Transmission lines, devices employed for the transmission of electrical signals, can be used for the approximation of non-linear partial differential equations (PDEs) also in the nonlinear case. To this end, transmiss...
详细信息
This paper is an extension of the practical application of computer vision and machine learning in monitoring student performance with the help of nonverbal communication, body language, and facial expressions analysi...
详细信息
Overdefined polynomial systems have the potential to lead to reduced complexity in solving procedures. In this work, we study how to overdefine the system of equations to describe the arithmetic oriented (AO) ciphers ...
详细信息
ISBN:
(纸本)9789819609406;9789819609413
Overdefined polynomial systems have the potential to lead to reduced complexity in solving procedures. In this work, we study how to overdefine the system of equations to describe the arithmetic oriented (AO) ciphers Friday, Vision, and RAIN, as well as a special system of quadratic equations over F(2)l used in the post-quantum signature scheme Biscuit. Our method is inspired by Courtois-Pieprzyk's and Murphy-Robshaw's methods to model AES with overdefined systems of quadratic equations over F-2 and F(2)8, respectively. However, our method is more refined and much simplified compared with Murphy-Robshaw's method, since it can take full advantage of the low-degree F-2-linearized affine polynomials used in Friday and Vision, and the overdefined system of equations over F(2)l can be described in a clean way with our method. For RAIN, we instead consider quadratic Boolean equations rather than equations over large finite fields F(2)l. Specifically, we demonstrate that the special structure of RAIN allows us to set up much more linearly independent quadratic Boolean equations than those obtained only with Courtois-Pieprzyk's method. Moreover, we further demonstrate that the underlying key-recovery problem in Biscuit (NIST PQC Round 1 Additional Signatures) can also be described by solving a much overdefined system of quadratic equations over F(2)l. On the downside, the constructed systems of quadratic equations for these ciphers cannot be viewed as semi-regular, which makes it challenging to upper bound the complexity of the Grobner basis attack. However, such a new modelling method can significantly improve the lower bound of the complexity of the Grobner basis attacks on these ciphers, i.e., we view the complexity of solving a random system of quadratic equations of the same scale as the lower bound. How to better estimate the upper and lower bounds of the Grobner basis attacks on these ciphers based on our modelling method is left as an open problem.
This study proposes an innovative algorithm based on DCNN and multi-channel image fusion, aiming to improve the quality and efficiency of virtual scene image generation. The algorithm extracts depth information and te...
详细信息
With the close connection between economic growth and electricity demand, how to predict the economic development trend through electricity data has become a key issue in power system planning. Therefore, this study p...
详细信息
applications of the Internet of Things (IoT) face challenges related to interoperability and heterogeneity due to variations in data representation formats and the absence of connectivity standards across wireless net...
详细信息
In this paper, application-based solution implemented for smart irrigation system using IoT and sensors. The proposed model provides a prediction of the user's time before which plant must need spraying, to compar...
详细信息
In view of the problem that TCM diagnosis and treatment data are complex, diverse and lack unified standards, this paper introduced computer information technology, combined with NLP and LSTM models, to improve the in...
详细信息
ISBN:
(纸本)9783031882869
In view of the problem that TCM diagnosis and treatment data are complex, diverse and lack unified standards, this paper introduced computer information technology, combined with NLP and LSTM models, to improve the intelligent analysis ability of TCM diagnosis and treatment data, and provide scientific support for clinicians through an auxiliary decision-making system, thereby improving the efficiency and accuracy of diagnosis and treatment. First, this paper collected and integrated a large amount of medical records, treatment records, prescription information and other data from different TCM diagnosis and treatment platforms and medical institutions, standardizes data in different formats, and used natural language processing (NLP) technology for semantic analysis and data cleaning. Then, it built a classification and prediction model based on LSTM (Long Short Time Memory) to realize intelligent diagnosis and treatment recommendation generation for common diseases in view of the complex symptoms and individual differences unique to TCM diagnosis and treatment. Finally, based on the previous analysis and model results, an auxiliary decision system was developed to provide doctors with auxiliary decision suggestions in the treatment of complex symptoms and medication regimen recommendations during the diagnosis and treatment process. The results showed that after the use of the intelligent auxiliary decision system, the diagnosis and treatment time reduction rate was between 21.8% and 23.0%, and the accuracy rate reached 88.0%. Compared with traditional manual analysis methods, the efficiency of TCM diagnosis and treatment data processing has been significantly improved after the application of computer information technology. The introduction of computer information technology provides a new solution for the intelligent analysis and decision-making support of TCM diagnosis and treatment data, effectively solving the problems of complex, heterogeneous and insuffici
This project meets the current important demand for the constant monitoring of environmental conditions because climate change and human activities affect ecosystems. Temperature and humidity are measured using the DH...
详细信息
The integrated automated safety monitoring system for construction sites utilizes RFID, Wi-Fi, and vision-based recognition systems to enhance worker safety and ensure adherence to safety regulations. This system comb...
详细信息
暂无评论