The rapid advancement and proliferation of Cyber-Physical Systems (CPS) have led to an exponential increase in the volume of data generated continuously. Efficient classification of this streaming data is crucial for ...
详细信息
Due to the recent explosion in the amount of data being created by various social media platforms, e-commerce websites, and other businesses, a paradigm shift from on-site data centers to the cloud is required. Concer...
详细信息
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum m...
详细信息
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more *** secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS *** paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement *** this protocol,the secret sender stores the secret information using Pauli *** obtain their shares by measuring the product state ***,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum *** addition,the particles held by participants in the protocol do not contain any secret *** participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own *** the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the *** analysis indicates that the protocol is not vulnerable to retransmission interception and collusion ***,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants.
WiFi-based gait recognition technologies have seen significant advancements in recent years. However, most existing approaches rely on a critical assumption: users must walk continuously and maintain a consistent body...
详细信息
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...
详细信息
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely *** verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented *** this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly *** verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of t...
详细信息
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of the product based on the time truncated life test employing theWeibull *** control chart developed supports the examination of the mean lifespan variation for a particular product in the process of *** control limit levels are used:the warning control limit,inner control limit,and outer control ***,they enhance the capability for variation detection.A genetic algorithm can be used for optimization during the in-control process,whereby the optimal parameters can be established for the proposed control *** control chart performance is assessed using the average run length,while the influence of the model parameters upon the control chart solution is assessed via sensitivity analysis based on an orthogonal experimental design withmultiple linear regression.A comparative study was conducted based on the out-of-control average run length,in which the developed control chart offered greater sensitivity in the detection of process shifts while making use of smaller samples on average than is the case for existing control ***,to exhibit the utility of the developed control chart,this paper presents its application using simulated data with parameters drawn from the real set of data.
Spatial relations in text refer to how a geographical entity is located in space in relation to a reference *** spatial relations from text is a fundamental task in natural language *** studies have only focused on ge...
详细信息
Spatial relations in text refer to how a geographical entity is located in space in relation to a reference *** spatial relations from text is a fundamental task in natural language *** studies have only focused on generic fine-tuning methods with additional classifiers,ignoring the importance of the semantic correlation between different spatial elements and the large offset between the relation extraction task and the pre-trained *** address the above two issues,we propose a spatial relation extraction model based on Dual-view Prompt and Element Correlation(DPEC).Specifically,we first reformulate spatial relation extraction as a mask language model with a Dual-view Prompt(i.e.,Link Prompt and Confidence Prompt).Link Prompt can not only guide the model to incorporate more contextual information related to the spatial relation extraction task,but also better adapt to the original pre-training task of the language ***,Confidence Prompt can measure the confidence of candidate triplets in Link Prompt and work as a supplement to identify those easily confused examples in Link ***,we incorporate the element correlation to measure the consistency between different spatial elements,which is an effective cue for identifying the rationality of spatial *** results on the popular SpaceEval show that our DPEC significantly outperforms the SOTA baselines.
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have made progress,a common challenge is the low accuracy of existing detection *** models often struggle to reliably identify corrosion tendencies,which are crucial for minimizing industrial risks and optimizing resource *** proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network(CNN),as well as two pretrained models,namely YOLOv8 and *** leveraging advanced technologies and methodologies,we have achieved high accuracies in identifying and managing the hazards associated with corrosion across various industrial *** advancement not only supports the overarching goals of enhancing safety and efficiency,but also sets a new benchmark for future research in the *** results demonstrate a significant improvement in the ability to detect and mitigate corrosion-related concerns,providing a more accurate and comprehensive solution for industries facing these *** CNN and EfficientNetB0 exhibited 100%accuracy,precision,recall,and F1-score,followed by YOLOv8 with respective metrics of 95%,100%,90%,and 94.74%.Our approach outperformed state-of-the-art with similar datasets and methodologies.
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
暂无评论