Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and...
详细信息
Continuous search problems(CSPs),which involve finding solutions within a continuous domain,frequently arise in fields such as optimization,physics,and *** discrete search problems,CSPs require navigating an uncountab...
详细信息
Continuous search problems(CSPs),which involve finding solutions within a continuous domain,frequently arise in fields such as optimization,physics,and *** discrete search problems,CSPs require navigating an uncountably infinite space,presenting unique computational *** this work,we propose a fixed-point quantum search algorithm that leverages continuous variables to address these challenges,achieving a quadratic *** by the discrete search results,we manage to establish a lower bound on the query complexity of arbitrary quantum search for CSPs,demonstrating the optimality of our *** addition,we demonstrate how to design the internal structure of the quantum search oracle for specific ***,we develop a general framework to apply this algorithm to a range of problem types,including optimization and eigenvalue problems involving continuous variables.
To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are sti...
详细信息
To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are still lacking when considering the potential for large-scale complementary metal-oxide semiconductor compatible ***,we present an experimental demonstration of a non-volatile photonic-electronic memory based on a 3-dimensional monolithic integrated ferroelectric-silicon ring *** successfully demonstrate programming and erasing the memory using both electrical and optical methods,assisted by optical-to-electrical-to-optical *** memory cell exhibits a high optical extinction ratio of 6.6 dB at a low working voltage of 5 V and an endurance of 4×10^(4) ***,the multi-level storage capability is analyzed in detail,revealing stable performance with a raw bit-error-rate smaller than 5.9×10^(−2).This ground-breaking work could be a key technology enabler for future hybrid electronic-photonic systems,targeting a wide range of applications such as photonic interconnect,high-speed data communication,and neuromorphic computing.
In this study, we comprehensively examine the potential of deep learning algorithms in the domain of medical image processing. Through a systematic analysis of existing literature, we explore the applications, methodo...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs ...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs is to extendflexibility into the self-directed,mobile,and wireless domain,in which a cluster of autonomous nodes forms a MANET routing *** Intrusion Detection System(IDS)is a tool that examines a network for mal-icious behavior/policy violations.A network monitoring system is often used to report/gather any suspicious attacks/*** IDS is a software program or hardware system that monitors network/security traffic for malicious attacks,sending out alerts whenever it detects malicious *** impact of Dynamic Source Routing(DSR)in MANETs challenging blackhole attack is investigated in this research *** Cluster Trust Adaptive Acknowledgement(CTAA)method is used to identify unauthorised and malfunctioning nodes in a MANET *** system is active and provides successful delivery of a data packet,which implements Kalman Filters(KF)to anticipate node ***,KF is used to eliminate synchronisation errors that arise during the sending and receiving *** order to provide an energy-efficient solution and to minimize network traffic,route optimization in MANET by using Multi-Objective Particle Swarm Optimization(MOPSO)technique to determine the optimal num-ber of clustered MANET along with energy dissipation in *** to the researchfindings,the proposed CTAA-MPSO achieves a Packet Delivery Ratio(PDR)of 3.3%.In MANET,the PDR of CTAA-MPSO improves CTAA-PSO by 3.5%at 30%malware.
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in Software engineering,and iTrust Electronic Health Care System.
Ever since the research in machine learning gained traction in recent years,it has been employed to address challenges in a wide variety of domains,including mechanical *** of the machine learning models are built on ...
详细信息
Ever since the research in machine learning gained traction in recent years,it has been employed to address challenges in a wide variety of domains,including mechanical *** of the machine learning models are built on the assumption of a static learning environment,but in practical situations,the data generated by the process is *** evolution of the data is termed concept *** research paper presents an approach for predictingmechanical failure in real-time using incremental learning based on the statistically calculated parameters of mechanical *** method proposed here is applicable to allmechanical devices that are susceptible to failure or operational *** proposed method in this paper is equipped with the capacity to detect the drift in data generation and *** proposed approach evaluates the machine learning and deep learning models for their efficacy in handling the errors related to industrial machines due to their dynamic *** is observed that,in the settings without concept drift in the data,methods like SVM and Random Forest performed better compared to deep neural ***,this resulted in poor sensitivity for the smallest drift in the machine data reported as a *** this perspective,DNN generated the stable drift detection method;it reported an accuracy of 84%and an AUC of 0.87 while detecting only a single drift point,indicating the stability to performbetter in detecting and adapting to new data in the drifting environments under industrial measurement settings.
Banks rely heavily on loans as a primary source of revenue;however, distinguishing deserving applicants who will reliably repay loans presents an ongoing challenge. Conventional selection processes often struggle to i...
详细信息
Smart energy systems are improving internet connectivity, enhancing cybersecurity concerns. Traditional systems use trust authentication and information security measures to protect against cyber threats. However, dis...
详细信息
This paper mainly discusses two kinds of coupled reaction-diffusion neural networks (CRNN) under topology attacks, that is, the cases with multistate couplings and with multiple spatial-diffusion couplings. On one han...
详细信息
暂无评论