Large Language Models (LLMs) are being employed by end-users for various tasks, including sensitive ones such as health counseling, disregarding potential safety concerns. It is thus necessary to understand how adequa...
详细信息
In the era of evolving artificial intelligence, machines are increasingly emulating human-like capabilities, including visual perception and linguistic expression. Image captioning stands at the intersection of these ...
详细信息
Let γCD(H) denote the corona domination number (CD-number) of the graph H. The idea of CD-number was first coined by G. Mahadevan et al. in 2021. The CD-number of a graph is the minimum cardinality of a dominating se...
详细信息
Named Entity Recognition in low resource languages such as Arabic is relatively less accurate. Despite this, many applications attempt query-document matching, which necessitates entity resolution. We explore certain ...
详细信息
In this paper, we develop a Discontinuous Galerkin Generalized Multiscale Finite Element Method (DG-GMsFEM) for solving dual continuum transport problems in perforated domains. The mathematical model includes the conv...
详细信息
Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology *** combination of different innovative topics of information security and high-spee...
详细信息
Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology *** combination of different innovative topics of information security and high-speed computing has added new visions into the behavior of complex nonlinear dynamical systems which uncovered amazing results even in the least difficult *** generation of complex actions froma very simple dynamical method has a strong relation with information *** protection of digital content is one of the inescapable concerns of the digitally advanced ***,information plays an important role in everyday life and affects the surroundings *** digital contents consist of text,images,audio,and videos,*** to the vast usage of digital images in the number of social and web applications,its security is one of the biggest *** this work,we have offered an innovative image encryption technique based on present criteria of confusion and *** designed scheme comprises two major nonlinear dynamical *** have employed discrete fractional chaotic iterative maps to add confusion capability in our suggested algorithm and continuous chaotic Lorenz *** have verified our offered scheme by using statistical *** investigations under the statistical tests suggested that our proposed technique is quite reasonable for the security of digital data.
How well can we approximate a quantum channel output state using a random codebook with a certain size? In this work, we study the quantum soft covering problem, which uses a pairwise-independent random codebook to ap...
详细信息
A triple-delta wing configuration in transonic conditions has been investigated numerically with focus to the leading-edge vortices at sideslip flow. Two primary vortices occur in correspondence with the two wing swee...
详细信息
In this study, I compute the static dipole polarizability of main-group elements using the finite-field method combined with relativistic coupled-cluster and configuration-interaction simulations. The computational re...
详细信息
In this study, I compute the static dipole polarizability of main-group elements using the finite-field method combined with relativistic coupled-cluster and configuration-interaction simulations. The computational results closely align with the values recommended in the 2018 Table of static dipole polarizabilities of neutral elements [Mol. Phys. 117, 1200 (2019)]. Additionally, I investigate the influence of relativistic effects and electron correlation on atomic dipole polarizabilities. Specifically, three types of relativistic effects impacting dipole polarizabilities are studied: scalar-relativistic, spin-orbit coupling, and fully relativistic Dirac-Coulomb effects. The results indicate that scalar-relativistic effects are predominant for atoms in groups 1 and 2, with minimal influence from spin-orbit coupling effects. Conversely, for elements in groups 13–18, scalar-relativistic effects are less significant, while spin-orbit coupling significantly affects elements starting from the fourth row in groups 13 and 14 and from the fifth row in groups 15–18. In each category of relativistic effects, the impact of electron correlation is evaluated. The results show that electron correlation significantly influences dipole polarizability calculations, particularly for atoms from groups 1, 2, 13, and 14, but is less significant for atoms from groups 15–18. This study provides a comprehensive and consistent data set of dipole polarizabilities and contributes to a systematic understanding of the roles of relativistic and electron-correlation effects in atomic dipole polarizabilities, serving as a valuable reference for future research.
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
暂无评论