To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are sti...
详细信息
To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are still lacking when considering the potential for large-scale complementary metal-oxide semiconductor compatible ***,we present an experimental demonstration of a non-volatile photonic-electronic memory based on a 3-dimensional monolithic integrated ferroelectric-silicon ring *** successfully demonstrate programming and erasing the memory using both electrical and optical methods,assisted by optical-to-electrical-to-optical *** memory cell exhibits a high optical extinction ratio of 6.6 dB at a low working voltage of 5 V and an endurance of 4×10^(4) ***,the multi-level storage capability is analyzed in detail,revealing stable performance with a raw bit-error-rate smaller than 5.9×10^(−2).This ground-breaking work could be a key technology enabler for future hybrid electronic-photonic systems,targeting a wide range of applications such as photonic interconnect,high-speed data communication,and neuromorphic computing.
In this study, we comprehensively examine the potential of deep learning algorithms in the domain of medical image processing. Through a systematic analysis of existing literature, we explore the applications, methodo...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs ...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs is to extendflexibility into the self-directed,mobile,and wireless domain,in which a cluster of autonomous nodes forms a MANET routing *** Intrusion Detection System(IDS)is a tool that examines a network for mal-icious behavior/policy violations.A network monitoring system is often used to report/gather any suspicious attacks/*** IDS is a software program or hardware system that monitors network/security traffic for malicious attacks,sending out alerts whenever it detects malicious *** impact of Dynamic Source Routing(DSR)in MANETs challenging blackhole attack is investigated in this research *** Cluster Trust Adaptive Acknowledgement(CTAA)method is used to identify unauthorised and malfunctioning nodes in a MANET *** system is active and provides successful delivery of a data packet,which implements Kalman Filters(KF)to anticipate node ***,KF is used to eliminate synchronisation errors that arise during the sending and receiving *** order to provide an energy-efficient solution and to minimize network traffic,route optimization in MANET by using Multi-Objective Particle Swarm Optimization(MOPSO)technique to determine the optimal num-ber of clustered MANET along with energy dissipation in *** to the researchfindings,the proposed CTAA-MPSO achieves a Packet Delivery Ratio(PDR)of 3.3%.In MANET,the PDR of CTAA-MPSO improves CTAA-PSO by 3.5%at 30%malware.
Residual networks (ResNets) have been utilized for various computer vision and image processing applications. The residual connection improves the training of the network with better gradient flow. A residual block co...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in Software engineering,and iTrust Electronic Health Care System.
Banks rely heavily on loans as a primary source of revenue;however, distinguishing deserving applicants who will reliably repay loans presents an ongoing challenge. Conventional selection processes often struggle to i...
详细信息
This paper mainly discusses two kinds of coupled reaction-diffusion neural networks (CRNN) under topology attacks, that is, the cases with multistate couplings and with multiple spatial-diffusion couplings. On one han...
详细信息
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the c...
详细信息
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the coupling strength via a unidirectional waveguide(IWG)can induce chaotic *** underlying reason for this phenomenon is that adjusting the phase and coupling strength via the phase shifter and IWG bring the system close to an exceptional point(EP),where field localization dynamically enhances the optomechanical nonlinearity,leading to the generation of chaotic *** addition,due to the sensitivity of chaos to phase in the vicinity of the EP,we propose a theoretical scheme to measure the optical phase perturbations using *** work may offer an alternative approach to chaos generation with current experimental technology and provide theoretical guidance for optical signal processing and chaotic secure communication.
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely hi...
详细信息
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by *** number of features acquired with acoustic analysis is extremely high,so we introduce a hybrid filter-wrapper feature selection algorithm based on an improved equilibrium optimizer for constructing an emotion recognition *** proposed algorithm implements multi-objective emotion recognition with the minimum number of selected features and maximum ***,we use the information gain and Fisher Score to sort the features extracted from ***,we employ a multi-objective ranking method to evaluate these features and assign different importance to *** with high rankings have a large probability of being ***,we propose a repair strategy to address the problem of duplicate solutions in multi-objective feature selection,which can improve the diversity of solutions and avoid falling into local *** random forest and K-nearest neighbor classifiers,four English speech emotion datasets are employed to test the proposed algorithm(MBEO)as well as other multi-objective emotion identification *** results illustrate that it performs well in inverted generational distance,hypervolume,Pareto solutions,and execution time,and MBEO is appropriate for high-dimensional English SER.
Indoor Navigation System (INS) supports seamless movement of objects within confined spaces in smart environments. In this paper, a novel INS that relies on ESP32-based Received Signal Strength Indication (RSSI) measu...
详细信息
暂无评论