The current variants of the Segment Anything Model (SAM), which include the original SAM and Medical SAM, still lack the capability to produce sufficiently accurate segmentation for medical images. In medical imaging ...
详细信息
This paper proposes a pulse-modulated controller that generates, under stationary conditions, a desired sequence of uniform and equidistant impulsive control actions from continuous measurements of the output of a smo...
详细信息
We introduce a novel scheme of quantum recursive programming, in which large unitary transformations, i.e. quantum gates, can be recursively defined using quantum case statements, which are quantum counterparts of con...
详细信息
Face anti-spoofing (FAS) and adversarial detection (FAD) have been regarded as critical technologies to ensure the safety of face recognition systems. However, due to limited practicality, complex deployment, and the ...
详细信息
Given the importance of forests and their role in maintaining the ecological balance, which directly affects the planet, the climate, and the life on this planet, this research presents the problem of forest fire moni...
详细信息
Data analysis, private protection, detecting unusual things, identifying people, and transferring data are part of the study's unique security design. The major system method is AUA. Your authentication level depe...
详细信息
ISBN:
(数字)9798350366846
ISBN:
(纸本)9798350366853
Data analysis, private protection, detecting unusual things, identifying people, and transferring data are part of the study's unique security design. The major system method is AUA. Your authentication level depends on your activity, device, and location. Context-aware Privacy uses AUA to tailor user privacy options. Encrypting AES data transfers with Secure Data Transfer (SDT) is offered. Machine learning anomaly detection (ADML) analyzes user behavior and implements security measures to uncover vulnerabilities rapidly. DPDA employs controlled noise to make it statistically tougher to identify a person while processing data to safeguard privacy. Ablation study indicates adaptive security design strategies function better together. The recommended design may be safer and easier to employ with visual models and performance testing. With this knowledge, managers may be able to create business-friendly security solutions. Finally, the framework's extensive and adaptable security models boost digital safety. It offers new privacy protection in the internet age.
We introduce a simple geometry for slow-wave structures (SWSs) in sheet-beam traveling-wave tubes (TWTs). The staggered microstrip grating SWS is a space harmonic structure with geometry and bandwidth with analogous t...
详细信息
ISBN:
(数字)9798350348705
ISBN:
(纸本)9798350348712
We introduce a simple geometry for slow-wave structures (SWSs) in sheet-beam traveling-wave tubes (TWTs). The staggered microstrip grating SWS is a space harmonic structure with geometry and bandwidth with analogous to the staggered vane SWS commonly used for sheet beam TWTs. The staggered microstrip grating TWT is designed to operate in V-band with a center frequency of 74 GHz and electron beam voltage of 20 kV.
Quantum annealers offer a promising approach to solve Quadratic Unconstrained Binary Optimization (QUBO) problems, which have a wide range of applications. However, when a user submits its QUBO problem to a third-part...
详细信息
ISBN:
(数字)9798331541378
ISBN:
(纸本)9798331541385
Quantum annealers offer a promising approach to solve Quadratic Unconstrained Binary Optimization (QUBO) problems, which have a wide range of applications. However, when a user submits its QUBO problem to a third-party quantum annealer, the problem itself may disclose the user's private information to the quantum annealing service provider. To mitigate this risk, we introduce a privacy-preserving QUBO framework and propose a novel solution method. Our approach employs a combination of digit-wise splitting and matrix permutation to obfuscate the QUBO problem's model matrix Q, effectively concealing the matrix elements. In addition, based on the solution to the obfuscated version of the QUBO problem, we can reconstruct the solution to the original problem with high accuracy. Theoretical analysis and empirical tests confirm the efficacy and efficiency of our proposed technique, demonstrating its potential for preserving user privacy in quantum annealing services.
WebAssembly (Wasm) is a bytecode format originally serving as a compilation target for Web applications. It has recently been used increasingly on the server side, e.g., providing a safer, faster, and more portable al...
详细信息
Datalog is a popular and widely-used declarative logic programming language. Datalog engines apply many cross-rule optimizations;bugs in them can cause incorrect results. To detect such optimization bugs, we propose a...
详细信息
暂无评论