Calculating the permutation distance, which is the number of steps needed to transform a permutation to another under a particular operation, is of great value in many areas like genetics, interconnection networks, ga...
详细信息
Human speech contains not only the information of characters and symbols, but also the information of people's feelings and emotions. The purpose of emotional computing is to endow computers with the ability to ob...
详细信息
The system of two coupled optical dual-mode waveguides is considered. The coupling of the system is studied to find a circuit for building a control switch for two qubit gates. The classical coupled mode theory is app...
详细信息
The linear dynamic bending- and torsion vibrations of a simply supported Bernoulli-Euler beam under a moving load with constant velocity are analysed. The main target is to derive an analytical solution of the governi...
详细信息
With the rapid development and modernization requirement of global coal industry, there is an emerging need for intelligent and unmanned mining systems. In this paper, the Intelligent Mining Operating System (IMOS) is...
详细信息
Technologies permeate contemporary society, and the ability to use computer science concepts in the problem-solving process is essential to everyone. This paper presents an epistemic tool of Semiotic Engineering whose...
详细信息
Current resource integrity techniques such as sub-resource integrity (SRI) do not apply to unknown content, and mitigating attacks along this vector remains an open issue. Complex interdependencies on the Internet hav...
详细信息
Dialogue agents that interact with humans in situated environments need to manage referential ambiguity across multiple modalities and ask for help as needed. However, it is not clear what kinds of questions such agen...
详细信息
Affirmative consent is the idea that someone must ask for, and earn, enthusiastic approval before interacting with someone else. For decades, feminist activists and scholars have used affirmative consent to theorize a...
详细信息
This paper extends the (n, n) - Multiple Secret Sharing (MSS) into friendlier appearance. This paper modifies the (n, n)-MSS by utilizing the Chinese Remainder Theorem (CRT) and bitwise Boolean computation. It creates...
详细信息
暂无评论