In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medic...In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities.展开更多
Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application t...Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators.展开更多
In order to solve the problem of insufficient integration of school-enterprise supervisors in the current school-enterprise cooperation model,this article introduces the ideas and results of the construction of a team...In order to solve the problem of insufficient integration of school-enterprise supervisors in the current school-enterprise cooperation model,this article introduces the ideas and results of the construction of a team with double-qualified instructors majored in software engineering.Specifically,the integration of production and education are carried out in three stages,i.e.,enterprise cooperation courses,enterprise internship,and graduation design(internship),by taking the software engineering major of the School of Information and Software Engineering of the University of Electronic Science and Technology of China as a case study.展开更多
In view of the fact that the relevant courses of undergraduate database are not systematic,this paper discusses the relevant requirements of database courses from the perspective of the ability training of software en...In view of the fact that the relevant courses of undergraduate database are not systematic,this paper discusses the relevant requirements of database courses from the perspective of the ability training of software engineering.It gives the problem-oriented classroom and experimental design of the course content module,designs and develops the course learning platform,analyzes the data of the teaching effect,and explains the effectiveness of course teaching.展开更多
Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the...Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures.展开更多
The slogan of“Combination of medicine and engineering”proposed in“Made in China 2025”has aroused great attention to higher engineering education.However,it is a difficult problem and challenge for schools and educ...The slogan of“Combination of medicine and engineering”proposed in“Made in China 2025”has aroused great attention to higher engineering education.However,it is a difficult problem and challenge for schools and educators to effectively adapt to the economic and social development,train new medical and engineering talents,and explore and cultivate new subject growth points.In order to deal with engineering change and a new round of scientific and technological revolution,facing the challenge of new engineering construction.This paper will combine the reality and characteristics of colleges and universities,analyze the problems existing in the current medical engineering cross-graduate training,and put forward countermeasures and suggestions to promote the progress and development of science and technology in colleges and universities.展开更多
This paper analyzes the new demands of software engineering talent training under the background of emerging engineering education,in order to clarify the direction of software engineering teaching reform,and discusse...This paper analyzes the new demands of software engineering talent training under the background of emerging engineering education,in order to clarify the direction of software engineering teaching reform,and discusses the issue of how to build core competencies of software engineering talent.This paper takes“consolidating professional foundation,training practical ability and improving innovation ability”as the goal of software engineering talent training,puts forward the conception of software engineering teaching reform with“reconstructing the core course platform,improving the practice teaching system,and creating an innovation training environment”,and expounds the teaching reform practice activities based on this conception.Finally,the paper summarizes the achievements of teaching reform.展开更多
Mathematics foundations of information security is a core course in the subject of information security.In view of the current national ideological and political conference in universities,finding a way to integrate t...Mathematics foundations of information security is a core course in the subject of information security.In view of the current national ideological and political conference in universities,finding a way to integrate this course with ideological and political education attracts a lot of attention from the education community.This paper makes an assay of the significance of the combination of mathematics foundations of information security course and ideological and political education,and introduces the teaching practice of mathematics foundations of information security course combined with ideological and political education.Through the combination of ideological and political education and curriculum content,cultivating all-round development of talents who study information security.展开更多
When the Transformer proposed by Google in 2017,it was first used for machine translation tasks and achieved the state of the art at that time.Although the current neural machine translation model can generate high qu...When the Transformer proposed by Google in 2017,it was first used for machine translation tasks and achieved the state of the art at that time.Although the current neural machine translation model can generate high quality translation results,there are still mistranslations and omissions in the translation of key information of long sentences.On the other hand,the most important part in traditional translation tasks is the translation of key information.In the translation results,as long as the key information is translated accurately and completely,even if other parts of the results are translated incorrect,the final translation results’quality can still be guaranteed.In order to solve the problem of mistranslation and missed translation effectively,and improve the accuracy and completeness of long sentence translation in machine translation,this paper proposes a key information fused neural machine translation model based on Transformer.The model proposed in this paper extracts the keywords of the source language text separately as the input of the encoder.After the same encoding as the source language text,it is fused with the output of the source language text encoded by the encoder,then the key information is processed and input into the decoder.With incorporating keyword information from the source language sentence,the model’s performance in the task of translating long sentences is very reliable.In order to verify the effectiveness of the method of fusion of key information proposed in this paper,a series of experiments were carried out on the verification set.The experimental results show that the Bilingual Evaluation Understudy(BLEU)score of the model proposed in this paper on theWorkshop on Machine Translation(WMT)2017 test dataset is higher than the BLEU score of Transformer proposed by Google on the WMT2017 test dataset.The experimental results show the advantages of the model proposed in this paper.展开更多
This paper takes the school-enterprise cooperation between the University of Electronic Science and Technology of China(UESTC)and Baidu(China)Co.,Ltd.as an example to build the Paddle Paddle(Sichuan)AI Education Innov...This paper takes the school-enterprise cooperation between the University of Electronic Science and Technology of China(UESTC)and Baidu(China)Co.,Ltd.as an example to build the Paddle Paddle(Sichuan)AI Education Innovation Center by enjoying the best of both UESTC and Baidu(China),and cooperating with 16 universities in Sichuan Province.With the support of this center,both the school and the enterprise successfully built a school-enterprise collaborative AI innovative talent training model,which mainly serves the universities,industries,and districts.Furthermore,this training model is able to facilitate the update of the industrial intelligence and the regional economic development in southwest China,and also provide a reference for deep integration of school-enterprise collaboration and the cultivation of innovative talents in electronic information fields.展开更多
With the rapid development of the Internet finance industry,society has put forward urgent needs for“Internet Plus finance”composite talents,and also put forward challenges to talent cultivation in colleges and univ...With the rapid development of the Internet finance industry,society has put forward urgent needs for“Internet Plus finance”composite talents,and also put forward challenges to talent cultivation in colleges and universities.To cultivate the talents in the“Internet Plus finance”,the School of Information and Software Engineering of the University of Electronic Science and Technology of China(hereinafter“the School”)begins the 10 major measures,such as the construction of training programs,the construction of the curriculum system,the construction of the faculty team,and the construction of the practice base.Meanwhile,the School works together with banks,which have cooperated for a long time,to establish the talent cultivation system in the direction of“Internet Plus finance”in the software engineering major,solving the problem of interdisciplinary talent training in the field of software engineering and finance.展开更多
As an ideal material,bulk metallic glass(MG)has a wide range of applications because of its unique properties such as structural,functional and biomedical materials.However,it is difficult to predict the glass-forming...As an ideal material,bulk metallic glass(MG)has a wide range of applications because of its unique properties such as structural,functional and biomedical materials.However,it is difficult to predict the glass-forming ability(GFA)even given the criteria in theory and this problem greatly limits the application of bulk MG in industrial field.In this work,the proposed model uses the random forest classification method which is one of machine learning methods to solve the GFA prediction for binary metallic alloys.Compared with the previous SVM algorithm models of all features combinations,this new model is successfully constructed based on the random forest classification method with a new combination of features and it obtains better prediction results.Simultaneously,it further shows the degree of feature parameters influence on GFA.Finally,a normalized evaluation indicator of binary alloy for machine learning model performance is put forward for the first time.The result shows that the application of machine learning in MGs is valuable.展开更多
Quantum correlation plays a critical role in the maintenance of quantum information processing and nanometer device design.In the past two decades,several quantitative methods had been proposed to study the quantum co...Quantum correlation plays a critical role in the maintenance of quantum information processing and nanometer device design.In the past two decades,several quantitative methods had been proposed to study the quantum correlation of certain open quantum systems,including the geometry and entropy style discord methods.However,there are differences among these quantification methods,which promote a deep understanding of the quantum correlation.In this paper,a novel time-dependent three environmental open system model is established to study the quantum correlation.This system model interacts with two independent spin-environments(two spin-environments are connected to the other spin-environment)respectively.We have calculated and compared the changing properties of the quantum correlation under three kinds of geometry and two entropy discords,especially for the freezing phenomenon.At the same time,some original and novel changing behaviors of the quantum correlation under different timedependent parameters are studied,which is helpful to achieve the optimal revival of the quantum discord and the similar serrated form of the freezing phenomenon.Finally,it shows the controllability of the freezing correlation and the robustness of these methods by adjusting time-dependent parameters.This work provides a new way to control the quantum correlation and design nanospintronic devices.展开更多
Different from traditional symmetric cryptography, public key cryptography allows each user to own a pair of public/private key pair. Given the public key of one user and the data to be encrypted, a ciphertext can be ...Different from traditional symmetric cryptography, public key cryptography allows each user to own a pair of public/private key pair. Given the public key of one user and the data to be encrypted, a ciphertext can be generated such that only the intended user is able to recover the data using his/her private key associated with public key involved in the encryption process. To really understand the philosophy behind the public key cryptography is not an easy task and sometimes it seems somewhat difficult, if not impossible, for the beginners without the knowledge of the abstract algebra and number theory. In this paper, we introduce briefly the basic definition of public key cryptography as well as the corresponding mathematical hard problems. Besides, we explain why the mathematical backgrounds, especially abstract algebra and number theory, matter in the study of public key cryptography.展开更多
Data model is the core knowledge of database course.A deep understanding of data model is the key to mastering database design and application.The data models of NoSQL databases are categorized as key-value stores,col...Data model is the core knowledge of database course.A deep understanding of data model is the key to mastering database design and application.The data models of NoSQL databases are categorized as key-value stores,column-oriented stores,document-oriented stores and graph databases.This paper makes a comparative analysis of the characteristics of the relational data model and NoSQL data models,and gives the design and implementation of different data models combined with cases,so that students can master the relevant theories and application methods of the database model.展开更多
The main problems of the traditional software talent training are that the knowledge learned is out of touch of the industry,weak ability to solve complex engineering problems and the comprehensive quality cannot meet...The main problems of the traditional software talent training are that the knowledge learned is out of touch of the industry,weak ability to solve complex engineering problems and the comprehensive quality cannot meet the requirements of enterprises.Taking the course of digital image processing as an example,this paper analyzes the key steps in the training process in details,and proposes a multiple mode collaborative based software engineering talent training mechanism,which brings the key subjects of teaching materials,teachers,students,enterprises,subjects into a unified training mechanism,so as to provide a new ideas for software talent teaching.展开更多
It is important to transform knowledge-based learning to competency-based learning.This paper describes the exploration and practice of“programming and algorithm foundation”curriculum reform for competency-based lea...It is important to transform knowledge-based learning to competency-based learning.This paper describes the exploration and practice of“programming and algorithm foundation”curriculum reform for competency-based learning.In order to cultivate students’ability of high-level program development,the intelligent learning system of“MOOC/SPOC+icoding online experiment and programming ability test Platform+Rain Classroom”is established.In the case of limited class hours,we make full use of online resources to build a student-centered method to internalize knowledge and ability.We guide students to complete the basic knowledge module of MOOC or SPOC,and complete the programming experiment on icoding platform.According to the feedback of learning outcome,teachers use offline classroom and rain classroom to sort out the key and difficult points,expanding the depth and breadth of the curriculum,and stimulate students’enthusiasm to participate in the curriculum.展开更多
Estimating the intention of space objects plays an important role in air-craft design,aviation safety,military and otherfields,and is an important refer-ence basis for air situation analysis and command decision-making...Estimating the intention of space objects plays an important role in air-craft design,aviation safety,military and otherfields,and is an important refer-ence basis for air situation analysis and command decision-making.This paper studies an intention estimation method based on fuzzy theory,combining prob-ability to calculate the intention between two objects.This method takes a space object as the origin of coordinates,observes the target’s distance,speed,relative heading angle,altitude difference,steering trend and etc.,then introduces the spe-cific calculation methods of these parameters.Through calculation,values are input into the fuzzy inference model,andfinally the action intention of the target is obtained through the fuzzy rule table and historical weighted probability.Ver-ified by simulation experiment,the target intention inferred by this method is roughly the same as the actual behavior of the target,which proves that the meth-od for identifying the target intention is effective.展开更多
Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to ...Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results.展开更多
In this paper, we approach the design of ID caching technology(IDCT) for graph databases, with the purpose of accelerating the queries on graph database data and avoiding redundant graph database query operations whic...In this paper, we approach the design of ID caching technology(IDCT) for graph databases, with the purpose of accelerating the queries on graph database data and avoiding redundant graph database query operations which will consume great computer resources. Traditional graph database caching technology(GDCT)needs a large memory to store data and has the problems of serious data consistency and low cache utilization. To address these issues, in the paper we propose a new technology which focuses on ID allocation mechanism and high-speed queries of ID on graph databases. Specifically, ID of the query result is cached in memory and data consistency is achieved through the real-time synchronization and cache memory adaptation. In addition, we set up complex queries and simple queries to satisfy all query requirements and design a mechanism of cache replacement based on query action time, query times, and memory capacity, thus improving the performance furthermore.Extensive experiments show the superiority of our techniques compared with the traditional query approach of graph databases.展开更多
文摘In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public networks.How to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and educators.In order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities.
基金supported by the Research Fund for International Young Scientists of the National Natural Science Foundation of China(61550110248)the Research on Fundamental Theory of Shared Intelligent Street Lamp for New Scene Service(H04W200495)+1 种基金Sichuan Science and Technology Program(2019YFG0190)the Research on Sino-Tibetan Multi-source Information Acquisition,Fusion,Data Mining and its Application(H04W170186).
文摘Memristor with memory properties can be applied to connection points(synapses)between cells in a cellular neural network(CNN).This paper highlights memristor crossbar-based multilayer CNN(MCM-CNN)and its application to edge detection.An MCM-CNN is designed by adopting a memristor crossbar composed of a pair of memristors.MCM-CNN based on the memristor crossbar with changeable weight is suitable for edge detection of a binary image and a color image considering its characteristics of programmablization and compactation.Figure of merit(FOM)is introduced to evaluate the proposed structure and several traditional edge detection operators for edge detection results.Experiment results show that the FOM of MCM-CNN is three times more than that of the traditional edge detection operators.
基金This work was supported by the Research and Practice of School-enterprise Collaborative Construction of Double Qualified Teachers in Software Engineering“Construction of Double Qualified Teachers in Software Engineering Based on Enterprise and School Cooperation”(Grant No.2020CJ01)the Fundamental Research Funds for the Central Universities of UESTC(Policy Research)“The System Construction of Ideological and Political Education under Training of Excellent Engineer”(Grant No.ZYGX2020ZCYJ027).
文摘In order to solve the problem of insufficient integration of school-enterprise supervisors in the current school-enterprise cooperation model,this article introduces the ideas and results of the construction of a team with double-qualified instructors majored in software engineering.Specifically,the integration of production and education are carried out in three stages,i.e.,enterprise cooperation courses,enterprise internship,and graduation design(internship),by taking the software engineering major of the School of Information and Software Engineering of the University of Electronic Science and Technology of China as a case study.
基金supported through the collaborative education projects of production and learning(201802136011 and 201802095001)2019 Sichuan teaching reform and research project,and teaching reform and research project of University of Electronic Science and technology in 2019.
文摘In view of the fact that the relevant courses of undergraduate database are not systematic,this paper discusses the relevant requirements of database courses from the perspective of the ability training of software engineering.It gives the problem-oriented classroom and experimental design of the course content module,designs and develops the course learning platform,analyzes the data of the teaching effect,and explains the effectiveness of course teaching.
文摘Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures.
文摘The slogan of“Combination of medicine and engineering”proposed in“Made in China 2025”has aroused great attention to higher engineering education.However,it is a difficult problem and challenge for schools and educators to effectively adapt to the economic and social development,train new medical and engineering talents,and explore and cultivate new subject growth points.In order to deal with engineering change and a new round of scientific and technological revolution,facing the challenge of new engineering construction.This paper will combine the reality and characteristics of colleges and universities,analyze the problems existing in the current medical engineering cross-graduate training,and put forward countermeasures and suggestions to promote the progress and development of science and technology in colleges and universities.
文摘This paper analyzes the new demands of software engineering talent training under the background of emerging engineering education,in order to clarify the direction of software engineering teaching reform,and discusses the issue of how to build core competencies of software engineering talent.This paper takes“consolidating professional foundation,training practical ability and improving innovation ability”as the goal of software engineering talent training,puts forward the conception of software engineering teaching reform with“reconstructing the core course platform,improving the practice teaching system,and creating an innovation training environment”,and expounds the teaching reform practice activities based on this conception.Finally,the paper summarizes the achievements of teaching reform.
文摘Mathematics foundations of information security is a core course in the subject of information security.In view of the current national ideological and political conference in universities,finding a way to integrate this course with ideological and political education attracts a lot of attention from the education community.This paper makes an assay of the significance of the combination of mathematics foundations of information security course and ideological and political education,and introduces the teaching practice of mathematics foundations of information security course combined with ideological and political education.Through the combination of ideological and political education and curriculum content,cultivating all-round development of talents who study information security.
基金Major Science and Technology Project of Sichuan Province[No.2022YFG0315,2022YFG0174]Sichuan Gas Turbine Research Institute stability support project of China Aero Engine Group Co.,Ltd.[No.GJCZ-2019-71].
文摘When the Transformer proposed by Google in 2017,it was first used for machine translation tasks and achieved the state of the art at that time.Although the current neural machine translation model can generate high quality translation results,there are still mistranslations and omissions in the translation of key information of long sentences.On the other hand,the most important part in traditional translation tasks is the translation of key information.In the translation results,as long as the key information is translated accurately and completely,even if other parts of the results are translated incorrect,the final translation results’quality can still be guaranteed.In order to solve the problem of mistranslation and missed translation effectively,and improve the accuracy and completeness of long sentence translation in machine translation,this paper proposes a key information fused neural machine translation model based on Transformer.The model proposed in this paper extracts the keywords of the source language text separately as the input of the encoder.After the same encoding as the source language text,it is fused with the output of the source language text encoded by the encoder,then the key information is processed and input into the decoder.With incorporating keyword information from the source language sentence,the model’s performance in the task of translating long sentences is very reliable.In order to verify the effectiveness of the method of fusion of key information proposed in this paper,a series of experiments were carried out on the verification set.The experimental results show that the Bilingual Evaluation Understudy(BLEU)score of the model proposed in this paper on theWorkshop on Machine Translation(WMT)2017 test dataset is higher than the BLEU score of Transformer proposed by Google on the WMT2017 test dataset.The experimental results show the advantages of the model proposed in this paper.
基金supported by the Ministry of Education’s 2022 Second Batch of Industry-university Cooperation Collaborative Education Project"PaddlePaddle Artificial Intelligence Education Innovation Center Practice Base"(Grant No.220700001065953,220700001121532)the Ministry of Education’s Second Batch of Supply-demand Docking Employment Education Project"University of Electronic Science and Technology of China-Baidu Online Network Technology(Beijing)AI Technology Talent Training Project"(Grant No.20230103592)。
文摘This paper takes the school-enterprise cooperation between the University of Electronic Science and Technology of China(UESTC)and Baidu(China)Co.,Ltd.as an example to build the Paddle Paddle(Sichuan)AI Education Innovation Center by enjoying the best of both UESTC and Baidu(China),and cooperating with 16 universities in Sichuan Province.With the support of this center,both the school and the enterprise successfully built a school-enterprise collaborative AI innovative talent training model,which mainly serves the universities,industries,and districts.Furthermore,this training model is able to facilitate the update of the industrial intelligence and the regional economic development in southwest China,and also provide a reference for deep integration of school-enterprise collaboration and the cultivation of innovative talents in electronic information fields.
基金supported by the Fundamental Research Funds for the Central Universities of UESTC(Policy Research)“The System Construction of Ideological and Political Education under Training of Excellent Engineer”(Grant No.ZYGX2020ZCYJ027).
文摘With the rapid development of the Internet finance industry,society has put forward urgent needs for“Internet Plus finance”composite talents,and also put forward challenges to talent cultivation in colleges and universities.To cultivate the talents in the“Internet Plus finance”,the School of Information and Software Engineering of the University of Electronic Science and Technology of China(hereinafter“the School”)begins the 10 major measures,such as the construction of training programs,the construction of the curriculum system,the construction of the faculty team,and the construction of the practice base.Meanwhile,the School works together with banks,which have cooperated for a long time,to establish the talent cultivation system in the direction of“Internet Plus finance”in the software engineering major,solving the problem of interdisciplinary talent training in the field of software engineering and finance.
基金supported by the National Key R&D Program of China,Grant No.2018YFA0306703.
文摘As an ideal material,bulk metallic glass(MG)has a wide range of applications because of its unique properties such as structural,functional and biomedical materials.However,it is difficult to predict the glass-forming ability(GFA)even given the criteria in theory and this problem greatly limits the application of bulk MG in industrial field.In this work,the proposed model uses the random forest classification method which is one of machine learning methods to solve the GFA prediction for binary metallic alloys.Compared with the previous SVM algorithm models of all features combinations,this new model is successfully constructed based on the random forest classification method with a new combination of features and it obtains better prediction results.Simultaneously,it further shows the degree of feature parameters influence on GFA.Finally,a normalized evaluation indicator of binary alloy for machine learning model performance is put forward for the first time.The result shows that the application of machine learning in MGs is valuable.
基金Scientific Research Starting Project of SWPU[Zheng,D.,No.0202002131604]Major Science and Technology Project of Sichuan Province[Zheng,D.,No.8ZDZX0143]+1 种基金Ministry of Education Collaborative Education Project of China[Zheng,D.,No.952]Fundamental Research Project[Zheng,D.,Nos.549,550].
文摘Quantum correlation plays a critical role in the maintenance of quantum information processing and nanometer device design.In the past two decades,several quantitative methods had been proposed to study the quantum correlation of certain open quantum systems,including the geometry and entropy style discord methods.However,there are differences among these quantification methods,which promote a deep understanding of the quantum correlation.In this paper,a novel time-dependent three environmental open system model is established to study the quantum correlation.This system model interacts with two independent spin-environments(two spin-environments are connected to the other spin-environment)respectively.We have calculated and compared the changing properties of the quantum correlation under three kinds of geometry and two entropy discords,especially for the freezing phenomenon.At the same time,some original and novel changing behaviors of the quantum correlation under different timedependent parameters are studied,which is helpful to achieve the optimal revival of the quantum discord and the similar serrated form of the freezing phenomenon.Finally,it shows the controllability of the freezing correlation and the robustness of these methods by adjusting time-dependent parameters.This work provides a new way to control the quantum correlation and design nanospintronic devices.
文摘Different from traditional symmetric cryptography, public key cryptography allows each user to own a pair of public/private key pair. Given the public key of one user and the data to be encrypted, a ciphertext can be generated such that only the intended user is able to recover the data using his/her private key associated with public key involved in the encryption process. To really understand the philosophy behind the public key cryptography is not an easy task and sometimes it seems somewhat difficult, if not impossible, for the beginners without the knowledge of the abstract algebra and number theory. In this paper, we introduce briefly the basic definition of public key cryptography as well as the corresponding mathematical hard problems. Besides, we explain why the mathematical backgrounds, especially abstract algebra and number theory, matter in the study of public key cryptography.
基金This work was partly supported through the collaborative education projects of production and learning,and 2019 Sichuan teaching reform and research project,and teaching reform and research project of University of Electronic Science and technology in 2019.
文摘Data model is the core knowledge of database course.A deep understanding of data model is the key to mastering database design and application.The data models of NoSQL databases are categorized as key-value stores,column-oriented stores,document-oriented stores and graph databases.This paper makes a comparative analysis of the characteristics of the relational data model and NoSQL data models,and gives the design and implementation of different data models combined with cases,so that students can master the relevant theories and application methods of the database model.
文摘The main problems of the traditional software talent training are that the knowledge learned is out of touch of the industry,weak ability to solve complex engineering problems and the comprehensive quality cannot meet the requirements of enterprises.Taking the course of digital image processing as an example,this paper analyzes the key steps in the training process in details,and proposes a multiple mode collaborative based software engineering talent training mechanism,which brings the key subjects of teaching materials,teachers,students,enterprises,subjects into a unified training mechanism,so as to provide a new ideas for software talent teaching.
基金This work is supported by Online and Offline Hybrid Curriculum Reform Project of UESTC in 2020 under Grant 2020HHKC0029by Project Based Curriculum for Freshmen of UESTC in 2020 under Grant 2020PBLF044by Online and Offline Hybrid Teaching Reform Project of CMOOC in 2019 under Grant B190201.
文摘It is important to transform knowledge-based learning to competency-based learning.This paper describes the exploration and practice of“programming and algorithm foundation”curriculum reform for competency-based learning.In order to cultivate students’ability of high-level program development,the intelligent learning system of“MOOC/SPOC+icoding online experiment and programming ability test Platform+Rain Classroom”is established.In the case of limited class hours,we make full use of online resources to build a student-centered method to internalize knowledge and ability.We guide students to complete the basic knowledge module of MOOC or SPOC,and complete the programming experiment on icoding platform.According to the feedback of learning outcome,teachers use offline classroom and rain classroom to sort out the key and difficult points,expanding the depth and breadth of the curriculum,and stimulate students’enthusiasm to participate in the curriculum.
基金supported by the National Key R&D Program of China,Grant No.2018YFA0306703 and J2019-V-0001-0092.
文摘Estimating the intention of space objects plays an important role in air-craft design,aviation safety,military and otherfields,and is an important refer-ence basis for air situation analysis and command decision-making.This paper studies an intention estimation method based on fuzzy theory,combining prob-ability to calculate the intention between two objects.This method takes a space object as the origin of coordinates,observes the target’s distance,speed,relative heading angle,altitude difference,steering trend and etc.,then introduces the spe-cific calculation methods of these parameters.Through calculation,values are input into the fuzzy inference model,andfinally the action intention of the target is obtained through the fuzzy rule table and historical weighted probability.Ver-ified by simulation experiment,the target intention inferred by this method is roughly the same as the actual behavior of the target,which proves that the meth-od for identifying the target intention is effective.
基金National Natural Science Foundation of China(62173066)Open Project of Sichuan Provincial Key Laboratory of Intelligent Terminal Co-built by Province and City(SCITLAB-1014)。
文摘Sealed-bid auctions are a vital transaction tool in the e-commerce field.Traditional centralized auction schemes typically result in severe threats to data integrity,information transparency,and traceability owing to their excessive reliance on third parties,and blockchain-based auction schemes generally suffer from high storage costs and are deficient in functional and architectural design.To solve these problems,this study presents a sealed-bid auction scheme that removes the third-party based on an Ethereum smart contract,ensuring data integrity,openness,and transparency in the execution process.The commitment mechanism and distributed storage system help to significantly reduce the user’s storage cost and protect the privacy of user bids.For the functional design,this study introduces a fulltext-retrieval and dispute-processing module for commodities,which reduces the defects existing in the functional module design of existing auction systems.Furthermore,a prototype auction system on the Ethereum test chain is built to validate the proposed scheme.Experiments show that compared with traditional storage methods,indirect storage based on a distributed storage system of texts and images can reduce the storage cost by at least 50%while ensuring data integrity.Finally,the gas cost at each stage of the auction scheme and the time required for the full-text retrieval of products are recorded to evaluate the scheme performance and analyze the test results.
基金supported by the Research Fund of National Key Laboratory of Computer Architecture under Grant No.CARCH201501the Open Project Program of the State Key Laboratory of Mathematical Engineering and Advanced Computing under Grant No.2016A09
文摘In this paper, we approach the design of ID caching technology(IDCT) for graph databases, with the purpose of accelerating the queries on graph database data and avoiding redundant graph database query operations which will consume great computer resources. Traditional graph database caching technology(GDCT)needs a large memory to store data and has the problems of serious data consistency and low cache utilization. To address these issues, in the paper we propose a new technology which focuses on ID allocation mechanism and high-speed queries of ID on graph databases. Specifically, ID of the query result is cached in memory and data consistency is achieved through the real-time synchronization and cache memory adaptation. In addition, we set up complex queries and simple queries to satisfy all query requirements and design a mechanism of cache replacement based on query action time, query times, and memory capacity, thus improving the performance furthermore.Extensive experiments show the superiority of our techniques compared with the traditional query approach of graph databases.