M. Nivat
Hasil untuk "Electronic computers. Computer science"
Menampilkan 20 dari ~18050781 hasil · dari DOAJ, CrossRef, Semantic Scholar, arXiv
Xiaolong Liu, M. Hersam
Yang Cai, Yunli Hao, Yongfang Qi
The niche situation can reflect the advantages and disadvantages of biological individuals in the ecosystem environment as well as the overall operational status of the ecosystem. However, higher-order niche systems generally exhibit complex nonlinearities and parameter uncertainties, making it difficult for traditional Type-1 fuzzy control to accurately handle their inherent fuzziness and environmental disturbances in complex environments. To address this, this paper introduces the backstepping control method based on Type-2 T-S fuzzy control, incorporating the niche situation function as the consequent of the T-S backstepping fuzzy control. The stability analysis of the system is completed by constructing a Lyapunov function, and the adaptive law for the parameters of the niche situation function is derived. This design reflects the tendency of biological individuals to always develop in a direction beneficial to themselves, highlighting the bio-inspired intelligent characteristics of the proposed method. The results of case simulations show that the Type-2 backstepping T-S fuzzy control has significantly superior comprehensive performance in dealing with the complexity and uncertainty of high-order niche situation systems compared with the traditional Type-1 control and Type-2 T-S adaptive fuzzy control. These results not only verify the adaptive and self-development capabilities of biological individuals, as well as their efficiency in environmental utilization, but also endow this control method with a solid practical foundation.
Leonhard Ziegler, Michael Grabatin, Daniela Pöhn et al.
Abstract While self-sovereign identities (SSI) have been gaining more traction, the topic of SSI security has yet to be addressed. Especially regarding response procedures to security incidents, no prior work is available. However, incident response processes are essential to systematically respond to a security incident in a timely manner. We first evaluate the current state-of-the-art by conducting a literature survey and contacting organizations that offer SSI. The insights underpin the subject’s relevance, highlighting that incident response capabilities are just starting to be developed. Contributing to this development, we identify the challenges of building a security incident response process for SSI. Mainly, the decentralized nature inhibits the utilization of known best practices, which all focus on building a centralized incident response capability. However, even in the case of SSI, some centralized entities may exist. Therefore, we design two variants of SIR processes: one more centralized and one more decentralized. For the latter, the problem size is reduced in the first step by identifying all the stakeholders within an SSI ecosystem and then analyzing possible proactive and reactive measures each participant can access. This procedure leads to the grouping of SSI system participants into three distinct domains of incident response. For each domain, different capabilities for handling incidents are introduced depending on the involved stakeholders, their infrastructure, and their goals. To demonstrate the procedures, incident scenarios for each domain highlight the workflows during incident handling.
XIAO Zhipeng, HE Shufeng, TIAN Chunqi
This study presents a facial emotion recognition network based on UniRepLKNet to address the difficulty in effectively capturing feature information and preventing key facial information from occupying a more prominent position in the facial emotion recognition process. Moreover, to extract facial emotional features more accurately, the study designs a masked polarized self-attention module that combines U-Net and a polarized self-attention mechanism. This module can deeply mine the dependency between channels and spaces. It can also strengthen the influence of local key information of the face on emotion recognition through a multi-scale feature fusion strategy. The study optimizes UniRepLKNet, a universal large kernel Convolutional Neural Network (CNN), and proposes the EmoRepLKNet neural network structure. In EmoRepLKNet, the mask-polarized self-attention module enables the network to extract key information for facial emotion recognition. Combined with the wide receptive field of large kernel CNN, facial emotions can be recognized effectively. Experimental results show that on the facial emotion recognition dataset FER2013, EmoRepLKNet achieves an accuracy of 76.20%, outperforming existing comparison models and significantly improving facial emotion recognition accuracy compared to that of UniRepLKNet. Additionally, on the single-label portion of the RAF-DB dataset, the proposed method achieves an accuracy of 89.67%.
Niloofar Asefi, Leonard Lupin-Jimenez, Tianning Wu et al.
Reconstructing ocean dynamics from observational data is fundamentally limited by the sparse, irregular, and Lagrangian nature of spatial sampling, particularly in subsurface and remote regions. This sparsity poses significant challenges for forecasting key phenomena such as eddy shedding and rogue waves. Traditional data assimilation methods and deep learning models often struggle to recover mesoscale turbulence under such constraints. We leverage a deep learning framework that combines neural operators with denoising diffusion probabilistic models to reconstruct high-resolution ocean states from extremely sparse Lagrangian observations. By conditioning the generative model on neural operator outputs, the framework accurately captures small-scale, high-wavenumber dynamics even at 99% sparsity (for synthetic data) and 99.9% sparsity (for real satellite observations). We validate our method on benchmark systems, synthetic float observations, and real satellite data, demonstrating robust performance under severe spatial sampling limitations as compared to other deep learning baselines.
Nana Liu, Qisheng Wang, Mark M. Wilde et al.
Abstract Matrix geometric means between two positive definite matrices can be defined from distinct perspectives—as solutions to certain nonlinear systems of equations, as points along geodesics in Riemannian geometry, and as solutions to certain optimisation problems. We devise quantum subroutines for the matrix geometric means, and construct solutions to the algebraic Riccati equation—an important class of nonlinear systems of equations appearing in machine learning, optimal control, estimation, and filtering. Using these subroutines, we present a new class of quantum learning algorithms, for both classical and quantum data, called quantum geometric mean metric learning, for weakly supervised learning and anomaly detection. The subroutines are also useful for estimating geometric Rényi relative entropies and the Uhlmann fidelity, in particular achieving optimal dependence on precision for the Uhlmann and Matsumoto fidelities. Finally, we provide a BQP-complete problem based on matrix geometric means that can be solved by our subroutines.
Rajan Das Gupta, Md. Tanzib Hosain, M. F. Mridha et al.
LLM chatbot interfaces allow students to get instant, interactive assistance with homework, but doing so carelessly may not advance educational objectives. In this study, an interactive homework help system based on DeepSeek R1 is developed and first implemented for students enrolled in a large computer science beginning programming course. In addition to an assist button in a well-known code editor, our assistant also has a feedback option in our command-line automatic evaluator. It wraps student work in a personalized prompt that advances our educational objectives without offering answers straight away. We have discovered that our assistant can recognize students' conceptual difficulties and provide ideas, plans, and template code in pedagogically appropriate ways. However, among other mistakes, it occasionally incorrectly labels the correct student code as incorrect or encourages students to use correct-but-lesson-inappropriate approaches, which can lead to long and frustrating journeys for the students. After discussing many development and deployment issues, we provide our conclusions and future actions.
Alexis Saurin
This EPTCS volume contains the post-proceedings of the Twelfth International Workshop on Fixed Points in Computer Science, presenting a selection of the works presented during the workshop that took place in Naples (Italy) on the 19th and 20th of February 2024 as a satellite of the International Conference on Computer Science Logic (CSL 2024).
Mauve Science Collaboration, Marcel Agueros, Don Dixon et al.
Mauve is a low-cost small satellite developed and operated by Blue Skies Space Ltd. The payload features a 13 cm telescope connected with a fibre that feeds into a UV-Vis spectrometer. The detector covers the 200-700 nm range in a single shot, obtaining low resolution spectra at R~20-65. Mauve has launched on 28th November 2025, reaching a 510 km Low-Earth Sun-synchronous orbit. The satellite will enable UV and visible observations of a variety of stellar objects in our Galaxy, filling the gaps in the ultraviolet space-based data. The researchers that have already joined the mission have defined the science themes, observational strategy and targets that Mauve will observe in the first year of operations. To date 10 science themes have been developed by the Mauve science collaboration for year 1, with observational strategies that include both long duration monitoring and short cadence snapshots. Here, we describe these themes and the science that Mauve will undertake in its first year of operations.
Li Yizhan, Dong Lu, Fan Xiaoxiao et al.
Research data infrastructures form the cornerstone in both cyber and physical spaces, driving the progression of the data-intensive scientific research paradigm. This opinion paper presents an overview of global research data infrastructure, drawing insights from national roadmaps and strategic documents related to research data infrastructure. It emphasizes the pivotal role of research data infrastructures by delineating four new missions aimed at positioning them at the core of the current scientific research and communication ecosystem. The four new missions of research data infrastructures are: (1) as a pioneer, to transcend the disciplinary border and address complex, cutting-edge scientific and social challenges with problem- and data-oriented insights; (2) as an architect, to establish a digital, intelligent, flexible research and knowledge services environment; (3) as a platform, to foster the high-end academic communication; (4) as a coordinator, to balance scientific openness with ethics needs.
Zhenyu Wang, Dequan Wang, Yi Xu et al.
The recent wave of artificial intelligence, epitomized by large language models (LLMs),has presented opportunities and challenges for methodological innovation in political science,sparking discussions on a potential paradigm shift in the social sciences. However, how can weunderstand the impact of LLMs on knowledge production and paradigm transformation in thesocial sciences from a comprehensive perspective that integrates technology and methodology? What are LLMs' specific applications and representative innovative methods in political scienceresearch? These questions, particularly from a practical methodological standpoint, remainunderexplored. This paper proposes the "Intelligent Computing Social Modeling" (ICSM) methodto address these issues by clarifying the critical mechanisms of LLMs. ICSM leverages thestrengths of LLMs in idea synthesis and action simulation, advancing intellectual exploration inpolitical science through "simulated social construction" and "simulation validation." Bysimulating the U.S. presidential election, this study empirically demonstrates the operationalpathways and methodological advantages of ICSM. By integrating traditional social scienceparadigms, ICSM not only enhances the quantitative paradigm's capability to apply big data toassess the impact of factors but also provides qualitative paradigms with evidence for socialmechanism discovery at the individual level, offering a powerful tool that balances interpretabilityand predictability in social science research. The findings suggest that LLMs will drivemethodological innovation in political science through integration and improvement rather thandirect substitution.
Jiehua Chen, Christian Hatschka, Sofia Simola
We survey two key problems-Multi-Winner Determination and Hedonic Games in Computational Social Choice, with a special focus on their parameterized complexity, and propose some research challenges in the field.
C. Christ, M. Schouten, M. Blankers et al.
Background Anxiety and depressive disorders are prevalent in adolescents and young adults. However, most young people with mental health problems do not receive treatment. Computerized cognitive behavior therapy (cCBT) may provide an accessible alternative to face-to-face treatment, but the evidence base in young people is limited. Objective The objective was to perform an up-to-date comprehensive systematic review and meta-analysis of the effectiveness of cCBT in treating anxiety and depression in adolescents and young adults compared with active treatment and passive controls. We aimed to examine posttreatment and follow-up effects and explore the moderators of treatment effects. Methods We conducted systematic searches in the following six electronic databases: PubMed, EMBASE, PsycINFO, CINAHL, Web of Science, and Cochrane Central Register of Controlled Trials. We included randomized controlled trials comparing cCBT with any control group in adolescents or young adults (age 12-25 years) with anxiety or depressive symptoms. The quality of included studies was assessed using the Cochrane risk-of-bias tool for randomized trials, version 2.0. Overall quality of evidence for each outcome was assessed using the Grading of Recommendations Assessment, Development and Evaluation (GRADE) approach. Posttreatment means and SDs were compared between intervention and control groups, and pooled effect sizes (Hedges g) were calculated. Random-effects meta-analyses were conducted using Comprehensive Meta-Analysis software. Subgroup analyses and meta-regression analyses were conducted to explore whether age, guidance level, and adherence rate were associated with treatment outcome. Results The search identified 7670 papers, of which 24 studies met the inclusion criteria. Most included studies (22/24) had a high risk of bias owing to self-report measures and/or inappropriate handling of missing data. Compared with passive controls, cCBT yielded small to medium posttreatment pooled effect sizes regarding depressive symptoms (g=0.51, 95% CI 0.30-0.72, number needed to treat [NNT]=3.55) and anxiety symptoms (g=0.44, 95% CI 0.23-0.65, NNT=4.10). cCBT yielded effects similar to those of active treatment controls regarding anxiety symptoms (g=0.04, 95% CI −0.23 to 0.31). For depressive symptoms, the nonsignificant pooled effect size favored active treatment controls (g=−0.70, 95% CI −1.51 to 0.11, P=.09), but heterogeneity was very high (I2=90.63%). No moderators of treatment effects were identified. At long-term follow-up, cCBT yielded a small pooled effect size regarding depressive symptoms compared with passive controls (g=0.27, 95% CI 0.09-0.45, NNT=6.58). No other follow-up effects were found; however, power was limited owing to the small number of studies. Conclusions cCBT is beneficial for reducing posttreatment anxiety and depressive symptoms in adolescents and young adults compared with passive controls. Compared with active treatment controls, cCBT yielded similar effects regarding anxiety symptoms. Regarding depressive symptoms, however, the results remain unclear. More high-quality research involving active controls and long-term follow-up assessments is needed in this population. Trial Registration PROSPERO CRD42019119725; https://tinyurl.com/y5acfgd9.
Xin Zhang, Pingping Wei, Qingling Wang
Anomaly detection of high-dimensional data is a challenge because the sparsity of the data distribution caused by high dimensionality hardly provides rich information distinguishing anomalous instances from normal instances. To address this, this article proposes an anomaly detection method combining an autoencoder and a sparse weighted least squares-support vector machine. First, the autoencoder is used to extract those low-dimensional features of high-dimensional data, thus reducing the dimension and the complexity of the searching space. Then, in the low-dimensional feature space obtained by the autoencoder, the sparse weighted least squares-support vector machine separates anomalous and normal features. Finally, the learned class labels to be used to distinguish normal instances and abnormal instances are outputed, thus achieving anomaly detection of high-dimensional data. The experiment results on real high-dimensional datasets show that the proposed method wins over competing methods in terms of anomaly detection ability. For high-dimensional data, using deep methods can reconstruct the layered feature space, which is beneficial for gaining those advanced anomaly detection results.
Marvin Wyrich, Stefan Wagner
Science communication forms the bridge between computer science researchers and their target audience. Researchers who can effectively draw attention to their research findings and communicate them comprehensibly not only help their target audience to actually learn something, but also benefit themselves from the increased visibility of their work and person. However, the necessary skills for good science communication must also be taught, and this has so far been neglected in the field of software engineering education. We therefore designed and implemented a science communication seminar for bachelor students of computer science curricula. Students take the position of a researcher who, shortly after publication, is faced with having to draw attention to the paper and effectively communicate the contents of the paper to one or more target audiences. Based on this scenario, each student develops a communication strategy for an already published software engineering research paper and tests the resulting ideas with the other seminar participants. We explain our design decisions for the seminar, and combine our experiences with responses to a participant survey into lessons learned. With this experience report, we intend to motivate and enable other lecturers to offer a similar seminar at their university. Collectively, university lecturers can prepare the next generation of computer science researchers to not only be experts in their field, but also to communicate research findings more effectively.
Halaman 9 dari 902540