In this paper, we describe our submissions for the Similar Language Translation Shared Task 2021. We built 3 systems in each direction for the Tamil - Telugu language pair. this paper outlines experiments with various...
详细信息
In this paper, the causal relationship between verb nodes in knowledge graph is determined according to the verb nodes and the sentences in which they are located. For the operation of paying attention to the whole se...
详细信息
ISBN:
(纸本)9798400709098
In this paper, the causal relationship between verb nodes in knowledge graph is determined according to the verb nodes and the sentences in which they are located. For the operation of paying attention to the whole sentence, the verb is not studied specifically, which is disadvantageous to the judgment of causality. therefore, this paper proposes an advanced attention method based on attention mechanism to judge the causality of knowledge graph. It can not only focus on the extraction of verb related information, but also learn the whole sentence features. the experiment verifies the method, and the results show that the method in this paper has advantages.
We conduct a comprehensive analysis of Channel-based Key Extraction across various frequency ranges that have potential applications in the 6th generation mobile standard. Specifically, we examine the minimum distance...
We conduct a comprehensive analysis of Channel-based Key Extraction across various frequency ranges that have potential applications in the 6th generation mobile standard. Specifically, we examine the minimum distance required between an attacker and a legitimate entity to achieve secure key generation through channel measurement. By simulating various metrics across diverse configurations, we observe that in our generic model, the required distance for an attacker to attain sufficient channel correlation reduces as frequency increases. Consequently, an attacker must be within close proximity, mere centimeters away, from a legitimate node to acquire relevant information necessary for generating a potentially identical key.
Flexibility and in-flight reconfigurability offered by digital processing have become key features in today's telecom satellite payloads. In recent years, thales Alenia Space has developed several generations of o...
详细信息
ISBN:
(纸本)9781839538841
Flexibility and in-flight reconfigurability offered by digital processing have become key features in today's telecom satellite payloads. In recent years, thales Alenia Space has developed several generations of on-board digital transparent processors (DTP) by introducing the most advanced and disruptive technologies. thales Alenia Space DTPs are state-of-the-art sub-systems at the heart of payloads using analogue-to-digital (ADC) and digital-to-analogue (DAC) channelizers on their input and output RF accesses and making extensive use of digital processing to support channel routing with fine bandwidth granularity. After several payloads based on 5th generation processors, Space Inspire (INstant SPace In-orbit REconfiguration)) solution uses a 6th generation processors offering another step in flexibility through Digital Beam Forming (DBFN). this latest processor generation leverages DTP3G and 5G assets as well as in-flight heritage and provides many more features. Developped with support of CNES & DGA (French DoD), DTP6G covers Civil but also MilsatCom/GovSatCom missions thanks to high performances and small routing granularity. Its main current usecases are GEO but it is compatible with LEO to MEO orbits. Although DBFN is a key addition of DTP6G, it can still be operated with fixed-beam antennas or with an analog BFN. Another new feature is the embedded High Speed Command/Control link (HiLink) providing high TMTC throughput over several waveforms (Full CCSDS or CCSDS over DVBS2). Internal encryption is proposed (AES) but access to an external encryption unit (NSA-type) is also possible. this C&C link combined with a high-performance/large-storage-capacity processing board ensures fast operability and a high-level of observability. DTP6G processor is also ready for future implementations of a Regenerative companion, Beamhopping and Multi-user scenarios. the paper will present thales Alenia Space transparent processor roadmap leading to DTP6G, its mission coverage,
Yearly, brain tumors cause many fatalities and a significant portion of these victims come from rural regions. However, beginning brain tumor diagnosis technology is not as effective as anticipated. We thus set out to...
详细信息
HCR (Handwritten Character Recognition) is considered one of the most challenging research areas, given the vast array of potential applications. Character recognition has been the focus of research since the beginnin...
详细信息
the proceedings contain 35 papers. the topics discussed include: an innovative framework to improve course and student outcomes;data security and privacy in cloud computing focused on transportation sector withthe ai...
ISBN:
(纸本)9781665417846
the proceedings contain 35 papers. the topics discussed include: an innovative framework to improve course and student outcomes;data security and privacy in cloud computing focused on transportation sector withthe aid of block chain approach;generating product description with generative pre-trained transformer 2;threats and data trading detection methods in the dark web;prediction of forest fire using machine learning algorithms: the search for the better algorithm;predicting hypoglycaemia using classification;improving weeds identification with a repository of agricultural pre-trained deep neural networks;enhancing the security of data in cloud computing environments using remote data auditing;customer data extraction techniques based on natural language processing for e-commerce business analytics;and a review of blockchain-based batch authentication techniques for securing the internet of vehicles.
this paper proposes a deep reinforcement learning based on the warehouse environment, the mobile robot obstacle avoidance Algorithm. Firstly, the value function network is improved based on the pedestrian interaction....
详细信息
ISBN:
(数字)9798350389418
ISBN:
(纸本)9798350389425
this paper proposes a deep reinforcement learning based on the warehouse environment, the mobile robot obstacle avoidance Algorithm. Firstly, the value function network is improved based on the pedestrian interaction. We can learn to obtain the relative importance of the current state and the historical trajectory state as well as the joint impact on the robot’s obstacle avoidance strategy. Secondly, the reward function of reinforcement learning is designed based on the spatial behaviour of pedestrians, and the robot is punished for the state where the angle changes too much, so as to achieve the requirement of comfortable obstacle avoidance. Finally, the feasibility and effectiveness of the deep reinforcement learning-based mobile robot obstacle avoidance algorithm in the warehouse environment in the complex environment of the warehouse are verified through simulation experiments.
In late 2016, the US NIST announced a post-quantum cryptography open competition to select public-key cryptoalgorithms (digital signature, asymmetric encryption, and key encapsulation) suitable for use when quantum co...
详细信息
ISBN:
(纸本)9781665426053
In late 2016, the US NIST announced a post-quantum cryptography open competition to select public-key cryptoalgorithms (digital signature, asymmetric encryption, and key encapsulation) suitable for use when quantum computing is widely available. Based on the results of the 2nd round of the competition, several solutions were selected that could potentially be standardized as post-quantum cryptographic algorithms. In this article, we are looking at one of the bids based on codes. the Classic McEliece key encapsulation algorithm is a variant of the well-known (over 40 years) public key cryptosystem in codes. We investigate the various characteristics of the Classic McEliece, in particular, we provide estimates of its performance using various computing platforms and testing technologies.
Parallel versions of the reduced exhaustive search algorithm based on the Python tools are implemented to optimize chordal ring networks, which are of practical interest in the design of systems on a chip and supercom...
详细信息
暂无评论