huge hidden information,complicated rules,and large randomness of hand cards but also has special rules such as Change three,Hu must lack at least one suit,and Continue playing after Hu.These rules increase the difficulty of research.These special rules are used as the input of the deep learning DenseNet model.DenseNet is used to extract the Mahjong situation features.The learned features are used as the input of the classification algorithm XGBoost,and then the XGBoost algorithm is used to derive the card strategy.Experiments show that the fusion model of deep learning and XGBoost proposed in this paper has higher accuracy than the single model using only one of them in the case of highdimensional sparse features.In the case of fewer training rounds,accuracy of the model can still reach 83%.In the games against real people,it plays like human.
文摘Based on the research on the project course theory of "integration of theory and practice" in higher vocational education and the analysis of practical teaching in colleges and universities at home and abroad, combined with literature research, case analysis, system theory and other research methods, the project-based teaching goal, model, content and means of "integration of doing, learning and teaching" in higher vocational education is explored, and the project-based teaching model of "Landscape Planning and Design" is discussed combined with the application of information-based teaching methods. So as to provide references for carrying out the project-based teaching in similar courses in higher vocational colleges and really achieve docking the actual post requirements with the course to provide the basis for achieving the purpose of cultivating skilled talents in higher vocational education.
文摘This paper centers on the integrated learning of English and law in China.Firstly,it outlines the importance of English in the solution of the ever increasing legal disputes between China and the outside world,which inevitably involves an integrated learning of English and law.Secondly,it points out that the content of legal English reflects a combination of legal knowledge and English skills.Thirdly,it expounds on the difficulties that Chinese English majors are facing in the process of learning English and law simultaneously and furnishes some practical suggestions.
基金supported by The Fundamental Research Funds for the Central Universities(No.2021XD-A01-1)The National Natural Science Foundation of China(No.92067202)。
文摘With the development of artificial intelligence(AI)and 5G technology,the integration of sensing,communication and computing in the Internet of Vehicles(Io V)is becoming a trend.However,the large amount of data transmission and the computing requirements of intelligent tasks lead to the complex resource management problems.In view of the above challenges,this paper proposes a tasks-oriented joint resource allocation scheme(TOJRAS)in the scenario of Io V.First,this paper proposes a system model with sensing,communication,and computing integration for multiple intelligent tasks with different requirements in the Io V.Secondly,joint resource allocation problems for real-time tasks and delay-tolerant tasks in the Io V are constructed respectively,including communication,computing and caching resources.Thirdly,a distributed deep Q-network(DDQN)based algorithm is proposed to solve the optimization problems,and the convergence and complexity of the algorithm are discussed.Finally,the experimental results based on real data sets verify the performance advantages of the proposed resource allocation scheme,compared to the existing ones.The exploration efficiency of our proposed DDQN-based algorithm is improved by at least about 5%,and our proposed resource allocation scheme improves the m AP performance by about 0.15 under resource constraints.
基金Supported in part by the State Key Development Program for Basic Research of China(2012CB720505)the National Natural Science Foundation of China(61174105,60874049)
文摘Based on the two-dimensional (2D) system theory, an integrated predictive iterative learning control (2D-IPILC) strategy for batch processes is presented. First, the output response and the error transition model predictions along the batch index can be calculated analytically due to the 2D Roesser model of the batch process. Then, an integrated framework of combining iterative learning control (ILC) and model predictive control (MPC) is formed reasonably. The output of feedforward ILC is estimated on the basis of the predefined process 2D model. By min- imizing a quadratic objective function, the feedback MPC is introduced to obtain better control performance for tracking problem of batch processes. Simulations on a typical batch reactor demonstrate that the satisfactory tracking performance as well as faster convergence speed can be achieved than traditional proportion type (P- t-we) ILC despite the model error and disturbances.
文摘Attacks on fully integrated servers,apps,and communication networks via the Internet of Things(IoT)are growing exponentially.Sensitive devices’effectiveness harms end users,increases cyber threats and identity theft,raises costs,and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods.Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security.Following the 1,2,3,and 4G cellular networks,the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as the global advancement of cellular networks.Even to this day,experts are working on the evolution’s sixth generation(6G).It offers amazing capabilities for connecting everything,including gadgets and machines,with wavelengths ranging from 1 to 10 mm and frequencies ranging from 300 MHz to 3 GHz.It gives you the most recent information.Many countries have already established this technology within their border.Security is the most crucial aspect of using a 5G network.Because of the absence of study and network deployment,new technology first introduces new gaps for attackers and hackers.Internet Protocol(IP)attacks and intrusion will become more prevalent in this system.An efficient approach to detect intrusion in the 5G network using a Machine Learning algorithm will be provided in this research.This research will highlight the high accuracy rate by validating it for unidentified and suspicious circumstances in the 5G network,such as intruder hackers/attackers.After applying different machine learning algorithms,obtained the best result on Linear Regression Algorithm’s implementation on the dataset results in 92.12%on test data and 92.13%on train data with 92%precision.
文摘The latest advancements in computer vision and deep learning(DL)techniques pave the way to design novel tools for the detection and monitoring of forestfires.In this view,this paper presents an intelligent wild forestfire detec-tion and alarming system using deep learning(IWFFDA-DL)model.The pro-posed IWFFDA-DL technique aims to identify forestfires at earlier stages through integrated sensors.The proposed IWFFDA-DL system includes an Inte-grated sensor system(ISS)combining an array of sensors that acts as the major input source that helps to forecast thefire.Then,the attention based convolution neural network with bidirectional long short term memory(ACNN-BLSTM)model is applied to examine and identify the existence of danger.For hyperpara-meter tuning of the ACNN-BLSTM model,the bacterial foraging optimization(BFO)algorithm is employed and thereby enhances the detection performance.Finally,when thefire is detected,the Global System for Mobiles(GSM)modem transmits messages to the authorities to take required actions.An extensive set of simulations were performed and the results are investigated interms of several aspects.The obtained results highlight the betterment of the IWFFDA-DL techni-que interms of various measures.
基金supported by National Natural Science Foundation of China for Young Scientist (81200686, 81400426)Research Fund for the Doctoral Program of Higher Education of China (20120171120108)+1 种基金Natural Science Foundation of Guangdong Province, China(S2011040005378)Fundamental Research Funds for the Central Universities (11ykpy65, 15ykpy31)
文摘Background: Ophthalmology is an important medical science subject, but it is given with insufficient attention in undergraduate medical education. Flipped classroom(FC) and problem-based learning(PBL) are well-known education methods that can be integrated into ophthalmology education to improve students' competence level and promote active learning. Methods: We used a mixed teaching methodology that integrated a FC and PBL into a 1-week ophthalmology clerkship for 72 fourth-year medical students. The course includes two major sessions: FC session and PBL session, relying on clinical and real-patient cases. Written examinations were set up to assess students' academic performance and questionnaires were designed to evaluate their perceptions. Results: The post-course examination results were higher than the pre-course results, and many students gained ophthalmic knowledge and learning skills to varying levels. Comparison of pre-and post-course questionnaires indicated that interests in ophthalmology increased and more students expressed desires to be eye doctors. Most students were satisfied with the new method, while some suggested the process should be slower and the communication with their teacher needed to strengthen.Conclusions: FC and PBL are complementary methodologies. Utilizing the mixed teaching meth of FC and PBL was successful in enhancing academic performance, student satisfactions and promoting active learning.
基金This research was funded by the National Natural Science Foundation of China(51974052)(51804061)the Chongqing Research Program of Basic Research and Frontier Technology(cstc2019jcyj-msxmX0199).
文摘During the drilling process,stick-slip vibration of the drill string is mainly caused by the nonlinear friction gen-erated by the contact between the drill bit and the rock.To eliminate the fatigue wear of downhole drilling tools caused by stick-slip vibrations,the Fractional-Order Proportional-Integral-Derivative(FOPID)controller is used to suppress stick-slip vibrations in the drill string.Although the FOPID controller can effectively suppress the drill string stick-slip vibration,its structure isflexible and parameter setting is complicated,so it needs to use the cor-responding machine learning algorithm for parameter optimization.Based on the principle of torsional vibration,a simplified model of multi-degree-of-freedom drill string is established and its block diagram is designed.The continuous nonlinear friction generated by cutting rock is described by the LuGre friction model.The adaptive learning strategy of genetic algorithm(GA),particle swarm optimization(PSO)and particle swarm optimization improved(IPSO)by arithmetic optimization(AOA)is used to optimize and adjust the controller parameters,and the drill string stick-slip vibration is suppressed to the greatest extent.The results show that:When slight drill string stick-slip vibration occurs,the FOPID controller optimized by machine learning algorithm has a good effect on suppressing drill string stick-slip vibration.However,the FOPID controller cannot get the drill string system which has fallen into serious stick-slip vibration(stuck pipe)out of trouble,and the machine learning algorithm is required to mark a large amount of data on adjacent Wells to train the model.Set a reasonable range of drilling parameters(weight on bit/drive torque)in advance to avoid severe stick-slip vibration(stuck pipe)in the drill string system.