Efficient job scheduling and resource management contributes towards system throughput and efficiency maximization in high-performance computing (HPC) systems. In this paper, we introduce a scalable job scheduling and...
详细信息
The Dammann Grating (DG), a binary phase grating, efficiently divides incident light into equal-intensity sub-beams, making it ideal for beam splitting applications. In this research, an array-pumped, microchip Nd:YVO...
详细信息
Advancements in quantum computer hardware and software have paved the way for the application of quantum computing across various fields. With the development of computers with thousands of qubits, the power of quantu...
详细信息
With the announcement of the most advanced silicon spin quantum-bit (qubit) chip by Intel, silicon-based quantum circuit manufacturing technology has shown the superior potential to realize quantum computing to other ...
详细信息
Federated Learning (FL) is a learning paradigm which constructs machine learning models using decentralized datasets, with the goal of training a globally optimized model while preserving data privacy. In practice, an...
详细信息
In this work, initially a rectangular microstrip patch antenna measuring (94.8 × 110 × 10) μm3 with a polyamide substrate has been analyzed and developed. The antenna has a bandwidth of 170 GHz (1.98 - 2.15...
详细信息
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major *** medicine adopts the most advanced IoT technology to realize the interaction between patients and peo...
详细信息
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major *** medicine adopts the most advanced IoT technology to realize the interaction between patients and people,medical institutions,andmedical ***,with the openness of network transmission,the security and privacy of information transmission have become a major ***,Masud et *** a lightweight anonymous user authentication protocol for IoT medical treatment,claiming that their method can resist various ***,through analysis of the protocol,we observed that their protocol cannot effectively resist privileged internal attacks,sensor node capture attacks,and stolen authentication attacks,and their protocol does not have perfect forward ***,we propose a new protocol to resolve the security vulnerabilities in Masud’s protocol and remove some redundant parameters,so as tomake the protocolmore compact and *** addition,we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols.
Robust classification methods predominantly concen-trate on algorithms that address a specific threat model, resulting in ineffective defenses against other threat models. Real-world applications are exposed to this v...
详细信息
This paper presents a high gain, compact size and dual band rectangular patch antenna for 5G applications. To enhance the gain of antenna, an equilateral triangle slots on the upper rectangular patch are constructed. ...
详细信息
Object detection, while being a key step in many applications, has remained challenging, mainly due to the different resolutions of objects in an image. On the other hand, Super-Resolution (SR) approaches have recentl...
详细信息
暂无评论