In this paper, we study the performance of few-shot learning, specifically meta learning empowered few-shot relation networks, over supervised deep learning and conventional machine learning approaches in the problem ...
详细信息
For a given polygonal region P, the Lawn Mowing Problem (LMP) asks for a shortest tour T that gets within Euclidean distance 1/2 of every point in P;this is equivalent to computing a shortest tour for a unit-diameter ...
详细信息
Communication is one of the fields that adopts quantum characteristics to improve its potential. In particular, quantum teleportation (QT) is considered a fundamental tool for enabling quantum networks. This paper foc...
详细信息
This paper explores the application of a zero-shot lunar crater detection method based on the Segment Anything Model (SAM) for high-resolution Digital Terrain Model (DTM) images from ISRO's Chandrayaan-II mission....
详细信息
This study focuses on designing of lead-free double perovskite solar cells (DPSCs). Lead-free organic–inorganic DPSCs have achieved very good efficiency within a short period of active research. Formamidinium based d...
详细信息
The existing method of using large pre-trained models with prompts for zero-shot text classification possesses powerful representation ability and scalability. However, its commercial availability is relatively limite...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
Dear Editor, This letter focuses on the finite-time synchronization(FTS) of neutral-type complex networks with intermittent couplings. Different from most of the existing references concerning neutral-type systems,a d...
详细信息
Dear Editor, This letter focuses on the finite-time synchronization(FTS) of neutral-type complex networks with intermittent couplings. Different from most of the existing references concerning neutral-type systems,a delay-independent dynamical event-triggering controller is considered, operating the same way as the intermittent coupling and excluding the Zeno behavior naturally.
Recent research in quantum computing has gained significant momentum, promising transformative advances across various fields, including artificial intelligence (AI). This paper focuses on quantum reinforcement learni...
详细信息
暂无评论