To address the challenge of high computational complexity in determining the cryptographic characteristics of S-boxes created through genetic algorithms, a novel method for S-box design is introduced that incorporates...
详细信息
The proceedings contain 38 papers. The topics discussed include: dynamic capacity management circuits for memory subsystems;a storage efficient unified telemetry method for flying ad-hoc network;empowering multimodal ...
ISBN:
(纸本)9798400710193
The proceedings contain 38 papers. The topics discussed include: dynamic capacity management circuits for memory subsystems;a storage efficient unified telemetry method for flying ad-hoc network;empowering multimodal large language models for solving cognitive puzzles;design and implementation of pin-like instrumentation tools for the LoongArch;efficient resource allocation in femtocell networks: distributed power and channel control;prostate medical image segmentation based on federal learning DUnet network;Bayesian experts recommendation in CQA: leveraging aptitude, tag-based profiling, and social graph modeling;peak-shave scheduling for multi-source power generation system, considering pumped hydro storage and electrochemical storage systems;and a retrieval-augmented generation framework for electric power industry question answering.
Traffic congestion is one of the most pressing issues faced by people in urban areas today. Every day, countless individuals spend valuable time stuck in long traffic jams, contributing to frustration and inefficiency...
详细信息
The proceedings contain 172 papers. The topics discussed include: augmented reality in education: enhancing learning experiences;vision-based hand gesture recognition system for assistive communication using neural ne...
ISBN:
(纸本)9798331530389
The proceedings contain 172 papers. The topics discussed include: augmented reality in education: enhancing learning experiences;vision-based hand gesture recognition system for assistive communication using neural networks and GSM integration;advancing techniques for deepfake detection and evaluation: challenges and innovations;continual learning techniques to reduce forgetting: a comparative study;adaptive fuzzy logic framework for threat detection in distributed honeypot systems leveraging blockchain technology;decentralizing cybersecurity: a dynamic distributed honeypot system leveraging blockchain technology;skin lesion prediction and classification using deep learning methods;statistical analysis of social media and e-commerce data to get insights on consumer behavior;and analyzing the historical data and trends in stock market using machine learning.
HEMT devices have potential to handle the fast processing in applications such as real-time diagnostics utilizing the artificial-intelligence (AI) enhanced abilities. Along-with this HEMT devices can be extensively us...
详细信息
With the advancement of technologies, different methods are currently being used for converting spoken language into text. These systems offer a hands-free alternative to traditional input methods, especially for indi...
详细信息
This paper explores the application of vision-based hand gesture recognition in addressing communication challenges faced by deaf and dumb individuals within the realm of human-computer interaction (HCI). Highlighting...
详细信息
In order to solve the problem of independence and cannot linkage between the traditional dispatching telephone and dispatching control system, better meet the uploading and issuing of dispatching instructions, as well...
详细信息
暂无评论