The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
With the rapid expansion of interactions across various domains such as knowledge graphs and social networks, anomaly detection in dynamic graphs has become increasingly critical for mitigating potential risks. Howeve...
详细信息
Despite the effectiveness of vision-language supervised fine-tuning in enhancing the performance of vision large language models(VLLMs), existing visual instruction tuning datasets include the following limitations.(1...
详细信息
Despite the effectiveness of vision-language supervised fine-tuning in enhancing the performance of vision large language models(VLLMs), existing visual instruction tuning datasets include the following limitations.(1) Instruction annotation quality: despite existing VLLMs exhibiting strong performance,instructions generated by those advanced VLLMs may still suffer from inaccuracies, such as hallucinations.(2) Instructions and image diversity: the limited range of instruction types and the lack of diversity in image data may impact the model's ability to generate diversified and closer to real-world scenarios outputs. To address these challenges, we construct a high-quality, diverse visual instruction tuning dataset MMInstruct,which consists of 973k instructions from 24 domains. There are four instruction types: judgment, multiplechoice, long visual question answering, and short visual question answering. To construct MMInstruct, we propose an instruction generation data engine that leverages GPT-4V, GPT-3.5, and manual correction. Our instruction generation engine enables semi-automatic, low-cost, and multi-domain instruction generation at 1/6 the cost of manual construction. Through extensive experiment validation and ablation experiments,we demonstrate that MMInstruct could significantly improve the performance of VLLMs, e.g., the model fine-tuning on MMInstruct achieves new state-of-the-art performance on 10 out of 12 benchmarks. The code and data shall be available at https://***/yuecao0119/MMInstruct.
This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne...
详细信息
In recent times, AI and UAV have progressed significantly in several applications. This article analyzes applications of UAV with modern green computing in various sectors. It addresses cutting-edge technologies such ...
详细信息
The process of modifying digital images has been made significantly easier by the availability of several image editing software. However, in a variety of contexts, including journalism, judicial processes, and histor...
详细信息
As a frontier technology,holography has important research values in fields such as bio-micrographic imaging,light feld modulation and data ***,the real-time acquisition of 3D scenes and high-fidelity reconstruction t...
详细信息
As a frontier technology,holography has important research values in fields such as bio-micrographic imaging,light feld modulation and data ***,the real-time acquisition of 3D scenes and high-fidelity reconstruction technology has not yet made a breakthrough,which has seriously hindered the development of ***,a novel holographic camera is proposed to solve the above inherent problems *** proposed holographic camera consists of the acquisition end and the calculation *** the acquisition end of the holographic camera,specially configured liquid materials and liquid lens structure based on voice-coil motor-driving are used to produce the liquid camera,so that the liquid camera can quickly capture the focus stack of the real 3D scene within 15 *** the calculation end,a new structured focus stack network(FS-Net)is designed for hologram *** training the FS-Net with the focus stack renderer and learnable Zernike phase,it enables hologram calculation within 13 *** the first device to achieve real-time incoherent acquisition and high-fidelity holographic reconstruction of a real 3D scene,our proposed holographic camera breaks technical bottlenecks of difficulty in acquiring the real 3D scene,low quality of the holographic reconstructed image,and incorrect defocus *** experimental results demonstrate the effectiveness of our holographic camera in the acquisition of focal plane information and hologram calculation of the real 3D *** proposed holographic camera opens up a new way for the application of holography in fields such as 3D display,light field modulation,and 3D measurement.
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb...
详细信息
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb-Se-Te(GSST)rely on melt-quench and high temperature annealing processes to change the organization of the molecules in the materials’*** a reorganization leads to different optical,electrical,and thermal properties which can be exploited to implement photonic memory cells that are able to store the data at different resistance or optical transmission *** the great promise of conventional PCMs for realizing reconfigurable photonic memories,their slow and extremely power-hungry thermal mechanisms make scaling the systems based on such devices *** addition,such materials do not offer a stable multi-level response over a long period of *** address these shortcomings,the research carried out in this study shows the proof of concept to implement next-generation photonic memory cells based on two-dimensional(2D)birefringence PCMs such as SnSe,which offer anisotropic optical properties that can be switched *** demonstrate that by leveraging the ultrafast and low-power crystallographic direction change of the material,the optical polarization state of the input optical signal can be *** enables the implementation of next-generation high-speed polarization-encodable photonic memory cells for future photonic computing *** to the conventional PCMs,the proposed SnSe-based photonic memory cells offer an ultrafast switching and low-loss optical response relying on ferroelectric property of SnSe to encode the data on the polarization state of the input optical *** a polarization encoding scheme also reduces memory read-out errors and alleviates the scalability limitations due to the optical insertion loss often seen in optical transmission encoding.
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
暂无评论