The outsourcing of semiconductor manufacturing raises security risks, such as piracy and overproduction of hardware intellectual property. To overcome this challenge, logic locking has emerged to lock a given circuit ...
详细信息
Big climate change data have become a pressing issue that organizations face with methods to analyze data generated from various data types. Moreover, storage, processing, and analysis of data generated from climate c...
详细信息
Plants encounter a variety of beneficial and harmful insects during their growth *** identification(i.e.,detecting insects'presence)and classification(i.e.,determining the type or class)of these insect species is ...
详细信息
Plants encounter a variety of beneficial and harmful insects during their growth *** identification(i.e.,detecting insects'presence)and classification(i.e.,determining the type or class)of these insect species is critical for implementing prompt and suitable mitigation *** timely actions carry substantial economic and environmental *** learning-based approaches have produced models with good insect classification *** aim to implement identification and classification models in agriculture,facing challenges when input images markedly deviate from the training distribution(e.g.,images like vehicles,humans,or a blurred image or insect class that is not yet trained on).
Event classification is a critical task to ensure the reliability of the power system. Recent developments in event classification methods leverage data-driven techniques with fine-grained Phasor Measurement Units (PM...
详细信息
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple...
详细信息
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users,and even return the top-k most relevant search results when *** refer to a model that satisfies all of the conditions a 3-multi ranked search ***,SE schemes that have been proposed to date use fully trusted trapdoor generation centers,and several methods assume a secure connection between the data users and a trapdoor generation *** is,they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords,but it will never attempt to use it in any other manner than that requested,which is impractical in real *** this study,to enhance the security,we propose a new 3-multi ranked SE scheme that satisfies all conditions without these security *** proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center,thereby preventing attackers from determining whether two different queries include the same ***,we develop a method for managing multiple encrypted keywords from every data owner,each encrypted with a different *** evaluation demonstrates that,despite the trade-off overhead that results from the weaker security assumption,the proposed scheme achieves reasonable performance compared to extant schemes,which implies that our scheme is practical and closest to real life.
Roads are an important part of transporting goods and products from one place to another. In developing countries, the main challenge is to maintain road conditions regularly. Roads can deteriorate from time to time. ...
详细信息
The Slingshot interconnect designed by HPE/Cray is becoming more relevant in high-performance computing with its deployment on the upcoming exascale *** particular,it is the interconnect empowering the first exascale ...
详细信息
The Slingshot interconnect designed by HPE/Cray is becoming more relevant in high-performance computing with its deployment on the upcoming exascale *** particular,it is the interconnect empowering the first exascale and highest-ranked supercomputer in the world,*** offers various features such as adaptive routing,congestion control,and isolated *** deployment of newer interconnects sparks interest related to performance,scalability,and any potential bottlenecks as they are critical elements contributing to the scalability across nodes on these *** this paper,we delve into the challenges the Slingshot interconnect poses with current state-of-the-art MPI(message passing interface)*** particular,we look at the scalability performance when using Slingshot across *** present a comprehensive evaluation using various MPI and communication libraries including Cray MPICH,Open-MPI+UCX,RCCL,and MVAPICH2 on CPUs and GPUs on the Spock system,an early access cluster deployed with Slingshot-10,AMD MI100 GPUs and AMD Epyc Rome CPUs to emulate the Frontier *** also evaluate preliminary CPU-based support of MPI libraries on the Slingshot-11 interconnect.
The transformation of age-old farming practices through the integration of digitization and automation has sparked a revolution in agriculture that is driven by cutting-edge computer vision and artificial intelligence...
详细信息
The transformation of age-old farming practices through the integration of digitization and automation has sparked a revolution in agriculture that is driven by cutting-edge computer vision and artificial intelligence(AI)*** transformation not only promises increased productivity and economic growth,but also has the potential to address important global issues such as food security and *** survey paper aims to provide a holistic understanding of the integration of vision-based intelligent systems in various aspects of precision *** providing a detailed discussion on key areas of digital life cycle of crops,this survey contributes to a deeper understanding of the complexities associated with the implementation of vision-guided intelligent systems in challenging agricultural *** focus of this survey is to explore widely used imaging and image analysis techniques being utilized for precision farming *** paper first discusses various salient crop metrics used in digital *** this paper illustrates the usage of imaging and computer vision techniques in various phases of digital life cycle of crops in precision agriculture,such as image acquisition,image stitching and photogrammetry,image analysis,decision making,treatment,and *** establishing a thorough understanding of related terms and techniques involved in the implementation of vision-based intelligent systems for precision agriculture,the survey concludes by outlining the challenges associated with implementing generalized computer vision models for real-time deployment of fully autonomous farms.
Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination,hindering accurate three-dimensional lesion reconstruction by surgical *** study prop...
详细信息
Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination,hindering accurate three-dimensional lesion reconstruction by surgical *** study proposes a novel end-to-end disparity estimation model to address these *** approach combines a Pseudo-Siamese neural network architecture with pyramid dilated convolutions,integrating multi-scale image information to enhance robustness against lighting *** study introduces a Pseudo-Siamese structure-based disparity regression model that simplifies left-right image comparison,improving accuracy and *** model was evaluated using a dataset of stereo endoscopic videos captured by the Da Vinci surgical robot,comprising simulated silicone heart sequences and real heart video *** results demonstrate significant improvement in the network’s resistance to lighting interference without substantially increasing ***,the model exhibited faster convergence during training,contributing to overall performance *** study advances endoscopic image processing accuracy and has potential implications for surgical robot applications in complex environments.
In this paper, we consider a K-user interference channel where interference among the users is neither too strong nor too weak, a scenario that is relatively underexplored in the literature. We propose a novel deep le...
详细信息
暂无评论